Ads 468x60px

RAVI PANCHAL

It's me rPanchal

Labels

Anti Virus (8) Blogger Widget (10) Hack (19) Hack IDM (1) Softwere (9) Windows (12)

Thursday, 24 May 2012

Reset Windows Password Advanced Edition v1.2.1.195




Lost password or locked Windows account is the most frequent problem data recovery specialists have to deal with. You could format the hard drive or reinstall your operating system, but that wouldn't keep you from partial loss of data, personal settings and extra headache. Besides, all that can take some time. There is a quicker and more elegant way out of this situation. Just run Reset Windows Passwords from a bootable CD or USB and reset the forgotten password or unlock the account. It's a matter of a few minutes! Reset Windows Password is the most powerful solution for recovering or resetting all types of Windows account passwords: user', administrator, Active Directory accounts, and domain administrators.
The program is designed specifically for an inexperienced user and is easy to operate. On the other hand, the password lookup algorithms are unique and not used in any similar application.
Unlike other utilities, Reset Windows Password is the only program that can CORRECTLY process all types of Windows accounts.

Features
Simple, intuitive graphic interface. No more ugly DOS prompts.
Resets and modifies passwords of local users and administrators, domain administrator, Active Directory users, DSRM account.
Enables and unlocks user accounts.
Disables the password expiry option.
Resets SYSKEY (with full user passwords re-encryption)
Advanced password lookup algorithms (also known as AI attack).
Dumps user password hashes from SAM for further analysis.
Dumps password hashes from Active Directory.
Dumps domain cached credentials.
Supports all versions of NT-based Windows, including the newest Windows 7.
All editions include the utility for creating a bootable CD/DVD/USB disk from the downloadable ISO file with the application.
Supports 64-bit Windows.
Large collection of IDE, SATA, SCSI, RAID drivers.
Detects several operating systems installed on the computer.
Supports non-English versions of Windows and passwords in national encodings.
Allows undoing changes made to the system.
Deletes passwords and other sensitive data from the computer.
Detailed help.

How it looks and works
Reset Windows Password - screenshots and documentation
Full list of the program features
Three simple steps to create a bootable CD, DVD or USB disk
Utility for creating bootable disks
Running RWP from the bootable disk
Modifying BIOS to boot from RWP disk, questions and answers

The software is available in three editions: Light, Standard and Advanced. The detailed list of features is shown below : www.passcape.com/reset_windows_password_editions Reset.Windows.Password.Advanced.Edition.v1.2.1.195.retail-iOTA

download

Hack Gmail Accounts


Hello Friends, Let's start this tutorial with some quotes " If you follow the Universe, the Universe will spoil you,So always make your own ways, let's other follow it and spoil themselves."

Today i will explain you How to hack Gmail account step by step. In my previous article i have explained you the basic technique involved inhacking Gmail account or password but not explained that in extended way but today i will disclose you how the hackers really hack the gmail accountor gmail password using fake pages or simply called Phish pages and the technique involved is called Phising. 

NOTE: THIS IS FOR EDUCATIONAL PURPOSES ONLY. DON'T MISUSE IT. 



Things that we will need:
1. Phish pages for Gmail Website.
2. A Free web hosting server to upload these fake pages.
 
3. An Email account for sending mails. ( create one fake email account for this as your account can be banned for doing such things).
 
4. HTML format mail that has to be sent to user ( you can post your email ID's below if you need the original version of this HTML mail. And please don't put your credentials in reply of this message).
 
Note: By using this hack i have hacked more than 5000+ accounts of gmail, yahoo, facebook, hotmail etc...As Hacking is my passion and i love to do it for fun. But friends i never misused this and hope that you will also not do that. As this tutorial is for Educational purposes and i and isoftdl.com is not responsible if you have misused it.
 


Now friends first all you should know what is phishing and how it is done..
 

What is Phishing?
Phishing is a technique to hack passwords of any user by using phish pages. Now what are phish pages, in general, phish pages are the fake pages that look likes the same web page the only difference lies in the METHOD and ACTION codes. In original webpage you are directed to database to that website but in fake pages you are directed to program that writes the log file that consist of username and password of the user. In fake page method function directs you to a php program that writes the log and simultaneously it redirects to original website and copy the username in the username column of original website and it shows that you have entered a wrong password and when you enter the password again then you are entered into the original website. So the user will never know that his account has been hacked, he will only think that he has entered wrong password. So isn't its a good trick.


STEP BY STEP GUIDE TO HACK GMAIL ACCOUNT

1. Download the phish pages ( fake pages for Gmail).
Click here to download

2. Now Extract the folder . After extracting you will get two folders namely:
 
  a. Gmail.com ( For all countries)   b. Gmail.de    (For Germany users)


3. Now open the Gmail.com folder. In this folder you will see three files namely:
 
  a. gmail.html   b. mail.php   c. log.txt
Gmail.html is the phish page that looks like original Gmail page, when user enters his credentials i.e. username and password, then it will be redirected to write.php file which will write username and password to log file and simultaneously redirect the user to original website, that will show you have entered wrong password.
 


4. Now Create a fake Gmail account for sending mails and creating account on free web hosting server.
 
How to create Gmail account without Phone verification?
 
Its pity simple to create Gmail account without Phone verification. At the time when you create new account, when you choose email ID (i.e. username ), choose it as much as unique or absurd that you can. Now create the account , gmail will not ask you for phone verification.
 


5. Now when you have created the fake account for testing this hack, you have to configure this email account setting. Login to fake Gmail account and click on settings. Then go to Accounts and Import and then in front of Send Email as  you will see edit info as shown in below snapshot.
 

hack gmail

 6. Now You have to create account on free Web Hosting website. The website that i will use to explain is         www.t35.com. When you open the website there you will see a button "START UR WEBSITE" click on that. Now you will see new page there enter the credentials and create account. Then go to your fake email address and validate the account.


7. Now login into your account in t35.com and Now click on New Directory as shown below:
 

hack gmail id


Then do as shown in this snapshot:
 

hack gmail account password


After confirming go back to main directory as shown:
 

How to hack gmail account




Now double click on Gmail folder on t35.com that we have created in previous step. Now you will be inside the Gmail Directory. Then click on Upload button as shown is figure:
 

hack gmail password


Now after confirming the files upload go back to main Gmail directory. Now there you will see three files and click on the open  in front of gmail.html file as shown below:
 

working gmail id hack


Now you will see the something awesome below:
 

how gmail hack works


8. Now we have created the fake page but its detectable. Let's make it more undetectable. For that go to the following website and copy the link in the URL box and Click on Next. As shown below:
 

gmail hacking software


Now after that enter domain name her like gmailvalidation.tk or gmail verify.tk or anything similar to that as shown... 




Now click Below to confirm as shown:

how gmail hack works

Now open the sample website you will see :(Click here)

9. Now Creation Part is over, now we have our link that we will send to the user. Now How we will send it to user. Open your fake email account that you have created in step 5 and step 6. Click on Compose mail and In Subject Enter "Notice: Please Verify your Gmail Account" ( without quotes).
And in body write something like that we have seen illegal activity from your account. please verify your account within three days other we have to lock your email account. For verifying visit here www.gmail.com and hyperlink link your fake mail address and send it to user.
 If you want to get the Original Mail, post your Email ID below in comment. I will mail you the original mail directly to your email. We can't disclose it directly on website.

10. Now just wait one day or few hours till user enters his credentials.(depends how fast the user reacts to the email). Once the user logs in to his Gmail account using your Phisher, his user ID and password are ours..And these are stored in log.txt What you have to do is just refresh your Web hosting account files. 

how to hack gmail accounts

11. The Log.txt file will contain the passwords and look like this:

gmail passowrd hacking
 

Thats all Now you have hacked the password of victim. I hope you all have Liked It.

There are other tricks to hack email accounts for this Click Here.
 

How to Protect Your Gmail Account From Phisher??
1. Always check the URL in the address bar before entering username and password.
2. Never follow any link from your email and any website until u have confirmed the Address bar URL.
3. Never Follow spam mails and "Win lottery or Cash" mails.

Windows.7.Activation



Download and install to your computer.
genuine Activation patch developed by famous cracker known as Orbit30 on internet. Windows.7.Activation is available for both version of windows 7 32-bit and 64-bit.

Download

Real Hide IP 4.0.7.2 Final




Did you know your IP address is exposed every time you visit a website? Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you. Real Hide IP allows you to surf anonymously, change your IP address, prevent identity theft, and guard against hacker intrusions, all with the click of a button.

Key Features
Easily Conceal Your IP Address
Anonymous Web Surfing
Advanced Application Support
Protect Your Identity and Stop Hackers
Un-ban Yourself From Forums, Blogs, Etc...
Prevent websites from tracking your online activities
Quickly delete all Internet Explorer and FireFox cookies
Automatically clear your cookies each time your IP changes.

download

How to Hack wifi or wireless networks Episode 1


Hello Friends, this year is going to end and so for
 ending this year their must be something special. 
So today i will explain How to hack wifi orwireless 
network in just 10 to 15 minutes. In this tutorial of
 hacking wireless network i will explain from very 
start means tutorial of extremely novice users and 
also explain the ways to protect your wireless 
networks from hackers. So guys read on...


hacking wifi, hacking wireless,hacking wireless modem

Topics that we cover in this tutorial:
1. Wifi or Wireless Scanning tools
2. Scanning the Wireless Networks or Wifi Networks.
3. WEP hacking and cracking tools
4. Cracking the WEP key of wifi or Wireless Networks
5. Wireless Sniffing Tools
6. Wireless Sniffing technique
7. Security Measures to protect yourself from these
 attacks.

Guys you must know everything that's why i am 
explaining each and everything in this tutorials related
 to wireless networks or wifi hacking. Its a complete
 wireless network hacking tutorial with all hacking
 tools and how to use them. Using these you will 
came to know how to hack wifi or wireless networks 
and note guys this tutorial is 110% working like 
other one's.
Note: This article is only for Educational Purposes
 so that you can understand the loopholes in
 wireless networks and fix them. Any misuse can 
result in disastrous consequences like cyber crime.

Don't worry everything is ethical till you misuses 
it. So always try to be ethical as far as possible.
 Lets start from the first topic...

1. WIRELESS SCANNING TOOLS
Scanning tools is needed to scan the wifi or 
wireless networks around you. First of all we
 need to scan all the wireless networks so that 
we can select the wireless network to hack. 
There are several wireless scanning tools but
 my favorite is NET STUMBLER. And for Mac
 operating systems is MacStumbler.
There are several Wireless scanning tools, 
a list of all wireless scanning tools is given
 below:
a. NetStumbler for Windows operating systems.
NetStumbler (also known as Network 
Stumbler) is a tool for Windows that facilitates
 detection of Wireless LANs using the 802.11b, 802.11a
 and 802.11g WLAN standards. It runs on Microsoft
 Windows 98 and above. A trimmed-down version
 called MiniStumbler is available for Windows CE.

NetStumbler is commonly used for:
  • Wardriving
  • Verifying network configurations
  • Finding locations with poor coverage in one’s WLAN
  • Detecting causes of wireless interference
  • Detecting unauthorized (”rogue”) access points
  • Aiming directional antennas for long-haul WLAN links


b. MacStumbler for Mac operating systems.
MacStumbler is a small utility to emulate the
 functionality of projects like netstumbler, bsd-airtools, 
and kismet. It's meant purely for educational or
 auditing purposes, although many people enjoy
 using these types of programs to check out how 
many WiFi (wireless) networks are in their area,
 usually known as "war driving".
MacStumbler only works with AirPort wireless 
cards, it does not (yet) work with any PCMCIA 
or USB wireless devices. 



c. Kismet for Windows and Linux.
Kismet identifies networks by passively collecting packets 
and detecting standard named networks, detecting 
(and given time, decloaking) hidden networks, and
 infering the presence of nonbeaconing networks
 via data traffic. Kismet is an 802.11 layer2 wireless
 network detector, sniffer, andintrusion detection
 system. Kismet will work with any wireless card 
which supports raw monitoring (rfmon) mode, and 
(with appropriate hardware) can sniff
 802.11b, 802.11a, 802.11g, and 802.11n traffic. 
Kismet also supports plugins which allow sniffing
 other media such as DECT.



d. Redfang 2.5
Redfang is an application that finds non-discoverable
 Bluetooth devices by brute-forcing the last six 
bytes of the device's Bluetooth address and doing 
a read_remote_name().
http://www.hacker-soft.net/Soft/Soft_4399.htm



e. THC-WarDrive
THC-WarDrive is a tool for mapping your city for 
wavelan networks with aGPS device while you 
are driving a car or walking through the streets.
 THC-WarDrive is effective and flexible,
 a "must-download" for all wavelan nerds.
  
f. PrismStumbler
Prismstumbler is software which finds
 802.11 (WLAN) networks. It comes with an 
easy to use GTK2 frontend and is small 
enough to fit on a small portable system.
 It is designed to be a flexible tool to find 
as much information about wireless LAN
 installations as possible. Because of its 
client-server architecture the scanner 
engine may be used for different frontends. 



g. Mognet
Mognet is a free, open source wireless ethernet 
sniffer/analyzer written in Java. It is licensed 
under the GNU General Public License. It was 
designed with handheld devices like the iPaq
 in mind, but will run just as well on a desktop
 or laptop to find wireless networks.



h. WaveStumbler
WaveStumbler is console based 802.11 network 
mapper for Linux. It reports the basic AP stuff like
 channel, WEP, ESSID, MAC etc. It has support
 for Hermes based cards (Compaq, Lucent/Agere, … ) 
It still in development but tends to be stable. It 
consist of a patch against the kernel driver, 
orinoco.c which makes it possible to send the
 scan command to the driver 
viathe /proc/hermes/ethX/cmds file. The answer
 is then sent back via a netlink socket. WaveStumbler
 listens to this socket and displays the output 
data on the console.



i. StumbVerter
StumbVerter is a standalone application which 
allows you to import Network Stumbler's summary 
files into Microsoft's MapPoint 2002 maps. The
 logged WAPs will be shown with small icons, 
their colour and shape relating to WEP mode 
and signal strength.



j. AP Scanner
Wireless Access Point Utilites for Unix - it's a set 
of utilites to configure and monitor Wireless Access
 Points under Unix using SNMP protocol. Utilites 
knownly compiles and run under Linux, FreeBSD,
 NetBSD and AIX.



k. SSID Sniff
SSIDsniff is a nifty tool to use when looking to discover
 access points and save captured traffic. Comes with a
 configure script and supports Cisco Aironet and random 
prism2 based cards.



l. Wavemon
Wavemon is a ncurses based application for wireless 
hardware. It`s running currently under Linux with cards
 witch supported by Jean Tourrilhes wireless extensions.
 You will find them in the Kernel 2.4. I used this tool a
 few times, it`s small, works, opensource and good.



m. Wireless Security Auditor
Wireless Security Auditor allows network administrators
 to verify how secure a company’s wireless network 
is by executing an audit of accessible wireless networks. 
Featuring patent-pending cost-efficient GPU acceleration 
technologies, Elcomsoft Wireless Security Auditor
 attempts to recover the original WPA/WPA2 -PSK
 text passwords in order to test how secure your wireless
 environment is.



n. AirTraf
AirTraf 1.0 is a wireless sniffer that can detect and 
determine exactly what is being transmitted over
 802.11 wireless networks. This open-source 
program tracks and identifies legitimate and rogue
 access points, keeps performance statistics on a 
by-user and by-protocol basis, measures the signal
 strength of network components, and more.



o. AirMagnet
AirMagnet WiFi Analyzer is the industry "de-facto" 
tool for mobile auditing and troubleshooting enterprise 
Wi-Fi networks. AirMagnet WiFi Analyzer helps IT 
staff quickly solve end user issues while automatically
 detectingnetwork security threats and other wireless 
network vulnerabilities.

you can also receive free email updates:

Related Posts Plugin for WordPress, Blogger...