Tuesday, February 24, 2015

BSNL Broadband Hacked | How To Hack Bsnl Broadband

Here is the trick for How To Hack Bsnl Broadband I hope you will really enjoy it Follow the below steps to do this 

1. Identify your IP address(dont knw visit @ whatismyip.com)

2.Download IP scanner.( i preferangryziber.com/w/Download).

Open IP scanner .GO to option/select port.Enter 80 in 1st option(enter post to scan)

4.In hostname option type ur ip.Click On the ip button next to host name on opening it will automatically fill the ip range.

5.In the first option Let ur original IP be but in the second option fill the ip greated then original.Now click Scan

6.IT will give you LIst of ips showing some ips green on left side.

7.Right click that ip and then to option 'open computer' & select browser

8.ASk for username and pass.GIve username :admin password:admin

9.if it doesnt respond take some other green IP.

10. When pages get open go to home & click Wan.Here uu will see user id and pass in coded form

11.To fetched actual passowrd download this soft from "(scanwith.com/X-Pass_download.htm)

12.Extract files from tht and run'X-pass'.Drag d 'x' icon in password filled and u will get the pass.

13. To check that pass go to

Cookie Stealing Attack: Hack Any Account like Facebook ,Twitter , Gmail ,Hotmail ,Skype and yahoo etc.

Using this method you can hack Any Account like Facebook ,Twitter , Gmail ,Hotmail ,Skype and yahoo etc.

this works At
LAN(local Area Network) . its best place to hack at university, cafe , public place where computer
are on one LAN simple Example WI-Fi.

What is Cookies And how the use of stealing

Cookies are file’s that stored on Any computer’s By any website when a you visits them . the
cookie used by the web server to check the
authenticate the Real user . like you Enter Login in Facebook then a unique string’s Generated and the one copy saved in the web server and other is saved on your Browser as a Cookie file .
both are matched when you open a Account.
so then finally we will start.

Step 1:
Download the Wire Shark and install it.

Step 2:
Next open the wire shark and then click on

Step 3:
Next choose a interface which is received and
sending packet and click on start

Step 4:
Continue the sniffing for around like 10 minutes.

Step 5:
After a maximum 10 minute stop the sniffing by going to a capture menu.

its important step, now filter to http. cookie contains “datr”. Then
filter the all search for http cookies with a name of datr and there is Facebook authentication’s cookie.

Step 7:
Now click on it and then goto the copy > Bytes
> Printable Text only

Step 8:
Now for next step you must have 3 thing,
1. Mozilla Firefox [browser]
2. Grease Monkey[add-on]
3. Cookie injector[code]
and then open facebook. com make sure you are
not login

Step 9:
Press the button Alt C to bring up a cookie
injector and then Simply paste in a cookie value
into it.

Step 10
Now refresh your page so then finally you Enter
the Victim Account.

How to save a webpage as PDF

Steps :
1. Open the Google Chrome Browser on your PC or MAC 
2. Then go to the web page that you want to convert as a PDF. 
3. Now press Ctrl+P on Windows PC or Command+P if you are on a Mac to Open the the Print dialog on ChromeBrowser. 
4. Now Change the destination to “Save As PDF” and hit the save button.
5. The current web page will instantly be downloaded as a PDF document.

Wednesday, February 4, 2015

Secret Hack Codes for Android Mobile Phones

1. Complete Information About your Phone  
 This code can be used to get some interesting information about your phone and battery. It shows following 4 menus on screen:
  • Phone information
  • Battery information
  • Battery history
  • Usage statistics

2. Factory data reset
This code can be used for a factory data reset. It'll remove following things:
  • Google account settings stored in your phone
  • System and application data and settings
  • Downloaded applications
It'll NOT remove:
  • Current system software and bundled application
  • SD card files e.g. photos, music files, etc.
Note: Once you give this code, you get a prompt screen asking you to click on "Reset phone" button. So you get a chance to cancel your operation.
3. Format Android Phone

Think before you give this code. This code is used for factory format. It'll remove all files and settings including the internal memory storage. It'll also reinstall the phone firmware.
Note: Once you give this code, there is no way to cancel the operation unless you remove the battery from the phone. So think twice before giving this code.
4. Phone Camera Update
This code is used to get information about phone camera. It shows following 4 menus:
  • Update camera firmware in image (Don't try this option)
  • Update camera firmware in SD card
  • Get camera firmware version
  • Get firmware update count
WARNING: Never use the first option otherwise your phone camera will stop working and you'll need to take your phone to service center to reinstall camera firmware.
5. End Call/Power

This one is my favorite one. This code can be used to change the "End Call / Power" button action in your phone. Be default, if you long press the button, it shows a screen asking you to select any option from Silent mode, AirPlane mode and Power off.
You can change this action using this code. You can enable direct power off on this button so you don't need to waste your time in selecting the option.
6. File Copy for Creating Backup

This code opens a File copy screen where you can backup your media files e.g. Images, Sound, Video and Voice memo.
7.  Service Mode

This code can be used to enter into Service mode. You can run various tests and change settings in the service mode.
8. WLAN, GPS and Bluetooth Test Codes:
*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#*           - WLAN test (Use "Menu" button to start various tests)

*#*#232338#*#*                  - Shows WiFi MAC address

*#*#1472365#*#*                - GPS test

*#*#1575#*#*                      - Another GPS test

*#*#232331#*#*                  - Bluetooth test

*#*#232337#*#                    - Shows Bluetooth device address
9. Codes to get Firmware version information:
*#*#4986*2650468#*#* - PDA, Phone, H/W, RFCallDate

*#*#1234#*#* - PDA and Phone

*#*#1111#*#* - FTA SW Version

*#*#2222#*#* - FTA HW Version

*#*#44336#*#* - PDA, Phone, CSC, Build Time, Changelist number
10. Codes to launch various Factory Tests:
*#*#0283#*#* - Packet Loopback

*#*#0*#*#* - LCD test

*#*#0673#*#* OR *#*#0289#*#* - Melody test

*#*#0842#*#* - Device test (Vibration test and BackLight test)

*#*#2663#*#* - Touch screen version

*#*#2664#*#* - Touch screen test

*#*#0588#*#* - Proximity sensor test

*#*#3264#*#* - RAM version

Simple Steps To Become a good Hacker


UNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker.


2. Code in C language

C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker you should master C language.


3. Learn to code in more than one Programming Language

It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.


4. Learn Networking Concepts

Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system.
Understanding what LAN, WAN, VPN, Firewall is also important.
You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.

5. Learn More Than One Operating Systems 

It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.

6. Learn Cryptography

 To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.

7. Learn more and more about hacking

Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.


8. Experiment A Lot

After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.

9. Write Vulnerability (Loop hole program)

Vulnerability is the weakness, loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own and exploit the system.

10. Contribute To Open Source Security Projects

An open source computer security project helps you a lot in polishing and testing your hacking skills. It’s not a piece of cake to get it done. Some organizations such as MOZILLA, APACHE offer open source projects. Contribute and be a part of them even if your contribution is small, it will add a big value to your field.

11. Continue never ending Learning 

Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems

12. Join Discussions and meet hackers 

Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.

How to stop pop ups windows in your browser

How to stop pop ups windows manually

So, the first thing that you should know is the name of the browser that you have. You should follow the instructions for your browser.
For Internet Explorer:
  1. Press Alt+X, then choose Manage Add-ons, then click Toolbars and Extensions. Find the advertising browsers add-on (it usually contains words “coupon”, “deals”, “price”, etc.) and disable it.
  2. Follow: Tools=>Options=>Privacy tab. In the Pop-up Blocker section you should check the Block pop-ups option.
For Mozilla Firefox:
  1. Press Ctrl+Shift+A, then remove the extension that contains advertising keywords in their names, such as “coupon”, “deals”, “price”.
  2. Follow: Tools, Options, Web Features. Then you should check Block Popup Windows.
For Google Chrome:
  1. Press Alt+F, then select Tools, click on Extensions, find the advertising add-on there (it’s name usually contains words “coupon”, “deals”, “price”) and uninstall it.
  2. Usually this browser automatically blocks pop-ups, so you should not perform any other instructions.

How to detect keylogger and remove it from your computer

Hello besthacking readers today you will learn how to detect keylogger and remove it from your computer

System Protecting Tricks

Steps to remove or detect keylogger from your computer
  1. You should trace the behavior of you PC in order to find the common virus symptoms because the keylogger symptoms have much in common with the symptoms of other computer infections. We can refer slow computer performance, new icons on your desktop or in tray, network activity and unexpected pop-ups to these symptoms. Also you can notice that the text that you type can appear with little delay – this is the direct symptom that will help you in keystroke logger detection.
  2. Open Task Manager in order to end the process of the installed keylogger. You should know that not every keylogger can be found in Task Manager. Many of them hide their traces. But you should still check the possibility to end its process:
    If there is just one process with such a name, then you should check all other processes, using the special services that contain information about most of the processes to detect the malicious one. You can use LiutilitiesNeuber or any other service that you know. If you are an experienced user, then it will be much easier for you to check the processes, because you will not miss the system process with any malicious.
    If you end the process that belongs to keylogger, then the program is deactivated till the next reboot and the third party will not get your personal information.
  3. You should also look through the list of the installed programs. So, click Start menu, then All programs, try to find there the program that you did not install. Uninstall such programs.
  4. How to detect keylogger? You can also detect this malicious program with the help of Startup list. So, you should follow the instructions:
    • Press Windows+R buttons, then type msconfig in the line and press Enter
    • Select Startup tab and disable all the unknown programs
    • Then restart your computer.
There are all the manual instructions that will help you to find keylogger on your computer and deactivate it...