The most frequent questions asked by many people especially in a chat room is How To Hack Yahoo Password or any other email account.So you as the reader are most likely reading this because you want to break into somebody's email account.Here are some of the tricks that can be used to track an email password.
THINGS YOU SHOULD KNOW BEFORE PROCEEDING
There is no program that will crack the password of victim's account.There exist many password hacking programs which claims to do this,but unfortunately people using these kind of programs will only end up in frustration.None of these programs work since services like Hotmail, Yahoo!, etc. have it set so that it will lock you from that account after a certain number of login attempts.Another thing you must know if you ask this question in any "hacker" chat room/channel, you hear that you have to email some address and in any way you give up your password in the process, in attempt to crack others password.So DO NOT BELEIVE THIS.
TWO WAYS OF HACKING METHODS THAT YOU CAN TRY
IF YOU HAVE ACCESS TO VICTIM'S COMPUTER
If you have physical access to victim's computer then it's definitely possible to crack his password.This can easily be done by just installing a keylogger.
What is a keylogger? A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer's keyboard.
A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim's password.OK we can crack passwords using a keylogger but these are the questions that arise in our mind now!
1.Where is the keylogger program available?
A keylogger program is widely available on the internet.some of them are listed below
Powered Keylogger
Advanced keylogger
Elite Keylogger
Handy Keylogger
Quick Keylogger
Oops i think the above list is enough.There exists hundreds of such keyloggers available on the net.These are software keyloggers.There are also hardware Keyloggers available which can be directly attached to computer and can be used to sniff valuable data.These programs are none other than spyware! So use it @ your own risk.
2.How to install it?
You can install these keyloggers just as any other program but these things you must keep in mind.While installing,it asks you for a secret password and a hot key to enable it.This is because after installing the keylogger program is completely hidden and the victim can no way identify it.Keylogger is hidden from control panel,Program files,Start menu,Task manager so that it becomes completely invisible but runs in background monitoring the user activities.
3.Once installed how to get password from it?
The hacker can open the keylogger program by just pressing the hot keys(which is set during installation) and enter the password.Now it shows the logs containing every keystroke of the user,where it was pressed,at what time,including screenshots of the activities.
Some keyloggers also has a built in SMTP server.So once you install the keylogger on victim's computer you can just sit back in our place and receive the logs via email
4.Which keylogger program is the best?
According to me Elite Keylogger and Powered keylogger are the best.You can also read the features and side by side comparisions of them and select the best that suites your needs.
IF YOU DO NOT HAVE ACCESS TO VICTIM'S COMPUTER
Ofcourse the above method can only be employed if you can access victims computer.But what to do if we do not have access.In this case there exists many Remote Administration Tools commonly known as RATs available on net.Just try googling and you can get one.
OTHER WAYS OF HACKING PASSWORD
The other most commonly used trick to sniff password is using Fake Login Pages.
This is where many people get cheated.A Fake Login page is a page that appears exactly as a Login page but once we enter our password there ,we end up loosing it.
Fake login pages are created by many hackers on their sites which appear exactly as Gmail or Yahoo login pages but the entered details(username & pw) are redirected to remote server and we get an error "Page cannot be displayed".Many times we ignore this but finally we loose our valuable data.
Thursday, November 20, 2008
Hacking yahoo/gmail and other email accounts
Posted by egunda at 10:57 PM 0 comments
Labels: Hacking
Keyloggers (Keystroke Loggers)
Keystroke loggers are stealth software that sits between keyboard hardware and the operating system, so that they can record every key stroke.
There are two types of keystroke loggers:
1. Software based and
2. Hardware based.
Spy ware: Spector (http://www.spector.com/)
- Spector is a spy ware and it will record everything anyone does on the internet.
- Spector automatically takes hundreds of snapshots every hour, very much like a surveillance camera. With spector, you will be able to see exactly what your surveillance targets have been doing online and offline.
- Spector works by taking a snapshot of whatever is on your computer screen and saves it away in a hidden location on your computer's hard drive.
Hacking Tool: eBlaster (http://www.spector.com/)
- eBlaster lets you know EXACTLY what your surveillance targets are doing on the internet even if you are thousands of miles away.
- eBlaster records their emails, chats, instant messages, websites visited and keystrokes typed and then automatically sends this recorded information to your own email address.
- Within seconds of them sending or receiving an email, you will receive your own copy of that email.

Hacking Tool: (Hardware Keylogger) (http://www.keyghost.com)

- The Hardware Key Logger is a tiny hardware device that can be attached in between a keyboard and a computer.
- It keeps a record of all key strokes typed on the keyboard. The recording process is totally transparent to the end user.
Posted by egunda at 10:56 PM 0 comments
Labels: Hacking, Hacking Tools
Essential Hacking Tools For Every Hacker
Here is a list of all the essential hacking tools that every hacker should possess.Here in this post I will give details of different Hacking/Security tools and utilities along with the download links.I have also divided these tools into their respective categories for ease of understanding.
NETWORK SCANNERS AND TCP/IP UTILITIES
1. IP TOOLS
IP-Tools offers many TCP/IP utilities in one program. This award-winning program can work under Windows 98/ME, Windows NT 4.0, Windows 2000/XP/2003, Windows Vista and is indispensable for anyone who uses the Internet or Intranet.
It includes the following utilities
- Local Info - examines the local host and shows info about processor, memory, Winsock data, etc.
- Name Scanner - scans all hostnames within a range of IP addresses
- Port Scanner - scans network(s) for active TCP based services
- Ping Scanner - pings a remote hosts over the network
- Telnet - telnet client
- HTTP - HTTP client
- IP-Monitor - shows network traffic in real time & many more
Download IP Tools Here
2. NMAP
Nmap is a similar hacking/security tool as IP Tools which offer slightly different set of features.Unlike IP Tools Nmap is a freeware.It is designed to rapidly scan large networks, although it works fine against single hosts.Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available
Download Nmap Here
PASSWORD CRACKERS
1. LC4 (For Windows Password Recovery)
LC4 is the award-winning password auditing and recovery application, L0phtCrack. It provides two critical capabilities to Windows network administrators:
- LC4 helps administrators secure Windows-authenticated networks through comprehensive auditing of Windows NT and Windows 2000 user account passwords.
- LC4 recovers Windows user account passwords to streamline migration of users to another authentication system or to access accounts whose passwords are lost.
2. SAMINSIDE (For Windows Password Recovery)
SAMInside is designated for the recovery of Windows NT/2000/XP/2003/Vista user passwords.
The following are some of the highlighting features of Saminside.
- The program doesn't require installation.It can be directly run from CD,Disk or Pendrive.
- Includes over 10 types of data import and 6 types of password attack
- Brute-force attack
- Distributed attack
- Mask attack
- Dictionary attack
- Hybrid attack
- Pre-calculated tables attack
- Run's very fast since the program is completely written in assembler.
You Can Get Saminside From Here
3. MESSENPASS (For Instant Messenger Password Recovery)
Messenpass is a password recovery tool for instant messengers.It can be used to recover the lost passwords of yahoo messenger or windows messenger.It is too easy to use this tool.Just double-click this tool and it reveals the username and passwords that are stored in the system.
Download MessenPass Here
REMOTE ADMINISTRATION TOOLS (RAT)
RADMIN
Radmin (Remote Administrator) is the world famous, award winning secure remote control software and remote access software which enables you to work on a remote computer in real time as if you were using its own keyboard and mouse.
Radmin has the following features.
- Access and control your home and office computer remotely from anywhere
- Perform systems administration remotely
- Provide Help Desk (remote support) functions for remote users
- Work from home remotely
- Manage small, medium, and large networks remotely
- Organize online presentations and conferences
- Share your desktop
- Teach and monitor students' activities remotely
Download Radmin Here
Most of the above tools are shareware which means that you have to pay for them.But they are really worth for their money.Most of the time freewares offer limited functionality/features than the sharewares and hence I recommend them to my visitors.But still you can get 99% of all the softwares for free (cracked versions) on the internet and if u search on this site itself you will find almost all of the above mentioned softwares free :)
Posted by egunda at 10:55 PM 0 comments
Labels: Hacking, Hacking Tools
Radmin Remote Administrator 3.2 - a nice hacking software
Remote Administrator is the fastest remote control software. You see
the remote computer screen displayed either in a window or full
screen on your computer monitor. All mouse and keyboard functions are
transferred to the remote computer. You can work with the remote
computer as if you are sitting in front of it. According to our tests
and our users feedback Remote Administrator outperforms all other
remote controls in the speed of work.
System Requirements
nothing special
What's new
Support for Windows Vista SP1; Support for Windows Server 2008; Faster speed and smooth performance; Left-hand mouse support; Support for 27 languages.
download: http://rapidshare.com/files/141494291/Radmin__Remote.Administrator__3.2.rar
mirror: http://rapidshare.com/files/162064523/Radmin__Remote.Administrator__3.2_www.balkanw.org.rar
Posted by egunda at 10:54 PM 0 comments
Labels: Hacking, Hacking Tools
Tuesday, October 21, 2008
online MD5 crackers
http://www.md5lookup.com/
http://md5.rednoize.com
http://nz.md5.crysm.net
http://us.md5.crysm.net
http://www.xmd5.org
http://gdataonline.com
http://www.hashchecker.com
http://passcracking.ru
http://www.milw0rm.com/md5
http://plain-text.info
http://www.securitystats.com/tools/hashcrack.php
http://www.schwett.com/md5/
http://passcrack.spb.ru/ ->sha1
http://shm.pl/md5/
http://www.und0it.com/
http://www.neeao.com/md5/
http://md5.benramsey.com/
http://www.md5decrypt.com/
http://md5.khrone.pl/
http://www.csthis.com/md5/index.php
http://www.securitystats.com/tools/hashcrack.php ->sha1
http://www.md5decrypter.com/
http://www.md5encryption.com/ ->sha1
http://www.md5database.net/
http://md5.xpzone.de/
http://www.milw0rm.com/md5/info.php
http://md5.geeks.li/
http://www.hashreverse.com/ ->sha1
http://www.cmd5.com/english.aspx
http://www.md5.altervista.org/
http://md5.overclock.ch/biz/index.php?p=md5crack&l=en
http://alimamed.pp.ru/md5/
http://md5crack.it-helpnet.de/index.php?op=add
http://cijfer.hua.fi/
http://shm.hard-core.pl/md5/
http://www.mmkey.com/md5/HOME.ASP
http://www.thepanicroom.org/index.php?view=cracker
http://rainbowtables.net/services/results.php ->sha1
http://rainbowcrack.com/ ->sha1
http://www.securitydb.org/cracker/
http://passwordsecuritycenter.com/in...roducts_ id=7
http://0ptix.co.nr/md5
https://www.astalavista.net/?cmd=rainbowtables
http://ice.breaker.free.fr/
http://www.md5this.com
http://www.shalookup.com/ ->sha1
lm Only:
http://sys9five.ath.cx:8080/hak5rtables/
http://lasecwww.epfl.ch/~oechslin/projects/ophcrack/
some more links
http://linardy.com/md5.php
http://www.gdataonline.com/seekhash.php
http://www.md5-db.com/
https://www.w4ck1ng.com/cracker/
http://search.cpan.org/~blwood/Digest-MD5-Reverse-1.3/
http://www.hashchecker.com/index.php?_sls=search_hash
http://www.milw0rm.com/md5/
http://www.mmkey.com/md5/
http://www.rainbowcrack-online.com/
http://www.securitydb.org/cracker/
http://www.securitystats.com/tools/hashcrack.php
http://schwett.com/md5/
http://www.und0it.com/
http://www.md5.org.cn/index_en.htm
http://www.xmd5.org/index_en.htm
http://www.tmto.org
http://md5.rednoize.com/
http://nz.md5.crysm.net/
http://us.md5.crysm.net/
http://gdataonline.com/seekhash.php
http://passcracking.ru/
http://shm.pl/md5/
http://www.neeao.com/md5/
http://md5.benramsey.com/
http://www.md5decrypt.com/
http://md5.khrone.pl/
http://www.csthis.com/md5/index.php
http://www.md5decrypter.com/
http://www.md5encryption.com/
http://www.md5database.net/
http://md5.xpzone.de/
http://www.hashreverse.com/
http://alimamed.pp.ru/md5/
http://md5crack.it-helpnet.de/index.php?op=add
http://shm.hard-core.pl/md5/
http://rainbowcrack.com/
http://passwordsecuritycenter.com/index.php?main_page=product_info&cPath=3&products_id=7
https://www.astalavista.net/?cmd=rainbowtables
http://ice.breaker.free.fr/
http://www.md5this.com/
http://hackerscity.free.fr/
http://md5.allfact.info/
http://bokehman.com/cracker/
http://www.tydal.nu/article/md5-crack/
http://passcracking.com/
http://ivdb.org/search/md5/
http://md5.netsons.org/
http://md5.c.la/
http://www.md5-db.com/index.php
http://md5.idiobase.de/
http://md5search.deerme.org/
http://sha1search.com/
Posted by egunda at 3:00 AM 0 comments
Labels: Hacking
Tuesday, October 7, 2008
Wireless Hack Toolz (2008)
Tools included
* NetStumbler-0.4.0: wireless access point identifier - listens for SSIDs
and sends beacons as probes searching for access points.
* Kismet-2005-08-R: wireless sniffer and monitor - passively monitors wireless traffic
and sorts data to identify SSIDs, MAC addresses, channels and connection speeds.
* Wellenreiter-v1.9: WLAN discovery tool - uses brute force to identify low traffic
access points; hides your real MAC address; integrates with GPS.
* WEP-0.1.0: Unix based-pearl aplication encryption breaker - *****s 802.11 WEP
encryption keys using the latest discovered weakness of RC4 key scheduling.
* Airsnort-0.2.7e: encryption breaker - passively monitoring transmissions,
computing the encryption key when enough packets have been gathered.
* Wepwedgie-0.1.0-alpha: for toolkit that determines 802.11 WEP keystreams
and injects traffic with known keystreams in order to ***** WEP in minutes.
* Hotspotter-0.4: Wireless client attacking too.
download:
http://rapidshare.com/files/127357312/WHT.rar
password:
bluemoon
Posted by vivek at 12:12 PM 0 comments
Labels: Hacking, Hacking Tools
Big Hack Pack 2008
APP LisT :
AddrView
AnonFTP
AOL new
AppToService
arpinject
aspack21
Astaroth Joiner v2
atk-2.1
BankOfAmerica
bios_pass_remover
BlasterW32
blue
bmpripper
brutus
Cable Modem Sniffer
CapKeys_DIGITAL
CASXM138
CAYZODQF
CGI Founder v1.043
cgis4
CGISscan
cia10
cports
craagle
Crackftp
CreditCardGjenerator
Davs_TR_REtail
DDL Sites
DeepUnFreez
DrVBS
eBay
EESBinder
egold
E-mail Cracker
ezDataBase_Defacer
F.B.I - Binder
FTP Brute Forcer
ftpbr
~Censored~ Mail Bomber 2.3
G00B3RS_phpBB_exploit_pack
genxe-beta-0.9.0
Google_Hacker_1.2
grinder1.1
Hack FLASH Template
Hack MY Space
Hack Photoshop CS2
HackersAssistant
HackTheGame
hck
hlboom
Hook Tool Box
Hotmail Email Hacker
Hotmail HAcker Gold
Hotmail ScamPage
HotmailHack
HSBC-US
hydra-4.6-win
iecv
IP2
ipnetinfo
john-17w
Key Changer
Key_Logger
Legion NetBios Scanner v2.1
Mail Boomb_2.0 YAHOO
MIDNITEmassacre
MooreR Port Scanner
MSN Flooder 2.0
MSN Messenger Account Cracker v2.0
MSNLoader
NET BIOS Scaner
NetBIOS Name Scanner
NetResView
NFO Maker 1.0
Nimda
nkedb
nolimitcracker
NTPacker
nts
NullAddFrontend
On-Off MSN
OS Update Hack
P0kes WormGen 2.0
panther
PayPal
PCAnyPass
Php Nuke Hacker v11.0
phpBB Annihilator
phpbb attack
phpbb bruteforcer
PhpBB pass extractor
phpBB_DoS
phpbb_spammer
phpBBAttacker
phpBBAttacker
phpBBcracker
PhpBuGScan
~censored~
PhpNuke_bypass
Ping & Nukes
Port Listener XP
pqwak2
procexp
ProMo
ProxyPro
Pure phpBB Email harvester
rainbowcrack-1.2-src win-lin
Remote Shut Down
ResHacker
Rocket
rpc
RpcScan101
Sasser
SendMailer
Server 2003 Keygen
Server Killer
showpassv10
sitedigger2
smbat-win32bin-1.0.4
SMBdie
smbproxy-win32bin-1.0.0
Source Checker
source codes
sprut
SQLScan v1.0
Stealth - HTTP Scanner v1.0 build 23
super
SuperScan4
tftpd32.273
thunter
TinaSoft KILL
traceroute
UC.Forum Spam
udpflood
Ultra Dos
USBank
Visa Spam
Warez Sites
Web Cracker 2.0
WebCracker 4.0
whoistd
Win XP Activator
WindowHide
Windows XP Corperate Keygen
Windows XP KeyGen
Windows XP Product Key Changer
Windows XP Product Key Checker
Windows XP Product Key Viewer
WindowsAdminpasswordHack
wwwhack
xpass
xplizer
Yahoo Password
yahooUltraCracker
zehir
download:
http://rapidshare.com/files/150603204/UltraH4cker.rar
Posted by vivek at 12:12 PM 0 comments
Labels: Hacking, Hacking Tools
Monday, September 15, 2008
How to make ALL Trojan/Virus/Keylogger UNDETECTABLE
the methods works fine
keylogger: Ardamax Keylogger
Remote Administration Tool (Must not have a router): Poisin Ivy
Google is your friend.
Now that you have your trojan, virus or keylogger or w/e harmful ready, its time to make it UNDETECED!
1. Download Software Passport (Armadillo) by Silicon Realms. This is THE best binder out there I know of, it makes everything %100 UNDETECTABLE BY ALL ANTIVIRUSES (including Norton, Kaspersky, Avast, etc)… The direct link to dl the program is here:
Code:
http://nct.digitalriver.com/fulfill/0161.001
There is a form to fill out information, so put in your real email address, and then you’ll recieve a download link in your email (it might be in Spam, Junk mail section so beware.)
2. Once you download the program, install it.
3. Once installed, you open it up and see this:
Code:
http://img339.imageshack.us/img339/6…assportzh3.jpg
This is the program. Now that you have it open, you might be confused on what the hell to do, right? Well, this is what you do!
1. Download this pre-made settings. These settings are pre-made by me so you won’t be confused. Everything is working.
DOWNLOAD THIS FOR THE PRE-MADE SETTINGS:
Code:
http://rapidshare.com/files/8749860/projects.arm.html
DOWNLOAD THIS FOR THE BACKUP (You need this in the same location as the projects.arm file) YOU NEED THIS FILE ALSO!
Code:
http://rapidshare.com/files/8750048/projects.Stats.html
Now, when you download these files, and you put them in the SAME FOLDER (or same location), open Software Passport again and click Load Existing Project (top left).
Where it says “Files to Protect” (if theres stuff there, delete it):
Add the files you want to make %100 UNDETECTABLE!!
Now, once done, go to the bottom right and click “Build Project”. A bunch of windows will come up, just click Yes and OK.
Now, once its created, they are %100 undetectable. Go to
Code:
virustotal.com
to scan it with every Antivirus, and they wont find ANYTHING!
Posted by vivek at 8:13 AM 2 comments
Labels: Hacking
USB Password Stealer
Instructions
1.Decompress the archive and put all the files located in the folder “USBThief”into a USB.
2.Insert the USB in your victim’s computer.
3.View folder “dump” to see the passwords.
Download
Password: www.dl4all.com
Posted by vivek at 8:13 AM 5 comments
Page hits flooder
This small program can flood ur page hits.
but you have to dedicate one browser for it.. like internet explorer
method:
make a batch file with these lines
@echo off
:1
start C:\Progra~1\Intern~1\iexplore.exe “http://yoursite.com“
ping -n 10 127.0.0.1 >nul
taskkill.exe /im iexplore.exe
goto 1
depending upon your net speed u may increase the 10 secs time wait
with 10 sec time u may have 360 hits in an hour
with 5 sec time u may have 720 hits in an hour
Posted by vivek at 8:12 AM 0 comments