Friday, 21 December 2012

How To Hack Saved Password In Firefox ?


firefox hacks
In my previous post i had posted two tutorials on How to hack google chrome saved password ? and More simple way to hack google chrome saved passworod. In this post i will share with you guys how to view saved password in Mozilla Firefox web browser. This trick can be helpfull if you get your hands on someone computer maybe your friends and he has saved password for certain websites like gmail, facebook,yahoo etc then you can easily view his password with very simple and easy trick that i am going to share today. 

For demonstration purpose i have already saved a fake email password for facebook. But it will work on any website. So lets get started.

How to do ?

1. Open Firefox Web Broweser
2. Then Click on FireFox > Option > Option as shown in below picture
3. Then a POP Up box will appear, In that go to security and click on Show Passwords as show below.
4. Now click on website whose password you want to see ans click on show password as shown in below image. (Note: It will ask for confirmation so click on yes when dialog box appears)

5. Done, You have hacked password of your victim with few simple steps. You can try this at school computer lab if someone have saved their password. 

HACK PASSWORD OF A YAHOO E-MAIL ACCOUNT









TO HACK PASSWORD OF A YAHOO EMAIL ACCOUNT ALL YOU HAVE TO HAVE A SOFTWARE BRUTUS AE2
AND I WILL TELL YOU HOW TO USE BRUTUS AE2 .YOU CAN DOWNLOAD BRUTUS
Click Here ^(http://www.mobilerule.org/free/mobile-tips-tricks/goto/http://www.ziddu.com/download/5946389/brutus-aet2.zip.html)
After Downloading BRUTUS follow these simple steps:-
1.IN THE TARGET AREA OF THE SOFTWARE TYPE IN THE SPACE PROVIDED -Pop.Mail.Yahoo.Com AND ADJUST THE TYPE AS POP3.
2. IN THE CONNECTION OPTIONS MOVE THE CONNECTION AND TIMEOUT BAR TO 10.
3.LEAVE POP3 OPTIONS AS IT IS.
4.IN AUTHENTICATION OPTIONS MARK USE USERNAME AND SINGLE USER.
AND TYPE THE E-MAIL ACCOUNT OF THE PERSON WHOSE PASSWORD YOU WANT TO HACK IN USER FILE
IN PASSCODE SET BRUTUS FORCE
AND A OPTION POPS UP AS RANGE CLICK ON RANGE ADJUST TO ALPHANUMERIC MIN. LENGTH-8 AND MAX. LENGTH 16 TYPE OK
5. NOW AT THE TOP THERE IS START PRESS THAT BUTTON
WITHIN MINUTES YOU WILL GET PASSWORD OF THE USER

Thursday, 29 November 2012

How To Spy A Mobile Phone? - CellPhone Spying Software





Have you ever wanted to spy on your spouse, kids, friends or employees? Or just play ''Secret Service'' 'cause you know, restraining order can only get you so close?! You certainly are in for a treat. Now, you can play make-belief all you want with a software that works just as well.


SpyBubble is a software that allows you to log in from any computer and access any smartphone that it is installed on. Through SpyBubble, you can monitor and supervise any smartphone simply by entering your login username and password.


SpyBubble has the following features that can be very useful in certain situations:


Call Tracking
1. Access call logs and see how many calls were received and answered on the smartphone, how many calls were made on specific numbers, at what time and the duration they lasted.

SMS Tracking
2. Sent and received messages are saved into your SpyBubble account as they are generated, so you can read them even if they are deleted from the smartphone.

GPS Location Tracking
3. Using SpyBubble you can pinpoint the exact position of the phone (and the person using it) via Google Maps.

Phone Book Access
4. Every phone number saved in the smartphone memory can be viewed through SpyBubble.

Email Tracking
5. Incoming and outgoing emails are saved and can be seen via Email Tracking.

URL Tracking
6. SpyBubble let's you view the user's browsing history.

Photo Tracking
7. All photos sent and received on the phone are logged into SpyBubble website where you can view them.

For a detailed list of the smartphones SpyBubble supports, please click here.

How To Download And Install SpyBubble On A Smartphone:


Step 1. Open the Web Browser on your target phone and type in the following address and press Enter.

http://www.spybubble.com/symbian/sbubble.sis


Step 2. The download process will then start.


Step 3. When prompted to install SpyBubble, click on Yes and then on Continue as shown in the following screenshots.


Step 4. After SpyBubble has been installed, you will see the following screen. Switch the phone off and then on.


Step 5. Register your license key as shown below.
To get you license key, go to: SpyBubble Setting Page (you may have to log into the systemfirst) You can also go to the member control panel and click on the Configuration menu to get it.


Step 6: Log in to SpyBubble Login Panel to verify if your account is working flawlessly.

Irresistable Features include:
  • Has GPS tracking.
  • Can spy on text messages.
  • Can get contact book info from phone.
  • Can check out call log.
  • Popular Smart Phones supported.
  • Can be used to back up your own phone’s information.
  • 100% undetectable.
Get your copy of SpyBubble today by Clicking here and let us know if it works for you.

How To Hack Facebook with Project Neptune

Hey Friendz, today i'm going to show you how to hack a facebook account using Project Neptune.
Project Neptune is simply a top tier program in monitoring the Windows OS.  It’s uses are simply undefined and endless – but we’ll try to give you some insight on it.


Project Neptune (1.7 MiB )

Project Neptune includes many features that separate it from other programs and simply make it the best. Each of it,s functions are entirely custom coded and heavily tested.

If you got any problems just tell us!
dont forget to leave commnets behind :)

HOW PROXY SERVER WORKS




  • A Proxy Server is a computer that offers network and internet access services to the client computers in a network. A proxy is a stand-in for you - someone who does something on your behalf. A proxy server is a kind of stand in for your computer. In an enterprise that uses the Internet, a proxy server is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service.

    By using the proxy server you can hide, conceal and make your network id anonymous by hiding your IP address. A proxy server is associated with or part of a gateway server that separates the enterprise network from the outside network and a firewall server that protects the enterprise network from outside intrusion. In short, a Proxy Server can be described as 'A server that sits between a client application, such as a Web browser, and a real server.' To get the anonymous status on the network or Internet, strong intermediate methods are employed like cryptography etc.
    How does Proxy Server works?
    A proxy server receives a request for an Internet service (such as a Web page request) from a user. If it passes filtering requirements, the proxy server, assuming it is also a cache server , looks in its local cache of previously downloaded Web pages. If it finds the page, it returns it to the user without needing to forward the request to the Internet. If the page is not in the cache, the proxy server, acting as a client on behalf of the user, uses one of its own IP addresses to request the page from the server out on the Internet. When the page is returned, the proxy server relates it to the original request and forwards it on to the user. A good example, and the one you probably see the most, is a web proxy. When configured to use a proxy, your web browser contacts the proxy server for each web access instead of going directly to the target server on the internet. The proxy server then turns around and makes the "real" request of the web server. The proxy server gets the response, and then passes it back to you.
    There is a large number of the software available that allows you to hide your IP address with the help of the proxy servers. The well known software for this purpose is Hide IP, Stealth surf, Netconceal, Anonymous surfing, Proxify and Ghost surf. To the user, the proxy server is invisible; all Internet requests and returned responses appear to be directly with the addressed Internet server. (The proxy is not quite invisible; its IP address has to be specified as a configuration option to the browser or other protocol program.)
    Types of Proxy Servers
    Many different types of Proxy Servers are available. Some common types are-
    1. FTP
    2. HTTP
    3. Gopher
    4. IRC
    5. MSN
    6. AIM
    7. ICQ
    8. VOIP
    9. SSL
    Depending on the purpose you can get Proxy Servers to route any of these common protocols, and many more. So out of the common types of Proxy Servers, you end up with the following:
    • FTP Proxy Server:
      Relays and caches FTP Traffic.
    • HTTP Proxy Server:
      A one way request to retrieve Web Pages.
    • Socks Proxy Server:
      A newer protocol to allow relaying of far more different types of data, whether TCP or UDP.
    • NAT Proxy Server:
      This one works a little different, it allows the redirection of all packets without a Program having to support a Proxy Server.

    • SSL Proxy Server:
      An extension was created to the HTTP Proxy Server which allows relaying of TCP data similar to a Socks Proxy Server. This one done mainly to allow encryption of Web Page requests.
    Furthermore, a Proxy Server can be split into another two Categories:
    • Anonymous
      An Anonymous Proxy Server blocks the remote Computer from knowing the identity of the Computer using the Proxy Server to make requests.

    • Transparent
      A Transparent Proxy Server tells the remote Computer the IP Address of your Computer. This provides no privacy.
    Anonymous Proxy Servers can further be broken down into two more categories, Elite and Disguised. An Elite Proxy Server is not identifiable to the remote computer as a Proxy in any way. A Disguised Proxy Server gives the remote computer enough information to let it know that it is a Proxy, however it still does not give away the IP of the Computer it is relaying information for.
    Advantages of Proxy Server
    Improve Performance: Proxy servers can dramatically improve performance for groups of users. This is because it saves the results of all requests for a certain amount of time. Consider the case where both user X and user Y access the World Wide Web through a proxy server. First user X requests a certain Web page, which we'll call Page 1. Sometime later, user Y requests the same page. Instead of forwarding the request to the Web server where Page 1 resides, which can be a time-consuming operation, the proxy server simply returns the Page 1 that it already fetched for user X. Since the proxy server is often on the same network as the user, this is a much faster operation. Real proxy servers support hundreds or thousands of users. The major online services such as America Online, MSN and Yahoo, for example, employ an array of proxy servers. 
    Filter Requests: Proxy servers can also be used to filter requests. For example, a company might use a proxy server to prevent its employees from accessing a specific set of Web sites. 
    Security schemes: Proxy servers can also implement security schemes. For example, an FTP proxy server could be set up to allow files to be sent from the Internet to a computer on the intranet,but to block files from being sent from the corporate network out to the Internet-or vice versa. In this way, intranet administrators can block anyone outside the corporation from downloading vital corporate data. Or they can stop intranet users from downloading files which may contain viruses.
    Logging: A proxy can also do logging.

TOP 5 ANDROID MALWARE IN 2011




According to research conducted by Fortinet, the number of detected Android has risen by as much as 90% this year, compared to 2010.
 The Top 5 malware families for which FortiGuard Labs have received the most samples in 2011 are:
  • Geinimi: Android’s first botnet, which sends a victim’s geographic location and controls his/her phone remotely. For example, Geinimi can force the infected phone to call a given phone number.
  • Hongtoutou: A Trojan live wallpaper that steals private information such as the victim’s subscriber number (IMSI) and automatically visits Websites that the malware directs it to.
  • DroidKungFu: Another botnet that has multiple capabilities such as remotely installing other malware, remotely starting specific applications and adding bookmarks.
  • JiFake: A fake instant messenger application that sends SMS messages to premium phone numbers
  • BaseBridge: A Trojan that sends SMS messages to premium numbers
Malware such as BaseBridge was available on the Android market but was later removed. Oftentimes malicious software tries to pass itself off as a genuine application, although malware has also been found within a legitimate application they have infected.
“DroidKungFu was an example of malware that was found repackaged in a legitimate VPN utility, whereas Geinimi was found within the legitimate application ‘Sex Positions,’” said Karine de Ponteves, malware analyst at Fortinet.
Android Vulnerability
Last month, Jon Larimer and Jon Oberheide unveiled a vulnerability for Android platform 2.3.6 that revealed an easy way for hackers and malicious software developers to gain and exploit root access to an Android device.
“The mobile security trend is a familiar one: as operating systems mature and gain popularity, malware and vulnerabilities follow since there is focus and motivation from cyber criminals,” observed Derek Manky, senior security strategist at Fortinet. “With root access, hackers can gain access to system files and change system settings that are typically authored to be read only. For example, a malware creator with root access to a vulnerable device could silently download and install additional malicious software, such as ransomware, spambots and keyloggers.”

HOW HACKERS GET CAUGHT.






- First stuff that gives you away are "LOGS".
You need to know how events, application, and system logs work. If you dont, you can be easily caught!
The shell history will expose your actions.
Another giveaway is leaving a “:wq” in /var/log/messages or binarys.



- Your laziness will take you into problems.
NEVER HACK FROM HOME! Take your time, and go to net cafe or anywhere else apart from home. Logs will take you down!


- The code that you run on system will take you down. If you compile the code on target, libraries will give you away!


- If your victm, notice, that he is maybe hacked, or something is wrong.. He will ask from his ISP for IP logs, and if you dont use VPN, or if you hack from home, they will hunt you down.


- Thing, that takes you down 100% is BRAGGING. It is common problem of beginning hackers. They like to brag, to earn respect and reputation but NOT KNOWING that is the matter of minutes, hours mby days when they will be caught.
*Don't use hotmail. CIA Owns it.


How To Hack Saved Password In Firefox ?

In my previous post i had posted two tutorials on How to hack google chrome saved password ?  and More simple way to hack google chrom...