Monday, January 31, 2011

A Beginners Guide To Ethical Hacking Book Winner

If you are a regular reader of RHA you might remember offer to Review My Blog & Get A Free Linkback which I offered for blogs with low page rank and low traffic, I have decided that I am ending this offer due to large number of requests and finally it's time to decide the winner of the contest as I promised to give my book "A Beginners Guide To Ethical Hacking" to the best reviewer.





The review which I liked most was from Ksub which you can read by visiting the link below:
http://newbiesway.blogspot.com/2010/12/analyzation-of-blog-newbies-analyzation.html

Congratulation Ksub you have just won a free copy of my book "A Beginners Guide To Ethical Hacking" Kindly leave your email in the comments section and claim your free book. I would also like to remind you that the last date of entry for the contest on Free Copy Of Facebook Hacking Course Worth 37$ is going to end on 7th February and the winners will announced on the same day if you haven't participated yet here is your chance to get your hands on my Facebook Hacking course

Sunday, January 30, 2011

Learn how to hack with the Hackers academy

How to hack?, I get this question asked daily, Lots of people are curious to learn Ethical hacking but they do not know where to start, Any one can become a fairly good Ethical Hacker if he/she can learn from basics and he/she should have a place to practice what he learned

This is where The Hacker's Academy comes into play, If you are a beginner or intermediate or advanced this is still for you, The Hackers Academy is one of the most professional online Ethical Hacking and penetration testing institute, one of the best parts of hackers academy i like is that they give you labs(A place where you can practice) so you can try the concepts for your self

The course will contain of audio recording and video recordings but the most important part is that once you are a member of hackers academy they will tell you exactly how you can create Labs so you can practice what you have learned.




If you get stuck some where then they have professionals 24/7 there to help you out with any problem you have or any question you have. The Hackers Academy course will also prepare you for different types of certifications, once you become a member of The Hackers Academy and I can say it surely that you will pass any type of Ethical hacking certifications and tests

The membership program also has a 30 day money back guarantee, so you have nothing to loose!, If you are unhappy with them, then they will return your every penny

So what are you waiting for, Don't wait until you loose your chance!Get it now!

Wednesday, January 26, 2011

All About Keyloggers - The Complete FAQ

A keylogger sometimes called a spying software is a small program which is used to monitor a local or a Remote PC, Keyloggers now a days are so easy to use that a person with even a basic knowledge of computers can use keylogger.Once a keylogger is installed in your computer it can monitor each and every keystroke typed on your computer, thus you can see how dangerous a keylogger can be.
Types of Keylogger

There are two types of Keyloggers:

1.Hardware keylogger
2.Software keylogger

Hardware keyloggers are rarely used now a days since you can monitor a Remote computer, Software keyloggers are the most widely used keyloggers as some of them support remote installaiton which means that you can monitor any computer anywhere in the World.


Can the victim detect it's presence once keylogger is installed in his/her computer?

Well it's really difficult for the victim to detect keylogger's presence as it runs in complete stealth mode, It hides it self from task manager, startup etc

Can I the victim trace you back?

Once the keylogger is installed, I think it's almost impossible for the victim to trace you back

How can I protect my self from keylogger?

A simple keylogger can be detected by even a lame antivirus, but sometimes the attacker can use methods like Crypting,Binding,Hexing etc, that make it harder for the Antivirus to detect the keylogger. So to counter that you should use a piece of software called sandboxie, Sandboxie runs the choosen computer program in an Isolated space so if the file you receive is a keylogger, You need no to worry because it won't affect your other programs, Firefox users can use the free version of keyscrambler which encrypts each and every keystrokes you type, so even if a keylogger is installed in your computer, You need not to worry as the attacker will receive the encrypted keystroke


Which Keylogger is the best?

With my experience of more than 4 years in the field of Ethical Hacking and security I suggest only two keyloggers which I think are best and have a comparatively low antivirus detection rate:

1.Sniperspy
2.Winspy


How do I find if a file is binded with a keylogger?

Keylogger can be binded with almost any file so how do you know if the file is binded?, You can use Bintext or Hex editor to find out, But Bintext and Hex editing method do not work effectively if the server is crypted so alternatively there is a great piece of software named asas "Resource hacker" that can tell you if the file is binded or not

Hope you had enjoyed reading the article.If you have any questions feel free to ask.

Sunday, January 23, 2011

Reverse Engineering Tutorial For Newbies - Part 3

This is the third part of my reverse engineering series, In the previous tutorial I demonstrated how you can fully register a software using reverse engineering , In this video I have also explained how you can fully register a software but the method is different and works for lots of softwares. Lots of people got confused in the previous part because it was quite difficult to understand so I made a video so you can easily understand it. Like always if you have any questions feel free to ask.

Requirements
 Disclaimer - By reading or following this tutorial you agree that this tutorial is for educational purposes only, RHA is not responsible for any damages caused by you

Saturday, January 22, 2011

Win A Free Copy Of Facebook Hacking Course Worth 37$

Hi Friends as you all know that I have just launched my new Facebook Hacking Course and i have already sold 500$ worth Video copies, I know that lots of people cannot afford this course and lots of people have asked me to give them a free copy of this course but it's not possible for me to give the Facebook hacking course to all of them, so there I have decided to arrange a contest in which I have decided to give 2 copies of Facebook Hacking Course to the lucky winners,


Eligibility


To participate in this contest you need to do the following two things:

1.Follow me on Twitter at rafayb1 and tweet about this contest
2.Become a Fan of Rafay Hacking Articles Fan page and suggest the fan page to your friends, You can read my post  Suggest Your Facebook Fan Page To All Freinds In Just One Click to suggest the Fan page to your friends in just one click

Note:After you have completed above tasks kindly leave a comment with your details.
  
Winner Announcement 

The lucky winners will be announced probably in the first week of Febuary!Wish you best of luck.

Friday, January 21, 2011

Spy On A Remote PC With Spytech Spyagent ( How To Guide)

Are you curious to see what your kids are doing when you are not around?, Do you want to know what your what is doing on her Pc? Are you Employees cheating on you?, Then you need not to worry because Spytech Spyagent is coming for the rescue.
Spytech Spyagent is an award winning spying software that allows you to monitor each and every activity done on a local computer or a remote computer, Spytech Spyagent runs in total stealth mode and once it is installed on victims computer it's almost impossible to detect it's presence

SpyTech SpyAgent Complete Installation Guide

Step 1

First of all Download Spytech Spyagent here, After downloading your copy of SpyAgent navigate to where you downloaded (in this case it is on the Windows desktop). Double click the SpyAgent installer file to start the SpyAgent install.


NOTE: After install is complete you can delete this file!

Step 2

Click through the installer until you come to this screen. This is where you choose the folder location for SpyAgent's install. We recommend you change this from the default (c:\program files\spytech software...) to the path below, or something of your own making. Make sure you remember this path to access the software!

Once you configure the Destination Directory, click the Next button.



Step 3

Click through the installer until you come to this screen. This is where you choose the install type for SpyAgent. If you want SpyAgent to not appear in the start menu and install the bare minimum files then choose the Stealth installation, as shown below. Click Next when you have done so.


Step 4

When you are done configuring the install you will be asked if you want to include an uninstaller. For total stealth choose NO - as shown.


Step 5

After your install completes you will now have to configure and run SpyAgent! Go to the START button on your desktop and click it once to bring up the Start menu. Choose the RUN... option to get the below window. You will have to enter your installation path (this is the same path from the installer that you just entered!) When you have entered it press OK.


Step 6 (optional)
Once you are in the install directory you will see the SpyAgent files below if you have chosen Stealth install. Now, Highlight the sysdiag.exe file as shown below!


Step 7 (optional)
Right click on the sysdiag.exe file and choose RENAME from the menu by clicking on it.



Step 8 (optional)

You will now be able to type a new name in for sysdiag.exe. As you can see below we chose to name it "snmp.exe". Use the below name, or something of your making to conceal SpyAgent's identity.



Step 9

After renaming you can now run SpyAgent by double clicking the file you renamed! You will be prompted to configure your password - do so. Once inside SpyAgent click on the 'GENERAL' button on the right side of the SpyAgent window. The below window will appear - enable the options exactly as you see in the below window.

After you configure the General options you can click the LOGGING tab and configure the logging options as well! When you are done click OK to save your options!



Step 10

Almost done! Now all that is left to do is click the Start Monitoring button that is highlighted below! You will be prompted for your password - enter it, and click OK. You will receive a notification message on how to bring SpyAgent out of stealth mode to later view logs - read this message carefully!

Now SpyAgent is in total stealth. When you restart your PC it will run invisibly as well. To stop stealth mode run the nostealth.exe in the SpyAgent installation directory, or press CONTROL+SHIFT+ALT+M on your keyboard to bring up the password window!



Which One Is Better Sniperspy Or Spytech Spyagent?

Well if you are a regular reader of the blog you might know that I am a big fan of sniperspy keylogger, The reason is because of it's features, One of the most important feature of sniperspy is that you can view your victims computer screen just like a live tv which is not included in Sptech spyagent, Where as spytech spyagent has a support for dual monitor screen logging which sniperspy probably dosen't.

Note:Installing computer monitoring tools on computers you do not own or do not have permission to monitor may violate local, state or federal law.

Tuesday, January 18, 2011

Dictionary Attack Video Tutorial

A Dictionary attack is a password cracking method which is done by trying every single word from a word list. A word list consists of large number dictionary words, Each word is tried against the password database. In the video below I have used a popular Cracking software called Brutus to show a Dictionary attack against my Ftp server. Brutus is a widely known Remote password Cracker it supports many types of attacks but in this video I will demonstrate a FTP attack.

Saturday, January 15, 2011

Wireless Network Security Basics

Wireless Networks are those in which the interconnection between devices is established without using wires. The nodes communicate using radio waves. The wireless adapter in a computer translates data in radio signals and transmit it. The wireless router receives the radio signals, decode it and sends the data to internet. Of course this process also works in reverse manner.
A wireless network is usually called as Wifi or WLan. The main advantages of Wireless Networks are that users are not bound to areas to plug into a Wall jack to connect to network and also it reduces the cost of cable used in Wired Networks.

The main disadvantage apart from network performance is lack of security. The wireless networks can be
easily compromised if they are not properly configured.

Basic Terminology 


Service Set Identifier (SSID) :It is an alphanumeric string that differentiates the wireless networks .It can be
maximum of 32bit. There can be more than one network in a certain range or on a same channel, SSID
differentiates one from another. Simply it is the name of a network.

Wireless Access Point(WAP)

It is the point from where wireless network signals are generated. WAP is a device that receives radio signals from computers in network and send them to router.

Basic Service Set Identifier(BSSID) 


It is the MAC address of WAP or wireless router. It is a unique 48 bit key.

Beacons : 


These are wireless packets which are broadcasted to maintain the connectivity between WAP and the computers in network. The WAP broadcasts beacons from time to time to check connectivity with computers.

What is Wireless Equivalent Privacy (WEP)?


WEP is an encryption scheme used to encrypt the WiFi data streams. WEP encryption uses a 64bit or 128bit key.
A WEP uses the combination of an encryption key and Initialization Vector (IV). IV is any 24bit random number and is attached to encryption key to make it difficult to crack.64bit WEP encryption uses a 40bit key and 24 bit IV. Similary 128bit WEP encryption uses a 104 bit key and 24bit IV.

The advantages of WEP

1. Authenticating Clients

The users/clients connection to the wireless network need to enter the correct WEP key to gain access to network.

2. Privacy


It protects the wireless data by encrypting them and allowing decryption by users who have correct WEP key.

The WEP key can be easily cracked by an attacker because size of IV that is 24bit is very short.The vulnerability in WEP is that an IV which is randomly generated is repeated after certain number of packets as it is short (24bit) and less number of combinations are possible.

Due to this insecurity, Wi-Fi Protected Access(WPA) and WPA2 security protocols were released. They provide more security by generating complex and dynamic keys which are hard to crack. The method of creating IVs and encryption keys was improved. WEP,WPA,WPA2 are secure in increasing order.

Basic Security Measures for Wireless Networks :

1. MAC filtering- The MAC address is theoretically a unique 48bit address by which a network device is
recognised. The administrator might let the only the particular clients to connect to network by checking  whether their MAC address is present in the list of registered MAC addresses or not. 


The drawback of this security mechanism is that administrator need to keep changing the list of MAC address according to new clients connecting and clients which have not been in use for a long time. This security mechanism can be bypassed by attacker by spoofing his MAC with already a registered one.

2.Hiding SSID


Do not simply broadcast the SSID. It lures the attackers or War Drivers to break into the networks. Wireless devices can only connect to WAP if the SSID is known.

3. Using encryption Keys 


Using an encryption scheme like WEP,WPA or WPA2 is must for Wireless  administrators. A WEP doesn't matter how long it is, can be cracked in minutes. So WPA or WPA2 is recommended.

4. Intrusion Detection Systems(IDS)


Completely securing a wireless is hard. But is easy to moniter what is going on in a network. IDS monitors traffic and alerts the administrator when something unusual is happening or traffic matches any predefined pattern of attack. Many open source products like AisSnare, Snort-Wireless,WIDZ etc are available for the same purpose.


About The Author

Aneesh M Makker is the owner of www.explorehacking.com, He has written several guest post on this blog, If you are interested in writing guest post kindly read the guidelines here 

Tuesday, January 11, 2011

How to Spy a Cellphone With Mobile spy

Every day I get a lot of emails from people asking how to spy on cell phone or How to hack a cellphone. To spy on a given cell phone all you need to do is install a good cell phone spy software on the target cell phone and once you do this you can silently record every SMS and information about each call. You can also see GPS positions every thirty minutes.


Why Mobile Spy?
There exists many cell phone spy softwares on the market and hence people often get confused about which cell phone spy software to go for. To make this job simpler for you we personally tested some of the top cell phone spy software's and based on the results we conclude Mobile Spy as be the best one.



Here is an overview of the entire process:

Mobile Spy is a hybrid software/service which allows you to monitor your smartphone in real time. This unique system records the activities of anyone who uses your compatible iPhone, BlackBerry, Android, Windows Mobile or Symbian OS smartphone. You install a small application onto your phone. It starts at every boot of your phone but remains stealth and does not show up in the running process list.


After the software is setup on your phone it will record an array of phone activities and then silently upload the data to your private Mobile Spy account using the Internet. When you want to view results, simply login to the Online Control Panel from any computer and enter your username and password to proceed.


Mobile Spy Features:


This powerful system gives you the ability to spy a cellphone and to monitor activities online in real time. Your logs are safely stored in your https-SECURED Mobile Spy account which is accessible only by you from any web browser using a username and password you create.


You can login anytime from any location to view results without needing access to the phone. The activities recorded are each described below. All activities include a date/time stamp and are searchable by phone number. All logs can be easily exported to CSV for importing to your database!


Calls Log


Each incoming and outgoing number is logged along with duration and time stamp.


SMS (Text Messages) Log


Every text message is logged even if the phone's logs are deleted. Includes full text.


GPS Locations Log


The device's current location is frequently logged using GPRS when signal available.


Web Site URLs Log


Each address visited in browser is logged. This feature is currently for iPhones only.


Log Summary


A summary of all activities can be shown along with separate viewers for each type.
The working of  Mobile Spy is very simple and needs no extra knowledge to install and use.

Step 1- After you purchase Mobile Spy you’ll get a link to download the software. Along with this you’ll get a username and password for you online control panel.

Step 2- Install the downloaded cell phone spy software onto the target cell phone that you want to spy on. After the installation, spy software starts recording all the activities on the cell phone.

Step 3- Login to your online control panel to see the logs containing the recorded information.
Mobile Spy is fully compatible with the following cell phones
  1. BlackBerry Phones
  2. Android Phones
  3. Apple iPhones
  4. Windows Mobile Phones
  5. Symbian OS 9.x and 8.x phones


Click Here for the Complete List of Compatible Phones. For more info on this product visit the Mobile Spy homepage with the link below
Mobile Spy Homepage


So what are you waiting for? Go grab Mobile Spy now and start spying on any cell phone within hours. Visit the following link to order Mobile Spy Now!

Mobile spy - The Cellphone monitoring software

Monday, January 10, 2011

Reverse Engineering Tutorial For Newbies - Part 2

This is the second post on reverse engineering series on RHA,In the previous post Reverse Engineering Tutorial For Newbies I showed you step by step how to crack an application so as if you enter the wrong password that program will think that it's the right password, However this is a bit advanced tutorial and in this tutorial I will tell you how you can fully register a program or software completly.The software I will use in this tutorial is Pixtopian Book
Disclaimer - By reading or following this tutorial you agree that this tutorial is for educational purposes only, RHA is not responsible for any damages caused by you

Requirements

1.Pixtopian Book
2.OllyDBG

Method

1.First of all download Pixtopian book and install in to your computer and open the Pixtopian book.

2.Now first of all we will look at the limitations of unregistered version of Pixtopian book:

a).You cannot add more than three groups and if you try to add more groups it will give the following error:

"You,ve reached the limit of three groups. Please Register Pixtopian book today!"



b)You can only add 4 Contacts/Name, If you try to add 5th name it will give the following error:

 You,ve reached the limit of 4 enteries per group/ Please register PixtopianBook today!

3.Now open Pixtopian book in OllyDBG

4.Now Right click there goto search for and click on All refrence Text strings


5.Right click there and click on Search For and search for "You,ve reached the limit of three groups" once you have found it double click it


6.Scroll above and you will see the following line:

"CMP EAX.3"

This line compares how many groups you put in with 3 if the group exceeds 3 then it gives the error message which is "You,ve reached the limit of three groups" but if you don't have three groups this condition will jump to the line JL SHORT 00408B34 and this will make it jump to 00408B34


So inorder to make this esc both errors we will Change JL SHORT 00408B34 to JMP SHORT 00408B34 so this will always esc the errors and this will make not a conditional jump any more

7.Now change the value of  JL SHORT 00408B34 to JMP SHORT 00408B34 and click assemble and click the blue button at the top.

8.After you click play you will end up in the following line 760642EP , The program will still not run because it has a very little range.

9.Now to increase range we will go to Options - Debugging options - Exceptions and there click on "add range of exceptions" and enter the range to "000000" and in the form "Last exceptions in range" we will enter "CCCCCCCC" Click Ok and tick also "Ignore also the following custom exceptions and ranges"


10.Now restart the program and follow again follow the steps 1-5 and again change JL SHORT 00408B34 to JMP SHORT 00408B34 start the Program and it will work and it will work for you and you can add more then 4 Groups and for adding more names repeat the above steps again.

Hint:Search For the error "You,ve reached the limit of 4 enteries per group/ Please register PixtopianBook today!"
And you are done.

Hope you have liked the tutorial, If you have questions feel free to ask me.

Thursday, January 6, 2011

Reverse Engineering Tutorial For Newbies

In simple words reverse engineering is the act to modify the code of of the application to make it work our way, Reverse engineering a very complicated topic and is very difficult to understand for newbie's as it requires a prior knowledge of assembly language, However in this article I will show you step by step how you can crack an application with reverse engineering.

Requirements

You will require the following things:

1.OllyDBG
2.Crack Me App

Method

1.Once you have downloaded both OllyDBG and Crack Me App start the crack me app

2.Enter any password click ok

3.You will the following error

You are not authorized to use the application


4.Now open OllyDBG and open the Crack me app in it.


5.Now once you have opened the crack me app in OllyDBG, Right click there and goto search and then click on "All Reference Text Strings"

6.Now Right click there and click on "Search For text"

7.Search For the error which you got when you tried to log into the application ("You are not authorized to use the application")

8.Once you have found the error click on it and you will be bought to the following screen:

9.Now as you scroll upwards you will find the following line:

JE SHORT Password.00457728

This is a conditional jump which means that if the condition is right then it will jump to 00457728 Which leaves us to the message "You are not authorized to use the application" and if the condition is not satisfied it just continues reading the code, So we don't want this jump to work as we don't want to get the error message

Now there are two ways to remove this message:
  • We can either fill it with NOP's and make this conditional jump not work
  • 2.Or we can change JE SHORT Password.00457728 to JNE SHORT Password.00457728, JNE(Jump If Not Equal) means that if the password is correct it will give you the bad message and if the password is incorrect it will give you the correct message
You can use any methods it's your choice, Now in this tutorial I will use the second method to use the method follow the steps given below:

1.Double click the line JE SHORT Password.00457728 and simple change it to JNE SHORT Password.00457728 and click assemble



2.Next Press the blue play button at the top which will start the application

3.Now just enter the password and it will give you the correct message.


I hope this tutorial will be helpful to clear the basics of reverse engineering and application cracking, However in the upcoming tutorials I will go in a bit advanced.

Review My Blog & Get A Free Linkback

Recently RHA(Rafay Hacking Articles) showed tremendous increase in traffic and daily traffic has reached to almost 10000 unique visitors per day plus RHA has became a PR 4 blog too, As a result of which I was getting lots of request for link exchanges from site owners, The minimum requirement for a Link exchange is this blog is a Page rank 3 website,so as a result of which the lower PR websites could not exchange links, but I have a perfect solution for webmasters with lower Page rank or with no page rank

The concept is simple - review my blog and I'll link to you. The review must be at least 200 words long and you have to include a link to the blog home page and this post, Also state what you like and don't like about the site, It does not matter if the review is in English or your blog/website is covers other categories, I will accept all reviews

Your Link will be placed on the following page:
http://rafayhackingarticles.blogspot.com/2009/03/link-to-us.html


Requirements
  • Minimum PR 1 or If you blog has no page rank it should have atleast 200 daily unique visitors
  • Review should be atleast 200 words
  • You have to include a link to the blog home page and this post
Best Review wins a copy of My Book

Yes the best review wins a copy of my book "A Beginners Guide To Ethical Hacking" along with all bonuses

Update

Winners Announced here

Tuesday, January 4, 2011

Facebook Hacking Course Released

After the sucess of my book "A Beginners Guide To Ethical Hacking" I am presenting you my next Product "Facebook Hacking Course", Facebook hacking Course is basically contains series of videos which will tell you exactly how hackers hack facebook accounts, What methods they use and how you can avoid falling for these kinds of attacks, You will watch my computer screen as I show you exactly how it's done, Each video contains a pre made lab so you can practice what you learned



 Facebook Hacking Softwares 

Lots of people are interested in learning how hackers hack facebook passwords and you might have came across lots of options and the first one would probably be a program or software which has an ability to hack Facebook passwords but the truth is that there is no such simple program or software that can do it for you, The reason behind it is that these major companies pay thousands of dollars to protect their users privacy, Do you honestly think this is possible?, Do you think that they don't have any protection and security officials to knock down such softwares, So Stop fooling your self and stop searching about these so called "Facebook Hacking softwares"

Facebook Hacking Services

The second option which people come across is that they go for Facebook Hacking services which promise to hack facebook accounts for you for money but the truth is that no one is going to do it for you, their purpose is just to scam you and take money.

What will be I learning in Facebook Hacking Course?

You will learn:
  • The exact techiniques which hackers use to hack facebook accounts.
  • Security tips to protect your facebook account from getting hacked.
  • Protecting your Privacy
And much more.

Bonus


By buying this facebookhackingcourse you will get the following bonus:

1.Secret Anonymizing Techniques

This section will contain 2 bonus videos which will tell you the exact methods used by hackers to hide their identity while doing malicious things online

2.Direct Email Access and support

If you get stuck or don't understand any thing presented in the course, I will help you no longer how much time it takes, however this offer is for limited time only

So What are you waiting for go and grab your hands on Facebook hacking course and learn Facebook hacking and security right now.

Click here to visit the official website

Google Bangladesh Hacked By Tiger Mate

bdnews24.com(Online Newspaper) has reported that Google Bangladesh has been hacked, It was hacked by a hacker named "Tiger Mate", A CTO of a local ISP, has confirmed the the Google Bangladesh was hacked
It's really amazing to see that the hacker managed to penetrate the Google, This hack will surely arise security concerns in bangladesh.
However it seems that some of the visitors see a defaced Google Bangladesh page and to some of the users it appears normal.According to zone-h, The bangladeshian hacker "Tiger Mate" has been very active and has hacked some high profile websites in the past such as bangladesh airtel and local american express website.

Monday, January 3, 2011

WikiPak.org - A Free Pakistani Encyclopedia

Wikipak.org is a non profit organization co-founded be me with Mr Khawar Junjoi, Wikipak.org is a wiki of Business, People, Biographies and Places in Pakistan.wikipak.org is developed on purpose to help Pakistani People to know more about their country and to find all things in one place, Kindly help us grow it by contributing an article

You can Make your valuable contribution to wikipak in just 5 short minutes, However before you contribute to wikipak you should be aware that Wikipak copyleft allows your contributions to be used elsewhere, edited by others, and even copied or sold as long as you are given proper attribution
What To add?You can add almost anything such as attraction, park, view, Biography restaurant and even your own introduction after you contribute for at least one article.

Read More:WikiPak:Quick contribution guide

Beware - New Hotmail Account Scam Alert

Every day I hear people complaining that their hotmail account is hacked, Now as I have told couple of times before in my previous posts related to email hacking that there are only two foolproof methods i.e. Phishing and keylogging which are mostly used to hack email accounts.
Today I received an email in my hotmail inbox the email looked as it was from "Windows Live Team" and the subject of the email was "Hotmail Account Alert"



Here is the screen shot of how the email looked like:


"Dear Account Owner


Due to the congestion in all Windows Live Account we are removing all unused Account, Windows Live would be shutting down all unused and unconfirmed Account, You are hereby ask to confirm your Account by filling out your Login Information below after clicking the reply button. Your Accounts will be suspended within 48 hours for security reasons if you refuse to reply this message.


* Username:
* Password:
* Date of Birth:
* Country Or Territory:


After following the instructions in the sheet, your account will not be interrupted and will continue as normal. Thanks for your attention to this request. We apologize for any inconvenience.


Sincerely,
The Windows Live Team"
If any one of you have received these kinds of emails, The email is 100% Fake and it is not from a Windows Live team and is a attempt to hack your hotmail or any other password, Hotmail and windows live team employees will never ask for Password,

It's quite impressive to see that Hackers now a days instead of using complicated methods such as Phishing and Keylogging are using social engineering to get the work done, because now a days lots of modern browsers have Phishing filter by default so these types of attacks get detected easily and hackers do not want to waste their time in making the servers Fully Un detectable(FUD), instead they are using a simple social engineering attack which does require any softwares and other resources.

Have you ever received these kinds of email scams?