Showing posts with label HACKS. Show all posts
Showing posts with label HACKS. Show all posts

Thursday, June 10, 2010

How to Hack E-Mail Account Password - Email Hacking Software

How to Hack Email Account Passwords Using ProRat?
1. First of all Download ProRat. Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "pro".

2. Open up the program. You should see the following:


3. Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".


4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.


5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

Here is a quick overview of what they mean and which should be checked:


6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.


7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.


8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.

9. After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.

10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.


12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.


13. The image below shows the message that the victim would get on his screen if the hacker chose to message him.


14. Below is an image of the victims task bar after the hacker clicks on Hide Start Button.


15. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.

As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.

How to Hack Into a Windows XP Computer Without Changing Password

Another method to login to a password protected Windows even if you do not have the password is by making Windows accepting any passwords.


There is a far better way to get into Windows XP. It is easy and it does not reset the password. Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin accounts). You do not need access to any accounts to do this. Of course, do not do this on anyone elses computer without proper authorization.
Steps to Hack into a Windows XP Computer without changing password:

1. Get physical access to the machine. Remember that it must have a CD or DVD drive.
2.Download this archive file (Size: 4.5 Mb).
3. Unzip the downloaded PCHaCKs-DreamPack.zip and you’ll get dpl.ISO.
4. Use any burning program that can burn ISO images like UltraISO, PowerISO or Nero.
5. After you have the disk, boot from the CD or DVD drive. You will see Windows 2000 Setup and it will load some files.
6. Press “R” to install DreamPackPL.
7. Press “C” to install DreamPackPL by using the recovery console.
8. Select the Windows installation that is currently on the computer (Normally is “1″ if you only have one Windows installed)
9. Backup your original sfcfiles.dll by typing:
ren C:\Windows\System32\sfcfiles.dll sfcfiles.lld” (without quotes)
10. Copy the hacked file from CD to system32 folder. Type:
copy D:\i386\pinball.ex_ C:\Windows\System32\sfcfiles.dll” (without quotes and assuming your CD drive is D:)
11. Type “exit”, take out disk and reboot.
12. In the password field, type “dreamon” (without quotes) and DreamPack menu will appear.
13. Click the top graphic on the DreamPack menu and you will get a menu popup.



14. Go to commands and enable the options and enable the god command.



15. Type “god” in the password field to get in Windows.

You can also go to Passwords and select “Logon with wrong password and hash”. This option allows you to login with ANY password.

Note: I was unable to bring up the DreamPackPL for the first time because I have Kaspersky Anti-Virus already running in background. I believe most antivirus already labeled this tool as a Hack-Tool. A Hack-Tool is NOT a virus. DreamPackPL helps you bypass the Windows Login screen and it is not destructive.

Sunday, May 2, 2010

Hack E-Mail Passwords using Remote Keylogger

Hack Gmail, Hotmail, Yahoo or any other E-Mail Adress using Keylogging Method

Previously i've written about Keyloggers, like Ref Keylogger, tDevil, Azure AIO Keylogger, Star Tools and many other keyloggers to hack hotmail, gmail, yahoo or any other email account password. Today i found another keylogger - Easy Logger to hack email passwords. This free keylogger software is currently FUD (Fully undetectble) and used to hack any email password. Here i'll show you how to use Easy Logger to remotely hack passwords.

Hack E-Mail Password using Easy Logger

1. First of all download Easy Logger from here.

2. Run Easy Logger.exe file on your computer to see:


3. Now, fill in your Gmail username and password in respective fields (You can create a gmail account that you're going to use only for keylogging). Enter the email adress where you wanna receive windows live passwords. You can set timer as you wish. This timer controls the time interval between two logs emails. Now, hit on "Build" and you will get server keylogger file named "Your logger.exe" created in current directory.

4. Now, to hack email password, you have to send this server file to victim and make him install it on his computer. You can use Binder or Crypter software to bind this server file with say any .mp3 file so that whenever victim runs mp3 file, server is automatically installed on his computer without his knowledge.

5. Now because this is a server.exe file you can't send it via email. Almost all email domains have security policy which does not allow sending .exe files. So to do this you need to compress the file with WinRar or upload it to Free File Storage Domains, like Mediafire, Speedyshare, Ziddu.com, etc.

6. When server keylogger file is installed on victim computer, this keylogger will start recording the typed keystrokes on victim computer. These keystrokes will contain email account password which we wanna hack. Keylogger will then send these recorded keystroke logs to your email address which you have entered in Step 3.

7. You'll recive emails like this one:


8. This keylogger also sends you computer name and IP address of victim alongwith typed keystrokes. Many times, IP address is required for hacking remote computers. In such cases, Easy keylogger is very useful.

9. I have personally tested this free keylogger and found it working 100%.


Very Important: Do not scan these tools on VirusTotal. Use http://scanner.novirusthanks.org and also check the "Do not distribute the sample" option.


Do you have questions, comments, or suggestions? Feel free to post a comment!

FAQ: How to Hack E-Mail Account Passwords - eMail Hacking Software?


Hack Hotmail, MSN, Windows Live, Yahoo, Gmail or any other E-Mail Account Password

I know most of you might be wondering to know how to hack email? You as the reader are most likely reading this because you want to hack
into someone’s email. So in this post I have decided to uncover the real and working ways to hack any email.



Is it possible to hack emails?

Yes! As a matter of fact, almost anything can be hacked. But before you learn the real ways to hack email, the following are the things you should be aware of.

1. There is no ready made software that can hack emails and get you the password just with a click of a button. So if you come accross any website that claims to sell such softwares, I would advise you not to trust them.

2. Never trust any email hacking service that claims to hack any email for just $100 or $200. Most of them are no more than a scam.

So, guys, remember this is all crap. There's no reality in this email hacking service or software.

How can we Hack Email Pasword?

Hacking email passwords is not that easy. You can't do that by simply entering the email address and waiting for the software to crack passwords. Instead, you have to fool victim to give his own password without his knowledge. The main five methods used to hack Email passwords are:

1. Remote Keylogging

The easiest way to hack an email is by using a keylogger (Also known as spy software). A keylogger is a small program that monitors each and every keystroke that a user types on a specific computer’s keyboard. To use it you don’t need to have any special knowledge. Anyone with a basic knowledge of computer can use it.

Refer my articles about Keylogging for more information:
Learn How to Hack Any Email Password
Hack E-Mail Passwords using Remote Keylogger
Remote Password Hacking/Stealer Tool
Password Stealer Tool To Hack E-Mail Account Passwords
Hack MSN Live Messenger User Accounts & Passwords Using a Free FUD Keylogger
Spy on a remote computer desktop stealthily with Remote Desktop Spy

2. Phishing

Basicly phishing is way of sending a fake page to victim which resembles the original page and ask the victim to login with the provided modified page called as phisher. This the most popular method used by hackers to hack email account passwords like myspace, gmail, yahoo, orkut, facebook, etc.

How does it work:

You can download/make a replica of the website you want to phish and save is as HTML. When you’re done with that, you have to find a way to upload the HTML. You can use free hosting site or a website like Blogspot, Piczo, etc. When the victim enters his email and password on the login field, phishing site save those login details and they will be automatically sent to you by mail.

For more information about phishing read my articles:
How to Make a Phisher to Hack Any E-Mail Account Password
FAQ: Phishing to Hack Email Account Passwords
How to Hack Twitter Account Password
How to Create Your Own Phisher to Hack Any Website Account Password
How to Hack Rapidshare Premium Account Password
How To Hack eBay User ID and Password
How To Hack Gmail Account Password
Learn How to Hack Facebook Password
How to Hack RuneScape Account Password

3. Bruteforcing

This is somewhat debating method. I have never personally tried but, read on various site and hacking forums. It is said that Hotmail accounts can be bruteforced. In Bruteforcing, you have to get wordlist - which contains various words and these words are tried out as passwords for victim hotmail account. Generally, for other sites like Gmail, Yahoo, etc. you have limited account login chances and once that number of chances expire, you are not allowed even to try to login. This mechanism helps in avoiding Bruteforce attack against email accounts. So, it is debating to say that Hotmail account passwords can be hacked (actually cracked) by Bruteforcing.

The most famous Bruteforcing software used is Brutus. But, remember, for hacking hotmail account password by Bruteforcing, you must have good quality wordlist which can be obtained via Google.


4. Social engineering

This sounds to be pretty not working at beginning. Even I was neglecting this way. But, once, I thought of using it against my friend on orkut and i got his gmail password very easily by this method. I think many of you might be knowing how what this social engg is. For newbies, social engg is method of retrieving password or answer of security question simply be quering with the victim. You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic.


5. USB Thief

As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend's/college Computer. Read my article How to Hack Passwords Using USB Pen Drive for more information.


So friends, these are most useful ways to hack email account password. I have tested most of them and found to be working to hack email account password. Just give them a try to hack your victim email account passwords. I will appreciate your effort if you mention any other email hacking method you found great to hack email account password. Happy Email Hacking!

Do you have questions, comments, or suggestions? Feel free to post a comment!

Anonymous Mailer Software to Hack Gmail, Hotmail and Yahoo Passwords



Send anonymous email to Hack Facebook, MySpace, Youtube, Hotmail, Yahoo, Gmail Accont Passwords
Have you ever had the need to send completely anonymous emails to someone? Perhaps you were trying to hack someones email password by sending him a phisher link. Acctually Anonymous Mailer software is very useful in Phishing where you have to send anonymous email to victim and make him login to his account using our sent phisher link.

Anonymous Mailer is an Award winning anonymous Email sending software, by which a user can send Emails directly from computer, no matter the From email id exists or not. No need to reveal your original email address to anyone. Send emails from any@any.com.

So, just follow steps below to be able to send anonymous email using this anonymous mailer software.

Anonymous mailer - Send anonymous email to Hack Facebook, MySpace, Hotmail, Yahoo, Gmail Accont Passwords
1. First of all download Anonymous mailer software from here.
2. Run Nemesis Anonymous Mailer.exe file to see something like this:


3. Now, fill in following information:
  • Name: Name of email account you wan
    t to appear on email.
  • Email From: Email address (fake) which will appear to victim as if email is being sent from this email address.
  • Email To: Victi
    m email address.
  • Subject: Subje
    ct of anonymous email.
  • Message: The body of anonymous email.... include phisher link ove
    r here.
4. Also, this anony
mous mailer software has unique feature of assigning itself proxy while sending email. So, your real IP address is never revealed to victim. For this,
check "Enable Proxy" and enter the proxy server address which you wanna use.

5. Now, hit on "Send" and your email will be se
nd to victim like this:



6. And on opening the
email, victim will fall to our email. As sender email id will be the one we have entered in "Email From" field as shown below:



7. Now, our anonymous
email sent successfully is ready to hack hotmail, yahoo, gmail, facebook, myspace, etc. passwords via this anonymous email.

Note: The software is available as trial version and you can use it only 3 times per computer.

You will be now able to send anonymous email using this anonymous mailer software. Anonymous mailer software is useful in Phishing used to hack email passwords.

Do you have questions, comments, or suggestions? Feel free to post a comment!

Free .exe Icon Changer Tool For Hacking - Hide Keyloggers from Anti-Virus Softwares

Exe Icon Changer software with Icon Package:

1. First of all Download Icon Changer with Icon Package to make keylogger undetectable to antivirus.

2. Now, unzip the file and run "Icon Changer v2.exe" file to see:


3. Simply, select the icon which you wanna use. You can choose your own made or can even select one from Icon package folder provided.

4. After this, browse to the server.exe file whose icon you wanna change and hit on "Open".

5. Now, hit on "Change" and you will find the icon of server file changed.

Note: You don't need to install software. Simply double click on "Icon Changer v2.exe" to get the application.


Why to use Icon Changer?


There are many server trojans which are detected to antiviruses only because of their icons ie icons contain virus signature. So, if there icons are changed, they become UD (UnDetectable) to antiviruses. In such situations, Icon Changer is very handy program or application and works as undetection technique.

Also, Icon Changer helps us in fooling victim by changing icon of binded file (Server Trojan file + Normal software).

Do you have questions, comments, or suggestions? Feel free to post a comment!

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Best Web Hosting