Search This Blog

Thursday 7 July 2011

How To Hack Orkut?







Ever wondered how to hack Orkut account? Well, here are some of the ways through which you can gain access to Orkut account.

Google uses a 4 Level Orkut login feature which makes it difficult to hack it using brute force attack. Hence, it is almost impossible to use the brute force approach to gain access to Orkut account. Before we discuss on how to hack Orkut, let us take a look at the 4 level secure login feature of Orkut account.


First Level - Security-SSL or 128 bit secured connection

Second Level - Orkut account checks for the presence cookie in the user’s system

Third Level - Orkut provides a redirection to the entered User information

Fourth Level - Orkut doesn’t use conventional php/aspx/asp coding. So, it is impossible to hack Orkut using input validation attack!!!

So, it is not an easy task to hack Orkut by breaking this security! However, there are some people who still manage to gain access to other’s Orkut accounts. The question concerned is how they do it?

Many of them just use simple tricks that fool users by making them to leak out their password by themselves. Read on to discover the tricks used by hackers to hack Orkut account.


Ways to Hack Orkut Account

1. Using a Keylogger is one of the Easiest Way to Hack Orkut password. Keylogger programs can spy on what the user types on his/her computer keyboard. A Keylogger program operates in a complete stealth mode and thus remains undetected. Hence, the victim will never come to know about it’s presence on his computer.

A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer’s keyboard. A keylogger program is widely available on the Internet. One of the best is listed below:

SniperSpy

A detailed information on keylogger hack can be found in my post on How to Hack an Email Account.


2. Phishing Attack is the most popular way of hacking/stealing other’s password. This attack works by using fake login pages (login pages that look exactly same as that of Orkut, but a fake one) to fool innocent users to enter their Orkut username and password in these fake login pages instead of the real ones. When the users land on a fake login page, they enter their Orkut username and password thinking it to be the real one, but actually, it is other way round. It submits all the entered details to the creator (usually the hacker) of the fake login page.


3. Orkut New Features Trick: Some websites on Internet claims to offer many additional features for Orkut users. Usually, these websites will offer a login page from their own website and force users to login to their Orkut account from this page itself inorder to gain access to the additional features. In fact, these websites are nothing more than a scam. They simply take away your login details when you enter your Orkut username and password on their pages. This is somewhat similar to that of phishing attack.


4. Community Links: Many times you are provided with a link to a community in a scrap. Read the link carefully, It may be something like http://www.okrut.com/Community.aspx?cmm=22910233 OKRUT not ORKUT. This is definitely a trap created by the hacker to hack your Orkut password. Clicking on this link will take you to a fake login page where you end up losing your password.


5. Java script: You must have seen the circulating scraps that asks you to paste a certain code (javascript) onto your address bar. Well, sometimes these scripts will hijack your session by stealing your cookie. So, it is better to avaoid running any unknown script from your orkut account.

So, I hope that this article will not only teach you how to hack Orkut, but also tell you how to protect your Orkut account being hacked.




Wednesday 6 July 2011

Inside GoOgLe – A Collection of Strange Links on Google







Although Google is a search engine, it’s also a website. It has millions of it’s own pages indexed in it. When i was digging deep inside Google i found some strange links inside it. So I decided to compile a list of strange Google links. Enjoy!



1. If you ever wondered all the misspellings of Britney Spears and their volume, you must check this out.
http://www.google.com/jobs/britney.html

2. These two links are to fun Google games
http://www.google.com/Easter/feature_easter.html

http://www.google.com/heart/heart01.html

3. Quench your thirst for knowledge with Google Gulp
www.google.com/googlegulp

4. Check out Google’s latest ideas
http://www.google.com/experimental

5. If you are fond of puzzles
http://www.google.com/puzzles

6. Tribute to Moms
http://www.google.com/moms01

7. Google Mobile maps
http://www.google.com/mobile/gmm/index.html

8. http://www.google.com/tofc

9. Are you scary smart?
http://www.google.com/scarysmart

10. Google press center
http://www.google.com/press

11. Google apps
http://www.google.com/a/help/intl/en/var_0.html

12. Mind-racing problems
http://www.google.com/indiacodejam

13. Doodle 4 Google
http://www.google.com/doodle4google

14. The virgle
http://www.google.com/virgle

15. Google Alerts
http://www.google.com/alerts

16. Urchin Software from Google
http://www.google.com/urchin

17. Google dictionary
http://www.google.com/translate_dict

18. Inside google
http://www.google.com/plex

19. Movie reviews
http://www.google.com/reviews

20. Google Mars
htttp://www.google.com/mars

21. Google Sky
http://www.google.com/sky

22. Google’s next Coding Competition site
http://www.google.com/codejam

23.http://www.google.com/pda

24.http://www.google.com/m

25.http://www.google.com/imode

26.http://www.google.com/jsky

27. Blog search
http://www.google.com/blogsearch

28.Microsoft on google
http://www.google.com/microsoft

29. Google Moon
http://www.google.com/moon

30. Google Linux
http://www.google.com/linux

31. http://www.google.com/ie

32. Google tour
http://www.google.com/tour/services

33. Google TOS
http://www.google.com/accounts/TOS

34. Google trends
http://www.google.com/trends/hottrends

35. Google arts
http://www.google.com/Top/Arts

36. Google 3d warehouse
http://www.google.com/sketchup/3dwh

37. Google Adult content
http://www.google.com/Top/Adult

38. Google & Dilbert Doodle
http://www.google.com/dilbert.html

39. Google in Kannada
www.google.com/intl/kn

40. Google strange logos
http://www.google.com/doodle8.html
http://www.google.com/doodle9.html

30.Win Registry files in google
http://www.google.com/google_rsearch.reg

31.Google Universities Search
http://www.google.com/options/universities.html

Oops there’s still lot more.But only this much for now….




Use Gmail Account to Send Emails from Multiple Addresses







In this post I am going to show you how to use your Gmail account to send and receive emails from multiple addresses. Most of us own more than one email account say for example, one from Gmail, one from Yahoo and one from Hotmail. If you are tired of logging into multiple accounts to check your inbox or to send emails, I have a solution here.

Gmail has an option to integrate multiple email accounts (email addresses) into a single Gmail account. Once you integrate multiple email addresses into your Gmail account, you can use the same account to send emails from different addresses and receive emails for different addresses. Let’s take a simple example

Suppose you have three email addressess (email accounts)

1. holyhacker@gmail.com

2. holyhacker@yahoo.com

3. holyhacker@hotmail.com

You can integrate the emails holyhacker@yahoo.com and holyhacker@hotmail.com to holyhacker@gmail.com and operate all the three accounts from your single gmail account. Here is a step-by-step procedure to do this.

1. Login to your gmail account.

2. Click on Settings at the top right corner.

3. Under Settings, click on Accounts tab.

4. Now you’ll see the first option “Send mail as:“

5. Under this option, click on Add another email address you own

6. Now a small new window will pop-up asking you to enter the details of your new email address.

7. Here you can enter any name and any email address. The email address need not belong to gmail only. You can enter your yahoo, hotmail or any other valid email address.

8. A Verification email will be sent to the address that you specify. Once you verify that you own the email address, it will be integrated to your Gmail account.

Now when you compose a new email, you’ll see an option to select from multiple address to send the mail. Also you’ll receive the incoming mails for multiple addresses to a single mailbox. I hope this will benefit you.

Before you leave, I should also tell you one good advantage of this. According to Gmail privacy policy, they will not send the user’s IP address in the outgoing emails. That means when you send an email from your Gmail account , the receiver will not be able to find out your IP address. But you don’t have this advantage in Yahoo or other email providers.

Please share your opinions through comments. I hope this helps….




Tuesday 5 July 2011

Netbios Hacking







THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER. NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.

STEP-BY-STEP NETBIOS HACKING PROCEDURE

1.Open command prompt

2. In the command prompt use the “net view” command
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS. BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).

Example: C:\>net view \\219.64.55.112

The above is an example for operation using command prompt. “net view” is one of the netbios command to view the shared resources of the remote computer. Here “219.64.55.112″ is an IP address of remote computer that is to be hacked through Netbios. You have to substitute a vlaid IP address in it’s place. If succeeded a list of HARD-DISK DRIVES & PRINTERS are shown. If not an error message is displayed. So repeat the procedure 2 with a different IP address.

3. After succeeding, use the “net use” command in the command prompt. The “net use” is another netbios command which makes it possible to hack remote drives or printers.

Example-1: 
C:\>net use D: \\219.64.55.112\F
Example-2: 
C:\>net use G: \\219.64.55.112\SharedDocs
Example-3: 
C:\>net use I: \\219.64.55.112\Myprint

NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that are to be created on your computer to access remote computer’s hard-disk.

NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER DRIVES INCLUDING HARD-DISK DRIVES, FLOPPY DRIVES AND ROM-DRIVES ON YOUR COMPUTER. THAT IS, IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE COMMAND PROMPT

F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to hack. “Myprint” is the name of remote computer’s printer. These are displayed after giving “net use” command. “219.64.55.112″ is the IP address of remote computer that you want to hack.

4. After succeeding your computer will give a message that “The command completed successfully“. Once you get the above message you are only one step away from hacking the computer.

Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified name. You can open it and access remote computer’s Hard-Drive. You can copy files, music, folders etc. from victim’s hard-drive. You can delete/modify data on victim’s hard-drive only if WRITE-ACCESS is enabled on victim’s system. You can access files/folders quickly through “Command Prompt”.

NOTE: If Remote Computer’s Firewall Is Enabled Your Computer Will Not Succeed In Gaining Access To Remote Computer Through Netbios. That is Netbios Hacking Is Not Possible In This Situation.(An Error Message Is Displayed). So Repeat The Procedure 2,3 With Different IP Address.
HAPPY NETBOS HACKING!!




How to Trace Mobile Numbers







With the rapid growth of mobile phone usage in recent years, we have often observed that the mobile phone has become a part of many illegal and criminal activities. So in most cases, tracing the mobile number becomes a vital part of the investigation process. Also sometimes we just want to trace a mobile number for reasons like annoying prank calls, blackmails, unknown number in a missed call list or similar.

Even though it is not possible to trace the number back to the caller, it is possible to trace it to the location of the caller and also find the network operator. Just have a look at this page on tracing Indian mobile numbers from Wikipedia. Using the information provided on this page, it is possible to certainly trace any mobile number from India and find out the location (state/city) and network operator (mobile operator) of the caller. All you need for this is only the first 4-digit of the mobile number. In this Wiki page you will find all the mobile number series listed in a nice tabular column where they are categorized based on mobile operator and the zone (state/city). This Wiki page is updated regularly so as to provide up-to-date information on newly added mobile number series and operators. I have used this page many a time and have never been disappointed.

If you would like to use a simpler interface where in you can just enter the target mobile number and trace the desired details, you can try this link from Numbering Plans. Using this link, you can trace any number in the world.

By using the information in this article, you can only know “where” the call is from and not “who” the caller is. Only the mobile operator is able to tell you ”who” the caller is. So if you’re in an emergency and need to find out the actual person behind the call, I would recommend that you file a complaint and take the help of police. I hope this information has helped you!

Is your Nokia Cell Phone Original







Nokia is one of the largest selling phones across the globe. Most of us own a Nokia phone but are unaware of it’s originality. Are you keen to know whether your Nokia mobile phone is original or not? Then you are in the right place and this information is specially meant for you. Your phones IMEI (International Mobile Equipment Identity) number confirms your phone’s originality.

Press the following on your mobile *#06# to see your Phone’s IMEI number(serial number).

Then check the 7th and 8th numbers

Phone serial no. x x x x x x ? ? x x x x x x x

IF the Seventh & Eighth digits of your cell phone are 02 or 20 this means your cell phone was assembled in Emirates which is very Bad quality

IF the Seventh & Eighth digits of your cell phone are 08 or 80 this means your cell phone was manufactured in Germany which is fair quality

IF the Seventh & Eighth digits of your cell phone are 01 or 10 this means your cell phone was manufactured in Finland which is very Good

IF the Seventh & Eighth digits of your cell phone are 00 this means your cell phone was manufactured in original factory which is the best Mobile Quality

IF the Seventh & Eighth digits of your cell phone are 13 this means your cell phone was assembled in Azerbaijan which is very Bad quality and also dangerous for your health




Sunday 3 July 2011

How to Send Anonymous Emails







Most of us are very curious to know a method to send anonymous emails to our friends for fun. But the question is, is it possible to send anonymous emails in spite of the advanced spam filtering technology adopted by email service provides like Gmail, Yahoo etc? The answer is YES, it is still possible to bypass their spam filters and send anonymous emails to your friends. For example, you can send an email to your friend with the following sender details.

From: Bill Gates <billg@microsoft.com>
The art of sending this kind emails is known as Email Spoofing. In this post I have come up with a new way to send anonymous emails (spoofed emails) that has 100% success rate. If you have to successfully send an anonymous email or spoofed email, you should send it using a relay server.


What is a Relay Server?

In simple words, a relay server is an SMTP Server that is trusted by Google or Yahoo as an authorised sender of the email. So, when you send an email using a relay server, the email service providers like Yahoo and Gmail blindly accept the emails and deliver it to the inbox of the recipient. If the SMTP server is not authorised, Google and Yahoo will reject all the emails sent from this SMTP server. This is the reason for which using our own SMTP server to send emails fail.


So What’s Next?

Now all we have to do is, find a trusted SMTP server to Send Spoofed Emails. Usually all the emails that are sent from web hosting providers are trusted and authorised. So, you have to find a free web hosting provider that allows you to send emails. But, most of the free Web Hosts disable the Mail feature and do not allow the users to send emails. This is done just to avoid spamming. However all the paid hosting plans allow you to send any number of emails. Once you find a hosting service that allows to send emails from their servers, it’s just a cakewalk to send anonymous emails. All we have to do is just modify the email headers to insert the spoofed From address field into it.

I have created a PHP script that allows you to send emails from any name and email address of your choice. Here is a step-by-step procedure to setup your own Anonymous Email Sender Script


1. Goto X10 Hosting  and register a new account.

2. Download my Anonymous Email Sender Script (sendmail.rar).

3. Login to your FreeWebHostingArea Account and click on File Manager.

4. Upload the sendmail.php, pngimg.php and bg1.PNG files to the server.

5. Set permissions for sendmail.php, pngimg.php and bg1.PNG to 777.

6. Now type the following URL

http://yoursite.x10hosting.com/sendmail.php

NOTE: yoursite must be substituted by the name of the subdomain that you have chosen during the registration process.
7. Use the script to send Anonymous Emails. Enjoy!!!

Tell me whether it worked or not. Please pass your comments…

WARNING: ALL THE INFORMATION PROVIDED IN THIS POST ARE FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR ANY MISUSE.