Tampilkan postingan dengan label Gmail Hacks. Tampilkan semua postingan
Tampilkan postingan dengan label Gmail Hacks. Tampilkan semua postingan

Minggu, 06 Juli 2014

Any Keylogger for Mac OS X


Any Keylogger for Mac OS X, as one of simple but effective keylogger for Mac OS X, can log all activities on Mac and able to send the logs to email address to help you remotely master your computer's activities. 

Any Keylogger for Mac has 6 major feature which is basic but enough to monitor your Mac's activities.
Besides, Any Keylogger for Mac run stealthily on the background of the Mac so that other people who can access the computer can't randomly change the settings of the software or even close the software.

With simple interface and effective monitoring features, Any Keylogger for Mac has won a number of Mac users and awards. Any Keylogger for Mac is a good solution to Mac activity monitoring.

Any Keylogger is also available for Windows :- Click here

Download AnyKeylogger for Mac:-

Some Key Features:-



 Visit AnyKeylogger For Mac:-
Read more

Senin, 17 September 2012

Easy Tutorial [ Hack Email Account Using Google]

Hi friends ,  And in this article I will tell you how to hack email accounts using google. This is a simple trick and easiest trick to get free accounts or dummy accounts. For example, you want to create a facebook account and you don't have much time then you can try this.........


Follow the steps:-

STEP 1. Go to google…

STEP 2. Now these are the dorks through which we will found the emails and hashes…Google Dorks..
Code: ext:sql intext:@hotmail.com intext:e10adc3949ba59abbe56e057f20f883e
Code: ext:sql intext:”INSERT INTO” intext:@hotmail.com intext:password
Code: ext:sql intext:@hotmail.com intext:password
 

STEP 3. Now take any one of the dork and paste it on the google and press search…
[see the screen shot below go to any link and now press ctrl+f to search the keywords like [@gmail.com,@hotmail.com,@yahoo.com]…

[Image: 81283776.jpg]

You will get a list of emails and ther respective md5…

STEP 4. Now goto any online md5 decrypter like this http://www.md5decrypter.co.uk/ & paste the hash into it nd see below if it got decrypted and copy the password…


As these files are dumped because emails are outdated so u may not get the working emails because 60% of emails are deleted or there pasword may be change so try and try many emails until you get a perfect login…

STEP 5. So through this you can hack dozens of emails at once if u get a recently dumped database i will suggest you to add some more keywords in the dork like… 2011 hashes… 2010 emails… So u may get a recent hash…

 Enjoy!!!!!!!!!!!
Read more

Rabu, 12 September 2012

How to Know Someones Facebook Email ? Hacking Facebook Yahoo Hotmail 2012


Hello Everyone! I have updated many Tips on hacks and stealing friends Email & password So, Today i am going to make another article on stealing your facebook friend's email. Usually Some friends use to hide their Emails from their facebook information, because of the Phishing and Hacking Privacy. But Now i will tell you some of the steps to find their email, of facebook account. This method would be only done if your account is on Yahoo for
example :- account@yahoo.com So, lets start the ways to get your friend's emails secretly and securely! On the whole world wide web, Yahoo only provides this service to import contacts from facebook, so this will only done on yahoo account, rest of the others can make another account on yahoo and then could signup to facebook for finding the emails. So, Now from this you can find their information. Or you can hack by emails.

How To Get Your Facebook Friend's Email?

1) Login To your Yahoo Mail account.


                                         

2) Goto contacts option.

3) Now their select tools and then you will see there is an option of import on yahoo toolbar.


                              

4) Now goto your facebook account login and hit Facebook here on yahoo, Now they will ask you on facebook to import contacts, allow them.

5) After Five minutes they will import all the contacts and emails of your facebook friends they could be 10-1000, depends on your friends list.

6) Now Yahoo has successfully imports your contacts, Goto Your Yahoo Contacts list there you will see all friends email with details.

 So, I have teach you the steps to get emails of your facebook friends EnJoY!!!!
Read more

Minggu, 19 Agustus 2012

Create your own Cookie-logger to hack any account


Well, many of us are aware about phishing and many other different ways of hacking. Here, i am posting an interesting way to hack any. This is basically to aware you people so that you can save your account.

What do you mean by Cookies?

Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password.
If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Google, Yahoo, Orkut, Facebook, Flickr etc.

What is a Cookie-logger?

A Cookie-logger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim.
Today i will show how to create your own cookie logger.
Hope you will enjoy reading this article.

Step 1:

Download the notepad file from the link provided below.


Now open the Downloaded Notepad file and change“http://www.hackers-store.blogspot.com” to your site.
And save it as fun.gif.

Step 2:

Download the Cookielogger.php Script File from the link below

Step 3:

Create a new Notepad File and Save it as logfile.txt

Step 4:

Now Upload all these three files to Your server .(i.e Your PHP Hosting Website ).

cookielogger.php -> http://www.yoursite.com/cookielogger.php

logfile.txt -> http://www.yoursite.com/logfile.txt

fun.gif -> http://www.yoursite.com/fun.gif

If you don’t own any website then you can follow the link below to create your own website for free which has php support.
www.000webhost.com/

Step 5:

Okk Now Your Cookie Stealing Website is ready.

Now Go to the victim forum and insert this code in the signature or a post :

[url=http://www.yoursite.com/fun.gif][img]http://yoursite.com/fun.jpg[/img][/url]

Step 6:

When the victim opens the post, he can see the image but when he clicks on the image he gets Temporary error and you will immediately get his cookie in you logfile.txt.

The Cookie would Look as Follows:
phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0
%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D; phpbb2mysql_sid=3ed7bdcb4e9e41737ed6eb41c43a4ec9

Step 7:

To get the access to the Victim’s Account you need to replace your cookies with the Victim’s Cookie. Use COOKIE EDITOR for this. The string before “=” is the name of the cookie and the string after “=” is its value.

So Change the values of the cookies in the cookie Editor.

Step 8:

Now for the same purpose you will need a firefox addon named

Step 9:

ITS DONE..!

now go to the website or account you have just hacked ( i mean you have steal cookies) and You will find that you are logged in as the Victim and now you can change the victim’s account information.

Step 10:

GAME OVER

Note :Make Sure that Victim should be Online because you are actually Hijacking the Victim’s Session ( Also known as Session Highjacking) So if the Victim clicks on Logout you will also Logout automatically but once you have changed the password then you can again login with the new password and the victim would not be able to login.

Disclaimer:I don’t take Responsibility for what you do with this script, served for Educational purpose only.
Read more

Jumat, 17 Agustus 2012

USB Hacking : Turn Any USB Into A Keylogger (Hacking Software)

Unlimited amount of keylogs over a billion can be stored using this undetectable and portable keylogger. The storage of logs and information is in the form of (FAT) file system. This keylogger works with any sort of computer and keyboard that you may have: Dell, Hp, or PS/2 or USB. 

  • Fast File and Info transfer, up to 148kB/s
  • Invisible/Undetectable
  • No Processing Power
  • Portable
  • No installation Required 
  • Can't be manually erased

Instructions :-


STEP 1:Plug your USB flash drive into your computer. As a precaution, make sure that information stored on your USB drive is backed up.


STEP 2: Download your keylogger software. Keep in mind that you usually must purchase a registration key to do this. The more registration keys you purchase, the more of discounted price you receive. When prompted whether to run or save file, choose Save File and select your USB device’s location.

STEP 3
Save, and safely remove you USB drive and plug into the computer you’d like to install the program on

STEP 4Launch your keylogger software.

STEP 5:Enter your registration key. 

STEP 6:Next you will be prompted to choose the type of installation. You will have three choices: Visible mode installation, Invisible mode installation, and Logs viewer installation. You can also do a custom installation where you pick and choose the components you’d like to install. Your keylogger software should now up and running! You do not need to hide the keylogger program. It is automatically hidden and no action on your part is required to hide it.

STEP 7: Next let’s learn how to view logs. Go to the Start Menu and select Run.

STEP 8Type the phrase, unhide. You do not need to press Enter or select OK. Most keyloggers automatically track the sequence and will be unhidden automatically if the keyword is typed. The Log Viewer window will then pop up.

STEP 9Go to the Logs tab and select the dates you would like to view in the calendar.

STEP 10Press View logs for (Day/Month) and the log will begin to generate.

STEP 11:There are several customizations you can make with keyloggers. Go to the Options Tab in the main menu to browse and select them.

STEP 12:After you unhide the software, and get to the user interface of your keylogger, you just need to close it to hide it again.

STEP 13:Unplug you USB flash drive and repeat as many times as necessary.


Note: Be careful with which keylogger you decide to use, many keyloggers claiming to be “free” have viruses and Trojans attached to them that can be extremely harmful to your computer.

Download Keylogger From Here

    Read more

    Kamis, 16 Agustus 2012

    iStealer 6.3 Legends : Hack Facebook, Twitter Password "TUTORIALS"


    Istealer is an efficient windows password stealer software used for hacking various email account password such paypal password hacking, facebook password hacking etc. I have already explained about RATs and keyloggers to hack email account passwords, where you have to send your keylogged file to victim. In the same way, Istealer can be used to hack email account password and find passwords of various emails. I have provided link for software download. Using Istealer you can easily hack or steal the password of Twitter account, Facebook Account, Gmail Account, Hotmail Account, Yahoo Accounts and many other account password easily.
    Basically, in this trick you create server file which is used to capture the keystrokes of your slave, after creating server file you have to send that file to slave and use a bit of social engineering to get them to click on the server file and run the server file. Once the server file is run, it will start his working like capturing keystrokes etc.



    Istealer Password stealer - hack email passwords:

    1. Free Download Istealer password stealer software to hack email account password.


    2. Unzip the downloaded windows password stealer using Winzix or Winrar to obtain Istealer.

    3. Go to a free webhosting service like 000webhost and sign up for free account. After creating free ftp server account, enable FTP Access and create a new folder named "Istealer" at your FTP.


    [Image: 49442116.jpg]


    Here we are signing up for our free webhost for iStealer.

    When we go to Sign Up page,we will get this page.Follow as I explained on the picture.


    [Image: 66303407.jpg]

    At end press Create My Account


    Making a MySQL Database

    So,when we maked a free webhost,we will make a MySQL Database.
    When you register to 000Webhost,wait 1 minute.Then go to Control Panel of your domain.
    Now,scroll down and go to MySQL under » Software / Services.


    [Image: lol4w.png]

    Follow all as it on picture.
    [Image: lol1u.png]

    4. Run the iStealer6.3Legends.exe file present in iStealer6.3 folder to get something like:




    5. Now, simply fill the following in Istealer: Url:yourdomainname.com/index.php

    You can bind Istealer to any other file by checking "Bind with another file" and giving file path to bind with. Also, you can use Icon Change to change Istealer file icon. This step is optional but, necessary for hiding password stealer from victim's eyes. You can bind password stealer file with fake error message as I have explained in "Fake Error Message generator" to make it look real.

    To check whether you have entered right ftp server information, hit "Test Url" and if you have done it right, you will get message "Works perfect!". If it says "Logger not found, check the Url", you have entered something wrong... just check it again.

    When you've done all above steps, simply hit on "Build" and save the password stealer file as you want.

    You can also use Crypter to avoid antivirus detection.

    CONGRATS ! Your server is now ready !! Now, simply send this password stealer file to victim and make him run this windows password stealer file on his computer(Social Engineering). After he runs our sent password stealer file on his computer, you will get all passwords and records saved on his computer at your FTP server. That's it. Thus, you can hack email account password using Istealer- the windows password stealer software.

    Remember to crypt this windows Password stealer to make it undetectable by antivirus. If you have any problem in using this Istealer password stealer software to hack email account password, please mention it in comments. 

    Enjoy Istealer to hack email account password...
    Read more

    Rabu, 15 Agustus 2012

    How to protect email account getting hacked

    "My Email account is hacked" or " Some hacker has hacked my email account", did these quotes sound familiar to you Guys, if not then soon gonna be if you are not aware of latest techniques used by hackers to hack into your email accounts. After reading such comments there are two things that always come to my mind, either hacking email account is to easy for hackers or protecting email account for getting hacked is too difficult. And after thinking about both above points, i starts laughing because both are true for Hackers and both are false for unaware users.
    Note: If a Hacker wants to hack you Email or system, he will hack it. The only thing you can do is, just make it harder for him to do the same.

    Friends, after spending my precious 5 years in field of Hacking and Cyber security, i reached a very simple conclusion. Email accounts can only be hacked by means of Social Engineering technique, and whoever says that he can hack email account using some other technique then friends he is a liar.

    Now what all topics are covered in Social Engineering Technique:

    1. Phishing or fake page login technique.
    2. Spreading Keyloggers in form of cracks, keygens, or hack tools(RAT's , keyloggers, etc).
    3. Shouldering passwords.
    4. Guessing Weak Passwords.
    5. Compromising Accounts with Friends or team mates
    6. Using Accounts from Cyber cafe's or other insecure places like friends PC or college PC's.

    So friends let's start from one by one, how you all can protect yourself from hackers.

    1. Phishing or Fake Pages Login Technique

    In this technique, what hacker does is that, he makes a local(fake) copy of original website which looks absolutely similar to original one and attaches his PHP action scripts to record the passwords and then uploads that local copy to some free web hosting server. After uploading, he shares the links with friends or victims by three different ways:
    a. By Sending Emails : Emails can be spoofed and looks like they are coming from genuine sources like Gmail Support or Yahoo Support etc or Simply from your most trusted friends.
    Now which type of emails you should not open:
    1. Emails asking for account verification:  These emails ask for you email account username or passwords to verify your details.
    2. Emails showing Prize Money or lotteries: Nowadays, we all receive a lot of email messages like "You have Won Prize Money or Lottery of so and so amount. These emails usually ask your name, age occupation, mobile number, sometimes credit card details. And when you provide all these information they ask you to verify your Mobile number. They usually say you will receive one unique verification code on your mobile and ask you to enter that verification code in some unknown website.  Note: This is mobile phone verification  loophole of all Email services. They all sent verification in below format: " Your Google Verification Code is 123456 or Your Yahoo verification code is 123456 or Your Hotmail verification code is 123456". Means these services doesn't mention that "your Gmail or Yahoo or Hotmail password reset code is 123456" so user is easily get fooled by such offers and become the prey to hackers.
    3. Emails from unsolicited or unknown sources: Never open the emails which comes from unknown sources.
    4. Never access any social networking website link from your email as it can be a Phish Page link.

    Some useful and handy guidelines to identify Phish Pages:
    1. Always check the URL in the address bar ( both source and destination). Never login in the URL which has website URL other than the original one.
    2. Most important: Always use web security toolbar(avg,avira or crawler etc), most of them are available for free. They will detect the fake pages and warn you from opening them.

    b. Using Chat services
    Never open the links that are being posted in chat rooms, there are lots of Ajax and java scripts available in market that can retrieve all your stored passwords from your web browser.

    c. Sharing Content on some website and that website is asking for registration with is followed by email verification. Hackers share their links on famous forums or torrents, when user open these link either of the above two things happen or a key logger or RAT is attached with them that will record you email address and password and send the information to hackers email account or FTP mail.

    2. Spreading Keyloggers in form of cracks, keygens, or hack tools(RAT's , keyloggers, etc).

    This is the most used hacking technique used by almost every hacker to hack the users email accounts. In this technique, hackers attach their keylogger or RAT servers with the crack or keygen or patch or hack tools and whenever user executes that it got installed automatically. 
    In this case hackers use the below loophole: Whenever you open a keygen or patch or crack or hack tool, your antivirus shows you are warning message but users always ignore these as hackers or cracks provider has already instructed the users that turn off the antivirus before running patch or keygen.

    So friends 4 things to note here:
    a. Never use cracked or patched software's as they already contains Trojan's which are controlled on basis of timestamp. 
    Solution: Look for any freeware providing the same features. If you request i will give you the list for freeware alternatives for all paid software's.
    b. Never turn off your antiviruses or anti-spywares or web security toolbar.
    c. Regularly update your antivirus and anti spyware programs.
    d. If you wanna try any hacking software or hack tool, then always use sandbox browser or use Deep Freeze

    3. Shouldering passwords

    Seeing or watching the user, while he/she is typing his password is called shouldering. Most of time we types our passwords in front of our friends or colleagues. Nowadays what usually friends or classmates do is that, they stand in back of you and keep a eye on you while you are typing passwords. This technique is also used at ATM machines, thieves or malicious people watch people while they were entering the ATM pin and then misuse that online.
    Solution: Always take care that nobody is watching you while you are typing passwords. If not possible to do so try to avoid logging into your accounts when your friends are near you.
    Note: Never store passwords in your web browsers. Otherwise, friends like me ask you to bring water for me and when you go out, i will see you all saved passwords :P..

    4. Guessing Weak Passwords

    Its not a new thing, i have told people more than hundreds of time not to use weak or very common passwords but they will never learn. Few basic passwords that unaware or novice IT people use:
    a. 6 to 8 consecutive character on the keyboard or alphabets like qwerty, 1234567, abcdefgh etc.
    b. Atleast 30% of people keep their current or previous mobile numbers as their passwords.
    c. More than 10% keep their girlfriend name or her mobile number as password.
    d. But nowadays password policy are quite good, so novice people also became smart as most of websites ask atleast one Capital letter, one number and one special character in password. Now friends, guess what will be their passwords:
    1. Suppose its december then their password will be like: Dec@2011 or Dec123! or Dec2011@.
    2. How can they forget keyboards consequite keys like qwert123!, qwerty123$, abc123! etc.
    3. Offcourse, none can forget his girlfriend name : girlfrindfirstname123! or more smart people GFNAME1!.
    Hahaha.... thats really foolish.

    Some tips for strong passwords:
    1. Always keep your password atleast 8 chars long.
    2. Use special characters and number and small n upper case combination in your password.
    3. Verify your mobile numbers if available.
    4. Keep changing your passwords at-least once a month.

    5. Compromising Accounts with Friends or team mates

    Its one of the most common problem with team mates and friends. "Today i am not coming to office or college, please use my login ID and password and forward the details or some files" or "Your friend went to your home and suppose you are away from your house, now what you will do, hey use my username and password and take your files or documents". What the hell is this? You call yourself professional, and every time you yourself violating the password and account policy norms.
    Never share your account information with anyone. People like me are very dangerous, if you share your pass with me then you are done :P..
    Solution: Never tell your account information to anyone. If its urgent, you can share it but you need to change your details as soon as possible.

    6. Using Accounts from Cyber cafe's or other insecure places like friends PC or college PC's. 

    Most of cyber cafe's or college computers have keyloggers or rats installed on them. Whenever you login into your account through cybercafe, none can give you assurance that your account is safe or hacked. So always play it safe. If you login into your account through cyber cafe's, always change them as soon as possible. 

    Now friends, if you follow all the above steps told by me, then your account can never be hacked and for sure you will never get a chance to say "My EMail account is hacked" or "Someone has hacked my email".

    Read more

    Selasa, 14 Agustus 2012

    Gmail Hacker | Fake Tool to Hack Gmail Accounts

    Hey friends, today i am going to disclose some irony stuff that Hackers nowadays using to make people fool these days. Hackers are spreading a software tool named as Gmail Hacker v1.0 on the internet with title " Hack Gmail Accounts using Gmail Hacker" or "Gmail Hacker : A superb Gmail Account Hacking tool". But beware of such articles because its nothing more than a smart keylogger which is actually intended to hack users credentials that user gonna use to hack somebody's gmail account. Let us discuss the process in detail:

    First of all frankly speaking, Gmail Hacker is a hacking tool( or i better call it social engineering hacking tool) which can be used in either way like Hacking someone's Gmail account and at same time loosing your Gmail Account( if not handled with extreme care). So friends which process you all wanna learn first. Hacking one or getting Hacked one.. or both at same time going step by step :P.

    For Having a trail of Gmail Hacker tool you gonna need below stuff:

    Now lets go step by step for the Hacking procedure:

    Step 1 - Extract the arhive named Gmail.rar on your computer, Once you have extracted you will see the following file:
    Builder.exe

    Step 2 - On opening Gmail hacker builder.exe you will see the following:
    Step 3 - Next you need to enter your gmail address where you would receive logs. However I would recommend you to create a fake email address and use it for receiving logs. 

    Step 4 - Once you have entered your credentials, click on the build button.

    Step 5 - A file named gmailhacker.exe would be created, On executing the file, the victim will see the following:

    Now you need to apply your social engineering skills in order to make the victim enter his/her credentials on to the software. The simplest way of accomplishing this is to tell the victim that the application Gmailhacker.exe is itself a gmail hacking software, You just need to the victim's username, your own gmail ID and your own gmail password, where you would receive victims passwords and click "Hack Them".

    Step 6 - Once the victim clicks on the "Hack Them" button, his own gmail credentials that he entered would be sent to you on the email you typed while configuring the software.

    Well, here is an interesting part, when the victim will click on the button "Hack them", he will receive the following error, making him thinking that their is a problem with the software:


    Now i hope you all understood which part you need to provide credentials and which part you need to provide the fake account credentials that you have recently created.

    Irony Part : The file that is being generated by builder.exe i.e. Gmail Hacker.exe is a advance type of remote keylogger which will sent the credentials you have entered into the Gmail Hacker option menu to the hacker who has build the Gmail Hacker.exe file. So important part never put your original account credential in any of such tools which gurantees that they can hack email accounts or facebook accounts because all are simply fake. They are just cool social engineering stuff which is used to make newbie Hackers or users fool to hacker their Gmail accounts.
    Read more