Sunday, January 19, 2014

SMS Bombing - Flood Inbox of Your Friend With Messages
SMS Bombing is a prank which is often played in which we send continuous text messages to the victim. The number of texts may vary from 15-20 to even 1000 ! So, I'll be sharing a method of sms bombing here and this method does not use any software to bomb, rather a bit of innovation with a plug-in.

Requirements :  1.Mozilla . It can be downloaded here.

                            2.A Mozilla plug-in named Imacros. Add it to firefox from here.

                            3.A site which allow you to send text messages with no captcha challenge and no adds
                           between to successive messages you send.

Make sure you have installed imacros correctly and to get an icon like shown in the below.

        Method :  1.Go to the site you are using to send texts.Log in there.

                        2.Now click on the icon of imacros from there click on "rec" and then "record".Please make
                           sure that all tabs are closed click on record button.

                        3.Now type the number of the victim and then the message.

                        4.Click on "send"button.

                        5.As the delivery report comes,click on "send another message".

                        6.After clicking on send another message click on "stop" button in imacros.

                        7.Now click on "play" option in imacros.
                        8.You will see an option Repeat Macros.There,let the"current" be one and in "max" column
                            the number of messages you want to bomb.

                        9.Now click on "play(loop)".

                       10.Messages will be bombed ! Happy bombing :P

p.s.It is on you to find site which is vulnerable to this.I have just shared the method.

Note : SMS Bombing and SMS spoofing is illegal in and many other countries.So I don't take any responsibility for any misuse.This tutorial in Only for educational purposes.

How to Bypass the ''surveys'' without disclosing your personal information!


We often come across sites in which we have to forcefully do a survey because we have to a file or see some content.

In all of these surveys we are forced to discloseour personal information like our phone number , email id  etc.
Later these sites irritate you with their sms's spam mails of offers in which you not at all are  interested !
So i've found a way by which you through these sites without leaking out your personal information !
Let's start -

1.Download this add on called ''greasemonkey'' for mozilla (mozilla is needed ).

After installing it,it would appear like this in your browser -

2.After installing it download this script which runs with the help of this add on(greasemonkey) --

Install this script and make sure the monkey on the right side of your mozilla screen is colored (which means greasemonkey is activated,to activate or deactivate just click on it)


3.Now go to the site which tells you to do the survey and asks for your information  etc..

4.You'll see an option on top left side of the page which says '' Press CTRL+SHIFT+F to fill in form. ''

Do as  CTRL+SHIFT+Fand you will see that the form gets filled on its own and all the information filled out there is completely random !

Click on submit and you are registered on the site and now you can easily download what you wanted to ! :)

This is all random stuff filled by the script.


6.Some sites may tell you to verify your identity by logging into your mail and opening some url or to get some pin ! For this all you have to so is go to Go to this site and you'll get a temporary email id for around 15-30min.>paste that temporary email id at the place of email id which your intelligent form has randomly filled>click on submit form.

Here '''' is the yopmail email id which is replaced by the default id given by ''form filler''

7.Check for the mail from the site>Get the pin or link>you are done !:-)

Here as you can see two mails from the site where we have to forcefully register and the confirmation link plus password (other mails are just spam,ignore them).


8.Some sites may ask you for voice calls confirmation ..I have the solution for that too :)
In that case go to this site this site you can receive voice calls via mail ! So you bypass Survey again without giving any details !

            Register here and you'll be able to receive voice calls via mail.

Hack Gmail Password With Gmail Hacker,gmail hacking

Previously i have posted alot of articles on Gmail hacking. Recently the number of users Gmail users have increased, therefore Gmail have been the major target of lots of hackers.People use Gmail as a primary email and therefore if hackers can gain access to their primary email accounts so therefore they can also hack other accounts associated witth your Gmail account.

While browsing on the internet I came across a piece of tool that can help hackers with good social engineering skills hack gmail passwords easily, the tool itself is extremely simple to configure and very user friendly. The gmail hacking software is so easy to use, all you need to do is to download the gmail hacking software from the link mentioned below, build your server and send the server to the victim.

Gmail Hacker - Hack Gmail Passwords

Here is how a hacker can use Gmail hacker to hack gmail passwords:


Step 1 - Extract the archive named gmail.rar on your computer, Once you have extracted you will see the following files:
Step 2 - On opening Gmail hacker builder.exe you will see the following:
Step 3 - Next you need to enter your gmail address where you would receive logs. However I would recommend you to create a fake email address and use it for receiving logs. 
Step 4 - Once you have entered your credentials, click on the build button. 
Step 5 - A file named gmailhacker.exe would be created, On executing the file, the victim will see the following:
Now you need to apply your social engineering skills in order to make the victim enter his/her credentials on to the software. The simplest way of accomplishing this is to tell the victim that the application Gmailhacker.exe is itself a gmail hacking software, You just need to the victim's username, your own gmail ID and your own gmail password, where you would receive victims passwords and click "Hack Them".
Step 6 - Once the victim clicks on the "Hack Them" button, his own gmail credentials that he entered would be sent to you on the email you typed while configuring the software. 
Well, here is an interesting part, when the victim will click on the button "Hack them", he will receive the following error, making him thinking that their is a problem with the software:

How Hackers Make Botnet To Infect Systems [Part 2]

Hello readers, we are back with How Hackers Make Botnet To Infect Systems [Part 2]. Those who haven't read previous part than check the first part in order to understand part two, as it is the sequel of How to setup a Botnet.

How Hackers Make Botnets To Infect Systems [Part 1]

So in this part we will teach you how to setup a Botnet.

Step 1:

Now after hosting the server, Extract Bot builder in you computer.
Download it from here 

Step 2:

After extracting, you'll a application for BOT Building with 'VNBuilder' name.
Run the application.
It would be like as shown in image:

Step 3:

Check the box in the below.

Step 4:

Now go in the 'Web Setting' Tab. Type the website where you have set your server in ROOT WEBSITE URL column. Remember your website url should be like this, No Http:// in starting. Leave the port number as it is. Now type the folder in which your server is set, And it should be like /folder name/. leave All other thing as it is. As it is shown in image: 

 Step 5:

Now Go to Load settings tab, check the 'INSTALL LOADER TO START UP' option. Like in the image:

Step 6:
Proceed to last Tab BUILD LOADER, Now if you want to change icon of your virus than go to top right of under build loader tab, You can add icons their for your virus, additional icons are given with builder. You can even change the extention from .exe to .bat and few others, In the bottom of window you can find option to change extension. Now In the last click Build. 
Builder will ask where to save with which name, provide your desire one. 

Step 7:

You've successfully created Bot. Now in order to check whether the bot is working or not RUN it in you Computer, Turn your antivirus It'll detect the virus. After running virus, go and login in the server you made in part one of this tutorial. If your virus is created Successfully than you IP will be appearing in the server list with your computer name. Like mine:
If your Ip appearing, than you have configured Botnet successfully. Congratulations.
Thanks for reading, Stay tuned with us for more tutorials!

How to Become a Hacker

There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term ‘hacker.’

There is another group of people who loudly call themselves hackers, but aren't. These are people who get a kick out of breaking into computers and phreaking the phone system. Real hackers call these people ‘crackers’ and want nothing to do with them. Real hackers object that being able to break security doesn't make you a hacker any more than being able to hotwire cars makes you an automotive engineer.

There are people who apply the true hacker attitude to other things, like electronics or music — but in the rest of this article we will focus the skills and attitudes of software hackers, and the traditions of the shared culture that originated the term ‘hacker.'
  • Thinking Like a Hacker

Adopt the mindset of a hacker. Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be accepted as a hacker, you have to behave as though you have this kind of attitude yourself. And to behave as though you have the attitude, you have to really believe the attitude. So, if you want to be a hacker, repeat the following things until you believe them:

  • The world is full of fascinating problems waiting to be solved. Successful athletes get their motivation from a kind of physical delight in making their bodies perform, in pushing themselves past their own physical limits. Similarly, you have to get a basic thrill from solving problems, sharpening your skills, and exercising your intelligence.
  • No problem should ever have to be solved twice. The thinking time of other hackers is precious — so much so that it's almost a moral duty for you to share information, solve problems and then give the solutions away just so other hackers can solve new problems instead of having to perpetually re-address old ones.
  • Boredom and drudgery are evil. When hackers are bored or have to drudge at stupid repetitive work, they aren't doing what only they can do — solve new problems. To behave like a hacker, you have to want to automate away the boring bits as much as possible.
  • Freedom is good. The authoritarian attitude has to be fought wherever you find it, lest it smother you and other hackers. Not all authority figures are authoritarian. However, authoritarians thrive on censorship and secrecy, and they distrust voluntary cooperation and information-sharing.
  • Attitude is no substitute for competence. Hackers won't let posers waste their time, but they recognize competence — especially competence at hacking, but competence at anything is valued. Competence at demanding skills that few can master is especially good, and competence at demanding skills that involve mental acuteness, craft, and concentration is best.
  • Earn respect as a hacker. Like most cultures without a monetary economy, hackerdom runs on reputation. You're trying to solve interesting problems, but how interesting they are, and whether your solutions are really good, is something that only your technical peers or superiors are normally equipped to judge. This is why you aren't really a hacker until other hackers consistently call you one. Specifically, hackerdom is what anthropologists call a "gift culture." You gain status and reputation in it not by dominating other people, nor by being beautiful, nor by having things other people want, but rather by giving things away: your time, your creativity, and the results of your skill.

  • Write open-source software. Write programs that other hackers think are fun or useful, and give the program sources away to the whole hacker culture to use. Hackerdom's most revered demigods are people who have written large, capable programs that met a widespread need and given them away, so that now everyone uses them.
  • Help test and debug open-source software. Any open-source author who's thinking will tell you that good beta-testers (who know how to describe symptoms clearly, localize problems well, can tolerate bugs in a quickie release, and are willing to apply a few simple diagnostic routines) are worth their weight in rubies. Try to find a program under development that you're interested in and be a good beta-tester. There's a natural progression from helping test programs to helping debug them to helping modify them. You'll learn a lot this way, and generate good karma with people who will help you later on.
  • Publish useful information. Another good thing is to collect and filter useful and interesting information into web pages or documents like Frequently Asked Questions (FAQ) lists, and make those generally available. Maintainers of major technical FAQs get almost as much respect as open-source authors.
  • Help keep the infrastructure working. The hacker culture (and the engineering development of the Internet, for that matter) is run by volunteers. There's a lot of necessary but unglamorous work that needs done to keep it going — administering mailing lists, moderating newsgroups, maintaining large software archive sites, developing RFCs and other technical standards. People who do this sort of thing well get a lot of respect, because everybody knows these jobs are huge time sinks and not as much fun as playing with code. Doing them shows dedication.
  • Serve the hacker culture itself. This is not something you'll be positioned to do until you've been around for a while and become well-known for one of the four previous items. The hacker culture doesn't have leaders, exactly, but it does have culture heroes and tribal elders and historians and spokespeople. When you've been in the trenches long enough, you may grow into one of these. Beware: hackers distrust blatant ego in their tribal elders, so visibly reaching for this kind of fame is dangerous. Rather than striving for it, you have to sort of position yourself so it drops in your lap, and then be modest and gracious about your status.

  • Learning Programming

Learn how to program. The best way to learn is to read some stuff written by masters of the form, write some things yourself, read a lot more, write a little more, read a lot more, write some more, and repeat until your writing begins to develop the kind of strength and economy you see in your models. To be a real hacker, however, you need to get to the point where you can learn a new language in days by relating what's in the manual to what you already know. This means you should learn several very different languages. Besides being the most important hacking languages, the following represent very different approaches to programming, and each will educate you in valuable ways:

  • Python is a good language to start off with because it's cleanly designed, well documented, and relatively kind to beginners. Despite being a good first language, it is not just a toy; it is very powerful and flexible and well-suited for large projects. Java is an alternative, but its value as a first programming language has been questioned.
  • If you get into serious programming, you will have to learn C, the core language of Unix (C++ is very closely related to C; if you know one, learning the other will not be difficult). C is very efficient with your machine's resources, but will soak up huge amounts of your time on debugging and is often avoided for that reason (unless machine efficiency is essential).
  • Perl is worth learning for practical reasons; it's very widely used for active web pages and system administration, so that even if you never write Perl you should learn to read it. Many people use Perl to avoid C programming on jobs that don't require C's machine efficiency.
  • LISP is worth learning for a different reason — the profound enlightenment experience you will have when you finally get it. That experience will make you a better programmer for the rest of your days, even if you never actually use LISP itself a lot. You can get some beginning experience with LISP fairly easily by writing and modifying editing modes for the Emacs text editor, or Script-Fu plugins for the GIMP.

  • Familiarizing Yourself With Unix

Get one of the open-source Unixes and learn to use and run it. Unix is the operating system of the Internet. While you can learn to use the Internet without knowing Unix, you can't be an Internet hacker without understanding Unix. For this reason, the hacker culture today is pretty strongly Unix-centered. So, bring up a Unix (like Linux but there are other ways and yes, you can run both Linux and Microsoft Windows on the same machine). Learn it. Run it. Tinker with it. Talk to the Internet with it. Read the code. Modify the code.

  • There are other operating systems in the world besides Unix. But they're distributed in binary — you can't read the code, and you can't modify it. Trying to learn to hack on a Microsoft Windows machine or under any other closed-source system is like trying to learn to dance while wearing a body cast. Under Mac OS X it's possible, but only part of the system is open source — you're likely to hit a lot of walls, and you have to be careful not to develop the bad habit of depending on Apple's proprietary code.
  • Download Linux online or (better idea) find a local Linux user group to help you with installation.
  • While other distros have their own areas of strength, Ubuntu is far and away the most accessible to Linux newbies.
  • A good way to dip your toes in the water is to boot up what Linux fans call a live CD, a distribution that runs entirely off a CD without having to modify your hard disk. This is a way to get a look at the possibilities without having to do anything drastic.

  • Learning HTML

Learn how to use the World Wide Web and write HTML. Most of the things the hacker culture has built do their work out of sight, helping run factories and offices and universities without any obvious impact on how non-hackers live. The Web is the one big exception, the huge shiny hacker toy that even politicians admit has changed the world. For this reason alone (and a lot of other good ones as well) you need to learn how to work the Web. This doesn't just mean learning how to drive a browser (anyone can do that), but learning how to write HTML, the Web's markup language. If you don't know how to program, writing HTML will teach you some mental habits that will help you learn. So build a home page. Try to stick to XHTML, which is a cleaner language than classic HTML.

  • Stick to one thing at a time.Do not try to learn everything at once. A lot of wannabe hackers make this mistake. By learning a category, then moving to another one, you'll be more efficient.
  • If you don't speak English, it might be a good idea to learn it. English is the working language of the hacker culture and the Internet, and you might need to know it to function in the hacker community. Translations of technical books written in English are often unsatisfactory (when they get done at all). Being a native English-speaker does not guarantee that you have language skills good enough to function as a hacker. If your writing is semi-literate, ungrammatical, and riddled with misspellings, many hackers will tend to ignore you.
  • Don't be content with a narrow range of skills. Though most hackers describe themselves as programmers, they are very likely to be more than competent in several related skills — system administration, Web design, and PC hardware troubleshooting are common ones. Hackers don't do things by halves; if they invest in a skill at all, they tend to get very good at it.
  • Work as intensely as you play, and play as intensely as you work. For true hackers, the boundaries between "play," "work," "science," and "art" all tend to disappear, or to merge into a high-level creative playfulness.
  • To be a hacker, you have to enter the hacker mindset, and there are some things you can do when you're not at a computer that seem to help. They're not substitutes for hacking (nothing is) but many hackers do them, and feel that they connect in some basic way with the essence of hacking (hackers need to be able to both reason logically and step outside the apparent logic of a problem at a moment's notice).

    • Write your native language well. Though it's a common stereotype that programmers can't write, a surprising number of hackers are very able writers.
    • Read science fiction. Go to science fiction conventions (a good way to meet hackers and proto-hackers).
    • Train in a martial art. The kind of mental discipline required for martial arts seems to be similar in important ways to what hackers do. The most hacker-ly martial arts are those which emphasize mental discipline, relaxed awareness, and control, rather than raw strength, athleticism, or physical toughness. Tai Chi is a good martial art for hackers.
    • Study an actual meditation discipline. The perennial favorite among hackers is Zen (importantly, it is possible to benefit from Zen without acquiring a religion or discarding one you already have).
    • Develop an analytical ear for music. Learn to appreciate peculiar kinds of music, and to play some musical instrument well, or how to sing.
    • Develop your appreciation for puns and wordplay.
    • Master creative thinking. The hacker mentality is driven by creatively solving problems. This creativity gives you the ability to solve problems others see as unsolvable.
  • Contrary to popular belief, you don't have to be a nerd to be a hacker. It does help, however, and many hackers are in fact nerds. Being something of a social outcast helps you stay concentrated on the really important things, like thinking and hacking. If you can manage to concentrate enough on hacking to be good at it and still have a life, that's fine. Mainstream culture is much friendlier to techno-nerds now.
  • Read older pieces, such as the Jargon File or Hacker Manifesto by The Mentor. They may be out of date, but the attitude and spirit come through very clearly.
  • You don't have to believe that you're obligated to give all your creative product away, though the hackers that do are the ones that get most respect from other hackers. It's consistent with hacker values to sell enough of it to keep you in food and rent and computers. It's fine to use your hacking skills to support a family or even get rich, as long as you don't forget your loyalty to your art and your fellow hackers while doing it.
  • Cracking is an illegal activity which can result in major penalties. It is a major offense and is punishable under the law.
  • Doing any of the following will earn you a bad reputation in the hacker community. Hackers have long memories — it could take you years to live your early blunders down enough to be accepted. And also, what's on the Internet stays on the Internet. Don't think nobody will stumble across what you did three years ago.
    • Don't use a silly, grandiose user ID or screen name.
    • Don't get in flame wars on Usenet (or anywhere else).
    • Don't call yourself a ‘cyberpunk,’ and don't waste your time on anybody who does.
    • Don't post or email writing that's full of spelling errors and bad grammar.
    • Don't blindly believe the advice given here or anywhere online is true and the only path to embracing the mindset of a hacker.
  • Don't use your hacking skills to do bad things. You might get used to it and get caught, ending up punished.

Bypass Phone and SMS verification of Any Website

Now a days, almost most websites need sms verification which includes google, facebook, youtube and other survey websites.

First of all we should understand why SMS and Phone Verification System is Important?

* Keep More Visitors for Market
* Providing Extra Security for their Website
* Keep Spammers out
* Daily Advertisement and promotional ads daily

Rather we can able to create and Bypass gmail (facebook, youtube, other shopping sites) without SMS verification. Because gmail allow to create only few account. When you try to create more account with same mobile number, google restricted and you can't create more account. so we can create counterless gmail accounts using following steps.
This method is very useful to Bypass SMS verification and useful when you need to Sign up any account and do not feel comfortable to giving your real number or if you want to create multiple account.

Lets Start Step by Step:

1) First go to this Website : Receive-Sms Online

2) Copy any one number and paste it where they are asking SMS Verification.

3) Simply come back and click the number which you have selected, check it out there is your code sent by google, youtube or whatever else.

How to Hack Facebook Accounts with Backtrack 5

Step 1 : Open set Tool in Backtrack 5 : To open it follow the step shown above .

Step 2 : Time to set the Website Attack Vectors : Below Menu   enter your choice: 2.Website Attack Vectors and press Enter .

Step 3 : Select your Attacking Method , Here i choose 
3. Credential Harvester Attack Method.

Step 4 : Select Attack Vectors :write  2. Site Cloner and press enter as shown in the image . 

Step 5: Enter the Url: To make a clone to facebook login page I entered and press enter . As I press enter it will automatically generate a clone page .

Step 6 : To continue the process you have to put * sign and press enter.

Step 7 : Process will continue as shown in the image above .

Step 8: Open terminal and enter ifconfig command . It will shown your ip address . Now copy the ip address .

Step9 :Open Web Browser and  Paste the system ipaddress into Address bar and it will redirect to the facebook login page .
Now Enter your anything to check it will work or not . 
FOR EXAMPLE: Here I use 
Email : h4x00r

And Press Enter . Let see what happen on the Next step .

Step 10 : In step 7 the process start you remember now when you follow step 8 and step 9  ,then it will come up with  all the details of Username and Password . 

This is how we set a trap and hack victim facebook and password only onBacktrack 5 


Android Codes / Tricks

Android is becoming a very popular these days and all big companies have launched android phones.Android is giving a strong competition to Iphones, symbian phones(like nokia).Though people have a lot of expectations from lumina series by nokia,but i don't think it will be able to compete with android phones!
So here are some tricks and codes which can be useful if you have an android phone!

  • Cell Battery, WiFi Usage etc Info *#*#4636#*#*
  • Restore Factory Settings *#*#7780#*#*
  • Format Phone *2767*3855#
  • Launch service mode *#*#197328640#*#*
  • Test WiFi *#*#232339#*#* or *#*#526#*#* or *#*#528#*#*
  • Display WiFi MAC address *#*#232338#*#*
  • GPS test *#*#1472365#*#*
  • Other GPS test *#*#1575#*#*
  • Bluetooth test *#*#232331#*#*
  • Display Bluetooth physic address *#*#232337#*#
  • Start Gtalk monitoring *#*#8255#*#*
  • PDA, Phone, H/W, RFCallDate *#*#4986*2650468#*#*
  • PDA and Phone *#*#1234#*#*
  • FTA SW version *#*#1111#*#*
  • FTA HW version *#*#2222#*#*
  • PDA, Phone, csc, *#*#44336#*#*
  • Packet Loopback *#*#0283#*#*
  • LCD test *#*#0*#*#*
  • Melody test *#*#0673#*#* or *#*#0289#*#*
  • Device test such as vibration and lightness *#*#0842#*#*
  • Display touchscreen version *#*#2663#*#*
  • Touchscreen test *#*#2664#*#*
  • Distance sensor test *#*#0588#*#*
  • Display memory version *#*#3264#*#*

Session Hijacking Tool 'Droidsheep' - Download and tutorial

session hijacking

Session Hijacking refers to an attack in which a hacker temporarily hijacks the ongoing session of the user and he is able to see what the user is doing on his mobile,computer be it accessing facebook,gmail or any other site.
P.S.- Rooted Android is required .
Steps of using :
1.Open the app.
2.Check "ARP-Spoofing" and "Genreic Mode".
3.Click on Start.
4.In some time you will start getting various sessions on the same network of wifi.Click on then see what the person is doing.

Working of Droidsheep : Basically,Droidsheep catches the packets which are send by the device to the router.The packets are received on hackers phone and the hacker further exploits them.
Download : You can download DroidSheep from here.