Friday, May 27, 2011

Password Hacking

-: Password Hacking :-


Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.


2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information.

Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:

* blank (none)
* the word "password", "passcode", "admin" and their derivatives
* the user's name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet's name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on....

In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.

A password containing both uppercase & lowercase characters, numbers and special characters too; is a strong password and can never be guessed.


Check Your Password Strength



3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.

Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.

Long is the password, large is the time taken to brute force it.

5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.

Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.

It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.

Sunday, January 30, 2011

Orkut Tricks

Orkut Trick for posting Blank Scrap

Wonder How to write blank scrap / blank post ?
If you like this simple trick, please do refer your friends.

For writing blank scrap, follow the steps:

1) Open any scrapbook.
2) Write [i] in the scrapbook.
3) Do NOT write anything else in the scrapbook, and submit the scrap.
That's all.
NOTE:
You can also use [b] tag instead of [i] tag
You can also use this method to post a blank entry in any community forum.
&
Or Just Type The following in any Scrap




Write Your Name in Heart Shape


Click here

_________AnkitAnk____________AnkitAnki
______AnkitAnkitAnki_______AnkitAnkitAnkitA
____AnkitAnkitAnkitAnki___AnkitAnkitAnkitAnki
___AnkitAnkitAnkitAnkitAnkitAnkitAn_______Anki
__AnkitAnkitAnkitAnkitAnkitAnkitAn_________Anki
_AnkitAnkitAnkitAnkitAnkitAnkitAnkitA_______Ankit
_AnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkit______Ank
AnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAnki__AnkitA
AnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAn_Ankit
AnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAnk
AnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAn
_AnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkit
__AnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAn
____AnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAn
______AnkitAnkitAnkitAnkitAnkitAnkitAnkitAn
_________AnkitAnkitAnkitAnkitAnkitAnkitA
____________AnkitAnkitAnkitAnkitAnkit
______________AnkitAnkitAnkitAnkit
_________________AnkitAnkitAnk
__________________AnkitAnki
___________________AnkitA
____________________Anki
____________________An


Orkut scrap trick for mirror message


Let your text show view its face in the mirror.

example: Trickfriend = dneirfkcirT

For writing mirror scrap, follow the steps:

1. Type the text in the scrapbook or any text box.

2. Type &#8238 without spaces before the message in the text box.

3. Now ENTER.

Friday, November 27, 2009

Learn How To Hack With The Hacker’s Underground Handbook

The Hacker’s Underground Handbook

open this link and download it

The Hacker’s Underground Handbook starts off with the very basics with topics like programming and Linux. It then moves on to introduce and teach the topics of

* password cracking
* phishing
* network hacking
* wireless hacking
* malware
* Windows hacking

I was really surprised how this book laid out the information, presenting it in an easy to read and understandable fashion. In each chapter the author first introduces you to the topic and then shows you a real-world example with step-by-step instructions with images. It makes hacking look so easy!

Once you complete reading this book, the author explains where to go from there and how to keep learning. You will never again be lost and overwhelmed by all the hacking information out there.

If you think this book is something you would be interested in, you can get it here. Hacker’s Underground Handbook

How To Hack Windows XP Password?

1) Go to safe mode ( when your computer start press F8) , with the arrow keys select safe mode and hit enter.



2)Once you are on main menu you’ll see two accounts, your friend’s account and administrator account. Choose the administrator account

3) Go to start -> All Programs ->Control Panel



4) Go to User Accounts



5)In User Accounts menu choose friend’s account and remove password .


6) Then restart your computer. Once you restart computer your friend’s account will no have a password. Just click on it to get in .
Transform your Windows XP in to Windows 7
If you are using Windows XP and want to experience Windows 7 without installing then here is Seven Remix XP transformation pack to transform Windows XP to Windows 7.With this simple app you can make your XP look like Windows 7 in just few clicks. It supports Windows XP, Windows 2003, Windows Media Center Edition and some other flavors of XP. Will work with only 32 bit edition of Windows.
Just download it and install .
Download Seven Remix XP and transform your windows xp .

Cool Computer Tricks (Use Keyboard As Mouse)

When mouse isn’t working properly , this trick can be very helpful. To activate mouse keys all you do is press Alt+Left shift key + NumLock and click OK or press enter .
Use the Numerical pad for controlling the mouse pointer.
5 is for click.
+ is for double click
- for right click.

How to Hack a Yahoo Password?


1. There is no ready made software or program that can hack a Yahoo password just by entering the target username. If you come accross a site that claims to sell such Yahoo password hacking software then it’s 100% scam.

2. Never trust any Hacking Service that claims to hack Yahoo password just for $100 or $200. All the hacking services are scams.

3. With my experience of about 6 years in the field of Hacking and IT security, I can tell you that there are only TWO ways to hack Yahoo password: They are Keylogging and Phishing. All the other password hacking methods are simply scam or don’t work! The following are the only 2 working and foolproof methods to hack Yahoo password.



1. EASIEST WAY TO HACK YAHOO


Using keylogger is the easiest way to hack a Yahoo password. A keylogger is a small program that records each and every keystroke (including passwords) that a user types on a specific computer’s keyboard. A keylogger is also called as Spy program or Spy software. To use it you don’t need to have any special knowledge. Anyone with a basic knowledge of computer can use it. With my experience I recommend the following keyloggers as the best for hacking Yahoo password.

SniperSpy

Win-Spy



How can I use SniperSpy for hacking Yahoo?

You can hack Yahoo password using SniperSpy as follows:

1. After you purchase it, you’ll be able to create the installation module. You need to email this module to the remote user as an attachment.

2. When the remote user runs the module it’ll get installed silently and monitoring process will begin. The keystrokes are captured and uploaded to the SniperSpy servers continously.

3. You can login to your Sniperspy account (you get this after purchase) to see the logs which contains the password. In this way you can hack Yahoo or any email using sniperspy.

The working of Winspy is almost same as Sniperspy.



I don’t have physical access to the target computer, can I still use sniperspy?

Yes you can still use it for hacking Yahoo. Because keyloggers like SniperSpy and Win-Spy offers Remote Installation Feature. With this feature it is possible to remotely install the keylogger on the victim’s PC. However they can also work on a local computer.



Once I install sniperspy can the victim come to know about it’s presence?

No. The victim will never come to know about it’s presence on his/her computer. This is because, once installed the keylogger will run in total stealth mode. Unlike other programs it will never show up in start-menu, start-up, program files, add/remove programs and task manager.



Can I be traced back if I install it on some other computer?

No, it’s almost impossible to trace back to you for installing the keylogger on other’s PC.



What if the antivirus block from sending it as an email attachment?

Instead of sending the keylogger as an email attachment, you place the file in .ZIP/.RAR format and upload it to www.hotlinkfiles.com. After uploading, just send the direct download link to the victim via email. Once he downloads the file from this link and run it, the keylogger will get installed automatically.



How safe is to use SniperSpy?

Sniperspy is completely safe to use since all the customer databases remain confidential and private. They doesn’t collect any information from your system and will not contact you in any way unless you request assistance.



Is my online order 100% Safe and Secure?

Absolutely Yes! All the e-commerce transactions for SniperSpy is handled by Plimus – they are a trusted online retailer specializing in digitally delivered products. All your information remains private and secure. The safety and protection of your personal information is 100% guaranteed. So you can place your order for SniperSpy with no worries of scam!



Should I go for Sniperspy or Winspy?

I recommend SniperSpy as the best for the following reasons.

It is fully compatible with Windows 98/ME/2000/XP/Vista. But Winspy has known compatible issues with Vista.
It can bypass any firewall.
SniperSpy is recognized by BBC, CNN, CBS and other news networks. Hence it is reputed and trustworthy.
Apart from the above features both of these stand head to head.

So what are you waiting for? If you’re really serious to hack a Yahoo password then go grab either of the two mentioned keyloggers now.

1. SniperSpy 2. WinSpy