<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-1274797730388628240</atom:id><lastBuildDate>Wed, 13 Aug 2025 04:06:27 +0000</lastBuildDate><category>Hacking</category><category>Software Hacking</category><category>Andoid</category><category>Network Hacking</category><category>bot</category><title>Wel Come to The hackers-earth.blogspot.in</title><description>best hacking tricks,network hacking,software hacking</description><link>https://hackers-earth.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>27</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-7167916205055347720</guid><pubDate>Sat, 03 Dec 2016 08:00:00 +0000</pubDate><atom:updated>2016-12-03T00:00:33.858-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">bot</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>adfly bot works with adfocus too</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPoVrYHUL-y1585KvL74Ci5hcLvNftfbGLgEAPXbxmKga4YYJLbg6yHRl2t4VXX90Fguy19ryAz6i8fDdY2KOxi1NkpIS7T0OaE3y_NNoPXQjRdgH7I75nJRLkpLfNStZNlGA-3X3qmJ_e/s1600/%25E2%2599%25A6Adfly+Bot%25E2%2599%25A6+Works+With+Adfocus+too+-+2015+Updated.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="305" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPoVrYHUL-y1585KvL74Ci5hcLvNftfbGLgEAPXbxmKga4YYJLbg6yHRl2t4VXX90Fguy19ryAz6i8fDdY2KOxi1NkpIS7T0OaE3y_NNoPXQjRdgH7I75nJRLkpLfNStZNlGA-3X3qmJ_e/s320/%25E2%2599%25A6Adfly+Bot%25E2%2599%25A6+Works+With+Adfocus+too+-+2015+Updated.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h3 style="background-color: white; clear: both; color: #333333; font-family: &amp;quot;Open Sans&amp;quot;, serif, sans-serif; font-size: 16.8px; font-stretch: normal; font-weight: normal; line-height: normal; margin: 0px; text-align: center;"&gt;
&lt;span style="color: #134f5c; font-size: medium;"&gt;Adfly Bot Works With Adfocus too - 2015 Updated&lt;/span&gt;&lt;/h3&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px;"&gt;
&lt;span style="color: #134f5c; font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px;"&gt;
&lt;span style="color: #134f5c; font-size: medium;"&gt;Here i am providing is the best and only working adf.ly bot which can also works for adfoc.us. just download and boost your earnings for sure.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px;"&gt;
&lt;span style="color: #134f5c; font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px;"&gt;
&lt;span style="color: #134f5c; font-size: medium;"&gt;I am providing free proxy resources too by which you can able to find good HTTP anoymous proxies used bythis awesome bot.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px;"&gt;
&lt;span style="color: #134f5c; font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px;"&gt;
&lt;span style="color: #134f5c; font-size: medium;"&gt;So Here It Is.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px;"&gt;
&lt;span style="color: #134f5c; font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;span style="color: red; font-size: medium;"&gt;&lt;b&gt;DOWNLOAD LINK&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="background-color: white; clear: both; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;a href="http://adf.ly/wX4gZ" rel="nofollow" style="color: #999999; text-decoration: none;" target="_blank"&gt;&lt;img border="0" height="52" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKNEKAEiSjJQxUYoEThcBuE6PobmmfBRB7V7pvR4RCal53hGa3-lU_995d5dk6rD8qAH7uq9-gwgwSgVDCkNHzLgsSQhjAdb9a_4z3pwIvc9m9sFGOY_Df5Nh3Jp2PVWSOvdBx_mXST_A/s1600/Download-now-button.gif" style="border: 1px solid rgb(192, 192, 192); height: auto; max-width: 95%; padding: 4px; transition: all 0.4s ease-in-out;" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="background-color: white; clear: both; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="background-color: white; clear: both; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="background-color: white; clear: both; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="background-color: white; clear: both; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;b&gt;&lt;span style="color: red; font-size: medium;"&gt;&lt;a href="http://www.freepremiumproxies.com/" style="color: #999999; text-decoration: none;" target="_blank"&gt;CLICK THIS FOR HTTP PROXIES&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2016/12/adfly-bot-works-with-adfocus-too.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPoVrYHUL-y1585KvL74Ci5hcLvNftfbGLgEAPXbxmKga4YYJLbg6yHRl2t4VXX90Fguy19ryAz6i8fDdY2KOxi1NkpIS7T0OaE3y_NNoPXQjRdgH7I75nJRLkpLfNStZNlGA-3X3qmJ_e/s72-c/%25E2%2599%25A6Adfly+Bot%25E2%2599%25A6+Works+With+Adfocus+too+-+2015+Updated.jpg" width="72"/><thr:total>2</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-1112791014986540540</guid><pubDate>Sat, 03 Dec 2016 07:57:00 +0000</pubDate><atom:updated>2016-12-02T23:58:23.581-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Backling Power Indexer free download</title><description>&lt;span style="background-color: white; color: #333333; font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , sans-serif; font-size: medium;"&gt;Get Backlink Power Indexer Software Free. Backlink Power Indexer Automatically Creates a Backlink On Many Who Is and Valuation Sites.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #333333; font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="background-color: white; color: #333333; font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , sans-serif; font-size: 12px;"&gt;&lt;/span&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrd2FU7CUWjFMk8Q9PcLbJ9SA31-p7S0E_89ChAgHkn9Yf91s2UC_koc0L0dFl-RpLlknWOdNy8QGaMhquwBkNF8nc6-bYzWAog2Bvq0XMkM8VENf342ReqbNaB8zuR8Ys4EoRLN5rkMNa/s1600/The+Best+Hacking+Tools+Resources+Of+All+Time+-2014+Version.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="243" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrd2FU7CUWjFMk8Q9PcLbJ9SA31-p7S0E_89ChAgHkn9Yf91s2UC_koc0L0dFl-RpLlknWOdNy8QGaMhquwBkNF8nc6-bYzWAog2Bvq0XMkM8VENf342ReqbNaB8zuR8Ys4EoRLN5rkMNa/s320/The+Best+Hacking+Tools+Resources+Of+All+Time+-2014+Version.jpg" width="320" /&gt;&lt;/a&gt;&lt;span style="color: red; font-size: medium;"&gt;&lt;b&gt;SALES PAGE&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;span style="color: red; font-size: medium;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;span style="color: red; font-size: medium;"&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;span style="color: red; font-size: medium;"&gt;&lt;a href="http://www.warriorforum.com/warrior-special-offers-forum/475947-search-engine-optimization-software-one-click-backlink-builder-indexer-software-crazy-dimesale-95-discount.html" style="color: #999999; text-decoration: none;"&gt;http://www.warriorforum.com/warrior-special-offers-forum/475947-search-engine-optimization-software-one-click-backlink-builder-indexer-software-crazy-dimesale-95-discount.html&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;b&gt;&lt;span style="color: red; font-size: medium;"&gt;DOWNLOAD&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;b&gt;&lt;span style="color: red; font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="background-color: white; clear: both; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;a href="http://adf.ly/wfecr" rel="nofollow" style="color: #999999; text-decoration: none;" target="_blank"&gt;&lt;img border="0" height="88" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmKPJ5FNfmuJyUo6amO4ZbnyeMygNZyRekyJoaMsPAS5QEoEUhEOy2dDg87mdOgEzcjHOhTboxegAl6Xb14DEx7L5DJkLM_cZm78Q-e-Rw6Jc5iqGKw0VysMVya1NgTg6OQjMzcTZh-_0/s1600/DownloadButton.png" style="border: 1px solid rgb(192, 192, 192); height: auto; max-width: 95%; padding: 4px; transition: all 0.4s ease-in-out;" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;b&gt;&lt;span style="color: red; font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="background-color: white; border: 0px none; color: #333333; float: none; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px; line-height: 19.5px; list-style: none; margin: 10px 0px; outline: none; padding: 0px; text-align: center;"&gt;
&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2016/12/backling-power-indexer-free-download.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrd2FU7CUWjFMk8Q9PcLbJ9SA31-p7S0E_89ChAgHkn9Yf91s2UC_koc0L0dFl-RpLlknWOdNy8QGaMhquwBkNF8nc6-bYzWAog2Bvq0XMkM8VENf342ReqbNaB8zuR8Ys4EoRLN5rkMNa/s72-c/The+Best+Hacking+Tools+Resources+Of+All+Time+-2014+Version.jpg" width="72"/><thr:total>2</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-6607176364702050209</guid><pubDate>Sat, 03 Dec 2016 07:55:00 +0000</pubDate><atom:updated>2016-12-02T23:55:02.113-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Best Hacking tool Resource </title><description>&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: justify;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYBcoiCTkU0tSDh_mPSVhZXd9Wpeu4khXhKFKdCUIJgX0E2LzkvjxiJoLFiGS-KN1h-5SaypfoSTl56E1CPwfhztqGfVoAB7LR9rwg7vY_64bSEKZQo5oGzcib-ucVg1l0dDXAnzc322gZ/s1600/The+Best+Hacking+Tools+Resources+Of+All+Time+-2014+Version.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="165" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYBcoiCTkU0tSDh_mPSVhZXd9Wpeu4khXhKFKdCUIJgX0E2LzkvjxiJoLFiGS-KN1h-5SaypfoSTl56E1CPwfhztqGfVoAB7LR9rwg7vY_64bSEKZQo5oGzcib-ucVg1l0dDXAnzc322gZ/s320/The+Best+Hacking+Tools+Resources+Of+All+Time+-2014+Version.jpg" width="320" /&gt;&lt;/a&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;The Best Hacking Tools Resources Everyone Have To Have with. This Resource Pack Is Ultimate and Latest Version -2014 and&amp;nbsp;for Those Newbie Hackers Who Don't want to waste their time to searching Forums and other resource sites for your hacking related needs.&lt;/span&gt;&lt;/div&gt;
&lt;span style="background-color: white; color: #333333; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px;"&gt;&lt;/span&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px;"&gt;
&lt;span style="color: #f1c232; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;&lt;b&gt;BEST HACKING FORUMS&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px;"&gt;
&lt;li style="text-align: left;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;&lt;a href="http://hackforums.net/" style="color: #999999; text-decoration: none;"&gt;http://hackforums.net&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: left;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;&lt;a href="http://ubers.org/" style="color: #999999; text-decoration: none;"&gt;http://ubers.org&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: left;"&gt;&lt;a href="http://hackcommunity.com/" style="color: #999999; text-decoration: none;"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;http://hackcommunity.com&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: left;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;&lt;a href="http://xmarks.com/" style="color: #999999; text-decoration: none;"&gt;http://xmarks.com&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: left;"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;&lt;a href="http://forum.xda-developers.com/" style="color: #999999; text-decoration: none;"&gt;http://forum.xda-developers.com&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px;"&gt;
&lt;span style="color: #cc0000; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;&lt;b&gt;BEST HACKING TUTORIAL RESOURCES&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px;"&gt;
&lt;li style="text-align: left;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;&lt;a href="http://best-hacker-tools.blogspot.com/" style="color: #999999; text-decoration: none;"&gt;http://best-hacker-tools.blogspot.com&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: left;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;&lt;a href="http://securitytube.net/" style="color: #999999; text-decoration: none;"&gt;http://securitytube.net&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: left;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;&lt;u&gt;http://netsecurity.about.com/&lt;/u&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: left;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;&lt;a href="http://irongeek.com/" style="color: #999999; text-decoration: none;"&gt;http://irongeek.com&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: left;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;&lt;a href="http://enigmagroup.org/" style="color: #999999; text-decoration: none;"&gt;http://enigmagroup.org&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: left;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;&lt;a href="http://insecure.org/" style="color: #999999; text-decoration: none;"&gt;http://insecure.org&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: left;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;&lt;a href="http://defcon.org/" style="color: #999999; text-decoration: none;"&gt;http://defcon.org&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: left;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;&lt;a href="http://darksite.co.in/" style="color: #999999; text-decoration: none;"&gt;htt&lt;/a&gt;&lt;a href="file:///P://tripwire.com" style="color: #999999; text-decoration: none;"&gt;p://tripwire.com&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style="background-color: white; color: #0b5394; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;&lt;b&gt;BEST BLACKHAT FORUMS&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px;"&gt;
&lt;li&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;http://blackhatworld.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;http://best-blackhatforum.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://seoblackhat.com/" style="color: #999999; text-decoration: none;"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;&lt;span style="line-height: 16px; white-space: nowrap;"&gt;http://seo&lt;/span&gt;&lt;b style="line-height: 16px; white-space: nowrap;"&gt;blackhat&lt;/b&gt;&lt;span style="line-height: 16px; white-space: nowrap;"&gt;.com&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;http://blackhatseo.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;http://blackhat.com&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style="background-color: white; color: #a64d79; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;&lt;b&gt;BEST SECURITY TOOLBOX&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px;"&gt;
&lt;li&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;http://sourceforge.net&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;http://securityxploded.com/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;http://sectools.org/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;http://insecure.org/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;http://scanwith.com/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;http://github.com/&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px;"&gt;
&lt;b style="color: #e69138; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: x-large;"&gt;BEST VULNERABLITY EXPOSURE &amp;amp; EXPLOITS&lt;/b&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cve.mitre.org/" style="color: #999999; text-decoration: none;"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;http://&lt;span style="text-align: center;"&gt;cve.mitre.org&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://securityfocus.com/" style="color: #999999; text-decoration: none;"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;http://&lt;span style="text-align: center;"&gt;securityfocus.com&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://1337day.com/" style="color: #999999; text-decoration: none;"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;http://&lt;span style="text-align: center;"&gt;1337day.com&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://vulnerability-lab.com/" style="color: #999999; text-decoration: none;"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;http://&lt;span style="text-align: center;"&gt;vulnerability-lab.com&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://osvdb.org/" style="color: #999999; text-decoration: none;"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;http://&lt;span style="text-align: center;"&gt;osvdb.org&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://xssed.com/" style="color: #999999; text-decoration: none;"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;http://&lt;span style="text-align: center;"&gt;xssed.com&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;h&lt;a href="http://cvedetails.com/" style="color: #999999; text-decoration: none;"&gt;ttp://&lt;span style="text-align: center;"&gt;cvedetails.com&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;span style="background-color: white; color: purple; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;&lt;b&gt;BEST BUG BOUNTY PROGRAMS&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px;"&gt;
&lt;li&gt;&lt;a href="http://developer.att.com/developer/apiDetailPage.jsp?passedItemId=10700281" style="color: #999999; text-decoration: none;" target="_blank"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;AT &amp;amp; T&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://ssl.apple.com/support/security/" style="color: #999999; text-decoration: none;" target="_blank"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;Apple&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://pages.ebay.com/securitycenter/ResearchersAcknowledgement.html" style="color: #999999; text-decoration: none;" target="_blank"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;Ebay&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.facebook.com/whitehat/bounty/" style="color: #999999; text-decoration: none;" target="_blank"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;Facebook&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.google.com/about/company/rewardprogram.html" style="color: #999999; text-decoration: none;" target="_blank"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;Google&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.mozilla.org/security/bug-bounty.html" style="color: #999999; text-decoration: none;" target="_blank"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;Mozilla&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.microsoft.com/security/msrc/report/bountyprograms.aspx" style="color: #999999; text-decoration: none;" target="_blank"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;Microsoft&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.paypal.com/us/webapps/mpp/security/reporting-security-issues" style="color: #999999; text-decoration: none;" target="_blank"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;Paypal&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.rediff.com/w3c/policy.html" style="color: #999999; text-decoration: none;" target="_blank"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;Rediff&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://code.reddit.com/wiki/help/whitehat" style="color: #999999; text-decoration: none;" target="_blank"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;Reddit&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/about/security" style="color: #999999; text-decoration: none;" target="_blank"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;Twitter&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://security.yahoo.com/reporting-security-issues-yahoo-000000016.html" style="color: #999999; text-decoration: none;"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;Yahoo&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://company.zynga.com/security/whitehats" style="color: #999999; text-decoration: none;"&gt;&lt;span style="color: black; font-family: &amp;quot;Trebuchet MS&amp;quot;, sans-serif; font-size: medium;"&gt;Zyanga&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</description><link>https://hackers-earth.blogspot.com/2016/12/best-hacking-tool-resource.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYBcoiCTkU0tSDh_mPSVhZXd9Wpeu4khXhKFKdCUIJgX0E2LzkvjxiJoLFiGS-KN1h-5SaypfoSTl56E1CPwfhztqGfVoAB7LR9rwg7vY_64bSEKZQo5oGzcib-ucVg1l0dDXAnzc322gZ/s72-c/The+Best+Hacking+Tools+Resources+Of+All+Time+-2014+Version.jpg" width="72"/><thr:total>2</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-2395563891965134265</guid><pubDate>Sat, 03 Dec 2016 07:15:00 +0000</pubDate><atom:updated>2016-12-02T23:15:11.445-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><title>free bitcoin bot earn bitcoins without mining</title><description>&lt;div class="separator" style="background-color: white; clear: both; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyeB-cmm7itwb5S6KaScnSQqnxe9Su6Uq2Drb_qepF1NMhPo0TPadye1JtyJWadgSAlKU32gZyA57sCwo4c2F5m0yct5lWJtf3hyphenhyphenPxFPsW6A1FTIo6ezoBng89gVdphnmPa7WS6nd_Yho/s1600/Freebitco.in+Bot+%5BEarn+Bitcoins+without+Mining%5D1.jpg" imageanchor="1" style="color: #999999; margin-left: 1em; margin-right: 1em; text-decoration: none;"&gt;&lt;img alt="Free bitcoin Bot [Earn Bitcoins without Mining]" border="0" height="201" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyeB-cmm7itwb5S6KaScnSQqnxe9Su6Uq2Drb_qepF1NMhPo0TPadye1JtyJWadgSAlKU32gZyA57sCwo4c2F5m0yct5lWJtf3hyphenhyphenPxFPsW6A1FTIo6ezoBng89gVdphnmPa7WS6nd_Yho/s1600/Freebitco.in+Bot+%5BEarn+Bitcoins+without+Mining%5D1.jpg" style="border: 1px solid rgb(192, 192, 192); height: auto; max-width: 95%; padding: 4px; transition: all 0.4s ease-in-out;" title="Free bitcoin Bot [Earn Bitcoins without Mining]" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px;" /&gt;
&lt;div class="separator" style="background-color: white; clear: both; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQyL3gM8xJXk7NChAdsL66rzqC5KVT56iUqgkiEdzGGJGTFd4pk1lrbSL14Nh9hc1NPPljCoxG_DkeYx_ouxlbH7Op7xRH12O8M7smrvSX49ZNN7wHnKAIXEZZmF2n7PTc8lkS009ym3k/s1600/Freebitco.in+Bot+%5BEarn+Bitcoins+without+Mining%5D2.jpg" imageanchor="1" style="color: #999999; margin-left: 1em; margin-right: 1em; text-decoration: none;"&gt;&lt;img alt="Free bitcoin Bot [Earn Bitcoins without Mining]" border="0" height="201" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQyL3gM8xJXk7NChAdsL66rzqC5KVT56iUqgkiEdzGGJGTFd4pk1lrbSL14Nh9hc1NPPljCoxG_DkeYx_ouxlbH7Op7xRH12O8M7smrvSX49ZNN7wHnKAIXEZZmF2n7PTc8lkS009ym3k/s1600/Freebitco.in+Bot+%5BEarn+Bitcoins+without+Mining%5D2.jpg" style="border: 1px solid rgb(192, 192, 192); height: auto; max-width: 95%; padding: 4px; transition: all 0.4s ease-in-out;" title="Free bitcoin Bot [Earn Bitcoins without Mining]" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px;" /&gt;
&lt;div class="separator" style="background-color: white; clear: both; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUvHbGGpzC8XCa2uQwtsGJ2VvdYUoewBfpDZzazjqlmHjhW2C3mhWhCa9tKNkaJjUG9a5_Zcj7P1yA11fzNdvJ0C23ROWJipRErvr3IHm-SCtpo7Kpiwt8YAz17-sbUcbBskt7r-udYe0/s1600/Freebitco.in+Bot+%5BEarn+Bitcoins+without+Mining%5D3.jpg" imageanchor="1" style="color: #999999; margin-left: 1em; margin-right: 1em; text-decoration: none;"&gt;&lt;img alt="Free bitcoin Bot [Earn Bitcoins without Mining]" border="0" height="201" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUvHbGGpzC8XCa2uQwtsGJ2VvdYUoewBfpDZzazjqlmHjhW2C3mhWhCa9tKNkaJjUG9a5_Zcj7P1yA11fzNdvJ0C23ROWJipRErvr3IHm-SCtpo7Kpiwt8YAz17-sbUcbBskt7r-udYe0/s1600/Freebitco.in+Bot+%5BEarn+Bitcoins+without+Mining%5D3.jpg" style="border: 1px solid rgb(192, 192, 192); height: auto; max-width: 95%; padding: 4px; transition: all 0.4s ease-in-out;" title="Free bitcoin Bot [Earn Bitcoins without Mining]" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="background-color: white; clear: both; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style="background-color: white; clear: both; color: #333333; font-family: &amp;quot;Open Sans&amp;quot;, serif, sans-serif; font-size: 16.8px; font-stretch: normal; font-weight: normal; line-height: normal; margin: 0px; text-align: center;"&gt;
&lt;span style="color: #b45f06; font-size: medium;"&gt;Free bitcoin Bot [Earn Bitcoins without Mining]&lt;/span&gt;&lt;/h3&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px;"&gt;
&lt;span style="color: #b45f06; font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;span style="font-size: medium;"&gt;Earn free bitcoins like a boos. her i am presenting is an amazing bot which are fully automated and help you in getting free bitcoins. so don't waste your time just download this awesome bot for free.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;span style="color: #b45f06; font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;span style="color: red; font-size: medium;"&gt;&lt;b&gt;DOWNLOAD LINK&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;span style="color: red; font-size: medium;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="background-color: white; clear: both; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; text-align: center;"&gt;
&lt;a href="http://adf.ly/wX9fD" rel="nofollow" style="color: #999999; text-decoration: none;" target="_blank"&gt;&lt;img border="0" height="52" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhr2jvF4pZe-fqqGFEASAh-biZM-nUFxJbRXH43fJZuVtbPd4JXGIoEFEh2Y5hZQzqVFJp5NB6clmRclaEXZHn1lwcPLQv7cmw9C4DztE2zJOGZ1c5AGQNfWZOE6GMPIf4COBzTeAlGJFQ/s1600/Download-now-button.gif" style="border: 1px solid rgb(192, 192, 192); height: auto; max-width: 95%; padding: 4px; transition: all 0.4s ease-in-out;" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2016/12/free-bitcoin-bot-earn-bitcoins-without.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyeB-cmm7itwb5S6KaScnSQqnxe9Su6Uq2Drb_qepF1NMhPo0TPadye1JtyJWadgSAlKU32gZyA57sCwo4c2F5m0yct5lWJtf3hyphenhyphenPxFPsW6A1FTIo6ezoBng89gVdphnmPa7WS6nd_Yho/s72-c/Freebitco.in+Bot+%5BEarn+Bitcoins+without+Mining%5D1.jpg" width="72"/><thr:total>2</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-2934876026989669066</guid><pubDate>Tue, 05 Apr 2016 16:54:00 +0000</pubDate><atom:updated>2016-12-02T23:38:04.228-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><title>Top 10 Best Android SmartPhones For Selfie 2016</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h1 class="entry-title" style="background-color: white; border: 0px; color: #333333; font-stretch: inherit; font-weight: normal; line-height: 1.2; margin: 0px; outline: 0px; padding: 5px 0px 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;"&gt;Top 10 Best Android Smart Phones For&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large; line-height: 1.2;"&gt;Selfie&lt;/span&gt;&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large; line-height: 1.2;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large; line-height: 1.2;"&gt;2016&lt;/span&gt;&lt;/h1&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://www.besthackingtricks.com/wp-content/uploads/2016/03/selfie-phones-2016.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;center&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/center&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;So
 Here mukeshtricks4u brings you best and top Best selfie Android mobiles
 of 2016. About every phone that is launched now will have a camera 
module as the companies know the value of it in their sales.Camera is 
the second most reason for the sale of any smartphone after its software
 and hardware.People love to take selfies with the front cameras from 
their phones.Keeping that in mind the list given below has been created 
of the phones that packs the best class front cameras hence called 
selfie phones.&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;"&gt;Top 10 Best Selfie Android Phones 2016&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;1) Huawei Honor 7&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;It
 packs a huge primary camera module i.e 20 MP with a dual-LED flash and 
the secondary camera of 8 MP sensor with LED flash.The main feature of 
this phone is that it has LED flash with front camera too that makes it a
 great cameraphone for selfies.The quality of both the cameras is very 
good,overall it is the best cameraphone too.&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;2) Motorola Moto X pure edition&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;The
 stock android running giant that packs in quality hardware that 
includes quad HD panel,stereo speakers,hexa-core snapdragon 808 chip,3GB
 ram etc,but the main feature that makes it the best selfie phone is its
 camera modules that are 21 MP primary camera and 5 Mp secondary camera 
units.It performs very well in case of photo shooting and for selfies 
also.&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;3) HTC Desire EYE&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;There
 are just very few devices that manages to retain their place in the 
list of the best camera phone and Htc Desire Eye is the one that leads 
all of them.This could be called the selfie flagship of camera phones as
 it consists of all about same camera sensors at both front and rear 
sides and both provides exceptional experience in case of photo 
shooting.&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;4) Sony Xperia c4&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;center&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;


&lt;/span&gt;&lt;/center&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;We
 know that the Sony leads the market in case of its cameras and also in 
race of smartphone cameras too.Here is the another product Sony Xperia 
c4 that packs a sony made 5 MP Exmor RS and LED flash-toting selfie cam 
that performs really well.You can consider to buy it as it is a very 
stylish phone that was made keeping the still photography in mind by the
 company.&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;5) Sony Xperia C5 Ultra&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;Although
 slightly cheaper than Sony Xperia c4 it is a 6 inches phablet with 
about 1 inch bigger screen.It evolves a pair of identical 13 MP 
cams,featuring everything from Exmor RS to autofocus,wide angle lenses 
and superior auto modes.Because it have great camera sensors,it is 
therefore one of the best selfie phones.&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;6) Asus Zenfone Selfie&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;This
 5.5 inch screened phablet has a duo of 13 MP snapers and dual-LED flash
 too on both front and back.With all other great features like 1080p 
screen,octa-core processor,3 GB ram and 32 GB ROM this device is surely 
the best that could buy.Including many features this phone is great 
selfie expert too.&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;7) Samsung Galaxy J7&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;With
 great hardware combination this phone excells in case of selfie 
photoshooting.With its great camera module on the front panel you can 
create best selfies as it is 5 MP camera with LED flash too.It also has 
great software support by samsung in the camera app that gives its best 
to just make the great performance.&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;8) Sony Xperia C3&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;Large
 screen phablet that consists of 5.5 inch screen is also endorsed by 5 
MP secondary cam that is also furnished with a soft LED flash,smile 
detection and Superior Auto functions.The camera in the front is great 
with some more features like 25mm wide-angle lens at 80 degrees that is 
great for taking selfies.&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;9) Samsung Galaxy J5&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;The
 smaller model of J7 is surprisingly is not that great although it is a 
decent smartphone for those who just wants 13 MP camera module at the 
rear and a 5 MP shooter at the front that do performs decent in such a 
price range.Both front and back cameras has a LED flash combined to it.&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;10) Blu Selfie&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;The
 most affordable smartphone in the list has a very good camera module 
attached to its hardware.It has the astounding 13 MP LED Flash camera at
 its front and the same type of module on its rear that is just a great 
deal in such a price range.You also get some great software and hardware
 features packed on this device.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2016/04/top-10-best-android-smartphones-for.html</link><thr:total>1</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-4404292980277435329</guid><pubDate>Tue, 05 Apr 2016 16:53:00 +0000</pubDate><atom:updated>2016-12-02T23:16:23.111-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Hack Facebook Account By Cookie Stealing And Session Hijacking Wiith Wireshark 2016 </title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="background-color: white; border: 0px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: medium;"&gt;&lt;span style="line-height: 21.0079px;"&gt;&lt;b&gt;Hack Facebook Account By Cookie Stealing And Session Hijacking Wiith Wireshark&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;strong style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;Wireshark Software to capture cookies:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;Wireshark
 is the best free packet sniffer software available today. Actually, it 
was developed for making a network secure. But, the same software is now
 used by hackers to test for vulnerability and security loopholes in the
 network and to attack the network accordingly. Cookie stealing being 
one of the types of hacks implemented using this Wireshark software.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.gohacking.com/wp-content/uploads/2013/01/hack-facebook-password-735x400.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="hack-facebook-password-735x400" border="0" height="348" src="http://www.gohacking.com/wp-content/uploads/2013/01/hack-facebook-password-735x400.jpg" title="hack-facebook-password-735x400" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;Requirements:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: medium;"&gt;&lt;strong style="border: 0px; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;strong style="border: 0px; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Cain and Abel :&lt;/strong&gt;&amp;nbsp;&lt;a href="http://www.oxid.it/cain.html" style="border: 0px; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;http://www.oxid.it/cain.html&lt;/a&gt;&lt;br /&gt;
&lt;strong style="border: 0px; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Wireshark :&lt;/strong&gt;&amp;nbsp;&lt;a href="http://www.wireshark.org/" style="border: 0px; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;http://www.wireshark.org/&lt;/a&gt;&lt;br /&gt;
&lt;strong style="border: 0px; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Firefox 3&lt;/strong&gt;&amp;nbsp;(or one compatable with add n edit) :&amp;nbsp;&lt;a href="http://www.oldapps.com/firefox.php?old_firefox=59" style="border: 0px; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;http://www.oldapps.com/firefox.php?old_firefox=59&lt;/a&gt;&lt;br /&gt;
&lt;strong style="border: 0px; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Add n Edit&lt;/strong&gt;&amp;nbsp;(cookie editor for firefox) :&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/add-n-edit-cookies/" style="border: 0px; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;https://addons.mozilla.org/en-US/firefox/addon/add-n-edit-cookies/&lt;/a&gt;&lt;br /&gt;
Acess to the network with user you want to hack&lt;br /&gt;
Network traffic&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;strong style="border: 0px; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Prerequisites&lt;/strong&gt;:&amp;nbsp;Download
 and install all above programs. To add “Add n Edit” to your browser 
just open firefox, go to tools, then click add-ons. you can drag and 
drop the program from wherever you saved it into the little box that 
popped up and install it from there.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;Below, I have listed steps on how to capture Facebook and other accounts cookies. This will help you to know how&amp;nbsp;&lt;strong style="border: 0px; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Wireshark&lt;/strong&gt;&amp;nbsp;and&amp;nbsp;&lt;strong style="border: 0px; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Cain-Abel&lt;/strong&gt;&amp;nbsp;can be used to sniff packets and capture cookies.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: black; font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: medium;"&gt;&lt;b&gt;&lt;a href="http://adf.ly/123885/" name="more" style="border: 0px; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: black; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;strong style="border: 0px; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;First:&amp;nbsp;&lt;/strong&gt;Gain
 acess to the Network. Open networks or your own network would be easy 
but if you have a specific slave you want you should be able to gain 
acess using Backtrack.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;strong style="border: 0px; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Tip:&lt;/strong&gt;&amp;nbsp;use reaver to exploit WPS for WPA/WPA2 encryptions, WEPs are easy to crack given time and OPN means there is no password.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;strong style="border: 0px; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Second:&amp;nbsp;&lt;/strong&gt;Right
 click Cain and choose ‘run as administrator.’ on the top bar go to 
‘configure’ and be sure to select your wireless card/adapter. now click 
where it says ‘Sniffer’ then this litte button towards the top left:&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: black; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;img alt="2c516-facebook2bhacking2busing2bcookies2bstealing2bwildhacker" border="0" height="340" src="https://geeksincorporated.files.wordpress.com/2012/05/2c516-facebook2bhacking2busing2bcookies2bstealing2bwildhacker.png?w=550&amp;amp;h=340" style="border-radius: 5px; border: none; box-shadow: rgb(171, 171, 171) 0px 1px 2px; height: auto; margin: 1em 1em 1em 0px; max-width: 100%; padding: 4px; transition: all 0.4s ease-in-out;" title="2c516-facebook2bhacking2busing2bcookies2bstealing2bwildhacker" width="550" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;Next click any empty white box then the blue “+” symbol near the button you pressed just before. choose okay&lt;br /&gt;
should look like this:&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: black; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;img alt="23534-facebook2bhacking2busing2bcookies2bstealing2bwildhacker" border="0" height="340" src="https://geeksincorporated.files.wordpress.com/2012/05/23534-facebook2bhacking2busing2bcookies2bstealing2bwildhacker.png?w=550&amp;amp;h=340" style="border-radius: 5px; border: none; box-shadow: rgb(171, 171, 171) 0px 1px 2px; height: auto; margin: 1em 1em 1em 0px; max-width: 100%; padding: 4px; transition: all 0.4s ease-in-out;" title="23534-facebook2bhacking2busing2bcookies2bstealing2bwildhacker" width="550" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;These are all the devices it was able to detect.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;Now
 we go to APR on the bottom bar. Once again click any empty white box 
then the blue cross. It’s easiest to just go one by one and choose all 
possibilities.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: black; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;img alt="3b606-facebook2bhacking2busing2bcookies2bstealing2bwildhacker" border="0" height="340" src="https://geeksincorporated.files.wordpress.com/2012/05/3b606-facebook2bhacking2busing2bcookies2bstealing2bwildhacker.png?w=550&amp;amp;h=340" style="border-radius: 5px; border: none; box-shadow: rgb(171, 171, 171) 0px 1px 2px; height: auto; margin: 1em 1em 1em 0px; max-width: 100%; padding: 4px; transition: all 0.4s ease-in-out;" title="3b606-facebook2bhacking2busing2bcookies2bstealing2bwildhacker" width="550" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;Now we have to poison them so we choose the little yellow hazard symbol towards the top left. should now look like this:&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: black; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;img alt="b9b36-facebook2bhacking2busing2bcookies2bstealing2bwildhacker" border="0" height="340" src="https://geeksincorporated.files.wordpress.com/2012/05/b9b36-facebook2bhacking2busing2bcookies2bstealing2bwildhacker.png?w=550&amp;amp;h=340" style="border-radius: 5px; border: none; box-shadow: rgb(171, 171, 171) 0px 1px 2px; height: auto; margin: 1em 1em 1em 0px; max-width: 100%; padding: 4px; transition: all 0.4s ease-in-out;" title="b9b36-facebook2bhacking2busing2bcookies2bstealing2bwildhacker" width="550" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;we are done here, just minimize Cain for now.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;strong style="border: 0px; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Third:&lt;/strong&gt;&amp;nbsp;Run
 wireshark as administrator. On the top bar choose ‘Capture’ then 
‘Interfaces.’ Here you will have to choose your interface that is 
connected to the Network we are sniffing from. if you wait a few seconds
 you might see some traffic being collected as seen in my photo, just 
choose that interface b/c thats most likely it.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: black; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;img alt="b46a1-facebook2bhacking2busing2bcookies2bstealing2bwildhacker" border="0" height="340" src="https://geeksincorporated.files.wordpress.com/2012/05/b46a1-facebook2bhacking2busing2bcookies2bstealing2bwildhacker.png?w=550&amp;amp;h=340" style="border-radius: 5px; border: none; box-shadow: rgb(171, 171, 171) 0px 1px 2px; height: auto; margin: 1em 1em 1em 0px; max-width: 100%; padding: 4px; transition: all 0.4s ease-in-out;" title="b46a1-facebook2bhacking2busing2bcookies2bstealing2bwildhacker" width="550" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;Wireshark
 will list and color-code all the traffic it sees for you. To make this 
simpler we can use the filter to only see the traffic we want, Type 
“http.cookie” in the filter. (Something to consider is to just filter to
 “http” and scroll through the entries looking for ones that start with 
the word “POST” this means that information was submitted to the webpage
 noted such as a username and a password! so if you see this just look 
through the details and you should see the info you want, most passwords
 will be hashed but use this site to decript them:&lt;a href="http://www.md5decrypter.co.uk/" rel="nofollow" style="border: 0px; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;http://www.md5decrypter.co.uk/&lt;/a&gt;&amp;nbsp;)&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br /&gt;&lt;center&gt;


&lt;/center&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;Here is an image:&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: black; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;img alt="b1dc4-facebook2bhacking2busing2bcookies2bstealing2bwildhacker" border="0" height="340" src="https://geeksincorporated.files.wordpress.com/2012/05/b1dc4-facebook2bhacking2busing2bcookies2bstealing2bwildhacker.png?w=550&amp;amp;h=340" style="border-radius: 5px; border: none; box-shadow: rgb(171, 171, 171) 0px 1px 2px; height: auto; margin: 1em 1em 1em 0px; max-width: 100%; padding: 4px; transition: all 0.4s ease-in-out;" title="b1dc4-facebook2bhacking2busing2bcookies2bstealing2bwildhacker" width="550" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;You
 can either look through this information manually or use the search 
function to find what you want. In my case i want to hijack the session 
of a user on the forum&lt;span class="skimlinks-unlinked" style="border: 0px; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;freerainbowtables.com&lt;/span&gt;&amp;nbsp;so
 i will use the search function (press Ctrl+F, or go to edit -&amp;gt; 
search) and type in the information i know for sure will be in the 
entry. if your hijacking someones facebook put ‘facebook’ there. Most of
 the time to be safe i do not use the first entry i see b/c this will 
only work if the person is auto logged in, so just go down a few more 
until you see one you think will work (just use common sense).&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: black; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;img alt="a9806-facebook2bhacking2busing2bcookies2bstealing2bwildhacker" border="0" height="340" src="https://geeksincorporated.files.wordpress.com/2012/05/a9806-facebook2bhacking2busing2bcookies2bstealing2bwildhacker.png?w=550&amp;amp;h=340" style="border-radius: 5px; border: none; box-shadow: rgb(171, 171, 171) 0px 1px 2px; height: auto; margin: 1em 1em 1em 0px; max-width: 100%; padding: 4px; transition: all 0.4s ease-in-out;" title="a9806-facebook2bhacking2busing2bcookies2bstealing2bwildhacker" width="550" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;center&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/center&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;What
 we need are the cookies. Here are what mine look like and how to get 
there. With practice you will be able to tell which cookies are used for
 logins and be able to limit failed attempts.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: black; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;img alt="ed87e-facebook2bhacking2busing2bcookies2bstealing2bwildhacker" border="0" height="340" src="https://geeksincorporated.files.wordpress.com/2012/05/ed87e-facebook2bhacking2busing2bcookies2bstealing2bwildhacker.png?w=550&amp;amp;h=340" style="border-radius: 5px; border: none; box-shadow: rgb(171, 171, 171) 0px 1px 2px; height: auto; margin: 1em 1em 1em 0px; max-width: 100%; padding: 4px; transition: all 0.4s ease-in-out;" title="ed87e-facebook2bhacking2busing2bcookies2bstealing2bwildhacker" width="550" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;Copy
 the cookies as value and save them into a notepad (shown in pic above).
 I would suggest to seperate everywhere you see a “;” bc this suggests 
that is the begining of the next entry. The text to the left of the = is
 the name of the cookie and the text to the right is its value.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;strong style="border: 0px; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Final:&amp;nbsp;&lt;/strong&gt;Open
 up your firefox browser with Add n Edit enabled. You can get to your 
add ons by going to tools and they should all be listed in the drop down
 tab. First go to the website you are hijjacking the session from then 
open your cookie editor. Should look something like this:&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: black; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;img alt="cd34b-facebook2bhacking2busing2bcookies2bstealing2bwildhacker" border="0" height="340" src="https://geeksincorporated.files.wordpress.com/2012/05/cd34b-facebook2bhacking2busing2bcookies2bstealing2bwildhacker.png?w=550&amp;amp;h=340" style="border-radius: 5px; border: none; box-shadow: rgb(171, 171, 171) 0px 1px 2px; height: auto; margin: 1em 1em 1em 0px; max-width: 100%; padding: 4px; transition: all 0.4s ease-in-out;" title="cd34b-facebook2bhacking2busing2bcookies2bstealing2bwildhacker" width="550" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;The
 last thing to do is to change your cookies to match the ones you 
captured. If the cookies given to you by the site expire (like the ones 
in my picture do) you will have to delete them and add all the ones we 
captured earlier in. if they do not expire you can just edit them. 
Bottom line is all the cookies must match the cookies you captures in 
the earlier steps EXACTLY! Make sure you do not add any extras and that 
you did not miss anything. Also all fields must be filled in (Path and 
Domain as well as Name and Value). My path is “/” and my domain is “.&lt;span class="skimlinks-unlinked" style="border: 0px; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;freerainbowtables.com&lt;/span&gt;”&lt;br /&gt;
mine looks like this:&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: black; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;img alt="b645b-facebook2bhacking2busing2bcookies2bstealing2bwildhacker" border="0" height="340" src="https://geeksincorporated.files.wordpress.com/2012/05/b645b-facebook2bhacking2busing2bcookies2bstealing2bwildhacker.png?w=550&amp;amp;h=340" style="border-radius: 5px; border: none; box-shadow: rgb(171, 171, 171) 0px 1px 2px; height: auto; margin: 1em 1em 1em 0px; max-width: 100%; padding: 4px; transition: all 0.4s ease-in-out;" title="b645b-facebook2bhacking2busing2bcookies2bstealing2bwildhacker" width="550" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; line-height: 21.0079px; margin-bottom: 1.154em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;You
 are now done, Just close the cookie editor and reload the webpage. If 
done correctly with the correct cookies you should be logged in as the 
user you attacked!&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2016/04/hack-facebook-account-by-cookie.html</link><thr:total>2</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-3452517837079434121</guid><pubDate>Tue, 05 Apr 2016 16:51:00 +0000</pubDate><atom:updated>2016-12-02T23:16:23.098-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Download Backtrack 5r3 Free - Latest (32 &amp; 64 Bit)</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="border: 0px; box-sizing: border-box; color: #444444; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;span style="font-weight: inherit;"&gt;If You are here to&amp;nbsp;&lt;/span&gt;&lt;span style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Download Backtrack 5r3 Free - Latest (32 &amp;amp; 64 Bit)&lt;/span&gt;&lt;span style="font-weight: inherit;"&gt;&amp;nbsp;So, You are Landed at Right Webpage because here we Discuss all BackTrack 5 R3 and Below we also Share the Direct&lt;/span&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="background-color: transparent; line-height: 26px; text-align: left;"&gt;&lt;span style="color: #444444; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;b&gt;Download Backtrack 5r3 Free - Latest (32 &amp;amp; 64 Bit)&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="background-color: white; border: 0px; box-sizing: border-box; font-stretch: inherit; margin: 0px 0px 2.6rem; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
&lt;span style="background-color: transparent; line-height: 26px; text-align: left;"&gt;&lt;span style="color: #444444; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;b style="color: #333333; font-family: 'helvetica neue', arial, helvetica, sans-serif; font-size: small; line-height: 20.3125px; text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; box-sizing: border-box; color: #444444; font-stretch: inherit; line-height: 26px; margin: 0px 0px 2.6rem; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;span style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;BackTrack 5 R3&lt;/span&gt;&amp;nbsp;is
 one of the Most Powerful Linux Distribution used for Penetration and 
Find Loopholes in Websites, Software and Application. Basically, it is 
Based on GNOME Linux Distribution and Include many of Top used Security 
Tools Like MetaSploit, Wireshark,&amp;nbsp;&lt;a class="zem_slink" href="http://en.wikipedia.org/wiki/Aircrack-ng" rel="wikipedia" style="border: 0px; box-sizing: border-box; color: #303030; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; transition: all 0.25s; vertical-align: baseline;" title="Aircrack-ng"&gt;AirCrack&lt;/a&gt;,
 Nmap and other Digital Forensic Tools. BackTrack 5 R3 is Developed by 
Offensive Securities and Soon They are Stop BackTrack Linux Series. The 
Last Edition of this Operating System is BackTrack 5 R3 and Further They
 Starting a new Project that is also a Newest Version of This Operating 
System Known as Kali Linux. It is the Successor of Backtrack 5 R3 and 
Include all the Tools that you have in BackTrack 5 R3. BackTrack is also
 Found as Best Operating System Used by&amp;nbsp;&lt;/span&gt;&lt;span style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Hackers&lt;/span&gt;&lt;span style="border: 0px; box-sizing: border-box; color: #333333; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="background-color: white; border-collapse: collapse; border-spacing: 0px; border: 1px solid rgb(238, 238, 238); box-sizing: border-box; color: #444444; font-stretch: inherit; height: auto; line-height: 25.5px; margin-left: auto; margin-right: auto; margin-top: 1.5em; max-width: 100%; padding: 4px; position: relative; text-align: center; vertical-align: baseline; width: 679px;"&gt;&lt;tbody style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;tr style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;td style="-webkit-user-select: text; border: none; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 8px; vertical-align: top;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-UkDZJ48Rae8xDykndjJSB7Kh7L7jFt_jk93L6nacZ0zdsmBhahfV2XE1nh2yQtgrpSkZWHaGbmfzklH8z_90P4gQj3fYbLxpaSCt5kVjF9k-Vj6ebOcjR1k-qwqYJci6d99DT22qI586/s1600/result.jpg" style="border: 0px; box-sizing: border-box; color: #444444; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px auto; outline: none; padding: 0px; text-decoration: none; transition: all 0.25s; vertical-align: baseline;"&gt;&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;img alt="result" border="0" height="356" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-UkDZJ48Rae8xDykndjJSB7Kh7L7jFt_jk93L6nacZ0zdsmBhahfV2XE1nh2yQtgrpSkZWHaGbmfzklH8z_90P4gQj3fYbLxpaSCt5kVjF9k-Vj6ebOcjR1k-qwqYJci6d99DT22qI586/s640/result.jpg" style="background: rgb(250, 250, 250); border: 0px; box-shadow: rgba(0, 0, 0, 0.0196078) 0px 0px 0px 1px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 0px auto 2px; max-width: 100%; opacity: 1; outline: none; padding: 0px; position: relative; transition: all 0.6s ease; vertical-align: middle;" title="result" width="640" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;td class="tr-caption" style="-webkit-user-select: text; border: none; box-sizing: border-box; font-stretch: inherit; margin: 0px; padding: 8px; vertical-align: top;"&gt;&lt;span style="color: #666666; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;Download Backtrack 5r3 Free - Latest (32 &amp;amp; 64 Bit)&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #444444; line-height: 25.5px; margin: 0px; padding: 0px;" /&gt;&lt;/span&gt; &lt;br /&gt;
&lt;div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: #444444; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 26px; margin: 0px 0px 2.6rem; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
&lt;span style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;span style="font-weight: inherit;"&gt;There are Millions of Security Researchers (White Hat)&amp;nbsp;who use &lt;/span&gt;&lt;b&gt;BackTrack 5 R3&lt;/b&gt;&lt;span style="font-weight: inherit;"&gt;
 for Digital Forensics, Testing Systems, Networks and Other Penetration 
work. But On the Other Hand, It is also the Favourite Operating System 
Picked by Hackers because of their Tools and Features. Hackers and 
Crackers use this Operating System, not For Testing Instead to Breaking 
Systems, Cracking Passwords, Hacking Accounts and other Notorious Work. 
BackTrack have all the Deadly Tools and Programs that you need to Break 
the Digital Systems. The Last Edition of BackTrack 5 R3 is released on 
August 13, 2012. After that, They Start Project Kali.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: #444444; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 26px; list-style-position: outside; margin: 0px 0px 2.6rem 4rem; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.5; list-style-type: disc; margin: 0px 0px 0.25em; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; box-sizing: border-box; color: purple; display: block; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 10px; padding: 5px 8px; position: relative; transition: all 0.3s; vertical-align: baseline;"&gt;&lt;span style="border: 0px; box-sizing: border-box; display: block; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.2; margin: 0px 0px 10px; padding: 5px 8px; position: relative; text-align: justify; transition: all 0.3s; vertical-align: baseline;"&gt;&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;Features of BackTrack 5&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;R3:&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: #444444; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 26px; list-style-position: outside; margin: 0px 0px 2.6rem 4rem; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.5; list-style-type: disc; margin: 0px 0px 0.25em; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;&lt;span style="border: 0px; box-sizing: border-box; display: block; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 10px; padding: 5px 8px; position: relative; transition: all 0.3s; vertical-align: baseline;"&gt;&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;Available in Different Flavours.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.5; list-style-type: disc; margin: 0px 0px 0.25em; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;&lt;span style="border: 0px; box-sizing: border-box; display: block; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 10px; padding: 5px 8px; position: relative; transition: all 0.3s; vertical-align: baseline;"&gt;&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;Include all Hacking Tools.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.5; list-style-type: disc; margin: 0px 0px 0.25em; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;&lt;span style="border: 0px; box-sizing: border-box; display: block; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 10px; padding: 5px 8px; position: relative; transition: all 0.3s; vertical-align: baseline;"&gt;&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;Preinstalled Digital Forensics.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.5; list-style-type: disc; margin: 0px 0px 0.25em; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;&lt;span style="border: 0px; box-sizing: border-box; display: block; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 10px; padding: 5px 8px; position: relative; transition: all 0.3s; vertical-align: baseline;"&gt;&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;Simple and Easy Interface.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.5; list-style-type: disc; margin: 0px 0px 0.25em; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;&lt;span style="border: 0px; box-sizing: border-box; display: block; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 10px; padding: 5px 8px; position: relative; transition: all 0.3s; vertical-align: baseline;"&gt;&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;Open Source for All People World Wide.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.5; list-style-type: disc; margin: 0px 0px 0.25em; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;&lt;span style="border: 0px; box-sizing: border-box; display: block; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 10px; padding: 5px 8px; position: relative; transition: all 0.3s; vertical-align: baseline;"&gt;&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;Preinstalled Drivers.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; font-stretch: inherit; margin: 0px 0px 1.6rem; padding: 0px; position: relative; vertical-align: baseline;"&gt;
&lt;span style="color: #333333; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium;"&gt;&lt;span style="line-height: 28.8px;"&gt;Download Backtrack 5r3 Free - Latest (32 &amp;amp; 64 Bit)&lt;/span&gt;&lt;/span&gt;&lt;span style="color: #333333; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: medium; font-style: inherit; font-variant: inherit; font-weight: 400; line-height: 1.2;"&gt;&amp;nbsp;with Below Links:&lt;/span&gt;&lt;/h3&gt;
&lt;ul style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 26px; list-style-position: outside; margin: 0px 0px 2.6rem 4rem; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.5; list-style-type: disc; margin: 0px 0px 0.25em; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; display: block; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 10px; padding: 5px 8px; position: relative; vertical-align: baseline;"&gt;&lt;a href="ftp://193.219.28.2/vol/rzm3/linux-backtrack/BT5R3-KDE-32.iso" style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;&lt;span style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; display: block; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 10px; padding: 5px 8px; position: relative; vertical-align: baseline;"&gt;&lt;b style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: orange; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;"&gt;BackTrack 5 R3 (32 Bit) ISO&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.5; list-style-type: disc; margin: 0px 0px 0.25em; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; display: block; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 10px; padding: 5px 8px; position: relative; vertical-align: baseline;"&gt;&lt;a href="http://download2us.softpedia.com/dl/1aa563f88459f3b91d2c218121726aa0/568766e1/500009477/linux/BT5R3-KDE-64.iso" style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;&lt;span style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; display: block; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 10px; padding: 5px 8px; position: relative; vertical-align: baseline;"&gt;&lt;b style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: orange; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;"&gt;BackTrack 5 R3 (64 Bit) ISO&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2016/04/download-backtrack-5r3-free-latest-32.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-UkDZJ48Rae8xDykndjJSB7Kh7L7jFt_jk93L6nacZ0zdsmBhahfV2XE1nh2yQtgrpSkZWHaGbmfzklH8z_90P4gQj3fYbLxpaSCt5kVjF9k-Vj6ebOcjR1k-qwqYJci6d99DT22qI586/s72-c/result.jpg" width="72"/><thr:total>1</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-668325349442446975</guid><pubDate>Sat, 26 Sep 2015 05:47:00 +0000</pubDate><atom:updated>2016-12-02T23:16:23.121-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Internet Guide</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="sites-layout-tile sites-tile-name-content-1" style="background-color: white; font-family: Arial, Verdana, sans-serif; font-size: 13.3333px; padding: 10px;"&gt;
&lt;div dir="ltr"&gt;
&lt;u&gt;&lt;span style="font-size: small;"&gt;&lt;b&gt;Internet&lt;/b&gt;&lt;/span&gt;&lt;/u&gt;&lt;br /&gt;&lt;br /&gt;The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.&lt;br /&gt;&lt;br /&gt;No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.&lt;br /&gt;&lt;br /&gt;All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.&lt;br /&gt;&lt;div style="margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;img border="0" height="136" src="http://t1.gstatic.com/images?q=tbn:ANd9GcQZ0hfWxqI-kU-IOncg1HGwdRj6zZI24GTrPRc_WUXDbtsjnWL9" width="200" /&gt;&lt;/div&gt;
&lt;br /&gt;An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.&lt;br /&gt;&lt;br /&gt;The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;--------------------------------------------------------------------------------&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size: small;"&gt;&lt;u&gt;COMPONENTS OF THE INTERNET&lt;/u&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;--------------------------------------------------------------------------------&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;u&gt;WORLD WIDE WEB&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;The World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.&lt;br /&gt;&lt;br /&gt;The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.&lt;br /&gt;&lt;div style="margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;img border="0" height="149" src="http://t3.gstatic.com/images?q=tbn:ANd9GcREIbepgw9TwivnKm8VPbY_1noTKYWYbU6iXZxvouskdRV6-D-lZg" width="200" /&gt;&lt;/div&gt;
&lt;br /&gt;The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.&lt;br /&gt;&lt;br /&gt;Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links. Graphics and multimedia may also be incorporated into an HTML document. HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.&lt;br /&gt;&lt;br /&gt;The World Wide Web consists of files, called pages or home pages, containing links to documents and resources throughout the Internet.&lt;br /&gt;&lt;br /&gt;The Web provides a vast array of experiences including multimedia presentations, real-time collaboration, interactive pages, radio and television broadcasts, and the automatic "push" of information to a client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold Fusion and XML are extending the capabilities of the Web. A growing amount of information on the Web is served dynamically from content stored in databases. The Web is therefore not a fixed entity, but one that is in a constant state of development and flux.&lt;br /&gt;&lt;br /&gt;&lt;u&gt;&lt;b&gt;E-MAIL&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;&lt;br /&gt;Electronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.&lt;br /&gt;&lt;div style="margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;img border="0" height="192" src="http://t2.gstatic.com/images?q=tbn:ANd9GcQErUlAYOPWH2CJak0VELS2xOoJs7NUQNv74GcLFL03ZgiRjmUH7Q" width="200" /&gt;&lt;/div&gt;
&lt;br /&gt;A powerful aspect of e-mail is the option to send electronic files to a person's e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. For example, a document created in Microsoft Word can be attached to an e-mail message and retrieved by the recipient with the appropriate e-mail program. Many e-mail programs, including Eudora, Netscape Messenger, and Microsoft Outlook, offer the ability to read files written in HTML, which is itself a MIME type.&lt;br /&gt;&lt;br /&gt;&lt;u&gt;&lt;b&gt;TELNET&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;&lt;br /&gt;Telnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (locis.loc.gov) or numbers (140.147.254.3). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.&lt;br /&gt;&lt;div&gt;
&lt;img border="0" height="188" src="http://t3.gstatic.com/images?q=tbn:ANd9GcR_SqiCOxRaKjZtAR_1cNT0OPtSchZEeAFf7SSkxW7QT-Ih_Oqh" style="display: block; margin-left: auto; margin-right: auto; text-align: center;" width="200" /&gt;&lt;/div&gt;
&lt;br /&gt;Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.&lt;br /&gt;&lt;br /&gt;With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.&lt;br /&gt;&lt;br /&gt;&lt;u&gt;&lt;b&gt;FTP&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;FTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.&lt;br /&gt;&lt;div&gt;
&lt;img border="0" height="94" src="http://t1.gstatic.com/images?q=tbn:ANd9GcR0L7SREbGOaeN6fTkd6uzwBZbXJ-6IWL4NuDmeuxkSEeQrXVZEvg" style="display: block; margin-left: auto; margin-right: auto; text-align: center;" width="200" /&gt;&lt;/div&gt;
&lt;br /&gt;If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.&lt;br /&gt;&lt;br /&gt;FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. You can also retrieve FTP files via search engines such as FtpFind, located at /http://www.ftpfind.com/. This option is easiest because you do not need to know FTP program commands.&lt;br /&gt;&lt;br /&gt;&lt;u&gt;&lt;b&gt;E-MAIL DISCUSSION GROUPS&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;&lt;br /&gt;One of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.&lt;br /&gt;&lt;div&gt;
&lt;img border="0" src="http://t3.gstatic.com/images?q=tbn:ANd9GcRI6k297gLRnULx7KIsA24uxl90rhB6nu97DF39yGi9V4r11dTH10DdxbYV" style="display: block; margin-left: auto; margin-right: auto; text-align: center;" /&gt;&lt;/div&gt;
&lt;br /&gt;A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e-mail account to participate in a listserv discussion group. Visit Tile.net at /http://tile.net/ to see an example of a site that offers a searchablecollection of e-mail discussion groups.&lt;br /&gt;&lt;br /&gt;Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.&lt;br /&gt;&lt;br /&gt;&lt;u&gt;&lt;b&gt;USENET NEWS&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;&lt;br /&gt;Usenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. The major difference between Usenet News and e-mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. This is distinct from e-mail distribution, in which messages arrive in the electronic mailboxes of each list member.&lt;br /&gt;&lt;div&gt;
&lt;img border="0" height="200" src="http://t3.gstatic.com/images?q=tbn:ANd9GcR07_dkWjdiYyTnMgkT5zeUtaB14TSCealBm2n2r3hFAN50Zf1YpA" style="display: block; margin-left: auto; margin-right: auto; text-align: center;" width="147" /&gt;&lt;/div&gt;
&lt;br /&gt;Usenet itself is a set of machines that exchanges messages, or articles, from Usenet discussion forums, called newsgroups. Usenet administrators control their own sites, and decide which (if any) newsgroups to sponsor and which remote newsgroups to allow into the system.&lt;br /&gt;&lt;br /&gt;There are thousands of Usenet newsgroups in existence. While many are academic in nature, numerous newsgroups are organized around recreational topics. Much serious computer-related work takes place in Usenet discussions. A small number of e-mail discussion groups also exist as Usenet newsgroups.&lt;br /&gt;&lt;br /&gt;The Usenet newsfeed can be read by a variety of newsreader software programs. For example, the Netscape suite comes with a newsreader program called Messenger. Newsreaders are also available as standalone products.&lt;br /&gt;&lt;br /&gt;&lt;u&gt;&lt;b&gt;FAQ, RFC, FYI&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;&lt;br /&gt;FAQ stands for Frequently Asked Questions. These are periodic postings to Usenet newsgroups that contain a wealth of information related to the topic of the newsgroup. Many FAQs are quite extensive. FAQs are available by subscribing to individual Usenet newsgroups. A Web-based collection of FAQ resources has been collected by The Internet FAQ Consortium and is available at /http://www.faqs.org/.&lt;br /&gt;&lt;div style="margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;RFC stands for Request for Comments. These are documents created by and distributed to the Internet community to help define the nuts and bolts of the Internet. They contain both technical specifications and general information.&lt;br /&gt;&lt;br /&gt;FYI stands for For Your Information. These notes are a subset of RFCs and contain information of interest to new Internet users.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;u&gt;CHAT &amp;amp; INSTANT MESSENGING&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Chat programs allow users on the Internet to communicate with each other by typing in real time. They are sometimes included as a feature of a Web site, where users can log into the "chat room" to exchange comments and information about the topics addressed on the site. Chat may take other, more wide-ranging forms. For example, America Online is well known for sponsoring a number of topical chat rooms.&lt;br /&gt;&lt;div style="margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;Internet Relay Chat (IRC) is a service through which participants can communicate to each other on hundreds of channels. These channels are usually based on specific topics. While many topics are frivolous, substantive conversations are also taking place. To access IRC, you must use an IRC software program.&lt;br /&gt;&lt;br /&gt;A variation of chat is the phenomenon of instant messenging. With instant messenging, a user on the Web can contact another user currently logged in and type a conversation. Most famous is America Online's Instant Messenger. ICQ, MSN and Yahoo are other commonly-used chat programs.&lt;br /&gt;&lt;br /&gt;Other types of real-time communication are addressed in the tutorial Understanding the World Wide Web.&lt;br /&gt;&lt;u&gt;&lt;br /&gt;&lt;/u&gt;&lt;b&gt;&lt;u&gt;MUD/MUSH/MOO/MUCK/DUM/MUS&lt;/u&gt;E&lt;/b&gt;&lt;br /&gt;&lt;div style="margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;img border="0" height="200" src="http://t0.gstatic.com/images?q=tbn:ANd9GcT3jxaePVvXLhi2vldi5qa7u95_dXRnng2YwNccB7rRW3obizgm" width="142" /&gt;&lt;/div&gt;
&lt;br /&gt;MUD stands for Multi User Dimension. MUDs, and their variations listed above, are multi-user virtual reality games based on simulated worlds. Traditionally text based, graphical MUDs now exist. There are MUDs of all kinds on the Internet, and many can be joined free of charge.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="sites-layout-tile sites-tile-name-footer" style="background-color: white; font-family: Arial, Verdana, sans-serif; font-size: 13.3333px; padding: 3px 10px;"&gt;
&lt;div dir="ltr"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2015/09/internet-guide.html</link><thr:total>0</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-3921546023664808944</guid><pubDate>Mon, 07 Sep 2015 14:39:00 +0000</pubDate><atom:updated>2016-12-02T23:16:23.103-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>How To Identify Fake Facebook Accounts....</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;How
 can you detect the Fake FB Profile.&amp;nbsp;On these days we are getting so 
many friend request specially by girls, but there is no way to identify 
that account is fake or original. So don't worry we are going to tell 
you simple method to detect fake Facebook account.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;
&lt;div style="display: block; margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi97JM80o7iOYVYbV4OzRF_ggW-XLgDqVqBX5aD6NfDE2RfD0t-syca31gloqMpqPirJ7blnKvKA9g62dAFGvufoTx3rTSUnWWE7BagxunEmQ3y-zNtbWKt21493jKzWHw_fAWmDYKPBrEd/s1600/1.png"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi97JM80o7iOYVYbV4OzRF_ggW-XLgDqVqBX5aD6NfDE2RfD0t-syca31gloqMpqPirJ7blnKvKA9g62dAFGvufoTx3rTSUnWWE7BagxunEmQ3y-zNtbWKt21493jKzWHw_fAWmDYKPBrEd/s1600/1.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;So
 this is a Facebook account which named by Sarikha Agarwal. Now we need 
to verify this account real or fake, so our first step is&amp;nbsp;going to the &lt;a href="http://images.google.com/"&gt;images.google.com&lt;/a&gt; and click on camera image.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style="display: block; margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGuITJCd6MFs5HWNBoT2th8G6YAreCRYqcXpjgs6Jl0GVBiIhuCvXlxHscDy7ytlPcs9QHQ26zj5ZHWJzlAmYsTXAYRkq9sV7uz4qi8v5SiFtLlY2toL0Man5I4AyuyybzsRYDJ337Pa58/s1600/2.png"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGuITJCd6MFs5HWNBoT2th8G6YAreCRYqcXpjgs6Jl0GVBiIhuCvXlxHscDy7ytlPcs9QHQ26zj5ZHWJzlAmYsTXAYRkq9sV7uz4qi8v5SiFtLlY2toL0Man5I4AyuyybzsRYDJ337Pa58/s1600/2.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;span style="font-size: small;"&gt; So when you click on search by image you will get popup like below image.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;&lt;div style="display: block; margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5h0VmfIevvcfWf4V4v_nWKYQTSeLtnJeFz1T49roocFHhC45GuMRqs_bKxwFYSybvdUO9wHID2k0KBqLmDEbVWR9PMo5K9q0EwJyWz7tIU6FKAC4Qy6x3Sxwa4sVqcmVOnkc7Ejo47IMJ/s1600/3.png"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5h0VmfIevvcfWf4V4v_nWKYQTSeLtnJeFz1T49roocFHhC45GuMRqs_bKxwFYSybvdUO9wHID2k0KBqLmDEbVWR9PMo5K9q0EwJyWz7tIU6FKAC4Qy6x3Sxwa4sVqcmVOnkc7Ejo47IMJ/s1600/3.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span style="font-size: small;"&gt;Now go to that profile, right click on image and click on copy image URL&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div style="clear: both; text-align: left;"&gt;
&lt;/div&gt;
&lt;br /&gt;&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;div style="display: block; margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0HsbAYzEgQYDELZiPPXh7muEzJXGus5GmVuYaucO5W4uBs_8woRqaWI7T_2Vb4CE6VAOrK4rSNpUEwgR-vPys6jqafnzaCaHKjlNRdXoz5KM-P7SWSMeGs8iYWO60RfBJsOAhFFYCDKhK/s1600/4.png"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0HsbAYzEgQYDELZiPPXh7muEzJXGus5GmVuYaucO5W4uBs_8woRqaWI7T_2Vb4CE6VAOrK4rSNpUEwgR-vPys6jqafnzaCaHKjlNRdXoz5KM-P7SWSMeGs8iYWO60RfBJsOAhFFYCDKhK/s1600/4.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;span style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;span style="font-family: Arial,Verdana,sans-serif; font-size: small;"&gt;N&lt;/span&gt;&lt;span style="font-size: small;"&gt;ow profile pic URL has copied.. now again go to &lt;a href="http://images.google.com/"&gt;images.google.com&lt;/a&gt; Tab and paste image URL&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="clear: both; text-align: left;"&gt;
&lt;/div&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;div style="display: block; margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1lPoFQfYgP6-v7yM81oj0ujiyDPuNMG0cgNgTqD22EH76Ez6MsVhcgAGzZtXPdfCP9TERLWQFFIlItdCGYVc6bo4EVv2XrNLPDGQA5IjxK-pDxXJUebAyxTQjyROF9fsf70HK8e1zShJy/s1600/5.png"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1lPoFQfYgP6-v7yM81oj0ujiyDPuNMG0cgNgTqD22EH76Ez6MsVhcgAGzZtXPdfCP9TERLWQFFIlItdCGYVc6bo4EVv2XrNLPDGQA5IjxK-pDxXJUebAyxTQjyROF9fsf70HK8e1zShJy/s1600/5.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/span&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;When you enter then you get related images search...&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="clear: both; text-align: left;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4vt5NPZQG4oCrB8wr1Eb1fiULMbfe0A0jkATgYTYC6Z4tq3iaPDVbw5kSlJWwM3kD_KWaSxYTq6xVnQJa_ClFdbBXjrjSQlBger9P9geVaMEWk1KxF_e1BIY7aCuhs6Dfll4ojvwMWlq2/s1600/6.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4vt5NPZQG4oCrB8wr1Eb1fiULMbfe0A0jkATgYTYC6Z4tq3iaPDVbw5kSlJWwM3kD_KWaSxYTq6xVnQJa_ClFdbBXjrjSQlBger9P9geVaMEWk1KxF_e1BIY7aCuhs6Dfll4ojvwMWlq2/s1600/6.png" style="display: block; margin-left: auto; margin-right: auto; text-align: center;" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;Now you can better see that this profile is real or fake..So here is a proof that this profile is fake.&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;Enjoy the trick..&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;Be aware when you will going to add an beautiful or smart unknown person as your friend.&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;So be checked first.. there are lot of fake profiles are create everyday. &lt;/span&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;This
 person might be spy on your profile and steal personal information like
 your photos, etc for their hacking stuffs.. So Be Safe Online..&lt;/span&gt;&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2015/09/how-to-identify-fake-facebook-accounts.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi97JM80o7iOYVYbV4OzRF_ggW-XLgDqVqBX5aD6NfDE2RfD0t-syca31gloqMpqPirJ7blnKvKA9g62dAFGvufoTx3rTSUnWWE7BagxunEmQ3y-zNtbWKt21493jKzWHw_fAWmDYKPBrEd/s72-c/1.png" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-3528714913415417894</guid><pubDate>Mon, 07 Sep 2015 14:37:00 +0000</pubDate><atom:updated>2016-12-02T23:16:23.101-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Install window XP In 10Min......</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;As We all know that During Formatting a Computer After the
File Copying is Completed then windows Require 39 Minutes Time...But What
Extreme In It.... Yes We can Bypass this faking Time .... How TO DO IT??? So
read On..&lt;/b&gt;&lt;br /&gt;

&lt;b&gt;I have Included Snaps Shots That will help you.&lt;/b&gt;&lt;br /&gt;

&lt;br /&gt;
&lt;div style="color: #990000;"&gt;
&lt;u&gt;&lt;b&gt;&amp;gt;&amp;gt; INSTALLING WIN XP IN 10 MINUTES! &amp;lt;&amp;lt;&lt;/b&gt;&lt;/u&gt;&lt;/div&gt;
&lt;div style="color: #990000;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="color: #990000;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style="color: #073763;"&gt;STEP1 :&lt;/span&gt; After the Copy Part is Over ... System is Rebooted
as we all know In general Foramatting Procedure...&lt;/b&gt;&lt;br /&gt;

&lt;b&gt;Now After Reboot The Below Image Will Appear.&lt;/b&gt;...&lt;br /&gt;

&lt;span&gt;
&lt;/span&gt;

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;
&lt;div style="display: block; margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;a href="http://www.hackersonlineclub.com/install-window-xp-in-10min/Untitled.jpeg?attredirects=0"&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #073763;"&gt;STEP 2: &lt;/span&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Now As This Image APPEARS You Have to Press&lt;span&gt;&amp;nbsp; &lt;/span&gt;"Shift + F10 "&lt;span&gt;&amp;nbsp; &lt;/span&gt;. This Will Open The command Prompt...&lt;span&gt;&amp;nbsp; &lt;/span&gt;Now type&lt;span&gt;&amp;nbsp;
&lt;/span&gt;taskmgr&lt;span&gt;&amp;nbsp; &lt;/span&gt;in it. This will open the
Task manager .&lt;/b&gt;&lt;br /&gt;

&lt;br /&gt;

&lt;b&gt;&lt;span style="color: #073763;"&gt;STEP 3 :&lt;/span&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;After The task Manager Opens Goto Processes ... And
Find "Setup.exe"&lt;span&gt;&amp;nbsp; &lt;/span&gt;process and
Right CLICK on It.... and set the Priority to Highest...&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #073763;"&gt;STEP 4:&lt;/span&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&amp;nbsp;Now Just Watch the Set It will take around 9 minutes
and 2 minutes for Tolerance(depends System to system)....&lt;/b&gt;
&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;Thats the Overall Tutorial...Hope You all Have LIKED IT...&lt;/b&gt;&lt;br /&gt;

&lt;b&gt;So When you Format your PC Next Time It will Really Save
Your TIME i.e around 20 to 25 minutes....Enjoy Hacking.~&lt;/b&gt;&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2015/09/install-window-xp-in-10min.html</link><thr:total>0</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-2804599664628216449</guid><pubDate>Thu, 03 Sep 2015 11:16:00 +0000</pubDate><atom:updated>2016-12-02T23:16:23.091-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Hacking Tools.....</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="color: magenta;"&gt;&lt;u&gt;&lt;b&gt;&lt;span style="font-size: x-small;"&gt;&lt;span style="font-family: georgia,serif;"&gt;WINAUTOPWN ACTIVE
 SYSTEMS TRANSGRESSOR GUI [ C4 - WAST ]&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;is a Systems and Network 
Exploitation Framework built on the famous winAUTOPWN as a backend.&amp;nbsp; &lt;br /&gt;C4 - WAST gives users the freedom to select individual exploits and use them.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;
&lt;b&gt;BSDAUTOPWN&lt;/b&gt; has been compiled, like always for various flavours and has been upgraded to version 1.8 alongwith all applicable exploits&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;&lt;span style="font-family: georgia,serif;"&gt;
&lt;b&gt;WINAUTOPWN&lt;/b&gt; requires PERL,PHP,PYTHON,RUBY and its dependencies alongwith a few others' too for smooth working of exploits included in it.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="font-family: georgia,serif;"&gt;&lt;span style="font-size: x-small;"&gt;&lt;a href="http://winautopwn.co.nr/" target="_blank"&gt;&lt;b&gt;&lt;span style="font-family: georgia,serif;"&gt;Download&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="font-family: georgia,serif;"&gt;*********************************************************************************************************** &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;u&gt;&lt;b&gt;&lt;span style="font-size: x-small;"&gt;&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;span style="background-color: black; font-family: georgia,serif; font-size: x-small;"&gt;&lt;span style="background-color: white;"&gt;&lt;u&gt;&lt;b&gt;ARPwner&lt;/b&gt;&lt;/u&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="background-color: black; color: lime; font-family: georgia,serif; font-size: x-small;"&gt;&lt;span style="background-color: white;"&gt;&lt;span style="color: black;"&gt;is a tool to do ARP poisoning and DNS poisoning attacks, with a simple GUI and &lt;br /&gt;a plugin system to do filtering of the information gathered,&amp;nbsp;also has a implementation of SSLstrip and is coded in python&lt;b&gt;.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style="background-color: white;"&gt;&lt;span style="color: black;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style="background-color: black; color: lime; font-family: georgia,serif; font-size: x-small;"&gt;&lt;b&gt;&lt;span style="background-color: white;"&gt;&lt;span style="color: black;"&gt;&lt;a href="https://github.com/ntrippar/ARPwner/archive/master.zip" target="_blank"&gt;&lt;b&gt;&lt;span style="font-family: georgia,serif;"&gt;Download&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;b&gt;&lt;span style="font-family: georgia,serif;"&gt; &amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="background-color: black; color: lime; font-family: georgia,serif; font-size: x-small;"&gt;&lt;b&gt;&lt;span style="background-color: white;"&gt;&lt;span style="color: black;"&gt;&lt;b&gt;&lt;span style="font-family: georgia,serif;"&gt;&lt;span style="font-size: x-small;"&gt;&lt;span style="font-family: georgia,serif;"&gt;***********************************************************************************************************&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: x-small;"&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style="color: white; display: block; margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;a href="http://www.hackersonlineclub.com/hacking-tools/new_mole.png.jpg?attredirects=0"&gt;&lt;img border="0" height="221" src="http://www.hackersonlineclub.com/_/rsrc/1331478587882/hacking-tools/new_mole.png.jpg?height=221&amp;amp;width=400" width="400" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-size: x-small;"&gt;
&lt;span style="font-family: georgia,serif;"&gt;&lt;span style="color: magenta;"&gt;&lt;u&gt;&lt;b&gt;Mole&lt;/b&gt;&lt;/u&gt;&lt;/span&gt; is an automatic SQL 
Injection exploitation tool. Only by providing a vulnerable URL and a 
valid string on the site it can detect the injection and exploit it, 
either by using the union technique or a Boolean query based technique.&lt;/span&gt; &lt;span style="font-family: georgia,serif;"&gt;The Mole uses a command based interface, allowing the user to indicate the action he wants to perform easily. &lt;/span&gt;&lt;br /&gt;
&lt;a href="http://themole.nasel.com.ar/?q=tutorial" style="font-family: georgia,serif;" target="_blank"&gt; &lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: x-small;"&gt;&amp;nbsp;&lt;b&gt;&lt;a href="http://themole.nasel.com.ar/?q=downloads" target="_blank"&gt;&lt;span style="font-family: georgia,serif;"&gt;Download&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: x-small;"&gt;&lt;b&gt;&lt;span style="font-family: georgia,serif;"&gt;&lt;span style="font-size: x-small;"&gt;&lt;span style="font-family: georgia,serif;"&gt;***********************************************************************************************************&lt;/span&gt;&lt;/span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="color: magenta;"&gt;&lt;span style="font-weight: normal;"&gt;&lt;u&gt;&amp;nbsp;Sqlninja 0.2.6&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;span style="font-size: x-small;"&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style="display: block; text-align: left;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPxm-UmyMF1bMb6k8HB_qx3UUotIoYVxHAbXE_kMuiwJ5l-WG_NEiS14IXSn_aNTiQT1yAZNbiaMAFkpObxl-92zUR3j9hDBsHAUc116XThju1QuWrWuwvouCQ_qayhEGCDHIYpOcov6Lj/s320/Untitled.png" style="display: block; margin-left: auto; margin-right: auto; text-align: center;" /&gt;&lt;/span&gt;
&lt;span style="font-size: x-small;"&gt;&lt;b&gt;Features:&lt;/b&gt;&lt;/span&gt;
&lt;span style="font-size: x-small;"&gt;&lt;br /&gt;
- Fingerprint of the remote SQL Server (version, user performing
 the queries, user privileges, xp_cmdshell availability, DB 
authentication mode)&lt;br /&gt;&amp;nbsp;-Bruteforce of 'sa' password (in 2 flavors: dictionary-based and incremental).&lt;br /&gt;
- Creation of a custom xp_cmdshell if the original one has been removed&lt;br /&gt;
-&amp;nbsp; Upload of netcat (or any other executable) using only normal HTTP requests (no FTP/TFTP needed).&lt;br /&gt;
-&amp;nbsp; TCP/UDP portscan from the target SQL Server to the attacking machine, in order &lt;br /&gt;&amp;nbsp;&amp;nbsp;
to find a port that is allowed by the firewall of the target network &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
and use it for a reverse shell.&lt;br /&gt;
-&amp;nbsp; Direct and reverse bindshell, both TCP and UDP&lt;br /&gt;
-&amp;nbsp; ICMP-tunneled shell, when no TCP/UDP ports are available for a direct/reverse &lt;br /&gt;&amp;nbsp;
shell but the DB can ping your box.&lt;/span&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="font-family: georgia,serif;"&gt;-&lt;/span&gt; DNS-tunneled pseudo-shell, when no TCP/UDP ports are available for&lt;br /&gt;
&amp;nbsp;a direct/reverse shell, but the DB server can resolve external hostnames&lt;br /&gt;
&amp;nbsp;(check the documentation for details about how this works).&lt;/span&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="font-family: georgia,serif;"&gt;-&amp;nbsp;&lt;/span&gt; Evasion techniques to confuse a few IDS/IPS/WAF.&lt;br /&gt;
-&amp;nbsp; Integration with Metasploit3, to obtain a graphical access to the remote DB&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; server through a VNC server injection.&lt;/span&gt;
&lt;span style="font-size: x-small;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: x-small;"&gt;&lt;b&gt;&lt;a href="http://sqlninja.sourceforge.net/download.html" target="_blank"&gt;Download&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="display: block; text-align: left;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="display: block; text-align: left;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;b&gt;&lt;span style="font-size: x-small;"&gt;&lt;span style="font-family: georgia,serif;"&gt;***********************************************************************************************************&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;
&lt;hr size="2" width="100%" /&gt;
&lt;/div&gt;
&lt;span style="font-size: x-small;"&gt;
&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b style="background-color: black; font-family: georgia,serif;"&gt;HexorBase - The DataBase Hacker Tool&lt;/b&gt;&lt;span style="background-color: white;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;b style="font-family: georgia,serif;"&gt;To Audit Management and Multiple Databases&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;div style="display: block; margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;a href="http://www.hackersonlineclub.com/hacking-tools/whatismyip%20vulnerable.png?attredirects=0"&gt;&lt;img border="0" src="http://www.hackersonlineclub.com/_/rsrc/1312446000196/hacking-tools/whatismyip%20vulnerable.png" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-size: x-small;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;HexorBase is a database 
application designed for management and audit multiple database servers 
simultaneously from a single location, is able to perform SQL queries 
and brute force attacks against servers common database ( MySQL, SQLite,
 Microsoft &lt;br /&gt;
SQL Server, Oracle, PostgreSQL ).&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;This tool is simple to use and very practical, may have to know a little SQL, but the basics.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;b&gt;&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;span style="font-size: x-small;"&gt;
&lt;br /&gt;
&lt;span style="font-family: georgia,serif;"&gt;HexorBase runs on Linux and presumably Windows, and requires:&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code style="background-color: black; border-color: rgb(1,223,1); border-style: solid; border-width: 1px; color: #01df01; display: block; min-height: 20px; padding: 5px; text-align: left; white-space: pre;"&gt;python-qt4 python python-MySQLdb cx_Oracle python-psycopg2 python-python-qscintilla2 pymssql&lt;/code&gt;&lt;/span&gt;&lt;span style="font-size: x-small;"&gt;&lt;span style="border-collapse: separate; color: black; font-family: Times New Roman; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;"&gt;&lt;span style="color: #b9b9b9; font-family: Verdana,Geneva,sans-serif; line-height: 16px;"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;pre style="background-color: transparent; background-repeat: no-repeat no-repeat; padding-top: 24px;"&gt;&lt;span style="font-size: x-small;"&gt;&lt;span style="color: black; font-family: georgia,serif;"&gt;To install it you must download and from the console:
&lt;/span&gt;&lt;code style="background-color: black; border-color: rgb(1,223,1); border-style: solid; border-width: 1px; color: #01df01; display: block; min-height: 20px; padding: 5px; text-align: left; white-space: pre;"&gt;root @ host: ~ # dpkg-i hexorbase_1.0_all.deb&lt;/code&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;span style="font-size: x-small;"&gt;
&lt;/span&gt;&lt;span style="font-size: x-small;"&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Project website and download HexorBase: &lt;/span&gt;&lt;br /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;a href="http://code.google.com/p/hexorbase/"&gt;&lt;span style="font-family: georgia,serif;"&gt;http://code.google.com/p/hexorbase/&lt;/span&gt;&lt;/a&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;hr size="2" width="100%" /&gt;
&lt;span style="font-size: x-small;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="color: magenta;"&gt;&lt;span style="background-color: white;"&gt;&lt;b style="font-family: georgia,serif;"&gt;Net Tools 5.0 (Net Tools 5.x)&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;
&lt;div style="display: block; text-align: left;"&gt;
&lt;img border="0" height="240" src="http://mabsoft.com/ntscreenshot6.JPG" style="display: block; margin-left: auto; margin-right: auto; text-align: center;" width="320" /&gt;&lt;/div&gt;
&lt;br /&gt;
This tools is a hacker friendly. Net Tools is a comprehensive set of 
host monitoring, network scanning, security, administration tools and 
much more, all with a highly intuitive user interface. It's an ideal 
tool for those who work in the network security, administration, 
training, internet forensics or law enforcement internet crimes fields. 
Net Tools is mainly written in Microsoft Visual Basic 6, Visual C++, 
Visual C# and Visual Studio .NET.&lt;br /&gt;
There has a 175 tools list in one software.. &lt;a href="http://www.multiupload.com/DFW780IFYD" target="_blank"&gt;Tools Content&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href="http://www.mabsoft.com/NetTools5.0.70.zip" target="_blank"&gt;Download&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="font-family: georgia,serif;"&gt;Intercepter
 is a sniffer tool which offers various capabilities including sniffing 
for password hashes related to 
ICQ/IRC/AIM/FTP/IMAP/POP3/SMTP/LDAP/BNC/SOCKS/HTTP/&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: georgia,serif;"&gt;WWW/NNTP/CVS/TELNET/MRA/DC++/VNC/MYSQL and ORACLE. It also sniffs ICQ/&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: georgia,serif;"&gt;AIM/JABBER/YAHOO/MSN/GADU-GADU/IRC
 and MRA protocols. It has a built-in arp poisoning module, can change 
MAC addresses of LAN adapters, and has various other interesting 
functionality.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-size: x-small;"&gt;
&lt;br /&gt;&lt;a href="http://packetstormsecurity.org/files/download/113230/Intercepter-NG.v093.zip" target="_blank"&gt;&lt;b&gt;&lt;span style="font-family: georgia,serif;"&gt;Download&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;b&gt;&lt;span style="font-family: georgia,serif;"&gt;
&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;/span&gt;&lt;hr size="2" width="100%" /&gt;
&lt;span style="font-size: x-small;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;/span&gt;&lt;b&gt;&lt;span style="font-family: georgia,serif;"&gt;&lt;span style="color: magenta;"&gt;&lt;span style="background-color: white;"&gt;Havij v1.15 Advanced SQL Injection&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family: georgia,serif;"&gt;&lt;br /&gt;
Havij is an automated SQL Injection tool that helps penetration testers 
to find and exploit SQL Injection vulnerabilities on a web page.&lt;/span&gt;&lt;b&gt;&lt;span style="font-family: georgia,serif;"&gt;&lt;br /&gt;
&lt;div style="display: block; text-align: left;"&gt;
&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH6_yw3RkfErPe9gBVPG2p9pFncUd-PC4YOh-zh1aY2lj7dY0ZnSfAPs1e7w47wfJr-kphKDkU1UCkB2lBJ870Mje3JPTjOu7ew0OwfrkESJPUgDnQPQcBQgYpOg3lpKJCjxs14ePtahKf/s200/havij.png" style="display: block; margin-left: auto; margin-right: auto; text-align: center;" /&gt;&lt;/div&gt;
&lt;b&gt;&lt;a href="http://itsecteam.com/files/havij/Havij1.15Free.rar" target="_blank"&gt;Download&lt;/a&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;span style="font-size: x-small;"&gt;
&lt;/span&gt;&lt;hr size="2" width="100%" /&gt;
&lt;span style="font-size: x-small;"&gt;
&lt;b&gt;&lt;span style="font-family: georgia,serif;"&gt;
&lt;br /&gt;&lt;span style="background-color: white;"&gt;
&lt;span style="color: magenta;"&gt;Ani-Shell&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;div style="display: block; text-align: left;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;img border="0" height="141" src="http://sourceforge.net/dbimage.php?id=307787" style="display: block; margin-left: auto; margin-right: auto; text-align: center;" width="320" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-size: x-small;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Ani-Shell is a simple PHP shell 
with some unique features like Mass Mailer , A simple Web-Server Fuzzer ,
 DDoser, Back Connect , Bind Shell etc etc ! This shell has immense 
capabilities and have been written with some coding standards in mind 
for better editing and customization.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;b&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Customisation&lt;/span&gt;&lt;/b&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;1. Email Trace back is set to Off as default and emails will not be sent , If you are setting &lt;br /&gt;
this feature on make sure you change the default email address (lionaneesh@gmail.com)&lt;br /&gt;
&amp;nbsp;to Your email address , Please Change it before using.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;2. Username and Passwords are set to lionaneesh and lionaneesh respectively , Please change them for better&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;security.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;3. As a default Lock Mode is set to on! This should not be change unless you want your shell exposed.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Default Login&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Username : lionaneesh&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Password : lionaneesh&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;b&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Features&lt;/span&gt;&lt;/b&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Shell&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Platform Independent&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mass - Mailer&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Small Web-Server Fuzzer&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; DDoser&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Design&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Secure Login&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Deletion of Files&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bind Shell&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Back Connect&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fixed Some Coding errors!&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Rename Files&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Encoded Title&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Traceback (Email Alerts)&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; PHP Evaluate&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Better Command Execution (even supports older version of PHP)&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mass Code Injector (Appender and Overwriter)&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lock Mode Customization&lt;/span&gt;&lt;br /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;b&gt;&lt;span style="font-family: georgia,serif;"&gt;Latest Version Addition&lt;/span&gt;&lt;/b&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mail Bomber (With Less Spam detection feature)&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; PHP Decoder&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Better Uploader&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fixed some Coding errors&lt;/span&gt;&lt;br /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;b&gt;&lt;a href="http://sourceforge.net/projects/ani-shell/files/Ani-Shell%20v1.3/Ani-Shell%20v1.3.zip/download" target="_blank"&gt;&lt;span style="font-family: georgia,serif;"&gt;Download&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="background-color: black; color: lime;" /&gt;
&lt;b style="background-color: black; color: lime;"&gt;&lt;span style="font-family: georgia,serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;
&lt;/span&gt;&lt;hr size="2" style="background-color: black; color: lime;" width="100%" /&gt;
&lt;span style="font-size: x-small;"&gt;
&lt;b&gt;&lt;span style="font-family: georgia,serif;"&gt;&lt;br style="background-color: black; color: lime;" /&gt;
&lt;span style="background-color: black; color: lime;"&gt;
&lt;span style="color: magenta;"&gt;&lt;span style="background-color: white;"&gt;SQL MAP 0.9&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="color: magenta;"&gt;&lt;span style="background-color: white;"&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br /&gt;
&lt;div style="display: block; text-align: left;"&gt;
&lt;div style="display: block; text-align: left;"&gt;
&lt;img border="0" height="102" src="http://t1.gstatic.com/images?q=tbn:ANd9GcRm4XIxBvCr0Q22jHGZkhzDz51_12bfUqrNP71sFHderQREnJ1Z" style="display: block; margin-left: auto; margin-right: auto; text-align: center;" width="200" /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;span style="font-size: x-small;"&gt;&lt;span style="font-family: georgia,serif;"&gt;sqlmap
 0.9 has been released and has a considerable amount of changes 
including an almost entirely re-written SQL Injection detection engine.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Sqlmap is an open source 
penetration testing tool that automates the process of detecting and 
exploiting SQL injection flaws and taking over of database servers. It 
comes with a kick-ass detection engine, many niche features for the 
ultimate penetration tester and a broad range of switches lasting from 
database fingerprinting, over data fetching from the database, to 
accessing the underlying file system and executing commands on the 
operating system via out-of-band connections.&lt;/span&gt; &lt;span style="font-family: georgia,serif;"&gt;Its a good tools for find Sql Vulnerability.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;New Features/Changes&lt;/span&gt;--&amp;gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Rewritten SQL injection detection engine (Bernardo and Miroslav).&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Support to directly connect to the database without passing via a SQL injection, -d switch (Bernardo and Miroslav).&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Added full support for both time-based blind SQL injection and error-based SQL injection techniques (Bernardo and Miroslav).&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Implemented support for SQLite 2 and 3 (Bernardo and Miroslav).&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Implemented support for Firebird (Bernardo and Miroslav).&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Implemented support for Microsoft Access, Sybase and SAP MaxDB (Miroslav).&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Added support to tamper injection data with –tamper switch (Bernardo and Miroslav).&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Added automatic recognition of password hashes format and support to crack them with a dictionary-based attack (Miroslav).&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Added support to fetch unicode data (Bernardo and Miroslav).&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Added support to use persistent HTTP(s) connection for speed improvement, –keep-alive switch (Miroslav).&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Implemented several optimization switches to speed up the exploitation of SQL injections (Bernardo and Miroslav).&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Support to parse and test forms on target url, –forms switch (Bernardo and Miroslav).&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Added switches to brute-force tables names and columns names with a dictionary attack, –common-tables and –common-columns.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href="http://downloads.sourceforge.net/sqlmap/sqlmap-0.9.tar.gz" target="_blank"&gt;&lt;img alt="Photobucket" border="0" height="60" src="http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/DownloadButton1.png" width="80" /&gt;&lt;span style="font-family: georgia,serif;"&gt;Download&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;
&lt;/span&gt;&lt;hr size="2" width="100%" /&gt;
&lt;span style="font-size: x-small;"&gt;
&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;span style="background-color: #f3f3f3;"&gt;&lt;b&gt;&lt;span style="font-family: georgia,serif;"&gt;DRIL – Domain Reverse IP Lookup Tool&lt;/span&gt;&lt;/b&gt;:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;div style="display: block; text-align: left;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;img border="0" height="198" src="http://sourceforge.net/dbimage.php?id=301385" style="display: block; margin-left: auto; margin-right: auto; text-align: center;" width="320" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-size: x-small;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;DRIL (Domain Reverse IP Lookup) 
Tool is a Reverse Domain Tool that will really be useful for penetration
 testers to find out the domain names which are listed in the the target
 host, DRIL is a GUI, JAVA based application which uses a Bing API key.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;DRIL has a simple user friendly 
interface which will be helpful for penetration tester to do their work 
fast without a mess, this is only tested on Linux but as it is JAVA it 
should work on Windows too.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;There are various other tools which carry out similar tasks&lt;/span&gt;..&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href="http://sourceforge.net/projects/dril/files/dril2.2v/DomainReverseIPLookup.jar/download" target="_blank"&gt;&lt;img alt="Photobucket" border="0" height="60" src="http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/DownloadButton1.png" width="80" /&gt;&lt;span style="font-family: georgia,serif;"&gt;Download&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;
&lt;/span&gt;&lt;hr size="2" width="100%" /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2015/09/hacking-tools.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPxm-UmyMF1bMb6k8HB_qx3UUotIoYVxHAbXE_kMuiwJ5l-WG_NEiS14IXSn_aNTiQT1yAZNbiaMAFkpObxl-92zUR3j9hDBsHAUc116XThju1QuWrWuwvouCQ_qayhEGCDHIYpOcov6Lj/s72-c/Untitled.png" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author><enclosure length="-1" type="application/zip" url="https://github.com/ntrippar/ARPwner/archive/master.zip"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-4163564701397041728</guid><pubDate>Thu, 03 Sep 2015 10:59:00 +0000</pubDate><atom:updated>2016-12-02T23:16:23.108-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Types OF  Hackers....</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="color: #17365d;"&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp; White hat hacker&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="color: #17365d;"&gt;
2.&amp;nbsp;&amp;nbsp;&amp;nbsp; Gray hat hacker &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="color: #17365d;"&gt;3.&amp;nbsp;&amp;nbsp;&amp;nbsp; Black hat hacker&lt;/span&gt;&lt;span style="color: #17365d;"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;span style="color: #17365d;"&gt;&lt;br /&gt;
&lt;b&gt;White Hat and Grey Hat Hacker &amp;amp; What is the Real Difference?&lt;/b&gt;&lt;/span&gt;&lt;span style="color: #17365d;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="color: #17365d;"&gt;What is worse, the public is not able
to understand terms like grey hat, white hat, Linux OS, or cracker. &lt;br /&gt;
However, the truth is that the subculture of the hacker world is more complex
than we think. Especially if we consider that, these are very intelligent
people.&lt;/span&gt;&lt;span style="color: #17365d;"&gt;&lt;br /&gt;
&lt;br /&gt;
So, what is ethical hacking white hat and how does it differentiate from grey
hackers? The only way to find out is to submerge ourselves in the world of
hackers and understand, at least, the most basic concepts. &lt;/span&gt;&lt;span style="color: #17365d;"&gt;&lt;br /&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;img border="0" height="200" src="http://www.hackersonlineclub.com/_/rsrc/1255526963626/hackers-types/White_hat1.jpg?height=200&amp;amp;width=198" style="margin-left: auto; margin-right: auto;" width="198" /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;WHITE HAT HACKER&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style="display: block; margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-size: x-small;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;b&gt;&lt;span style="color: #17365d;"&gt;What Is A White Hat Hacker?&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #17365d;"&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="color: #17365d;"&gt;A hacker can be a wiz kid who spends
too much time with computers and suddenly finds
himself submerged in the world of&amp;nbsp; cyber-security or criminal
conspirators. On the other hand, he can be a master criminal who wants to
obtain huge amounts of money for him, or even worse, dominate the world.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="color: #17365d;"&gt;In the movie Matrix, the concept of
hackers changed a bit. Although the agents of the Matrix considered them
terrorists, the truth is that they were rebels fighting for the liberty of humanity.
Things do not need to reach that extreme, though. We are not at war with
intelligent ma chines so that kind of scenario is a bit dramatic.&lt;br /&gt;
&lt;br /&gt;
Therefore, a hacker is an individual who is capable of modifying computer
hardware, or software. They made their appearance before the advent of
computers, when determined individuals were fascinated with the possibility of
modifying machines. For example, entering a determine code in a telephone in
order to make free international calls.&lt;/span&gt;&lt;span style="color: #17365d;"&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="color: #17365d;"&gt;&amp;nbsp;When computers appeared, this
people found a new realm where they could exploit their skills. Now they were
not limited to the constraints of the physical world, instead, they could
travel through the virtual world of computers. Before the internet, they used Bulletin Board
Systems (BBS) to communicate and exchange information. However, the real
explosion occurred when the Internet appeared.&lt;br /&gt;
&lt;br /&gt;
Today, anyone can become a hacker. Within that denomination, there are three types
of hackers. The first one is the black hacker, also known as a cracker, someone
who uses his computer knowledge in criminal activities in order to obtain
personal benefits. A typical example is a person who exploits the weaknesses of
the systems of a financial institution for making some money.&lt;br /&gt;
&lt;br /&gt;
On the other side is the white hat hacker. Although white hat hacking can be
considered similar to a black hacker, there is an important difference. A white
hacker does it with no criminal intention in mind. Companies around the world,
who want to test their systems, contract white hackers. They will test how
secure are their systems, and point any faults that they may found. If you want
to become a hacker with a white hat, Linux, a PC and an internet connection is
all you need.&lt;/span&gt;&lt;span style="color: #17365d;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;hr size="2" style="font-family: georgia,serif;" width="100%" /&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;b&gt;&lt;span style="color: #17365d;"&gt;Grey Hat Hackers&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #17365d;"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;span style="color: #17365d;"&gt;A grey hat hacker is
someone who is in between these two concepts. He may use his skills for legal
or illegal acts, but not for personal gains. Grey hackers use their skills in &lt;br /&gt;
order to prove themselves that they can accomplish
a determined feat, but never do it in order to make money out of it. The moment
they cross that boundary, they become black hackers.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="color: #17365d;"&gt;For example, they may hack the
computer network of a public agency, let us say, NOAA. That is a federal crime.&amp;nbsp;
&lt;br /&gt;
&lt;br /&gt;
If the authorities capture them, they will feel the long arm of justice. However, if they only get
inside, and post, let us say, their handle, and get out without causing any
kind of damage, then they can be considered grey hackers.&lt;br /&gt;
&lt;br /&gt;
If you want to know more about hackers, then you can attend one of their annual
conventions. Every year, hackers from all over the US, and from different parts
of the world, reunite and meet at DEF CON. These conventions are much
concurred. In the last one, 6,600 people attended it.&lt;/span&gt;&lt;span style="color: #17365d;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;img border="0" height="211" src="http://www.hackersonlineclub.com/_/rsrc/1255527040073/hackers-types/grey%20hat.jpg?height=211&amp;amp;width=320" style="margin-left: auto; margin-right: auto;" width="320" /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;GRAY HAT &lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style="display: block; margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="color: #17365d;"&gt;Every year, DEF CON is celebrated at Las Vegas, Nevada. However, hackers
are not the only ones who go to this event. There are also computer journalists,
computer security professionals, lawyers, and employees of the federal
government. The event is composed by tracks of different kind, all of them
related, in some way, to the world of hackers (computer security, worms,
viruses, new technologies, coding, etc). Besides the tracks, there are contests
that involve hacking computers, l ock picking and even robot related events.
Ethical hacking, white hat hacking or whatever names
you wish to use, at the end, it has a purpose: to protect the systems of organizations,
public or private, around the world. After all, hackers can now be located
anywhere, and they can be counted by the millions. Soon, concepts like white
hat, linux operating system or grey hat will become common knowledge. A real
proof of how much has our society been influenced by technology.&lt;/span&gt;&lt;span style="color: #17365d;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;hr size="2" style="font-family: georgia,serif;" width="100%" /&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="color: #17365d;"&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;span style="color: #17365d;"&gt;Black Hat Hackers&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #17365d;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style="color: #17365d;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style="color: #17365d;"&gt;Black hat hackers have become the iconic image of all hackers around the world. For
the majority of computer users, the word
hacker has become a synonym for social misfits and criminals. &lt;br /&gt;
Of course, that is an injustice created by our own interpretation of the mass
media, so it is important for us to learn what a hacker is and what a black
hacker (or cracker) does. So, let's learn about black hat techniques and how
they make our lives a little more difficult. &lt;br /&gt;
Black hat is used to describe a hacker (or, if you prefer, cracker) who breaks
into a computer system or network with malicious intent. Unlike a white hat
hacker, the black hat hacker takes advantage of the break-in, perhaps destroying
files or stealing data for some future purpose. The black hat hacker may also
make the exploit known to other hackers and/or the public without notifying the
victim. This gives others the opportunity to exploit the vulnerability before
the organization is able to secure it.&lt;/span&gt;&lt;span style="color: #17365d;"&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;img border="0" height="400" src="http://www.hackersonlineclub.com/_/rsrc/1255527094833/hackers-types/black-hat.jpg?height=200&amp;amp;width=197" style="margin-left: auto; margin-right: auto;" width="394" /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;BLACK HAT&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style="display: block; margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;b&gt;&lt;span style="color: #17365d;"&gt;What Is Black Hat Hacking?&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #17365d;"&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="color: #17365d;"&gt;A black hat hacker, also known as a cracker or a dark side hacker (this
last definition is a direct reference to the Star Wars movies and the dark side
of the force), is someone who uses his skills with a criminal intent. Some
examples are: cracking bank accounts in order to make transfernces to their
own accounts, stealing information to be sold in the black market, or attacking
the computer network of an organization for money.&lt;br /&gt;
&lt;br /&gt;
Some famous cases of black hat hacking include Kevin Mitnick, who used his
black hat hackers skills to enter the computers of organizations such as Nokia,
Fujitsu, Motorola and Sun Microsystems (it must be mentioned that he is now a
white hat hacker); Kevin Poulsen, who took control of all the phone lines in
Los Angeles in order to win a radio contest (the prize was a Porsche 944 S2);
and Vladimir Levin, which is the handle of the mastermind behind the stealing
of $10'000,000 to Citigrou. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2015/09/types-of-hackers.html</link><thr:total>0</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-4102222421547607592</guid><pubDate>Wed, 02 Sep 2015 05:32:00 +0000</pubDate><atom:updated>2016-12-02T23:16:23.106-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Hack Windows Admin......</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div dir="ltr"&gt;
&lt;div style="font-family: georgia,serif; line-height: normal; margin-bottom: 12pt;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span&gt;Today, i am going to show you
many aspects of the Windows Password Storage path, Method of Encryption, and
breaking into Windows by cracking the admin password. We need this often for
many reasons:&lt;br /&gt;
&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif; line-height: normal; margin-bottom: 12pt;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span&gt;&lt;b&gt;1)&lt;/b&gt; Sometime we have forgotten our old password and Hint isn't helping
out.&lt;br /&gt;
&lt;b&gt;2)&lt;/b&gt; We want to break into someone computer to get the information.&lt;br /&gt;
&lt;b&gt;3)&lt;/b&gt; Just want to take revenge from someone.&lt;br /&gt;
&lt;b&gt;4)&lt;/b&gt; Stealing computer data.&lt;br /&gt;
&lt;br /&gt;
Lets, take a deep dive in Cracking Windows password and also where these are
stored and in which format.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;SAM file and Password Hashes~Place where these passwords are stored in
Hashes:&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif; line-height: normal; margin-bottom: 12pt;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span&gt;Password Hashes - When you type your password into a Windows NT, 2000, or XP
login Windows Seven, Vista etc Windows encrypts your password using a specific
encryption scheme that turns your password into something that looks like this:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7524248b4d2c9a9eadd3b435c51404eddc5&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;&lt;br /&gt;
&lt;br /&gt;
This is a password Hash. This is what is actually being checked against when
you type your password in. It encrypts what you typed and bounces it against
what is stored in the Registry and/or SAM File.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="line-height: 115%;"&gt;You can break this hash password from&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;a href="http://www.md5hash.com/"&gt;www.md5hash.com&lt;/a&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;a href="http://www.passcracking.ru/"&gt;www.passcracking.ru&lt;/a&gt;&lt;br /&gt;&lt;span style="font-size: x-small;"&gt;&lt;span style="line-height: 115%;"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="line-height: 115%;"&gt;SAM File - Holds the user names and password hashes for every account on the
local machine, or domain if it is a domain controller.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;Location of SAM/Hashes:&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="line-height: 115%;"&gt;You can find what you're looking for in several locations on a given machine. &lt;br /&gt;
It can be found on the hard drive in the folder %systemroot%system32config (i-e
&lt;b&gt;&lt;span style="background: none repeat scroll 0% 0% white;"&gt;C:\windows\system32\config)&lt;/span&gt;&lt;/b&gt;.
However this folder is locked to all accounts including Administrator while the
machine is running. The only account that can access the SAM file during
operation is the "System" account. &lt;br /&gt;
&lt;br /&gt;
The second location of the SAM or corresponding hashes can be found in the
registry. It can be found under HKEY_LOCAL_MACHINESAM. This is also locked to
all users, including Administrator, while the machine is in use.(GO to Run and
Type Regedit and Hit enter, Now scroll to HKEY_LOCAL_MACHINESAM, However you
may not access to it.)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;So the two (Some other also) locations of the SAMHashes are:&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="line-height: 115%;"&gt;&lt;b&gt;- %systemroot%system32config&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;- In the registry under HKEY_LOCAL_MACHINESAM&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;b&gt;&lt;i&gt;&lt;u&gt;&lt;span style="line-height: 115%;"&gt;Cracking or Breaking Into Admin Account:&lt;/span&gt;&lt;/u&gt;&lt;/i&gt;&lt;/b&gt;&lt;span style="line-height: 115%;"&gt; &lt;br /&gt;
&lt;b&gt;&lt;u&gt;How to get Hashes form SAM file?&lt;/u&gt;&lt;/b&gt; &lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="line-height: 115%;"&gt;Well, Below are the methods to do so:&lt;br /&gt;
&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="line-height: 115%;"&gt;&lt;b&gt;1)&lt;/b&gt; Well, the easiest way to do this is to boot your target machine to an
alternate OS like &lt;/span&gt;&lt;a href="http://www.softpedia.com/get/System/System-Miscellaneous/NTFSDOS-Professional.shtml"&gt;&lt;span style="color: blue; line-height: 115%;"&gt;NTFSDOS&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt; or Linux
and just copy the SAM from the %systemroot%system32config&amp;nbsp; folder. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="line-height: 115%;"&gt;It's quick,
it's easy, and it's effective. You can get a copy of &lt;/span&gt;&lt;a href="http://www.softpedia.com/get/System/System-Miscellaneous/NTFSDOS-Professional.shtml"&gt;&lt;span style="color: blue; line-height: 115%;"&gt;NTFSDOS&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt; from
Sysinternals(http://www.sysinternals.com) The regular version of &lt;/span&gt;&lt;a href="http://www.softpedia.com/get/System/System-Miscellaneous/NTFSDOS-Professional.shtml"&gt;&lt;span style="color: blue; line-height: 115%;"&gt;NTFSDOS&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt; is
freeware, which is always nice, but only allows for Read-Only access. This
should be fine for what you want to do, however, if you're the kind of person
that just has to have total control and has some money to burn. NTFSDOS Pro,
which is also by Sysinternals has read/write access but it'll cost you $299.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2)&lt;/b&gt; You can also get password hashes by using pwdump2 (Google It to get
software ~ Search at openwall.com). pwdump uses .DLL injection in order to use
the system account to view and get the password hashes stored in the registry.
It then obtains the hashes from the registry and stores them in a handy little
text file that you can then&amp;nbsp; paste them into a password cracking utility like
l0phtcrack or John the ripper (Linux Based works well) also cain and abel can
be used.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3)&lt;/b&gt; Import Hashes directly from l0phtcrack, and let them open to you by
cracking.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;Obtained Hashes? Now crack them:&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="line-height: 115%;"&gt;Well, as i have said that these can't be reversed but somehow automated famous
cracking softwares can be used to achieve the target. Yes, it is possible, All
we have to do is to have a bit patience. The software will use a lot of strings
and will compare these hashes also, Inshort it will decode them.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="line-height: 115%;"&gt;
&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="line-height: 115%;"&gt;&lt;b&gt;1)&lt;/b&gt; &lt;/span&gt;&lt;a href="http://www.openwall.com/passwords/microsoft-windows-nt-2000-xp-2003-vista-7"&gt;&lt;span style="color: blue; line-height: 115%;"&gt;John
the Ripper&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt; - John the Ripper is to many, the old standby password cracker. It is
command line which makes it nice if you're doing some scripting, and best of
all it's free and in open source. The only real thing that JtR is lacking is
the ability to launch Brute Force attacks against your password file. But look
at it this way, even though it is only a dictionary cracker, that will probably
be all you need. I would say that in my experience I can find about 85-90% of
the passwords in a given file by using just a dictionary attack.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2)&lt;/b&gt; &lt;/span&gt;&lt;a href="http://www.l0phtcrack.com/download.html"&gt;&lt;span style="color: blue; line-height: 115%;"&gt;L0phtCrack&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt; -
Probably the most wildly popular password cracker out there. L0phtCrack is sold
by the folks at @Stake. And with a pricetag of $249 for a single user license
it sure seems like every one owns it. This is probably the nicest password
cracker you will ever see. With the ability to import hashes directly from the
registry pwdump and dictionary, hybrid, and brute-force capabilities. No
password should last long. Well, I shouldn't say "no password". But
almost all will fall to L0phtCrack given enough time.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;Making Your Own Password in Windows: &lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="line-height: 115%;"&gt;&lt;i&gt;Injecting Password Hashes into the SAM:&lt;/i&gt; &lt;br /&gt;
Easiest ways to gain Administrator privileges on a machine, is by injecting
your own password hashes into the SAM file. In order to do this you will need
physical access to the machine and a brain larger than a peanut. Using a
utility called "&lt;/span&gt;&lt;a href="http://pogostick.net/%7Epnh/ntpasswd/"&gt;&lt;span style="color: blue; line-height: 115%;"&gt;chntpw&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;" by
Petter Nordhal-Hagen you can inject whatever password you wish into the SAM
file of any NT, 2000, or XP machine thereby giving you total control, just burn
the .iso on a disk and use it. I would give a tip like backing up the SAM file
first by using an alternate OS.Make a USB disk of linux or Windows Live dsik
can also work. Go in, inject the password of your choosing. Login using your
new password. Do what you need to do. Then restore the original SAM so that no
one will know that i was hacked.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="line-height: 115%;"&gt;&lt;span style="font-family: georgia,serif;"&gt;You need to have admin access to
 perform this change from the command line. This is an especially handy 
trick if you want to change a password on an account but you’ve 
forgotten the original (going through the Control Panel can require 
confirmation of the old password).&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Now we hack Admin Password To verify the user name, by simply typing net user, I get a list of all 
the user names on that windows machine. Now, go to the command prompt 
and enter:&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;span style="font-family: arial, geneva, helvetica;"&gt;cd\&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;center&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="font-family: arial, geneva, helvetica;"&gt;
cd windows\system32&lt;br /&gt;
net user&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/center&gt;
&lt;span style="font-size: x-small;"&gt;
&lt;div style="font-family: georgia,serif;"&gt;
If there are people near you and you don’t want them to see the password you type, enter:&lt;br /&gt;
net user *&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; E.g. &amp;gt; net user username *&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt; Type a password for the user:&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt; Confirm the password:&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="display: block; font-family: georgia,serif; text-align: left;"&gt;
&lt;img border="0" src="http://i111.photobucket.com/albums/n150/askstudent/adminpassword.png" style="display: block; margin-left: auto; margin-right: auto; text-align: center;" /&gt;&lt;/div&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;hr size="2" style="font-family: georgia,serif;" width="100%" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif; font-size: x-small;"&gt;&lt;span style="line-height: 115%;"&gt;&lt;b&gt;&lt;u&gt;Another Easy method, Using&amp;nbsp; ophcrack to Hack into Admin Account:&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt; &lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;b&gt;&lt;a href="http://sourceforge.net/projects/ophcrack/files/ophcrack-livecd/2.3.1/ophcrack-xp-livecd-2.3.1.iso/download" target="_blank"&gt;Ophcrack&lt;/a&gt;&lt;/b&gt; is a Windows password cracker based on a time-memory trade-off 
using rainbow tables. This is a new variant of Hellman's original 
trade-off, with better performance. It recovers 99.9% of alphanumeric 
passwords in seconds.&lt;/span&gt;&lt;/div&gt;
&lt;div style="display: block; font-family: georgia,serif; text-align: left;"&gt;
&lt;img border="0" height="210" src="http://sourceforge.net/dbimage.php?id=170373" style="display: block; margin-left: auto; margin-right: auto; text-align: center;" width="320" /&gt;&lt;/div&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="line-height: 115%;"&gt;
This is a type of offline cracking, Just grab .iso of ophcrack from &lt;/span&gt;&lt;a href="http://ophcrack.sourceforge.net/download.php?type=livecd" target="_blank"&gt;&lt;span style="color: blue; line-height: 115%;"&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;. Burn it
and enjoy using.&lt;br /&gt;
&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="line-height: 115%;"&gt;&lt;b&gt;1.&lt;/b&gt;&amp;nbsp; Opchrack can crack passwords for Windows 7, Windows Vista, and Windows
XP.&lt;br /&gt;
&lt;b&gt;2.&lt;/b&gt; Ophcrack can recover 99.9% of passwords from Windows XP, usually in a
matter of seconds.
Any&amp;nbsp;
14-character or smaller password that uses any combination of numbers, small
letters, and capital letters should be crackable.&lt;br /&gt;
&lt;b&gt;3.&lt;/b&gt;&amp;nbsp; Ophcrack can recover 99% of passwords from Windows 7 or Windows Vista.
A dictionary attack is used in Windows 7 and Vista.&lt;br /&gt;
&lt;b&gt;4.&lt;/b&gt;&amp;nbsp; The Ophcrack LiveCD option allows for completely automatic password
recovery.&lt;br /&gt;
&lt;b&gt;5.&lt;/b&gt;&amp;nbsp; LiveCD method requires no installation in Windows, making it a safe
alternative to many other password recovery tools.&lt;br /&gt;
&lt;b&gt;6.&amp;nbsp; &lt;/b&gt;No Windows passwords need to be known to use the Ophcrack LiveCD to
crack your Windows passwords.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;a href="http://sourceforge.net/projects/ophcrack/files/ophcrack-livecd/2.3.1/ophcrack-xp-livecd-2.3.1.iso/download" target="_blank"&gt;&lt;b&gt;Download&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="line-height: 115%;"&gt;I think this ophcrack method is far better, Try this one just get a disk and
write it, Or else USB disk can aslo be used.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;Some security Tips ~ Making strong passwords:&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: georgia,serif;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="line-height: 115%;"&gt;Now, You might have come to know that how passwords can be cracked, So there
are some tips for you.&lt;br /&gt;
&lt;b&gt;1)&lt;/b&gt; Do not make common passwords like 123456 or the one of your own name.&lt;br /&gt;
&lt;b&gt;2)&lt;/b&gt; Use @, *, # or other symbols in your passwords to ensure maximum security
in this case John the ripper and Ophcrack and also other cracking tools may
take long time, it will be frustrating for hacker.&lt;br /&gt;
&lt;b&gt;3)&lt;/b&gt; Keep changing your password. So, that if long time is taken by one
hash to decode, until it decodes you have generated another hash.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2015/09/hack-windows-admin.html</link><thr:total>0</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author><enclosure length="435847168" type="application/octet-stream" url="http://sourceforge.net/projects/ophcrack/files/ophcrack-livecd/2.3.1/ophcrack-xp-livecd-2.3.1.iso/download"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-5713251952671297456</guid><pubDate>Wed, 02 Sep 2015 05:15:00 +0000</pubDate><atom:updated>2016-12-02T23:16:23.113-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Hack WhatsApp Account......</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;On Daily we
have heard news about online services is suffering from a lack of security. In
February WhatsApp has been down for nearly four hours, &lt;br /&gt;as if this were not
enough, people became aware of the security flaw that allows conversations that
should be read by anyone provided it learn properly perform the procedures.&lt;/span&gt;

&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: red; font-family: Georgia,Times New Roman,serif;"&gt;&lt;b&gt;Steps to follow:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;1 -
First of all you need to have the device at hand, use the Social Engineering
and be quick in getting the e-mail and backup files &lt;b&gt;msgstore-2014-05-02.1.db.crypt5&lt;/b&gt;. &lt;br /&gt;To get the email for this
follow the procedures below.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;Enter the Play Store and view the e-mail, or write down mentalize somewhere
without the person noticing.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvUUOrvd5gBOi_Xir1QwiZwfm__16Sn-tSQmuwC8UH0D4ocYKdp5OAhJKELVaZ0v0D-EiJxkZRNeJ2suERv9kct9xVtCdsPxTbci19YhLO8OQqtTB5K3CTeNVTHNTu55goWZpMYbsn668/s1600/print1.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvUUOrvd5gBOi_Xir1QwiZwfm__16Sn-tSQmuwC8UH0D4ocYKdp5OAhJKELVaZ0v0D-EiJxkZRNeJ2suERv9kct9xVtCdsPxTbci19YhLO8OQqtTB5K3CTeNVTHNTu55goWZpMYbsn668/s1600/print1.jpg" width="266" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;&lt;span lang="EN"&gt;Now Go to &lt;span&gt;the&lt;/span&gt; &lt;span&gt;device settings&lt;/span&gt; &lt;span&gt;from&lt;/span&gt; &lt;span&gt;&lt;b&gt;Settings&lt;/b&gt;&lt;/span&gt; &lt;span&gt;-&lt;/span&gt;&amp;gt;
&lt;b&gt;Accounts &amp;amp; &lt;span&gt;Sync&lt;/span&gt;&lt;/b&gt;,
look for the &lt;span&gt;email&lt;/span&gt; &lt;span&gt;from Google and&lt;/span&gt;
&lt;span&gt;mentalize&lt;/span&gt; &lt;span&gt;or write down&lt;/span&gt; &lt;span&gt;somewhere&lt;/span&gt; &lt;span&gt;without the person&lt;/span&gt; &lt;span&gt;noticing.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVacDTki88PSaWGTLcILC6meVgrMiqeK9dnLA-Tk_Cd02BKFp9VF7E7regXGKhQvM4U6Lk3Xf3SYbHv2_KNNf_s7RABjxGSH7qIdvUQX4RWgbxy_oYaJ34azPSyjLkh8_QyL7_FmOFSNE/s1600/print2.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVacDTki88PSaWGTLcILC6meVgrMiqeK9dnLA-Tk_Cd02BKFp9VF7E7regXGKhQvM4U6Lk3Xf3SYbHv2_KNNf_s7RABjxGSH7qIdvUQX4RWgbxy_oYaJ34azPSyjLkh8_QyL7_FmOFSNE/s1600/print2.jpg" width="266" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span lang="EN"&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;&lt;b&gt;2 - &lt;/b&gt;Now
let's take the msgstore-2014-05-08.1.db.crypt7 file To do this, use &lt;b&gt;Polaris Office&lt;/b&gt; or any other app that
allows you to navigate between folders and manage files.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;Follow
this path: &lt;b&gt;My files&lt;/b&gt; -&amp;gt; &lt;b&gt;WhatsApp&lt;/b&gt; -&amp;gt; &lt;b&gt;Databases&lt;/b&gt; - In this directory you will find all the backup files of
your messenger. &lt;br /&gt;When you do find the file sharing for your mobile phone via
bluetooth.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUeeAxLcJlRHKHHqs41PjUo_9AC5XXTvAybh7LU0BsWeaehCoe_3TApAJ1OiFSLq0-Etl0ptPtw3ZaSGqjAX4oPYrm1ktfyWVJjEThReyEvsf5J4zqT2Ff5lt0qO4ueHScGC9c3S37L1I/s1600/print3.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUeeAxLcJlRHKHHqs41PjUo_9AC5XXTvAybh7LU0BsWeaehCoe_3TApAJ1OiFSLq0-Etl0ptPtw3ZaSGqjAX4oPYrm1ktfyWVJjEThReyEvsf5J4zqT2Ff5lt0qO4ueHScGC9c3S37L1I/s1600/print3.jpg" width="266" /&gt;&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;
&lt;div style="clear: both;"&gt;
&lt;span lang="EN"&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span lang="EN"&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;
&lt;div style="clear: both;"&gt;
&lt;span lang="EN"&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span lang="EN"&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span lang="EN"&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span lang="EN"&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;span&gt;&lt;span lang="EN"&gt;&lt;b&gt;3&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang="EN"&gt;&lt;b&gt; &lt;span&gt;-&lt;/span&gt;&lt;/b&gt; &lt;span&gt;Have&lt;/span&gt;
&lt;span&gt;we got&lt;/span&gt; &lt;span&gt;the&lt;/span&gt; &lt;span&gt;e-&lt;/span&gt;mail
&lt;span&gt;and&lt;/span&gt; &lt;span&gt;file backup&lt;/span&gt; &lt;a href="http://whatcrypt.com/?cmd=_decrypt" target="_blank"&gt;&lt;span&gt;&lt;b&gt;http://whatcrypt.com/?cmd=_decrypt&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;
&lt;span&gt;&lt;br /&gt;we&lt;/span&gt; &lt;span&gt;enter the&lt;/span&gt; &lt;span&gt;site&lt;/span&gt;
&lt;span&gt;and send&lt;/span&gt; &lt;span&gt;the backup file&lt;/span&gt;. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #274e13;"&gt;&lt;span&gt;To Submit&lt;/span&gt;&amp;nbsp;&lt;span&gt;follows:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt; &lt;br /&gt;
&lt;span&gt;&lt;b&gt;Account&lt;/b&gt;&lt;/span&gt;:
Enter the &lt;span&gt;email&lt;/span&gt; &lt;span&gt;of the victim&lt;/span&gt; &lt;br /&gt;
&lt;span&gt;&lt;b&gt;Database&lt;/b&gt;&lt;/span&gt;:
Select the &lt;span&gt;database&lt;/span&gt; &lt;span&gt;backup&lt;/span&gt; &lt;br /&gt;
&lt;span&gt;Click&lt;/span&gt; &lt;span&gt;Process&lt;/span&gt; &lt;span&gt;/
download&lt;/span&gt; &lt;span&gt;zip&lt;/span&gt; &lt;br /&gt;
&lt;span&gt;Save the&lt;/span&gt; &lt;span&gt;zip&lt;/span&gt; &lt;span&gt;file&lt;/span&gt;
&lt;span&gt;on your desktop&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgakPGDyVLls9sb84ueD4ilEM-wWKetPhXzm7iqc55AmuGjG9bX7ZJ1EJOMcIpzLnVPhYD5TS2tgqB2NWxMGRxSyJsqU8USRyNX9GQu24PtQiI7bjj-EoJgO8nEjQWBd-3Zy5WMZ2OVYW4/s1600/print4.jpg" width="640" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="line-height: normal; margin-bottom: 0.0001pt; text-align: center;"&gt;
&lt;span lang="EN" style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;b&gt;4 -&lt;/b&gt; Once you have downloaded the backup file in zip format we now need
to download the tool to extract the backup and we have access to conversations.
Save on the desktop.&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal; margin-bottom: 0.0001pt; text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIFuvmRlrYz40RmVsmhyphenhyphenu_kgfTZSLSS4rfk6YNT4rChRHJE7l1qPFOCuLKmcalKWTLnk_cI-AYE0cuaScRVHeQtbgH69LTWajAcqSdBD4ork3t9nhxLDUYf_PiEfthngbkKp4yoi3yqKk/s1600/print5.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIFuvmRlrYz40RmVsmhyphenhyphenu_kgfTZSLSS4rfk6YNT4rChRHJE7l1qPFOCuLKmcalKWTLnk_cI-AYE0cuaScRVHeQtbgH69LTWajAcqSdBD4ork3t9nhxLDUYf_PiEfthngbkKp4yoi3yqKk/s1600/print5.jpg" width="640" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="line-height: normal; margin-bottom: 0.0001pt; text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal; margin-bottom: 0.0001pt; text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;b&gt;WhatsApp Decrypt MediaFire: &lt;/b&gt;&lt;a href="http://www.mediafire.com/download/hw7m1590ld27vd5/WhatsApp_Decrypt.rar" target="_blank"&gt;http://www.mediafire.com/download/hw7m1590ld27vd5/WhatsApp_Decrypt.rar&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;Scanner Virus Total: &lt;a href="https://www.virustotal.com/pt/file/c58bbef257e1ada303478b468a2b68523cbd307e1620d76d53489763e0ef5e15/analysis/1399523236/" target="_blank"&gt;https://www.virustotal.com/pt/file/c58bbef257e1ada303478b468a2b68523cbd307e1620d76d53489763e0ef5e15/analysis/1399523236/&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;span&gt;&lt;span lang="EN"&gt;5&lt;/span&gt;&lt;/span&gt;&lt;span lang="EN"&gt; &lt;span&gt;-&lt;/span&gt; &lt;span&gt;From the
desktop&lt;/span&gt; &lt;span&gt;to extract&lt;/span&gt; &lt;span&gt;the&lt;/span&gt; &lt;span&gt;file&lt;/span&gt; &lt;span&gt;WhatsApp&lt;/span&gt; &lt;span&gt;Decrypt.zip&lt;/span&gt;
&lt;span&gt;&lt;b&gt;install&lt;/b&gt;&lt;/span&gt;&lt;b&gt; &lt;span&gt;python-&lt;/span&gt;3.4.0&lt;/b&gt; &lt;span&gt;folder&lt;/span&gt; &lt;span&gt;and enter the&lt;/span&gt; &lt;span&gt;WhatsApp&lt;/span&gt;.
&lt;br /&gt;
&lt;span&gt;Browse&lt;/span&gt; &lt;span&gt;by:&lt;/span&gt; &lt;span&gt;&lt;b&gt;WhatsApp&lt;/b&gt;&lt;/span&gt; &lt;span&gt;-&lt;/span&gt;&amp;gt;
&lt;span&gt;&lt;b&gt;Whatsapp_Xtract_V2.1_2012&lt;/b&gt;&lt;/span&gt;&lt;b&gt;-05-10-2&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFjoizLW70c4A6-vEBQ78rYaGzvt43M6PV8xPfL_Y6pMbjpMr45hiKL1idGSLlGzKmFa1T7qzVVRW8SC4eir_fTE3iN_zoJKNkV801zptQYjtp2d-FADgtIPWrXGii2iwKiWiayFRVtZ0/s1600/print6.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;img border="0" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFjoizLW70c4A6-vEBQ78rYaGzvt43M6PV8xPfL_Y6pMbjpMr45hiKL1idGSLlGzKmFa1T7qzVVRW8SC4eir_fTE3iN_zoJKNkV801zptQYjtp2d-FADgtIPWrXGii2iwKiWiayFRVtZ0/s1600/print6.jpg" width="400" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span lang="EN" style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;b&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;When you&lt;b&gt;
install python-3.4.0&lt;/b&gt; do the following steps:&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;1 - Go
to &lt;span style="font-size: x-small;"&gt;My Computer, click with the right mouse button and &lt;b&gt;Properties&lt;/b&gt; -&amp;gt; &lt;b&gt;Advanced
System Settings&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;2 - In
the System Properties navigate to the &lt;b&gt;Advanced&lt;/b&gt;
tab -&amp;gt; &lt;b&gt;Environment Variables&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;3 -
&lt;b&gt;Environment Variables&lt;/b&gt; look for &lt;b&gt;Path&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;4 - Edit
the &lt;b&gt;PATH&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;5 - At
the end of &lt;b&gt;PATH&lt;/b&gt; add &lt;b&gt;;C:\Python34&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;span style="line-height: 115%;"&gt;6 - Click o&lt;/span&gt;&lt;span style="line-height: 18.399999618530273px;"&gt;k&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;&amp;nbsp;and close&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;span style="line-height: 115%;"&gt;&amp;nbsp;&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ5AJ8hGL9PAF52UUWe1sEfuJniWUfSxtaRD_ZQk4N05kSwSJ5gDQCjOeKt9JhrOIWoE9CGJpbe85uxyaAsfR6WQdftdD83hhhwsoI6W6_F9znt50_2uZdW8WTKD2wnyeystMKtZMfRbg/s1600/print7.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;img border="0" height="277" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ5AJ8hGL9PAF52UUWe1sEfuJniWUfSxtaRD_ZQk4N05kSwSJ5gDQCjOeKt9JhrOIWoE9CGJpbe85uxyaAsfR6WQdftdD83hhhwsoI6W6_F9znt50_2uZdW8WTKD2wnyeystMKtZMfRbg/s1600/print7.jpg" width="640" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;&lt;span&gt;&lt;span lang="EN"&gt;6&lt;/span&gt;&lt;/span&gt;&lt;span lang="EN"&gt; &lt;span&gt;-&lt;/span&gt; &lt;span&gt;Now
extract&lt;/span&gt; &lt;span&gt;the&lt;/span&gt; &lt;span&gt;file&lt;/span&gt; &lt;span&gt;from step&lt;/span&gt; &lt;span&gt;3&lt;/span&gt; &lt;span&gt;msgstore_decrypted&lt;/span&gt;
&lt;span&gt;on the desktop&lt;/span&gt;, copy and paste &lt;span&gt;it&lt;/span&gt;
&lt;span&gt;on&lt;/span&gt; &lt;span&gt;&lt;b&gt;WhatsApp&lt;/b&gt;&lt;/span&gt;
&lt;span&gt;folder&lt;/span&gt; &lt;span&gt;-&lt;/span&gt;&amp;gt; &lt;span&gt;&lt;b&gt;Whatsapp_Xtract_V2.1_2012&lt;/b&gt;&lt;/span&gt;&lt;span&gt;&lt;b&gt;-05-&lt;/b&gt;&lt;/span&gt;&lt;b&gt;10-2&lt;/b&gt; &lt;span&gt;and replace&lt;/span&gt;
&lt;span&gt;the file&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBm0pTyJ3YiQ80j9F0_23G3nqm2-kRQH9S6DdxnseTVUCRs3abVB3wK_mW-qPLZNVQHOwrzVDqytIfIg6kk6eao-wUIEobWWNiP_vK1A1OC6g1GAvwKWSIyzVm23bRI2s7es2MYZTx50Y/s1600/print8.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;img border="0" height="373" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBm0pTyJ3YiQ80j9F0_23G3nqm2-kRQH9S6DdxnseTVUCRs3abVB3wK_mW-qPLZNVQHOwrzVDqytIfIg6kk6eao-wUIEobWWNiP_vK1A1OC6g1GAvwKWSIyzVm23bRI2s7es2MYZTx50Y/s1600/print8.jpg" width="640" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfC8m8F1G7rXWeaKprazv5J-1B0TSnjkVOy9TIM0q6pYthL54Xzlo2WnR5F7EyrRXih1ELRx3PmAjtB64HkZvSl2S65w66b-3JwzmoOCPkaexYiR2X1lrLSpgr-mg6pd4dzoFMGrBTUV4/s1600/print9.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;img border="0" height="371" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfC8m8F1G7rXWeaKprazv5J-1B0TSnjkVOy9TIM0q6pYthL54Xzlo2WnR5F7EyrRXih1ELRx3PmAjtB64HkZvSl2S65w66b-3JwzmoOCPkaexYiR2X1lrLSpgr-mg6pd4dzoFMGrBTUV4/s1600/print9.jpg" width="640" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span lang="EN"&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;span&gt;&lt;span lang="EN" style="line-height: 115%;"&gt;7&lt;/span&gt;&lt;/span&gt;&lt;span lang="EN" style="line-height: 115%;"&gt; &lt;span&gt;-&lt;/span&gt; &lt;span&gt;Replace&lt;/span&gt;
&lt;span&gt;the&lt;/span&gt; &lt;span&gt;&lt;b&gt;WhatsApp&lt;/b&gt;&lt;/span&gt;
&lt;span&gt;folder&lt;/span&gt; &lt;span&gt;-&lt;/span&gt;&amp;gt; &lt;span&gt;&lt;b&gt;Whatsapp_Xtract_V2.1_2012&lt;/b&gt;&lt;/span&gt;&lt;span&gt;&lt;b&gt;-05-&lt;/b&gt;&lt;/span&gt;&lt;b&gt;10-2&lt;/b&gt; &lt;span&gt;from step&lt;/span&gt; &lt;span&gt;5&lt;/span&gt; &lt;span&gt;and &lt;br /&gt;look for&lt;/span&gt; &lt;span&gt;&lt;b&gt;msgstore.dll&lt;/b&gt;&lt;/span&gt; &lt;span&gt;file,&lt;/span&gt;
&lt;span&gt;drag it&lt;/span&gt; &lt;span&gt;onto the&lt;/span&gt; &lt;span&gt;&lt;b&gt;whatsapp_xtract_drag'n'drop_database&lt;/b&gt;&lt;/span&gt;&lt;b&gt; &lt;span&gt;file (&lt;/span&gt;s) &lt;span&gt;_here&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixRseASfJhyygXlWW9Jth35I-NOavQnOgh6ul0g-2Ei4MhFfewAjnQhsSziM0yeQbdIbHb8zSX7FLmjrf9VoS4Pn-4srj-DzrsHxNLrbYpLyxZa0uG8gNc9X8vLNk7yJUVRPtydCsvkwk/s1600/print10.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;img border="0" height="388" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixRseASfJhyygXlWW9Jth35I-NOavQnOgh6ul0g-2Ei4MhFfewAjnQhsSziM0yeQbdIbHb8zSX7FLmjrf9VoS4Pn-4srj-DzrsHxNLrbYpLyxZa0uG8gNc9X8vLNk7yJUVRPtydCsvkwk/s1600/print10.jpg" width="640" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span lang="EN"&gt;&lt;span&gt;&lt;span lang="EN" style="font-family: Georgia,Times New Roman,serif; line-height: 115%;"&gt;&lt;b&gt;&lt;span&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif; font-size: x-small;"&gt;After
you drag it will create a file called msgstore.db.html the folder and ask you
to press any key at the command prompt to continue ... &lt;br /&gt;Pressing any key it will
open in your default browser displaying the file msgstore.db.html all
conversations, dates, numbers, etc...&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhN0pSLj6GDT8dNPZJ4BjMRj2FMK6Y0hAIgPZ4SQ6_wJnWvG6vgObHmSWN5r2mjvXLyMy2e6LdivW0xngivH5GVIHiHTtko8c1CNWCBzZxBFhJkVYxuq2BHXxm_dV_3ChKD6VgJL1Ity2A/s1600/print11.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;img border="0" height="382" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhN0pSLj6GDT8dNPZJ4BjMRj2FMK6Y0hAIgPZ4SQ6_wJnWvG6vgObHmSWN5r2mjvXLyMy2e6LdivW0xngivH5GVIHiHTtko8c1CNWCBzZxBFhJkVYxuq2BHXxm_dV_3ChKD6VgJL1Ity2A/s1600/print11.jpg" width="640" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;b&gt;&lt;span style="font-family: Georgia,Times New Roman,serif;"&gt;&amp;nbsp;

&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;div&gt;
&lt;div style="display: inline-block;"&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;div dir="ltr" style="text-align: center;"&gt;
&lt;span lang="en" style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;span style="color: red;"&gt;&lt;b&gt;&lt;span&gt;Note&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;: &lt;span&gt;In step&lt;/span&gt; &lt;span&gt;2&lt;/span&gt; &lt;span&gt;print&lt;/span&gt; &lt;span&gt;shows&lt;/span&gt; &lt;span&gt;the&lt;/span&gt; &lt;span&gt;crypt&lt;/span&gt; &lt;span&gt;7&lt;/span&gt; &lt;span&gt;but the&lt;/span&gt; &lt;span&gt;crypt&lt;/span&gt; &lt;span&gt;is&lt;/span&gt; &lt;span&gt;correct&lt;/span&gt; &lt;span&gt;5&lt;/span&gt;!&lt;/span&gt;&lt;br /&gt;
&lt;span lang="en" style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span lang="en" style="font-family: Georgia,Times New Roman,serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;i&gt;&lt;span style="font-family: Courier New,Courier,monospace;"&gt;&lt;b&gt;Disclaimer:&lt;/b&gt; This tutorial is educational purpose only. HOC is not responsible for any kind of illegal activities. We believe in Security.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2015/09/hack-whatsapp-account.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvUUOrvd5gBOi_Xir1QwiZwfm__16Sn-tSQmuwC8UH0D4ocYKdp5OAhJKELVaZ0v0D-EiJxkZRNeJ2suERv9kct9xVtCdsPxTbci19YhLO8OQqtTB5K3CTeNVTHNTu55goWZpMYbsn668/s72-c/print1.jpg" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-2396521831634478109</guid><pubDate>Wed, 02 Sep 2015 05:13:00 +0000</pubDate><atom:updated>2016-12-02T23:16:23.089-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Hack Victim Computer...</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: center;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: georgia,serif;"&gt;&lt;span style="color: red;"&gt;&lt;b&gt;How To Hack &amp;amp; Access Same LAN Computers&lt;/b&gt;&lt;/span&gt; &lt;span style="color: red;"&gt;&lt;b&gt;?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: georgia,serif;"&gt;&lt;span style="color: #0c343d;"&gt;&lt;b&gt;If you are working in Office / Colleges and want to hack your friends &amp;amp; college mate PC then here is a trick&lt;/b&gt;&lt;/span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: georgia,serif;"&gt;&lt;br /&gt;First Step press &lt;b&gt;win+ R&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Go to Run&amp;gt; Type &lt;b&gt;Cmd&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;now type command &lt;b&gt;net view&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;It will be look as below &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;C:\&amp;gt;net view&lt;br /&gt;&lt;br /&gt;Server Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remark&lt;br /&gt;-----------------------------------------------&lt;br /&gt;\\xyz&lt;br /&gt;\\abc&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Here you can get all the names of all the computers machine names which connect with your LAN.&lt;br /&gt;&lt;br /&gt;Now you got the name.&amp;nbsp; Lets start hacking into the systems. &lt;br /&gt;&lt;br /&gt;After you get server name now type tracert command for knowing IP of the victim machine.&lt;br /&gt;&lt;br /&gt;Example:&lt;b&gt; C:\&amp;gt; tracert xyz&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Here you get the IP address of the XYZ computer machine.&lt;br /&gt;&lt;br /&gt;Now go to windows start button and type Remote Desktop Connection&lt;br /&gt;&amp;nbsp;&lt;div style="display: block; margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_uzBiLChjSsIc2dvnk7mmTKaPQ_e2I0ujkgbd48fJHp7x4ZYNlL8063hRM5P7Lhhpwr7xPZJlr9w232PA9ug56aGWmEFhBcbTbyuV1Ewv7z_n-_3hYdEMdMP1XNu27kO43V17kJe8gxY6/s1600/Remote+desktop+Connection.png"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_uzBiLChjSsIc2dvnk7mmTKaPQ_e2I0ujkgbd48fJHp7x4ZYNlL8063hRM5P7Lhhpwr7xPZJlr9w232PA9ug56aGWmEFhBcbTbyuV1Ewv7z_n-_3hYdEMdMP1XNu27kO43V17kJe8gxY6/s1600/Remote+desktop+Connection.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;After click on &lt;b&gt;Remote Desktop Connection&lt;/b&gt; you get below image.. &lt;br /&gt;&amp;nbsp;&lt;div style="display: block; margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIzbcMMgcTFXJr-dTPw3F8YYB9p00fAozXxWY_WCWaoxOEZ-s9YzdcklA62wtBfigwk9cVr8H7t07OrvRNWc3HdWDU63Ol03jqunXXOJK9dGDMg37TQL_GwrcGaD7dq4rf87oAMcT_U5gg/s1600/Remote+desktop+Connection+window.png"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIzbcMMgcTFXJr-dTPw3F8YYB9p00fAozXxWY_WCWaoxOEZ-s9YzdcklA62wtBfigwk9cVr8H7t07OrvRNWc3HdWDU63Ol03jqunXXOJK9dGDMg37TQL_GwrcGaD7dq4rf87oAMcT_U5gg/s1600/Remote+desktop+Connection+window.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;Now type the IP address or computer name of victim machine.&lt;br /&gt;&lt;br /&gt;Click on &lt;b&gt;&lt;span style="background-color: #cfe2f3;"&gt;Connect&lt;/span&gt; &amp;lt;-|&lt;/b&gt;&lt;br /&gt;It will also ask administrator password which is common as usual you known about.&lt;br /&gt;&lt;br /&gt;After few second Victim machine shown in your Computer..&lt;br /&gt;Now you can access that machine to open website, files, Software's, etc&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2015/09/hack-victim-computer.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_uzBiLChjSsIc2dvnk7mmTKaPQ_e2I0ujkgbd48fJHp7x4ZYNlL8063hRM5P7Lhhpwr7xPZJlr9w232PA9ug56aGWmEFhBcbTbyuV1Ewv7z_n-_3hYdEMdMP1XNu27kO43V17kJe8gxY6/s72-c/Remote+desktop+Connection.png" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-1032338738974949233</guid><pubDate>Wed, 02 Sep 2015 05:10:00 +0000</pubDate><atom:updated>2016-12-02T23:16:23.077-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Hack iCloud Activation Lock.....</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div&gt;
&lt;span style="background-color: transparent;"&gt;&lt;b&gt;&lt;span style="color: blue; font-size: small;"&gt;iCloud Apple iD BruteForcer&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: transparent; font-size: 10pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: transparent;"&gt;This
 tool is released by "Pr0x13" at GitHub. Attackers to break into any 
iCloud account, potentially giving them free access to victims’ iOS 
devices.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: transparent;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;span style="color: #073763; font-family: verdana, sans-serif;"&gt;&lt;b&gt;How to Install:&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;Put in HtDocs Folder in your Xampp installation.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;Install cUrl for your OS&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;Navigate to &lt;a href="http://127.0.0.1/iDict/"&gt;http://127.0.0.1/iDict/ &lt;/a&gt;in your web browser (preferably Firefox, Chrome, or Safari).&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;b&gt;&lt;span style="color: #073763;"&gt;Wordlist.txt&lt;/span&gt;&lt;/b&gt; is from iBrute and it satisfies iCloud password Requirements&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;It's been reported if icloud server responds with an error restart xampp or&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;your computer&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;-=Reports coming in that Server is now Patched with Rate Limiter=-&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;-=Server Fully Patched, Discontinue use if you don't want to lock your account!!=-&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: #073763; font-family: verdana, sans-serif;"&gt;&lt;b&gt;What is this?&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;A 100% Working iCloud Apple ID Dictionary attack that bypasses&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;Account Lockout restrictions and Secondary Authentication on any account.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: #073763; font-family: verdana, sans-serif;"&gt;&lt;b&gt;What this isn't:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;A bypass or fully automated removal&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: #073763; font-family: verdana, sans-serif;"&gt;&lt;b&gt;Why?&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;This bug is painfully obvious and was only a matter of time before it was&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;privately used for malicious or nefarious activities, I publicly disclosed it so apple will patch it.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif; font-size: small;"&gt;&lt;a href="https://github.com/Pr0x13/iDict/archive/master.zip" target="_blank"&gt;Download now&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif; font-size: small;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif; font-size: small;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif; font-size: small;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif; font-size: small;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif; font-size: small;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;b style="background-color: transparent; font-family: verdana,sans-serif;"&gt;&lt;span style="color: blue; font-size: small;"&gt;How to Unlock iCloud Activation Lock&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;First
 is need to Download the hack tool on your pc. Go on Download Button 
below and get this software. We give this for free, not is need to pay.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="background-color: transparent; font-family: verdana,sans-serif; font-size: 10pt;"&gt;Unlock iCloud Lock&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: verdana, sans-serif;"&gt;Download BypassTool&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;a href="http://gripfiles.net/93548" target="_blank"&gt;Server – 1&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;a href="http://downloadconfirm.net/file/0X55m9" target="_blank"&gt;Server - 2&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;a href="http://downloadconfirm.net/file/0X55m9" style="background-color: transparent; font-family: verdana,sans-serif; font-size: 10pt;" target="_blank"&gt;Server – 2&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;Step 1. Download and Unzip the file on your PC.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;Step 2. Start this hack tool on your PC. Connect your iPhone via USB cable.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;Step 3. Then click on Start button to process bypass icloud lock service.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;Step 4. Wait five min to be complete this process. When will be done click OK.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;The
 finaly process is when this will be complete to install the latest 
versizon on iTunes on your PC. Then make Restore Update on your device 
and icloud lock will be permanent removed from your apple device. This 
is official factory unlock on iCloud lock directly from Apple Database 
Servers.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;Many
 services in the world talk for this on net, but be careful, many of 
them is scam. We this service give you for free, and not like to give 
money to us. Only Download this hack tool and enjoy.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;Dear
 Readers if like to Unlock for Not free in five min your iCloud Lock on 
your iPhone go here on this Factory Unlock iPhone company. This is 
safely service we test. – iPhoneOfficialUnlock&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;a href="http://www.bypassicloudactivation.tools/unlock-icloud-activation-lock-iphones-permanent/" target="_blank"&gt;Source&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;span style="font-family: verdana, sans-serif; font-size: small;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2015/09/hack-icloud-activation-lock.html</link><thr:total>5</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author><enclosure length="-1" type="application/zip" url="https://github.com/Pr0x13/iDict/archive/master.zip"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-8020385879525445552</guid><pubDate>Fri, 28 Aug 2015 15:09:00 +0000</pubDate><atom:updated>2016-12-02T23:16:23.126-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Hack iCloud Activation Lock</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&amp;nbsp; &lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span style="background-color: transparent;"&gt;&lt;b&gt;&lt;span style="color: blue; font-size: small;"&gt;iCloud Apple iD BruteForcer&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: transparent; font-size: 10pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: transparent;"&gt;This
 tool is released by "Pr0x13" at GitHub. Attackers to break into any 
iCloud account, potentially giving them free access to victims’ iOS 
devices.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: transparent;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;span style="color: #073763; font-family: verdana, sans-serif;"&gt;&lt;b&gt;How to Install:&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;Put in HtDocs Folder in your Xampp installation.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;Install cUrl for your OS&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;Navigate to &lt;a href="http://127.0.0.1/iDict/"&gt;http://127.0.0.1/iDict/ &lt;/a&gt;in your web browser (preferably Firefox, Chrome, or Safari).&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;b&gt;&lt;span style="color: #073763;"&gt;Wordlist.txt&lt;/span&gt;&lt;/b&gt; is from iBrute and it satisfies iCloud password Requirements&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;It's been reported if icloud server responds with an error restart xampp or&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;your computer&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;-=Reports coming in that Server is now Patched with Rate Limiter=-&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;-=Server Fully Patched, Discontinue use if you don't want to lock your account!!=-&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: #073763; font-family: verdana, sans-serif;"&gt;&lt;b&gt;What is this?&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;A 100% Working iCloud Apple ID Dictionary attack that bypasses&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;Account Lockout restrictions and Secondary Authentication on any account.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: #073763; font-family: verdana, sans-serif;"&gt;&lt;b&gt;What this isn't:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;A bypass or fully automated removal&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: #073763; font-family: verdana, sans-serif;"&gt;&lt;b&gt;Why?&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;This bug is painfully obvious and was only a matter of time before it was&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;privately used for malicious or nefarious activities, I publicly disclosed it so apple will patch it.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif; font-size: small;"&gt;&lt;a href="https://github.com/Pr0x13/iDict/archive/master.zip" target="_blank"&gt;Download now&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif; font-size: small;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif; font-size: small;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif; font-size: small;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif; font-size: small;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;b style="background-color: transparent; font-family: verdana,sans-serif;"&gt;&lt;span style="color: blue; font-size: small;"&gt;How to Unlock iCloud Activation Lock&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;First
 is need to Download the hack tool on your pc. Go on Download Button 
below and get this software. We give this for free, not is need to pay.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="background-color: transparent; font-family: verdana,sans-serif; font-size: 10pt;"&gt;Unlock iCloud Lock&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: verdana, sans-serif;"&gt;Download BypassTool&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;a href="http://gripfiles.net/93548" target="_blank"&gt;Server – 1&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;a href="http://downloadconfirm.net/file/0X55m9" target="_blank"&gt;Server - 2&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;a href="http://downloadconfirm.net/file/0X55m9" style="background-color: transparent; font-family: verdana,sans-serif; font-size: 10pt;" target="_blank"&gt;Server – 2&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;Step 1. Download and Unzip the file on your PC.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;Step 2. Start this hack tool on your PC. Connect your iPhone via USB cable.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;Step 3. Then click on Start button to process bypass icloud lock service.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;Step 4. Wait five min to be complete this process. When will be done click OK.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;The
 finaly process is when this will be complete to install the latest 
versizon on iTunes on your PC. Then make Restore Update on your device 
and icloud lock will be permanent removed from your apple device. This 
is official factory unlock on iCloud lock directly from Apple Database 
Servers.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;Many
 services in the world talk for this on net, but be careful, many of 
them is scam. We this service give you for free, and not like to give 
money to us. Only Download this hack tool and enjoy.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;Dear
 Readers if like to Unlock for Not free in five min your iCloud Lock on 
your iPhone go here on this Factory Unlock iPhone company. This is 
safely service we test. – iPhoneOfficialUnlock&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;a href="http://www.bypassicloudactivation.tools/unlock-icloud-activation-lock-iphones-permanent/" target="_blank"&gt;Source&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;span style="font-family: verdana, sans-serif; font-size: small;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2015/08/hack-icloud-activation-lock.html</link><thr:total>0</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author><enclosure length="-1" type="application/zip" url="https://github.com/Pr0x13/iDict/archive/master.zip"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-2232565513190271893</guid><pubDate>Fri, 28 Aug 2015 15:04:00 +0000</pubDate><atom:updated>2016-12-02T23:16:23.084-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Google Hacking</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr"&gt;
&lt;b style="color: #990000;"&gt;Google queries for locating various Web servers&lt;/b&gt;&lt;br /&gt;“Apache/1.3.28 Server at” intitle:index.of&lt;br /&gt;Apache 1.3.2&lt;br /&gt;“Apache/2.0 Server at” intitle:index.of&lt;br /&gt;Apache 2.0&lt;br /&gt;“Apache/* Server at” intitle:index.of&lt;br /&gt;any version of Apache&lt;br /&gt;“Microsoft-IIS/4.0 Server at” intitle:index.of&lt;br /&gt;Microsoft Internet Information Services 4.0&lt;br /&gt;“Microsoft-IIS/5.0 Server at” intitle:index.ofMicrosoft Internet Information Services 5.0&lt;br /&gt;“Microsoft-IIS/6.0 Server at” intitle:index.of&lt;br /&gt;Microsoft Internet Information Services 6.0&lt;br /&gt;“Microsoft-IIS/* Server at” intitle:index.of&lt;br /&gt;any version of Microsoft Internet Information Services&lt;br /&gt;“Oracle HTTP Server/* Server at” intitle:index.of&lt;br /&gt;any version of Oracle HTTP Server&lt;br /&gt;“IBM _ HTTP _ Server/* * Server at” intitle:index.of&lt;br /&gt;any version of IBM HTTP Server&lt;br /&gt;“Netscape/* Server at” intitle:index.of&lt;br /&gt;any version of Netscape Server&lt;br /&gt;“Red Hat Secure/*” intitle:index.of&lt;br /&gt;any version of the Red Hat Secure server&lt;br /&gt;“HP Apache-based Web Server/*” intitle:index.of&lt;br /&gt;any version of the HP server&lt;br /&gt;Queries for discovering standard post-installation&lt;br /&gt;intitle:”Test Page for Apache Installation” “You are free”&lt;br /&gt;Apache 1.2.6&lt;br /&gt;intitle:”Test Page for Apache Installation” “It worked!” “this Web site!”&lt;br /&gt;Apache 1.3.0 – 1.3.9&lt;br /&gt;intitle:”Test Page for Apache Installation” “Seeing this instead”&lt;br /&gt;Apache 1.3.11 – 1.3.33, 2.0&lt;br /&gt;intitle:”Test Page for the SSL/TLS-aware Apache Installation” “Hey, it worked!”&lt;br /&gt;Apache SSL/TLS&lt;br /&gt;intitle:”Test Page for the Apache Web Server on Red Hat Linux”&lt;br /&gt;Apache on Red Hat&lt;br /&gt;intitle:”Test Page for the Apache Http Server on Fedora Core”&lt;br /&gt;Apache on Fedora&lt;br /&gt;intitle:”Welcome to Your New Home Page!”&lt;br /&gt;Debian Apache on Debian&lt;br /&gt;intitle:”Welcome to IIS 4.0!”&lt;br /&gt;IIS 4.0&lt;br /&gt;intitle:”Welcome to Windows 2000 Internet Services”&lt;br /&gt;IIS 5.0&lt;br /&gt;&lt;br /&gt;intitle:”Welcome to Windows XP Server Internet Services”&lt;br /&gt;IIS 6.0&lt;br /&gt;Querying for application-generated system reports&lt;br /&gt;“Generated by phpSystem”&lt;br /&gt;&lt;br /&gt;operating
 system type and version, hardware configuration, logged users, open 
connections, free memory and disk space, mount points&lt;br /&gt;“This summary was generated by wwwstat”&lt;br /&gt;web server statistics, system file structure&lt;br /&gt;“These statistics were produced by getstats”&lt;br /&gt;web server statistics, system file structure&lt;br /&gt;“This report was generated by WebLog”&lt;br /&gt;web server statistics, system file structure&lt;br /&gt;intext:”Tobias Oetiker” “traffic analysis”&lt;br /&gt;systemperformance statistics as MRTG charts, network configuration&lt;br /&gt;intitle:”Apache::Status” (inurl:server-status | inurl:status.html | inurl:apache.html)&lt;br /&gt;server version, operating system type, child process list, current connections&lt;br /&gt;intitle:”ASP Stats Generator *.*” “ASP Stats Generator” “2003-2004 weppos”&lt;br /&gt;web server activity, lots of visitor information&lt;br /&gt;intitle:”Multimon UPS status page”&lt;br /&gt;UPS device performance statistics&lt;br /&gt;intitle:”statistics of” “advanced web statistics”&lt;br /&gt;web server statistics, visitor information&lt;br /&gt;intitle:”System Statistics” +”System and Network Information Center”&lt;br /&gt;&lt;br /&gt;system performance statistics as MRTG charts, hardware configuration, running services&lt;br /&gt;intitle:”Usage Statistics for” “Generated by Webalizer”&lt;br /&gt;web server statistics, visitor information, system file structure&lt;br /&gt;intitle:”Web Server Statistics for ****”&lt;br /&gt;web server statistics, visitor information&lt;br /&gt;nurl:”/axs/ax-admin.pl” -script&lt;br /&gt;web server statistics, visitor information&lt;br /&gt;inurl:”/cricket/grapher.cgi”&lt;br /&gt;MRTG charts of network interface performance&lt;br /&gt;inurl:server-info “Apache Server Information”&lt;br /&gt;web server version and configuration, operating system type, system file structure&lt;br /&gt;“Output produced by SysWatch *”&lt;br /&gt;operating system type and version, logged users, free memory and disk space, mount points, running processes, system logs&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b style="color: #990000; font-family: verdana,sans-serif;"&gt;dork for finding admin page&lt;/b&gt;&lt;br /&gt;admin1.php&lt;br /&gt;admin1.html&lt;br /&gt;admin2.php&lt;br /&gt;admin2.html&lt;br /&gt;yonetim.php&lt;br /&gt;yonetim.html&lt;br /&gt;yonetici.php&lt;br /&gt;yonetici.html&lt;br /&gt;admin/account.php&lt;br /&gt;admin/account.html&lt;br /&gt;admin/index.php&lt;br /&gt;admin/index.html&lt;br /&gt;admin/login.php&lt;br /&gt;admin/login.html&lt;br /&gt;admin/home.php&lt;br /&gt;admin/controlpanel.html&lt;br /&gt;admin/controlpanel.php&lt;br /&gt;admin.php&lt;br /&gt;admin.html&lt;br /&gt;admin/cp.php&lt;br /&gt;admin/cp.html&lt;br /&gt;cp.php&lt;br /&gt;cp.html&lt;br /&gt;administrator/&lt;br /&gt;administrator/index.html&lt;br /&gt;administrator/index.php&lt;br /&gt;administrator/login.html&lt;br /&gt;administrator/login.php&lt;br /&gt;administrator/account.html&lt;br /&gt;administrator/account.php&lt;br /&gt;administrator.php&lt;br /&gt;administrator.html&lt;br /&gt;login.html&lt;br /&gt;modelsearch/login.php&lt;br /&gt;moderator.php&lt;br /&gt;moderator.html&lt;br /&gt;moderator/login.php&lt;br /&gt;moderator/login.html&lt;br /&gt;moderator/admin.php&lt;br /&gt;moderator/admin.html&lt;br /&gt;account.php&lt;br /&gt;account.html&lt;br /&gt;controlpanel/&lt;br /&gt;controlpanel.php&lt;br /&gt;controlpanel.html&lt;br /&gt;admincontrol.php&lt;br /&gt;admincontrol.html&lt;br /&gt;adminpanel.php&lt;br /&gt;adminpanel.html&lt;br /&gt;admin1.asp&lt;br /&gt;admin2.asp&lt;br /&gt;yonetim.asp&lt;br /&gt;yonetici.asp&lt;br /&gt;admin/account.asp&lt;br /&gt;admin/index.asp&lt;br /&gt;admin/login.asp&lt;br /&gt;admin/home.asp&lt;br /&gt;admin/controlpanel.asp&lt;br /&gt;admin.asp&lt;br /&gt;admin/cp.asp&lt;br /&gt;cp.asp&lt;br /&gt;administrator/index.asp&lt;br /&gt;administrator/login.asp&lt;br /&gt;administrator/account.asp&lt;br /&gt;administrator.asp&lt;br /&gt;login.asp&lt;br /&gt;modelsearch/login.asp&lt;br /&gt;moderator.asp&lt;br /&gt;moderator/login.asp&lt;br /&gt;moderator/admin.asp&lt;br /&gt;account.asp&lt;br /&gt;controlpanel.asp&lt;br /&gt;admincontrol.asp&lt;br /&gt;adminpanel.asp&lt;br /&gt;fileadmin/&lt;br /&gt;fileadmin.php&lt;br /&gt;fileadmin.asp&lt;br /&gt;fileadmin.html&lt;br /&gt;administration/&lt;br /&gt;administration.php&lt;br /&gt;administration.html&lt;br /&gt;sysadmin.php&lt;br /&gt;sysadmin.html&lt;br /&gt;phpmyadmin/&lt;br /&gt;myadmin/&lt;br /&gt;sysadmin.asp&lt;br /&gt;sysadmin/&lt;br /&gt;ur-admin.asp&lt;br /&gt;ur-admin.php&lt;br /&gt;ur-admin.html&lt;br /&gt;ur-admin/&lt;br /&gt;Server.php&lt;br /&gt;Server.html&lt;br /&gt;Server.asp&lt;br /&gt;Server/&lt;br /&gt;wp-admin/&lt;br /&gt;administr8.php&lt;br /&gt;administr8.html&lt;br /&gt;administr8/&lt;br /&gt;administr8.asp&lt;br /&gt;webadmin/&lt;br /&gt;webadmin.php&lt;br /&gt;webadmin.asp&lt;br /&gt;webadmin.html&lt;br /&gt;administratie/&lt;br /&gt;admins/&lt;br /&gt;admins.php&lt;br /&gt;admins.asp&lt;br /&gt;admins.html&lt;br /&gt;administrivia/&lt;br /&gt;Database_Administration/&lt;br /&gt;WebAdmin/&lt;br /&gt;useradmin/&lt;br /&gt;sysadmins/&lt;br /&gt;admin1/&lt;br /&gt;system-administration/&lt;br /&gt;administrators/&lt;br /&gt;pgadmin/&lt;br /&gt;directadmin/&lt;br /&gt;staradmin/&lt;br /&gt;ServerAdministrator/&lt;br /&gt;SysAdmin/&lt;br /&gt;administer/&lt;br /&gt;LiveUser_Admin/&lt;br /&gt;sys-admin/&lt;br /&gt;typo3/&lt;br /&gt;panel/&lt;br /&gt;cpanel/&lt;br /&gt;cPanel/&lt;br /&gt;cpanel_file/&lt;br /&gt;platz_login/&lt;br /&gt;rcLogin/&lt;br /&gt;blogindex/&lt;br /&gt;formslogin/&lt;br /&gt;autologin/&lt;br /&gt;support_login/&lt;br /&gt;meta_login/&lt;br /&gt;manuallogin/&lt;br /&gt;simpleLogin/&lt;br /&gt;loginflat/&lt;br /&gt;utility_login/&lt;br /&gt;showlogin/&lt;br /&gt;memlogin/&lt;br /&gt;members/&lt;br /&gt;login-redirect/&lt;br /&gt;sub-login/&lt;br /&gt;wp-login/&lt;br /&gt;login1/&lt;br /&gt;dir-login/&lt;br /&gt;login_db/&lt;br /&gt;xlogin/&lt;br /&gt;smblogin/&lt;br /&gt;customer_login/&lt;br /&gt;UserLogin/&lt;br /&gt;login-us/&lt;br /&gt;acct_login/&lt;br /&gt;admin_area/&lt;br /&gt;bigadmin/&lt;br /&gt;project-admins/&lt;br /&gt;phppgadmin/&lt;br /&gt;pureadmin/&lt;br /&gt;sql-admin/&lt;br /&gt;openvpnadmin/&lt;br /&gt;wizmysqladmin/&lt;br /&gt;vadmind/&lt;br /&gt;ezsqliteadmin/&lt;br /&gt;hpwebjetadmin/&lt;br /&gt;newsadmin/&lt;br /&gt;adminpro/&lt;br /&gt;Lotus_Domino_Admin/&lt;br /&gt;bbadmin/&lt;br /&gt;vmailadmin/&lt;br /&gt;ccp14admin/&lt;br /&gt;irc-macadmin/&lt;br /&gt;banneradmin/&lt;br /&gt;sshadmin/&lt;br /&gt;phpldapadmin/&lt;br /&gt;macadmin/&lt;br /&gt;administratoraccounts/&lt;br /&gt;admin4_account/&lt;br /&gt;admin4_colon/&lt;br /&gt;radmind-1/&lt;br /&gt;Super-Admin/&lt;br /&gt;AdminTools/&lt;br /&gt;cmsadmin/&lt;br /&gt;phpSQLiteAdmin/&lt;br /&gt;server_admin_small/&lt;br /&gt;database_administration/&lt;br /&gt;system_administration/&lt;br /&gt;&lt;/div&gt;
&lt;b style="color: #990000;"&gt;Update Imp. Dorks.&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b style="color: #990000;"&gt;&lt;span style="color: black;"&gt;Dork :&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #990000;"&gt;&lt;span style="color: black;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: georgia,serif;"&gt;&lt;span style="background-color: black; color: lime;"&gt;"inurl:dettaglio.php?id="&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b style="color: #990000;"&gt;&lt;br style="color: black;" /&gt;&lt;br style="color: black;" /&gt;&lt;span style="color: black;"&gt;Exploit :&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #990000;"&gt;&lt;span style="color: black;"&gt;www.victim.com/sito/dettaglio.php?id=[SQL]&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b style="color: black;"&gt;&lt;br /&gt;Example :&lt;/b&gt;&lt;span style="color: black;"&gt;http://www.cicloposse.com/dettaglio.php?id=61'&lt;/span&gt;&lt;b style="color: #990000;"&gt;&lt;br /&gt;----------------------------------------------------------------------------------------------------------------&lt;br /&gt;&lt;/b&gt;&lt;span style="color: black;"&gt;&lt;b&gt;Dork:&lt;/b&gt; &lt;span style="background-color: black; color: lime;"&gt;inurl:prodotto.php?id)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Exploit: &lt;/b&gt;&lt;br /&gt;www.victim.com/prodotto.php?id=[SQL]&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Example:&lt;/b&gt;http://www.poderimorini.com/en/prodotto.php?id=14'&lt;/span&gt;&lt;b style="color: #990000;"&gt;&lt;br /&gt;&lt;/b&gt;&lt;hr size="2" width="100%" /&gt;
&lt;b style="color: #990000;"&gt;&lt;br /&gt;sql injection dorks &lt;/b&gt;&lt;br /&gt;
allinurl: \”index php go buy\”&lt;br /&gt;
allinurl: \”index.php?go=sell\”&lt;br /&gt;
allinurl: \”index php go linkdir\”&lt;br /&gt;
allinurl: \”index.php?go=resource_center\”&lt;br /&gt;
allinurl: \”resource_center.html\”&lt;br /&gt;
allinurl: \”index.php?go=properties\”&lt;br /&gt;
allinurl: \”index.php?go=register\”&lt;br /&gt;
&lt;br /&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="color: red; font-family: Times New Roman,serif; font-size: 13.5pt;"&gt;Error message queries&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;“A syntax error has
occurred”filetype:ihtml&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;Informix database errors,
potentially containing function names, filenames, file structure information,
pieces of SQL code and passwords&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;“Access denied for user” “Using
password”&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;authorisation errors, potentially
containing user names, function names, file structure information and pieces of
SQL code&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;“The script whose uid is ” “is not
allowed to access”&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
access-related PHP errors, potentially containing filenames, function names and
file structure information&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;“ORA-00921: unexpected end of SQL
command”&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;Oracle database errors, potentially
containing filenames, function names and file structure information&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;“error found handling the request”
cocoon filetype:xml&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;Cocoon errors, potentially
containing Cocoon version information, filenames, function names and file
structure information&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;“Invision Power Board Database
Error”&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;&lt;br /&gt;
Invision Power Board bulletin board errors, potentially containing function
names, filenames, file structure information and piece of SQL code&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;“Warning: mysql _ query()” “invalid
query”&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;MySQL database errors, potentially
containing user names, function names, filenames and file structure information&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;“Error Message : Error loading
required libraries.”&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;&lt;br /&gt;
CGI script errors, potentially containing information about operating system
and program versions, user names, filenames and file structure information&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;“#mysql dump” filetype:sql&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;MySQL database errors, potentially
containing information about database structure and contents&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="color: red; font-family: Times New Roman,serif; font-size: 13.5pt;"&gt;Dork for locating passwords&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;http://*:*@www” site&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;passwords for site, stored as the
string “http://username:password@www…”&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;filetype:bak inurl:”htaccess|passwd|shadow|ht
users”&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;file backups, potentially containing
user names and passwords&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;filetype:mdb
inurl:”account|users|admin|admin istrators|passwd|password”&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;mdb files, potentially containing
password information&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;intitle:”Index of” pwd.db&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;pwd.db files, potentially containing
user names and encrypted passwords&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;inurl:admin inurl:backup
intitle:index.of&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;directories whose names contain the
words admin and backup&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;“Index of/” “Parent Directory” “WS _
FTP.ini”&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;filetype:ini WS _ FTP PWD&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;WS_FTP configuration files,
potentially containing FTP server access passwords&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;ext:pwd
inurl:(service|authors|administrators |users) “# -FrontPage-”&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;files containing Microsoft FrontPage
passwords&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;filetype:sql (“passwd values ****” |
“password values ****” | “pass values ****” )&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;files containing SQL code and
passwords inserted into a database&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;intitle:index.of trillian.ini&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;configuration files for the Trillian
IM&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;eggdrop filetype:user&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
user configuration files for the Eggdrop ircbot&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;filetype:conf slapd.conf&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;configuration files for OpenLDAP&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;inurl:”wvdial.conf”
intext:”password”&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;configuration files for WV Dial&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;ext:ini eudora.ini&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;configuration files for the Eudora
mail client&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;filetype:mdb inurl:users.mdb&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;Microsoft Access files, potentially
containing user account information&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="color: red; font-family: Times New Roman,serif; font-size: 13.5pt;"&gt;Searching for personal data and confidential documents&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;filetype:xls inurl:”email.xls”&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;email.xls files, potentially
containing contact information&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;“phone * * *” “address *” “e-mail”
intitle: “curriculum vitae”&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;CVs&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;“not for distribution”&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;&lt;br /&gt;
confidential documents containing the confidential clause&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;buddylist.blt&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;AIM contacts list&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;intitle:index.of mystuff.xml&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;Trillian IM contacts list&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;filetype:ctt “msn”&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;MSN contacts list&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;filetype:QDF&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;&lt;br /&gt;
QDF database files for the Quicken financial application&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;intitle:index.of finances.xls&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;finances.xls files, potentially
containing information on bank accounts, financial summaries and credit card
numbers&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;intitle:”Index Of” -inurl:maillog
maillog size&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;maillog files, potentially
containing e-mail&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;Network Vulnerability Assessment
Report”&lt;br /&gt;
“Host Vulnerability Summary Report”&lt;br /&gt;
filetype:pdf “Assessment Report”&lt;br /&gt;
“This file was generated by Nessus”&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;reports for network security scans,
penetration tests etc&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="color: red; font-family: Times New Roman,serif; font-size: 13.5pt;"&gt;dork for locating network devices&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;“Copyright (c) Tektronix, Inc.”
“printer status”&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;PhaserLink printers&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;inurl:”printer/main.html”
intext:”settings”&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;Brother HL printers&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;intitle:”Dell Laser Printer” ews&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;Dell printers with EWS technology&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;intext:centreware inurl:status&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;Xerox Phaser 4500/6250/8200/8400
printers&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;inurl:hp/device/this.LCDispatcher&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;HP printers&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;intitle:liveapplet inurl:LvAppl&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;Canon Webview webcams&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;intitle:”EvoCam” inurl:”webcam.html”&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;Evocam webcams&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;inurl:”ViewerFrame?Mode=”&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;&lt;br /&gt;
Panasonic Network Camera webcams&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;(intext:”MOBOTIX M1″ |
intext:”MOBOTIX M10″) intext:”Open Menu” Shift-Reload&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;Mobotix webcams&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;inurl:indexFrame.shtml Axis&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;Axis webcams&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;intitle:”my webcamXP server!”
inurl:”:8080″&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;webcams accessible via WebcamXP
Server&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;allintitle:Brains, Corp.&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;b&gt;&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;camera webcams accessible via mmEye&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="line-height: normal;"&gt;
&lt;span style="font-family: Times New Roman,serif; font-size: 12pt;"&gt;intitle:”active webcam page”&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2015/08/google-hacking.html</link><thr:total>1</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-805122743694654066</guid><pubDate>Fri, 28 Aug 2015 15:01:00 +0000</pubDate><atom:updated>2016-12-02T23:16:23.128-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Game CheatCodes</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr"&gt;
&lt;div style="text-align: center;"&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: georgia,serif;"&gt;&lt;b&gt;&lt;span style="color: #b45f06;"&gt;Clash of Clans Hack v1.72 for Gold, Elixier and Gems &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;working on Android and iOS - without Jailbreak - no Survey. &lt;br /&gt;&lt;br /&gt;&lt;a href="http://loadsnake.com/coc-hack/"&gt;http://loadsnake.com/coc-hack/&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;hr /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: georgia,serif;"&gt;&lt;br /&gt;&lt;span style="color: #b45f06;"&gt;&lt;b&gt;FOR HITMAN&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;when you run the game if it shows this message &lt;br /&gt;&lt;span style="color: blue;"&gt;&amp;nbsp;Fatal error&amp;nbsp; Direct3D:Unable to create device. Try changing resolution or color depth&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: #38761d;"&gt;&lt;b&gt;SOLUTION&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Open the Hitman2.ini file on your hard drive and change the line &lt;br /&gt;which reads DrawDll RenderD3D.dll to DrawDll RenderOpenGL.dll.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: georgia,serif;"&gt;Your game error will be fixed.. :)&lt;/span&gt;&lt;/span&gt;&lt;hr /&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div dir="ltr"&gt;
&lt;span style="color: red;"&gt;&lt;b&gt;NFS WORLD CHEATCODES&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Make Money A Little Bit Faster&lt;/b&gt;&lt;br /&gt;The
 best way to get money faster is to enter a tier 1 team escape. Yeah, 
the cops are annoying but it's more fun and you get roughly $500 more!&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Easy Money&lt;/b&gt;&lt;br /&gt;In NFS:W, play team escape. It gets you $2000-$3000 each escape. So you can earn money quickly and easily.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Easily Evade Spots&lt;/b&gt;&lt;br /&gt;The
 first 2 are in little cubby holes by the docks to the awy south (the 
lobster shacks). The third one is by the shipyard, it is behind a glitch
 wall, you can pass through but for some reason they cant. The fourth is
 between the other locations, there is a garage type thing with a fish 
above it, go in here and you wont get caught. All of these locales have 
cooldowns as well.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Car Gone Mad&lt;/b&gt;&lt;br /&gt;At the stadium in 
riverfront the box thing if you put your front tire off it will start 
going crazy if you wait and if done correct.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;
&lt;span style="color: red;"&gt;&lt;b&gt;GTA Sandreas Cheat Codes&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;Armor, Health, And Money&lt;br /&gt;&lt;br /&gt;hesoyam&lt;br /&gt;Complete Pilot School With All Bronze Medals&lt;br /&gt;&lt;br /&gt;Enter rustler as a code.&lt;br /&gt;Never Get A Star Rating&lt;br /&gt;&lt;br /&gt;To never get a star rating type AEZAKMI&lt;br /&gt;Make All Traffic Fast Cars&lt;br /&gt;&lt;br /&gt;Enter everyoneisrich as a code.&lt;br /&gt;Get An Invisible Car&lt;br /&gt;&lt;br /&gt;Enter wheelsonlyplease as a code.&lt;br /&gt;Weapon Sets 1&lt;br /&gt;&lt;br /&gt;lxgiwyl&lt;br /&gt;Drive The Train&lt;br /&gt;&lt;br /&gt;If you want to drive the train type 'lockit'&lt;br /&gt;Spawn Rancher 4x4&lt;br /&gt;&lt;br /&gt;jqntdmh&lt;br /&gt;Never Get Hungry&lt;br /&gt;&lt;br /&gt;Type in AEDUWNV.&lt;br /&gt;Perform A Mega-jump&lt;br /&gt;&lt;br /&gt;Enter kangaroo as a code.&lt;br /&gt;Get Max Sex Appeal&lt;br /&gt;&lt;br /&gt;Enter helloladies as a code.&lt;br /&gt;Maxed Out On All Vehicle Skill Statistics&lt;br /&gt;&lt;br /&gt;Enter naturaltalent as a code.&lt;br /&gt;Pedestrians Attack With Guns&lt;br /&gt;&lt;br /&gt;bgluawml&lt;br /&gt;Max Respect&lt;br /&gt;&lt;br /&gt;worshipme&lt;br /&gt;Flying Cars&lt;br /&gt;&lt;br /&gt;Unlike
 previous GTA Games, this allows you to stay in the air and go any where
 you want. But be careful landing, the car goes at least 500mph in the 
air. But I thought it was a big improvement. Anyway, onto the code, 
chittychittybangbang.&lt;br /&gt;Spawn Army Tank&lt;br /&gt;&lt;br /&gt;aiwprton&lt;br /&gt;Sunny Weather&lt;br /&gt;&lt;br /&gt;pleasantlywarm&lt;br /&gt;Create A Sandstorm&lt;br /&gt;&lt;br /&gt;Type in CWJXUOC.&lt;br /&gt;CJ Is A Slut Magnet&lt;br /&gt;&lt;br /&gt;Type in BEKKNQV.&lt;br /&gt;Complete The Driving School With All Gold Medals&lt;br /&gt;&lt;br /&gt;Enter hotknife as a code.&lt;br /&gt;Make All Traffic Cheap Cars&lt;br /&gt;&lt;br /&gt;Enter everyoneispoor as a code.&lt;br /&gt;Commit Suicide&lt;br /&gt;&lt;br /&gt;Enter goodbyecruelworld as a code.&lt;br /&gt;Achieve Perfect Vehicle Handling&lt;br /&gt;&lt;br /&gt;Enter sticklikeglue as a code.&lt;br /&gt;While On A Bike To Perform A Huge Bunny Hop (ala E.T.)&lt;br /&gt;&lt;br /&gt;Enter cjphonehome as a code.&lt;br /&gt;Be At The Hitman Level In All Weapons Statistics&lt;br /&gt;&lt;br /&gt;Enter professionalkiller as a code.&lt;br /&gt;Six Star Wanted Level&lt;br /&gt;&lt;br /&gt;bringiton&lt;br /&gt;Raise Wanted Level&lt;br /&gt;&lt;br /&gt;turnuptheheat&lt;br /&gt;Pedestrians Riot&lt;br /&gt;&lt;br /&gt;stateofemergency&lt;br /&gt;Unlimited Health&lt;br /&gt;&lt;br /&gt;baguvix&lt;br /&gt;Speed Up Time&lt;br /&gt;&lt;br /&gt;ysohnul&lt;br /&gt;Spawn Parachute&lt;br /&gt;&lt;br /&gt;aiypwzqp&lt;br /&gt;Spawn Dozer&lt;br /&gt;&lt;br /&gt;itsabull&lt;br /&gt;Max Muscle&lt;br /&gt;&lt;br /&gt;buffmeup&lt;br /&gt;Max Stamina&lt;br /&gt;&lt;br /&gt;vkypqcf&lt;br /&gt;Spawn Stretch Limo&lt;br /&gt;&lt;br /&gt;celebritystatus&lt;br /&gt;Spawn Hearse&lt;br /&gt;&lt;br /&gt;wheresthefuneral&lt;br /&gt;Spawn Hydra (Fighter Jet), Spawn Monster&lt;br /&gt;&lt;br /&gt;Tired
 of just driving on stupid cars and also having to wait to pass a test 
to get the Hydra well type in JUMPJET and the Hydra will appear. Also 
want a monster truck; Type in MONSTERMASH and you will get the MONSTER.&lt;br /&gt;Lose All Body Fat&lt;br /&gt;&lt;br /&gt;Type in KVGYZQK.&lt;br /&gt;Maximum Body Fat&lt;br /&gt;&lt;br /&gt;Type in BTCDBCB.&lt;br /&gt;Have Infinite Air For Swimming Underwater&lt;br /&gt;&lt;br /&gt;Type in CVWKXAM.&lt;br /&gt;Have A Beach Party&lt;br /&gt;&lt;br /&gt;Type in CIKGCGX.&lt;br /&gt;Contract On CJ&lt;br /&gt;&lt;br /&gt;Type in BAGOWPG.&lt;br /&gt;Get VERY Sunny Weather&lt;br /&gt;&lt;br /&gt;Enter toodamnhot as a code.&lt;br /&gt;Spawn A Dozer&lt;br /&gt;&lt;br /&gt;Enter itsallbull as a code.&lt;br /&gt;Severely Reduce Traffic&lt;br /&gt;&lt;br /&gt;Enter ghosttown as a code.&lt;br /&gt;Recruit Anyone And Have Them Equipped With Rockets&lt;br /&gt;&lt;br /&gt;Enter rocketmayhem as a code.&lt;br /&gt;Remake The Hood In A Ninja Theme&lt;br /&gt;&lt;br /&gt;Enter ninjatown as a code.&lt;br /&gt;Make Gangs Take Over The Streets&lt;br /&gt;&lt;br /&gt;Enter bifbuzz as a code.&lt;br /&gt;Remake The 'hood In A Funhouse Theme&lt;br /&gt;&lt;br /&gt;Enter crazytown as a code.&lt;br /&gt;Accelerate Gameplay&lt;br /&gt;&lt;br /&gt;Enter speeditup as a code.&lt;br /&gt;Make Cars Float Away When Hit&lt;br /&gt;&lt;br /&gt;Enter bubblecars as a code.&lt;br /&gt;Make Boats Fly&lt;br /&gt;&lt;br /&gt;Enter flyingfish as a code.&lt;br /&gt;Permanent Midnight&lt;br /&gt;&lt;br /&gt;Enter nightprowler as a code.&lt;br /&gt;Suicide&lt;br /&gt;&lt;br /&gt;SZCMAWO&lt;br /&gt;Gang Members Everywhere&lt;br /&gt;&lt;br /&gt;MROEMZH&lt;br /&gt;Spawn Bloodring Banger&lt;br /&gt;&lt;br /&gt;oldspeeddemon&lt;br /&gt;Slow Motion&lt;br /&gt;&lt;br /&gt;slowitdown&lt;br /&gt;Pedestrians Have Weapons&lt;br /&gt;&lt;br /&gt;foooxft&lt;br /&gt;Pedestrians Are Elvis&lt;br /&gt;&lt;br /&gt;bluesuedeshoes&lt;br /&gt;Weapon Sets 2&lt;br /&gt;&lt;br /&gt;professionalskit&lt;br /&gt;Weapon Sets 3&lt;br /&gt;&lt;br /&gt;uzumymw&lt;br /&gt;Unlimited Ammo&lt;br /&gt;&lt;br /&gt;fullclip&lt;br /&gt;Super Punches&lt;br /&gt;&lt;br /&gt;iavenjq&lt;br /&gt;Rainy Weather&lt;br /&gt;&lt;br /&gt;auifrvqs&lt;br /&gt;Stormy Weather&lt;br /&gt;&lt;br /&gt;scottishsummer&lt;br /&gt;Sunny Weather&lt;br /&gt;&lt;br /&gt;pleasentlywarm&lt;br /&gt;Spawn 4xWheeler&lt;br /&gt;&lt;br /&gt;fourwheelfun&lt;br /&gt;Spawn Monster Truck&lt;br /&gt;&lt;br /&gt;monstermash&lt;br /&gt;Spawn Jetpack&lt;br /&gt;&lt;br /&gt;rocketman&lt;br /&gt;Spawn Hydra&lt;br /&gt;&lt;br /&gt;jumpjet&lt;br /&gt;Spawn Hunter&lt;br /&gt;&lt;br /&gt;ohdude&lt;br /&gt;Spawn Caddy&lt;br /&gt;&lt;br /&gt;rzhsuew&lt;br /&gt;Max Lung Capacity&lt;br /&gt;&lt;br /&gt;cvwkxam&lt;br /&gt;Lower Wanted Level&lt;br /&gt;&lt;br /&gt;turndowntheheat&lt;br /&gt;Destroy All Cars&lt;br /&gt;&lt;br /&gt;cpktnwt&lt;br /&gt;Cloudy Weather&lt;br /&gt;&lt;br /&gt;alnsfmzo&lt;br /&gt;Spawn Vortex&lt;br /&gt;&lt;br /&gt;kgggdkp&lt;br /&gt;Spawn Trashmaster&lt;br /&gt;&lt;br /&gt;truegrime&lt;br /&gt;Spawn Tanker&lt;br /&gt;&lt;br /&gt;amomhrer&lt;br /&gt;Spawn Stunt Plane&lt;br /&gt;&lt;br /&gt;flyingtostunt&lt;br /&gt;Note: Stunt Plane can do backflips, barrel rolls, and sky diving.&lt;br /&gt;&lt;br /&gt;Spawn Racecar #2&lt;br /&gt;&lt;br /&gt;vpjtqwv&lt;br /&gt;Spawn Racecar #1&lt;br /&gt;&lt;br /&gt;vrockpokey&lt;br /&gt;Adrenaline Effects&lt;br /&gt;&lt;br /&gt;anoseonglass&lt;br /&gt;All Cars Have Nitrous&lt;br /&gt;&lt;br /&gt;speedfreak&lt;br /&gt;Aggressive Traffic&lt;br /&gt;&lt;br /&gt;ylteicz&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2015/08/game-cheatcodes.html</link><thr:total>0</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-6956184159823461388</guid><pubDate>Fri, 28 Aug 2015 15:00:00 +0000</pubDate><atom:updated>2016-12-02T23:16:23.123-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Forensic Tools</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr"&gt;
&lt;span style="font-family: georgia,serif;"&gt;&lt;span style="background-color: black;"&gt;&lt;span style="color: lime;"&gt;&lt;span style="font-size: small;"&gt;&lt;b&gt;Unhide&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; : To find processes hidden by rootkits:&lt;br /&gt;&lt;br /&gt;Unhide
 is a forensic tool to find processes hidden by rootkits, Linux kernel 
modules or by other techniques. It detects hidden processes using six 
techniques:&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Compare /proc vs /bin/ps output&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Compare info gathered from /bin/ps with info gathered by walking thru the procfs. ONLY for Linux 2.6 version&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Compare info gathered from /bin/ps with info gathered from syscalls (syscall scanning).&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Full PIDs space ocupation (PIDs bruteforcing). ONLY for Linux 2.6 version&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Compare /bin/ps output vs /proc, procfs walking and syscall. ONLY for Linux 2.6 version&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Reverse search, verify that all thread seen by ps are also seen in the kernel.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6- Quick compare /proc, procfs walking and syscall vs /bin/ps output. ONLY for Linux 2.6 version.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Unhide-TCP&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;b style="font-family: georgia,serif;"&gt;&lt;a href="http://www.unhide-forensics.info/" target="_blank"&gt;&lt;img alt="Photobucket" border="0" height="60" src="http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/DownloadButton1.png" width="80" /&gt;Download&lt;/a&gt;&lt;/b&gt;
&lt;br /&gt;&lt;hr /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;span style="font-size: small;"&gt;&lt;span style="background-color: black;"&gt;&lt;span style="color: lime;"&gt;&lt;span style="font-family: georgia,serif;"&gt;&lt;b&gt;Hashbot Online Forensic Web Tool&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="display: block; margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;a href="http://www.hackersonlineclub.com/forensic-tools/Hashbot.jpg?attredirects=0"&gt;&lt;img border="0" height="317" src="http://www.hackersonlineclub.com/_/rsrc/1331479918084/forensic-tools/Hashbot.jpg?height=317&amp;amp;width=400" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="font-family: georgia,serif;"&gt;Hashbot is a forensic web tool to acquire and validate, over time, the status of an individual web page or web document.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&lt;b&gt;Acquire&lt;/b&gt;: Insert the URL 
to acquire, select your favorite user agent (default is Firefox) and 
click on submit. Wait for creating process finish and download the zip 
archive.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&lt;b&gt;Validate:&lt;/b&gt; Unzip the 
archive downloaded by the creation service, open the 
&amp;lt;code&amp;gt;-code.txt file and use the "Validate Info" section to fill 
in the validation form. Click on submit and wait for the server 
response.&lt;/span&gt;&lt;br /&gt;
&lt;a href="https://www.hashbot.com/" target="_blank"&gt;&lt;b&gt;&lt;span style="font-size: small;"&gt;&lt;span style="font-family: georgia,serif;"&gt;HashBot&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;hr size="2" width="100%" /&gt;
&lt;span style="background-color: black; color: lime; font-family: georgia,serif; font-size: small;"&gt;&lt;b&gt;&lt;br /&gt;
Registry Decoder - Digital Forensics Tool&lt;/b&gt;&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;div style="display: block; font-family: georgia,serif; text-align: left;"&gt;
&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhglU7F_34rpLnfOQSnLxa0NSESbWeFLkxF10Yb39eB0lpup2xWykax_jU_HyeH5Y06Yp98Gm-z4bbeXgmi8kbeokqzof1RZC85pGdM-5Y3spryZktGar_yZ6vyshuFwnADTuhI54Uvgj8/s320/front.jpg" style="display: block; margin-left: auto; margin-right: auto; text-align: center;" /&gt;&lt;/div&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Digital forensics deals with the analysis of artifacts on all types of 
digital devices.&lt;br /&gt;
&amp;nbsp;One of the most prevalent analysis techniques performed
 is that of the registry &lt;br /&gt;
hives contained in Microsoft Windows operating 
systems. &lt;br /&gt;
&lt;br /&gt;
Registry Decoder was developed with the purpose of providing a 
single tool for the acquisition, analysis, and reporting of registry 
contents.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;b style="font-family: georgia,serif;"&gt;&lt;a href="http://code.google.com/p/registrydecoder/downloads/list" target="_blank"&gt;&lt;img alt="Photobucket" border="0" height="60" src="http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/DownloadButton1.png" width="80" /&gt;Download&lt;/a&gt;&lt;/b&gt; &lt;br style="font-family: georgia,serif;" /&gt;
&lt;hr size="2" style="background-color: black; color: lime; font-family: georgia,serif;" width="100%" /&gt;
&lt;span style="background-color: black; color: lime; font-family: georgia,serif;"&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="font-size: small;"&gt;Rifiuti v1.0&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;
A Recycle Bin Forensic Analysis Tool.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;
Many important files within Microsoft Windows have structures that are &lt;br /&gt;
undocumented. &lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;
One of the principals of computer forensics is that all analysis 
methodologies must be well documented and repeatable, and they must have
 an acceptable margin of error. Currently, &lt;/span&gt;&lt;span style="font-family: georgia,serif;"&gt;
there are a lack of open source methods and tools that forensic analysts &lt;br /&gt;
can rely upon&amp;nbsp;to examine the data found in proprietary Microsoft files.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;
Many computer crime investigations require the reconstruction of a subject's &lt;br /&gt;
Recycle Bin. Since this analysis technique is executed regularly, we 
researched the structure of the data found in the Recycle Bin repository
 files (INFO2 files). Rifiuti, &lt;br /&gt;
the Italian word meaning &lt;/span&gt;&lt;span style="font-family: georgia,serif;"&gt;
"trash", was developed to examine the contents of the INFO2 file in the Recycle Bin.&lt;br /&gt;
The foundation of Rifiuti's examination methodology is presented in the 
white paper located here. Rifiuti will parse the information in an INFO2
 file and output the results &lt;br /&gt;
in a field delimited manner so that it may be imported into your 
favorite spreadsheet program. Rifiuti is built to work on multiple 
platforms and will execute on Windows (through Cygwin), Mac OS X, &lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;
Linux, and *BSD platforms.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;
&lt;b&gt;Usage:&lt;/b&gt;&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;
rifiuti [options] &amp;lt;filename&amp;gt;&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;
-t Field Delimiter (TAB by default)&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;
&lt;b&gt;Example Usage:&lt;/b&gt;&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;
[kjones:rifiuti/rifiuti_20030410_1/bin] kjones% ./rifiuti INFO2 &amp;gt; INFO2.txt&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;
Open INFO2.txt as a TAB delimited file in MS Excel to further sort and filter your &lt;br /&gt;
results.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;b style="font-family: georgia,serif;"&gt;&lt;a href="http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/rifiuti.aspx" target="_blank"&gt;&lt;img alt="Photobucket" border="0" height="60" src="http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/DownloadButton1.png" width="80" /&gt;Download&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;hr size="2" width="100%" /&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;span style="font-family: georgia,serif;"&gt;&lt;span style="background-color: black; color: lime; font-size: small;"&gt;&lt;b&gt;NetSleuth&lt;/b&gt;&lt;/span&gt; &lt;br /&gt;&lt;br /&gt;
Its identifies and fingerprints network devices by silent network monitoring or by processing data from PCAP files.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;NetSleuth is an opensource 
network forensics and analysis tool, designed for triage in incident 
response situations. It can identify and fingerprint network hosts and 
devices from pcap files captured from Ethernet or WiFi data (from tools 
like Kismet).&lt;/span&gt;&amp;nbsp;
&lt;span style="font-family: georgia,serif;"&gt;It is a free network monitoring, cyber security and network forensics analysis (NFAT) tool &lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br /&gt;&lt;b style="font-family: georgia,serif;"&gt;&lt;a href="http://netgrab.co.uk/netsleuth/download-netsleuth/" target="_blank"&gt;&lt;img alt="Photobucket" border="0" height="60" src="http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/DownloadButton1.png" width="80" /&gt;Download&lt;/a&gt;&lt;/b&gt; &lt;br /&gt;
&lt;hr /&gt;
&lt;br /&gt;
&lt;span style="background-color: black; color: lime; font-family: georgia,serif; font-size: small;"&gt;&lt;b&gt;Bug TraQ&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="display: block; margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;a href="http://www.hackersonlineclub.com/forensic-tools/Bugtraq-I%20Distribution%20for%20Pentesting%20and%20forensics.png?attredirects=0"&gt;&lt;img border="0" height="226" src="http://www.hackersonlineclub.com/_/rsrc/1331477523108/forensic-tools/Bugtraq-I%20Distribution%20for%20Pentesting%20and%20forensics.png?height=226&amp;amp;width=400" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Bugtraq system offers the most comprehensive distribution, optimal, 
stable and&amp;nbsp;automatic security to date. Bugtraq is a distribution based 
on the 2.6.38 kernel has a&amp;nbsp;wide range of penetration and forensic tools.
 Bugtraq can be installed from a Live DVD&amp;nbsp;or USB drive, the distribution
 is customized to the last package, configured and updated&amp;nbsp;the kernel. 
The kernel has been patched for better performance to recognize a 
variety of&amp;nbsp;hardware, including wireless injection patches pentesting 
that other distributions do not&amp;nbsp;recognize.&lt;/span&gt;&lt;br /&gt;
&lt;b style="font-family: georgia,serif;"&gt;Features:&lt;/b&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-family: georgia,serif;"&gt;Patching the kernel 2.6.38 to recognize 4 gigs of RAM in 32-bit.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;Tools perfectly configured,
 automated installation scripts and tools like Nessus, OpenVAS, 
Greenbone, Nod32, Hashcat, Avira, BitDefender, ClamAV, Avast, AVG, 
etc...&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: georgia,serif;"&gt;Unique Scripts from Bugtraq-Team (SVN updates tools, delete tracks, backdoors, Spyder-sql, etc.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;b style="font-family: georgia,serif;"&gt;&lt;a href="http://bugtraq-team.com/index.php/en/descargas-2" target="_blank"&gt;&lt;img alt="Photobucket" border="0" height="60" src="http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/DownloadButton1.png" width="80" /&gt;Download&lt;/a&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;hr size="2" width="100%" /&gt;
&lt;br /&gt;
&lt;span style="background-color: black; color: lime; font-family: georgia,serif; font-size: small;"&gt;&lt;b&gt;Hex Workshop&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="display: block; text-align: left;"&gt;
&lt;img border="0" height="244" src="http://www.hexworkshop.com/images/ss_v65/ss_hworks_sv_edit.gif" style="display: block; margin-left: auto; margin-right: auto; text-align: center;" width="320" /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-family: georgia,serif;"&gt;The Hex Workshop Hex Editor is a set of hexadecimal development tools for Microsoft &lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;
Windows, combining advanced binary editing with the ease and flexibility of a word processor. With Hex Workshop you can&lt;br /&gt;
Edit, cut, copy, paste, insert, and delete of Hex Script.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Hex values can be grouped by 1, 2, 4, 8 or 16 bytes.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Search using Hex Strings (including wildcards).&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Find and replace by Hex Strings, Text, Strings or values.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Sector edit partitions or physical disks.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Checksum either entire document or a selection.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Arithmetic operations: +, -, *, /, %, ().&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;C/C++ Plug-in API.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Hex/Decimal calculator supporting: +,-,*,/,|,&amp;amp;,^,&amp;lt;&amp;lt;,&amp;gt;&amp;gt;, ~&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b style="font-family: georgia,serif;"&gt;&lt;a href="http://www.bpsoft.com/downloads/" target="_blank"&gt;&lt;img alt="Photobucket" border="0" height="60" src="http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/DownloadButton1.png" width="80" /&gt;Download&lt;/a&gt;&lt;/b&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;hr size="2" width="100%" /&gt;
&lt;br /&gt;
&lt;b style="background-color: black; color: lime;"&gt;&lt;span style="font-size: small;"&gt;&lt;span style="font-family: georgia,serif;"&gt;Helix&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Helix is more on the forensics 
and incident response side than the networking or pen-testing side. 
Still a very useful tool to carry.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Helix is a customized 
distribution of the Knoppix Live Linux CD. Helix is more than just a 
bootable live CD. You can still boot into a customized Linux environment
 that includes customized linux kernels, excellent hardware detection 
and many applications dedicated to Incident Response and Forensics.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;b style="font-family: georgia,serif;"&gt;&lt;a href="http://www.e-fense.com/products.php" target="_blank"&gt;&lt;img alt="Photobucket" border="0" height="60" src="http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/DownloadButton1.png" width="80" /&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;/b&gt;
&lt;hr size="2" width="100%" /&gt;
&lt;b style="font-family: georgia,serif;"&gt;&lt;br /&gt;
&lt;/b&gt;&lt;span style="background-color: black; color: lime; font-size: small;"&gt;&lt;b&gt;&lt;span style="font-family: georgia,serif;"&gt;Hiren’s BootCD 14.1&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;
All in One Bootable CD which has all utilities&lt;/span&gt;..&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b style="font-family: georgia,serif;"&gt;&lt;a href="http://www.hirensbootcd.org/files/Hirens.BootCD.14.1.zip" target="_blank"&gt;&lt;img alt="Photobucket" border="0" height="60" src="http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/DownloadButton1.png" width="80" /&gt;Download&lt;/a&gt;&lt;/b&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2015/08/forensic-tools.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/th_DownloadButton1.png" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author><enclosure length="548519835" type="application/zip" url="http://www.hirensbootcd.org/files/Hirens.BootCD.14.1.zip"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-1354546571791519108</guid><pubDate>Fri, 28 Aug 2015 14:55:00 +0000</pubDate><atom:updated>2016-12-02T23:16:23.079-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Firefox Imp. Addons.....</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;b&gt;FOX TAB:&lt;/b&gt;&lt;br /&gt;
3D in your browser!  FoxTab brings innovative 3D functionality to your Firefox.&lt;br /&gt;
&lt;br /&gt;
&lt;img src="https://addons.mozilla.org/img/uploads/previews/thumbs/27/27361.png?modified=1248187438" style="display: block; margin-left: auto; margin-right: auto; text-align: center;" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;New!&lt;/b&gt; Top Sites for FoxTab (aka Speed Dial).&lt;br /&gt;
Now you can access your most favorite sites from the familiar FoxTab interface. &lt;br /&gt;
&lt;br /&gt;
FoxTab is a popular 3D tab management extension.&lt;br /&gt;
FoxTab powers Firefox with the following main features:&lt;br /&gt;
 &amp;nbsp;&amp;nbsp;✔ Top Sites (aka Speed Dial) for quickly accessing your favorite web sites.&lt;br /&gt;
 &amp;nbsp;&amp;nbsp;✔ Tab Flipper – to easily flip between opened tabs using mouse or keyboard gestures.&lt;br /&gt;
 &amp;nbsp;&amp;nbsp;✔ Recently Closed Tabs – for reopening a tab that was recently closed.&lt;br /&gt;
&lt;br /&gt;
Choose between 6 attractive 3D layouts.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Download Link:&lt;/b&gt;&lt;br /&gt;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/8879/"&gt;https://addons.mozilla.org/en-US/firefox/addon/8879/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;hr size="2" width="100%" /&gt;
&lt;br /&gt;
&lt;b&gt;GREASE MONKEY:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;&lt;img src="https://addons.mozilla.org/img/uploads/previews/thumbs/9/9463.png?modified=0" style="display: block; margin-left: auto; margin-right: auto; text-align: center;" /&gt;&lt;br /&gt;
&lt;br /&gt;
Allows you to customize the way a webpage displays using small bits of JavaScript. ...!!&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Download Link:&lt;/b&gt;&lt;br /&gt;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/748/"&gt;https://addons.mozilla.org/en-US/firefox/addon/748/&lt;/a&gt;&lt;br /&gt;&lt;hr size="2" width="100%" /&gt;
&lt;br /&gt;&lt;b&gt;TAMPER DATA: &lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Use tamperdata to view and modify HTTP/HTTPS headers and post parameters...&lt;br /&gt;&lt;div style="display: block; text-align: left;"&gt;
&lt;br /&gt;&lt;br /&gt;Use tamperdata to view and modify HTTP/HTTPS headers and post parameters.&lt;br /&gt;&lt;br /&gt;Trace and time http response/requests.&lt;br /&gt;&lt;br /&gt;Security test web applications by modifying POST parameters.&lt;br /&gt;&lt;br /&gt;FYI
 current version of Google Web Accelerator is incompatible with the 
tampering function of TamperData.  Your browser will crash.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Download Link:&lt;/b&gt;&lt;br /&gt;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/966/"&gt;https://addons.mozilla.org/en-US/firefox/addon/966/&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;hr size="2" width="100%" /&gt;
&lt;b&gt;XSS ME:&lt;/b&gt;&lt;br /&gt;&lt;div style="display: block; margin-left: auto; margin-right: auto; text-align: center;"&gt;
&lt;img border="0" src="https://addons.mozilla.org/img/uploads/previews/thumbs/23/23520.png?modified=1216218344" /&gt;&lt;/div&gt;
Cross-Site Scripting (XSS) is a common flaw found in todays web 
applications. XSS flaws can cause serious damage to a web application. 
Detecting XSS vulnerabilities early in the development process will help
 protect a web application from unnecessary flaws. XSS-Me is the 
Exploit-Me tool used to test for reflected XSS vulnerabilities.&lt;br /&gt;&lt;b&gt;&lt;br /&gt;Download Link:&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/7598/"&gt;https://addons.mozilla.org/en-US/firefox/addon/7598/&lt;/a&gt;&lt;br /&gt;&lt;hr size="2" width="100%" /&gt;
&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2015/08/firefox-imp-addons.html</link><thr:total>0</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-6224348723302063171</guid><pubDate>Fri, 28 Aug 2015 14:51:00 +0000</pubDate><atom:updated>2016-12-02T23:16:23.116-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Email Hacking...........</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Do U Think If Your Email Can Not Been Hackable, Then You Are Wrong...&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Ur Email-ID Can Be Hack... But 
Its Can Be Hack Only Fault by User.. Most Of The Peoples Think That 
Their Has A Software to Hack A Email- ID's But Truth Is Their Is No 
Software Present For Hacking Ur Mail ID's..&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Email Hacking can be possible to many ways like&lt;/span&gt;:-&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="http://www.hackersonlineclub.com/goog_489312799"&gt;&lt;br style="font-family: georgia,serif;" /&gt;&lt;/a&gt;
&lt;b style="font-family: georgia,serif;"&gt;&lt;a href="http://www.hackersonlineclub.com/social-engineering" target="_blank"&gt;1. Social Engineering&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.hackersonlineclub.com/phishing-attacks"&gt;2.Phishing Attacks&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
3. Cookie Hijacking&lt;br /&gt;
&lt;br /&gt;
4. By Keyloggers&lt;/b&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;b style="font-family: georgia,serif;"&gt;Social Engineering:&lt;/b&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;This Process is defined as Hack the human mind without any tools...&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;This has become one of the 
hottest topics today and it seems to work out most of the times. Social 
Engineering doesn’t deal with the network security issues, 
vulnerabilities, exploits, &lt;/span&gt;
&lt;span style="font-family: georgia,serif;"&gt;etc. It just deals with simple Psychological tricks that help to get the information we want. &lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;This really works!! But it requires a lot of patience.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;We are all talking about network security and fixing the vulnerabilities in networks.&lt;br /&gt;
&amp;nbsp;But what happens if some internal person of a network accidentally gives out the passwords. After all &lt;/span&gt;&lt;span style="font-family: georgia,serif;"&gt;we are all humans; we are also vulnerable and can be easily&lt;br /&gt;
&amp;nbsp;exploited and compromised than the computers.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Social Engineering attacks have become most common during the chat sessions. &lt;br /&gt;
With the increase in use of Instant Messengers, any anonymous person may have a &lt;br /&gt;
chat with another any where in the world. The most crucial part of this attack is to &lt;br /&gt;
win the trust of the victim.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;b style="font-family: georgia,serif;"&gt;Phishing Attack:&lt;/b&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;The act of sending an e-mail to a
 user falsely claiming to be an established legitimate enterprise in an 
attempt to scam the user into surroundering private information that 
will be used for identity theft. The e-mail directs the user to visit a 
Web site where they are asked to update personal information, such as 
passwords and credit card, social security, and bank account numbers, 
that the legitimate organization already has. The Web site, however, is 
bogus and set up only to steal the user’s information.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;b style="font-family: georgia,serif;"&gt;Cookie Hijacking:&lt;/b&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;In cookie hijacking we can hack email accounts very easily.. This trick is very&lt;br /&gt;
&amp;nbsp;dangereous because whenever user change a password then there is no need to&lt;br /&gt;
&amp;nbsp;attacker for again hack Email- ID of victim.&lt;/span&gt; &lt;span style="font-family: georgia,serif;"&gt;And&lt;/span&gt; &lt;span style="font-family: georgia,serif;"&gt; it would take you to inbox of victim's yahoo account without asking for any password of victim account.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;br style="font-family: georgia,serif;" /&gt;
&lt;a href="http://www.hackersonlineclub.com/keyloggers" style="font-family: georgia,serif;"&gt;&lt;b&gt;Keyloggers:&lt;/b&gt;&lt;/a&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Keylogger is a software program or hardware device that is used to monitor and log &lt;br /&gt;
each of the keys a user types into a computer keyboard. The user who 
installed the program or hardware device can then view all keys typed in
 by that user. Because &lt;br /&gt;
these programs and hardware devices monitor the keys typed in a user can easily &lt;br /&gt;
find user passwords and other information a user may not wish others to know about.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Keyloggers, as a surveillance tool, are often used by employers to ensure employees&lt;br /&gt;
&amp;nbsp;use work computers for business purposes only. Unfortunately, keyloggers can also&lt;br /&gt;
&amp;nbsp;be embedded in spyware allowing your information to be transmitted to an unknown third party.&lt;/span&gt;&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2015/08/email-hacking.html</link><thr:total>0</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-6606213055356291013</guid><pubDate>Tue, 18 Aug 2015 14:11:00 +0000</pubDate><atom:updated>2016-12-02T23:16:23.118-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Phlashing-PDOS......</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="color: cyan;"&gt;&lt;span style="font-family: georgia,serif;"&gt;A permanent Denial Of Service 
(PDOS), also known as "Phlashing". It's an attack that damages a system 
so badly that it requires replacement or reinstallation of hardware. 
Phlashing used for hardware attack. Unlike the distributed 
denial-of-service attack, a PDoS attack exploits security flaws which 
allow remote administration on the management interfaces of the victim's
 hardware, such as routers, printers, or other networking hardware. The 
attacker uses these vulnerabilities to replace a device's firmware with a
 modified, corrupt, or defective firmware image a process which when 
done legitimately is known as flashing. This therefore "bricks" the 
device, rendering it unusable for its original purpose until it can be 
repaired or replaced.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;&lt;br style="font-family: georgia,serif;" /&gt;&lt;span style="font-family: georgia,serif;"&gt;The
 PDOS is a pure hardware targeted attack which can be much faster and 
requires fewer resources than using a botnet in a DDoS attack. Because 
of these features, and the potential and high probability of security 
exploits on Network Enabled Embedded Devices (NEEDs), this technique has
 come to the attention of numerous hacker communities. PhlashDance is a 
tool created by Rich Smith (an employee of Hewlett-Packard's Systems 
Security Lab) used to detect and demonstrate PDoS vulnerabilities at the
 2008 EUSecWest Applied Security Conference in London. &lt;/span&gt;&lt;span style="font-family: georgia,serif;"&gt;Smith
 said remotely abusing firmware update mechanisms with a Phlashing 
attack, for instance, is basically a one-shot attack. “Phlashing attacks
 can achieve the goal of disrupting service without ongoing expense to 
the attacker; once the firmware has been corrupted, no further action is
 required for the DOS condition to continue,” &lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;&lt;br style="font-family: georgia,serif;" /&gt;&lt;span style="font-family: georgia,serif;"&gt;An
 attacker could use remote firmware update paths in network hardware, 
which are often left unprotected, to deliver corrupted firmware and 
flash this to the device. As a result, the device would become unusable.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2015/08/phlashing-pdos.html</link><thr:total>0</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-1523203142685569326</guid><pubDate>Sat, 15 Aug 2015 10:52:00 +0000</pubDate><atom:updated>2016-12-02T23:16:23.082-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Botnets</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;span style="color: red;"&gt;&lt;span style="font-family: georgia,serif;"&gt;&lt;span style="font-family: georgia,serif;"&gt;Botnet&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: georgia,serif;"&gt;A botnet or robot network is a 
group of computers running a computer application controlled and 
manipulated only by the owner or the software source. The botnet may 
refer to a legitimate network of several computers that share program 
processing amongst them.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: georgia,serif;"&gt;Usually
 though, when people talk about botnets, they are talking about a group 
of computers infected with the malicious kind of robot software, the 
bots, which present a security threat to the computer owner. Once the 
robot software (also known as malicious software or malware) has been 
successfully installed in a computer, this computer becomes a zombie or a
 drone, unable to resist the commands of the bot commander.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: georgia,serif;"&gt;A
 botnet may be small or large depending on the complexity and 
sophistication of the bots used. A large botnet may be composed of ten 
thousand individual zombies. A small botnet, on the other hand may be 
composed of only a thousand drones. Usually, the owners of the zombie 
computers do not know that their computers and their computers’ 
resources are being remotely controlled and exploited by an individual 
or a group of malware runners through Internet Relay Chat (IRC)&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: georgia,serif;"&gt;There
 are various types of malicious bots that have already infected and are 
continuing to infect the internet. Some bots have their own spreaders – 
the script that lets them infect other computers (this is the reason why
 some people dub botnets as computer viruses) – while some smaller types
 of bots do not have such capabilities.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;span style="color: red;"&gt;&lt;span style="font-family: georgia,serif; font-size: small;"&gt;&lt;b&gt;Different Types of Bots&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div style="text-align: left;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: georgia,serif;"&gt;Here is a list of the most used bots in the internet today, their features and command set.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;span style="color: red;"&gt;&lt;b style="font-family: georgia,serif;"&gt;XtremBot, Agobot, Forbot, Phatbot&lt;/b&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div style="text-align: left;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: georgia,serif;"&gt;These
 are currently the best known bots with more than 500 versions in the 
internet today. The bot is written using C++ with cross platform 
capabilities as a compiler and GPL as the source code. These bots can 
range from the fairly simple to highly abstract module-based designs. 
Because of its modular approach, adding commands or scanners to increase
 its efficiency in taking advantage of vulnerabilities is fairly easy. 
It can use libpcap packet sniffing library, NTFS ADS and PCRE. Agobot is
 quite distinct in that it is the only bot that makes use of other 
control protocols besides IRC.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;span style="color: red;"&gt;&lt;b style="font-family: georgia,serif;"&gt;UrXBot, SDBot, UrBot and RBot&lt;/b&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;&lt;/h2&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: georgia,serif;"&gt;Like
 the previous type of bot, these bots are published under GPL, but 
unlike the above mentioned bots these bots are less abstract in design 
and written in rudimentary C compiler language. Although its 
implementation is less varied and its design less sohisticated, these 
type of bots are well known and widely used in the internet.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;span style="color: red;"&gt;&lt;b style="font-family: georgia,serif;"&gt;GT-Bots and mIRC based bots&lt;/b&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: georgia,serif;"&gt;These
 bots have many versions in the internet mainly because mIRC is one of 
the most used IRC client for windows. GT stands for global threat and is
 the common name for bots scripted using mIRC. GT-bots make use of the 
mIRC chat client to launch a set of binaries (mainly DLLs) and scripts; 
their scripts often have the file extensions .mrc.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: georgia,serif;"&gt;Malicious Uses of Botnets&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;span style="color: cyan;"&gt;&lt;span style="font-family: georgia,serif; font-size: small;"&gt;&lt;b&gt;Types Of Botnet Attack&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;&lt;/h2&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;span style="color: red;"&gt;&lt;b style="font-family: georgia,serif;"&gt;Denial of Service Attacks&lt;/b&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: georgia,serif;"&gt;A
 botnet can be used as a distributed denial of service weapon. A botnet 
attacks a network or a computer system for the purpose of disrupting 
service through the loss of connectivity or consumption of the victim 
network’s bandwidth and overloading of the resources of the victim’s 
computer system. Botnet attacks are also used to damage or take down a 
competitor’s website.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: georgia,serif;"&gt;Fast
 flux is a DNS technique used by botnets to hide phishing and malware 
delivery sites behind an ever-changing network of compromised hosts 
acting as proxies.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: georgia,serif;"&gt;Any
 Internet service can be a target by botnets. This can be done through 
flooding the website with recursive HTTP or bulletin-board search 
queries. This mode of attack in which higher level protocols are 
utilized to increase the effects of an attack is also termed as 
spidering.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;b style="font-family: georgia,serif;"&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;b style="font-family: georgia,serif;"&gt;&lt;span style="color: red;"&gt;Spyware&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;b style="font-family: georgia,serif;"&gt;&lt;span style="color: red;"&gt;Adware&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family: georgia,serif;"&gt;&amp;nbsp;&lt;/span&gt;&lt;b style="font-family: georgia,serif;"&gt;&lt;span style="color: red;"&gt;Spamming and Traffic Monitoring&lt;/span&gt;&lt;/b&gt;&lt;/h2&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;b style="font-family: georgia,serif;"&gt;&lt;span style="color: red;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family: georgia,serif;"&gt;Its
 a software which sends information to its creators about a user's 
activities – typically passwords, credit card numbers and other 
information that can be sold on the black market. Compromised machines 
that are located within a corporate network can be worth more to the bot
 herder, as they can often gain access to confidential information held 
within that company. There have been several targeted attacks on large 
corporations with the aim of stealing sensitive information, one such 
example is the Aurora botnet.&lt;/span&gt;&lt;b style="font-family: georgia,serif;"&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: georgia,serif;"&gt;Its&lt;/span&gt;&lt;b style="font-family: georgia,serif;"&gt; &lt;/b&gt;&lt;span style="font-family: georgia,serif;"&gt;exists
 to advertise some commercial entity actively and without the user's 
permission or awareness, for example by replacing banner ads on web 
pages with those of another content provider.&lt;/span&gt;&lt;b style="font-family: georgia,serif;"&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: georgia,serif;"&gt;A
 botnet can also be used to take advantage of an infected computer’s 
TCP/IP’s SOCKS proxy protocol for networking appications. After 
compromising a computer, the botnet commander can use the infected unit 
(a zombie) in conjunction with other zombies in his botnet (robot 
network) to harvest email addresses or to send massive amounts of spam 
or phishing mails.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: georgia,serif;"&gt;Moreover,
 a bot can also function as a packet sniffer to find and intercept 
sensitive data passing through an infected machine. Typical data that 
these bots look out for are usernames and passwords which the botnet 
commander can use for his personal gain. Data about a competitor botnet 
installed in the same unit is also mined so the botnet commander can 
hijack this other botnet.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: georgia,serif;"&gt;Access
 number replacements are where the botnet operator replaces the access 
numbers of a group of dial-up bots to that of a victim's phone number. 
Given enough bots partake in this attack, the victim is consistently 
bombarded with phone calls attempting to connect to the internet. Having
 very little to defend against this attack, most are forced into 
changing their phone numbers (land line, cell phone, etc.).&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;span style="color: red;"&gt;&lt;b style="font-family: georgia,serif;"&gt;Keylogging and Mass Identity Theft&lt;/b&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: georgia,serif;"&gt;An
 encryption software within the victims’ units can deter most bots from 
harvesting any real information. Unfortunately, some bots have adapted 
to this by installing a keylogger program in the infected machines. With
 a keylogger program, the bot owner can use a filtering program to 
gather only the key sequence typed before or after interesting keywords 
like PayPal or Yahoo mail. This is one of the reasons behind the massive
 PayPal accounts theft for the past several years.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: georgia,serif;"&gt;Bots
 can also be used as agents for mass identity theft. It does this 
through phishing or pretending to be a legitimate company in order to 
convince the user to submit personal information and passwords. A link 
in these phishing mails can also lead to fake PayPal, eBay or other 
websites to trick the user into typing in the username and password.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;span style="color: red;"&gt;&lt;b style="font-family: georgia,serif;"&gt;Botnet Spread&lt;/b&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: georgia,serif;"&gt;Botnets
 can also be used to spread other botnets in the network. It does this 
by convincing the user to download after which the program is executed 
through FTP, HTTP or email.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br style="font-family: georgia,serif;" /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;span style="color: red;"&gt;&lt;b style="font-family: georgia,serif;"&gt;Pay-Per-Click Systems Abuse&lt;/b&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: georgia,serif;"&gt;Botnets
 can be used for financial gain by automating clicks on a pay-per-click 
system. Compromised units can be used to click automatically on a site 
upon activation of a browser. For this reason, botnets are also used to 
earn money from Google’s Adsense and other affiliate programs by using 
zombies to artificially increase the click counter of an advertisement.&lt;/span&gt;&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2015/08/botnets.html</link><thr:total>0</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1274797730388628240.post-9153681916795287906</guid><pubDate>Sat, 15 Aug 2015 10:18:00 +0000</pubDate><atom:updated>2016-12-02T23:16:23.133-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Andoid</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Network Hacking</category><category domain="http://www.blogger.com/atom/ns#">Software Hacking</category><title>Anonymous Surfing</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="background-color: black; color: lime; font-family: georgia, serif;"&gt;&lt;b&gt;HOLA VPN&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Hola is a peer to peer network that provides everyone on the planet with freedom to&lt;/div&gt;
&lt;div&gt;
access&amp;nbsp;&lt;span style="background-color: transparent; font-size: 10pt;"&gt;all of the Web! It works through the community of its users - Hola users help you&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: transparent; font-size: 10pt;"&gt;to access the web.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;a href="http://hola.org/" style="font-size: 13.3333330154419px;" target="_blank"&gt;&lt;img alt="Photobucket" border="0" src="http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/DownloadButton1.png" height="60" width="80" /&gt;&lt;b&gt;&lt;span style="font-family: georgia,serif;"&gt;Download&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: transparent; font-size: 10pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: georgia,serif; font-size: small;"&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span style="font-family: georgia,serif; font-size: small;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: georgia,serif; font-size: small;"&gt;&lt;b&gt;
&lt;span style="background-color: black; color: lime;"&gt;JonDo&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style="display: block; font-family: georgia,serif; text-align: left;"&gt;
&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinU7tktRYTi6j5Kd6KU0xkDfyf9c5w0OYBfaZuofkAh34ULiwKN5ehS8WTpgJF_omyrMMT0HpRe5y6dBTGTzQwsiUMfmJvK4MFIyDf7Nerr6SZg6AJ-L18NHYxxOf47Ej-d5t-Q-Z_560/s320/jondo-startup_1.jpg" style="display: block; margin-left: auto; margin-right: auto; text-align: center;" /&gt;&lt;/div&gt;
&lt;span style="color: #3d85c6;"&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="font-family: georgia,serif;"&gt;JonDos publishes a new version of the JonDo-Software, an IP changer and IP anonymization &lt;/span&gt;
&lt;span style="font-family: georgia,serif;"&gt;program, that you can use for anonymous surfing in the Internet with high security anonymous proxy servers.&lt;/span&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;/span&gt;&lt;b&gt;&lt;br style="font-family: georgia,serif;" /&gt;
&lt;span style="color: lime;"&gt;&lt;span style="font-family: georgia,serif;"&gt;What is JonDo?&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;span style="color: #0b5394;"&gt;&lt;span style="font-family: georgia,serif;"&gt;JonDo is an open source and free-of-charge program for Windows, Linux and MacOS X. &lt;br /&gt;
It hides the user's IP adress behind an anonymous IP address. In 
contrast to other anonymizers (VPNs, anonymous proxy servers), the 
user's anonymity stays protected even against the providers (operators) 
of the anonymous IP address.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://anonymous-proxy-servers.net/en/jondo.html" target="_blank"&gt;&lt;img alt="Photobucket" border="0" src="http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/DownloadButton1.png" height="60" width="80" /&gt;&lt;b&gt;&lt;span style="font-family: georgia,serif;"&gt;Download&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;
&lt;br /&gt;
&lt;hr size="2" width="100%" /&gt;
&lt;span style="background-color: black; color: lime; font-family: georgia,serif; font-size: small;"&gt;&lt;b&gt;&lt;br /&gt;
TOR&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="display: block; text-align: left;"&gt;
&lt;img border="0" src="http://t1.gstatic.com/images?q=tbn:ANd9GcT4jhDtt-z5UqCq8uJMak38JBrvZfLzw_X39aqlJZDnCZmdBvxa" style="display: block; margin-left: auto; margin-right: auto; text-align: center;" /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="color: #0b5394;"&gt;&lt;span style="font-family: georgia,serif;"&gt;Tor is very useful for online anonymity, its protect your privacy, defend against a form&lt;br /&gt;
&amp;nbsp;of network traffic analysis. Traffic analysis can be used to infer who 
is talking to whom over a public network. Knowing the source and 
destination of your Internet traffic &lt;br /&gt;
allows others to track your behavior and interests.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #0b5394;"&gt;&lt;br style="font-family: georgia,serif;" /&gt;&lt;/span&gt;
&lt;span style="color: #0b5394;"&gt;&lt;span style="font-family: georgia,serif;"&gt;Tor is a network of virtual 
tunnels that allows people and groups to improve their privacy and 
security on the Internet. It also enables software developers to create&lt;br /&gt;
new communication tools with built-in privacy features. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #0b5394;"&gt;&lt;br style="font-family: georgia,serif;" /&gt;&lt;/span&gt;
&lt;span style="color: #0b5394;"&gt;&lt;span style="font-family: georgia,serif;"&gt;Tor to keep websites from tracking them and their family members, or to connect to&lt;br /&gt;
news sites, instant messaging services, or the like when these are blocked by their&lt;br /&gt;
local Internet providers. Tor's hidden services let users publish web 
sites and other services without needing to reveal the location of the 
site. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>https://hackers-earth.blogspot.com/2015/08/anonymous-surfing.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://i461.photobucket.com/albums/qq331/priyanshuit/Web%20Uses/th_DownloadButton1.png" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (BAUDHIK DUDHATRA )</author></item></channel></rss>