Saturday, 9 January 2016

Password Hacking Tips

                      Password Hacking Tips

--------------------------------------------------------------------------------------------------------------------

Password Hacking Tips and Tricks

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :
1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even ‘well-chosen’ passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.
Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.
2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user’s personal information.
Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:
* blank (none)
* the word “password”, “passcode”, “admin” and their derivatives
* the user’s name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet’s name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard — qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on….
In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.
A password containing both uppercase & lowercase characters, numbers and special characters too; is a strong password and can never be guessed.
Check Your Password Strength
3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications isavailable on the internet.
Always disable or change the applications’ (both online and offline) default username-password pairs.
4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.
Long is the password, large is the time taken to brute force it.
5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on “enter” or “login” login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.
Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.
It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.

Folder Lock Without Software

          Folder Lock Without Software

-------------------------------------------------------------------------------------------------------------

Folder Lock With Password Without Any Software

Folder Lock Without Software – Paste the code given below in notepad file and ‘Save’ it as batch file (with extension ‘.bat’). Any name will do.
Then you see a batch file. Double click on this batch file to create a folder lock program.
New folder named ‘Locker’ would be formed at the same location.
Now bring all the files you want to hide in the ‘Locker’ folder. Double click on the batch file to lock the folder namely ‘Locker’.
If you want to unlock your files,double click the batch file again and you would be prompted for password.
Enter the password and enjoy access to the folder.
if EXIST “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p “cho=>”
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
attrib +h +s “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p “pass=>”
if NOT %pass%==type your password here goto FAIL
attrib -h -s “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
ren “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

Recent Search on Folder Lock Without Software

Folder Lock Without Software, folder lock without software in window xp, folder lock without software window 7, folder lock without software with password, how to lock folder in windows 7 without any software, how to create folder lock without software, folder lock free download, how to lock folder in vista without software, how to lock your folder without a software, folder lock software, folder lock free, folder lock serial key, latest folder lock software free, new folder lock software


How to Track a Cell Phone

       How to Track a Cell Phone

--------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------
Are You Looking to Track a Cell Phone Location?
Relax, Here is a Complete Cell Phone Tracking Guide!
Are you looking to know how to track a cell phone with pin point accuracy? Do you need to exactly know where your child or employees are moving around during your absence? If so you have come to the right place. In this article I will let you know some of the possible methods to GPS track a cell phone in simple steps.

1. How to Track a Cell Phone that Belongs to Someone Else?

If you need to track someone else’s phone such as your children or employees, you can simply use a cell phone tracking app such as mSpy. This is a very small app that can be installed in just a few simple steps and takes only 2-3 minutes to complete. Once installed the app stays hidden on the phone but keeps track of every activity on the phone including its GPS location, Call Logs, Text Messages and more.
Track a Cell Phone with mSpy
mSpy Features:
  • GPS Location Tracking: GPS positions are uploaded at a time interval you select with a link to the map.
  • Track Text Messages & Emails: Every text message sent and received including SMS and emails are logged even if the phone logs are deleted.
  • Call Logs: Each incoming and outgoing number on the phone is logged along with duration, date and time stamp.
  • Phone Contacts: Get access to complete contact list on the target phone.
  • Browser History: All websites visited on the phone are logged.
  • Social Networking & Messenger Activity: All social media activity such as Facebook, Twitter, LinkedIn, WhatsApp, Skype, iMessages, Instagram and many more are recorded.

How it Works?

You will have to download and install the app onto the target phone of whose location and activities you want to track. Installation takes only a few minutes during which you should have the target phone in your hand.
Once the installation is complete, the tracking process will begin immediately and the recorded logs are silently uploaded to your mSpy account. You can login to your secure online account from your computer or phone at any time to view the logs containing GPS location, Call activities Text Messages and more. You can download mSpy from the link below:

Supported Phones: Android, iPhone, iPad and Tablets.

2. Tracking a Lost phone

Now, let us look at some of the possible options to track a phone in case if it is lost or stolen.

For Android Phones:

If you need to track a lost android phone, you can follow the steps mentioned below:
  1. Download Android Device Manager from Google play store and install it on another android device. This app lets you track your stolen android phone and also lets to remotely lock or erase all the data on it.
  2. Android Device Manager
  3. From “Android Device Manager” log into your Google account using the same ID associated with your lost phone. After successful login this app will attempt to locate your device and show its last known location on the map.
  4. In addition, you will also be able to perform several actions on your lost phone such as give a RingLock the device or Erase all the data stored on it.

For Apple iPhones:

If you need to track a lost iPhone, you can follow the steps mentioned below:
  1. Login to the iCould Website using an Apple ID associated with your lost phone. Since location tracking is turned on by default on all iPhone devices, iCould lets you track it from your web browser or your iPad and shows its location on the map.
  2. iColud Website
  3. If your phone is found nearby to your location you have an option to Play Sound on it so that your iPhone will emit a sound, helping you track it down.
  4. If this does not help, you can choose the option Lost Mode which will remotely lock your phone down and display a phone number that can be reached at.
  5. If none of the above options work, you can finally decide to go with the option Erase iPhone which will completely wipe out all the data stored on it. This way you can prevent your private information from falling into the wrong hands.

For Windows Phones:

In order to track down a lost Windows phone, you can try the below mentioned steps:
  1. Go to Windows Phone Website and locate the option Find My Phone on the top-right corner of the page.
  2. Track Windows Phone
  3. This will ask you to sign-in using your Windows account associated with your lost phone. If your phone gets traced you will see a map showing its exact location. You will also find options to LockRing and Erase its data in case if your phone is found to be completely lost.
Track Phone Location

How to Hack WhatsApp Account



  How to Hack WhatsApp Account

Need to Hack WhatsApp Account?
Below is a WhatsApp Hack Guide with Complete Instructions!
Learn how to hack WhatsApp in simple steps with the following easy to follow and foolproof tutorial. Since WhatsApp has become one of the popular app to share messages and media instantly, it has also become a favorite place for many to engage in illicit activities. Therefore, in order to investigate the truth people are left with no choice other than to hack WhatsApp account.

Possible Ways to Hack WhatsApp

The following are the only two ways to hack WhatsApp account:

1. WhatsApp Hack using a Spying App: The Easiest Way

Even though there are several ways to hack WhatsApp, using a spy app is by far the most simple and easiest way. This method requires no prior hacking knowledge or technical skills to carry out and hence more suitable for common people. Installing a spy app to hack WhatsApp is as simple as installing any other app on mobile. Out of several apps out there, mSpy is one of my favorite one to hack WhatsApp:
WhatsApp Hack with mSpy
mSpy Features:
  • Hack phone Calls and Text Messages.
  • Hack WhatsApp, Skype and other popular messengers.
  • Track Real-Time Location with GPS Tracker.
  • Spy on Contact List and Web Browsing activities.
  • Monitor Emails, Pictures and Videos.
  • Operates in Hidden Mode and remains Undetected!
  • No Rooting Required!

How to Hack WhatsApp with this App?

  1. Download and Install the app on to the target phone which takes not more than a minute.
  2. After this is done, the app silently records all WhatsApp activities in hidden mode.
  3. All the recorded WhatsApp chat is sent to your online account.
  4. View all the information from anywhere at anytime with your online account.
You can download mSpy from the link below:
Compatiblity: Android, Apple iPhone, BlackBerry and Windows Mobile.

2. WhatsApp Hack by Spoofing Mac Address: The Tough Way

There is another method to hack WhatsApp known as Mac address spoofing which involves spoofing the Mac address of the target phone on your own phone. Unlike using spy apps, this one is somewhat time consuming and requires technical skills to implement. To spoof the Mac of the target WhatsApp phone address, follow the below mentioned steps:
  1. Find out the Mac address of the target phone on which you need to hack WhatsApp account:
    • For Android – Navigate to Settings —> About Device —> Status—> Wi-Fi MAC address
    • For iPhone – Navigate to Settings—> General —> About —> Wi-Fi address
  2. Once you’ve the Mac address of the target WHatsApp phone, you can spoof the Mac address as mentioned in my post: How to Spoof the MAC address.
  3. Next, install WhatsApp on your phone using the target phone number and verify it.
  4. Now, you’ve an exact replica of the target WhatsApp account and you should receive all the conversation and updates on your phone as well.
This method of WhatsApp hacking is quite time consuming and is known to have less success rate when compared to the method of using the spy apps. Therefore, if you are someone who does not have sufficient time and skills to implement this, I still recommend the use of mSPy to successfully hack WhatsApp account.
Hack-Watsapp















Mobile Bluetooth Hacking

Photobucket


Mobile Bluetooth Hacking:

Here is a list of what you can do when you have hacked the other phone. Have Fun!
  • Read Messages. (They are no more personal!)
  • Read Contacts. (Check your lover’s phonebook to see what name he/she has saved your name. Hey, please don’t suicide when you see he/she has saved your number as lover no. 9! HeHe)
  • Change Profile (Change the other’s profile to silent mode when you are on a date!)
  • Play Ringtone even if the phone is silent (Annoy your classmates!)
  • Play songs from the hacked phone in the same phone.
  • Restart the phone (Show some magic to your friends!)
  • Switch off the phone (Ultimate thing that you can do!)
  • Restore Factory Settings (Do this to the most organized one and run away quickly!)
  • Change Ringing Volume (You have enough experience how to use it. Don’t you?)


Follow these steps to hack any Bluetooth enabled mobile phone.


  1. Download Super Bluetooth Hack 1.8 and also check that your mobile is in the list of supported handsets from the link provided. After you have downloaded the .jar file, install it in your mobile.
  2. There is no need to install the software in the mobile which you want to hack.
  3. Turn on the Bluetooth of your handset and open the Super Bluetooth Hack Application.
  4. Select the connect option and then Inquiry Devices to search for any of mobile that has its Bluetooth turned on nearby.
  5. Your friend’s Bluetooth must also be turned on to be found. Pairing between the devices is also necessary sometimes.
  6. Once your friend’s phone has been found, try out its functions!

Automatic login to website-2


I want to Create a button once i click it The user canlogin automatically login certain website like "Facebook" by stored user name and password in text file 

I make search and came up with this simple code but it not work!!

can any one Explain the problem!!



------------------------------------------------------------------------------------------------------------------



<pre lang="c#">
 
private void button2_Click(object sender, EventArgs e)
  {
     System.Diagnostics.Process.Start("http://www.facebook.com/");
 
     int flag = 1;
 
     while (flag == 1)
 
     {
 

       SendKeys.Send("Username.Txt");
 
       SendKeys.Send("{TAB}");
 
       SendKeys.Send("Password.Txt");
 
       SendKeys.Send("{TAB}");
 
       SendKeys.Send("{ENTER}");
 
       flag = flag + 1;
 
     }
 
 
}

automatic login on websites

This is a script for automatic login on websites using the Internet Explorer

#include <IE.au3>

$Url = 'http://www.autoitscript.com/forum/index.php?app=core&module=global&section=login'
$User = 'user'
$Pwd = 'pwd'

$test = _IEAutoLogin($Url, $User, $Pwd)

Func _IEAutoLogin($sUrl, $sUsername, $sPwd)
 ;funkey 09.09.09
 $oIE = _IECreate($sUrl)
 _IEErrorNotify(False)
 _IEErrorHandlerRegister()
 $oForms = _IEFormGetCollection($oIE)
 If @error Then
  Return SetError(1, _IEErrorHandlerDeRegister(), $oIE) ;'no forms --> no login'
 Else
  $Index = 0
  For $oForm In $oForms
   $oFormElements = _IEFormElementGetCollection($oForm)
   If IsObj($oFormElements) Then
    $IndexElement = 0
    For $oElement In $oFormElements
     If $oElement.Type = 'password' Then
      $oPwd = _IEFormElementGetObjByName($oForm, $oElement.Name)
      _IEFormElementSetValue($oPwd, $sPwd)
      For $i = $IndexElement - 1 To 0 Step -1
       $oUser = _IEFormElementGetCollection($oForm, $i)
       If $oUser.Type = 'text' Then
        _IEFormElementSetValue($oUser, $sUsername)
        ExitLoop
       EndIf
      Next
      If $oForm.action <> "0" And Not StringInStr($oForm.action, '.php') Then  ;submit
       _IEFormSubmit($oForm, 0)
       _IELoadWait($oIE)
      Else  ;click
       For $i = $IndexElement + 1 To $IndexElement + 10 ;check the next 10 elements
        $oButton = _IEFormElementGetCollection($oForm, $i)
        If $oButton.Type = 'submit' Then
         _IEAction($oButton, "click")
         ExitLoop
        EndIf
       Next
      EndIf
      Return SetExtended(_IEErrorHandlerDeRegister(), $oIE)
     EndIf
     $IndexElement += 1
    Next
   EndIf
   $Index += 1
  Next
 EndIf
 Return SetError(2, _IEErrorHandlerDeRegister(), $oIE) ;no password-field found
EndFunc   ;==>_IEAutoLogin

Automatic HTML Login using POST Method

What if  you want to login to a website by filling Username/Email and Passwordautomatically? Well, there is a simple solution to that. This solution works for large number of web sites which have a login and password field contained within a form.




<HTML>
<HEAD>
<TITLE>Crunchify Login</TITLE>
<script>
    function loginForm() {
        document.myform.action = "http://cdn.crunchify.com/wp-content/uploads/code/Crunchify-LoginPage.html";
        document.myform.submit();
    }
</script>
</HEAD>
<BODY onLoad="loginForm()">
    <FORM NAME="myform" METHOD="POST">
        <INPUT TYPE="hidden" NAME="email" VALUE="myemail@crunchify.com">
        <INPUT TYPE="hidden" NAME="password" VALUE="mypassw@rd">
    </FORM>
</BODY>
</HTML>


In order for you to fill above fields automatically just create one sample file Crunchify.html  file on your Desktop or convenient location and put below content.