Showing posts with label hack-email. Show all posts
Showing posts with label hack-email. Show all posts

Saturday, February 18, 2012

Hack-facebook-password

Hack E-Mail,Facebook,twitter etc Passwords Using RATs


Hello Guys...
In this article I'll show you how to hack email account password using Rats and trojans. Here I am demonstrating using PRORAT trojan. You can use any trojan or keylogger as per your ease. The basic functionality of all backdoors are same. Pls make note that all these hacking tools and softwares are detected by antivirus. You have to uninstall or close you running antivirus first. Now we can start.



How to Hack Email Account Passwords Using ProRat?


1. First of all Download ProRat(http://www.prorat.net/downloads.php). Once it is downloaded right
    click on the folder and choose to extract it. A password prompt will come up. The password will
     be   "pro".

2. Open up the program. You should see the following:

  
3. Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose 
    "Create ProRat Server".





4. Next put in your IP address so the server could connect to you. If you don’t know your IP address
    click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that
    when and if a victim gets infected it will send you a message. We will not be using the rest of the
    options.

5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

Here is a quick overview of what they mean and which should be checked:

 
 


6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.


7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.








8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.










 9. After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.

10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.





Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.


12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.




13. The image on left shows the message that the victim would get on his screen if the hacker chose to message him.










14. Below is an image of the victims task bar after the hacker clicks on Hide Start Button.



15. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.



As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.



Enjoy....
Don't forget to like and comment....:)

Friday, February 17, 2012

Hack-hotmail-account

How To Hack Hotmail

Wanna to learn how to hack hotmail? This is complete step by step tutorial that explains how to hack hotmail with MessenPass, how to hack hotmail using Social eng. method and how to hack hotmail using Sniper Spy.

1) How To Hack Hotmail With MessenPass?
--->
If you have physical access computer that you want to hack then you should use free called MessenPass.



MessenPass can only be used to hack the passwords for the current logged-on user on your local computer. You cannot use this utility for grabbing the passwords of other users. I recommend you to read my previous article HOW TO HACK BY PENDRIVE where you’ll see how to hack passwords using usb , MessenPass, .bat scripts and others similar utilites.

MessenPass

2) How To Hack Hotmail Password Using Social Engineering Method?
---->
Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking and fooling other people to break normal security procedures. Let’s see example of hacking hotmail password with social engineering method.



a) Go to some forum and write new topic . In that topic you need trick other people to send you your
    hotmail password . how to hack into hotmail password is good topic title
b) In body of topic write following text



DISCLAMER: I do NOT take any responsibility for the content of this page. If you read this page with it’s methods of fetching hotmail or yahoo passwords you have agreed to take your own responsibility for any actions you may make. **Please note! Do not hack my account..
(we all do a little hacking:-))

---->
Follow four easy steps below to learn how to hack into Hotmal:


STEP 1-  The first step in the process of hacking in to someone’s hotmail account is quite easy. You
                simply log into your own Hotmail account. Important Note : Ur A/c should have been
                atleast 30 minutes old for this to work!! 
 
STEP 2- Once you have logged into your own account, compose/write an e-mail to
               removed@domain…. This is the secret mailing address to the Hotmail Staff!! The
               automated server will (after recieving the information you will send them) will send you
               the password that you have ‘forgotten’
STEP 3-  In the subject line write “retrieve passwd” (CASE INTESIVE) and in the body of the
                e-mail write this exact code filling in your hotmail password and login, and the
                victim(whose password u want) of hacking’s login name. · its better to cut and paste the
                followingtwo lines. The code is as follows:

form_pwd:login=WRITEVICTIMSLOGINHEREsendto=YOURHOTMAILLOGIN+PASSWORD
        
 **Please note! Do NOT Enter the victims email-address, just the login name** For example if I’d like to get my friends hotmail password (removed@domain…com) to my email (removed@dom…) (let’s say my password is “mypass”) I would write like this:


                    form_pwd: login=name sendto=name+mypass



This will fool the Hotmail or Yahoo or Gmail or AOL systems into thinking that you are a Administration staff and send u the password!!


STEP 4- All you have to do is wait for the hotmail staff to send you a mail containing the password!
               It normally takes 48hrs. Note that if the victim has accounts both in hotmail and yahoo then                 u will get both the passwords in two different mails.The only thing you will be doing by                    following those steps is to send your password to the hacker.

3) How To Hack Hotmail Using Sniper Spy
---->
SniperSpy is the industry leading Remote Password hacking software combined with the Remote Install and Remote Viewing feature.Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s! This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access! Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel! This Remote PC Spy software also saves screenshots along with text logs of chats, websites,passwords, keystrokes in any language and more. Remotely view everything your child or anyone does while they use your distant PC. Includes LIVE admin and control commands!



SniperSpy Features:
 1. SniperSpy is remotely-deployable spy software
 2. Invisibility Stealth Mode Option. Works in complete stealth mode. Undetectable!
 3. Logs All Keystrokesphoto
 4. Records any Password (Email, Login, Instant Messenger etc.)



 5. Remote Monitor Entire IM Conversations so that you can spy on IM activities too
 6. Captures a full-size jpg picture of the active window however often you wish
 7. Real Time Screen Viewer
 8. Remotely reboot or shutdown the PC or choose to logoff the current Windows user
 9. Completely Bypasses any Firewall

4) What if i dont have physical acess to victims computer?



No physical access to your remote PC is needed to install the spy software. Once installed you can view the screen LIVE and browse the file system from anywhere anytime. You can also view chats, websites, keystrokes in any language and more, with screenshots.


 This software remotely installs to your computer through email. Unlike the other remote spy titles on the market, SniperSpy is fully and completely arjust any firewall including Windows XP, Windows Vista and add-on firewalls. The program then records user activities and sends the data to your online account. You login to your account SECURELY to view logs using your own password-protected login. You can access the LIVE control panel within your secure online account.

How TO Recover Hacked Account??
CLICK HERE

Enjoy...
Don't forget to like and comment.....:)

Related Posts Plugin for WordPress, Blogger...

 
Design by ItRocks Softcom | Bloggerized by ItRocks