Showing posts with label Hacking. Show all posts

Hack Facebook Account With Keylogger

Shaja786
Hello Friends, in my previous post i have explained 4 ways to hack Facebook accountpassword, where i have discussed the second best method to hack Facebook password is using Keyloggers. Today i will explain you how to hack Facebook password usingkeylogger.

Today i will explain you in detail with snapshots how to create your Facebook hackerkeylogger, its a 100% Fully undetectable keylogger you can check this file using Virus total.  Its a 100% FUD remote keylogger with several advanced features.
Today i will disclose you how i hacked 19000+ accounts, its so easy that anyone can do it. On my website you will never get any infected tool. If you have any doubt or feel something suspicious always test the link or file with virus total website before downloading. Never believe any website including mine also, always scan download links with virus total website or any such website before downloading it. Download it only when it does not have any virus.

Hack Facebook password using Keylogger Involves following steps:
1.  Create your Server that will hack passwords.
2. Extract the Icons from any software
3. Bind the Keylogger to make it Hidden
4. Spread your keylogger to victims

Note: This tutorial is for Educational Purposes only. I and Hackingloops is not responsible for any misuse of knowledge.

Let's start Facebook hacking tutorial in detail :

STEP1 : Create Server for Hacking Passwords
First of all for hacking any facebook account password, we have to create ourkeylogger server that will run on victims machine or PC and capture his keystrokes and mail us on the email account that we will use to build the keylogger. The keylogger server building process consists of several steps.
The steps involved are mentioned below in detail:
1. First of all download the Keylogger.
Download Keylogger from here: CLICK HERE TO DOWNLOAD 

DOWNLOAD BINDER HERE: CLICK HERE TO DOWNLOAD BINDER
2. Extract the RAR file. Now you will get one Folder and three files as shown in below snapshot:::::::::::


 3. Now open the Keylogger file. Here you will need gmail ID and password. For safer use create a fake Gmail account and use it here as shown below:



4. Now Click on server settings as shown. Here enter the time after which you want to receive reports, its always preferable to use 20 min timer for receiving files.  And Click on Output box to choose location of file and give it any name. Its always recommended to use system process name to make it undetectable like svchost or check any process name from your task manager and name it. Other fields are optional. The complete snapshot is shown below:.........



5. Now Click on Log and Result Setting. In Log EMail Title enter the subject of email like Mykeylogger report or simply my report or something else that you like. Also Click the last two options that i.e add Computer name and add victim name. The snapshot is shown below:


6. Now Click on Other Options.  In this section you just have to do one thing. Most hackers prefer warning message POP up but I love keylogger using any message. So unclick message button. Because when you bind it with any other software then it should not any warning messages otherwise it will be detectable.

7. Now at last click on Build Keylogger. Now after you click on it you will see your keyloggerfile at location that you have chosen in 4th step. Now this keylogger server file will be used to bind with any other software in Binding Step.

8. Now you keylogger server is ready that you will use to hack Facebook accounts. That's all for the server creation step now move to second main step.


Step 2.: Extracting the Icon file from any installer(resource hacker)
1. Open the Resource hacker folder and open the reshacker file.
2. Now go to its menu and open any setup file. Suppose we want to attach our keylogger to Ccleaner setup file. So open the Ccleaner setup with resource hacker. 
3. Now in menu there is one action button click on it and then click save all resources.



4. Now save all the resources to desktop or any other location of your choice.
5. It consists of two files one is icon file and other is res file . We only need icon file, so you can delete the other file i.e res file.
6. Now we have Icon of installer file(as discussed above Ccleaner setup Icon).



Step 3: Bind the Keylogger server with any software
1. Now Go to keylogger folder and open the Binder.
2. Now Click on + button given below to add files.
3. Now add the keylogger server and the set up of software (i.e. in our case it's Ccleaner setup).
4. Now in menu of Binder, Go to Settings. There select the icon that we have generated in the previous step and set the location of output file as shown in figure.


5. Now again go to File's menu in Binder and click on Bind files.
6. Now your Binded keylogger is ready. Now you have to spread it or send it to the victim that is your friend.



Step4 : How to Spread Keylogger or send it to victim or friend
1. Now you have one Software setup file with keylogger attached with it.(In our case we have Ccleaner setup with keylogger attached with it.
2. Now Spread your keylogger through forums. You might be a member of various forums use them to spread your keylogger in form of software posts. You can use various software's to spread them that users frequently download.
3. Spread it through pendrives or USB hard drives. Suppose a friend asked you for a software give it the software that has keylogger attached with it. 
Note: you can also attach keylogger with images also. But that can be detectable by antivirus. So avoid such type of hacking.
So isn't that so easy to hack anyone's Facebook account in just few minutes. 

How to protect yourself from these hacks?
Prevention is always better than cure so always follow these steps:
1. Don't use cracked softwares and don't download them from unauthorized websites.
2. Always keep your antivirus and anti-spyware up to date.
3. Always scan the files before transferring them to your USB.
4. Do not allow other users to use your PC i.e password protect it.

Note: Hacking Email accounts is illegal. This post is just to aware you how easy is to hackFacebook and email accounts. So that you cannot fall into the traps of hackers............

Shaja786.blogspot.com





Read more

Hack Wifi Pasword Easily With BackTrack

A very good tutorial by my friend Solitary Man on Wep Cracking. He has used the tool "fern-wifi-cracker" which is easily avaliable on backtrack 5 R3.
Read more

Hack Any Trail Software And Use As Rigisterd Version

Shaja786.....
Hi, I am back today with a most usefull article..Hope all of you will Like It ! Here i will show you that "How to Hack Softwares to use them Forever ?" . That really a useful article,because in our daily life we need thousand of softwares today,which of most are highly paid..So how to use them Freely for whole Like ??

Most of us are familiar with many softwares that run only for a specified period of time in the trial mode.Once the trial period is expired these softwares stop functioning and demand for a purchase.But there is a way to run the softwares and make them function beyond the trial period. Isn’t this interestings?

Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares.I’ll try to explain this in brief.Because Purpose if ICA is 1st to clear your basics.So,When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc.After installation every time you run the software, it compares the current system date and time with the installed date and time.So, with this it can make out whether the trial period is expired or not.......

So with this being the case, just manually changing the system date to an earlier date will not solve the problem.For this purpose there is a small Tool known as RunAsDate...

RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.,,,,,,



Intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify.It works with Windows 2000, XP, 2003 and Vista.

NOTE: FOLLOW THESE TIPS CAREFULLY
You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.
1. Note down the date and time, when you install the software for the first time.
2. Once the trial period expires, you must always run the software using RunAsDate .
3. After the trial period is expired, do not run the software(program) directly.If you run the software directly even once, this hack may no longer work.
4. It is better and safe to inject the date of the last day in the trial period.

For example, if the trial period expires on oct 1 2009, always inject the date as sep 30 2009 in the RunAsDate.

Warning : AVG Antivirus reports that RunAsDate is infected with "Trojan horse Generic 10.Thk". This will not harm ur pc,warning is just bcoz this is a wondow registry hack tool !!!!!

Shaja786.blogspot.com



Read more

How To Use KeyLoggers Full Totorial

Hello, In my last  article "What are Keyloggers ( A Hacking Tool )". I explain all basic info about Key-loggers. Hope You read that article befor this one. Because there i have explian


its meaning and working.
Read more

Back ! Track Use Full Comands

Shaja786.blogspot.com.....
Hi Guys,Now A Days I Was Planning To Write Some Tutorial On Backtrack But Then I Think Of Newbies It Will Be Difficuilt For Them To
Get What’s Going.So, In This Post I Will Be Telling You About Backtrack Basic Commands.
I Have Divided Them Into Some Categories I Suggest You To Learn Them Because They Are Very UseFul If You Have Any Problem Just Leave A Comment We Will Help You Soon.....


File Operations
pwd                  Print Name Of Current/Working Directory
cd                     Changing The Working Directory
cp                     Copy Files Or Directory
rm                    Remove Files And Directory
ls                       List Of Directory Contents
mkdir                 Make Directory
cat                    Concatenate Files And Print On Standard Output
mv                    Move Files
chmod              Change Files Permissions

Know Your System
uname            Print System Information
who                Show Who Is Logged On
cal                    Displays Calculator
date                 Print System Date And Time
df                      Report File System Disk Space Usage
du                     Estimate File Space Usage
ps                     Displays Information Of Current Active Processes
kill                    Allows To Kills Process
clear                Clear The Terminal Screen
cat /proc/           cpuinfo Display CPU Information
cat /proc/meminfo                 Display Memory Information

Compression
tar                     To Store And Extract Files From An Archive File Known As Tar File
gzip                  Compress Or Decompress Named Files

Network
ifconfig            To Config Network Interface
ping                  Check The Other System Are Reachable From The Host System
wget                 Download Files From Network
ssh                    Remote Login Program
ftp                     Download/Upload Files From/To Remote System
last                   Displays List Of Last Logged In User
telnet                Used To Communicate With Another Host Using THe Telnet Protocol

Searching Files
grep                 Search Files(s) For Specific Text
find                  Search For Files In A Directory Hierarchy
locate              Find Files By Name

Hope You Like It.Give Your Valuable Feedback At Comments....



Read more

Ghost Facebook Prank Hacking

Shaja786.blogspot.com...
Facebook is worlds popular social networking site.It is that success because most of them use Facebook for chatting with friends,sharing pictures,videos and some other information.And there are many Facebook tricks available to make use of Facebook effectively.Now here in this post i will let you a PRANK that makes your friends scary.
Note: Don't try this prank on Heart patients and kids.


Ghost Facebook Prank:

Just click here to go to GHOST PROFILE
As soon as click above link then you are directed to ghost profile
Just wait for few seconds then you will see that suddenly a ghost arrises  from center of Facebook just like below
Now just copy the link and send to your friends

I used this tricks on my friends and many of friends are so scarred  especially girls are shouting when they watched this prank and scared a lot.................

NOTE :: THIS IS ONLY FOR EDJUCTIONAL PARPOSE ONLY




Read more

Hack Facebook Account Easily With Pishing

Shaja786.blogspot.com......
You Ready Guys?????
ok?
Go :)

Step 1: The First Step in Making the site is to regester an account at http://www.000webhost.com (if you have account than you can skip first 2 steps)
Read more

Hack Gmail Account Easily

Shaja786.blogspot.com.....
As i always start my tutorial with brief introduction about the topic, so let's discuss  what actually is phishing.
What is Phishing????
Phishing in normal words is a word derived from the word fishing. As in fishing we make a trap for the fish to get caught similarly in case of Phishing we make a trap to hack the user password. Phish basically means fake, things that are deviating from original product. Technically Phishing is a technique to hack victims account password using the phish or fake pages. In phishing we sent the fake page links to the victim in spoofed manner so that we will not able to recognize that the page is real or fake. Now when victim enters his credentials in the fake page two different process occurs simultaneously. First it writes a log file having username and password and second process redirects the user to the original website page with username entered and displaying password is incorrect.........
How to recognize Phish Pages????
There are two ways to recognize the Phish pages and both depends on the awareness of the user. There are some other ways also to protect yourself from Phishing but as we Prevention is better that cure. If you know how its done then surely you will also know what are its loopholes and how can we detect it.
Ways to recognize Phish Page:
1. Check the Address bar, if the URL you are visiting does not match with the original website link then its a fake page.

2. If you are a great coder or understands HTML well then you can easily revert back the attack and check the hackers hacked log file. But if you by mistake entered your own details it cannot be deleted. For this you need to use IDM and run the website grabber. There in log file you can see all details of the accounts that hacker has hacked.

What's new features in this Gmail phisher?
Since its a new phisher so friends there should be something new in it. Isn't it. Yups, what do you think i have added in this phisher.
I have added few awesome features in this phisher and list is below:

1. Incorrect password shown page bug removed
Previously what happens when user login using phisher it redirects to the original page and displays password is incorrect. But now it doesn't show that but even do more smarter thing... As for phishingaccount we have to sent the email to victim, and now if victim has read the mail that means he is already login so what i have done i have utilized the cookie hack and result is guess what, when victim login using fake page he login's in to his own original account without even showing any message or anything. Technically its called Tabnabbing another name of advanced Phishing.

2. Log File Contains more additional Information
I am sure you will love this information what more log file contains. Previously it only contains the username and password. Now log file contains all the cookie details along with IP address of the victim. And now why it becomes more significant. Previously what happens some good people means people that know phishing technique login's through the Phish page but enters the wrong credentials and use some abusive words in login. Now when they type that also i will get their magic cookie
or simply called session cookie and IP address that i can use to hack their PC and account.


Steps to Hack Gmail Account Password Online:
1. Download the Gmail Phisher.

2. Extract the rar file

and now you will get three files namely:
·         Index.html ( create ur own phish page )
·         Isoftdl_log.txt
·         next.php

3. Now go to free webhosting sites and register a new account on it.

4. After registering Go to File Manager on the website and Create a new directory name it as Gmail of whatever you want.

5. Now double Click on the directory to open it and click on Upload. Now browse the three different files one by one from three upload boxes and click on upload.

6. Now Open the gmail.php or gmail.html page and you will see your fake page which looks absolutely similar to Gmail original page. Below is the Snapshot of Fake Gmail Page:::::::::::::::::


7. You can directly send the above URL  to the victim but its quite detectable. So we need to spoof it. So that become little bit difficult for victim to recognize it. For that visit tk domain maker website.

8. Now Send the Spoofed link in the mail to the victim as i have explained in the Post .

9. Now when user login using the fake page the data in log file is written which will look like below:::::


10. That's all friends now you have the user name password of the victim..........

By Shaja786.blogspot.com

NOTE::::: This is only for eductional parpose only



Read more