Tuesday, June 24, 2014

Airtel free internet hack 2014




Follow the steps to use free internet in airtel :-

  • First Download vpn from your-freedom.net
  • Register your account 
  • Make sure you remember your user name and password that you must use to login into vpn.
  • Now open the downloaded vpn


  • Select Configuration under action


  • Enter as given in the above picture (server connection)
  • In proxy settings enter as mentioned in above diagram.
  • Go to Account Information and enter your username and password.
  • Now click Save and exit
  • Now open Your Freedom  vpn, select port option and enter as mentioned in the image given below.








  • Now go to your browser(chrome or firefox ) .Go to proxy settings and enter the proxy as 127.0.0.1  and enter the port as 1234.
  •  Now connect your airtel modem (normal connection).
  • Go to status in vpn and select Start Connection.
  • Now you can access free internet.









Control Others Computer | indihack

How to control or hack friends computer using Darkcomment?












  • First download the dark comment file from the link given at the end of the post.  Remember this is only for educational purpose.
  • After downloading you will see in socket /net tab listening to 1 port. You can listen to same port or You can change the port.


  • Now click on the dark comment rat and click server module and select full editor.



  • Now you will see some settings which is mentioned above.



  • Now go to network settings and add your port which you are listening as mentioned before.



  • This stubing will not allow the user to to delete the file which you created .
  • You can also display the warning message when the user clicks on the virus created by you.
  • By enabling this You can disable the functions which is mentioned above.
  • You can also activate the key logger so that you can receive logging as email.

  • you mus tadd the line that is ip address to continue virus.
  • Next is to blind file that is to set your virus in soe file .  When the user click your file your virus will enter his system and You will get control of it.
  •  After blinding you can choose the icon for your file.

  • Now click build to stuff .  A box will appear which will promt you to select the path to save the virus.
  • After saving you can give it to your friends remember not to close dark comment. when your friend double click on it you will receive a message as below
  • Now  you will see user as given below.

 
  • Now right click on the above user and select control socket .Now You can control the computer from here.



You may also like : Airtel Free Internet Trick

 


 



                   http://fileice.net/download.php?file=3lo8e                  http://quickdl.net/3lo8e 




http://swiftdownload.net/3lo8e                             http://zoomfiles.net/3lo8e 







 


                                       
http://fileunlckr.com/93599             http://flamefile.com/93599 



http://redirectlock.com/93599                                            http://gripped.biz/93599


=======================OR====================

http://www.indihack.blogspot.com/p/blog-page_4.html







Sunday, June 15, 2014

Ethical hacking kit Free download|indihack

Download EC Council Ethical Hacking Kit CEH $300 in Free.

EC Council CEH V6 Video and Ebooks kits. Over 5000 Members downloaded in last 3 weeks. These Ebooks containing 67 Modules Hacking tricks and method with full tutorial.. and video Kit containing 30 attack with clear and perfect way in 720p HD video. with additional Ebooks kits cost $300 but we providing for free to all APAJR Lab readers. All kits information and Modules detail given below.
                


 
EC Council Ebook's Modules

Module 1 - Introduction To Ethical Hacking
 
Module 2 - Hacking Laws

 
Module 3 - Footprinting

 
Module 4 - Google Hacking

 
Module 5 - Scanning

 
Module 6 - Enumeration

 
Module 7 - System Hacking

 
Module 8 - Trojans & Backdoors


Module 9 - Virus & worms

Module 10 -
Sniffers

Module 11 - Social Engineering


Module 12 - Phishing


Module 13 - Hacking Email Accounts


Module 14 - Denial-of-Service


Module 15 - Session Hijacking


Module 16 - Hacking Web Servers


Module 17 - Web Application Vulnerabilities

 Module 18 - Web-Based Password Cracking Techniques

Module 19 - SQL Injection

Module 20 - Hacking Wireless Networks

Module 21 - Physical Security

Module 22 - Linux Hacking

Module 23 - Evading IDS, Firewalls and Detecting Honey Pots

Module 24 - Buffer Overflows

Module 25 - Cryptography

Module 26 - Penetration Testing


Module 27 - Covert Hacking


Module 28 - Writing Virus Codes


Module 29 - Assembly Language Tutorial



Module 30 -  Smashing the Stack for Fun and Profit

Module 31 - Windows Based Buffer Overflow Exploit Writing


Module 32 - Reverse Engineering


Module 33 - MAC OS X Hacking
 
Module 34 - Hacking Routers, cable Modems and Firewalls

 
Module 35 - Hacking Mobile Phones, PDA and Handheld Devices

 
Module 36 - Bluetooth Hacking

 
Module 37 - VoIP Hacking

 
Module 38 - RFID Hacking

 
Module 39 - Spamming

 
Module 40 - Hacking USB Devices


Module 41 - Hacking Database Servers

Module 42 -
Cyber Warfare- Hacking, Al-Qaida and Terrorism

Module 43 - Internet Content Filtering Techniques


Module 44 - Privacy on the Internet


Module 45 - Securing Laptop Computers


Module 46 - Spying Technologies


Module 47 - Corporate Espionage- Hacking Using Insiders


Module 48 - Creating Security Policies


Module 49 - Software Piracy and Warez

Module 50 - Hacking and Cheating Online Games

Module 51 - SQL Injection

Module 52 - Hacking RSS and Atom

Module 53 - Hacking Web Browsers (Firefox, IE)

Module 54 - Proxy Server Technologies

Module 55 - Data Loss Prevention

Module 56 - Hacking Global Positioning System (GPS)

Module 57 - Computer Forensics and Incident Handling

Module 58 - Credit Card Frauds


Module 59 - How to Steal Passwords


Module 60 - Firewall Technologies


Module 61 - Threats and Countermeasures



Module 62 -  Case Studies

Module 63 - Botnets


Module 64 - Economic Espionage


Module 65 - Patch Management

Module 66 - Security Convergence



Module 67 -  Identifying the Terrorist


========================================================================

Addtional kits contains about vulnerablity, internet scanning, tracing, online marketing and much more.

Download this EC Council from the link given below and learn about hacking in a detailed manner.


 


 



                   http://adfoc.us/22646343480153                  http://adfoc.us/22646343480185 




http://adfoc.us/22646343480191                             http://adfoc.us/22646343480199 







 


                                       
http://adfoc.us/22646343480108             http://adfoc.us/22646343480103 



http://adfoc.us/22646343479980                                            http://adfoc.us/22646343480103


=======================OR====================

http://www.indihack.blogspot.com/p/blog-page_4.html







Monday, June 2, 2014

How to Play Android Games on PC | BlueStacks


http://infocurse.com/wp-content/uploads/2013/11/Android1.jpg









Android is becoming a very Popular Operating System in Smartphones due to the availability millions of apps in the Google Playstore.The Main reason for the Growing Success of Android OS is its amazing apps and High Quality Games of which most of them are available for free.Play Subway Surfers on PC Because of these high quality apps and games you need to have a Powerful Android Smartphone to run these apps smoothly on your devices but on the same side these Powerful Android Smartphones costs a lot which are not affordable for everyone. If you want to buy Android Smartphone just for enjoying the Android apps or Games therefore i am going to Provide you a Different platform to enjoy these apps just for free.Use Whatsapp on PC Here in this Post I am going to Tell you How to Play or Run these Android Games on Your PC/Computer without spending money on Android Smartphones.You can Run any Android app or game on your pc using the BlueStacks.Here below is a Step by Step Guide on How to Play Android Games on your PC using BlueStacks a Free Emulator to Play your Favorite Android Games on PC.


Hack website using havij

Download havij and hack website


http://samsclass.info/124/proj11/havij-21.png                                       


















Step1: Find SQL injection Vulnerability in a website and insert the string (like http://www.target.com/index.asp?id=123) of it in Havij as show below.(You Can Find Vulnerable WEbsite Using Automatic Scanner Like Acunetix Web Vulnerability Scanner 8. I will Show You How To Use It In My Next Article  

Download Acunetix 8.0

Download Acunetix 8.0 to scan for website vulnerability


https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrYKkrVhNMP7uYCWPtusXt8WTea0JTV7R8TF3LiB-7gP_sGTIVnbg9e-nilhxDMWiEuRkNWoBnvsw0-PuUFGRvSXf8nslqFOO4Fsl9EddVBx_-mig7nyF8wJZhQGY02airo7AWvBxX0Yw/s1600/Acunetix.Web.Vulnerability.Scanner.CE.jpeg

                                          Most Popular Vulnerability Scanner

Features At a Glance :- 


* Manipulation of inputs from URLs:
Acunetix WVS can automatically identify URL parameters and manipulate them to detect vulnerabilities. This technology is not present in any other competing vulnerability scanner.
Replace manual intervention with scanner intelligence* Automatic custom 404 error page identification:
Acunetix WVS 8 can automatically determine if a custom error page is in use, and recognizes it without needing any recognition patterns to be configured before the scan.
Interpret IIS 7 rewrite rules automatically
Using the web application’s web.config file, WVS 8 can automatically interpret rewrite rules without requiring any manual input.
Fix vulnerabilities while locking hackers out