Tuesday, June 24, 2014

Control Others Computer | indihack

How to control or hack friends computer using Darkcomment?












  • First download the dark comment file from the link given at the end of the post.  Remember this is only for educational purpose.
  • After downloading you will see in socket /net tab listening to 1 port. You can listen to same port or You can change the port.


  • Now click on the dark comment rat and click server module and select full editor.



  • Now you will see some settings which is mentioned above.



  • Now go to network settings and add your port which you are listening as mentioned before.



  • This stubing will not allow the user to to delete the file which you created .
  • You can also display the warning message when the user clicks on the virus created by you.
  • By enabling this You can disable the functions which is mentioned above.
  • You can also activate the key logger so that you can receive logging as email.

  • you mus tadd the line that is ip address to continue virus.
  • Next is to blind file that is to set your virus in soe file .  When the user click your file your virus will enter his system and You will get control of it.
  •  After blinding you can choose the icon for your file.

  • Now click build to stuff .  A box will appear which will promt you to select the path to save the virus.
  • After saving you can give it to your friends remember not to close dark comment. when your friend double click on it you will receive a message as below
  • Now  you will see user as given below.

 
  • Now right click on the above user and select control socket .Now You can control the computer from here.



You may also like : Airtel Free Internet Trick

 


 



                   http://fileice.net/download.php?file=3lo8e                  http://quickdl.net/3lo8e 




http://swiftdownload.net/3lo8e                             http://zoomfiles.net/3lo8e 







 


                                       
http://fileunlckr.com/93599             http://flamefile.com/93599 



http://redirectlock.com/93599                                            http://gripped.biz/93599


=======================OR====================

http://www.indihack.blogspot.com/p/blog-page_4.html







Sunday, June 15, 2014

Ethical hacking kit Free download|indihack

Download EC Council Ethical Hacking Kit CEH $300 in Free.

EC Council CEH V6 Video and Ebooks kits. Over 5000 Members downloaded in last 3 weeks. These Ebooks containing 67 Modules Hacking tricks and method with full tutorial.. and video Kit containing 30 attack with clear and perfect way in 720p HD video. with additional Ebooks kits cost $300 but we providing for free to all APAJR Lab readers. All kits information and Modules detail given below.
                


 
EC Council Ebook's Modules

Module 1 - Introduction To Ethical Hacking
 
Module 2 - Hacking Laws

 
Module 3 - Footprinting

 
Module 4 - Google Hacking

 
Module 5 - Scanning

 
Module 6 - Enumeration

 
Module 7 - System Hacking

 
Module 8 - Trojans & Backdoors


Module 9 - Virus & worms

Module 10 -
Sniffers

Module 11 - Social Engineering


Module 12 - Phishing


Module 13 - Hacking Email Accounts


Module 14 - Denial-of-Service


Module 15 - Session Hijacking


Module 16 - Hacking Web Servers


Module 17 - Web Application Vulnerabilities

 Module 18 - Web-Based Password Cracking Techniques

Module 19 - SQL Injection

Module 20 - Hacking Wireless Networks

Module 21 - Physical Security

Module 22 - Linux Hacking

Module 23 - Evading IDS, Firewalls and Detecting Honey Pots

Module 24 - Buffer Overflows

Module 25 - Cryptography

Module 26 - Penetration Testing


Module 27 - Covert Hacking


Module 28 - Writing Virus Codes


Module 29 - Assembly Language Tutorial



Module 30 -  Smashing the Stack for Fun and Profit

Module 31 - Windows Based Buffer Overflow Exploit Writing


Module 32 - Reverse Engineering


Module 33 - MAC OS X Hacking
 
Module 34 - Hacking Routers, cable Modems and Firewalls

 
Module 35 - Hacking Mobile Phones, PDA and Handheld Devices

 
Module 36 - Bluetooth Hacking

 
Module 37 - VoIP Hacking

 
Module 38 - RFID Hacking

 
Module 39 - Spamming

 
Module 40 - Hacking USB Devices


Module 41 - Hacking Database Servers

Module 42 -
Cyber Warfare- Hacking, Al-Qaida and Terrorism

Module 43 - Internet Content Filtering Techniques


Module 44 - Privacy on the Internet


Module 45 - Securing Laptop Computers


Module 46 - Spying Technologies


Module 47 - Corporate Espionage- Hacking Using Insiders


Module 48 - Creating Security Policies


Module 49 - Software Piracy and Warez

Module 50 - Hacking and Cheating Online Games

Module 51 - SQL Injection

Module 52 - Hacking RSS and Atom

Module 53 - Hacking Web Browsers (Firefox, IE)

Module 54 - Proxy Server Technologies

Module 55 - Data Loss Prevention

Module 56 - Hacking Global Positioning System (GPS)

Module 57 - Computer Forensics and Incident Handling

Module 58 - Credit Card Frauds


Module 59 - How to Steal Passwords


Module 60 - Firewall Technologies


Module 61 - Threats and Countermeasures



Module 62 -  Case Studies

Module 63 - Botnets


Module 64 - Economic Espionage


Module 65 - Patch Management

Module 66 - Security Convergence



Module 67 -  Identifying the Terrorist


========================================================================

Addtional kits contains about vulnerablity, internet scanning, tracing, online marketing and much more.

Download this EC Council from the link given below and learn about hacking in a detailed manner.


 


 



                   http://adfoc.us/22646343480153                  http://adfoc.us/22646343480185 




http://adfoc.us/22646343480191                             http://adfoc.us/22646343480199 







 


                                       
http://adfoc.us/22646343480108             http://adfoc.us/22646343480103 



http://adfoc.us/22646343479980                                            http://adfoc.us/22646343480103


=======================OR====================

http://www.indihack.blogspot.com/p/blog-page_4.html







Monday, June 2, 2014

How to Play Android Games on PC | BlueStacks


http://infocurse.com/wp-content/uploads/2013/11/Android1.jpg









Android is becoming a very Popular Operating System in Smartphones due to the availability millions of apps in the Google Playstore.The Main reason for the Growing Success of Android OS is its amazing apps and High Quality Games of which most of them are available for free.Play Subway Surfers on PC Because of these high quality apps and games you need to have a Powerful Android Smartphone to run these apps smoothly on your devices but on the same side these Powerful Android Smartphones costs a lot which are not affordable for everyone. If you want to buy Android Smartphone just for enjoying the Android apps or Games therefore i am going to Provide you a Different platform to enjoy these apps just for free.Use Whatsapp on PC Here in this Post I am going to Tell you How to Play or Run these Android Games on Your PC/Computer without spending money on Android Smartphones.You can Run any Android app or game on your pc using the BlueStacks.Here below is a Step by Step Guide on How to Play Android Games on your PC using BlueStacks a Free Emulator to Play your Favorite Android Games on PC.


Hack website using havij

Download havij and hack website


http://samsclass.info/124/proj11/havij-21.png                                       


















Step1: Find SQL injection Vulnerability in a website and insert the string (like http://www.target.com/index.asp?id=123) of it in Havij as show below.(You Can Find Vulnerable WEbsite Using Automatic Scanner Like Acunetix Web Vulnerability Scanner 8. I will Show You How To Use It In My Next Article  

Download Acunetix 8.0

Download Acunetix 8.0 to scan for website vulnerability


https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrYKkrVhNMP7uYCWPtusXt8WTea0JTV7R8TF3LiB-7gP_sGTIVnbg9e-nilhxDMWiEuRkNWoBnvsw0-PuUFGRvSXf8nslqFOO4Fsl9EddVBx_-mig7nyF8wJZhQGY02airo7AWvBxX0Yw/s1600/Acunetix.Web.Vulnerability.Scanner.CE.jpeg

                                          Most Popular Vulnerability Scanner

Features At a Glance :- 


* Manipulation of inputs from URLs:
Acunetix WVS can automatically identify URL parameters and manipulate them to detect vulnerabilities. This technology is not present in any other competing vulnerability scanner.
Replace manual intervention with scanner intelligence* Automatic custom 404 error page identification:
Acunetix WVS 8 can automatically determine if a custom error page is in use, and recognizes it without needing any recognition patterns to be configured before the scan.
Interpret IIS 7 rewrite rules automatically
Using the web application’s web.config file, WVS 8 can automatically interpret rewrite rules without requiring any manual input.
Fix vulnerabilities while locking hackers out

Download Innobuzz hacking ebook

Download Innobuzz Ethical Hacking Kit CEH $300 in Free.

Innobuzz CEH V7 Video and Ebooks kits. Over 5000 Members downloaded in last 3 weeks. These Ebooks containing 32 Chapters Hacking tricks and method with full tutorial.. and video Kit containing 30 attack with clear and perfect way in 720p HD video. with additional Ebooks kits cost $300 but we providing for free to all indihack readers. All kits information and chapters detail given below.



https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3m_kaPd4eYqNaPhWI0LO-x_Yrw-qjjUvzd8hDv9CztPqWU-RmpUDQ2my2QnFjDq9nSnmMkTkfayKylVbEQizyOrjLyDsDrXgCnfO2bmceNv-ju4uYY9Mo8yKjoh8HVdNmxptVRGBg7EM/s1600/hacking+books.jpg


Innobuzz Ebook's Chapters

Chapter 1 - Introduction To Ethical Hacking
 
Chapter 2 - Networking & Basics

 
Chapter 3 - Footprinting

 
Chapter 4 - Google Hacking

 
Chapter 5 - Scanning

 
Chapter 6 - Windows Hacking

 
Chapter 7 - Linux Hacking

 
Chapter 8 - Trojans & Backdoors


Chapter 9 - Virus & worms

Chapter 10 - Proxy servers & Packet Filtering


Chapter 11 - Denial of service


Chapter 12 - Sniffers


Chapter 13 - Social Engineering


Chapter 14 - Physical Security


Chapter 15 - Steganography


Chapter 16 - Cryptography


Chapter 17 - Wireless Hacking

 Chapter 18 - Firewalls & Honeypots 

Chapter 19 - IDS & IPS 

Chapter 20 - Vulnerability Assessment

 Chapter 21 - Penetration Testing 

Chapter 22 - Session Hijacking

 Chapter 23 - Hacking Web Server 

Chapter 24 - SQL Injection 

Chapter 25 - XSS

Chapter 26 - Exploit Writing


Chapter 27 - Buffer Overflow


Chapter 28 - Reverse Engineering


Chapter 29 - Email Hacking


Chapter 30 - Incident Handling & Response


Chapter 31 - Bluetooth Hacking


Chapter 32 - Mobile Phone Hacking


===============================================
 Video kits attacks chapters
 

Chapter 1 - Introduction To Ethical Hacking
 
Chapter 2 - Wifi WEP Hacking

 
Chapter 3 - Wifi (WAP/WAP2) Hacking

 
Chapter 4 - Google Hacking and Google Dorks

 
Chapter 5 - Computer Hacking

 
Chapter 6 - Windows Hacking

 
Chapter 7 - Linux Hacking

 
Chapter 8 - BackTrack Tutorial


Chapter 9 - Virus & worms

Chapter 10 - Proxy servers & Packet Filtering


Chapter 11 - Denial of service and DDos Attact


Chapter 12 -Wireshark attact and cookies stealling


Chapter 13 - Social Engineering


Chapter 14 - Physical Security


Chapter 15 -
IDS & IPS

Chapter 16 -
Email Hacking

Chapter 17 - Wireless Hacking

 Chapter 18 - Firewalls & Honeypots 

Chapter 19 - IDS & IPS 

Chapter 20 - Vulnerability Assessment


========================================================================
Addtional kits contains about vulnerablity, internet scanning, tracing, online maarketing and much more.

Download this Innobuzz from the link given below and learn about hacking in a detailed manner.


 


 



                   http://fileice.net/download.php?file=3lo8e                  http://quickdl.net/3lo8e 




http://swiftdownload.net/3lo8e                             http://zoomfiles.net/3lo8e 







 


                                       
http://fileunlckr.com/93599             http://flamefile.com/93599 



http://redirectlock.com/93599                                            http://gripped.biz/93599


=======================OR====================

http://www.indihack.blogspot.com/p/blog-page_4.html







Hack Facebook | Phishing | Full Tutorial

Facebook Phishing full tutorial 





Step 1: The First Step in Making the site is to regester an account at www.1freehosting.com (if you have account than you can skip first 2 steps)



  Step 2: Now Goto your email account that you gave and confirm your account with confirmation  link

Step 3: Now Download this File
                                               
http://adfoc.us/22615841923257


Step 4: Now Go to http://cpanel.2freehosting.com/ and Log into your account.


Step 5: Now when you are logged into your account click on the Go to Cpanel and click on create a new account




Step 6 :  Select free hosting and click on the select button



Step 7 :  Enter your domain name and the following detail and click create
 Step 8 : click on the switch button.

Step 9 :  Go to file section  and click on file manager

Step 10 : click on install button

Step 11 :  wait till the file manager pops up.



Step 12 :  click on upload button and upload the downloaded file (mentioned above).


NOTE::: To access the input data ( Usernames and Password ) Goto the Following Address:

http://www.yoursitesadress.yzi.me/passes.txt

If I am not clear in any point Please ask me in comments below.

=============================================================
The Input Data (Email and Password) will look like following:



==============================================================
Now Facebook phishing page is successfully created