Friday, 11 December 2015
UNLOCK PASSWORD OF A PDF EASILY
Today while working in computer world you might get through pdf files and also today many important files get converted into pdf file and protected using password. And sometime you don’t have access to this password protected pdf file like in India eaadhar services had protected all its files with the password and requires PIN Code of that area to open that pdf files. So to deal with this issue we are here with the method for How To Remove Password Protection From PDF Files . By this method you will be removing the password from any pdf file by just following the simple method discussed below.
This method is based on a PDF unlocker software that is well known as AnyBizSoft PDF Password Remover. this software works perfectly to remove the password from any pdf file. So just read out the below steps to proceed.
Steps:-
1. First of all download and install the software AnyBizSoft PDF Password Remover from here.
2. Now launch the application in your computer and you will see screen like below.
3. Now export the file to this application that you want to make password free.
4. Now just click on start button there.
5. A pop up message will appear displaying the password has been removed.
NOTE:-THE LINK I PROVIDED IS TRAIL VERSION SOFTWARE.
Hack windows 7/8/10 user passwords
Did you ever try to login your friends computer ? and failed ? After this you can do it The OS can be Windows 7 or 8 or it can be the latest windows 10. You could break and login the password protected user accounts.
This exploit takes advantage of the ease of access tool on the login page by ‘tricking’ windows into launching a fully privileged command prompt by selecting ‘on the screen keyboard’ this is done by renaming the on the screen keyboard exe to something random, and renaming the cmd.exe to on the screens previous name. It will all make since later.
What you want :
Any Linux Live CD/DVD/USB with Live option (ex. Ubuntu Live, Linux Live, Kali, etc.).
Ability to use said Linux CD/DVD/USB.
Basic understanding of Windows file structure. i.e. can navigate.
Physical access to said Windows box.
Ability to use command line and basic understanding of net user commands.
Boot Live Linux
Insert CD/DVD into drive and reboot the machine. Start your Live DVD. You may need to go into the BIOS screen and change the boot-up order to CD/DVD drive first, HDD second.
Navigate to sys32
Use the file browser in your Linux environment, navigate to %windir%/system32/. You may have to right-click and mount the Windows partition/drive first or use the NTFS-3G command.
Renaming
Find and rename magnifier.exe (Magnifier file) to magnify.old.
Rename cmd.exe
Find and rename cmd.exe to magnify.exe.
Shutdown Linux & reboot windows
Logout, remove DVD/USB, and reboot into Windows.
Get CMD Prompt Modify Accounts
When Windows reboots, click on the ease of access button in the bottom left corner.
Click magnify and hit apply.Then You have a system level command prompt. At this point is where we will only change the Admin password and not any of the 1000 other things that could be done at this point!
Tip: You can right-click on cmd.exe and click run as administrator inside of Windows for escalated privileges. To edit files, it would never be allowed at basic admin level (caution).
Your options at here.
Change Password:
net user username new_password
When you do so, the password changes without prompting you again.
Add an account:
net user username password /add
Tip: If your username has a space, like Dhruv Agarwal, use quotes like “Dhruv Agarwal".
Admin that:
net localgroup administrators username /add
Delete that:
net user username /delete
Remote Desktop Users Group: (just in case)
net localgroup Remote Desktop Users UserLoginName /add
Net User Syntax Reference:
net user commands
Domain i.e. Servers:
net user for domain
That is it now you could login in to any windows password protected ones.
CREATE FLASHABLE ZIP USING ANDROID
Features:-
• Using zipme you can easyley create a Flashble zip for this you need a rooted phone with custom recovery.
• so what you able to create :- you can create a Flashble zip of almost everything.
•You can create a Flashble zip of busy box , boot animation , build.prop , wallpapers , system and user apps (with or without data) , file or folder etc.
Steps:-
1.download zip me from here.
2. Open zip me and grant root acces Request.
3. Than you can see their have many options.
4.choose option that you what.
5. Create Flashble zip.
6. Any time you want Flash that zip file just boot into recovery and Flash it.
7. Enjoy
NOTE :- Dont create bigger Flashble zip mens if you createing Flashble zip of app than only create of 25 apps because zipme is still in beta so bigger Flashble zip will give you Error.
HACK ANY FACEBOOK GROUP
Today I Tell You How To Hack Any Facebook Group iT iS Very Easy And Simple.Its Depand On You iF You Understand Logic Then iT iS Very Easy For You And You easily Hack Any Group Just in 2 Minutes.
1. First Go To Facebook Group Who You Want To Hack.
2. After Going Click On Group Url And Copy 15 Digits Code as shown in below screenshort.
3. Now Go To Your Profile And Copy Your id number.
4. Now You Have 2 Codes Your id's And Group id's.Put Your Codes into This Url
Example:-
https://m.facebook.com/group/add_admin/?group_id=451234801275534&user_id=175043329866212&added&_rdr
5. Change Both Codes And Send Link To Admin When He Click On Link He Redirect Made You Admin Of his Group.
6. Now iF You Evil Then You Remove All admin From The Group.
NOTE:-THIS TUTORIAL IS FOR EDUCATIONAL PURPOSE ONLY.DO NOT TRY TO HARM ANYONE.
Monday, 7 December 2015
SPY ON TEXT MESSAGES
The method is really cool one and require a cool app for your android device that will spoof text messages arriving on android device and send the complete logs to the another device. You just have to follow some simple steps below to proceed.
Steps:-
1. First of all you need to download SecretSMSReplicator a app that allow you to spy on messages arriving on your android.
2. Launch the app after installing the app in the android device whose messages you want to spy.
3. Now after this you need to enter the phone number to which all the arriving messages will get forwarded, You will enter your number.
4. Now set any password to secure your app.
5. Now this app will get hidden in android device and no one can even uninstall it as it will require password that you have set.
6. Thats is you will be getting all the logs of messages that arriving on device or sent from that device.
NOTE:-THIS TUTORIAL IS FOR EDUCATIONAL PURPOSE ONLY. DON'T TRY TO HARM ANYONE.
Sunday, 6 December 2015
RESET YOUR PATTERN,PASSWORD OR PIN WITHOUT FORMATTING YOUR PHONE
Now a days Everyone know how to reset forgot pattern, password or pin with hard reset But No i am going to tell you trick how to reset pattren password or pin without formatting that is most important some times.
Requiremnt :-
1. Android device
2. The zip file click here
3. Know how to go in recovery mode
PRocess :-
1. Enter recovery mode ( every Phone has other way to go in recovery mode Search you in google).
2. Then In recovery Mode Mount/system/cache and all others
3. Flash Android developer.zip and soon after installation you will see the new option...
Enter menu, which is at the left corner of the screen and check "MOUNT ALL PARTITIONS IN STARTUP". Now exit Aroma file manager from the menu itself.
4. Install the same file once again and now go to DATA / SYSTEM and search for Name:- (GESTURE.KEY) without brackett if u want to remove Pattern or Password Key if u want to remove password
5.Exit recovery mode and reboot your device
If it asks for pattern or password enter any pattern or password.
yOOoOOoooOOo !!!!!!! You have unlocked the pattern without clearing out your Important data...
SEND MESSAGE TO THE PERSON WHO BLOCKED YOU ON FACEBOOK
I back with new facebook trick which help you to send message who block you on fb,I know you all think it is fake trick but it is 100% working trick
Now back to the topic,you need to follow some steps to do this.Step:-
1) The first main thing u have to know is the Profile Name/Username of the person who blocked you.
2) For the profile name just open the profile of the person with your any facebook id who Blocked you.
3)Here is the main step, now in the address bar you will find something Like this,
www.facebook.com/username
4) Here the username is the profile name of the person who blocked you....
5)You can even get this profile name in the about info of the person who blocked you...It will be sometime as shown below.
username@facebook.com
6)Now go to your Mail Account...(G mail, Yahoo,Outlook...).
7)Now compose a New Mail.
8)In the To address type the mail id as shown below
username@facebook.com
in my example it is
username@facebook.com
8)Now type the message you want to send in the subject field and click send.
9)That's it your message will be sent to the facebook inbox directly.
Enjoy!!
CHANGE THE WHATSAPP GROUP LIMIT FROM 100 TO 1000 EASILY
REQUIREMENTS:-
1.ROOTED DEVICE
2.ANY ROOT EXPLORER(ES FILE EXPLORER OR ANY OTHER)
3.WHATSAPP INSTALLED
STEPS:-
1.Open es file explorer and enable root premission
2.Goto device》data》data》com.whatsapp》share_prefs
3.Then open com.whatsapp_prefrences.xml
4.Edit the praticipants value to 1000
5.Now in application manager froce stop whatsapp and then again open it.
6.Its done now just like above screenshot.
Enjoy!!
DOWNLOAD ANY GOOGLE PAID BOOK FOR FREE
Now you can download your favorite Google Books for free in your PC. So have a look on these method discussed below to proceed.
Steps:-
Download using downloader in any format
1. First download this software & install it.
2. Now go to your browser and search your book that you want to download.
3. Now copy the URL of that book.
4. Now launch the tool and paste the link and then select the format that you want to download.
5. Now you will see downloading will start and in few moments your book will be with you in the format that you have selected.
Wednesday, 11 November 2015
AIRTEL 3G/4G FREE INTERNET TRICK
Airtel Free Internet Tricks 3G/4G [ All India] November - December 2015-2016
Lets Start ->
#Method-1 :-
*.Goto Message
*.TypeTRY3G
*.Sent It to51619
*.You’ll Get Confirmation Sms From Airtel Shortly
*.BoooM, Enjoy
Method-2 :
*.Call to129
*.Select Your Language
*.You’ll Be Asked to Activate 3G Platinum Trial Pack Worth 100 MB *.Press 1 and Confirm It
*.Great ! You’ll Get a Confirmation Sms
ENJOY !!
So above is all about AIRTEL FREE INTERNET TRICK OF 2016 4G AND 3G if you have any query then comment below !!
Tuesday, 10 November 2015
Android's SECRET Codes 2015 Latest Edition
These Android Secret codes are mostly universal, and should work on Android devices, no matter the manufacturer. There might still be carrier restrictions on certain codes though, so they're not all guaranteed to work.
Android Secret/Hidden codes 2015 :-
*#06# - IMEI (International Mobile Station Equipment Identity) number - essential in case your device is stolen and you want to block the thief from accessing your network
*#*#7594#*#* - Make Power button turn off your device without displaying menu
*#*#4636#*#* - Display information about phone, battery, usage and WiFi
*#*#7780#*#* - Factory reset (deletes app data and apps, not firmware)
*2767*3855# - Complete phone wipe, including firmware (not to be used lightly!)
*#*#273283*255*663282*#*#* - Back up all your photos and videos
*#*#1472365#*#* - Test your GPS
*#*#1234#*#* - Display phone firmware and PDA info
You can access the above screen on most Android devices by entering *#*#4636#*#* on the dialpad.
*#*#232338#*#* - Show WiFi Mac address
*#*#8255#*#* - Access GTalk Service Monitor
*#*#36245#*#* - Access Email debug info Email
*#*#225#*#* - Events calendar
*#*#426#*#* - Debug info for Google Play Service
*#*#759#*#* - Access Google Partner Setup
#Samsung SECRET Codes :-
*#*#34971539#*#* - Show all camera information
*#*#197328640#*#* - Enable test mode for services
*#*#232339#*#* - Wireless LAN test
*#*#1575#*#* - Test your GPS (alternative to generic Android GPS test)
*#*#0*#*#* - Test your LCD display
*#*#4986*2650468#*#* - Display crucial phone information (PDA, Hardware, firmware etc.)
##778 (followed by the Call button) - EPST menu
#HTC SECRET Codes New :-
*#*#3424#*#* - HTC function test Program
*#*# - HTC Info menu
*#*#8255#*#* - Launch GTalk Service Monitor
##3424# - Diagnostic mode
##3282# - EPST menu
##8626337# - VOCODER
##33284# - Field trial menu
##786# - Reverse Logistics Support
##7738# - Protocol Revision
The function test menu on HTC phones can be accessed by typing ##3282# on the dialpad
These codes, but if you do then now you know where to find Them. So Above Is the Android SECRET Codes Latest Edition By Dhruv hacks.
Android Secret/Hidden codes 2015 :-
*#06# - IMEI (International Mobile Station Equipment Identity) number - essential in case your device is stolen and you want to block the thief from accessing your network
*#*#7594#*#* - Make Power button turn off your device without displaying menu
*#*#4636#*#* - Display information about phone, battery, usage and WiFi
*#*#7780#*#* - Factory reset (deletes app data and apps, not firmware)
*2767*3855# - Complete phone wipe, including firmware (not to be used lightly!)
*#*#273283*255*663282*#*#* - Back up all your photos and videos
*#*#1472365#*#* - Test your GPS
*#*#1234#*#* - Display phone firmware and PDA info
You can access the above screen on most Android devices by entering *#*#4636#*#* on the dialpad.
*#*#232338#*#* - Show WiFi Mac address
*#*#8255#*#* - Access GTalk Service Monitor
*#*#36245#*#* - Access Email debug info Email
*#*#225#*#* - Events calendar
*#*#426#*#* - Debug info for Google Play Service
*#*#759#*#* - Access Google Partner Setup
#Samsung SECRET Codes :-
*#*#34971539#*#* - Show all camera information
*#*#197328640#*#* - Enable test mode for services
*#*#232339#*#* - Wireless LAN test
*#*#1575#*#* - Test your GPS (alternative to generic Android GPS test)
*#*#0*#*#* - Test your LCD display
*#*#4986*2650468#*#* - Display crucial phone information (PDA, Hardware, firmware etc.)
##778 (followed by the Call button) - EPST menu
#HTC SECRET Codes New :-
*#*#3424#*#* - HTC function test Program
*#*# - HTC Info menu
*#*#8255#*#* - Launch GTalk Service Monitor
##3424# - Diagnostic mode
##3282# - EPST menu
##8626337# - VOCODER
##33284# - Field trial menu
##786# - Reverse Logistics Support
##7738# - Protocol Revision
The function test menu on HTC phones can be accessed by typing ##3282# on the dialpad
These codes, but if you do then now you know where to find Them. So Above Is the Android SECRET Codes Latest Edition By Dhruv hacks.
Types of hackers
TYPES OF HACKERS
Hackers are three types:-1. White hat hacker
2. Gray hat hacker
3. Black hat hacker
White Hat and Grey Hat Hacker & What is the Real Difference?
What is worse, the public is not able to understand terms like grey hat, white hat, Linux OS, or cracker.
However, the truth is that the subculture of the hacker world is more complex than we think. Especially if we consider that, these are very intelligent people.
So, what is ethical hacking white hat and how does it differentiate from grey hackers? The only way to find out is to submerge ourselves in the world of hackers and understand, at least, the most basic concepts.
White Hat Hacker
A hacker can be a wiz kid who spends too much time with computers and suddenly finds himself submerged in the world of cyber-security or criminal conspirators. On the other hand, he can be a master criminal who wants to obtain huge amounts of money for him, or even worse, dominate the world.
In the movie Matrix, the concept of hackers changed a bit. Although the agents of the Matrix considered them terrorists, the truth is that they were rebels fighting for the liberty of humanity. Things do not need to reach that extreme, though. We are not at war with intelligent machines so that kind of scenario is a bit dramatic.
Therefore, a hacker is an individual who is capable of modifying computer hardware, or software. They made their appearance before the advent of computers, when determined individuals were fascinated with the possibility of modifying machines. For example, entering a determine code in a telephone in order to make free international calls.
Publish computer, they can exploit their capabilities found a new circle. They were not limited to the constraints of the physical world, instead, they can travel through the virtual world of computers. Before the Internet, interaction and exchange of information for the Bulletin Board System (BBS) is used. When the Internet appeared, however, real explosion occurred.
Today, anyone can become a hacker. Within that value, are three types of hackers. Also known as the black hacker, cracker to obtain personal benefits in criminal activities is someone who uses his computer knowledge. A typical example of a financial institution to make some money on the exploitation of the weaknesses of the system is one.
The white hat hacker. White hat hacking can be considered like a black hacker, though, a significant difference. A white hacker does with any criminal intent. , Their system testing white hackers who want to contract companies worldwide. They test how secure their systems, and they could be found that would indicate any faults. You want to be a hacker with a white cap, Linux, a PC and an Internet connection is all you need.
Grey Hat Hackers
A grey hat hacker is someone who is in between these two concepts. He may use his skills for legal or illegal acts, but not for personal gains. Grey hackers use their skills in
order to prove themselves that they can accomplish a determined feat, but never do it in order to make money out of it. The moment they cross that boundary, they become black hackers.
For example, they may hack the computer network of a public agency, let us say, NOAA. That is a federal crime.
If the authorities capture them, they will feel the long arm of justice. However, if they only get inside, and post, let us say, their handle, and get out without causing any kind of damage, then they can be considered grey hackers.
If you want to know more about hackers, then you can attend one of their annual conventions. Every year, hackers from all over the US, and from different parts of the world, reunite and meet at DEF CON. These conventions are much concurred. In the last one, 6,600 people attended it.
Each year, Def Which Las Vegas, Nevada is observed. However, hackers are not the only ones who go to this event. Computer media, computer security experts, lawyers, and government employees are also.The Hacker (computer security, worms, viruses, new technologies, coding, etc.) in the world, somehow, all of them related, is composed by different kinds of tracks. Besides tracks, computer hacking, lockpicking and even robots that related events are compared. Around the world, public or private institutions, to protect the system: in the end, you want to use ethical hacking, white hat hacking or whatever the name, it has a purpose. After all, hackers can now be located anywhere, and they can be counted by millions. Soon, white hat, white hat concepts like the Linux operating system or will be common knowledge. A true testament to how much our society has been affected by technology.
Black Hat Hackers
Black hat hackers all over the world have become the iconic image of hackers. For the majority of computer users, the word hacker social misfits and criminals has become a synonym for.Of course, the media is an injustice created by their interpretation, so a hacker and a black hacker (or cracker) is what is important to learn. Therefore, the black hat techniques and how they make our life a little more difficult to learn two.
With malicious intent who breaks into computer systems or networks (you prefer cracker, or) black hat hacker is used to describe. A white hat hacker contrast, black hat hacker probably destroying files or stealing data for the purpose, takes advantage of the break. Black Hat hacker victim without notifying other hackers and / or known to the public can exploit. The other organization is able to secure it offers the opportunity to exploit the vulnerability.
Folder Lock With Password Without Any Software-
Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat').
Any name will do.
Then you see a batch file. Double click on this batch file to create a folder locker.
New folder named 'Locker' would be formed at the same location.
Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'.
If you want to unlock your files,double click the batch file again and you would be prompted for password.
Enter the password and enjoy access to the folder.
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End
Sunday, 8 November 2015
How To View Facebook Private Profile Photo In Large Size ?
How To View Facebook Private Profile Photo In Large Size ?
Sometime you want to see clear image of someone on facebook who might not be your friend but his/her privacy setting stop you from doing this. In this tutorial i will teach you to view facebook private or locked profile picture in large size with very simple trick. How To View Facebook Locked Profile Picture ?
1. Open the facebook profile of person whose profile picture is locked or is set to private.
2. Right click on the profile picture and click on Copy Image Url as shown in image below.
3. Open that image in new tab by right clicking and selecting Paste (CTRL + V) 4. Now change the value of image size highlighted below which might be s160x160 to s720x720 (If its not clear try (s320x320)
5. The image will enlarge in size. This trick does not always work
Saturday, 7 November 2015
HOW TO SPOOF YOUR MAC ADDRESS IN ANDROID
REQUIREMENTS
1) ROOTED PHONE
2) BUSYBOX INSTALLED
3) Terminal App
OPEN UP TERMINAL AND WRITE
:su
:busybox iplink show eth0
(THIS WILL SHOW YOUR CURRENT MAC ADDRESS)
NOW TYPE IN
:busybox ifconfig eth0 hw ether 00:11:22:33:44:55
(INSTEAD OF 00:11:22:33:44:55, YOU CAN WRITE YOUR WANTED ADDRESS)
CONGRATULATION, YOU HAVE SUCCESSFULLY SPOOFED YOUR MAC ADDRESS!
YOU CAN CHECK YOUR MAC ADDRESS BY TYPING
:busybox iplink show eth0
PS: I CANT GUARANTEE YOU, IF THIS WORKS . BUT IT SHOULD WORK IF YOU GOT BUSYBOX INSTALLED.
Mac Address Spoof - http://www.mediafire.com/?qapodo05oc1im06
How to Hack WhatsApp Account???
WhatsApp is currently one of the most secure messaging services purely because it works with a particular phone number and requires a certain code. In my today’s article I am going to describe a few methods to hack WhatsApp account. Yes guys, it’s no more a myth. You can actually get access to someone else’s WhatsApp account. If you always wanted to know what your boyfriend/husband or girlfriend/wife or friend talks to on WhatsApp then you are at the right place. There are loads of other websites that claim they can hack WhatsApp account, all of them are false. None of those tricks work and actually it is nothing but just a waste of time. The methods that I am going to depict will surely help you in getting access of someone else’s whatsApp account. So people, lets get started now.
Method 1:- Social Engineering (Recommended)
NOTE:- THIS HACK ONLY WOULD WORK WITH SOMEBODY YOU KNOW OR ARE FRIENDS WITH.
Step 1: Firstly you will need to download Bluestacks.
Step 2: For this to work, a little Social Engineering is required. Using this software you would need to download and open up the whatsapp application.
Step 3:- Now enter the Phone number of your victim. WhatsApp will send a confirmation code on victims number. You are in need of that code.
Step 4: The best method to get this code off your friend is to start a conversation with him. All you have to do is trick him into giving the code. You could try this:-
“You – Hey, I got a reactivation code for my WhatsApp, did you get one too?
Victim – Yeah I did!
You – I accidentally deleted mine, might be worth a shot to try yours”
The victim hopefully gives you the code.
In the event that they don’t, might be worth trying to physically get hold of their phone or try from a different tactic. Try and get it from them without making it too obvious.
People can be stupid. This is a guaranteed method if you manage to complete the steps above.
NOTE: This method doesn’t work twice so know what you’re going to say and just go in for it. If you fail on one person, move onto the next…You will be able to intercept any messages, videos, images. Virtually anything you want off their WhatsApp!!
Method 2:- Using MAC [Media Access Control] ADDRESS
In this trick i will be telling you how you can read your messages offline with the help of MAC Address. You can see that you can read the messages and see profile picture in your WhatsApp even when you are not connected to internet and it also pop up the messages which you have not read when you were offline. The trick behind this is that all the messages are kept encrypted in the SD card of your mobile phone so even when are offline you can read the messages and see profile picture of your contacts.
In this trick you have to spoof your android phone’s MAC Address. Don’t be surprised!! Yes, MAC Address can be spoofed. The attacker can use your MAC address and verification code to access your whatsapp account.
It is easy to spoof MAC address in android but for spoofing MAC address the device must be rooted with BusyBox and Terminal App must be installed in it. Anyone can spoof their MAC address if they meet all these requirements and eventually can hack WhatsApp account of the victim.
You can learn spoofing MAC Address by going to this link: How to spoof MAC Address.
Now just follow these simple steps:-
Get mac address on your android phone.
Finding MAC address on an Android Phones
On your phone’s home screen, click on menu, then go to setting.
Click on about phone.
Click on the status.
And then view your Wi-Fi MAC address.
As soon the message is received Push the MAC address as well as Verifying code to your server or mail it your ID. That banks on your convince.
Cheat your phone’s MAC address to the Victims address and install WhatsApp and after that type the verify code.
And now its done. You get full access to the victim’s whatsapp ID. So now you can keep spying/watching your victim’s movements.
That means you and the victim is using the same ID from different devices.
WhatsApp hack to use it by not using your number.
This hack works by cheating the WhatsApp Verification Servers by sending a spoofed request for an authorisation code expected for a different phone.
Install Whatsapp on your device. WhatsApp now opens a counter where it sends a verification message to its servers.
Block the message service – it can be blocked by changing the message centre number or turning the phone into Airplane mode.
WhatsApp now gives a substitute method of verification – Select verify through SMS and fill in your email address. Once you click to send the SMS press cancel to abort the call for authorisation to the WhatsApp server.
Now you have to do sms Spoofing.
Examine your outbox and copy the message details into the spoofer application and send the spoofed verification.
You will now receive messages expected for the spoofed number on your mobile device and you can communicate with people under the spoofed number.
It’s done!! You have hacked into your friend’s WhatsApp account.
NOTE:- This information has been shared to create awareness among people regarding the “Ways to Hack Whatsapp” so that you can protect yourself from getting hacked. In no way do i promote misusing of the information.
Make Facebook Multi Id With Singal Email
There is a small bug in gmail because of which it ignores the dot (.) in the e-mail address and hence the following email addresses are same :
M.ultifacebook@gmail.com
M.ultifacebook@gmail.com
Mu.ltifacebook@gmail.com
Multifaceboo.k@gmail.com ...................and so on
It can be done on all email Id's. And the facebook considers these dots (.) in the email ID and hence consider's these to be Different ID's.
So, If you want to create a new facebook account with existing ID then just place the dot (.) in the ID name while signing up.
Delete All Friends Of Facebook
To use in Mozilla follow these step below:
Step 1: You must have Mozilla Firefox and Greasemonkey Addon Installed this
Step 2: Install this script. Clear List Script
Step 3: Restart Mozilla Firefox and open your Facebook.
Step 4: Go to your Timeline, click on Friends.
Step 5: If script has been not loaded, just reload/refresh the tab.
Step 6: Tick on checkbox beside a friend name to select for delete. If you click button "Select All" , it will tick all.
Becareful ! After you click "Delete Selected Friends" it will not be
undone .
To use in Chrome follow these steps below:
Step 1: Install this Extension Tampermonkey Extension
Step 2: Now, Install this script. Clear List Script
Step 3: Go to your timeline profile, click friends tab and wait script to load.
Step 4: Now, you have an option to do it. If script does not load, just reload/refresh the page/tab.
Change The FaceBook Name Before 60 Days
Facebook only allow you to change your Name after 60 days. You don't be able to Change that. you can change your facebook name before sixty day. Now we have a New Trick. But You Can Set Your
Previous Names Only.
=> Firstly go to
http://m.facebook.com/hacked
=> Now Click on
"MY ACCOUNT IS COMPROMISED"
=> Now login with your account.
=> Facebook asks to change your password and some other security things.
=> In this procedure, it says
"recently you changed your name if you didn't do this?
change name now"
=> Now your previous names will be shown.
=> Choose your old name and click save.
Find victim's hidden email address in facebook
Try this fast & Easy method
Open Your Facebook Account go to "settings"
click general >> Mail Disable Facebook email address
Now Send message to victim
Now open your gmail Account
click "inbox"
select "contacts"
Now it shown recently contacted users
Now Click "victim link" here
It Shows The Mail Id Of Victim...!
ENJOY
How to share Blank Status, Comments and Do Blank Message on Facebook
These type trick also making more interesting this social networking site, Many time you are seeing that people doing blank comments, Blank status updates and also blank messages, So if are you also searching about these type tricks then maybe this post will be useful for you.
To share Blank Status Updates just Post Pres Alt +0173.
To share Blank Comments on Friends stratus Updates Press Alt +0173.
For Mobile just give speeches and Copy space and post on comments and status or @ [0:]
To send Blank messages to your friends Press Alt +0173.
How to recover Deleted Facebook Messages
This trick may be secret for you. If unfortunately if lost your messages and you’re searching to get back these messages again in your inbox, then this trick will be best for you. As I wanna tell you that Facebook our all information saving in archive, And Facebook also allow to download your archive to your computer, Using that we can we can explore our all deleted Facebook message and all conversation back.Let me show complete method about this.
First, you need to go Setting Tab.
Now click on General Tab you will See Download a copy of your data.
Just click on Download a copy option.
You will redirect new Page, just click on Start my Archive.
HOW CAN ANYONE EASILY HACK YOUR GMAIL ID
Friends most of my friends lost there gmail IDs because of hacking.
Don't worry i didn't do that but there are many more who like hacking like me.
But i do not want to be harmful for anyone , i just want to tell the people the way of hacking, How a hacker can hack you? ,
How can you save yourself from them.
So today i'm going to tell you how can you hack anyone gmail id or how can you save your's one?
Just see some simple steps
STEP 1.- First of all , a hacker will try to know you gmail id.
STEP 2.- Now , he'll click on Forget Password on gmail.com . Here he'll fill your email id.
STEP 3.- After that there'll be two option to hack the account , the first one is mobile number and the second one is your alternate email id or your security answer.
STEP 4.- Let assume that you want to hack your friends gmail id or your friends want to hack your gmail id then he'll ask you for your phone for sometime. Once you'll allow him then no one can save your gmail id.
It'll surely going to be hacked. Let me show you in next step how'll he hack your gmail id.
STEP 5.- Now after doing last 4 step, he'll fill your number and click on continue.
STEP 6.- After that google will send a sms on your number with a code and when he'll fill that code there then google will show you a page to set a new password.
Now he'll set new password. A confirmation mail will be sent to your atlernative email id.
But he'll do something wrong that will explained in next step.
STEP 7.- Now he'll go to ACCOUNT section and change the recovery option. E.g. He'll replace your number with his private number and also change your alternative email with his email
STEP 8.- Now he'll come to you, and give your phone to you and say thanks with a smiling face and you know what'll you say ?
You'll say - your welcome, its my pleasure. . Ha ha ha. . So next time , think 100 times before giving your phone to your friends.
" ENJOY & WAIT FOR NEXT "
Commands That Every Windows User Should Know 2015
When you enter “services.msc” and press the Enter button, it will open up the Windows Services app where you can easily start, stop and configure other settings for each and every service individually. It’s quite helpful when you want to toggle a service.
2. mstsc
Entering “mstsc” into the Run dialog box opens the Remote Desktop Connection app which allows you to connect to another Windows computer over the local network or through the Internet. This helps you to use the host computer as if your own.
3. msinfo32
If you want to quickly get your system information, then the “msinfo32″ command is the way to go. At a glance, it will display all the system details including the hardware resources and software environment.
4. sdclt
This command opens the Backup and Restore window which allows you to quickly set a backup schedule or restore any of your previous backups.
5. compmgmt.msc
The Computer Management app is where you can access almost all the advanced Windows modules like Event Viewer, Shared Folder, System Tools, etc.
6. cleanmgr
This command allows you to open the Windows Disk Cleanup utility. Once opened, simply select the drive your want to clean up and click on the “Ok” button.
7. eventvwr.msc
Windows Event Viewer is where Windows stores all the monitoring and troubleshooting messages. You can use this command to quickly access the Event Viewer application.
8. control
Every Windows user knows a thing or two about the Windows Control Panel, and using this command, you can quickly access the Control Panel with some stumbling around.
9. mmc
Microsoft Management Console (MMC) is an advanced Windows module which is mainly aimed at system administrators and power users as it sports all the tools required for configuring and monitoring a Windows system.
10. resmon
Whenever you want to check how your system resources are being utilized, simply use this run command, and it displays everything from your CPU to Dist to Network.
11. desk.cpl
Want to quickly change your screen resolution? Simply enter this command in the Run dialog box and you are good to go.
12. snippingtool
Snipping tool is a very useful tool if you want to take quick snapshots. This lightweight tool even comes with its own basic image editor so that you can make necessary modifications to the snapshot.
13. taskmgr
Access the Windows Task Manager by right-clicking on the taskbar and selecting the option “Task Manager.” But another quick way is to type this command in the Run Dialog box.
14. main.cpl
Mouse properties are generally buried deep inside the Windows Control Panel, but you can easily access the same using this Run command.
15. psr
Problem Steps Recorder (PSR) is a great utility to record and show a certain problem in Windows. Just use this simple command to access the tool.
16. “chrome” or “firefox”
If you’ve installed Chrome or Firefox, you can easily launch those programs by entering these commands. Of course, you can launch any registered Windows program this way (ex: notepad).
17. wscui.cpl
Using this simple Run command, you can access the Windows Action Center without stumbling around or messing with the Windows Control Panel.
That’s all for now, and hopefully that helps.
Friday, 6 November 2015
How To Change Windows password wihout knowing current password
Method -1
Step-1 Select “My computer” and press Right click on it and chose a “Manage” options. or Press Windows+R Key and type compmgmt.msc in Run Box and hit enter.
Step-2 "Computer Management windows" will open, and Select System Tools from Right window pane and after that Go to "Local Users and Groups" and double click on it.
Step-3 Now Click on "Users" and you will see all the login accounts of your computer. And after that select your account.
Step-4 After selecting your login Account press Right Click on it. And then choose "Set Password" option.After that one pop-up box will open and click on "Proceed".
Step-5 Enter the New Password and conform them, then click on "OK" Button.
Step-6 Now your login Password has been successfully changed .you can restart your system and check with your new password.
Method -2
Change password with "Command Prompt"
Step-1 Firstly go to windows start menu and type "cmd" in search box . Then select cmd and Run as Administrator.
Step-2 After that type below command in cmd
net user %username% DhruvHackingTricks
you can change "DhruvHackingTricks" to with your choice password and after that hit enter.
Now your password have been successfully changed . and enjoy !!
How to Hack Wi Fi Using Android
Do you want to test your network security? It used to be that you needed a desktop OS such as Windows or Linux installed on a computer with a specific wireless network card. Now, however, you can also use certain Android devices to scan and crack wireless networks. These tools are available for free as long as your device is compatible. Hacking routers without permission is illegal. These steps are provided to test the security of your own network.
I will tell you two methods to hack wifi
1. WEP Routers
2.WPA2 WPS Routers
************************************
WEP Routers
1.Root a compatible device. Not every Android phone or tablet will be able to crack a WPS PIN. The device must have a Broadcom bcm4329 or bcm4330 wireless chipset, and must be rooted. The Cyanogen ROM will provide the best chance of success. Some of the known supported devices include:Nexus 7
Galaxy S1/S2/S3/S4/S5
Galaxy y
Nexus One
Desire HD
Micromax A67
2.Download and install Bcmon. This tool enables Monitor Mode on your Broadcom chipset, which is essential for being able to crack the PIN. The bcmon APK file is available for free from the bcmon page on the Google Code website.
To install an APK file, you will need to allow installation from unknown sources in your Security menu.
3.Run bcmon. After installing the APK file, run the app. If prompted, install the firmware and tools. Tap the "Enable Monitor Mode" option. If the app crashes, open it and try again. If it fails for a third time, your device is most likely not supported.
Your device must be rooted in order to run bcmon.
4.Tap "Run bcmon terminal". This will launch a terminal similar to most Linux terminals.Type airodump-ng and tap the Enter button. AIrdump will load, and you will be taken to the command prompt again. Type airodump-ng wlan0 and tap the Enter button.
5.Identify the access point you want to crack. You will see a list of available access points. You must select am access point that is using WEP encryption.
6.Note the MAC address that appears. This is the MAC address for the router. Make sure that you have the right one if there are multiple routers listed. Jot this MAC address down.
Also note the Channel that the access point is broadcasting on.
7.Start scanning the channel. You will need to collect information from the access point for several hours before you can attempt to crack the password. Type airodump-ng -c channel# --bssid MAC address -w output ath0 and tap Enter. Airodump will begin scanning. You can leave the device for a while as it scans for information. Be sure to plug it in if you are running low on battery.
Replace channel# with the channel number the access point is broadcasting on (e.g. 6).
Replace MAC address with the MAC address of the router (e.g 00:0a:95:9d:68:16)
Keep scanning until you reach at least 20,000-30,000 packets.
8.Crack the password. Once you have a suitable number of packets, you can start attempting to crack the password . Return to the terminal and type aircrack-ng output*.cap and tap Enter.
9.Note the hexadecimal password when finished. After the cracking process is complete (which could take several hours), the message Key Found! will appear, followed by the key in hexadecimal form. Make sure that "Probability" is 100% or the key will not work.
When you enter the key, enter it without the ":". For example, if the key was 12:34:56:78:90, you would enter 1234567890.
WPA2 WPS Routers
1.Root a compatible device. Not every Android phone or tablet will be able to crack a WPS PIN. The device must have a Broadcom bcm4329 or bcm4330 wireless chipset, and must be rooted. The Cyanogen ROM will provide the best chance of success. Some of the known supported devices include:Nexus 7
Galaxy Ace/S1/S2/S3
Nexus One
Desire HD
2.Download and install Bcmon. This tool enables Monitor Mode on your Broadcom chipset, which is essential for being able to crack the PIN. The bcmon APK file is available for free from the bcmon page on the Google Code website.
To install an APK file, you will need to allow installation from unknown sources in your Security menu.
3.Run bcmon. After installing the APK file, run the app. If prompted, install the firmware and tools. Tap the "Enable Monitor Mode" option. If the app crashes, open it and try again. If it fails for a third time, your device is most likely not supported.
Your device must be rooted in order to run bcmon.
4.Download and install Reaver. Reaver is a program developed to crack the WPS PIN in order to retrieve the WPA2 passphrase. The Reaver APK can be downloaded from the QR code that i provided below.
5.Launch Reaver. Tap the Reaver for Android icon in your App drawer. After confirming that you are not using it for illegal purposes, Reaver will scan for available access points. Tap the access point you want to crack to continue.
You may need to verify Monitor Mode before proceeding. If this is the case, bcmon will open again.
The access point you select must accept WPS authentication. Not all routers support this.
6.Verify your settings. In most cases you can leave the settings that appear at their default. Make sure that the "Automatic advanced settings" box is checked.
7.Start the cracking process. Tap the "Start attack" button at the bottom of the Reaver Settings menu. The monitor will open and you will see the results of the ongoing crack displayed.
Cracking WPS can take anywhere from 2-10+ hours to complete, and it is not always successful.
I think I have cleared all the doubts, if there is still any doubt just comment below.
How to Remove Shortcut Virus From USB and Memory Card
To remove the shortcut virus use the following steps.
Do not open the shortcut file or folder otherwise the virus could infect your system.
Step 1: Connect your Pen drive or memory card.
Step 2: Open command prompt. To open command prompt press windows button + R . Enter the command cmd in Run and press enter to open command prompt.
Step 3: Go to My computer and check out your Pen drive letter.
Step 4:To remove shortcut virus from pendrive type attrib -h -r -s /s /d g:\*.* in the Command prompt. Don’t forget to replace the g with your Pen drive or memory card letter.
Step 5: Press Enter button.
Step 6: Go back to your Pen drive or memory card. You would see both your original files and shortcut files.Delete all the shortcut and unknown files and copy your original files and folders to another drive.
Step 7: At last format the Pen drive or Memory card. You have successfully remove shortcut virus from pendrive and recovered the infected files in the Pen drive.
Tips to protect your pen drive from Virus
Keep your system up to date with the latest antivirus.
Update your antivirus program at regular interval of time.
Do not ever open the shortcut or virus file with the extension filename.lnk . it could badly harm your computer and could infect your other removable devices too.
Before opening any removable drive ( pen drive or SD card ) perform a deep scan of the removable drive.
Leave your valuable comments and if you find any difficulty in removing shortcut virus from Pendrive tell me i will help you.
Create A Undeletable And Unrenamable Folders In Windows
Try to make a new folder in windows & give it name con,aux, lpt1, lpt2, lpt3 up to lpt9. you won't be allowed to create folder with above mentioned names, Because they are reserved words in windows.
How To Create Undeletable And Unrenamable Folders ?
1.Go to Start and then Click on Run
2.Type cmd & hit enter (To open Command Prompt ).
Remember you cannot create Undeletable & unrenamable folder in your root directory (i.e. where the windows is installed) That means you can't make this kind of folder in C: drive if you installed windows on C:
3.Type D: or E: and hit enter
4.Type md con\ and hit enter (md - make directory)
5.You may use other words such as aux, lpt1, lpt2, lpt3 up to lpt9 instead of con in above step.
6.Open that directory, you will see the folder created of name con.
7.Try to delete that folder or rename that folder windows will show the error message.
How to delete that folder ?
It is not possible to delete that folder manually but you can delete this folder by another way mentioned below.
Open Command Prompt Type D: ( if u created this type of folder in D: drive) & hit enter Type rd con\ (rd - remove directory) Open that directory and the folder will not appear because it is removed.
Hack A Pc With Pen drive
Hacking passwords or any information using USB(pendrives).Here is the small tricks guys for stealing information or passwords of ur friends or enemies using pendrives...
USB Switch Blade
Extract it. Open PcInfo select all the files and paste it in your USB(pendrive) insert it in the pc you wanna hack...Open the USB drive, give it 2 sec and and ur job is done...
Subscribe to:
Posts (Atom)