Monday, 17 October 2011

Keyboard Shortcuts For Facebook


Google Chrome Facebook Shortcuts

  • Alt+1: View your News Feed
  • Alt+2: View your own Profile
  • Alt+3: View pop-up of friend requests
  • Alt+4: View pop-up of messages
  • Alt+5: View pop-up of notifications
  • Alt+6: View Account Settings
  • Alt+7: View Privacy Settings
  • Alt+8: View Facebook’s own profile
  • Alt+9: Read latest Terms of Service agreement.
  • Alt+?: Search
  • Alt+m: Compose a new message
If you are using Firefox browser then you also need to press SHIFT along with the above shortcut keys.

Firefox Facebook Shortcuts
  • Shift+Alt+1: View your News Feed
  • Shift+Alt+2: View your own Profile
  • Shift+Alt+3: View pop-up of friend requests
  • Shift+Alt+4: View pop-up of messages
  • Shift+Alt+5: View pop-up of notifications
  • Shift+Alt+6: View Account Settings
  • Shift+Alt+7: View Privacy Settings
  • Shift+Alt+8: View Facebook’s own profile
  • Shift+Alt+9: Read latest Terms of Service agreement.
  • Shift+Alt+0: Open Facebook Help Center
  • Shift+Alt+?: Search
  • Shift+Alt+m: Compose a new message

Monday, 10 October 2011

How To Jailbreak iPhone 4G .

Step 1: Download the Greenpoison from : http://cache.greenpois0n.com/dl/gp_win32_rc4.zip (if you think this link is infected search google for greenpois0n and download it ) ..

Step 2: Extract and run greenpois0n,then plug in your Apple item.

Step 3: Turn your apple item off.






Step 4: Press “Prepare to Jailbreak (DFU)” button in greenpois0n, you will be guided by Greenpois0n on how to perform next steps. 



Step 5: Follow the steps (try being exact),Once you’re in DFU mode, click the ‘Jailbreak!’ button to jailbreak your iPhone.


Step 6: Now, just wait until the status bar shows complete, and your device will reboot to the home screen.


Step 7: You should now have a new “Loader” icon on your springboard. Launch Loader. Select Cydia > Install Cydia.


Step 8: One Cydia has successfully been installed, you will be asked if you want to remove Loader. Hit “Remove” and you iPhone will automatically reboot.You will obtain a "Cydia" icon.

It is JailBreaked :) know lets work on cydia:


-Start “Cydia” on your iPhone.


-Touch on “Manage” tab on the bottom.


-Now touch on “Sources”


-Touch on “Edit” and then on “Add”. You will be prompted to enter a url source as seen in the screenshot below. Type “http://cydia.hackulo.us/” and touch on“Add Source” .


-Know Go and search for "Appsync" and select your version , I used for my Iphone "Appsync for 4.1 os"



-Know Go to iTunes on your computer (you should have the apple item ex: iPhone plugged into the PC), and download any application , then sync it into your IPhone.

-We are nearly done ,Open cydia and search for Installous 3 (Note : don't choose Install0us the one with "0")



Open Installous and start downloading apps. :D
ENJOY .....






 



Saturday, 24 September 2011

Hack Windows Admin Password (With Different Ways)



Net User: Command Prompt
Windows command prompt utility Net User, can also be used to manipulate the user accounts in windows. 
The commands are as follows:
  • To check the User Accounts: Net User
  • To Change the Password of User Account: Net User Username *
  • To Add a New User Account: Net User Username Password /add
  • To Delete a User Account: Net User Username /delete
Sticky Keys Backdoor
  • Sticky Keys application can be used as the Backdoor in Windows Operating System. 
  • Command Prompt file ‘CMD.EXE’ can be renamed to ‘SETHC.EXE’ in C:\Windows\System32 Folder.
  • After this one can hit the Shift Key 5 times on the User Login Screen and will get the Command Prompt right there. Net User can be used to modify User Accounts thereafter.
Live Boot Disk Attack
  • Software: Active Password Recovery can be used to create Live Boot Disks for Windows Operating System.
  • Live Boot Disk can be used to start the Windows and access the SAM File.
  • Attacker can Remove the Passwords from the User Accounts or can set new Passwords on the Accounts.
Brute Force Attack
  • Brute Force Password Guessing is just what it sounds like: Trying a Random approach by Attempting Different Passwords and hoping that One works. Some logic can be applied by trying passwords related to the person’s name, job title, hobbies, or other similar items.
  • Brute force randomly generates passwords and their associated hashes.
  • There are Tools available to perform the Brute force attack on the Windows SAM File. One of the most famous of them is Cain and Able.
Privilege Escalation
  • Once the Administrator account is Cracked, one can easily Login with the Administrator User Account and Promote any User Account to give him the Administrator privileges.
  • One more thing which an attacker can do is to boot the computer from the Live CD and change the SAM file to promote any Limited User account to Administrator.

Know Who Deleted You On Facebook ..

Ever asked yourself this question? Ever wondered why the number of your friends has changed?

You want to know who deleted you?

Who.Deleted.Me, simply offers you a facebook application with which you will automatically notified via email message associated with your facebook account when your friend’s list will increase or decrease.

How To Contact To Facebook For Different Issues?

Emails via which you can contact to facebook for different issues. After sending request, you will receive an automated generated mail.
  • abuse@facebook.com
  • appeals@facebook.com
  • disabled@facebook.com
  • info@facebook.com
  • legal@facebook.com
  • privacy@facebook.com
  • warning@facebook.com
However, I think you can't contact facebook personally where humans can personally reply to our mail! If you got any way, then please comment here!

How To Send Fake Emails?

So are you keen about sending fake emails to your newbie friends who is just new in internet or don't know what happens actually? Well there are mainly two methods for sending fake emails,
  • Sending Fake Email using Open Relay Server
  • Sending Fake Email using Web Scripts
Sending Fake Email using Open Relay Server

An open mail relay is a SMTP (Simple Mail Transfer Protocol) server configured in such a way that it allows anyone on the Internet to send Email through it, not just mail destined to or originating from known users. An attacker can connect the Open Relay Server via Telnet and instruct the server to send the Email. It requires no password to send the Email.

Sending Fake Email using Web Scripts

Web languages such as PHP and ASP contain the mail sending functions which can be used to send Emails by programming Fake headers i.e. From: 
To: 
Subject: 
There are so many websites available on the Internet which already contains these mail sending scripts. Most of them provide the free service, Some of them are:

• Fakesend.com
• Anonymailer.net
• Deadfake.com
• Fakemailer.net
• Fakemailer.info

Know Location Of Victim & When Your Mail Has Read .

Now you can find out when your email has been read by the recipient! No more guessing: "Has he or she read my email yet?" SpyPig is a simple email tracking system that sends you a notification by email when the recipient opens your message. It works with virtually all modern email programs: Outlook, Eudora, Yahoo Email, Gmail, Hotmail, AOL Email and many others.

Enter your email address under step 1, any title under step 2, select the image and then copy image location if you are using firefox n paste in message body or simple drag & drop image & then send it to the victim. When victim will open it, you will receive a message with subject "Your email has been read with contents:

Email Title:
Sent by You:
Your IP Address:
Opened by Recipient:
Recipient Location:
Recipient IP Address:
 For more info visit SpyPig Website. 

Write Blank Status In Facebook..



So do you wanna to write your facebook status as blank like it ?
 



  • Just Press & hold Alt key.
  • Type 0173 (Simply use combination of Alt+0173)
  • Leave Alt key now.
  • Click on share.
  • That's all.
If the above method does not work, then type @[0:0: ] & publish it, you will get the same result.

Use Gmail As Drive In Computer

So you can use Gmail as any other drive in your computer.

When you drag and drop a file to the drive, it sends an email to your Gmail account with the file as attachment. .


Just Download Gmail Drive Shell Extension From Here.

Hide Drives Completely With CMD .

Wanna to hide whole drive completely with CMD, so there's no need of any software, group policy editor or registry trick. Follow these simple steps:
  • Go to start>run>Type Diskpart
  • Window will open, type "list volume" without quotes.

  • Now select drive which you want to hide, suppose you wanna to hide drive F, for that type "select volume 4" (Volume 4 is correspond to drive letter F).
  • Type "remove letter F"
  • For accessing back, type "assign letter F".

View & Download Complete Structure Of Any Website Using BlackWidow .

Download blackwidow, install it and then open. Click on Browser menu, enter the address as abc.com & then press enter. It will browse the url you have entered. Now go to Scanner, click to Start Scan. After processing, you will see complete structure of site. Like it you can also check for link errors, external errors etc.

Download it from here:  BlackWidow

How To Backup Blogger Posts ?


In case, you just lost your old blog posts by deleting them accidentally or by any other issue, follow these steps for making backup of your blog posts:

  • Login to Blogger.
  • Go to Settings : Under Basic, look for Blog Tools.
  • Click On Export blog.
  • Under Export your blog & Click on DOWNLOAD BLOG.

Make Fool Your Friend By Fake Warning Message !!



Make fun with your friends by making a batch file which will generate fake warning message. Download text file and then save it as fake.bat. Open it, it will generate fake warning message. Don't panic, it will not harm your computer. It's just a fake warning message.

You can download text file from here.
 
Some extra fun ??
Paste this batch file on startup folder. When your friend will start computer, batch file will execute automatically.

Do Chat Using Command Prompt On Network

Follow these steps:

Download this text file.
 Open it and save it as chat.bat
Now open that batch file. It will ask for User IP.You have to enter the IP of the user you want to chat, then type Message. Press enter AND start chatting.

How To Protect In Cafe / Public Computers While Surfing Internet?

People who surf internet on cafe/public computers, are more vulnerable to be hacked, reason is simple! They are unaware from the software installed on public computers, their privileges. It's always secure to access internet from your personal computers, but some times you have to access it from other places like cafe, your friend computer. So what if you wanna to secure yourself from these hacks? Two things you must keep in mind while surfing from pubic computers:

1. Always prefer to private browsing. Mostly people are unaware from this wonderful feature of browsers. So what is private browsing and how to enable it?
  • Private Browsing allows you to browse the Internet without saving any information about which sites and pages you’ve visited, private browsing do not save Visited pages, History, Passwords, Cookies and Cache files.
  • For enabling it, press Ctrl+Shift+P for firefox and IE users (For chrome use shortcut Ctrl+Shift+N or check my other post Incognito Window In Google Chrome For Safe Browsing), a prompting window will ask you for starting private browsing.
2. Use On-Screen Keyboard. What to do if you think there is suspicious keylogger installed on system. Don't take risk, use on-screen keyboard. Keyloggers captures information from normal keyboard only. So whenever you do login on your personal internet banking accounts or else, always prefer to use virtual keyboard. You can open it by typing OSK in run.

Gmail Plus (+) Trick

Today I'm going to tell you about one more Gmail trick, Gmail Plus trick. In my previous post, I explained about Gmail Dot trick.

This trick will show you how to use mutiple Gmails for one account. Like you have id exmaple@gmail.com, you can use it as multiple Gmals. I will explain you how!!

Give your id as example+hack@gmail.com to your friend for sending any document. When your friend will send mail to this address, it will come to your inbox (example@gmail.com). Reason behind it is that Gmail ignores everything which comes after +. Like in Gmail dot trick , dot have no meaning. You can try any ID like example+any@gmail.com, example+abc@gmail.com, Google will send it to example@gmail.com. Now where you can take benefit of it?
 
 

You can easily check who is sending spams to your email.  If you have to register to any site with your email exmaple@gmail.com, then register with example+hiaac@gmail.com. If you receive spam with this email, then you can easily find from where the spam mails are coming. In the same way you can register with multiple ids for multiple sites.

Gmail (Bug) Dot Trick

We know Gmail is a free email service offered by Google. This Gmail Dot Trick is a cool Bug deals with username and a Dot ( . ) but its not a trick to hack the gmail account . Here all we need is a Gmail account with long username so that combinations can generated more.

Let the username and Password be:

Username: harwinder@gmail.com
Password: hellohello

Instead of using Gmail account with actual username and password it is possible to login like this

#Username: harwin.der@gmail.com
#Password: hellohello

#Username: har.winder@gmail.com
#Password: hellohello

#Username: har.win.der@gmail.com
#Password: hellohello

How To Remotely Log Out Facebook From All Other Computer / Devices?

Sometimes users do login from any unfamiliar computer/cyber cafe & forget to log out or any computer failure occurs. You must not bother about it as you can log out from all other computers without using that computer again. Follow these steps:
  • Login to your facebook.
  • Go to Account> Account Setting> Under Setting tab> Account Security. There you will see something as shown below only if your facebook account is opened from other location otherwise you will see only recent login information.
* Click on end activity will log out from all other computers.

Add More Security To Your Google Account Using 2-Step Verification

Hi friends!! Today I'm telling about how you can add more security to your Google account using 2-step verification. 2-step verification is the best way for securing your Google account even if your password is stolen. You can't login to your account unless you have the verification code. Using it, you have to required both password & verification code (Receive on your mobile via SMS) for accessing your Gmail, Orkut services. You must be aware about security provided by Google.

    * Login to your Google account.
    * Open this link https://www.google.com/accounts/SmsAuthConfig
    * Click on Start setup


*Now Set up your phone: Choose appropriate option (me chose Text message (SMS) or      voice call under Landline or mobile phone).


  • Choose your country & Enter your mobile number.
  • Choose the option Send codes by: SMS text message or Voice call (I prefer to SMS text message).
  • Click on Send code under Let's the test phone.
  • You will receive a code via text if you chose SMS text message.
  • Enter code in next field & click on Verify.
  • Click on Next.
Your phone is now configured to receive verification codes. Now make backup in the case if you lost your phone or is unavailable.
  • Click on Next.
  • Print Backup verification codes or save it.
  • emember: Each backup verification code can be use only once for verification & keep these codes secret. Read the warning under backup verification codes carefully.
  • Check Yes, I have a copy of my backup verification codes & click on Next.
  • Now add another phone number that belongs to you or a trusted friend or family member.
  • Follow the steps as described above for sending code & optional testing.
  • Click on Next.
  • Click on Turn on 2-step verification
  • That's all.
When you will sign in to your Google account using user id & password, it will ask for verification code send to your phone. You must require verification code for accessing your account.
 

 


If you didn't receive code, then you can use another ways for getting verification code as shown below.



Download Ankit Fadia's Hacking Books

Download the collection of famous Ankit Fadia's hacking books.

http://www.ziddu.com/download/13867860/ANKITFADIA.rar.html