Friday, October 12, 2012

Hack Facebook


To my knowledge, i have already discussed all most all the possible ways to hack facebook account. If you did missed that, please read here: Ways to hack facebook account. We have also seen that there is nothing called “facebook hacking Software” or “Facebook hacker software”. All these software’s are fake and spyware, that once installed on your system, will rapidly upload any sensitive data of yours like credit card details or saved passwords to the creators server. Read more here: The Truth behind Facebook Hacking Software.
Here in this post i will be demonstrating how you can hack your friends ‘facebook account’ who is residing far away from you using the Best remote keylogger software “Winspy“. Keylogging method is the best option for you, when you really want to reveal your victims password and at the same time, you do not want your victim to know about ‘his account being hacked’.
The best part in winspy keylogger is, you need not manipulate or bind the remote installation file with any other file like .mp3 or .jpg. Winspy keylogger will automatically do that for you, as specified. Though some antiviruses like COMODO may flag it as Trogn, In such cases you can always use Crypters to make then undetectable. Read here: Making keyloggers Undetectable using Binders and Crypters.
* ] After buying, please be sure to note down the “clickbank transaction id”. you will need it to activate your software.
Features of WinSpy Keylogger:
  • Inbuilt Icon changer and Image Binder
  • Captures Keystrokes including passwords, chats, websites visited, etc.
  • Remote FTP – Upload or download any file from remote PC.
  • Added PC Usage or Active Time Report
  • Improved Chat Reports – Google Talk Chat, Facebook Chat, MSN Live Chat, etc.
  • WebCam Recording with SMS Alert
Tutorial - How to Use Win-spy for "Facebook Hacking"?
Step #1: Click Open the Win-spy installation file that you just downloaded and it will start the installation process. You will be asked to register the software using ‘clickbank transaction id‘. Just copy paste the clickbank transaction id that you copied after buying it. (Forgot to copy? don’t worry, head over to your email inbox and check for email from clickbank).
clickbank transaction id
Step #2: Next you will be asked to choose Login details (username & password). So that only you are able to access the software and captured data (keylogs).
Download Winspy keylogger
Step #3: Once you are done with selecting username and password, the keylogger will then ask you to press and hold 3 keys simultaneously for “login box” to appear.
Winspy keylogger login
Step #4: Once you press and hold these 3 keys: Ctrl+Shift+F12, a “Login Box” Box will appear immediately. Now enter your username and password to login to your main control panel.
Download Winspy keylogger
Step #5: Your control panel will look something like below. This is your main keylogger control panel, where in you can manage everything. Remember this main keylogger will also monitor your PC in completely stealth mode and report everything in your control panel.
(Click to Enlarge)
Download Winspy keylogger
Every time when you restart or reboot your PC, Win-spy keylogger will automatically start monitoring your PC. In case you don’t wish to monitor you PC, Just login by pressing Ctrl+Shif+F12 and click ‘file >> exit‘. Once you logout/exit the program, you cannot login back. To login back, you will need to reboot your PC.
Step #5: Now coming back to our main mission, i.e creating Remote installation file for your victim. To create this installation file for your “XYZ” victim, Just click ‘Remote >> Remote install‘ in your control panel. Here a warning message will pop-up, Just click ‘yes’ and proceed.

Step #6: Now here comes the main Step. Next you will see all the settings and options in you “remote installation file”.
Remote install options
      Fill in the required Fields:
Enter User: Enter a description on how you are going to identify remote PC.
File typesEnter Filename: This is the name of the file you will be sending. A .exe file (or .ppt) with this filename will be created on your desktop. You will be sending this file to the Remote PC. As you will see, there 5 different file extensions you can choose from. The most commonly used and recommended ones are.exe or .ppt formats. If .ppt (powerpoint extension) selected, you might need to update some settings in you office suit. In both .exe or .ppt, you can add image to it. So that when your victim runs it, he will be shown the Image and the keylogger will install in background automatically.
Include Picture: This is the picture remote user will see when they click on the remote file. Supports GIF or JPG formats. If no picture is included then when user clicks on the file it would appear as nothing has happened. Win-Spy will install silently.
File Icon: You can add any icon to your remote installation file. If you have Included image then its recommended that you use image icon.
#tip: To create icon of Image, use this software called Any2IconDownload here.
Email keylog to: This will be the email address where you would receive win-spy keylog reports. Enter your gmail address in this Email Tab. Its Recommended that you use only gmail email address. Do not change SMTP server settings. Do a “Test” and make sure mail was sent and received. Check your SPAM folder for email if not receiving email.
There are some other optional settings like: screen capture, WebCam, FTP, etc. Just go through and configure as you wish.
Step #7: Once you are done with filling up all the required details, Click on “Create Remote file” Button. This will take some seconds and once it is done, it will then save the installation file on your Desktop.
Step #8: The next Step is to send this file to your victim via email or better send it via facebook messages (as attachment). Make sure you have archived it in a .rar or .zip file, So that online antivirus programs of facebook or email service don’t pick it up as exe file.
attachment
It totally depends on you as to how you are going to convince your victim to install it at his end. here you will need a criminal mind to perform this Con. For ex: lets say i am chatting with my victim in facebook messages, suddenly i will send him 1 broken photo link and will ask him to identify any object in the photo. Obviously he will reply that the “link is not working” or “i don’t have permission to access that link“. Then i will attach Zip file containing the keylogger and ask him to download this file to checkout that photo. At his end he will download it, open it and he will see the image on his screen. and by the time he reply you back, the keylogger is already installed on his PC.
Step #9: Once your victim has successfully installed it, you will then get keylogs periodically in your specified Gmail’s “SPAM” folder. You can also use Remote PC viewer in your win-spy control panel to view all your victims activity.
That’s it. Good luck!. If you are facing any problem, do comment below and i will get back to you anytime.
P.S. We hold no responsibility for the keylogger software we have refereed to and We can not guarantee the remote setup will work for everyone. Please do not Misuse it unless its for good reason. Also We claim no legal or moral responsibilities for your actions. Please check your local laws.



Read more: http://www.hacker9.com/hacking-facebook-accounts-using-win-spy-keylogger-software.html#ixzz2950nIivk

SniperSpy Keylogger – Best Remote Spy Software for Windows & Mac



Download SniperSpy for Free
The word Remote tells that you can install this Software Remotely on any PC via email or any other means. ie No physical access to your remote PC is needed to install the spy software. Once installed The program then records user activities and sends the data to your online account. The Data Includes chat Conversations, visited websites, usernames, passwords, keystrokes and more, with screenshots. You can also view the screen LIVE and browse the file system from anywhere anytime.

-What You can do with SniperSpy?

  • View the Screen LIVE including LIVE Keystrokes
  • Browse the File System and Download Remote Files
  • View / Kill Processes or Launch an Application
  • View Browser History and Launch a URL
  • View System Information and Locations on a Map
  • Send Message to User or Logoff User
  • Restart or Shutdown PC
  • Freeze/Unfreeze Mouse and Run Screensaver




-Why Do I need This Software?

For Partners: Do you Suspect that your Spouse is cheating on you AND you do not have hard evidence to prove it? Consider Installing SniperSpy, it not only gives you the Complete activity of your Spouse but also provides enough Screen shots and Chat history that can serve as the clear evidence against your Cheating Spouse
For Parents: Does your child spends most of their time before their computers? If your children spend time chatting or playing computer games, they can be approached by the strangers. In other words they are exposed to potentially Dangerous things like PORN, Gambling, Dating Strangers, etc. In this Case SniperSpy is the best solution to Monitor and control the Online Activity of your child.
For Employers: Do all your employees use their computer resources and Internet connection solely for your business? Do they work as hard as you? OR Do you suspect your employee’s productivity is lacking? You should consider installing This Remote Software that can serve as the best Employee Monitoring Software for Small business.
For Hackers: Are you looking for any easy way to hack into someones facebook or Myspace accounts ? or wanna control someones facebook account? SniperSpy can expose you all the Keystrokes entered by your victim including Usernames and Passwords for any websites.

-Control Panel ScreenShots:

- – - -  - - 

-How SniperSpy Works?

How sniperSpy works
  1. Once you Buy the Software, you will be instantly emailed your Username/Password and a link to download the Module Creator program. You will download this program to your local computer in order to create the module to send to your remote computer. Module Creator will create your .EXE file with name you selected. for ex: funny.exe, video.exe
  2. Second Step is to Send the exe file to your Remote PC via email. Once your Victim Runs the exe file on His PC, the Monitoring Begins. All the Activity data are then uploaded to the SniperSpy Server Continuously.
  3. The last Step is to Login to your SniperSpy Account. Here You will be able to view all the recorded activity including Screenshots, Keylogs, Chat history and many more. Logs are updated every six minutes. No matter where you are, you can log into your SniperSpy account from any Internet connection.

Hack website in 4 Step


Every wondered how Anonymous and other hacktivists manage to steal the data or crash the servers of websites belonging to some of the world biggest organisations? Thanks to freely available online tools, hacking is no long the preserve of geeks, so we've decided to show you how easy it is to do, in just four easy steps.
Step 1: Identify your target
While Anonymous and other online hacktivists may choose their targets in order to protest against perceived wrong-doing, for a beginner wanting to get the taste of success with their first hack, the best thing to do is to identify a any website which has a vulnerability.
Recently a hacker posted a list of 5,000 websites online which were vulnerable to attack. How did he/she identify these websites? Well, the key to creating a list of websites which are likely to be more open to attack, is to carry out a search for what is called a Google Dork.


Google Dorking, also known as Google Hacking, enables you find sensitive data or evidence of vulnerabilities by querying a search engine like Google or Bing. It basically allows you to enter a search term into Google and find websites which may have these vulnerabilities somewhere on the site.
Don't worry about needing technical expertise to know what to look for. Kind-hearted hackers have produced lists of these Google Dorks, neatly categorised into the type of vulnerability you are looking for. Looking for files containing passwords? There's got a Dork for that. Login credentials? There's a Dork for that.
For example, if you are looking for files stored on websites containing passwords, then a sample search query we found openly listed on one indexing site was: intitle:"Index of" master.passwd. This returns the results shown in the screengrab above.
So now you have a list of potential victims. Next you need to narrow this down even further.
Step 2: Check for vulnerabilities
Having a huge number of sites which may or may not be vulnerable is not much use unless you can pinpoint one which is actually open to attack. This is when a programme called a vulnerability scanner comes into its own and the most popular is called Acunetix.
Acunetix, developed by a UK-based company, was designed, and is still used, as a tool for web developers to test sites they are building. However the hacking community has commandeered the tool and uses it to identify existing vulnerable sites.
You can download a trial version of the software for free from the official Acunetix website or if you venture into the murky depths of a hacker forum and search for Acunetix, you can find cracked versions of the full application freely available.
Acunetix, as you can see from the screen shots above, is a simple, straight-forward Windows application and all you need to do is enter the URL of the site you want to target, and press Process. Acunetix will scan the entire website, including all pages associated with it, and return a list of vulnerabilities it finds. If you find the type you are looking for, you will need to move onto Step 3, as Acunetix does not perform any website penetration.
Step 3: Attack the website
Attacking a website is done by two main methods. The first is by carrying out a Distributed Denial of Service (DDoS) attack which overwhelms a website's servers and forces it to shut down. We will deal with this type of attack later, but first we will look at how you can hack into an account and steal some information contained within databases on the site.
This type of attack is known as a SQL (pronounced sequel) Injection. A SQL Injection attack aims to capture information stored in a database on the particular website by introducing some SQL code. SQL is a programming language designed for managing data in a database.
But fear not, you won't need to understand a single line of SQL to carry out this attack. Thankfully another freely-available and easy-to-use application, originally developed in Iran, can be downloaded from the web saving you the trouble of dealing with any complex code.
The program is called Havij, the Farsi word for carrot, which is also a slang word for penis and so, unsurprisingly, this is the piece of software required to penetrate a website.
Again there are free and paid-for versions of Havij available with the paid-for version having more powerful capabilities. Again the world of hacker forums is your friend here and cracked versions of the full Havij application are available if you look for them.
The Havij interface is once again like any other Windows program and all a virgin hacker needs to do is simply copy-and-paste the address of their target website and press a button.
Havij allows you to perform a number of different types of operation including one called a Get, which unsurprisingly gets all the information stored on databases on that particular site which can be usernames, passwords, addresses, email addresses, phone numbers and bank details.
And that's it, within minutes you can search for, download and use a couple of automated tools which will allow you to access websites which are vulnerable to this type of attack. While most high profile companies' websites will be protected from this type of attack, the fact that Sony's website and the personal information of its customers was stolen in a manner similar to this, shows just how vulnerable the web is.
Step 4: If all else fails, DDoS
Hacktivist collective Anonymous changed their tactics in the last 12 months moving away from DDoS as their primary tool for attacking websites, preferring if possible to use SQL Injection instead. However, when this is not possible, they will revert to DDoS attacks, and you can to, with the help of another freely available tool.
And it turns out that DDoSing a website is no more difficult than carrying out a SQL Injection. The programme used is called Low-Orbit Ion Canon (LOIC) which was developed for web designers to stress test websites, but has been high-jacked by hackers in order to attack websites.
Available as a free download from Source Forge, LOIC employs a very user-friendly interface and all potential hackers need to is type in the URL of the site they want to crash and LOIC will do the rest. What the application will do is send up to 200 requests per second to the site in question.
While most bigger sites might be able to deal with this request without crashing, most websites out there will not, especially if you get together with some other hacking virgins and combine your efforts.
So easy is it to use this technology that you can even control it from your BlackBerry, meaning you can be enjoying a pint in the pub with your friends while carrying out a DDoS attack on a website of your choice.
If our tutorial has not provided you with enough information, there are dozens of other tutorials on various hacker forums around the web and even video tutorials on YouTube which you can watch.

Friday, October 5, 2012

How To Hack Websites Using Havij 1.10(Full Tutorial)


--= Hajiv Pro 1.13 = ----

How To Hack Websites Using Havij 1.10(Full Tutorial)



Download Havij 1.10

First Find A Sqli Infected Site .Now Here I Found A Vulernable Site
Http://Www.Hypetrading.Com/Productinfo.Php?Id=285

Now Let's Start

Open Havij And Copy And Paste Infected Link As Shown In Figure

Then It Shows Some Messages There....Be Alert On It And Be Show Patience For Sometime To Find It's Vulernable And Type Of Injection And If Db Server Is Mysql And It Will Find Database Name.Then After Get It's Database Is Name Like Xxxx_xxxx 

Then Move To Another Operation To Find Tables By Clicking "Tables" As Figure Shown.Now Click "Get Tables" Then Wait Some Time If Needed

After Founded The Tables ,You Can See There Will Be "Users" Put Mark On It And Click In The " Get Columns " Tab As Shown In Figure
 


Bingo Got Now Id And Pass That May Be Admin...
The Pass Will Get As Md5 You Can Crack It Also Using This Tool As Shown In Figure...