Welcome To The Hacker Club 4U
On This Blog Now You can get knowledge about how to to do hacking and also Know how to prevent from hacking and know many tips And tricks of computer and internet
Hacking
Click Here To Know Many Tricks and Tips Of HACKING facebook,twitter and other accounts and passwords
Hacking Safety And Security
Click Here to know how to protect your computer and inetrnet from hacking and know hacking safety and security tips and tricks
Facebook And Twitter
Click On Picture For TWITTER And Click On This Tittle For FACEBOOK .Hacking And Security Tips Of facebook and twitter.Know how to byepass facebook login and twitter login
Gmail And Yahoo
Click On Above Picture For GMAIL Hacking And Security Tips . And.Click On This Title For YAHOO Hacking and security tips
Change Text on xp start button
Hii! This is Pc Hackers Guru Know Many about Hacking
n order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.
get this from h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip
The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.
The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.
There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used Click Me!
You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.
Step 2 – Modify the Registry
!!!make a backup of your registry before making changes!!!
Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:
HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon
In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.
Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.[/b]
n order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.
get this from h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip
The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.
The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.
There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used Click Me!
You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.
Step 2 – Modify the Registry
!!!make a backup of your registry before making changes!!!
Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:
HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon
In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.
Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.[/b]
How To Hack Computer through WiFi
Hii! This is Pc Hackers Guru Know Many about Hacking
The internet is ever growing and you and I are truly pebbles in a vast ocean of information. They say what you don’t know can’t hurt you. When it comes to the Internet believe quite the opposite. On the Internet there a millions and millions of computer users logging on and off on a daily basis. Information is transferred from one point to another in a heartbeat. Amongst those millions upon millions of users, there’s you.
In this tutorial i am going to show you how to to access someone's facebook, youtube, and many other accounts which is using the same WiFi as you.
You need:
Step 1: Install WinPcap then drag the Firesheep add-on, and put it on the Firefox icon. Firefox will open and will ask you to install the add on. Install it and restart Firefox.
Step 2: Open the add-on (You can do it by clicking on View -> Sidebar -> Firesheep), then click on Start Capturing and it'll start capturing, and as soon as somebody logs in any account it'll show up the logs, and then you can access their account.
Simple, but functional and VERY effective method to hack someones facebook, youtube, myspace, etc. account through WiFi
The internet is ever growing and you and I are truly pebbles in a vast ocean of information. They say what you don’t know can’t hurt you. When it comes to the Internet believe quite the opposite. On the Internet there a millions and millions of computer users logging on and off on a daily basis. Information is transferred from one point to another in a heartbeat. Amongst those millions upon millions of users, there’s you.
In this tutorial i am going to show you how to to access someone's facebook, youtube, and many other accounts which is using the same WiFi as you.
You need:
- Mozilla Firefox
- Firesheep - A Firefox extension that demonstrates HTTP session hijacking attacks.
- WinPcap - WinPcap is an open source library for packet capture and network analysis for the Win32 platforms. It includes a kernel-level packet filter, a low-level dynamic link library (packet.dll), and a high-level and system-independent library.
Step 1: Install WinPcap then drag the Firesheep add-on, and put it on the Firefox icon. Firefox will open and will ask you to install the add on. Install it and restart Firefox.
Step 2: Open the add-on (You can do it by clicking on View -> Sidebar -> Firesheep), then click on Start Capturing and it'll start capturing, and as soon as somebody logs in any account it'll show up the logs, and then you can access their account.
Simple, but functional and VERY effective method to hack someones facebook, youtube, myspace, etc. account through WiFi
Bank Transfer For Beginners
Hii! This is Pc Hackers Guru Know Many about Hacking
The first thing you are going to need is banking credentials of some sort. The information you need will be different for each bank and depend on how your doing the transfers if by phone or online so research is the key here!
If you are doing the transfers online take a look at the banks login pages to determine exactly whats needed to login, you might also need additional information like a password or code to make a transfer so it's a good idea to set up a bank account with internet banking on the bank your targeting, this way you will be able to see all that is needed and not just what you need to log into the actual website.
The usual information needed to log into online banking is usually like; (remember different banks = different info)
For transfers it's much better to talk and bank using the telephone, this is far more successful than online transfers because it doesn't attract so much suspicion when a few thousand is being sent somewhere and banks will process the transfer there and then meaning that if your phone call to them is successful there is a 95% chance your transfer will be too.
You need different information to do this type of transfer and like before it's different with each bank, also like before it's a good idea to set up a bank account with the bank and make a transfer by phone, this way you will know what to expect when you go to make a fraudulent transfer by phone.
Here is a rough guide of what you might need;
All the information you need for any type of transfer can be bought online for a relatively small amount of money, the details for online transfers will usually cost you between 3-15% of the account balance. Information to make phone transfers will normally cost between $15 upto $50 and this depends on how much information is given to you about your mark.
Alternatively you can collect and gather this information yourself by the many ways available such as botnets, phishing, data mining etc...
After you have got the information you need you will need to find or set up a bank account which the stolen money can be transferred into (bank drop), for obvious reasons this must not be an account in your real name! The most common method of getting an account for this is to find people willing to offer they're account for a percentage of the money, normally 30-60% of the transferred amount. Another way of getting bank drop accounts is to set them up yourself using fake ID and counterfeit documents, there is a little extra work and investment needed for doing this but the returns financially are well worth it.
Now you have information and a bank drop account you are ready to make the transfer, here is some information and steps on how to go about making both phone and online transfers.
Telephone banking
In theory this method is pretty self explanatory because all you really need to do is make a call to the telephone banking line of your target bank and answer any questions they ask as if you were the person whose details you have but like any type of transfer true success will depend on how well you plan and carry off the operation so you must talk in a calm, cool and collective way.
Acting or at the very least voice impersonation will play a major role in transfers made by phone because NO bank is going to accept a transfer from someone on the phone who has the relatively squeaky voice of a teenager or young adult when the original account holder is supposed to be 60 years old so you must take the time to perfect your voice to sound like the account holder might. Sometimes the dialect of a voice can also make a bank worker weary of a transfer because if the account holder lives in Australia and you were born in India he or she might be able to spot this in your fake voice so you must must must! get the dialect,tone and language of your targets country correct or you will fail, simple!
When you have your voice you are ready to make the call, it's a good idea to use call spoofing and forwarding to have your targets telephone number registered with the bank appear on caller ID because some banks may check this or use it as further verification, there is sometimes also some sort of voice changing functionality with some of those call services which is a good feature to add to the fake voice your making vocally or if you have female info and you want to sound like so.
It's not usually necessary to use spoofing so if your making a call just make sure you are doing so from an unregistered pre-paid cell phone or pay phone and not the personal land line number in your house.
Online transfers
Again like before it's pretty easy to do but there is a lot of different aspects that can effect the success you have with this method of transfer. All banks have different procedures and levels of tolerance regarding online transfers, most of your work at the start will involve research, trial and error and perseverance to figure out the best ways in doing it and how to maximize your profits from it.
Okay so you have your information and a drop account, now you need to make the actual transfer! When you are doing anything illegal electronically via a computer you MUST secure your identity or so called virtual fingerprint paper trail your system and modem leaves behind, you can do this by using socks, virtual private networks, hacked wireless connection or any other form of legitimate anonymizing techniques and principals to protect your IP address and ultimately your identity and location. A good rule of thumb is to display an IP address located within a local proximity to that of your marks location or geographic area so an IP from the same city or state is ideal.
after this step you can successfully and safely login to online banking!
Now we have to think about what we are doing... as mentioned before the banks generally set an amount of money which is deemed acceptable and safe to transfer online, the history of the account holders' transfers will also come into play so it's your job to determine the highest amount a bank will accept in an online transaction without arousing suspicion, this can be done by looking at the payment history of an account and using your research inline with what you discovered as the banks acceptable amount in comparison to the balance and history ratio. It is no good trying to transfer $8k from an account with a $10k balance when the real account holder has never made a transfer bigger than $3k before.
So after you have a figure you think or know is safe to transfer you can attempt to make the transfer, please take a look below for more information regarding transfers in general.
General notes and tips about making any type of transfer
The best time to make a transfer is during big seasonal/regional/public holidays like Christmas or Summer, people spend a lot of money at these times so the chances of a successful transfer increases and suspicion falls, please remember it's not the same for small holidays or seasonal events like at the beginning of a new year because people tend to hold back on spending at those times because they spent so much at Christmas etc...
Transferring money into a bank drop account from the same bank will usually happen instantly so you can cashout the money on the same day the transfer was made, sometimes this can be seen as suspicious though. If you are transferring money into a different bank it will take between 1-4 days for the money to appear in the drop.
Don't transfer money at the weekend because people usually use they're cards a lot more on weekends when they are off work and out shopping so they will find out money has been taken from their accounts faster, best day(s) to make a transfer is Sunday,Monday or Tuesday.
If available select the option to take the money from the account on the day it will actually be transferred (1-4 days) there is usually a box to tick online for you to do this or you can tell the bank worker via the telephone that this is what you want.
If you have a big balance account like $250k it doesn't mean you can automatically transfer $75k out of that account because it's a small amount in comparison to the balance, a good rule is to take between 3-7% of the big balances but also remember the history of the payments is also very important, try to transfer what the banks sees normally from the account holder.
Make small transfers to your drop account that the account holder might not see or report, if you make a big transfer 2-3 weeks later there is a good chance of success because the bank will see money has previously been sent to the same account and no problems were reported.
Online only;
Take a look at the last log in date for the account or ask your vendor to do this if they checked the account after getting it because if the person doesn't log into or use online banking often there is a chance the success of a big transfer will fall and you will then be able to adjust your transfer accordingly, you will also know that person probably isn't going to see a bank statement until the end of the month.
The first thing you are going to need is banking credentials of some sort. The information you need will be different for each bank and depend on how your doing the transfers if by phone or online so research is the key here!
If you are doing the transfers online take a look at the banks login pages to determine exactly whats needed to login, you might also need additional information like a password or code to make a transfer so it's a good idea to set up a bank account with internet banking on the bank your targeting, this way you will be able to see all that is needed and not just what you need to log into the actual website.
The usual information needed to log into online banking is usually like; (remember different banks = different info)
- Username/account number
- Password
- Letters/Numbers of a security code
- Answers to secret question
- Date of birth (sometimes)
For transfers it's much better to talk and bank using the telephone, this is far more successful than online transfers because it doesn't attract so much suspicion when a few thousand is being sent somewhere and banks will process the transfer there and then meaning that if your phone call to them is successful there is a 95% chance your transfer will be too.
You need different information to do this type of transfer and like before it's different with each bank, also like before it's a good idea to set up a bank account with the bank and make a transfer by phone, this way you will know what to expect when you go to make a fraudulent transfer by phone.
Here is a rough guide of what you might need;
- Account number
- Sort Code
- Address Details
- Date of Birth
- Mother maiden name
- Answer to secret questions
All the information you need for any type of transfer can be bought online for a relatively small amount of money, the details for online transfers will usually cost you between 3-15% of the account balance. Information to make phone transfers will normally cost between $15 upto $50 and this depends on how much information is given to you about your mark.
Alternatively you can collect and gather this information yourself by the many ways available such as botnets, phishing, data mining etc...
After you have got the information you need you will need to find or set up a bank account which the stolen money can be transferred into (bank drop), for obvious reasons this must not be an account in your real name! The most common method of getting an account for this is to find people willing to offer they're account for a percentage of the money, normally 30-60% of the transferred amount. Another way of getting bank drop accounts is to set them up yourself using fake ID and counterfeit documents, there is a little extra work and investment needed for doing this but the returns financially are well worth it.
Now you have information and a bank drop account you are ready to make the transfer, here is some information and steps on how to go about making both phone and online transfers.
Telephone banking
In theory this method is pretty self explanatory because all you really need to do is make a call to the telephone banking line of your target bank and answer any questions they ask as if you were the person whose details you have but like any type of transfer true success will depend on how well you plan and carry off the operation so you must talk in a calm, cool and collective way.
Acting or at the very least voice impersonation will play a major role in transfers made by phone because NO bank is going to accept a transfer from someone on the phone who has the relatively squeaky voice of a teenager or young adult when the original account holder is supposed to be 60 years old so you must take the time to perfect your voice to sound like the account holder might. Sometimes the dialect of a voice can also make a bank worker weary of a transfer because if the account holder lives in Australia and you were born in India he or she might be able to spot this in your fake voice so you must must must! get the dialect,tone and language of your targets country correct or you will fail, simple!
When you have your voice you are ready to make the call, it's a good idea to use call spoofing and forwarding to have your targets telephone number registered with the bank appear on caller ID because some banks may check this or use it as further verification, there is sometimes also some sort of voice changing functionality with some of those call services which is a good feature to add to the fake voice your making vocally or if you have female info and you want to sound like so.
It's not usually necessary to use spoofing so if your making a call just make sure you are doing so from an unregistered pre-paid cell phone or pay phone and not the personal land line number in your house.
Online transfers
Again like before it's pretty easy to do but there is a lot of different aspects that can effect the success you have with this method of transfer. All banks have different procedures and levels of tolerance regarding online transfers, most of your work at the start will involve research, trial and error and perseverance to figure out the best ways in doing it and how to maximize your profits from it.
Okay so you have your information and a drop account, now you need to make the actual transfer! When you are doing anything illegal electronically via a computer you MUST secure your identity or so called virtual fingerprint paper trail your system and modem leaves behind, you can do this by using socks, virtual private networks, hacked wireless connection or any other form of legitimate anonymizing techniques and principals to protect your IP address and ultimately your identity and location. A good rule of thumb is to display an IP address located within a local proximity to that of your marks location or geographic area so an IP from the same city or state is ideal.
after this step you can successfully and safely login to online banking!
Now we have to think about what we are doing... as mentioned before the banks generally set an amount of money which is deemed acceptable and safe to transfer online, the history of the account holders' transfers will also come into play so it's your job to determine the highest amount a bank will accept in an online transaction without arousing suspicion, this can be done by looking at the payment history of an account and using your research inline with what you discovered as the banks acceptable amount in comparison to the balance and history ratio. It is no good trying to transfer $8k from an account with a $10k balance when the real account holder has never made a transfer bigger than $3k before.
So after you have a figure you think or know is safe to transfer you can attempt to make the transfer, please take a look below for more information regarding transfers in general.
General notes and tips about making any type of transfer
The best time to make a transfer is during big seasonal/regional/public holidays like Christmas or Summer, people spend a lot of money at these times so the chances of a successful transfer increases and suspicion falls, please remember it's not the same for small holidays or seasonal events like at the beginning of a new year because people tend to hold back on spending at those times because they spent so much at Christmas etc...
Transferring money into a bank drop account from the same bank will usually happen instantly so you can cashout the money on the same day the transfer was made, sometimes this can be seen as suspicious though. If you are transferring money into a different bank it will take between 1-4 days for the money to appear in the drop.
Don't transfer money at the weekend because people usually use they're cards a lot more on weekends when they are off work and out shopping so they will find out money has been taken from their accounts faster, best day(s) to make a transfer is Sunday,Monday or Tuesday.
If available select the option to take the money from the account on the day it will actually be transferred (1-4 days) there is usually a box to tick online for you to do this or you can tell the bank worker via the telephone that this is what you want.
If you have a big balance account like $250k it doesn't mean you can automatically transfer $75k out of that account because it's a small amount in comparison to the balance, a good rule is to take between 3-7% of the big balances but also remember the history of the payments is also very important, try to transfer what the banks sees normally from the account holder.
Make small transfers to your drop account that the account holder might not see or report, if you make a big transfer 2-3 weeks later there is a good chance of success because the bank will see money has previously been sent to the same account and no problems were reported.
Online only;
Take a look at the last log in date for the account or ask your vendor to do this if they checked the account after getting it because if the person doesn't log into or use online banking often there is a chance the success of a big transfer will fall and you will then be able to adjust your transfer accordingly, you will also know that person probably isn't going to see a bank statement until the end of the month.
Bypass Facebook Security To Hack Facebook account Password
Hii! This is Pc Hackers Guru Know Many about Hacking
Ok, here's a new quick tutorial for everyone who has been having to deal with Facebook blocking your entrance into someone's account due to logging in from a different location.
Ever since I had been problems constantly having to deal with Facebook leaving me out off people's accounts I began to think that I should write over my experiences to help others.
I will go over specific techniques and ideas to eventually grant you entrance to their accounts without having to deal with that Facebook problem having logging in from different location.
1. Before you even begin reading this, you must already have their passwords or e-mails. If not, I will tell you a few ideas of how to acquire them.
If you only want to log in without changing passwords, I would suggest that you steal their passwords through Phishing, Keylogging, or Social Engineering.
2. Bypassing Facebook security can be done through black hat methods, however I will not go over those methods, instead I will be touching the social engineering methods which are more effective and you can get faster results.
3. You will need to use your brain to think and have patience. If you don't have either a brain to think or the patience to wait, please don't continue reading this tutorial because you will not get any success.
Ok, let's move on to the actual information.
-This method is a cheap shot method, but you never know if it might work or not.
1. If a person uses a particular computer to log in to their accounts on a regular basis, THAT computer alone should be your focus.
You should infect that computer with a keylogger and have it linked together with a FTP to send you the logs or linked to send you e-mails.
2. Another method is to use your OWN computer to acquire the password by infecting yourself with a keylogger and let the slave use your computer. Gain their trust to the point of where they can log in to different websites.
You can say for instance "My account is not working, I think Facebook banned me. Can you test your account to see if yours is working?"
And of course, they will log in and you will gain the information. After they successfully log in, you can login to your account and say "Oh, there we go! It worked"
Now, you will attempt to log in in the future and the problem of Logging in from another location will disappear.
3. Let's say that they aren't stupid enough to use your computer to log in, you might think, what then? Well, here's my next suggestion to you.
Considering that you will already have the password through the methods I mentioned earlier, but you will have the problem of Logging in from another location.
Here's what you do:
Watch and study your slave, if you know he/she uses a location to use a computer, you should attempt to log in at that same location as well. It could be school, library, another friend's house, etc...
Most people will use any computer to log in to Social Networks or E-mails to check on updates. Considering that the IP you log in at that particular is the same within their network, the problem of Logging in from another location will not come up.
4. So, you don't have the choice of either offering your computer as a trap or the chance to "stalk" your slave. You wonder, what do I do then?
Well, this is where it gets more tricky considering that Facebook finally came up with an ingenious method to avoid intruders of taking over accounts easily.
Here's what Facebook did, in case if you don't already know. Facebook implemented a feature where you must visually recognize the friends on that account. They will show you pictures of random people within that account and ask you to select the name of that person.
If you don't recognize any of those people, you're screwed.
When will this happen? That will only happen when you attempt to change their passwords, so Facebook makes sure that you do in fact own that account. I personally wouldn't attempt to change the passwords, but if you do try, here's what I would recommend to you.
-If you know the person in person, notice who he/she is friends with to try to recognize the faces and physically ask the other persons their names.
If you do not know the person, you can use websites like:
To search their names, e-mails, phone numbers to see whether if you can find them on other Social networks. You can search the person's name manually by going to Myspace, Facebook, etc...To see who they have added as friends.
Your next step will be to add a friend of the slave or the slave directly. Adding the slave directly would probably be the best plan because you would have access directly to all the victims' friends and their pictures.
Now, all you have to do is match the pictures that Facebook asks you when you attempt to change their passwords by going to the victims friends and match them.
If you don't want to change their passwords, you can mask the slave's IP using other methods in which I will not go over. To find out their IP, you will need a RAT to manually whois them or any other method other there to find their IP.
A quick method I will suggest to you is to send the slave an e-mail if they have a hotmail account. When they reply you can right click on the e-mail and view source. You will see an IP from sender and use that to mask.
Mask their IP and facebook will not give you the problem of Logging in from another location.
If you follow the suggestions I have given you, you will surely gain entrance to their accounts and Facebook won't be able to do crap.
Their security is strong, but good ol' Social engineering never fails
Ok, here's a new quick tutorial for everyone who has been having to deal with Facebook blocking your entrance into someone's account due to logging in from a different location.
Ever since I had been problems constantly having to deal with Facebook leaving me out off people's accounts I began to think that I should write over my experiences to help others.
I will go over specific techniques and ideas to eventually grant you entrance to their accounts without having to deal with that Facebook problem having logging in from different location.
1. Before you even begin reading this, you must already have their passwords or e-mails. If not, I will tell you a few ideas of how to acquire them.
If you only want to log in without changing passwords, I would suggest that you steal their passwords through Phishing, Keylogging, or Social Engineering.
2. Bypassing Facebook security can be done through black hat methods, however I will not go over those methods, instead I will be touching the social engineering methods which are more effective and you can get faster results.
3. You will need to use your brain to think and have patience. If you don't have either a brain to think or the patience to wait, please don't continue reading this tutorial because you will not get any success.
Ok, let's move on to the actual information.
-This method is a cheap shot method, but you never know if it might work or not.
1. If a person uses a particular computer to log in to their accounts on a regular basis, THAT computer alone should be your focus.
You should infect that computer with a keylogger and have it linked together with a FTP to send you the logs or linked to send you e-mails.
2. Another method is to use your OWN computer to acquire the password by infecting yourself with a keylogger and let the slave use your computer. Gain their trust to the point of where they can log in to different websites.
You can say for instance "My account is not working, I think Facebook banned me. Can you test your account to see if yours is working?"
And of course, they will log in and you will gain the information. After they successfully log in, you can login to your account and say "Oh, there we go! It worked"
Now, you will attempt to log in in the future and the problem of Logging in from another location will disappear.
3. Let's say that they aren't stupid enough to use your computer to log in, you might think, what then? Well, here's my next suggestion to you.
Considering that you will already have the password through the methods I mentioned earlier, but you will have the problem of Logging in from another location.
Here's what you do:
Watch and study your slave, if you know he/she uses a location to use a computer, you should attempt to log in at that same location as well. It could be school, library, another friend's house, etc...
Most people will use any computer to log in to Social Networks or E-mails to check on updates. Considering that the IP you log in at that particular is the same within their network, the problem of Logging in from another location will not come up.
4. So, you don't have the choice of either offering your computer as a trap or the chance to "stalk" your slave. You wonder, what do I do then?
Well, this is where it gets more tricky considering that Facebook finally came up with an ingenious method to avoid intruders of taking over accounts easily.
Here's what Facebook did, in case if you don't already know. Facebook implemented a feature where you must visually recognize the friends on that account. They will show you pictures of random people within that account and ask you to select the name of that person.
If you don't recognize any of those people, you're screwed.
When will this happen? That will only happen when you attempt to change their passwords, so Facebook makes sure that you do in fact own that account. I personally wouldn't attempt to change the passwords, but if you do try, here's what I would recommend to you.
-If you know the person in person, notice who he/she is friends with to try to recognize the faces and physically ask the other persons their names.
If you do not know the person, you can use websites like:
To search their names, e-mails, phone numbers to see whether if you can find them on other Social networks. You can search the person's name manually by going to Myspace, Facebook, etc...To see who they have added as friends.
Your next step will be to add a friend of the slave or the slave directly. Adding the slave directly would probably be the best plan because you would have access directly to all the victims' friends and their pictures.
Now, all you have to do is match the pictures that Facebook asks you when you attempt to change their passwords by going to the victims friends and match them.
If you don't want to change their passwords, you can mask the slave's IP using other methods in which I will not go over. To find out their IP, you will need a RAT to manually whois them or any other method other there to find their IP.
A quick method I will suggest to you is to send the slave an e-mail if they have a hotmail account. When they reply you can right click on the e-mail and view source. You will see an IP from sender and use that to mask.
Mask their IP and facebook will not give you the problem of Logging in from another location.
If you follow the suggestions I have given you, you will surely gain entrance to their accounts and Facebook won't be able to do crap.
Their security is strong, but good ol' Social engineering never fails
How To Hack GraboidTo Get Unlimited Movies
Hii! This is Pc Hackers Guru
So if some of you may have heard, Graboid offers free movies, TV shows and more to download. It is subscription based on bandwidth. In this post i am going to show you how to download as much as you want videos, movies, and TV shows through Graboid for free.
First, download the program HERE.
Then after you open the program you will have the option to create and account.
Create it and log in. You will notice your bandwidth restriction, and your account will expire in a month, when you have to buy a subscription.
Once your account has expired, I have discovered a new way to make accounts (NOTE: After your account is created, you will never be able to create a free account again, nor through the program or website).
Make this batch script:
cd %appdata%
del MozillaControl /F /q
cd “%LOCALAPPDATA%\Graboid_Inc\”
del *.* /F /q
Or download it HERE if you don't know how.
Run the batch file, and behold, the new account button shall appear again. Enter a different email address than previous, and your good to go.
For those with issues creating accounts:
1. Renew your IP address (unplug your modem for about 5mins and then reconnect it).
2. If the problem is not solved by number 2, download Hotspot Shield HERE
3. If it still doesn't work, wait a week. This will give a chance for your ISP to reset your IP.
Hope this helped!
So if some of you may have heard, Graboid offers free movies, TV shows and more to download. It is subscription based on bandwidth. In this post i am going to show you how to download as much as you want videos, movies, and TV shows through Graboid for free.
First, download the program HERE.
Then after you open the program you will have the option to create and account.
Create it and log in. You will notice your bandwidth restriction, and your account will expire in a month, when you have to buy a subscription.
Once your account has expired, I have discovered a new way to make accounts (NOTE: After your account is created, you will never be able to create a free account again, nor through the program or website).
Make this batch script:
cd %appdata%
del MozillaControl /F /q
cd “%LOCALAPPDATA%\Graboid_Inc\”
del *.* /F /q
Or download it HERE if you don't know how.
Run the batch file, and behold, the new account button shall appear again. Enter a different email address than previous, and your good to go.
For those with issues creating accounts:
1. Renew your IP address (unplug your modem for about 5mins and then reconnect it).
2. If the problem is not solved by number 2, download Hotspot Shield HERE
3. If it still doesn't work, wait a week. This will give a chance for your ISP to reset your IP.
Hope this helped!
Turn Your Firefox into a stealer without software
Hii! This is Pc Hackers Guru
Ever wanted to hack your friends accounts, whenever they were over your house. Or you just wanted Firefox to save all your passwords without prompting you every single time! This tutorial is for you, read on!
Steps:
1) Close Firefox
2) Navigate to:
Windows - C:/Program Files/Mozilla Firefox/Components
Mac - Applications > Right click Firefox > Show Package Contents > Contents/MacOS/Components
3) We are going to edit a file called nsLoginManagerPr
ompter.js, it is recommended you create a copy of it so you can replace the original file when you want to turn off this feature.
I recommend you download the following file and simply overwrite the existing nsLoginManagerPrompter.js with it, it is one I have already edited and works.
Download here.
From now on, when someone logs onto any site, they username and password will be saved automatically, without prompt!
To retrieve the account information, make sure Firefox is opened, go to Tools > Options... > Security Tab > click on saved passwords, then click on show passwords, and press yes!
Hope that helped anyone. Enjoy!
FeedBack At
Ever wanted to hack your friends accounts, whenever they were over your house. Or you just wanted Firefox to save all your passwords without prompting you every single time! This tutorial is for you, read on!
Steps:
1) Close Firefox
2) Navigate to:
Windows - C:/Program Files/Mozilla Firefox/Components
Mac - Applications > Right click Firefox > Show Package Contents > Contents/MacOS/Components
3) We are going to edit a file called nsLoginManagerPr
ompter.js, it is recommended you create a copy of it so you can replace the original file when you want to turn off this feature.
I recommend you download the following file and simply overwrite the existing nsLoginManagerPrompter.js with it, it is one I have already edited and works.
Download here.
From now on, when someone logs onto any site, they username and password will be saved automatically, without prompt!
To retrieve the account information, make sure Firefox is opened, go to Tools > Options... > Security Tab > click on saved passwords, then click on show passwords, and press yes!
Hope that helped anyone. Enjoy!
FeedBack At