Menu

Hack A Facebook Account By Phishing

Phishing is the act of fooling a computer user into submitting personal information by creating a counterfeit website that looks like a real (and trusted) site. It is a hacker technique of "fishing" for passwords and other secret financial info.                          So now i am starting to show you how to hack someone by phishing... 1). Go to Facebook.com Right click on the white space of the front page.  Select "View Page source". Copy the code to Notepad. 2). Now find (Press ctrl +f)  for "action="  in that code. You have to change two things in that code..first of all you have to change method from POST to Get and secondly you have to change ACTION...
Read more ...

Spamming

Spam can be defined as Electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited e-mail. Real spam is generally e-mail advertising for some product sent to a mailing list.In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques. But because the Internet is public, there is really little that can be done to prevent spam, just as it is impossible to prevent junk mail. However, some online services have instituted policies to prevent spammers from spamming their subscribers. Now how a spammer can able to get Your email id. This can be done by following ways... 1)Social networking sites. Many people on social networking sites leave thier privacy settings to very low.Its very easy to get E-mail id or other contact information on this kind of sites....
Read more ...

Footprinting

Footprinting is the first and most convenient way that hackers use to gather information about computer systems and the companies they belong to. The purpose of footprinting is to learn a much you can about a system, its remote access capabilities, its ports and services,and the aspects of its security. In order to perform a successful hack on a system,it is best to know as much as you can. There are Mainly Two Types of Footprinting 1) DNS Footprinting In this a hacker tries to gather information on Domain name registration on various things like,Registration details,Server Type,Ip address, Location, Contact numbers e.t.c. There are various tools that can be used in DNS Footprinting like whois and samspade are popular tools in this category But i will recommend whois. Let see how we can Footprint a Website by its domain. STEP 1: GO TO http://www.domaintools.com/ STEP 2: Type website URL which you want to footprint. (i.e  www.google.com , google.com or ip address of website) and...
Read more ...

Email Spoofing

E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Senders insert commands in headers that will alter message information. It is possible to send a message that appears to be from anyone, anywhere, saying whatever the sender wants it to say. Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn't write. Above all is just a Small explanation on what is E-mail spoofing. these are the websites which are used to send fake emails www.hoaxmail.co.uk anonymailer.net emkei.cz above all emkei.cz  is my favourite because it provide some advance option like email-header, reply to,cc etc. You can also send from your cmd, but for that purpose you need S.M.T.P server name of your I.S.P. so use above services only for...
Read more ...