- See more at: Devil hacking point: December 2013

Pages

Tuesday, December 31, 2013

HAPPY NEW YEAR 2014


Happy New Year
-By-
~Umairx001~
GOD Bless you All
-By-
~Umairx001~
Enjoy New year Night With Family and Frnds
Best of Luck you All
-By-
~Umairx001~
Hackers Ahead 2014
~Dont Stop Visiting Here~
-By-
~Umairx001~
Best Of Luck :*
GoD Bless you All
Wellcome ~2014~
-By-

~Umairx001~


How to monitor or track any Cell Phone

How to monitor or track any cell phone?

There is no denying that cell phones are part and parcel of current times and smartphones with a whole gamut of features are hot favorites. Mobile phones are being profusely used for a variety of functions and have become repositories of so much personal and professional information. If and when people can get at a 
cell phone’s data, they acquire almost complete knowledge about the owner! But getting at a mobile’s data is more easily said than done.

People cannot keep grabbing furtively at a phone and going through the information stored in it! An invisible and silent way to transmit all the cell phone related activities and data, including deleted ones is needed. This is the basic idea behind monitoring or tracking cell phones using cell phone spy applications.


How to monitor a cell phone most effectively?

Monitoring software for cell phones is available for a variety of mobile models and operating systems. Such software, like the widely used Mobile Spy can be quickly installed on any cell phone that has to be monitored. The apps are thoroughly camouflaged and are designed to run undetected in the mobile’s backdrop without intruding on the instrument’s activities. 

Setting up cell phone monitoring software

The mobile tracking app installation typically involves a simple procedure. The user first creates an account for himself or herself on a server designated by the app at the time of buying. After this, the user has to physically pick up the cell phone to be monitored and set up the mobile monitoring software on it.

As part of this step, he is also asked to select the data to be tracked. Immediately after the installation process is completed, the app becomes active and runs whenever the cell phone is on. It tracks the required data, encrypts it for security and then transmits it to the server account. User can view and use the logs recorded in the server by accessing his account from anywhere, at anytime through a web browser. 

Mobile data that becomes accessible with monitoring apps

Sophisticated monitoring apps for smartphones give many advanced options apart from the fundamental ones such as call, SMS, email and chat tracking and access to phone data like address book, video and picture files and so on. To encompass a wider scope for mobile tracking, the apps could have location tracking of mobiles with GPS or cell ID, live overhearing of calls and the mobile’s environment, live viewing of the phone’s screen, permissions to block applications and lock device remotely, the ability to limit phone usage timings, get current SIM details and many more options. 

Who can benefit from tracking mobiles?

Parents interested in watching over their kids, firms that want to monitor their employee actions, husbands or wives doubtful about their partner’s faithfulness and any persons who need evidence against someone are the cases where mobile tracking is called for.

Some people use it as a data backup option on their own mobiles and some use such apps as a precaution against mobile loss. With mobile monitoring apps, anyone can acquire the power to track data and activity related to cell phones and by collecting the necessary information they can mitigate risks easily before any problems get precipitated.

About The Author

Lucille J Cronk is a blogger enthusiastic about cell phone technology and other mobile applications.

Top 50 Passwords

Passing guessing is one of the fastest technique to hack any account. According to a survey by Sophos 33% of the people use the same passwords. What this means that if a hacker can get inside a person's facebook account, he can also get inside his/her other account using the same password. The chart below is the set of most commonly used Gawker Passwords that were leaked online due to a security breach. 


The following incident shows us how careless people can be while choosing their passwords and ultimately getting themselves hacked.

Hack Facebook Status

images58
Many of you are willing to hack a Facebook status ( means to post status by his/her Facebook account). That is actually not much difficult and here we are gonna expose the easy way to do - what you are willing for. Here is the step-by-step tutorial on how to hack a Facebook Status of someone(you want to target) on Facebook. Follow the instructions below:

Step 1: Make sure to send this link: (https://m.facebook.com/upload.php?email&_rdr), to the person you want to target.



Step 2: Ask the victim to give you an email address of his/her Facebook account (for example:someone@facebook.com). 

cats5
Step 3: Make sure you have an Gmail account ( if not then just visit Gmail website and sign-up there to make new account).
 cats6

Step 4: After sign-in to your Gmail account, just Click on the Compose button as shown below.

  cats1

Step 5: 

Write email of the victim in the "To" box and write something as a status on "Subject" box and leave the message box empty.cats


 Step 6: After the above steps, simply press the "Send" button to complete the process.
  cats2

Step 7: Now go on and check his/her Facebook wall/timeline, you will surely find a status you have written in the email.
 cats4

Keep enjoying with this authentic hacking method. And keep visiting us for interesting hacking tips.

Ali contacted facebook regarding this bug, and they said that it was an intentional feature and is an acceptable risk.

Thursday, December 26, 2013

Hack E-Mail Account Password Using ProRat

1. First of all Download ProRat. Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "pro". 
-  Download Here

2. Open up the program. You should see the following:

3. Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose "Create ProRat Server". 

 4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will  send you a message. We will not be using the rest of the options.
  
5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager. 

Here is a quick overview of what they mean and which should be checked: 
  
6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need. 

7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it. 

8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document. 

9. After this, press Create server, your 
server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to 
something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the 
latest game that just came out so he could get people to download it. 

Very important: Do not open the "binded_server" file on your system. 

10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can send this file via email as "server.exe", by using fake email sender http://emkei.cz/.  Or Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control. 

11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could 
do next. 
 Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.
  
12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a 
few examples. 

13. The image below shows the message that the victim would get on his screen if the hacker chose to message him. 
14. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen. 

As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t  
get infected.Many skilled hackers can program their own viruses and Trojans that can easily bypass
anti-virus programs.  But there is still an anti prorat which help to detect the sever file and delete it
to download anti prorat click here

Sunday, December 22, 2013

Hack Any Account Using Rapzo Keylogger

Rapzo Keylogger, Hack any email with this keylogger Rapzo keylogger 1.5 public Edition full Tutorial

You Need These five Thinks
  1. Rapzo Keylogger
  2. Resource Hacker
  3. winrar (or any compressing tool)
  4. Microsoft net frame work
  5. A Hosting account (for share this file)
◘ Now Learn Tutorial
1. First of All   Download Rapzo keylogger and Resource Hacker
2. Note 1st  Microsoft Netframe work, install In your PC.
Keylogger Setting or how to use keylogger
3.Now extract keylogger files in your pc and open Rapzo.exe file, and After that do that what image below.
  


When u Click on Stealer a new box will be appear, There u Click on Enable All

Now come on main setup and click on Enable..and after that Put your Gmail ID in Username and fill other Options,Note:
         ID password must be Correct and than click oN test

After clicking on new box will be appear if your Id is correct then it will appear if not than Check again and put your correct Email and than click on build Server.


7: After that one file created in directory name server.exe....send this file to your  Victim u want to hack


Now run the resource Hacker
Now Open Resource hack and Open your server.exe file in it.

When you Open click on version info then click on 1 then click on "0" there you can see file description is Hijackthisfile reaplace it with Microsoft 

After that click on complete Script pe and save it as anyname.jpg

Tuesday, December 17, 2013

Windows 7 Loader eXtreme Edition v3.503

Windows 7 Loader eXtreme Edition v3.503 MediaFire Free Download,Windows 7 Loader eXtreme Edition,Windows 7 Loader eXtreme 
How to active Windows 7
Windows 7 Loader eXtreme Edition v3.503
Activates all Windows 7 versions:
Ultimate, Professional, Enterprise, Starter, Basic, Home, etc.
Activates Windows 7 / Vista / 2008 R2 / 2008 - RTM / preRTM / Office 2010
Supported editions: All

Back up your tokens.dat file if you must have a version other than Ultimate.
This activator is a 'Frankenbuild' Loader, meaning it swaps out files in order to activate.
  • Safer loader installation (than other activators)
  • Activate any edition (without reducing default activation abilities)
  • Trial Reset (get back 4 rearms and 30 days)
  • Installs/Uninstalls/Detects public SLIC emulators: 
  • W7 Loader
  • Open W7 Loader
  • SLIC Driver
  • Vista Boot
  • WOW7 Loader
  • MBR SLIC Loader
  • Vista Loader
  • KMS Activation:
  • Emulated KMS Server
  • Internet KMS Servers
  • Windows 7/Vista/2008R2/2008 keys
  • Windows 7 SLICs
  • Windows 7/Vista Certificates
  • W7 Loader
  • Open W7 Loader
  • SLIC Driver
  • MBR SLIC Loader
  • KMS Emulator
  • Activate any editions Automatic and Advanced Mode
  • Complete loaders collection
  • Custom loaders integration
  • Windows activation information
  • SLIC checking: checksum, SLIC&RSDT&XSDT markers
  • Installed loader information: Boot Loader and SLIC Emulator
  • Installed key information
  • SLIC dump
  • Certificate dump 
  • Product key checker
  • Logos and OEM information installatio
  • Commmand line keys
  • Internal SLIC's storage
  • Internal Certificates storage
  • Ability to use external SLIC's storage
  • Ability to use external Certificates storage
  • SLIC and Certificate comparison
  • Custom KMS servers list
  • Custom keys list
  • Custom logos list
  • KB971033 ready.
  • Shows extended activation-related information.
  • Detects Chew-WGA&RemoveWAT-related system changes.
  • Activates Office 2010 (w7lxe.exe /office2010).
Emergency recovery 
MBR SLIC Loader and "Sleep Mode" compatibility:
"Clear CMOS" jumper.
NOTES:
Default SLIC emulator: W7 Loader (Forceful)
Default emulation scheme: Safest + UnSafe
  • "Safest" uses Loader with Vista Boot Loading Screen (with option to use original W7 in boot options)
  • "Safe" uses Loader with W7 Boot Loading Screen (with option to use original W7 in boot options)
  • "Unsafe" uses Loader with W7 Boot Loading Screen (no option to use original W7 in boot options)

Chew7 v1.2

Description Chew7 v1.2:
Chew7 is the only activation solution that disables the loathed \"calling home\" feature (spyware) that is embedded into the software protection platform of Windows. In Windows XP days, when WGA was first released, it quickly became apparent to the more self conscious technologically inclined users, that Microsoft was retrieving personally identifiable information from its users without notice on a daily basis (every time the system boots up and then on a 24 hour interval after that). Now they have switched to a robust \"software protection platform\" built into the framework of the operating system itself, and they\'ve changed this 24 hour grab interval to something much less conspicuous ΓΓé¼ΓÇ¥ 14 days, so it\'s no wonder most people haven\'t caught on to what\'s happening. Even with a firewall installed, most of us are inclined to simply ignore notices about Windows components connecting to the internet without apparent cause. Private information like names and internet protocol addresses, browsing history, and sometimes even files that they deem to require further investigation, are being sent over the internet. What do they do with all this information? It\'s anyone\'s guess, but the way we see it, it\'s certainly an invasion of rights to privacy. Will they admit to it? Probably not; it\'s spyware after all.
Chew7 v1.1 was designed for the following operating systems:

  • Windows 7 Starter
  • Windows 7 Home Basic
  • Windows 7 Home Premium
  • Windows 7 Professional
  • Windows 7 Enterprise
  • Windows 7 Ultimate
  • Windows N Premium
  • Windows N Professional
  • Windows N Enterprise
  • Windows N Ultimate
  • Windows Server 2008 R2
  • Windows Home Server V2
  • Windows Embedded Standard 7
  • Windows Embedded Standard 11
Chew7 v1.1 is compatible with the following operating systems:
  • Windows 7 Starter
  • Windows 7 Home Basic
  • Windows 7 Home Premium
  • Windows 7 Professional
  • Windows 7 Enterprise
  • Windows 7 Ultimate
  • Windows N Premium
  • Windows N Professional
  • Windows N Enterprise
  • Windows N Ultimate
  • Windows Server 2008 R2 Foundation
  • Windows Server 2008 R2 Standard
  • Windows Server 2008 R2 Enterprise
  • Windows Server 2008 R2 Datacenter
  • Windows Web Server 2008 R2
  • Windows HPC Server 2008
  • Windows Server 2008 R2 for Itanium-Based Systems
  • Windows Home Server V2 (codename: Vail)