How Hackers Crack Passwords ?

Hello Friends, I M Kevin Valani From Surat and Today i m going to share you how hackers from world crack the passwords.

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques : Read More

How To Identify FAKE Facebook Profile?

Hi, I m Kevin Valani From SURAT, Back with one most wanted answer from users around world.
In this article, I’m going to share few simple tips which will be helpful to identify whether facebook profile is a fake or real one.
Recently, I observe that most of the peoples are trying to hack facebook accounts by using fake profile.
However, sometimes revealing your secret information on facebook to random peoples may can harm your social life to a great extent, just in case you have any 😛

1. Facebook Profile pic of celebrity / horny pic:
Closely observe the profile pic of the user. Mostly the profile pics is set as of some celebrity, any cartoon character or any random cartoon. Peoples also use horny pics to increase the facebook friend count list at a high rate.

2. Facebook Joined Date (current year):
Whenever you receive a random friend request, first check their account creation date. If its of the same year when you get the request, then most probably you should use ignore button to avoid it 😉

3. Friend list full of dick heads:
Check the friend list of the person, most probably it will be full of dick heads who are ready to accept any request from such kind of profile.

4. Horny status updates:
From fake profiles peoples mostly post horny status updates just to increase their friend list. Since, these posts are mostly public so you can easily drag down to their Facebook wall to analyze their activities.

5. Not a single Selfi / Single Photo album:
Since, there are some peoples on facebook who don’t want to share their real pics which highly recommended anyway. However, peoples do post their real pic once in a while or get tagged by some friend. If you can’t find a single selfi or tagged photo of the related person, then try to avoid such profiles.

6. Incomplete profile information:
These profiles also don’t have enough information on their profile, like high school passed year, year of graduation, currently working at, current city etc.

7. Date of Birth as 1st January:
The biggest FATAL error with fake profiles is date of birth as 1st January. Do try to avoid peoples who want their Facebook wall get filled with Birthday as well as New Year greetings.

What to Do ?
If above methods are not able to clear the picture on any facebook profile, then you can always send messages like “Who is this ? OR Do I know you ? OR How do we know each other ?” just strictly avoid the friend request if you didn’t get any satisfactory response.

Report Fake Profile:
If you accidentally accept any friend request or saw a fake profile of any person you know, On Facebook you can easily report any profile.
On the profile page by using small settings icon you can use “Report / Block Profile” option to report the fake profiles.

Keep Learning. Keep Rocking 😉

FAQ- Being Hacker, For Begineers.

Hello Friends, I am Kevin Valani From Surat and Today I M Going To Answer Your Many Questions Regarding HACKING.

If you are a beginner in the art called Hacking then it is the ultimate hacking FAQ you must go with. Eric S. Raymond share his views on the most popular questions among the beginners. This FAQ will definitely help you to clear the picture of hacking culture if you are really serious with this Art.
Feeling Excited ?? keep reading folks……
HACKING FAQ :
Q: How do I tell if I am already a hacker?
A: Ask yourself the following three questions:

  • Do you speak code, fluently?
  • Do you identify with the goals and values of the hacker community?
  • Has a well-established member of the hacker community ever called you a hacker?

If you can answer yes to all three of these questions, you are already a hacker. No two alone are sufficient.
Q: Will you teach me how to hack?
A: Since first publishing this page, I’ve gotten several requests a week (often several a day) from people to “teach me all about hacking”. Unfortunately, I don’t have the time or energy to do this; my own hacking projects, and working as an open-source advocate, take up 110% of my time.
Even if I did, hacking is an attitude and skill you basically have to teach yourself. You’ll find that while real hackers want to help you, they won’t respect you if you beg to be spoon-fed everything they know.
Learn a few things first. Show that you’re trying, that you’re capable of learning on your own. Then go to the hackers you meet with specific questions.
Q: How can I get started, then?
A: The best way for you to get started would probably be to go to a LUG (Linux user group) meeting. You can find such groups on the LDP General Linux Information Page; there is probably one near you, possibly associated with a college or university. LUG members will probably give you a Linux if you ask, and will certainly help you install one and get started.
Q: When do you have to start? Is it too late for me to learn?
A: Any age at which you are motivated to start is a good age. Most people seem to get interested between ages 15 and 20, but I know of exceptions in both directions.
Q: How long will it take me to learn to hack?
A: That depends on how talented you are and how hard you work at it. Most people who try can acquire a respectable skill set in eighteen months to two years, if they concentrate. Don’t think it ends there, though; in hacking (as in many other fields) it takes about ten years to achieve mastery. And if you are a real hacker, you will spend the rest of your life learning and perfecting your craft.
Q: Would you help me to crack a system, or teach me how to crack?
A: No. Anyone who can still ask such a question after reading this FAQ is too stupid to be educable even if I had the time for tutoring. Any emailed requests of this kind that I get will be ignored or answered with extreme rudeness.
Q: I’ve been cracked. Will you help me fend off further attacks?
A: No. Every time I’ve been asked this question so far, it’s been from some poor sap running Microsoft Windows. It is not possible to effectively secure Windows systems against crack attacks; the code and architecture simply have too many flaws, which makes securing Windows like trying to bail out a boat with a sieve. The only reliable prevention starts with switching to Linux or some other operating system that is designed to at least be capable of security.
Q: I’m having problems with my Windows software. Will you help me?
A: Yes. Go to a DOS prompt and type “format c:”. Any problems you are experiencing will cease within a few minutes.
Q: Where can I find some real hackers to talk with? 
A: The best way is to find a Unix or Linux user’s group local to you and go to their meetings (you can find links to several lists of user groups on the LDP site at ibiblio).

(I used to say here that you wouldn’t find any real hackers on IRC, but I’m given to understand this is changing. Apparently some real hacker communities, attached to things like GIMP and Perl, have IRC channels now.)

Q: Can you recommend useful books about hacking-related subjects?

A: I maintain a Linux Reading List HOWTO that you may find helpful. The Loginataka may also be interesting.
For an introduction to Python, see the tutorial on the Python site.

Q: What language should I learn first? 
A: XHTML (the latest dialect of HTML) if you don’t already know it. There are a lot of glossy, hype-intensive bad HTML books out there, and distressingly few good ones. The one I like best is HTML: The Definitive Guide.

But HTML is not a full programming language. When you’re ready to start programming, I would recommend starting with Python. You will hear a lot of people recommending Perl, but it’s harder to learn and (in my opinion) less well designed.
C is really important, but it’s also much more difficult than either Python or Perl. Don’t try to learn it first.
Windows users, do not settle for Visual Basic. It will teach you bad habits, and it’s not portable off Windows. Avoid.

Q: I want to contribute. Can you help me pick a problem to work on? 
A: No, because I don’t know your talents or interests. You have to be self-motivated or you won’t stick, which is why having other people choose your direction almost never works.

Try searching on web for projects. When you see one that makes you think “Cool! I’d like to work on that!”, join it. check Freshmeat 
Q: Where can I get a free Unix?
A: If you don’t have a Unix installed on your machine yet, elsewhere on this page I include pointers to where to get the most commonly used free Unix. To be a hacker you need motivation and initiative and the ability to educate yourself. Start now…

How To Hack Facebook / Gmail / Twitter Using Phishing Attack.

Hi folks. I got many messages and complaints for not writing any article on hacking Gmail, Facebook or Yahoo. First of all guys let me share that I’m not in the favour of Black Hat Hacking because no matter how smart you’re at the end of the day its path will end by packing your ass behind the bars. Many people wants to hack someone’s account because of revenge, anger, unknowingly or just for fun but I suggest you to find a better alternative than hacking.
Anyways, here I’m sharing a simple trick to hack anyone’s Gmail/Facebook/Yahoo or any similar account by using most powerful and very popular tool these days known as backtrack. You can take a look at my previous articles on Backtrack from here.
I’ll use a site cloner tool included in Social Engineering Toolkit to get the Job done. Now enough chit chat, lets get our hands on some real stuff.
Warning: This is for education purpose only. I’m not responsible for any damage done to anyone 😛

  • Boot your backtrack machine.
  • Navigate to the following path. Applications > Backtrack >Exploitation Tools > Social Engineering Tools > Social Engineering Toolkit > set
  • It’ll navigate you to the Social-Engineering Toolkit (SET) terminal
  • Here, Enter your choice as 2 for Website Attack Vectors.
  • Now, Enter your choice as 3 for Credential Harvester Attack Method
  • In website attack vectors, Enter the Number as 2 for Site Cloner.
  • Then it’ll ask you to Enter the url to clone. Here, I’m usinghttp://www.facebook.com for demonstration but you can use the url of gmail or yahoo or whatever you want. After writing the URL hit Enter.
  • When its done with cloning again press Enter. Don’t close this terminal because it’ll display the password later. Now our site clone is ready all you need to do is to send its link to the victim who’s account you want to hack. The IP address of the Backtrack will be treated as the address of the clone site.
  • So grab the IP address of Backtrack. Open a new terminal and shoot the command ifconfig and get its IP address. It’ll look something like inet addr: 192.168.26.128
  • Since I’m running Backtrack on Virtual Machine so my IP is something like 192.168.26.128 yours may can differ.

Note: The IP’s of the figure 192.168.xxx.xxx shows its existence in a LAN or WAN. In that case this trick will work in those networks only.

  • Now, send your IP address directly to the victim or you can spoof it by shrinking the url using many online services like adf.ly or goo.gl or any similar one. Send the generated link to the Victim via chat or Email or by any means.
  • When the user click on the link, it’ll redirect to the facebooks cloned login page.
  • After entering the email and password when the victim click Login. It’ll get redirected to the original facebook login page and our SET terminal will display the results i.e. the email id and password.
  • Here, email ID: abc@xyz.com and Password: 123456
  • That’s it you have successfully hacked facebook account via Site Cloner on Backtrack.

Note: This trick may not work globally if you’re running Backtrack in virtual machine. For that purpose boot it as your main OS, either install it or use anyBootable USB or DVD of backtrack. Phishing usually work only on noobs but if you want to apply it on an expert use it smartly 🙂

How To Hack Facebook/GMail/Yahoo.

hello Friends. I am Kevin Valani From Surat And Here I’m sharing another trick for noobs on How to easily hack someone’s Gmail or Yahoo Password as many peoples ask me about it everyday. If you’re new here then you can take a look at my previous article How to hack Gmail/Facebook Password. As me a lazy blogger also haven’t posted anything on Backtrack for a long time so just thought to bind these two in a single article.
Now, if you’re still using Backtrack R2 then upgrade it to R3 take a look here as me still using R2 😥 due to low bandwidth.
Additionally if you’re a beginner with Backtrack then first few previous articles are highly recommended on LINUX
Alright, Lets get start..

First, lets take a quick overview about what we’re going to do here. We’ll apply different passwords on the target’s Gmail id from a password list using Hydra which is available with Backtrack. That’s why I still love it. 🙂 It’ll easily get back the password on successful login.

Requirements:

  • A password.txt file with a list of expected passwords, Either write your own or get one from here
  • Backtrack 5 (any version)
  • Internet Connection

Lets Hack something for real,

Turn on your Backtrack machine 😛
Navigate to Applications > Backtrack > Privilege Escalation > Password Attacks > Online Attacks > hydra-gtk and launch the hydra tool

Now, under the Target tab set following parameters

Single target > smtp.gmail.com
port > 465
Protocol > smtp
and check > use SSL, show attempts and Be Verbose

Click on Password tab, set these parameters

Username > target email address
Password List > select the Password.txt file
check the option > try Login as password

Now move to start tab and click on start button at the bottom to begin the attack.

If everything goes well, then you’ll get the password.

Note: Using a brute force attack from a Password list will never guarantee any successful result it depends how lucky you’re. Hacking someones account without their permission is a crime so do use at your own risk. I’m not at all responsible in case you get your ass behind the bars.

Happy Hacking. 🙂

Cut Someones Internet Connection in LAN

Netcut- A Tool To Cutoff Bandwidth On Wifi Or LAN “Windows Hacking” is the Keyword that is most searchable on the google but you can not find out working hacks from that.

Netcut is a tool that can be used to cutoff anyone’s internet connection in Wi-Fi or LAN.

It is very useful while you want to download big but there is lots of users on your wifi. you can block all of them’s internet and get full bandwidth.

Just Download the tool given below Download Link:- http://sh.st/r6V9f

Top-10 Hacker Movie

Here is a rundown of the main 10 programmer motion pictures you must check whether you haven’t as of now!

10. Devil Seed (1977)

a natural super-machine — is consistently bolstered the total of all human learning, from Chinese to growth research. Rather sadly, the super-machine achieves consciousness, and hacks into its inventor’s machine  mechanized house where it creates an undesirable enthusiasm for the researcher’s wife. What happens next is altogether past straightforward hacking, however this film shows you to stress over a future where machines can think and represent themselves.

9. Existenz (1999)

David Cronenberg’s 1999 science fiction flick takes a naturally untidy, natural methodology to hacking. existenz is situated in a machine amusement where individuals join with utilizing organic machines. Sign the standard Croenebergian spreads of body liquid and squelchy bits in addition to some cool developments, in the same way as a firearm (made out of organic parts) that shoots teeth.

8. The Net (1995)

In The Net, Sandra Bullock plays Angela Bennett, a product engineer who has her character stolen after an occasion happened. It doesn’t help that she telecommutes and doesn’t have numerous companions — a danger we’re certain numerous programmers can understand. She’s pursued crosswise over the internet by a wickedness gathering called the Praetorians — there’s a traditional reference for you — and needs to utilize her machine to shield herself. Gutsy stuff.

7. Shoes (1992)

Robert Redford’s Marty Bishop drives a gathering of machine hotshots who spend significant time in cryptography and machine security. In the wake of taking a complex black box from a few baffling awful fellows — who say they’re government operators, so Bishop’s soul can be clear — he figures out the crate has the capacity translate any encryption framework on the planet. Typically, the terrible fellows are quick to get their active it. Prompt interest.

6. Swordfish (2001)

Sentenced programmer Stanley Jobson — Hugh Jackman at his finest — has the errand of taking $9.5 billion of government stores disregarded after the prematurely ended Operation Swordfish, and he’s generally egged along by the ultra-smooth Gabriel Shear (John Travolta, plainly playing himself). We don’t have to say much in regards to Swordfish, separated from the way that there’s a scene including hacking on a machine with seven screens. Seven screens. You can’t get a great deal more programmer tastic than that.

5. Wargames (1983)

Growing programmer David discovers an indirect access passageway into a goliath military supercomputer centralized computer and begins messing around. Nothing could happen, correct? David plays against the machine in a diversion including a — completely hypothetical, or somewhere in the vicinity it appears — atomic war in the middle of America and Russia. Wargames praises hacking — we think its obliged perusing for any machine security aficionado.

4. Takedown (2000)

Kevin David Mitnick is at present acting as an american machine security expert. This film is about his life and how a programmer transformed down into nation machine security advocate. Just to include more into the astonishment, when Kevin was captured for his digital wrongdoing, he was in the rundown of most needed digital criminal.

3. Programmers (1995)

11-year-old Dade Murphy, overall known by his programmer nom de plume ‘Zero Cool’, is captured by the US Secret Service for composing a machine infection and banned from utilizing a machine until his eighteenth birthday. When he hits 18 he’s back in real life as ‘Accident Override’, and poo hits the fan — the motion picture offers a splendid ten-moment succession that generated the remarkable expression “hack the Gibson”. Programmers, as the name recommends, is one of the best hacking motion pictures out there. On the off chance that you haven’t seen it, you’re passing up a great opportunity.

2. Tron(1982)

A long time before the lukewarm Tron: Legacy, the first Tron was really cool correctly as a result of its unintendedly gullible creativity. Times were better before Jeff Bridges played the biogital Dude whose child is tossed into a feature diversion to battle for his life. Lightcycles, turning plates and neon-lit planets (shot on 70mm film) made this the notorious science fiction exemplary it still is today.

1. The Matrix (1999)

The Matrix is a meta-hacking motion picture. The programmers, including Keanu Reeves’ Neo, live inside the world they’re hacking. The Matrix is a machine framework that traps people into supposing they’re fit as a fiddle and appreciating their lives when they’re really being encouraged on by machines in a dull, tragic true. With its punchy nu-metal-cum-substantial metal soundtrack and cowhide overwhelming outfit office, The Matrix shows programmers as they’d want to be seen — ultra-cool and progressive.

0.die Hard (2007)

When somebody hacks into the machines at the FBI’s Cyber Crime Division; the Director chooses to round up all the programmers who could have done this. When he’s informed that on the grounds that its the fourth of July the greater part of their operators are not around so they may experience difficulty getting individuals to get the programmers. So he educates them to get nearby Pd’s to deal with it. Also one of the cops they ask is John Mcclane who is tasked with bringing a programmer named Farrell to the FBI. Yet when he gets there somebody begins shooting at them. Mcclane figures out how to get them out however despite everything they’re consistently sought after. Furthermore its exactly when Mcclane lands in Washington that the entire framework breaks