Sponsors

Friday, November 18, 2011

How to hack Facebook account : Man In the Middle Attack


Man in the middle attack ARP PoisoningWe discussed the way to hack Facebook account using Cookie Stealing in my previous article. In that method, we had used Wireshark to capture the victim’s Facebook cookies. But, many readerswere unable to capture cookies of their victims. So, I am writing this article to explain a new method to capture Facebook cookies of your victim which canbe used to hack Facebook account.
Note: Many argue that Cookie stealing does not work for Facebook. But, I want to assure that this Facebook hack works and it works great. In fact, this is currently my favorite way of hacking Facebook.

Problems with Wireshark:

Wireshark is the one of the best tools available today. It can capture all packets in the network. But, Wireshark can capture Facebook cookies only if the network is hub-based. If you are running on a switch-based network, you will have to implement “Man In the Middle attack” using Cain. Without “Man In the Middle attack”, Wireshark cannot capture Facebook cookies.

What is Man In the Middle attack???

Before getting to the actual method, let us brush up our networking basics which we are gonna use in this hack:

Read More

Friday, November 18, 2011 by Ashif Ismail · 56

Saturday, November 12, 2011

Denial Of Service Attack | Expalined



Its Real,On February 6th, 2000, Yahoo portal was shut down for 3 hours. Then retailer Buy.com Inc. (BUYX) was hit the next day, hours after going public. By that evening, eBay (EBAY), Amazon.com (AMZN), and CNN (TWX) had gone dark. And in the morning, the mayhem continued with online broker E*Trade (EGRP) and others having traffic to their sites virtually choked off.
What is a Denial Of Service Attack?

  • A denial of service attack (DOS) is an attack through which a person can render a system unusable or significantly slow down the system for legitimate users by overloading the resources, so that no one can access it.
  • If an attacker is unable to gain access to a machine, the attacker most probably will just crash the machine to accomplish a denial of service attack.

Read More

Saturday, November 12, 2011 by Ashif Ismail · 4

How to Use Windows 7 Without Activation



Windows 7Most of you might be aware of the fact that it is possible to use Windows 7 and Vista for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. However in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately an year! Here is a way to do that.
1. Goto “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“. If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2.
2. Now type the following command and hit enter
slmgr -rearm

Read More

by Ashif Ismail · 1

Hack BSNL Broadband for Speed

If you are a BSNL broadband user, chances are that you are facing frequent DNS issues. Their DNS servers are just unresponsive. The look up takes a long duration and many times just time out. The solution? There is small hack on BSNL for this. Use third party DNS servers instead of BSNL DNS servers or run your own one like djbdns. The easiest options is to use OpenDNS. Just reconfigure your network to use the following DNS servers:


208.67.222.222  or 208.67.220.220
Detailed instructions specific to operating system or your BSNL modem are available in the OpenDNS website itself. After I reconfigured my BSNL modem to use the above 2 IP addresses, my DNS problems just vanished! Other ‘freebies’ that come with OpenDNS are phishing filters and automatic URL correction. Even if your service provider’s DNS servers are working fine, you can still use OpenDNS just for these two special features. After you hack BSNL DNS servers, you will see a noticeable improvement in your broadband speed.

by Ashif Ismail · 1

Wednesday, November 9, 2011

How to Create Your Own Customized Run Commands.

Run commandThe Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to it’s location and double-clicking the executable icon. However, it only works for some of the inbuilt Windows programs such as Command prompt (cmd), Calculator (calc) etc. So, have you ever wondered how to create your own customized Run commands for accessing your favorite programs, files and folders? Well, read on to find out the answer.

Creating the Customized Run Command

Let me take up an example of how to create a customized run command for opening the Internet explorer. Once you create this command, you should be able to open the Internet explorer just by typing “ie” (without quotes) in the Run dialog box. Here is how you can do that.
1. Right click on your Desktop and select New -> Shortcut.
2. You will see a “Create Shortcut” Dialog box as shown below

Create Shortcut 


















3. Click on “Browse”, navigate to: Program Files -> Internet Explorer from your Root drive (usually C:\) and select “iexplore” as shown in the above figure and click on “OK”.
4. Now click on “Next” and type any name for your shortcut. You can choose any name as per your choice; this will be your customized “Run command”. In this case I name my shortcut as “ie”. Click on “Finish”.
5. You will see a shortcut named “ie” on your desktop. All you need to do is just copy this shortcut and paste it in your Windows folder (usually “C:/Windows”). Once you have copied the shortcut onto your Windows folder, you can delete the one on your Desktop.
6. That’s it! From now on, just open the Run dialog box, type ie and hit Enter to open the Internet Explorer.
In this way you can create customized Run commands for any program of your choice. Say “ff” for Firefox, “ym” for Yahoo messenger, “wmp” for Windows media player and so on.
To do this, when you click on “Browse” in the Step-3, just select the target program’s main executable (.exe) file which will usually be located in the C:\Program Files folder. Give a simple and short name for this shortcut as per your choice and copy the shortcut file onto the Windows folder as usual. Now just type this short name in the Run dialog box to open the program.
I hope you like this post! Pass your comments.

Wednesday, November 9, 2011 by Ashif Ismail · 1

Sunday, October 30, 2011

Cell Phone Spy: Software to Spy on Cell Phones


Today, there exists hundreds of cell phone spy softwares on the market, where many of them are nothing more than a crap. Some are good and only a few of them are the best. Also, each SpyPhone software has a different set of features and operating format which makes it hard for novice users (perhaps like you) to make the right choice so as to fit their spying needs.
So, in order to help our readers to find the best spy software, I have decided to give a thorough review of the Top 2 Best Selling SpyPhone softwares on the market.
 
1. Spy Phone GOLD – (TESTED)
 
 
2. Mobile Spy – (TESTED)
 
 
SpyPhone software features
 
SpyPhone GOLD and Mobile Spy are the current leaders in the market which are used by thousands across the globe to spy on cheating spouse, monitor employees and keep an eye on their teens. Here is a complete review of these two products.
 

Read More

Sunday, October 30, 2011 by Ashif Ismail · 18

How to Hide Data in Image, Audio & Video Files: Steganography


Ever wondered to know how to hide secret messages in images, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. At the end of this post, you can also download free stegnographic tools and start hiding your data.

What is Steganography?

Steganography is a means of obscuring data where secret messages are hidden inside computer files such as images, sound files, videos and even executable files so that, no one except the sender and the receiver will suspect the existence of stealth information in it. Steganography may also involve the usage of cryptography where the message is first encrypted before it is concealed in another file. Generally, the messages appear to be something else such as an image, sound or video so that the transfer of secret data remains unsuspected.
The main advantage of steganography over other methods such as cryptography is that, it will not arose suspicion even if the files fall in the hands of a third party. Unlike cryptographic messages, stegnographic messages will no way attract the attention of a third party by themselves. Thus stegnanography has an upper hand over cryptography as it involves both encryption and obscurity.

Read More

by Ashif Ismail · 2

All Rights Reserved Easy Hacks | Blogger Template by Bloggermint