Saturday 9 March 2013

Download YOUTUBE videos on your Computer or Mobile without any Software





Welcome to Hackers World!!!!!


Follow this Very simple steps:

1. Go to YouTube, Open the video that you want to download

2. Now you have to make a small change in video link, replace "www." or "m." with "ss"

[For example "www,youtube.com/¬watch?v=EWnNyT3QTSQ" with "ssyoutube.com/watch?v=EWnNyT3QTSQ"]

3. After it will redirect to a new site "en.savefrom.net/"

4. Now you have to choose the format of the video like mp4,3gp,flv and also shows the video quality like 240p,360p,720p,1080p

Thanks for Reading this article…….Hope will like this post!!!!!

Be a Good Hacker and Save the Nation!!!!!


Thanks & Regard
Tarun Arora
Tarora89@gmail.com


Friday 28 December 2012

How to hack a website with Havij – SQL injection




Welcome to hackers World!!!!!


SQL Injection is one of the most found vulnerabilities in the websites and web applications. Developers know how to kow the website but they eaasily forget to filter the date sent to the website in forms and queries. This mistake makes website vulnerable to SQL injection. i am gloing to write about the most famous SQLi Tool which do all the work for you and extract the whole database of the vulnerable website.
If you do not have Havij, then download fromthe given link.
Download havij
Now run the tool in your system. I am not including the detailed snapshots because i do not want to target on a website at a public post.
Enter the target URL with a query string as a get parameter. http://targetwebsite.com/index.aspx?id=12
Then click on analyze.
The tool will scan the website and will give the details about the server and technology it is using.
After the tool had done with its work and found the name of the database.
Now click on Tables to fetch the tables of the database. After the tables have been retrieved by the tool, you can easily fetch the data inside the tables.


Thanks for reading this article…..Hope you will like this post!!!!!

Be a Good Hacker and save the nation!!!!!


Thanks & Regards
Tarun Arora


Friday 14 September 2012

Ankit Fadia's Website Hacked Again


Welcome to Hackers World!!!!!




Shocking News for Ankit Fadia’s Fan

India's popular security expert Ankit Fadia's official website (AnkitFadia.in) hacked again by Ganster. This is not the first time his website had been hacked. His website has been hacked countless time by many hackers around the world.

Hacker had also added a nice deface page which was later changed and the website is currently in the suspended mode.



You can also see the deface page mirror at the link below.



Ankit Fadia is a self claimed hacker who know nothing other than claimaing. He claimed many things but don’t know anything. Yeah, at this stage when he has to go for workshop around the India, he has learnt many things but all those things are kids play. All his books are copy pasted and are the biggest example of Plagiarism. There is not a single work of him in the security field has been identified. All his claimes have been found wrong. But he is able to market himself by the power of money.

This is the reason why hackers always target him. A hacker named Himanshu also hacked the server of Ankit Fadia and got the part of his upcoming book. 



Thanks for reading this article.....Hope you will like this!!!!!



Be A good Hacker and Save the Nation!!!!!

Thanks & Regards
Tarun Arora
Tarora89@gmail.com



Friday 7 September 2012

Comodo Dragon Popular Security Browser




Welcome to Hackers World!!!!!

Hi Friends, After a long time I have brought for you a Popular security software developer Comodo has developed a Chrome remix said to have higher security features than its predecessors. Comodo Dragon is an aesthetically minimalist browser that is attractive, responsive, and secure.
Apart from the red hue, the Chromium-based browser's interface is identical to that of market contender Google Chrome. From the detachable tabs at the top of the screen to the bookmark-syncing option, it is impossible to instantly recognize where the "remix" takes place. The Help tab even redirects you to Google Chrome's Help page and the Extensions tab redirects you to Google as well. It also keeps Chrome's incognito mode option, where all browsing information and cookies are deleted following the user's Web session. Upon poking around the Options menu, there are a couple of visible differences: there are no location settings and Dragon does not present an option to send "usage statistics and crash reports to Google."
A browser developed by a company that is best known for its firewall software can leave people feeling more secure about their Internet usage. Comodo Dragon will pull up a bright-yellow caution message warning people that sending information may be unsafe when they are entering a Web site with an unstable security certificate. One such message pops up even when logging into large sites like Facebook. Also, Dragon does not send browsing information to a remote server.
Based on simple timer tests run on Microsoft Windows XP Service Pack 3, the average cold start-up time was 4.53 seconds, warm start-up was 0.92s, and navigation time from nytimes.com to facebook.com was 0.87s. Comodo Dragon proves to have slightly faster page-loading speed than Google Chrome 5.0.375.70, which had results of 5.71s, 1.27s, and 1.23s, respectively. However, in Sunspider JavaScript benchmark testing, Comodo Dragon received an average score of 929.6 milliseconds, whereas Google got 734ms. Based on these results, Google may have faster JavaScript performance than Comodo.
Dragon is not only fast, but like Google Chrome, it is not strewn with numerous icons, leaving more room for Web viewing. For those who are extra cautious about their online security, or for those who are worried about Google's data-mining, this fast browser is a great choice. 



Thanks for Reading this article…hope you like this!!!!
Be a Good Hacker and save the Nation!!!!!

Thanks & Regards
Tarun Arora

Friday 10 August 2012

Hack a PC by USB




Welcome to Hackers World!!!!!

Hello friends this is very useful post for you,Hacking passwords or any information using USB(pendrives).Here is the small tricks guys for stealing information or passwords of your friends or enemies using pendrives...
  1. Extract it.
  2. open pcinfo
  3. select all the files and paste it in ur USB(pendrive)
  4. it in the pc u wanna hack...
  5. Open the USB drive, give it 5 sec and and your job is done...

And now open the dump folder in your pc and u will have all the info u want....


Thanks for reading this article. Hope you will like……..



Be a Good Hacker and Save the Nation!!!!!



Thanks & Regards
Tarun Arora

Saturday 28 July 2012

HOW TO HACK GMAIL AND FACEBOOK WITH BACKTRACK 5




Welcome to Hackers World!!!!!

 
Requirement 
Attracker :: Backtrack 5

Open Backtrack
Type ifconfig to check IP

 Now Again Open Your Backtrack terminal and click on application-backtrack-exploitation tool-Social Engineering Toolkit-SET

Now SET tool kit is Open
 

  Choose option 2, Website Attack Vectors


  Choose option 1, Social Engineering Attack

 Choose option 4, “Tabnabbing Attack Method
Choose option 2, "Site Cloner"

Enter the URL of the site you want to clone. In this case http://www.facebook.com and hit enter.

 Now send your IP to victim and when victim open IP is browser a fake Facebook page start working and when user input Username and Password in fake page. The Username and Password displayed on SET.


 Thanks for Reading this article.Hope you will like this……..

 Be a Good Hacker and Save the Nation!!!!!


Thanks & Regards
Tarun Arora










Friday 13 July 2012

Network monitoring software


Welcome to Hackers World!!!!!

1. Employee monitoring software and network monitoring software are becoming more and more popular recently. With the tendency of improving productivity, the employers have paid more attention to their employees' working efficiency.
2. OsMonitor is the powerful employee monitoring software for companies in all size. OsMonitor is also a powerful network monitoring software you have been looking for. OsMonitor employee monitoring software records and tracks computer activities such as screenshot, IM conversation, website visited. You can find every detail about your employees' PC and Internet usage on server, and prevents them from doing something that is not allowed as well. OsMonitor is a guard of high productivity and internet security.
3.With OsMonitor employee monitoring software, you can view and record your employees' PC activities such as their online conversation, the documents they processed, the websites they visited, the software they ran, the emails they sent, the business information in their computer and even the screenshots of their online activities.



 
The effect of screenshot monitoring view

 4. OsMonitor is a kind of friendly network management software designed for LAN environment. It adopts client-server mode with one server monitoring all client computers. OsMonitor is suitable for the environment of LAN, which is a kind of fool-style network management software. It is in the working mode of Client/Server, using a server to monitor all network clients. Its features are as follow:

 
1. Forbiddance, restriction, surveillance and monitoring. The settings on all client computers take effect automatically following the server. It's much easier for you to manage and monitoring your employees' activities by setting up everything at one time. You don't have to do settings on the clients one by one.
2
. OsMonitor has no specific any requirement for the target computers, network structure, distribution and it is fully compatible with all versions of operating system. High security with the hidden running in client PCs' background and can never be closed by Windows task management. . 
3. Block any chatting program like AIM, ICQ, MSN, any downloading program like Bit Torrent and any P2P software which occupy company’s bandwidth.
4. Forbid any USB ports and any USB storage device, such as portable hard disk and flash memory disk, etc., to avoid confidential information leak. Record all of the AIM conversation, Google Talk, ICQ conversation and MSN messenger conversation.
5. Forbid surfing on the Internet. It can assign which particular computers and employees can access to Internet, when the employees can access to Internet, and which particular Websites cannot be accessed, such as sex sites, stock sites and more. It also can grant access to or block some particular websites as well.
6. Forbid installing illegal software like games. Only permit working related software, for example, you can allow your employees' computer only run Word or Excel, in that case, other programs are not allowed running.
7. Do you want to know who is downloading? Which computer is infecting the worm virus? OsMonitor allows you to view the downloading and uploading stream of every employee’s computer. All of the data are saved for your later review.
8. The LAN administrator can control the whole LAN without any difficulty due to the user-defined feature of the forbiddance and surveillance functions. 
9. Record the employees' windows opened, program run, web sites visited and conversation in chatting program.
10. Monitoring files operation, record the files copied, pasted and deleted, and report the information of USB storage devices plugged in. 
11. Besides the instant forbiddance of the employees' appropriate activities, it also saves these records for later review with indices. All of the report forms can be printed in the form of Word or Html.

Main functions of OsMonitor employee monitoring software: restriction and monitoring

Employee Restriction Option

Restrict all chatting tools running. Block chatting, block AIM, MSN, block games, block Internet Games, block special programs, block special software, and block all software you don't want to run. Different employees have different rights. Forbid all online chatting programs like AIM, ICQ, MSN, Google Talk, all games like ICQ game and all unallowed software. It can recognize and forbid the games and the software automatically and intelligently. Employees enjoy their authority level on their Online and PC activities.
Customize white list. You can customize employees' computer to only run software related with work, for example, you can customize their computers to only run Word, Excel, in that case, other software are not allowed to run. (recognize the condition code instead of the application filename.)
Forbid downloading and all P2P software which takes up the bandwidth.
Block USB devices. Block flash memory disk, block CD driver, block USB port to avoid information leak and security threat.
Monitor and restrict accessing the Internet. It can nominate the users, the computers and times for accessing the Internet, and only permit the visit of specific Websites. OsMonitor also can help you to block porn websites and stock websites.
Forbid illegal installation of programs and software like games. Forbid the entrance of safe mode, and any modification on control panel.
Forbid accessing movie and music entertainment online.
Forbid changing IP address illegally and support the binding of MAC address and IP address. It also forbids the illegal disconnection of Lan, which will result automatic turning off. 
All of the functions are controlled by the server administrator without any difficulty.

Employee Monitoring option

See and record all of the widows your employees open, the programs they run, and the websites they visit. With the records are saved in the server’s database automatically for your later review, the employees' working status is easy to be checked.
Document tracking feature allows you to record the files the employees copied to removable media such as USB storage devices, CD, DVD, flash disk, etc. , which are pasted and deleted. You can even record when the removable media was removed from the computer. All of the records can be saved in server’s database for later review.
Monitor and record network card flow of every employees' computer in real time. All the data are saved for your later reviewing.
The employees' screen capture function allows you to view their instant screen (motive picture) via server at any time.
Application installation monitoring function allows you to view the software your employees installed in their computer on OsMonitor Server at any time.
Monitor process. You can view what software is running on your employees' computer on Server at any time and you can end process you want to end.
Monitor chatting conversation. Monitor and record all AIM conversation, ICQ conversation, MSN conversation and Yahoo Messenger conversation, Skype conversation, Google Talk. All the records can be saved on Server database for your later reviewing at anytime.
Backup files. Backup automatically all increased and modified work files (word document, program code, etc.) on Server from your employees' computer.
Email recorder provides you the every details of Emails via Outlook Express or Outlook. You even have the option of recording Email attachment. OsMonitor is the only one software in the world which supports the monitoring and backup of SSL secured Emails.
System information monitoring allows you to check the client computers’ hardware information and the hard disk storage usage.

The function of monitoring Internet activity:

Forbid the sex websites intelligently.
Forbid the URL containing specific words. For example, if you enter ‘girl’ as the key word, any URL with this word will be blocked automatically. 
Only permit some particular websites. If other websites are opened, it will close them and alarm.
Forbid the web page containing specific words. For example, if you enter ‘stock’, ‘game’ and ‘movie’, all web pages with those words will be blocked. If the users try to visit them more than once, it will alarm.

The function of blocking USB storage devices

Block any USB storage devices, like flash disk, portable hard disk, digital camera, mobile phone memory card.
Only forbid USB storage devices, rather than USB mouse, keyboard etc.
Can only monitor the use of USB storage devices, record the files copied without forbidding the use of USB storage devices.

Download  Monitoring Software


Thanks for Reading This Article. Hope you will like…..

Be a Good Hacker and Save the Nation!!!!!


Thanks & Regards
Tarun Arora
Tarora89@gmail.com