Blogger Widgets

About Ash Hacker

My photo
I am a social-techno-learner which believes in its own efficiency first and then implements with the suggestions of my strong and enthusiastic Team which helps me takes everything into its perfection level.

Monday 26 December 2011

How To Login Multiple Facebook Accounts Simultaneously


If you have more than one Facebook account, you might have tried lo login into them at same time. Yes, I am talking about way to login multiple Facebook accounts simultaneously. If you are using Mozilla Firefox or Google Chrome browser, you can easily do it.

Login Multiple Facebook Accounts On Firefox

STEP 1: Right click on the shortcut of Firefox web browser and click on Properties.
STEP 2: Now, at the end of Firefox Target, you need to add the below code at the end of the path,
-profilemanager –no-remote
For example, C:Program FilesMozilla Firefoxfirefox.exe” -profilemanager -no-remote
STEP 3: Now when you open the Firefox, you would find a new box. And there you could to login multiple Facebook Accounts.
NOTE: Multi-Fox Addon is a Firefox add-on which lets you log into more than one Facebook accounts. Its worth trying, if you not prefer tweaking its settings.

Login Multiple Facebook Accounts On Chrome

If you are using Facebook on Chrome, the only way to login multiple Facebook accounts, then you can do it by operating in Incognito mode.
So just by hitting Ctrl + Shift + N, you can launch Incognito browser where you can login to another Facebook account.
Happy Facebooking!

New Facebook Chat Smileys :

New Facebook Chat Smileys :
===================

[[171108522930776]] Troll Face
[[164413893600463]] MEGUSTA
[[218595638164996]] YAO
[[189637151067601]] Lol
[[129627277060203]] Poker face.
[[227644903931785]] Forever ALONE.
[[100002752520227]] OKAY
[[105387672833401]] F**K YEA.
[[100002727365206]] CH AC.
[[125038607580286]] Forever alone navidad.
[[143220739082110]] FK KIDDING ME.
[[168040846586189]] Feel like a Sir.
[[169919399735055]] NOT BAD
[[142670085793927]] M O G.
[[170815706323196]] Cereal Guy
[[167359756658519]] NO
[[224812970902314]] Derp
[[192644604154319]] Derpina
......Ash-Hacker.

Sunday 25 December 2011

How to Make gmail account without verification...



You can do it with proxy or without proxy. For me it works everytime. So, let's start:


1# Go to gmail.com and hit the sing up page


2# For first and last name I use imdb.com to search names from movies or names of the actors, I combine them, I use a unique name that I believe is not used by anyone. If google will detect that name in their database they will require SMS verification. So go with a unique name, not the popular ones like John Doe or whatever. If you will use the same name on other account they will require SMS verification so stick with a unique one. Everything need to be unique.


3# For login name I don't use numbers and is unique, I will not use that username again. I only use dot in username. If you will create another username similar to that, again, they will detect and they will ask for SMS verification on both accounts.


4# Password. I use a unique password for every account. If you will make a few accounts with the same password they will detect them and they will ask you for SMS verification, so try a unique password. I don't use number in passwords. And I don't use similar passwords.


5# Security Question. Write your own question. Don't use it in other account.


6# I don't use recovery email.


7# The rest it is at your choice.

How to hack any facebook account easily without keylogging...


Welcome to my tutorial on how to hack any facebook accounts, in next 24 hours, without
keylogging /phishing etc.


I see many people joining HackForums, and asking for help on hacking facebook accounts, or beg others to do it for them. Most of them belive that they can do it instantly only with one click but that's impossible.
First of all, I want to say is this is not hacking, this is called "Reverting".

What is Reverting?
Reverting means undoing the effects of one or more edits, which normally results in the page being restored to a version that existed sometime previously.
NOTE: This tutorial is for educational purposes only, I am NOT responsible in any way for how this information is used, use it at your own risk, also you can learn how to get your account back from this.
Ok, let's start:

Step 1: First of all open this link:
http://www.facebook.com/help/contact.php...in_changed
This will be the form you will be filling out. 

NOTE: Be sure you are not logged in.

Step 2: Your email address.
Simple, write your "own" email adress, or the slave you are hacking.

Step 3: Can you send and receive emails from your login email address?
Choose "No".

Step 4: Has the login email address that you normally use to log in to your account been hacked?
Choose "Yes".

Step 5: Has the login email address on your account been changed?
Choose "Yes" again.

Step 6: Full name on the account.
If you already know the full name of the slave you're going to hack, you can write it, if not do the following:
If you still can't find it, then try using those links:

http://www.pipl.com/email
http://com.lullar.com
or google slave's adress.
if you STILL can't find it, use a little SE(Social Engeneering) try adding the slave as friend, and you will be able to see his full name. 

Step 7: Email address(es) that may be affiliated with the account.
Write "No".

Step 8: Your contact email address.
Write your email adress where facebook can contact you. Example crazy@gmail.com.

Step 9: Your username (if applicable).
If you have created username, write it there. If you are not sure about your slave, ask him first, if he looks like confused and asking you what's that, then probably he doesn't have one. You can make username by logging your facebook first, going to "Settings" and click "change" on your username. Personally I don't have an username. Many people don't have a username, so write there "none", "don't have" or "no".

Step 10: URL (web address link) to your profile page.
You can find slave's profile page, by searching their email. ogin to your facebook, write their email in the search button and press Enter. After some seconds, it will appear their name, click on it and copy the URL. They look bad but that was the best I could do.
Ok then, write slave's prifle URL, and click the button "Submit".

Step 11: Once you're done and pressed the Submit button a message will appear:
"Thanks, your inquiry has been forwarded to the Facebook Team."
That means, you're done and you have to wait while facebook check up your request and send you email to the email you wrote where they can contact you.
--------------------------------------------------------------------------------------------
That's it, I will repeat once again.

"This tutorial is for educational purposes only, I am NOT responsible in any way for how this information is used, use it at your own risk, also you can learn how to get your account back from this."
If you have any questions ask them here, do NOT PM m, and also do it your self, i'm not going to do this for you, so don't bother asking!
.....Ash-Hacker.

LOCK ANY FOLDER USING NOTEPAD



Well, let me tell you how I do it every day without deleting cookies or anything.




we're going to make a hidden folder, it is hidden by a little program, when you open this program, you should type the correct password , so your folder will be seen. cool !  


OK, open notepad and write in it :






cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Enter password to lock folder or for cancel press N
set/p "cho=>"
if %cho%==XXXX goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==XXXX goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End






NOW ,replace the XXXX by the password you want 
save it finally anything.bat

Thursday 22 December 2011

Best search engine(Google operators)

Google is best search engine in the world. Actually people think that Google's popularity is because of its simple and fast searching interface but friends, its more popular because it has rich operators and query support that will make your searching experience even better. Most of us doesn't know which operators are supported by Google and if they know some of them, they doesn't know how actually these operators work and enrich our searching practice. Today, i will tell you How we can search on Google like elite hackers or simply say computer experts do. But for this its necessary that you should know and understand all the Google operators properly. So lets learn how we can enrich our searching experience in Google.




Google operators:
Google operators are classified into two basic categories:
1. Basic Google Operators like and, or, not etc.
2. Advanced google operators like inurl, intitle etc.
I am also including bonus search queries that are extremely useful for hackers.


Basic Google Operators:-
1) And (+) :- This operator is used to include multiple terms in a query which is to be searched in google.
example:- if we type "hacker+yahoo+science" in google search box and click search, it will reveal the results something which are related to all the three words simultaneously i.e. hacker, yahoo and science.


2 ) OR (|) :- The OR operator, represented by symbol( | ) or simply the word OR in uppercase letters, instructs google to locate either one term or another term in a query.


3) NOT :- It is opposite of AND operator, a NOT operator excludes a word from search.
example:- If we want to search websites containing the terms google and hacking but not security then we enter the query like "google+hacking" NOT "security".


 
Advanced Operators:-
1) Intitle :- This operator searches within the title tags.
Description:- intitle:hacking returns all pages that have the string "hacking" in their title.
intitle:"index of" returns all pages that have string "index of" in their title.
Similar operator:- "allintitle".

2) Inurl :- Returns all matches, where url of the pages contains given word.
Description:- inurl:admin returns all matches, where url of searched pages must contains the word "admin".
Companion operator:- "allinurl".

3) Site :- This operator narrows search to specific website. 
Description : It will search results only from given domain. Can be used to carry out information gathering on specific domain.
example:- site:www.microsoft.com will find results only from the domain www.microsoft.com

4) Link :- This operator allows you to search for pages that links to given website.
example:- link:www.microsoft.com
Here, each of the searched result contains asp links to www.microsoft.com

5) Info :- This operator shows summary information for a site and provides links to other google searches that might pertain to that site.
example:- info:www.yahoo.com

6) Define :- This operator shows definition for any term.
example:- define:security
It gives various definitions for the word "security" in different manner from all over the world.

7) Filetype :- This operator allows us to search specific files on the internet. The supported file types can be pdf, xls, ppt, doc, txt, asp, swf, rtf, etc..
example:- If you want to search for all text documents presented on domain www.microsoft.com then we enter the query something like following.
"inurl:www.microsoft.com filetype:txt"


Other popular search terms only for Hackers:

1. For searching active webcams online:
In Google Search Box type :-
"Active Webcam Page" inurl:8080
Description- Active WebCam is a shareware program for capturing and sharing the video streams from a lot of video devices. Known bugs: directory traversal and cross site scripting.

2. For accessing the deleted messages on forums:
In Google Search Box type:- 
"delete entries" inurl:admin/delete.asp
Description- AspJar contains a flaw that may allow a malicious user to delete arbitrary messages. The issue is triggered when the authentication method is bypassed and /admin/delete.asp is accessed directly. It is possible that the flaw may allow a malicious user to delete messages resulting in a loss of integrity.

3. For searching personal information of person:
In Google Search box type :- 
"phone * * *" "address *" "e-mail" intitle:"curriculum vitae"
Description- This search gives hundreds of existing curriculum vitae with names and address. An attacker could steal identity if there is an SSN in the document.

4.For searching secret financial spread sheets:
In Google Search box type :- 
intitle:"index of" finance.xls
Description- Secret financial spreadsheets 'finance.xls' or 'finances.xls' of companies may revealed by this query.

5. In Google Search box :- 
intitle:"index.of" robots.txt
Description- The robots.txt file contains "rules" about where web spiders are allowed (and NOT allowed) to look in a website's directory structure. Without over-complicating things, this means that the robots.txt file gives a mini-roadmap of what's somewhat public and what's considered more private on a web site. Have a look at the robots.txt file itself, it contains interesting stuff. However, don't forget to check out the other files in these directories since they are usually at the top directory level of the web server!

6. For locating admin directories of websites:
In Google Search box type :- 
intitle:index.of.admin
Description- Locate "admin" directories that are accessible from directory listings.

7. For searching proxies online:
In Google Search box type :- 
inurl:"nph-proxy.cgi" "start browsing"
Description- Returns lots of proxy servers that protects your identity online.

Note: This is not originally written by me. Thanks to Unknown and Google Search Guide.

If you have any queries ask me in form of comments. Thanks for reading.

Tuesday 20 December 2011

Begining of Hacking must read..


[Image: 0Yi7J.png]


Index
  • Introduction
  • Pros & Cons
  • Getting started
  • Becoming a Hacker
  • What You Should Learn
  • Notes


Introduction :
Today I'm here to explain what basic hacking is and what you will need to know.
I have seen a lot of users asking "How to hack" & "Where to start in hacking", so I decided to make a post on my blog. 
If you're a good learner then you should be able to catch on quick.
I'm going to try and make this have great details attached so that everyone will understand.

Pros & Cons :
  • Pros
    • Some software companies will hire hackers to check for flaws in there programs
    • Free things
    • Learning
    • Adrenaline Rush
    • Interest
    • As a Career
  • Cons
    • Possible jail time
    • Fines
    • BlackHat Hacking is Illegal
    • Take's some time to learn

Getting Started :
First things first.
There are 3 type of hackers you can choose from.
Black Hat, Gray Hat, and White Hat.
Below I will list the definition for each of them.

Black Hat :
Black hatters, also known as crackers, are the ones who destroy private information, deface websites, and do most illegal activity.
Becoming a Black hat can be difficult if you're not willing to devote your time in learning.
Usually these people can not get a decent job because of the illegal activity.
Not of all them have bad reputation, but most of them do.
If you are caught by Law Enforcement than be expecting jail time.

Grey Hat :
Grey hatters are in between Black hat and White hat.
Most grey hat people commit pranks that they think is harmless to other users, but can be illegal also.
It's unlikely for some users to take it as a joke. Some might take it seriously if you go to far.
You can also suspect jail time if you're thinking about becoming a Grey hat.

White Hat :
White hatters basically use there knowledge to fight against malware. More than half of them are friendly & can be trusted.
I'm not saying trust anyone because there are some White hats, but it's more than unlikely for them to do harm to your computer.
White hatter can end up in a good paying job.
Such as computer programming & security consultant.
They most likely will not end up in jail if they do not do illegal activity.

Becoming a Hacker :
You must learn information about any operating system and/or programming language, this way you have some skill in the required fields.
Most people prefer Python for a coding language because you can create advanced programs.
There is no such thing as learning a "Easy language", it takes time & patients to master your goals.
You will be able to learn computer security, also known as exploits.

Learn a Programming Language :
Python is a pretty decent language to start with because it has a clean design, very organized, and easy for beginners.
It's not just a software to joke around with, it is very useful & powerful when creating an advanced project.
Java is also good but some people do not value it as a good language to start off with.

If you are well into programming then you might want to learn C.
It's the closest language related to C++ and is to the core of Unix.
It's helps a lot when creating a software but takes time debugging and is often not used because of that reason.

Perl is also good learning for practice reasons and is worth learning.
It is commonly used for web pages and system administration.
Other people use Perl to avoid programming in C.
Most computer jobs do not require C much often.

What's an Exploit :
An exploit is a piece of software and/or information that takes advantage of a bug or vulnerability in order to cause unintended behavior to occur on computer software.
This includes gaining control of a computer system or allowing privilege escalation or a denial-of-service attack.
Finding a bug can cause you to have further access into websites and software.

There are a bunch of methods on finding exploits.
The common found is a vulnerability in the creators software.
A remote exploit can work over a network and exploits the security vulnerabilities without access to the system.
A local exploit requires information before accessing the system.
It also increases the privileges of the person running the exploit past those by the system administrator.

Exploits clients also exist, usually using modified servers that send exploits when accessed with the clients application.
Exploits against applications requires some interaction with the user and is combined with a bit of social engineering.
This is part of the hackers way of gaining access into computers & websites for stealing information.

Normally a single exploit can take advantage of some software.
Often, when the exploit is released to the public, the creators will try and patch the bug.
Later they will release an update for customers to download.
This happens when the software is on the newer version.
The reason on why some black hatters don't publish their exploits is because of the patching method that is done by the creators, so they keep it to themselves or other hackers.

Earn Respect As a Hacker :
Program software & release it to the community with the source attached.
Design software that can be useful to everyone, this way users will download it & leave positive feedback.
Soon it will spread and you will start to become more known.

Test open-source software that users create.
If you can help them in any sort of way to make there software better & easy to use, I'm sure the creator will be thankful and mention you in the credits.
Try and find a program that is in the making.
Contact the creator and ask to beta-test it.
There's a good chance of you beta-testing it before it's released to the public.
You will also learn a lot this way and create good karma with others, so this way if you ever need help, they will offer you help as well.

Last but not least, give credit.
If you have had help in your current software than be sure to give credits.
Who knows, the person you're working with may give you a good ego.

Have fun!

What You Should Learn :
  • Learn advanced information about an operating system
  • Learn at least one programming language
  • Learn how exploits work
  • Do some research  

Saturday 17 December 2011

Hack administrator account



Administrator password can be changed easily without knowing its password. Thing needed is just access to that computer you want to hack from any user account


follow some easy steps....

1. open start<run and type cmd
     
2. in command prompt write net user......... it will give u details about the users of that system. you will find administrator name here.



here 2 shows the administrator username...... and you can see here i m login from the guest account.....


3. write again on command prompt net user [Administrator's Username] *
now  it will ask for new password without asking the current one....


Note:

  • you have to write Administrator's Username without using  brackets [ and 
  • Also here is space between  Administrator's Username and *





4. now just type the password and press enter(Remember the password will not be visible due to security purpose)..... now press enter...then it will ask for retype password.... and again type the new password and press enter....... now cheers..... u hacked the system☺




Note: If it not work from guest account then boot through safe mode and login by simply write Administrator in username and leave blank the password field.
then follow the steps mentioned above.
.....Ash-Hacker.

Trick to hack administrator Account using Guest account in XP- 100% works



Hello Friends,


As Some people want to knoe  to hack administrator account through cmd.


So Today, i m telling a new way that will work 100%.




Follow these steps:


1. ok, First of all login through your guest account and open C:\WINDOWS\system32


2. Now look for cmd.exe and sethc.exe


3. copy these both exe files and place it any safe location


4. Now again go to C:\WINDOWS\system32, now rename cmd.exe into sethc.exe...... As sethc.exe is already exist, so a window will open... says..would you want to replace..... press yes...






5. Now Restart your system.


6. When login screen come.... press Shift key for 5 times.... then command prompt will open.


7. Now you can hack an administrator account in 2 way:
  • By hacking recent administrator's account by changing its password.
  • By giving Administrator's privileges to your guest account 

      So decide what you want to do....

8. Now

      8.1    if  you choose 1st one i.e. "Hacking recent administrator's account by changing its password".>>> then go to my post Hack administrator account and follow step 3 & 4 there.

      8.2     Or if you choose 2nd one then write in command prompt:
                   net localgroup administrators your_guest_account_name /add


9. Done!!!!! :)




.....Ash-hacker.
Tested on: Windows XP

Friday 16 December 2011

Trick to change login screen background of facebook (only for chrome)



If you are tired of the same old login screen on Facebook and you want to customize it just like the desktop of your computer then you must try this extension for Google Chrome that lets you change the background image at the login to facebook.com

Once you've installed the extension ( from here ), go to the list of extensions (the wrench at the top right, tools, extensions), try FB Login Screen Changer and click on "options". You can enter the URL of the background choice and set whether to repeat horizontally or vertically.

At this point, after logging out of Facebook, visiting the site you should display your background image.

Learn How To Make Bootable Pendrive For Windows 7 Using Only Command Prompt



I got the basic commands from the net and am going to take you step by step through the process without having to use a 3rd party program using the command prompt to utilize DiskPart which is built into Windows 7 by default. So here I give a brief and 100% tested tutorial on how to create a Windows 7 Bootable USB Pendrive to install Windows 7 from USB Pendrive.

Also we can bootable pendrive on windows 7,vista,xp using software visit this Link

How to make bootable pendrive using command prompt how that works follow this steps.

1)  Open a command prompt as administrator (Right click on Start > All Programs > Accessories > Command Prompt and select “Run as administrator”.

2) Then run diskpart utility from command prompt, by typing ‘diskpart’ on command prompt and pressing enter. This will run the diskpart utility in a separate windows, which is shown in 2nd picture below:
 3) Now type in cmd  "list disk" and hit enter The number of your USB drive will listed. You’ll need this for the next step.Then you have to type ‘select disk 2′ and press enter. Note: in our case it is disk 2, in your case it may be disk 3, or disk 1 or any other number.
 4)Now you enter ‘detail disk’ to see the details of the disk after selecting it to verify that you have selected the correct disk. You can see these steps in the image below:
 5) Then you have perform this command in cmd. The commands can run by order:
- clean
- create partition primary
- select partition 1
- active
- format fs=fat32  (Command "Format fs=ntfs quick" will speed up the format otherwise it takes hell lot of time to format big pendrives.)
 6) These steps are shown in the image below:
After the format is complete you have to run ‘assign’ command. And after this you can exit diskpart utility by entering the ‘exit’ command. The steps are shown below:
- assign
- exit.
7) After the format process is complete, put in your  Windows 7 DVD in your DVD drive, or if you have using any  .iso image of the DVD, mount that image using any virtual drive software like Power ISO.
Download UltraISO Software

- Now go to My Computer, & open the virtual or original of DVD Drive. Press ‘ctrl+a’ to select all contents
and copy all the contents by pressing ‘ctrl+c’.

-Aafter complete all process. open the USB Drive and press ‘ctrl+v’ to paste all the contents of DVD into the USB Disk.
.....Ash-Hacker.

How to Send Fake Sms using Any number to Any number in India Without Registration!!



It’s hard to believe but it’s true. Can you imagine you can send free anonymous sms from fake or from any number to any number. As the trick I wrote now is among very few ways to send anonymous sms online that really works at the time I am give tutorial.


-Not login required.

-Not registration process required.

-Direct Send SMS to vitim.

-Send Unlimited SMS

-visit this link Fake Sms

-Enjoy this trick to send fake Sms using any mobile number.

-no advertisement.
.....Ash-Hacker.

Thursday 15 December 2011

How to get into facebook at school

Most of people complain me that they cannot get into facebook at school,offices etc or the acess to blocked to facebook.com.In this post i to show you how to get into facebook at school or offices and unblock facebook.In this article i will show you possible method to unblock facebook and get into facebook at school




get into facebook at school




How to get into facebook at school - Method


1. Go to Unblock facebook now Now site.

2. You will see something like this :


Unblock facebook


3. Now, simply enter www.facebook.com in text field below “Website URL” and hit “Browse” to unblock Facebook site.

4. Thus, now your blocked Facebook is converted to unblocked Facebook and you can now get into facebook at school or office using this hack

Thats it. Just check out this Facebook proxy site server useful to unblock Facebook site. Thus, you can now bypass Facebook restrictions imposed by sytem admins and unblock Facebook site. This proxy site can not only unblock Facebook, but also unblock myspace, orkut and many other blocked sites. If you have any problem in using this Facebook proxy site to unblock Facebook,

WEL-COME

You Are Welcome Heartly.......
Blogger Widgets