HOW TO USE HAVIJ

                     HOW TO USE HAVIJ              


step 1) go to :- download Havij+1.152+Pro.rar

step 2) install HAVIJ


step 3)go to:- download Havij+1.152+Pro.rar

step 4) http://pastebin.com/4ha3m185

step 5) copy any 1 line

 step 6) paste that line in www.google.com

stpe 7) take any 1 link that has "id=45" (any number)
                   for eg:-http://www.soaw.org/new/article.php?id=612


Any site that has id as any number only and only numbers that can be used in havij application to hack
id=must not contain any symbols(~!@#$%^&*()_+<>?:"{}|`\][=-;'./)   and must not be any alphabetical letters/words (qwertyuiopasdfghjklzxcvbnm)          
step 8) past that link in havij TARGET

step 9) Click on analyze




How to remove pdf pwd


Method 1 of 10: Finding What is Restricted

  1. Unsecure a Secure PDF File Step 1.jpg
    1
    Open the PDF file. If you need a password to open the file, then you will need to download encryption-breaking software. This method is very CPU-intensive, and even the simplest passwords can take days to crack, leaving your computer unable to perform any other tasks during that time. For highly-encrypted passwords, there is little chance that it can ever be cracked.
    Ad
  2. Unsecure a Secure PDF File Step 2.jpg
    2
    Check the security. If you don’t need a password to open the file, you can see if a file is secured by looking for the padlock icon. This is located at the top of the left bar if the document has security. Click the icon to see what is restricted.
    • Try copying. Restricted documents are often protected against copying. If you can’t highlight or copy any text, then the document has been restricted.

How To Add Rainbow Color Effect To Your Blog Links On Mouse Hover

How To Add Rainbow Color Effect To Your Blog Links On Mouse Hover

 

How To Make Bootable Pendrive?

How To Make Bootable Pendrive?


Steps To Make Bootable Pendrive

Step 1: Insert your pendrive in USB Port

Step 2: Navigate to Start>>Run[OR press Ctrl+R] and type cmd and press Enter to open Command Prompt. |Windows Vista and Windows 7 users will have to navigate to Start>>All Programs>>Accessories>>Right-click on Command Prompt and select Run as Administrator|

Step 3: In Command Prompt type DISKPART

Step 4: The next step is to type LIST DISK and press Enter

 Step 5: Observe carefully, you will see Disk 0 normally this is your Hard Disk Find your USB Device number, In my case Disk 1 is my USB pen drive Please note that Disk 1 may not pen drive in your case, so be careful with this step

Step 6: Now type SELECT Disk 1 and press Enter


Change the start button in Windows XP


Change the start button in Windows XP


Picture of Change the start button in Windows XP 
In this step-by-step guide, you'll be able to change the text in your start button to whatever you'd like!

 


Step 1: Begin

Disclaimer: I am not liable for any damage done to your computer system at all. This process is a registry hack, and if you mess up royally and do not back up your system properly, you could ruin your system. That said, this is incredibly simple to do considering I am only a teenager.

Start by backing up your entire computer, if you haven't done so already. (Just in case)

Step 2: Download the program

Picture of Download the program
to do this mod, you will have to download Resource Hacker, a freeware program that lets us manipulate the Windows registry.

go to http://www.angusj.com/resourcehacker/ and then download the europe version.

Step 3: Use Resource Hacker!

Picture of Use Resource Hacker!
Now you will open up Resource Hacker. Go to File>Open>explorer.

BackTrack 5

BackTrack 5

 

  The highest rated and acclaimed Linux security distribution to date. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack your primary operating system, booting from a LiveDVD, or using your favorite thumbdrive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.


General Information :
  • Developer: BackTrack Linux
  • License/Price: GPL / FREE
  • Version: BackTrack 5,R1,R2,R3

Download link  BackTrack 5,R1,R2,R3

Top 10 Facebook profile hacking techniques!

Top 10 Facebook profile hacking techniques!

1. Phishing

Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim login through the fake page the, the victims "Email Address" and "Password" is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.

2. Keylogging

Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Keylogger is basically a small program which, once is installed on victim's computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.

3. Stealer's

Almost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealer's are software's specially designed to capture the saved passwords stored in the victims Internet browser.

DOS Attacks and Free DOS Attacking Tools


DOS Attacks and Free DOS Attacking Tools

The denial of service (DOS) attack is one of the most powerful attacks used by hackers to harm a company or organization. Don’t confuse a DOS attack with DOS, the disc operating system developed by Microsoft. This attack is one of most dangerous cyber attacks. It causes service outages and the loss of millions, depending on the duration of attack. In past few years, the use of the attack has increased due to the availability of free tools. This tool can be blocked easily by having a good firewall. But a widespread and clever DOS attack can bypass most of the restrictions. In this post, we will see more about the DOS attack, its variants, and the tools that are used to perform the attack. We will also see how to prevent this attack and how not to be the part of this attack.

What Is a Denial of Service Attack?

A DOS attack is an attempt to make a system or server unavailable for legitimate users and, finally, to take the service down. This is achieved by flooding the server’s request queue with fake requests. After this, server will not be able to handle the requests of legitimate users.

In general, there are two forms of the DOS attack. The first form is on that can crash a server. The second form of DOS attack only floods a service.


DDOS or Distributed Denial of Service Attack

This is the complicated but powerful version of DOS attack in which many attacking systems are involved. In DDOS attacks, many computers start performing DOS attacks on the same target server. As the DOS attack is distributed over large group of computers, it is known as a distributed denial of service attack.

How To Hack Wi-Fi WPA/WPA2 Password With Backtrack 5 .

How To Hack Wi-Fi WPA/WPA2 Password With Backtrack 5 .


certain things to be followed..such as creating virtual machine!!!running in your OS if you have windows..!!



                 
  •  press enter......go on



HOW TO HACK FACEBOOK / EMAIL PASSWORDS USING USB/PEN DRIVE

HOW TO HACK FACEBOOK / EMAIL PASSWORDS USING USB/PEN DRIVE


Hey guys welcome back  , one of my friends asked me about "How to hack passwords using USB/Pen Drive" , today I will show you how to hack Passwords using an USB Pen Drive.
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windowsmessenger etc.




Along with these, Windows also stores passwords of Outlook Express, SMTP, POP,
FTP accounts and auto-complete passwords of many browsers like IE and Firefox.
There exists many tools for recovering these passswords from their stored places.
Using these tools and an USB pendrive you can create your own rootkit to hack
passwords from your friend’s/college Computer.

We need the following tools to create our rootkit:

MessenPass : Recovers the passwords of most popular Instant Messenger programs:
MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL
Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

INTERNET DOWNLOAD MANAGER FULL VERSION + CRACK (6.19.1)


INTERNET DOWNLOAD MANAGER FULL VERSION + CRACK (6.19.1)

internet download manager 6.19.1 cracked
internet download manager (idm)


DOWNLOAD FROM HERE [ Idm 6.19.1 ]
Internet Download Manager can help you accelerate your downloads. It works by creating various threats so that multiple sections (up to 16) of the same file can be downloaded at the same time. In addition, it lets you pause and resume your downloads, an action that is not always available from regular procedures.

The application features an intuitive interface, in which several categories arranged in a tree-like fashion. Moreover, various skins are downloadable to adapt the program’s appearance to your liking.

Hacking a website using SQL injection:Full method with Pics

Hacking a website using SQL injection:Full method with Pics

Today i am gonna show you how to hack a website using sql injection.To find SQL vulnerable sites refer to this post.
 
Now Lets start---->
Things you will need -->
1. Havij SQL injection Tool, download it from here(Run as Administrator)
2. A sql vunerable site, I am taking this site http://toyonorte.com.co/catalogo_nuevos_detalle.php?id=2 as an example.
3. A very important thing i.e mind.
Checking for sql vulnerability --->
Here i am taking http://toyonorte.com.co/catalogo_nuevos_detalle.php?id=2 as an example. 
Now to check is this site vulnerable to sql, I will simply add ' after the site url
like this http://toyonorte.com.co/catalogo_nuevos_detalle.php?id=2'
and i get this error on the site
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\'' at line 1
It means that site is vulnerable to sql injection.
Exploiting the vulnerable site ---> 
1. Open Havij and paste site url in target field and hit enter
.
2. Now wait for Havij to get all the databases of the website.

3. Now click on available databse of site and click on Get Tables like i am gonna select 535480_toyonorte of my site like in image.


4. By clicking Get Tables Havij will look after the tables available in the database.

Superscan 4.0

Superscan 4.0




 
 
Superscan 4 by Foundstone is a very useful program to find open ports in the target IP address.
You may consider it as alternative for "NMap" (Netwok Mapper), but NMap is still the best.

Other than port scanning, Superscan 4 has may more tools:
Hostname/IP Lookup

Ping