Monday, 17 October 2011

Keyboard Shortcuts For Facebook


Google Chrome Facebook Shortcuts

  • Alt+1: View your News Feed
  • Alt+2: View your own Profile
  • Alt+3: View pop-up of friend requests
  • Alt+4: View pop-up of messages
  • Alt+5: View pop-up of notifications
  • Alt+6: View Account Settings
  • Alt+7: View Privacy Settings
  • Alt+8: View Facebook’s own profile
  • Alt+9: Read latest Terms of Service agreement.
  • Alt+?: Search
  • Alt+m: Compose a new message
If you are using Firefox browser then you also need to press SHIFT along with the above shortcut keys.

Firefox Facebook Shortcuts
  • Shift+Alt+1: View your News Feed
  • Shift+Alt+2: View your own Profile
  • Shift+Alt+3: View pop-up of friend requests
  • Shift+Alt+4: View pop-up of messages
  • Shift+Alt+5: View pop-up of notifications
  • Shift+Alt+6: View Account Settings
  • Shift+Alt+7: View Privacy Settings
  • Shift+Alt+8: View Facebook’s own profile
  • Shift+Alt+9: Read latest Terms of Service agreement.
  • Shift+Alt+0: Open Facebook Help Center
  • Shift+Alt+?: Search
  • Shift+Alt+m: Compose a new message

Monday, 10 October 2011

How To Jailbreak iPhone 4G .

Step 1: Download the Greenpoison from : http://cache.greenpois0n.com/dl/gp_win32_rc4.zip (if you think this link is infected search google for greenpois0n and download it ) ..

Step 2: Extract and run greenpois0n,then plug in your Apple item.

Step 3: Turn your apple item off.






Step 4: Press “Prepare to Jailbreak (DFU)” button in greenpois0n, you will be guided by Greenpois0n on how to perform next steps. 



Step 5: Follow the steps (try being exact),Once you’re in DFU mode, click the ‘Jailbreak!’ button to jailbreak your iPhone.


Step 6: Now, just wait until the status bar shows complete, and your device will reboot to the home screen.


Step 7: You should now have a new “Loader” icon on your springboard. Launch Loader. Select Cydia > Install Cydia.


Step 8: One Cydia has successfully been installed, you will be asked if you want to remove Loader. Hit “Remove” and you iPhone will automatically reboot.You will obtain a "Cydia" icon.

It is JailBreaked :) know lets work on cydia:


-Start “Cydia” on your iPhone.


-Touch on “Manage” tab on the bottom.


-Now touch on “Sources”


-Touch on “Edit” and then on “Add”. You will be prompted to enter a url source as seen in the screenshot below. Type “http://cydia.hackulo.us/” and touch on“Add Source” .


-Know Go and search for "Appsync" and select your version , I used for my Iphone "Appsync for 4.1 os"



-Know Go to iTunes on your computer (you should have the apple item ex: iPhone plugged into the PC), and download any application , then sync it into your IPhone.

-We are nearly done ,Open cydia and search for Installous 3 (Note : don't choose Install0us the one with "0")



Open Installous and start downloading apps. :D
ENJOY .....






 



Saturday, 24 September 2011

Hack Windows Admin Password (With Different Ways)



Net User: Command Prompt
Windows command prompt utility Net User, can also be used to manipulate the user accounts in windows. 
The commands are as follows:
  • To check the User Accounts: Net User
  • To Change the Password of User Account: Net User Username *
  • To Add a New User Account: Net User Username Password /add
  • To Delete a User Account: Net User Username /delete
Sticky Keys Backdoor
  • Sticky Keys application can be used as the Backdoor in Windows Operating System. 
  • Command Prompt file ‘CMD.EXE’ can be renamed to ‘SETHC.EXE’ in C:\Windows\System32 Folder.
  • After this one can hit the Shift Key 5 times on the User Login Screen and will get the Command Prompt right there. Net User can be used to modify User Accounts thereafter.
Live Boot Disk Attack
  • Software: Active Password Recovery can be used to create Live Boot Disks for Windows Operating System.
  • Live Boot Disk can be used to start the Windows and access the SAM File.
  • Attacker can Remove the Passwords from the User Accounts or can set new Passwords on the Accounts.
Brute Force Attack
  • Brute Force Password Guessing is just what it sounds like: Trying a Random approach by Attempting Different Passwords and hoping that One works. Some logic can be applied by trying passwords related to the person’s name, job title, hobbies, or other similar items.
  • Brute force randomly generates passwords and their associated hashes.
  • There are Tools available to perform the Brute force attack on the Windows SAM File. One of the most famous of them is Cain and Able.
Privilege Escalation
  • Once the Administrator account is Cracked, one can easily Login with the Administrator User Account and Promote any User Account to give him the Administrator privileges.
  • One more thing which an attacker can do is to boot the computer from the Live CD and change the SAM file to promote any Limited User account to Administrator.

Know Who Deleted You On Facebook ..

Ever asked yourself this question? Ever wondered why the number of your friends has changed?

You want to know who deleted you?

Who.Deleted.Me, simply offers you a facebook application with which you will automatically notified via email message associated with your facebook account when your friend’s list will increase or decrease.

How To Contact To Facebook For Different Issues?

Emails via which you can contact to facebook for different issues. After sending request, you will receive an automated generated mail.
  • abuse@facebook.com
  • appeals@facebook.com
  • disabled@facebook.com
  • info@facebook.com
  • legal@facebook.com
  • privacy@facebook.com
  • warning@facebook.com
However, I think you can't contact facebook personally where humans can personally reply to our mail! If you got any way, then please comment here!

How To Send Fake Emails?

So are you keen about sending fake emails to your newbie friends who is just new in internet or don't know what happens actually? Well there are mainly two methods for sending fake emails,
  • Sending Fake Email using Open Relay Server
  • Sending Fake Email using Web Scripts
Sending Fake Email using Open Relay Server

An open mail relay is a SMTP (Simple Mail Transfer Protocol) server configured in such a way that it allows anyone on the Internet to send Email through it, not just mail destined to or originating from known users. An attacker can connect the Open Relay Server via Telnet and instruct the server to send the Email. It requires no password to send the Email.

Sending Fake Email using Web Scripts

Web languages such as PHP and ASP contain the mail sending functions which can be used to send Emails by programming Fake headers i.e. From: 
To: 
Subject: 
There are so many websites available on the Internet which already contains these mail sending scripts. Most of them provide the free service, Some of them are:

• Fakesend.com
• Anonymailer.net
• Deadfake.com
• Fakemailer.net
• Fakemailer.info

Know Location Of Victim & When Your Mail Has Read .

Now you can find out when your email has been read by the recipient! No more guessing: "Has he or she read my email yet?" SpyPig is a simple email tracking system that sends you a notification by email when the recipient opens your message. It works with virtually all modern email programs: Outlook, Eudora, Yahoo Email, Gmail, Hotmail, AOL Email and many others.

Enter your email address under step 1, any title under step 2, select the image and then copy image location if you are using firefox n paste in message body or simple drag & drop image & then send it to the victim. When victim will open it, you will receive a message with subject "Your email has been read with contents:

Email Title:
Sent by You:
Your IP Address:
Opened by Recipient:
Recipient Location:
Recipient IP Address:
 For more info visit SpyPig Website.