Thursday, 28 March 2013
'Biggest cyber-attack in history' slows down internet worldwide after quarrel between web-hosting company and anti-spam group
Saturday, 23 March 2013
EASY WEBSITE HACKING FOR BEGINNERS|A Complete Guide
REMEMBER :
RULE 1. Destruction of anyone's hard work is a shame and nothing to be proud of!!!
RULE 2. All my Tutorials are for Educational Purpose Only and as usual I vehemently refuse to accept any responsibility for its Misuse.
RULE 3. In no way will I accompany you to any correctional facility or help pay the fine Imposed for being stupid enough to get caught in the first place!
RULE 4. REMEMBER to REMEMBER THAT YOU NEED TO USE FIREFOX!!!
STEP BY STEP INSTRUCTION :
* STEP 1. Go to GOOGLE!!!
* STEP 2. TYPE AND SEARCH FOR :
" Powered by EasySiteNetwork /category.php "
(REMEMBER : When you are choosing a site to hack, make sure you dont choose one mentioning about sql injection...)
* STEP 3. APPLYING THE EXPLOIT :
Make sure the url of the site you chose contains category.php somewhere in the link.Now copy the Script given below and starting from category.php highlight the rest of the url and replace it with the given script.
" /category.php?catid=1+union+select+111,222,concat_ws(char(58),login,password,email),444+from+users/* "
HIT Enter and notice the changes to the page.
* STEP 4. INTERPRETING THE RESULT :
The user information will be displayed along this format :
Username: Password: Email
NOTE: Incases having more then one username and password, then most likely the one displayed second is the Admin Account...
* STEP 5. LOGGING INTO THE ADMIN CONTROL PANEL :
In order to login to the Admin Control Panel, Just add the following extension to the original url :
" /siteadmin/index.php "
NOTE: In most cases you'll see the popup for the Admin Control Panel login, but if in few cases it is-int displayed or doesn't work, then just login like any other user would on the home page.
* STEP 6. Congrats!!! You are now logged into the Admin Control Panel and you have complete access to do as you please.(Doesnt mean you Deface a site!!!)
If you can find out the server or host on which your victims website is Hosted, you can even login to their FTP by typing in a false path!!!
If you are going to copy these posts...Don't forget to credit our work :)
Happy Hacking ;) !!!
Thursday, 21 March 2013
Saints Row: The Third - PC Game


Saints Row: The Third
- Developer: Volition
- Publisher: THQ
- Genre: Action
- Release Date: November 15, 2011 (US)
Saints Row: The Third
Years after taking Stilwater for their own, the Third Street Saints have evolved from street gang to household brand name, with Saints sneakers, Saints energy drinks and Johnny Gat bobble head dolls all available at a store near you. The Saints are kings of Stilwater, but their celebrity status has not gone unnoticed. The Syndicate, a legendary criminal fraternity with pawns in play all over the globe, has turned its eye on the Saints and demands tribute.
Minimum System Requirements
- OS: Windows XP/Vista/7
- Processor: Intel Core 2 Duo @ 2.0 Ghz / AMD Athlon 64 X2 4200+
- Memory: 2 Gb
- Hard Drive: 15 Gb free
- Video Memory: 256 Mb
- Video Card: nVidia GeForce 8600 / ATI Radeon HD 2600 Pro
- Sound Card: DirectX Compatible
- Network: Broadband Internet Connection for Online Multiplayer
- DirectX: 9.0c
- Keyboard
- Mouse
- DVD Rom Drive
Recommended System Requirements
- OS: Windows 7
- Processor: Intel Core i5 @ 2.66 GHz / AMD Phenom II X4 @ 2.8 GHz
- Memory: 4 Gb
- Hard Drive: 15 Gb free
- Video Memory: 1 Gb
- Video Card: nVidia GeForce GTX 460 / ATI Radeon HD 5850
- Sound Card: DirectX Compatible
- Network: Broadband Internet Connection for Online Multiplayer
- DirectX: 10
- Keyboard
- Mouse
- DVD Rom Drive
Download Saints Row: The Third – Direct Links
Part 1 – 700 MB
Part 2 – 700 MB
Part 3 – 700 MB
Part 4 – 700 MB
Part 5 – 700 MB
Part 6 – 700 MB
Part 7 – 700 MB
Part 8 – 700 MB
Part 9 – 700 MB
Part 10 – 700 MB
Part 11 – 700 MB
Part 12 – 700 MB
Part 13 – 167 MB
Crack
www.elj-games.blogspot.com
Assassin's Creed: Brotherhood


Assassin's Creed: Brotherhood
- Publisher: Ubisoft
- Developer: Ubisoft Montreal
- Release Date: March 17, 2010 (US)
- Genre: Action
About Assassin's Creed: Brotherhood
Now a legendary Master Assassin, Ezio must journey into Italy's greatest city, Rome, center of power, greed and corruption to strike at the heart of the enemy. Defeating the corrupt tyrants entrenched there will require not only strength, but leadership, as Ezio commands an entire Brotherhood that will rally to his side. Only by working together can the Assassins defeat their mortal enemies.
Assassin’s Creed Brotherhood Minimum System Requirements
- OS: Windows® XP (32-64 bits) /Windows Vista®(32-64 bits)/Windows 7® (32-64 bits)
- CPU: Intel Core® 2 Duo 1.8 GHZ or AMD Athlon X2 64 2.4GHZ
- RAM: 1.5 GB Windows® XP / 2 GB Windows Vista® - Windows 7®
- VIDEO: 256 MB DirectX® 9.0-compliant card with Shader Model 3.0 or higher (see supported list*)
- DX: 9.0
- HARD DRIVE: 8 GB
- SOUND: DirectX 9.0 -compliant sound card
- PERIPHERALS: Keyboard, mouse, optional controller
- Supported Video Cards: ATI® RADEON® HD 2000/3000/4000/5000/6000 series, NVIDIA GeForce® 8/9/100/200/300/400/500 series
- Note* * This product does not support Windows® 98/ME/2000/NT
Assassin’s Creed Brotherhood Recommended System Requirements
- OS: Windows® XP (32-64 bits) /Windows Vista®(32-64 bits)/Windows 7® (32-64 bits)
- CPU: Intel Core® 2 Duo E6700 2.6 GHz or AMD Athlon 64 X2 6000+ or better
- RAM: 1.5 GB Windows® XP / 2 GB Windows Vista® - Windows 7®
- VIDEO: GeForce 8800 GT or ATI Radeon HD 4700 or better
- SOUND: 5.1 sound card
- PERIPHERALS: joystick optional (Xbox 360® Controller for Windows recommended)
- Supported Video Cards: ATI® RADEON® HD 2000/3000/4000/5000/6000 series, NVIDIA GeForce® 8/9/100/200/300/400/500 series
- Note* * This product does not support Windows® 98/ME/2000/NT

Download Assassin's Creed: Brotherhood – Direct Links
CRACK
www.elj-games.blogspot.com
Wednesday, 20 March 2013
Street Fighter X Tekken
Street Fighter X Tekken
- Developer: Capcom Namco
- Publisher: Capcom
- Genre: Fighting, Action
- Release Date: March 6, 2012 (US)
About Street Fighter X Tekken
Street Fighter x Tekken makes history as fighters from these two bastions of the fighting genre come together for the very first time. Utilizing the same 2D viewpoint and technology that powered Street Fighter IV, this game allows for Tekken characters such as Kazuya Mishima and Nina Williams to make the transition into the Street Fighter universe having been re-imagined using Capcom's much-loved art style. Their looks may be different, but these characters have retained their own unique characteristics and signature moves as they go head-to-head with classic brawlers from the Street Fighter franchise in what promises to be an explosive match up.
Minimum System Requirements
- OS: Windows XP
- Processor: Intel Core 2 Duo @ 1.8 Ghz / AMD Athlon 64 X2 3800+
- Memory: 1 Gb
- Hard Drive: 10 Gb free
- Video Memory: 256 Mb
- Video Card: nVidia GeForce 6600 / ATI Radeon X1300
- Sound Card: DirectX Compatible
- Network: Broadband Internet Connection
- DirectX: 9.0c
- Keyboard
- Mouse
Recommended System Requirements
- OS: Windows XP/Vista/7
- Processor: Intel Core 2 Duo @ 2.6 GHz / AMD Athlon 64 X2 5600+
- Memory: 2 Gb
- Hard Drive: 10 Gb free
- Video Memory: 512 Mb
- Video Card: nVidia GeForce 8800 / ATI Radeon HD 2900
- Sound Card: DirectX Compatible
- Network: Broadband Internet Connection
- DirectX: 9.0c
- Keyboard
- Mouse
Download Street Fighter X Tekken – Direct Links
Part 1 – 700 MB
Part 2 – 700 MB
Part 3 – 700 MB
Part 4 – 700 MB
Part 5 – 700 MB
Part 6 – 700 MB
Part 7 – 404 MB
Crack
www.elj-games.blogspot.com
Tuesday, 19 March 2013
SMAC : THE MAC ADDRESS CHANGER
SMAC : THE MAC ADDRESS CHANGER
SMAC is a powerful and easy to use MAC Address Changer (Spoofer) for Windows systems, regardless of whether the network card manufacturers allow this option or not. Its features include:
- Automatically Activate new MAC Address after changing it
- Show the manufacturer of the MAC Address
- Randomly Generate any New MAC Address or based on a selected manufacturer
- Pre-load MAC Addresses List and choose the new MAC address from the list.
- IPConfig button - click to show network adapter (IPConfig) info to confirm changes
- User-friendly GUI
http://download.cnet.com/SMAC-MAC-Address-Changer/3000-2085_4-10536535.html
Ultimate hack pack 2:
Apache Hacking TooLz Directory:
Apache Chunked Scanner
Apache Hacker Tool v 2.0
Apache H4x0r Script
Remote File Inclusion And Remote Command Execution Directory :
IIS 5 Dav Scanner & Exploiter
PHP Attacker
PHP Injection Scanner & Exploiter
XML-RPC Scanner & Exploiter
Databases & SQL Injection & XSS TooLz Directory:
Casi 4.0
ForceSQL
Mssql BruteForce TooL
SQL Ping 2
SQL Recon
SQL Vuln Scanner
SQL & XSS TooL
PHP Shells:
rootshell v2.0
c99shell #16
Backdoor php v0.1
r57shell
ajan
casus15
cmd (asp)
CyberEye (asp)
CyberSpy5 (asp)
Indexer (asp)
Ntdaddy (asp)
News Remote PHP Shell Injection
PHP Shell
phpRemoteView
nstview php shellb
http://uploading.com/files/d6b672f7/%20Ultimate_H4ack_p4ck_2.rar/
EMAIL SPAMMER
And use these email bombers in your dirty job:
1st Mass Mailer 4.2
This tool will help you to mass spam emails. Little bit complicated but very very effective.
Serial: "18935379480889"
Download
1st Mass Mailer 6.4
This tool will help you to mass spam emails. Little bit complicated but very very effective.
Thanks to elvinguitar for the serial
Download
Mess Bomber
This is also a spammer bot. Same as the previous one , can be used to spam any email you want quickly and easily.
Download
Fill-er-up collection
This 3 softwares are spammers. you can use these tools to spam any email you want very quickly and in only few steps. Ability to attach a file and to stop any time you want. Very effective. All credit go to Nathan72389
Download
Bomb Them!
This is also a spammer bot. Same as the previous one , can be used to spam any email you want quickly and easily. Ability to attach a file and to stop any time you want. All credit go to Nathan72389
Download
72389 Email Bomber
This tool will help you to spam any email you want. This one is special because you have the ability to spam from different email at the same time. All credit go to Nathan72389
Download
Vallen emailer
This tool will help you to spam the emails you want. Ability to choose between a rich text or an html text. Also you can attack files to the message. Try it from here
Download
BOMB MOBILE PHONE WITH SMS : BEAVER'S SMS BOMBER PRO | way2hackintosh
BOMB MOBILE PHONE WITH SMS : BEAVER'S SMS BOMBER PRO
note:- I AM NOT RESPONSIBLE FOR ANY KIND OF DAMAGE U MAKE
This program will bomb the victim's mobile phone with tons of SMS. It supports all major networks around the world. But if your network is not in the list, then don't worry, you can also add the carrier network with the help of "custom" option. You can also load list of multiple victims and bomb them simultaneously. The improvement that Beaver has made in this version over his previous SMS Bomber is that you can spoof the email address from which you are bombing the victim's mobile phone. For Example, If there was an error sending the message, it will ask you if you wanna change the E-mail/Password you are using. All credits to Beaver for this nice program.Download here
JUST CLICK HERE AND FINE IT
or
http://www.mediafire.com/?oyicf11y9n11y9v
comment for broken link
Free BSNL 3G Hack & Trick 2013 ( 100% Working )
it is also tested by me your admin jixxi :P so i guess its working
Trick 1
Use the Following New Connection For Free :-
- Name :3G free(any)
- Service Type 1
- WAP Gateway IP : 1 10.100.3.2
- Port no : 1 : 9209.
- Timeout: Never
- CSD No.1
- User Name1: ppp
- Password1: ppp123
- APN setting: wapwest.cellone.in
- User Name : ppp
- Password : ppp123
OR
Trick 2 :
Requirements:-
1) You Must Have the 3G Supported Device . 2) 3G Activated SIM ( if you are not using 3G sim it is easy to change the plan to 3G)
Knowledge about the changing of your internet settings. Change your Internet Settings with the Following Details :-
Name :- BSNL 3G Service
Type 1 WAP
Gateway IP : -1 10.100.3.2
Port no : 1 : 9209.
Timeout: NEVER
CSD No.1
User Name1: ppp
Password1: ppp123
APN setting: wapwest.cellone.in
User Name : ppp
Password : ppp123
By Using this Settings , you have the free internet service at 3 MBPS Speed.
Vodafone 2G & 3G Hack 2013 With Super Fast Speed By way2h
Process :-
Proxy Settings for Vodafone unlimited 3g Hack:-
Make these Settings as Below :-
Account Name:- HackingHomeMobileTrick
home page : live.vodafone.in
proxy:- 10.10.1.100
apn:- portalnmms
port:- 9401 or 8799
just type ACT FB and then send the message to 144
after you will get conformation msg and free internet for 6 month
if you want increase your internet data then try this again after 6 month
so enjoy and yeha keep your bal low \m/ comment if not working :)
Airtel 3G Unlimited GPRS Trick And Hack With Fastest Proxy 2013
- Create A New Airtel Manual Settings
- Apn : airtelgprs.com
- Proxy : 208.77.23.4
- Port : 80
- Home Page : fb.me
- If Its Not Working Try live.airtelworld.com
- ....... read more click here
CRETE ACCOUNT LOGIN AND READ REST OF THE TRICK
Monday, 18 March 2013
Website Hacking Tools Collection
- Easy SQL Injection Tool
- MySQLi Dumper v1.4 Alpha
- Server Attack
- Shell upload video
- SQLi Helper v2.5
- Super Scan 4
- Link to web-page that finds the admin log-in page of any site
- c100 shell (php file)
- Cain and Abel
- SQL Injection detailed tutorial. Watch it together with Mathias's SQL Injection tutorial, and you'll master it in no time!
- Nessus
- Nmap
- WhoIs
- Ethereal v0.99
http://www.filefactory.com/file/agh3488/n/_Website_hacking_7z
TurboUpload Mirror:
http://www.turboupload.com/yf1fukydnu3r/^^_Website_hacking.7z.html
Password:
"gamefreak" or maybe its "Gamefreak"
Enjoy!

How To Find An IP On Skype
- Skype - Can be downloaded Here
- CMD - Every computer has CMD (Start > All Programs > Accessories > Command Prompt)
Step 1.
![[Image: skypedownload.png]](http://img9.imageshack.us/img9/6608/skypedownload.png)
Step 2.
- Add the slave you wish to IP Grab.
Step 4.
- Double click the slave you wish to IP Grab.
- Go to Start > All Programs > Accessories > Right-click Command Prompt (CMD) & Run As Administrator.
- Close unwanted applications that are open, Such as other opened Skype friends. Leave open the slave you wish to IP Grab.
Step 7.
- In CMD (Command Prompt) Type " netstat -nbt " (without the quotes)
Step 8.
- A whole bunch of stuff should come up. Find [Skype.exe]
Step 9.
- Now there will be more then one Skype.exe which is why you have to close the unwanted tabs of Skype. Now there should be 4 Not More IP's.
Step 10.
- All you have to do now is Track does 4 (Even less) IP's and one will occur to be the one your looking for.
Hope this Tutorial is helpful, A Thanks would be appreciated.
Friday, 15 March 2013
Hack a WiFi Network In 8 Easy Steps.( Using Windows)
those who know how to hack using backtrack please don't laugh its for beginner
Tools needed :
Packet sniffer:
* Commview for WiFi ( check it website and see if ur wifi card is supported https://www.tamos.com/
{ get the 30 day trial or use the free full version available on net from other sites.) (i recomment the 30 day trial because it will be the latest ) after it expires y can always go to other means.
You will use this tool for capturing the packets sent and recieved through the Access Point you are going to hack .The more packets you capture the better chances of cracking the password .You will need more than 1,00,000 minium packets to crack the password .The packets will be captured in the .ncp format .You will use this tool to convert the .ncp to .cap .
NOT MANY NETWORK CARDS ARE SUPPORTED SO PLEASE CHECK YOUR NETWORK ADAPTER IN DEVICE MANAGER. IF it is not supported then there is no other option then to use backtrack with extra hardware.
Decrypter :
* Aircrack suite (http://www.aircrack-ng.org/)
You will use this tool to crack the password of the Access Point using the . Cap files you obtained from the Commview application .
NOTE :
You will need a packet sniffing program (we will use Commview for WiFi) and not airodump-ng ( already integrated in aircrack suite).
Or if YOU can get another packet sniffer that support your card then use it instead of commonview.
Note :- You will not be able to connect to any Network using WiFi when using CommView .
Step 2 : Click on the PLAY ICON in the Left First .
In the Maximum Directory Size : 5000
Average Log File Size : 50
Now you will have one .ncf file .
Click on File->Log Viewer->Load Commview Logs-> Choose the .ncf file. Now File->Export->Wireshark/TCP dump format .
Now for the Second Part Cracking this is very simple . Just open the Aircrack Folder->Bin->Aircrack-ng GUI.exe Choose the .cap file and you should be able to do the others .
Thursday, 14 March 2013
EXPLANATION ABOUT ENCRYPTION,HASHING ALGORITHMS,SALTS AND DECRYPTION
1.Encryption&Hash
In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted). Hashing is a one way encryption. That means that it is not possible to use a reverse algorithm in order to come back from the hash to the password. Any way people found a way to crack hashes by using a bruteforce or dictionary attacks. Because of this hashing was made even more secure. After reading the whole tutorial you will get the point.
2.Hashing Algorithms
Cracking any hash is not that simple like running a bruteforcer. Sometimes a bruteforcer or a dictionary attack will do the job but only in a very rare situations where the algorithm is a plain md5 and where the hash is without salt. Plain md5 algorithm ? What does that mean ? Nowadays people use more complicated algorithms in order to increase the security. For example a plain md5 is an algorithm like this:
md5($pass)
What is this going to do ? This is going to make a md5 hash from the given pass. But what happens if you have something like this:
md5(md5($pass))
This makes first one md5 from the password and then another md5 hash from the new generated md5. So for example if the password is HI the results will be:
first one : md5("HI") = "bf8c144140b15befb8ce662632a7b76e"
second one: md5(md5"HI") = "ce8441edc9a85ed9839a849f99ed5ecc"
So as you can see for a same password we have two different MD5s. That is why when you are trying to crack a MD5 or any other hash ( the upper mentioned cases are the same for any other encryption out there ) it is very important to know the algorithm that was used to generate those hashes coz otherwise bruteforcing will have no sense and you will be stuck forever... There for always use a bruteforcer that allows you to enter the hash algorithm so that you can be sure that eventually you will find the password...
3. SALTS
What is a Salt ? Why do people use Salts ? Hashing became even more secure way of encrypting passwords with the use of Salts. Salt is actually a random pass phrase that is added to the main password. How it is added depends from the algorithm that was used. Salts are being used coz bruteforcing a salted hash without knowing the Salt is impossible. For example imagine that you have a password HI. See what happens in the next cases if we take 1234567890 for a salt:
md5($pass) => md5("HI") = "bf8c144140b15befb8ce662632a7b76e"
md5($pass,$salt) => md5("HI1234567890") = "4f4d880dbc772fb6acba84a98bce6136"
That is why cracking a salted hash without knowing the hash is impossible... But what happens if we know that salt ? Then we need to specify in our bruteforcer like previous mentioned the algorithm in our case => md5($pass,$salt) and we need to specify the salt. Knowing this the bruteforcer will perform the attack like a normal bruteforce except it will add the salt to every combination he makes. On the paper it goes like this :
A1234567890
AA1234567890
AAA1234567890
.
.
.
...and so on and so on. So basically every combination will end with 1234567890 and the only thing generated will be the thing before 1234567890. The use of Salts as you can see makes hashing even more secure.
4. Cracking
Cracking was mentioned during the whole tutorial but in here I will make a precise list of what you need to think before starting with decryption.
- First of all you need to figure out what type of hash do you have ( md5, sha1, mysql... )
- Then you need you need to see figure out if the hash is salted or not. If the hash is salted then you need the salt aswell
- Having the salt is not enough. You need to find the algorithm that was used. Only then you will be able to start with the decryption.
- If you came to all this things somehow you are ready to start with decryption.
Wednesday, 13 March 2013
James Bond 007: Blood Stone

James Bond 007: Blood Stone
- Developer: Bizarre Creations
- Publisher: Activision
- Genre: Action
- Release Date: November 2, 2010 (US)
About James Bond 007: Blood Stone
An international conspiracy has placed the UK's most secretive bio-chemical project into deadly hands, and only Her Majesty's most lethal agent, James Bond, can unravel the mystery. To navigate through layers of corruption, you, as Bond, will embark on a global chase that will have you battling on land, sea and air through Athens, Istanbul, Monaco, and Bangkok. Nothing is what it seems as each adventure reveals a deeper and more sinister conspiracy.
Minimum System Requirements
- OS: Windows XP, Vista or Windows 7
- CPU: Intel Core 2 Duo E4300 @ 1.80 GHz or AMD Athlon 64 X2 4000+ @ 2.0 GHz
- RAM: 1 GB XP , 2 GB for Vista, 7
- HDD: 8 GB free disk space
- Graphics: 128 MB Graphics Memory
- Sound Card: DirectX 9 Compatible
- DirectX: Version 9.0c
Recommended System Requirements
- OS: Windows XP, Vista or Windows 7
- CPU: Core i3-530 2.9GHz or Phenom II X4 905e
- RAM: 2 GB
- HDD: 8 GB free disk space
- Graphics: 256 MB Graphics Memory
- Sound Card: DirectX 9 Compatible
- DirectX: Version 9.0c