how to hack or #crack_windows_7_password of any account present on the
windows 7 machine in very simple steps.
Step 1: Shutdown the computer or machine by
pressing “power” button for few seconds.
Step 2: Turn On the machine and wait till the
Microsoft logo coming up on the screen. As soon
as you see the logo , shut it down once again by
pressing “power button” as in below image.
logo
Step 3: Turn On the machine once again, and now
you will see an option to “Launch Start-up repair”.
select it and hit enter.
repair
Step 4: Now it will load couple of windows file and
then startup repair will start. That’s where you
have to wait till it gets complete, which will never
going to fix the problem.
startup repair
Step 5: Once its gets complete, click on ” View
problem Details ” option and scroll down.You will
find one tezt file link. as mentioned in below
images.
view test
Step 6: Open the link, go to file option and click
open again.Then open computer locate the the
“Magnify.exe” file in “Windows/System32″ folder
and rename it as “Magnify.old”.
magnify
Step 7: Locate “cmd” file in same folder and
rename as “Magnify” and close all windows and
restart the machine.
Step 8: Once the machine gets boots up, you will
see some account to login , but you dont have
password right?
Now that’s where we will hack this machine. Click
on “Ease access” button on the bottom left corner.
And select “Magnifier” option and click ok.
ease of access
magnifyierJPG
Step 9: Now you have the command prompt with
full privilege. Type “net user” command to find out
the user accounts
present in the machine.
netuser
Step 10: Reset the password of any user account
by following command “net user account name * “,
it will ask you to enter password that u wanna set.
Then then confirm the password. and this will
change the passowrd of your selected account.
reset
That’s how you can easily hack any windows 7
machine without any software.
This is just for education purpose. Don’t use this
method to violate any cyber laws that can lead you
into trouble.
KeyPuncher Helpers
guuud
Saturday, 5 December 2015
How to Hack a website Common Methods used for Website Hacking
How to Hack a website
Common Methods used for Website Hacking
There are lots of methods that can be used to hack a website but most common ones are as follows:
1.#SQL_Injection
2.#XSS(Cross Site Scripting)
3.Remote File Inclusion(#RFI)
4.Directory Traversal attack
5.Local File inclusion(#LFI)
6.#DDOS_attack
Tools:
Acunetix:
Acunetix is one of my favorite tool to find a venerability in any web application It automatically checks your web applications for SQL Injection, XSS & other web vulnerabilities.
Nessus:
Nessus is the best unix venerability testing tool and among the best to run on windows. Key features of this software include Remote and local file security checks a client/server architecture with a GTK graphical interface etc.
Retina:
Retina is another Vulnerability Assessment tool,It scans all the hosts on a network and report on any vulnerabilities found.
Metasploit Framework:
The Metasploit Framework is the open source penetration testing framework with the world's largest database of public and tested exploits.
Common Methods used for Website Hacking
There are lots of methods that can be used to hack a website but most common ones are as follows:
1.#SQL_Injection
2.#XSS(Cross Site Scripting)
3.Remote File Inclusion(#RFI)
4.Directory Traversal attack
5.Local File inclusion(#LFI)
6.#DDOS_attack
Tools:
Acunetix:
Acunetix is one of my favorite tool to find a venerability in any web application It automatically checks your web applications for SQL Injection, XSS & other web vulnerabilities.
Nessus:
Nessus is the best unix venerability testing tool and among the best to run on windows. Key features of this software include Remote and local file security checks a client/server architecture with a GTK graphical interface etc.
Retina:
Retina is another Vulnerability Assessment tool,It scans all the hosts on a network and report on any vulnerabilities found.
Metasploit Framework:
The Metasploit Framework is the open source penetration testing framework with the world's largest database of public and tested exploits.
How Google works
How Google works
Here we will know How #GOOGLE works ?
As we all know that GOOGLE is the worlds most
popular Search engine on our planet Earth. All
Most, all user use google.com to search any query
or any stuff on the internet.
Introduction:-
Google began in March 1996 as a research project
by Larry Page and Sergey Brin, Ph.D. students at
Stanford, California, U.S.
●The term "Google" was originally "Googol", A term
meaning the number "1" followed by 100 zeros,
created by prominent mathematician Edward
kasner.
Google search engine is a web search owned by
Goolge Inc. and is the most used search engine on
the web.
How it works.?
☞ Firstly when users enter search query on the
google search box, and after pressing enter OR
clicking on the search option. The query goes to
Google Web Server
☞ The web server sends the query to the index
servers. The content inside the index servers is
similar to the index in the back of a book. It tell
which pages contain the words that match any
particular query term.
☞ The query travels to the doc servers, which
actually retrieve the stored documents. Snippers
are generated to describe each search results.
☞ The Search results are returned to the user in a
fraction of a second.
● Search engines gather the information and the
number of web pages from internet with the help of
small software known as "Spiders or Google Bot"
●Google store the complete content of a web page
which is known as Cache, whereas other search
engines stores only keywords.
●Google allows upto 32 words to enter in the query
box.
Hope you Understand How GOOGLE works
Here we will know How #GOOGLE works ?
As we all know that GOOGLE is the worlds most
popular Search engine on our planet Earth. All
Most, all user use google.com to search any query
or any stuff on the internet.
Introduction:-
Google began in March 1996 as a research project
by Larry Page and Sergey Brin, Ph.D. students at
Stanford, California, U.S.
●The term "Google" was originally "Googol", A term
meaning the number "1" followed by 100 zeros,
created by prominent mathematician Edward
kasner.
Google search engine is a web search owned by
Goolge Inc. and is the most used search engine on
the web.
How it works.?
☞ Firstly when users enter search query on the
google search box, and after pressing enter OR
clicking on the search option. The query goes to
Google Web Server
☞ The web server sends the query to the index
servers. The content inside the index servers is
similar to the index in the back of a book. It tell
which pages contain the words that match any
particular query term.
☞ The query travels to the doc servers, which
actually retrieve the stored documents. Snippers
are generated to describe each search results.
☞ The Search results are returned to the user in a
fraction of a second.
● Search engines gather the information and the
number of web pages from internet with the help of
small software known as "Spiders or Google Bot"
●Google store the complete content of a web page
which is known as Cache, whereas other search
engines stores only keywords.
●Google allows upto 32 words to enter in the query
box.
Hope you Understand How GOOGLE works
#Hacking #Facebook Account From Your #Android Device
#Hacking #Facebook Account From Your #Android
Device
I Know Many of you were waiting for this Post
about How to hack Facebook account using your
android device.This tutorial is easier and you will
get almost 95% success if you and your victim are
on same network.
I am writing this tutorial to make people aware so
please make sure that you are not using this
tutorial in any illegal way.
This tutorial is just for educational purpose.
There’s a app Outhere Called “Faceniff“. FACENIFF
is basically an Android application that lets users
sniff and intercept web session profiles over Wi-Fi
networks, stealing other users’ credentials through
which you can attack your victim’s Facebook,
Orkut, Twitter and much more accounts in a
minute. Isn’t it Cool
Note :- The Tutorial Only Works if you and your
Victim are On Same WiFi Network
Follow The Given Steps Below :
1) At First Download Faceniff from below HERE
: http://faceniff.ponury.net/
2) Connect to the working network connection and
open the FaceNiff app.
3) Now click the red button and it will then turn
green when the sniffer is on.It is like Firesheep for
android devices.
Firesheep is a Firefox add-on that allowed
unscrupulous users to do the same thing. FaceNiff
has a leg up on Firesheep though, since the app
runs on Android phones, doesn’t require any real
customization to run, and even supports WPA
encrypted wireless networks, as long as you’re
already on the network.
4) Press the enter button and It would show a list
of all the accounts which are connected to the
network and you could hi jack into that all
accounts.
5) Click on the account which you wish to hack
and you will automatically logged in the account in
which you wish you to.
6) Now you can do whatever you want with the
hacked account
Note :- The App Only Work On Rooted Android
Devices
Tips to protect yourself against this App
1) The fix for most people is to enable HTTPS for
every service where it’s available.
2) You can protect your internet connection when
you use public Wi-Fi at a coffee shop or airport
with a VPN, either to your office or school or a free
service like Hotspot Shield or Hamachi.
3) Alternatively, you can just not connect to public
wireless networks and tether to your phone or use
your wireless carrier’s connectivity options instead.
Hope You Enjoyed Our Article
Device
I Know Many of you were waiting for this Post
about How to hack Facebook account using your
android device.This tutorial is easier and you will
get almost 95% success if you and your victim are
on same network.
I am writing this tutorial to make people aware so
please make sure that you are not using this
tutorial in any illegal way.
This tutorial is just for educational purpose.
There’s a app Outhere Called “Faceniff“. FACENIFF
is basically an Android application that lets users
sniff and intercept web session profiles over Wi-Fi
networks, stealing other users’ credentials through
which you can attack your victim’s Facebook,
Orkut, Twitter and much more accounts in a
minute. Isn’t it Cool
Note :- The Tutorial Only Works if you and your
Victim are On Same WiFi Network
Follow The Given Steps Below :
1) At First Download Faceniff from below HERE
: http://faceniff.ponury.net/
2) Connect to the working network connection and
open the FaceNiff app.
3) Now click the red button and it will then turn
green when the sniffer is on.It is like Firesheep for
android devices.
Firesheep is a Firefox add-on that allowed
unscrupulous users to do the same thing. FaceNiff
has a leg up on Firesheep though, since the app
runs on Android phones, doesn’t require any real
customization to run, and even supports WPA
encrypted wireless networks, as long as you’re
already on the network.
4) Press the enter button and It would show a list
of all the accounts which are connected to the
network and you could hi jack into that all
accounts.
5) Click on the account which you wish to hack
and you will automatically logged in the account in
which you wish you to.
6) Now you can do whatever you want with the
hacked account
Note :- The App Only Work On Rooted Android
Devices
Tips to protect yourself against this App
1) The fix for most people is to enable HTTPS for
every service where it’s available.
2) You can protect your internet connection when
you use public Wi-Fi at a coffee shop or airport
with a VPN, either to your office or school or a free
service like Hotspot Shield or Hamachi.
3) Alternatively, you can just not connect to public
wireless networks and tether to your phone or use
your wireless carrier’s connectivity options instead.
Hope You Enjoyed Our Article
#Hack any #Bluetooth enabled #mobile phone-
Follow these steps to #Hack any #Bluetooth enabled #mobile phone-
Download Super Bluetooth Hack 1.8 and also check that your mobile is in the list of supported handsets from the link provided.
After you have downloaded the .jar file, install it in your mobile.
There is no need to install the software in the mobile which you want to hack.
Turn on the Bluetooth of your handset and open the Super Bluetooth Hack Application.
Select the connect option and then Inquiry Devices to search for any of mobile that has its Bluetooth turned on nearby.
Your friend’s Bluetooth must also be turned on to be found. Pairing between the devices is also necessary sometimes.
Once your friend’s phone has been found, try out its functions!
Download Super Bluetooth Hack 1.8 and also check that your mobile is in the list of supported handsets from the link provided.
After you have downloaded the .jar file, install it in your mobile.
There is no need to install the software in the mobile which you want to hack.
Turn on the Bluetooth of your handset and open the Super Bluetooth Hack Application.
Select the connect option and then Inquiry Devices to search for any of mobile that has its Bluetooth turned on nearby.
Your friend’s Bluetooth must also be turned on to be found. Pairing between the devices is also necessary sometimes.
Once your friend’s phone has been found, try out its functions!
Set #Processes #Priority
Set #Processes #Priority
Follow this tip to increase the priority of active processes, this will result in prioritization of processes using the CPU.
CTRL-SHIFT-ESC1.Go to the second tab called Processes, right click on one of the active processes, you will see the Set Priority option
2.For example, your Run your CD writer program , set the priority higher, and guess what, no crashed CD’s
Follow this tip to increase the priority of active processes, this will result in prioritization of processes using the CPU.
CTRL-SHIFT-ESC1.Go to the second tab called Processes, right click on one of the active processes, you will see the Set Priority option
2.For example, your Run your CD writer program , set the priority higher, and guess what, no crashed CD’s
Subscribe to:
Posts (Atom)