rss
twitter
    Find out what I'm doing, Follow Me :)

ANKIT FADIA E- BOOKS

HACKING E-BOOKS

            This are a full collection of ankit fadias ebooks which includes almost all his ebooks if u like it then download it from below link. Some of Ebooks included are DOS attack,hacking into linux, Defacing websites  etc. Below is the screen shots of the all books included in download. For such more ebooks and tutorials subscribe below.







      Note: Password for the rar file is tricks4u



Secretz of a hacket

SECRETS OF A HACKER



                  Secrets of Super Hacker is the most amazing book ever published oncomputer hackingStep by step illustrated details on the techniques used by hackers to get your data including Guessing Passwords, Stealing Passwords,Password Lists, Social Engineering,Reverse Social Engineering,Crashing Electronic Bulletin Boards,Dummy Screens, Fake E-mail,Trojan Horses, Viruses, Worms,Trap Doors, And Much more. Anyone concerned with computer security and data privacy needs to read this book.

     NOTE : Password for the rar file is tricks4u


How to add your blog to your facebook page

How to add your blog to your facebook page
















This post is about how you can add your blog to your facebook page using a facebook app called " networkedblogs ". Networked blog is a facebook app which is used by many blogger's to permote there blog at facebook. When you will add your blog to your fan page using networked blog it will automatically shared in you page under your Blog tab.

Now how you can add your blog to your facebook page:-

  • After clicking on " Register a Blog " This window will open now copy your blog link and paste it in the box .



  • Now fill all the required information

    After filling all the required info click on:- Next













  • After clicking next you will be asked whether you author of the blog or not? click on YES

  • Then you will be asked for confirmation (confirmation for that you are the owner of blog orwebsite)for confirmation you have two options click on 2nd option . 
    • Ask friends to confirm you( instruction about 1st option mentioned in video at bottom of this post)
    • Or, install the widget ( CLICK ON THIS OPTION, RECOMMENDED,EASY TO FOLLOW )
Click on:- Or, install the widget

  • Copy the Option 1 code then login to you blog if not already->goto layout->add a gadget->html. and paste code->save arragements   


  • Now come back to Networked blog window and click on Verify Now




  • Now goto your FACEBOOK FAN PAGE where you added the BLOG and click on Blog->Edit tab->and tick your blog->click on save changes


stegnograghy, an art of encyption

How To Hide Secret Files Inside Photos Using Winrar

Hiding secret files inside photos is example of Steganography. Ever heard of Steganography !!! Well for those who haven’t it simply an art of hiding secret files in plain form in so that only the reciptent knows thats its there

Uses of Steganography :

1. You can upload these photos on facebook , twitter , or via email  and circulate your msg .
2. You can hide all your secret data inside the photos in your computer and no one will come to know , even if they sees the photos.
3. You can pass secret msg to your friends very easily, without getting any attention. this can be done by encrypting the msg also but then it will arouse suspicion.
You will need compression software like winrar or 7zip. Here i will be using winrar . Just Google it and you can easily get it for free.

Steps to hide secret files inside photos:

Before we start Make sure that photos and text file both are in the same folder and install winrar if haven’t install it yet.
1. Now select all of the files that you want to hide (not the photo), right-click on them, and choose the option to add to archive and name it secret.
2. Now you will get a compressed archive of name secret.rar.
hide secret files inside photos
3. Open your command prompt , change directory to folder where  your files are stored using cd command. if you are new to command prompt check out how to use command prompt for bigginners .
4.Now type the following command:
copy /b photo.jpg + secret.rar secret.jpg.
5.  Once you hit enter you should get a output like this and a new photo name secret.jpg.

And that’s it! The picture file will have been updated with the compressed archive inside!

How to read secret files inside photos:

You can access your hidden file in two ways.
First is simple just change the extension to .RAR and open the file using WinRAR.
Second, open winrar >> file >> open archive and then select secret.jpg. Either way, you’ll see your hidden files show up that you can then extract out.


Note: Keep in mind that size of the picture will be increased by the same amount as the size of the archive.

I will recommend you to use .jpg format only for picture in which you are going to hide secret files. If you don’t know how to change format you can check out this how to change format of any image to jpg.

How To (Un)Lock Your PC By Being Nearby (With a Bluetooth Phone

How To (Un)Lock Your PC By Being Nearby (With a Bluetooth Phone)

banner-01

Imagine: you walk into your room, sit in front of your computer, and it unlocks itself. You finish what you’re doing, walk away, and it locks itself. No, it’s not magic – it’s Bluetooth and it’s easy to set up!

What You’ll Need

  • A computer with a Bluetooth connection
  • A phone or other device that can connect via Bluetooth
  • Either the Microsoft or WIDCOMM Bluetooth stack (for Windows)
  • Appropriate software

Essentially, you’ll have to pair your device with your computer so that the computer can recognize its MAC address, and allow both the computer and your phone to be “discoverable.” Then, the respective software for each operating system should take over from there, locking the computer. Each method should use the OS’s default locking mechanism, no fake proprietary garbage here. Additionally, you should be able to use any kind of device that will connect via Bluetooth. I’ve only used smartphones – an iPhone 4 and a Droid X – so I know they work for sure, but there are various reports online of success on OS X and Linux with Wii remotes and other devices.

The Windows software, BTProximity, only works with the Microsoft and WIDCOMM Bluetooth stacks. On OS X, you need to have Proximity installed and configured to get this trick to work, but the actually execution is done by AppleScripts that you can find on the internet. If you don’t mind paying some money, Rohos Logon Key can use Bluetooth as well as USB drives to accomplish the same task, though it’s a little steep at $32 for a personal license. They also have an OS X version. The Linux software BlueProximity seems to offer the best package. You can tweak your settings a little bit better and it has support for distance approximation, too.
We’ll be doing a step-by-step guide for Windows, but it shouldn’t be too hard to figure this out on OS X or Linux. The same basic steps should apply.

Configuring BTProximity

Make sure you Bluetooth stack is running and your device is paired properly.
After you download and install BTProximity, it should be running automatically. If not, find it in the Start menu.

Right-click the icon in the system tray and select “Configure…”

You’ll see the main window pop up.

The first thing you should do is click the “Install Unlock” button. Not doing this will still allow your computer to lock itself when you leave, but it won’t unlock when you get back automatically. You’ll see a little pop-up message when it installs successfully.

Click OK and then click the “Manage Credentials” link in the Configuration window.

You can type in your username and password, and select whether or not to remember it. Since I’m using this at home, I’m not too worried about security, so I checked that option. Click OK.
To choose your device, click on the “Select…” button in the Configuration window. My computer’s Bluetooth device had some problems finding things this way, so I manually typed in the MAC address of my phone in the field. This worked for me without any problems.

You can change the polling time from the default of 90 seconds. If you decrease this too much, your battery may not last as long, so remember that.
Be sure to check the “Lock when device goes out of range” box, and adjust the number of attempts accordingly. Devices that cut out sometimes may need a higher amount of connection attempts before the computer locks.
Next, check “Unlock when device comes into range”. The “Fask Unlock” option will allow your computer to unlock as soon as the MAC address of your phone is seen.

That’s it! Keep in mind that Bluetooth distances can vary depending on your surroundings. As such, it works very well for me at home – when I leave the room the computer locks, and when I enter again it unlocks. If you’re having issues, you may want to uncheck “Secure (Ignore unpaired devices)” in the Configuration window.

This a pretty simple setup that works pretty well for home use. I can automatically unlock my computer when I’m in any given room so long as I have my device’s Bluetooth connection on. Do you have a better way to log in? Have you thought of a better use for a simple trick like this? Share your thoughts in the comments!

Bump Your Desktop Into 3D With BumpTop



Bump Your Desktop Into 3D With BumpTop

Your desktop doesn’t have to be a boring graveyard for lost and forgotten files anymore! 
Transform it with BumpTop into 3D desktop that help you keep organized. Like a real desk.
 Create the desktop that suits your needs and style.
There’s nothing about the installation, you just keep on pressing “Forward” and you are done.
 When you launch BumpTop for the first time, you’ll be taken in tutorial to show you how to use
 BumpTop efficiently, it doesn’t last more than a minute so make sure you watch it.

Features:

Right after the tutorial you’ll see you shiny new 3D desktop. Let’s start using the new desktop
 by learning  some basics.

Right-Click Options:

You right-click menu is now replaced by BumTop’s menu, but you can still access your normal 
menu by choosing more.

Piles:

You can make piles of files, photos and folders just like how you do in real life. 
You can do this by selecting them and drag across the pile icon that appears without letting go
 of the mouse as described below:

Walls:

You can pin stuff to the walls, like photo frames or TO-DO notes and when you want to have
 better view of the wall, simply double-click it.

Setting Window:

BumpTop comes with plenty of setting you can choose from including the infinite desktop
 mode that allows you to have no boundaries or fixed size for your desktop.

Themes:

The best thing in BumpTop is you can customize it with themes.
 It makes you feel like you are in a different room or went to somewhere else!
 You can download themes or you can create your own room.



hack with dorks( camera view )





How to Use Google Dorks For Hacking

What is Googledorks?


The  term  “googledork” was coined by Johnny Long  (http://johnny.ihackstuff.com) and
originally meant “An inept or foolish person as revealed by Google.” After a great deal of
media attention,  the  term came  to describe  those  “who  troll  the  Internet  for confidential
goods.” Either  term is fine, really. What matters is  that the term googledork conveys  the
concept  that sensitive stuff  is on  the web, and Google can help you  find  it. The official
googledorks page (found at http://johnny.ihackstuff.com/googledorks) lists many different
examples  of  unbelievable  things  that  have  been  dug  up  through  Google  by  the
maintainer of  the page, Johnny Long. Each  listing shows  the Google search required  to
find  the  information along with a description of why  the data  found on each page  is so
interesting.

             Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google.

1. Hacking Security Cameras

There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. All you have to do is use the following search query in Google. Type in Google search box exactly as follows and hit enter
inurl:”viewerframe?mode=motion”
Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls.
you now have access to the Live cameras which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really a less refresh rate. But there are other search queries through which you can gain access to other cameras which have faster refresh rates. So to access them just use the following search query.

intitle:”Live View / – AXIS”


inurl:/view.shtml

or

intitle:”Live View / – AXIS” | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:”live view” intitle:axis
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / – AXIS”
intitle:”Live View / – AXIS 206M”
intitle:”Live View / – AXIS 206W”
intitle:”Live View / – AXIS 210?
inurl:indexFrame.shtml Axis
inurl:”MultiCameraFrame?Mode=Motion”
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intext:”MOBOTIX M1? intext:”Open Menu”
intext:”MOBOTIX M10? intext:”Open Menu”
intext:”MOBOTIX D10? intext:”Open Menu”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1?
intitle:”sony network camera snc-m1?
site:.viewnetcam.com -www.viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image”
intitle:”i-Catcher Console – Web Monitor” 



Click on any of the search results to access a different set of live cameras. Thus you have hacked Security Cameras using Google.

2. Hacking Personal and Confidential Documents

Using Google it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their Address, Phone, DOB, Education, Work experience etc. can be found just in seconds.

intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”

You can gain access to a list of .xls (excel documents) which contain contact details including email addresses of large group of people. To do so type the following search query and hit enter.
filetype:xls inurl:”email.xls”
Also it’s possible to gain access to documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query
intitle:index.of finances.xls

3. Hacking Google to gain access to Free Stuffs

Ever wondered how to hack Google for free music or ebooks. Well here is a way to do that. To download free music just enter the following query on google search box and hit enter.

“?intitle:index.of?mp3 avril“

Now you’ll gain access to the whole index of eminem album where in you can download the songs of your choice. Instead of eminem you can subtitute the name of your favorite album. To search for the ebooks all you have to do is replace “eminem” with your favorite book name. Also replace “mp3″ with “pdf” or “zip” or “rar”.



4. Finding various stuffs for free

For Example we can find:
Credit Card Numbers
Passwords
Software / MP3′s
…… (and on and on and on) Presented below is just a sample of interesting searches that we can send to google to obtain info that some people might not want us having.. After you get a taste using some of these, try your own crafted searches to find info that you would be interested in.
Try a few of these searches:
intitle:”Index of” passwords modified
allinurl:authuserfile.txt
“access denied for user” “using password”
“A syntax error has occurred” filetype:ihtml
allinurl: admin mdb
“ORA-00921: unexpected end of SQL command”
inurl:passlist.txt
“Index of /backup”
“Chatologica MetaSearch” “stack tracking:”
Amex Numbers: 300000000000000..399999999999999
MC Numbers: 5178000000000000..5178999999999999
“parent directory ” /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
“parent directory ” DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
“parent directory “Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
“parent directory ” Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
“parent directory ” MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
“parent directory ” Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
Notice that I am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.

5.SEARCH FOR FREE MP3


put this string in google search:

You only need add the name of the song/artist/singer.

Example: ?intitle:index.of? mp3 avril lavigne


6.FINDING PASSWORDS AND OTHER STUFFS


put this string in google search:

You can change the string to watever you want, ex. microsoft to adobe, iso to zip etc…



Frontpage passwords.. very nice clean search results listing !!






This is a query to get inline passwords from search engines (not just Google), you must type in the query followed with the the domain name without the .com or .net

Another way is by just typing
This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.
Not all of these pages are administrator’s access databases containing usernames, passwords and other sensitive information, but many are!
DCForum’s password file. This file gives a list of (crackable) passwords, usernames and email addresses for DCForum and for DCShop (a shopping cart program(!!!). Some lists are bigger than others, all are fun, and all belong to googledorks. =)
This search brings up sites with “config.php” files. To skip the technical discussion, this configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database.
eggdrop filetype:user user These are eggdrop config files. Avoiding a full-blown descussion about eggdrops and IRC bots, suffice it to say that this file contains usernames and passwords for IRC users.
intitle:index.of.etc This search gets you access to the etc directory, where many many many types of password files can be found. This link is not as reliable, but crawling etc directories can be really fun!
filetype:bak inurl:”htaccess|passwd|shadow|htusers” This will search for backup files (*.bak) created by some editors or even by the administrator himself (before activating a new version). Every attacker knows that changing the extenstion of a file on a webserver can have ugly consequences.
Let’s pretend you need a serial number for windows xp pro.
In the google search bar type in just like this – “Windows XP Professional” 94FBR
the key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of ‘fake’ porn sites that trick you.
or if you want to find the serial for winzip 8.1 – “Winzip 8.1″ 94FBR

I have shown you this info to let you know that there is a real risk putting your info online. If you do want to buy stuff online make sure the site you are using is secure normally if a site is secure you will see a pop up saying you are now entering a secure part of the site or a symbal of a padlock at the bottom of your browser or just use pay pal, pay pal is very safe to use. But most of the time just use common sense if a site looks cheap it normally hasn’t got the protection to keep your info safe. 

7.Crash a Computer using Flash and Google

Open up a new flash document. Open up the Actions panel for the stage of the first frame. If it’s in Actionscript 2, write the following:

onEnterFrame = function () {
getURL(“http://www.google.com”, “_blank”);
}
Or if it’s actionscript 3 write the following:

function openGoogle(e:Event):void {
navigateToURL(“http://www.google.com”, “_blank”);
}
stage.addEventListener(Event.ENTER_FRAME, openGoogle);

Press Control-Enter when you’re ready to crash your computer. What this does is repeatedly open up new tabs of Google. But it opens so many Google tabs every second that after maybe 20-30 seconds your computer will barely be able to respond to you mouse clicks or even mouse movements. Usually, any attempt to stop it will result in processing overload and cause the computer to freeze. The only real way to stop this is to force-quit BOTH flash.exe and iexplorer.exe. Some teachers may know enough to do this, but might accidentally close explorer.exe        credit goes to Johnny Long...thnx to Mr. Long