rss
twitter
    Find out what I'm doing, Follow Me :)
Showing posts with label TRICKZ. Show all posts
Showing posts with label TRICKZ. Show all posts

How to Reveal Hidden Passwords (Asterisks) in Web Browsers

How to Reveal Hidden Passwords (Asterisks) in Web Browsers


see+the+passwords+behind+astericks+or+dots
Remember the situation, signing into your account with just a single click because browser is saving all your passwords for you. We know this is convenient but since you’re not typing your passwords any-more, eventually you’ll forget your password in a few days.  For security reasons, the password field in all browsers is masked with “asterisks” which won’t allow any third person (even you) to read the origi-nal typed password. But, what if you want to reveal the string behind the asterisks? There is actually few workaround for revealing the original passwords behind the asterisk and over the entire course of this article we’ll be discussing some known ways to reveal the characters behind the asterisks in different browsers.

Reveal Passwords Behind Asterisks or Dots in Different Web Browsers:

Google Chrome:

Starting off with Google chrome, the easiest way to reveal the original passwords behind the asterisk is using inbuilt Inspect element feature in the browser.
  • You just need to right click on the password field in the browser where you will get an option "Inspect Element". 
  • After clicking on it, "Web Inspector" will open out and there you can see some code which is basically Html code and you just need to replace the "password" word with "text" word and it will reveal the words behind the asterisks.
gmail+login+via+google+chrome
inspect+element+in+google+chrome

There’s another way using JavaScript which is quite quick and easy as compared to above method. Just open a site that allows users to login and after typing the password, just enter the following JavaScript code in the address bar.
Javascript: alert(document.getElementById('Passwd').value);
After entering the above code in the address bar, press enter and it will pop up a window with your password written on it.
reveal+passwords+with+javascript+in+google+chrome

Mozilla Firefox:

The Next most common browser is "Mozilla Firefox".
  • The chrome's "Web Inspector" trick is also applicable in Firefox.
  •  Open a site that asks for login (like Facebook), right click on the password field in the browser where you will get an option "Inspect Element". After clicking on it, "Web Inspector" will open out and there you can see some code which is basically Html code and you just need to replace the "password" word with "text" word and it will reveal the words behind the asterisks as shown in screenshot below.
inspect+element+in+mozilla+firefox+for+facebook
Apart from this, there’s another way which is quite quick and easy as compared to above method. For that you’ve to create a bookmark with the following JavaScript code as URL in it.
javascript:(function(){var s,F,j,f,i;s="";F=document.forms;for(j=0;j<F.length;++j){f=F[j];for(i=0;i<f.length;++i){if(f[i].type.toLowerCase()=="password")s+=f[i].value+"\n";}}if(s)alert("Password is:\n\n"+s);else alert("No passwords");})();
After saving this as a bookmark, open a site that allows users to login and after typing the password, open the saved bookmark by clicking on it and it will pop up a window with your password written on it.
revealing+passwords+behind+asteriks+in+mozilla+firefox

Opera:

Next comes the "Opera" in that you can use "Dragonfly", which is an in built tool, to reveal the words behind the asterisks just like chrome's "Web Inspector". Open a site that asks for login (like
Facebook), right click on the password field in the browser and select "Inspect Element" option. After clicking on it, "Dragon Fly" will open out and you’ll see some code which is basically Html code and you just need to replace the "password" word with "text" word and it will reveal the words behind the asterisks as shown in screen shot below.
inspect+element+in+opera

Internet Explorer:

In the same manner you can apply this trick on Internet explorer. First of all open any site (Gmail in our case) that allows user login. Now for bringing out “developer tools” press thef12 key. A new window will be opened and press Ctrl+B to enable selection of elements. After that go to login page and select the password field, doing this will take you to the password field’s code in developer window (highlighted by yellow). Now, you just need to replace the "password" word with "text" word and it will remove the asterisk mask in the password field, see screenshot below.
inspect+element+for+internet+explorer
Apart from this, there’s another way which is quite quick and easy as compared to above method. Just open a site that allows users to login and after typing the password, just enter the following JavaScript code in the address bar.
alert(document.getElementById('Passwd').value);
After entering the above code in the address bar, press enter and it will pop up a window with your password written on it. (See pic below)
reveal+hidden+passwords+in+internet+explorer+with+javascript

Wrap Up:

Although there are so many tools out there to help you in revealing the words behind the asterisks and to get the saved passwords with in a browser, you still need to keep your system safe and protected by using "Antivirus" plus "Firewall" to avoid stealing of these passwords by someone who have access to your system. If you can use these tools to reveal your saved passwords then others can also use the same ways to get information of yours



courtesy  : alltechnet.buzz 

How to Install and Run Android in PC [Windows and Linux]

How to Install and Run Android in PC [Windows and Linux]


The mobile smartphone and tablet industry seems to have a very prominent divide, with a lot of consumers having their favorite operating system and choosing to stick to hardware which is powered by their chosen OS. Obviously fans of Apple’s iOS use the iPhone and iPad devices, whereas Android lovers have a wide range of hardware to choose from due to the fact that the OS is available to multiple manufacturers.
Here are Some Steps Given to Install Android On Your PC.

Step 1: Install official Oracle VM VirtualBox Go Here & download the relevant VirtualBox binary for your computers operating system (Windows/Mac OS X/Linux/Solaris)

Step 2: Find the saved location of the downloaded VirtualBox and install on your PC by following all screen prompts and instructions.



Step 3: Now Download a copy of Android v4 Ice Cream Sandwich it is of size 88MB so the download may take some time depending on your connection.


Step 4: Locate the downloaded ‘Android-v4.7z‘ file and extract the contents of it.

Step 5: Once the Android-v4.7z file has been opened, locate a file called ‘Android-v4.vbox‘ which can be directly opened in Virtualbox
Step 6: Double click on the Android-v4.vbox file which will load the VirtualBox application and boot up the ICS file.
Step 7: When the boot menu is presented in VirtualBox, press ‘start‘ on the top toolbar and then if required select the ‘Android Startup from /dev/sda‘ option.

Step 8: 
All steps are complete. Android 4.0 ICS should now be booting up allowing you to enjoy that Android in your PC, It just look like a TABLET

Top 12 Android Apps to Turn Your Smartphone into a Hacking Device

Top 12 Android Apps to Turn Your Smartphone into a Hacking Device




 Mobile devices is now very common now a days and mobile devices has changed the way of bi-directional communication. There are many operating system for mobile devices available but the most common and the best operating system for mobile is Android, it is an OS means you can install other applications (software's) on it. InAndroid application usually called apps or android apps.

The risk of hacking by using mobile devices is very common and people are developing and using different apps (application) for their hacking attack. Android has faced different challenges from hacking application and below is the list of application for android hacking.


1. SpoofApp

Here is an app that spies at heart could use – SpoofApp. It allows you to use a fake Caller ID – a number that you are free to specify yourself, in order to protect your privacy or to pull a prank on someone. Sounds like fun, doesn’t it? Well, Apple didn’t think so, which is why it never allowed the app to enter its App Store. Google, however, didn’t mind, which is why SpoofApp was available on the Android Market for about two and a half years. However, it was banned from there last year as it allegedly was in conflict with The Truth in Caller ID Act of 2009.This can be useful in social engineering. 

2. FaceNiff

Requirements: Android 2.1+ (rooted)

Overview: FaceNiff is an Android app that allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to.
It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks (Open/WEP/WPA-PSK/WPA2-PSK). It’s kind of like Firesheep for android. Maybe a bit easier to use (and it works on WPA2!). Please note that if webuser uses SSL this application won’t work.
Legal notice: This application is for educational purposes only. Do not try to use it if it’s not legal in your country. I do not take any responsibility for anything you do using this application. Use at your own risk
  

3. Penetrate Pro

Requirements: Android 2.1+ (rooted)
Overview: The most of the times you scan the Wi-Fi networks available around, they’re protected with key. Penetrate is an app that help you out with that. If the routers of that Wi-Fi networks are encrypted with WEP/WPA it will bring you the keys to access them. This seems a sort of cracking, but the developers says it isn’t, because it’s supposed to get the keys for penetration testing and you should use it only with permission from network owners. Well, apart from those regardings, it does what it says. Check the developer description to know which routers are supported.
Take in account that if you have an antivirus installed in your device, it will warn you about this app. The developer says it’s normal because it’s a security-related tool. Penetrate isn’t a danger for your phone.
This is the paid version (€1.99) that contains no ads, some more features and sponsors further development. What’s more, it allows you to use 3G to get the password instead of using dictionaries that you will have to download in the free version.
Penetrate works properly with the range of routers supported. We’re missing more though. Despite the apparent use for which it was developed this application, we all know the “regular” use. And if you’re looking for it, give it a chance. It’s a great app.

4. Anti-Android Network Toolkit

Requirements: Android 2.1+ (rooted)
Anti-Android Network Toolkit is an app that uses WiFi scanning tools to scan networks. You can scan a network you have the phone connected to or you can scan any other nearby open networks. Security admins can use Anti to test network host vulnerabilities to DoS attacks and other threats.

Download it from here

5. Andosid

AnDOSid is the application which is used for DOS attacks from Android mobile phones.

Download it from here

6. Nmap For Android

Nmap is a network scanner tool which gives the entire information of the ip address and website. There is a version of nmap for Android users too, with the help of this app hackers can scan the ip's through mobiles.
 
Download it from here

7. The Android Network Toolkit

The Android Network Toolkit is an complete tool kit for the pentesters , where hackers can find expolots using the mobile and penetrate or attacks the ip's according to their vunerabilities.

Download it from here
  

8. SSHDroid- Android Secure Shell

Secure shell or SSH is the best protocol that provides an extra layer of security while you are connecting with your remote machine.SSHDroid is a SSH server implementation for Android.
This application will let you to connect to your device from a PC and execute commands (like "terminal" and "adb shell").

10. WiFi Analyzer

WiFi Analyzer is one of the most popular applications in the Android Marketplace, which is really a testament to how wildly useful this tool is for both the average user and the more technically inclined. In the most basic of terms, WiFi Analyzer is a tool to scan the area for WiFi networks and determine which channel is the least populated so you can adjust your own hardware to a less congested part of the spectrum.

Download it from here 

11. ConnectBot

ConnectBot is an exceptionally well done SSH/Telnet client, which also acts as a terminal emulator for the local Linux sub-system. While there are better terminal emulators (though not for free), there is no question that ConnectBot is the absolute best SSH client available for Android. 

Download it from here 

12. Network Discovery

Network Discovery is a handy tool for finding and enumerating devices on public WiFi networks. Network Discovery uses a simple ping scan to find hosts on the network, and then allows the user to select one of the found hosts to target for a TCP connect() scan. 

Download it from here
 
Bonus : dSploit
dSploit is an Android network analysis and penetration suite which aims to offer to IT securityexperts/geeks the most complete and advanced professional toolkit to perform network security assesments on a mobile device. Once dSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing ( with common protocols dissection ), real time traffic manipulation, etc, etc . 

MULTI CAMMANDER EXPLORER PRO


Microsoft Windows Explorer is great for general file management tasks. However, there are several more complicated tasks that Windows Explorer is unable to handle. This is where Multi Commander can come in handy. Multi Commander is a fantastic and free file manager that allows you to manage your files and perform many tasks not possible through Windows Explorer. In the picture, is an example of the Multi Commander interface. As can be seen, the interface is very similar to Windows Explorer with additional features such as multiple panes, tabs, and buttons.

---Some of the many features in Multi Commander---

*Compare the right and left file explorers with each other and show what is different.
*Built using Extension/Plug-in architecture that allows for almost any imaginable feature to be added.
*Easily filter and copy or move only the files specified in the filter.
*Excellent keyboard support for anyone who enjoys keyboard shortcuts or just avoiding the mouse.
*Convert files between Unix (LF), Windows (CRLF), and Mac (CR) format.
*Browse and read files within a RAR without extracting the files.
*Quickly change a file or folder name to all lowercase, all uppercase, or Camel case.
*Browse, update, and modify the system registry.
*Create and verify the MD5 and SFV (CRC32) Checksum of files using the MC-Checksum extension.
*Tab support to have multiple folders open at once.
*Script engine support to create scripts to automate tasks.
*FTP support.
*Save and load a selection of files and folders to memory or to a file.

Download : http://multicommander.com/downloads/
Xen4_H4xt0r

How to get Better Signal Strength on USB Dongles

How to get Better Signal Strength on USB Dongles

radio frequency of a modem is increased when some metallic or Aluminium stuff is near the device,
It attracts the signal and keeps it constant. You will get more powerful network when some aluminium thing like a CD covered with a Aluminum foil is placed near your dongle, Lets see the steps. Take a CD/ DVD, and insert the dongle between its hole and connect the USB extender cable on other side, Now connect the other end of USB cable with your PC and keep or hang your dongle near a window or Open place.
That’s it, bu this way You will notice increased signal strength o which ever operators you are using.
This is quite funny trick but you will notice the difference in your network monitoring status on your data card dashboard. your dongle speed will 100% increase

HOW TO CRACK ANY TYPE OF CD PROTECTION

HOW TO CRACK ANY TYPE OF CD PROTECTION




Using W32Dasm, and HIEW. 

OK, let’s start:
First of all, you have to run the damn game you want to crack, without the CD.
The game, doesn’t work of course, (Please, don’t panic) BUT a window pops up, telling you an error message. 
This error message will help you to crack the game so, you’ve got to remember it.
For example: Please insert the - CD, or: You need the CD to play the - . 
( -, is the game you want to crack). Anyway, if you are so idiot and you can’t remember it, write it, in a little piece of paper.
Now, run Win32Dasm, and on the toolbar, press the first little button on the left, OR, go to Disassembler ->Open file to Disassemble. A menu will pop up. Select the exe which you want to crack. The disassemble, will take few minutes so, I suggest you, to go for shitting.

OK, it finished its process.
Now, in your screen, there is a strange text, and we can’t understand anything of course. Don’t worry, the only thing we have to do, ( If you want, you can change the font), is to click on the String Data References, the button next to the print button (Strn.REF).
You can see a window which is called String Data Items. Scroll down, and try to find the game’s error message. When you’ll find it, double click on it, and then, close the window, to go back to the Win32Dasm text.
As you can see you are somewhere in the CD check routine. This is the message’s place. Now comes the interesting and difficult part, so, be careful.
We don’t know what all these shits mean, BUT we must know the @ offset of every call and jump command.
Write down, every call and jump @ offset number. (You have to be sure, that the OPBAR change its used color to green). You need the number behind the @offset without the h. Let’s go to HIEW, now.

HIEW:
To move up and down, use the cursor keys. Start HIEW. exe.
In the HIEW directory, there is a list of exes and programs. Go to the directory, which you saved the game’s exe, we want to crack, and click on the exe. Click F4, and then, a menu will pop up, with 3 words. Text, Hex, and Decode. Click on Decode, and now, we can understand the list of numbers.
Click F5, and you can now enter the number, we wrote down, in Win32Dasm. Type it, and you will be placed at the number’s place. The cursor is placed on a command.

Before I’ll continue, I want to explain you something. For example, if the command where our cursor is placed on, is E92BF9BF74, means that it is 5 bytes.
Every 2 numbers, are one byte: E9-2B-F9-BF-74 = 90-90-90-90-90. 10 letters, mean, 5 bytes.
OK, if you understood it, you can continue.

Press F3, which means edit, and now you can edit these ten numbers.
Type five times, the number 90. For every byte, 90. Now click on F10 to exit.
We cracked the CD protection

Watch 18+ Videos On Youtube Without Signing In

Watch 18+ Videos On Youtube Without Signing In


Watch 18+ Videos On Youtube Without Signing In
Sometime its annoying when youtube ask you to sign in for your age verification to watch 18+ videos. So i will make it easy for you by showing you a simple youtube trick to watch adult or 18+ youtube videos without signing In. This trick is 100% working as of 2013. So lets get started.

How To Watch 18+ Youtube Videos Without Logging In ?

1. First get the Url of video you want to watch. As shown below.
http://www.youtube.com/watch?v=4Xkh6j7RMqk 
2. Then copy the Video Id. For above link video Id is 4Xkh6j7RMqk
3. Now paste the Video Id in the link given below.
http://www.youtube.com/v/VideoId?fs=1
  • Replace VideoId with the Id you copied in Step 2
4. Now the url will become as shown below.
http://www.youtube.com/v/4Xkh6j7RMqk?fs=1
5. Done.

How to Hack Softwares to use them Lifetime


How to Hack Softwares to use them Lifetime  






Hi, I am back today with a most usefull article..Hope all of you will Like It ! Here i will show you that "How to Hack Softwares to use them Forever ?" . That really a useful article,because in our daily life we need thousand of softwares today,which of most are highly paid..So how to use them Freely for whole Like ??

Most of us are familiar with many softwares that run only for a specified period of time in the trial mode.Once the trial period is expired these softwares stop functioning and demand for a purchase.But there is a way to run the softwares and make them function beyond the trial period. Isn’t this interesting?

Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares.I’ll try to explain this in brief.Because Purpose if ICA is 1st to clear your basics.So,When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc.After installation every time you run the software, it compares the current system date and time with the installed date and time.So, with this it can make out whether the trial period is expired or not.

So with this being the case, just manually changing the system date to an earlier date will not solve the problem.For this purpose there is a small Tool known as RunAsDate.

RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.



Download RunAsDate v1.10

Intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify.It works with Windows 2000, XP, 2003 and Vista.

NOTE: FOLLOW THESE TIPS CAREFULLY
You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.
1. Note down the date and time, when you install the software for the first time.
2. Once the trial period expires, you must always run the software using RunAsDate .
3. After the trial period is expired, do not run the software(program) directly.If you run the software directly even once, this hack may no longer work.
4. It is better and safe to inject the date of the last day in the trial period.

RECORD MOUSE POSTIONS AND REPLAY MOVEMENTS AND ACTIONS


RECORD MOUSE POSTIONS AND REPLAY MOVEMENTS AND ACTIONS

Now its really possible to record mouse positions, which allow you to replay movements and actions even in your absence. For this you need to download one utility software named Auto Mouse Move.

Auto mouse move is free software utility which record the mouse positions one by one as you move the mouse, and it can replay all the movements and actions (single click, double click, no action).

You can save the coordinate of the mouse pointer and the action you want (single click, double click, no action) and can start the program so that it can simulate as if there is a human sitting behind the computer. It will relieve you from many manual and daunting tasks. It can also save the records to a file so that you will not have to reenter the actions again and again.

Auto mouse move is freely available on internet. Its very easy to use, you can also prank your friends by using this..


Click here to Download

CuteFTP 9 Full Version (with Patch Crack) free download!!


CuteFTP 9 Full Version (with Patch Crack) free download!!


The following are the key features of CuteFTP
* Comprehensive protocol options, including FTPS SSL, HTTPS SSL, Secure Shell SSH
* OpenPGP encryption, One Time Password authentication protocol, and Password Manager
* Schedule fast, fully automated transfers
* Safely backup or synchronize your sites
* Easily monitor local folders for changes
* Create labor and time saving scripts and macros
* Create podcast RSS feeds and manage audio files
* Connect to new sites in a snap with step by step wizards
* Painlessly edit remote documents with a built in editor
* Drag and drop files for fast and easy movement – up to 100 concurrent transfers
* View thumbnails of remote images
* Securely work with multiple remote sites at one time

---OS Supports---
Windows XP, Windows Server 2003, Windows Server 2008 R2, Windows Vista, Windows 7, and Windows 8

Here you can download CuteFTP 9 Full Version at free of cost..
Click the link below:- (With Crack)

Keep coming for more free stuffs.. Don't forget to leave your comments..
Thank you:)

Reset your Forgotten Password using Windows


Reset your Forgotten Password using Windows



Reset your Forgotten Password.

REQUIREMENTS :
1. Windows Installation Disk.
2. A simple Command Line.

Follow Below Simple Steps :

Step 1: Insert Your windows disk And Boot Your Pc.

Step 2:  Select " Repair Your Computer " From the lover Left Corner. Check the below Pic.



Step 3: Follow on Till you get the below screen , You need to click on Command Promt.



Step 4: Now The Real Trick,Type The below Command to backup the original Sticky keys File. 
copy c:\windows\system32\sethc.exe c:\


Step 5: Now Copy The Command Prompt Executable on top of the sticky keys executable :


copy c:\windows\system32\cmd.exe c:\windows\system32\sethc.exe


Follow The below Pic For More Idea on It.




Step 6: Now Reboot Your PC.

Step 7: After Rebooting your pc, You will see a login Screen, All You need to do is Hit Shift Key 5 Times, You will get a Command Promt.

Step 8 : Now to Reset Your Password just replace The Username and passoword with your own In Below line.

net user Freak MyNewPassword



Thats all Now you can Login.

you probably want to put the original sethc.exe file Back, Then You have to just reboot into the installation CD, Open the Command Promt Again and Copy The c:\sethc.exe file back to 
c:\windows\system32\sethc.exe.










REQUIREMENTS :

1. Windows Installation Disk.

2. A simple Command Line.


Follow Below Simple Steps :

Step 1: Insert Your windows disk And Boot Your Pc.


Step 2: Select " Repair Your Computer " From the lover Left Corner. Check the below Pic.



Step 3: Follow on Till you get the below screen , You need to click on Command Promt.



Step 4: Now The Real Trick,Type The below Command to backup the original Sticky keys File.
copy c:\windows\system32\sethc.exe c:\


Step 5: Now Copy The Command Prompt Executable on top of the sticky keys executable :


copy c:\windows\system32\cmd.exe c:\windows\system32\sethc.exe


Follow The below Pic For More Idea on It.




Step 6: Now Reboot Your PC.


Step 7: After Rebooting your pc, You will see a login Screen, All You need to do is Hit Shift Key 5 Times, You will get a Command Promt.


Step 8 : Now to Reset Your Password just replace The Username and passoword with your own In Below line.

net user Freak MyNewPassword



Thats all Now you can Login.

you probably want to put the original sethc.exe file Back, Then You have to just reboot into the installation CD, Open the Command Promt Again and Copy The c:\sethc.exe file back to
c:\windows\system32\sethc.exe

free download Dos Attacking tool | LOIC 1.0.4

DOS ATTACKING TOOL 


If you want to attack on a website by Denial of service attack and you are in search of a tool which can help you in this. Today i have a tool which performs a denial-of-service (DoS) attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP packets, UDP packets, or HTTP requests with the intention of disrupting the service of a particular host. People have used LOIC to join voluntary botnets.
LOIC basically turns your computer's network connection into a firehose of garbage requests, directed towards a target web server. On its own, one computer rarely generates enough TCP, UDP, or HTTP requests at once to overwhelm a web server—garbage requests can easily ignored while legit requests for web pages are responded to as normal. But when thousands of users run LOIC at once, the wave of requests become overwhelming, often shutting a web server (or one of its connected machines, like a database server) down completely, or preventing legitimate requests from being answered. this is a nice tool to perform dos or ddos attack but try it on your own risk. It has no ability to hide your IP address. So attacking on a website may cause a trouble for you.