WELCOME Learn Hacking web site

With our help approve your genuine adsense account within 4 hours only. We will Help you to get maximum revenue from your website blog,wordpress .ect show contact me www.fb.com/mayur.khokhar1

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Wednesday 22 January 2014

Adsense Approval 100%


With our help approve your genuine adsense account within 4 hours
only. We will Help you to get maximum revenue from your website
blog,wordpress .ect. so don't waste
time call us our best engginers they will help you approve your adsense
account....


show contact me  mo:8866685598

Sunday 19 January 2014

Adsense Approval

Image description 
by mayur khokhar

  Adsense Approval

With our help approve your genuine adsense account within 4 hours
only. We will Help you to get maximum revenue from your website
blog,wordpress .ect. so don't waste
time call us our best engginers they will help you approve your adsense
account....

 requst me my fb ID

contact me: www.facebook.com/mayur.khokhar1

AIRTEL Free GPRS Proxy Trick 2014


by Mayur khokhar

Today I Am Back With Latest Airtel Free GPRS Trick,
You Use This Trick On SSL Websites Too,
You Can Watch Unlimited YouTube Videos

Follow Below Instructions:-
  • Proxy:- mysslproxy.com
  • Port:- 80
  • Apn:- airtelgprs.com
  • Homepage:- 203.200.118.92 OR 203.115.112.5 OR 203.115.112.29 OR 122.170.122.202 OR 122.170.122.214 OR d.airtelworld.com
    Use Any Working Homepage From Given Above.
Note:- Save The Settings And Restart Your Mobile
           Use This Trick @ Low Balance.

Saturday 18 January 2014

Anonymous Surfing

by mayur khokhar

JonDo

JonDos publishes a new version of the JonDo-Software, an IP changer and IP anonymization program, that you can use for anonymous surfing in the Internet with high security anonymous proxy servers.

What is JonDo?
 
JonDo is an open source and free-of-charge program for Windows, Linux and MacOS X.
It hides the user's IP adress behind an anonymous IP address. In contrast to other anonymizers (VPNs, anonymous proxy servers), the user's anonymity stays protected even against the providers (operators) of the anonymous IP address.


PhotobucketDownload 


TOR



Tor is very useful for online anonymity, its protect your privacy, defend against a form
 of network traffic analysis. Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic
allows others to track your behavior and interests.


Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create
new communication tools with built-in privacy features. 


Tor to keep websites from tracking them and their family members, or to connect to
news sites, instant messaging services, or the like when these are blocked by their
local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. 


Video Tutorial:

PhotobucketDownload 
Tortilla

It is an open source tools that allows users to securely, anonymously, and transparently route all TCP/IP and DNS traffic through Tor, regardless of the client software, and without relying on VPNs or additional hardware or virtual machines. 


PhotobucketDownload


ProXPN



ProXPN helps to upgrades your internet connection with VPN encryption secures all types of connections from DSL and cable to 3G gives you 100% private access to the internet get an IP address in the USA, UK, or NL.
It Protects websites you visit, hijack your passwords, credit cards, or banking details intercept and spy on your email, IMs, calls, or anything else, record your web,history, run traces to find out where you live.

Video Tutorial:

PhotobucketDownload 

UltraVPN - A Free VPN

UltraVPN is a simple user interface to connect or disconnect to our VPN servers.

To use UltraVPN, you need to right click on a traybar icon (on the bottom right of your screen) that looks like a computer with a red screen. After right clicking on it, choose "connect". 

It can be used by any individual who simply wants to protect his privacy, either on a LAN or a public hotspot.

Features:
You can connect or log in into MSN if it's blocked.
For use VoIP software like Skype if it's blocked.
UltraVPN protect your email and browsing privacy.

How can you download UltraVPN?
Download the software client and create account. You are now able to connect to the VPN. 

Video Tutorial:

How To Identify Fake Facebook Accounts

by mayur khokhar

Facebook or Fakebook ?  
How can you detect the Fake FB Profile. On these days we are getting so many friend request specially by girls, but there is no way to identify that account is fake or original. So don't worry we are going to tell you simple method to detect fake Facebook account.




So this is a Facebook account which named by Sarikha Agarwal. Now we need to verify this account real or fake, so our first step is going to the images.google.com and click on camera image.



                                                                                                 So when you click on search by image you will get popup like below image.




                                                                                                        Now go to that profile, right click on image and click on copy image URL




Now profile pic URL has copied.. now again go to images.google.com Tab and paste image URL 

When you enter then you get related images search...


Now you can better see that this profile is real or fake..So here is a proof that this profile is fake. Enjoy the trick..

Be aware when you will going to add an beautiful or smart unknown person as your friend. So be checked first.. there are lot of fake profiles are create everyday. 
This person might be spy on your profile and steal personal information like your photos, etc for their hacking stuffs.. So Be Safe Online..

Proxy Server


>>Proxy servers:-
Its allow for you to configure your browser to route your browser traffic through that machine, which then makes a request for a page on your behalf, and then sends you the results. These are usually used at no cost to the user. Since they are accessible to the public these are often quite slow. Please see instructions for using a proxy server.
There are a variety of types of these proxy servers:

Transparent Proxy - This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.) This type of proxy server does not hide your IP address.

Hackers Index



HACKING FORUMS





























































Clickjacking

What is Clickjacking:

Clickjacking attack allows to perform an action on victim website, Mostly Facebook and Twitter accounts are targetable.
when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top
level page. Thus, the attacker is "hijacking" clicks meant for their page and routing them to other another page, most likely owned by another application, domain, or both. It may be similar to CSRF Cross Site Request Forgeries Attack.  


Clickjacking is a term first introduced by Jeremiah Grossman and Robert Hansen in
2008 to describe a technique whereby an attacker tricks a user into performing certain actions on a website by hiding clickable elements inside an invisible iframe.


Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they
are typing in the password to their email or bank account, but are instead typing into
an invisible frame controlled by the attacker. 


At present this attack mostly use on social network websites like Facebook and twitter, Because this attack is used by convinced victim for click on the link and SocialNetwork website might be very useful for attack on victim.

One famous example of clickjacking is Facebook.



Code:

 <style>
 iframe { /* iframe from facebook.com */
  width:300px;
  height:100px;
  position:absolute;
  top:0; left:0;
  filter:alpha(opacity=50); /* in real life opacity=0 */
  opacity:0.5;
}
</style>

<div>Click on the link to get more followers:</div>
    
<iframe src="/files/tutorial/window/clicktarget.html"></iframe>

<a href="http://www.google.com" target="_blank" style="position:relative;left:20px;z-index:-1">CLICK ME!</a>

<div>You'll be get 10000 followers..!!</div>

Output:
Click on the link to get more followers
Click Me
You'll be get 10000 followers..!!

Download 
ClickJacking Tool

For Defence:
Clickjacking Protection



For more information:
OWASP

Mobile Hack Tricks

by mayur khokhar


Call Forging:


To call someone from their own number or any number.
1. Go to http://www.mobivox.com and register there for free account.

2. During registration, remember to insert Victim mobile number in "Phone number
"field as shown below.




3. Complete registration and confirm your email id and then login to your account.
click on "Direct WebCall".




4. You will arrive at page shown below. In "Enter a number" box, select your country
and also any mobile number(you can enter yours). Now, simply hit on "Call Now"
 button to call your friend with his own number.


How to find the IP address of the email sender in Gmail, Yahoo mail, Hotmail, AOL, Outlook Express, etc.

by mayur khokhar

When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender.
Note that this will not work if the sender uses anonymous proxy servers.
Also, note that if you receive an email sent from a Gmail account through the web browser, you may not be able to find the real IP address because Google hides the real IP address of the sender. However, if someone sends you a mail from his/her Gmail account using a client like Thunderbird, Outlook or Apple Mail, you can find the originating IP address.
Lets begin this. First of all, the IP address is generally found in the headers enclosed beween square brackets, for instance, [129.130.1.1]

Finding IP address in Gmail

  • Log into your Gmail account with your username and password.
  • Open the mail.
  • To display the email headers,
    • Click on the inverted triangle beside Reply. Select Show Orginal.
  • You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to 5.
  • Look for Received: from followed by the IP address between square brackets [ ].
    Received: from [69.138.30.1] by web31804.mail.mud.yahoo.com
  • If you find more than one Received: from patterns, select the last one.
  • Track the IP address of the sender

Finding IP address in Yahoo! Mail

  • Log into your Yahoo! mail with your username and password.
  • Click on Inbox or whichever folder you have stored your mail.
  • Click on the Subject of the email you want to track and right-click. You should get a menu like this.
    Yahoo! headers
  • You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to the next step.
  • Look for Received: from followed by the IP address between square brackets [ ]. That should most likely be the IP address of the sender. If there are many instances of Received: from with the IP address, select the IP address in the last pattern. If there are no instances of Received: from with the IP address, select the first IP address in X-Originating-IP.
  • Track the IP address of the sender

Finding IP address in Hotmail

Hotmail has been integrated with Windows Live, or vice-versa. And the format has changed. Here is how you find the IP address of the sender.
  • Log into your Hotmail/Windows Live account with your username and password.
  • Click on the Inbox link on the left.
  • Under the column that says "Sort by", find the email that you want to track and right-click on it. You should get a menu that has something like Mark as readMark as unread, and so on. The last option in the menu should be View message source. Select it. headers hotmail
  • You should see the email headers now.
  • You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to step 6.
  • If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP address
  • If that doesn't work, look for Received: from followed by IP address within square brackets[].
    • If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.
  • Track the IP address of the sender

Finding IP address in AOL

  • Log into your AOL Mail AIM account with your username and password.
  • Open the email that you want to track.
  • On the top row, click on Action and in the drop-down menu, select View Message Source
    headers aol
  • It opens a new page with the headers. Once you have the headers, look for the IP address that follows X-AOL-IP:. That should be the IP address of the sender.
  • Track that IP address of the sender

IP Address Detection Script

I wrote a Perl script to automate this task for you. All you have to do is select your email service and copy your email headers in the box below. You may do one of the following:
  • You can copy all the headers from your email and paste them here. In this case, the unnecessary headers (like Subject:) will be removed automatically.
  • You can remove all headers except those beginning with
    - **X-Originating-IP:**
    - **Received:**

Wednesday 15 January 2014

Why Your Encryption/Passwords Suck ? New Security Methods : 3D Face Analysis, Bio Metrics, ETC ...

by Mayur Khokhar

" Treat Your Passwords Like you treat your Toothbrush, Don't Let anyone Use it and Change it every 6 Months " - Clifford Stoll, Scientist.
Thousands of Online Services uses Password, Be it Banks, Shops, Social Networking Sites, Email's And Every other service. These Passwords are lying on the Databases of the companies, Which frequently have very basic security.
And These sites Do Get Hacked, Here Are Some Of The Greatest Attacks :



Sony PlayStation Network :77 Million Accounts Hacked. Site Down For 24 Days.
Evernote :50 Million Accounts Hacked, Including Addresses.
LinkedIn :6.5 Million Accounts Hacked.
Gamigo :8.24 Million Accounts Exploited.
Yahoo Voices :450,000 Accounts Hacked.
Twitter : 250,000 Accounts Hacked.

Most Of the Accounts Get Hacked Because the Main Site Server Gets Exploited, But Many Individual Accounts Get Hacked Because people are too damn dumb to use complex password, A Survey done by Mark Burnett for 12 years Indicates that 78% of online users use These passwords :


123456jordangeorgeyankees
1234supermancharlie123123
12345678harleyandrewashley
qwerty1234567michelle666666
dragonfucklovehello
sexassholejessicaamanda
12345hunterboobsorange
baseballtrustno1legend-arybiteme
footballranger6969freedom
letmeinbusterpeppercomputer
monkeythomasdanielfuckme
696969tigeraccessnicole
abc123robert123456789thunder
mustangsoccer654321ginger
michealpornjoshuaheather
shadowbatmanmaggiehammer
masterteststarwarssummer
wintwejenniferpasssilver
fuckingcarloverkillerwilliam


What And How Hackers Do What They Do !

I Don't Know How, But somebody tricked us into thinking Hackers are Geeks on Laptops ( which we are) but you should also remember that Hackers have great observation skills. Hackers Follow you everywhere, Once they lay their eyes on a target, they dig out every bit of information available about you. They spy on your online photos, They know your cat's name, Your Car's Model and everything you might have mentioned in online world.
Hackers Can attack you on many fronts, like : Cracking your Social networking website password, Stealing Data from your personal computer, Phishing you or even using your E-Mail ID to send messages to terrorists.

You'll Love :Learn How To Crack Windows Password In Minutes.

Methods To Confuse And Avoid Hackers :

Two Factor Authentication :

Many E-mail Providers use Two Factor Authentication like Gmail And Yahoo, And it the strongest method to protect yourself from getting hacked. To access your account, First you have to sign in Using your E-mail and Password, And then An Eight Digit Code is sent to your mobile within a few seconds, Which you have to fill online to get access to your account.
Pros :
Strongest Security Method.
You know when your account is being accessed.
Alert On Your Mobile if someone tries to brute-force your account.
Cons :
Not so Time Efficient.
You Need Your Mobile And Good Signal Reception.

You'll Love : Learn How To Clone A Mobile Number !

Total Rating :
Security :

Comfort :


OPENID :

A Universally Usable ID Is given to you if you use OPENID. UUID are mostly URL specially crafted for you. To Log In into any service, You'll have to just insert your OpenId, Not your password. Using OpenID is also a good Idea as password have a habit of getting hacked. OpenID is usable on Google, Yahoo, LiveJournal, Hyves, Blogger, Flickr And other sites.

Pros :
One-For-All Username and Password.
Saves Time.
Cons :
Not So-Many Sites Supported.

Total Rating :
Security :

Comfort :

Swipe Gestures :

Swipe gestures are a popular way to lock your Android Phones, And they very Are Simple to use, Thus easily crack-able. Anybody can remember your Swipe by seeing it first time, Also Somebody can find out your swipe by observing the scratches on the surface of your screen.
Pros :
Easy And Simple.
Cons :
Easily Hack-able.

Total Rating :
Security :

Comfort :

Password Stick :

On Many Operating Systems, You Can create a password stick which can unlock your computer by plugging it in. It is a time saving and secure method, Unless Your hacker is also good at picking pockets.We are not very fond of this method, as your brain is the safest place to store sensitive information.
Pros :
Time Saving.
Easy.
Secure.
Cons :
Danger Of Getting Hacked if stick is stolen.

Total Rating :
Security :

Comfort :

Finger Print Scan :

One of the oldest method of securing, Finger print scanners are widely available on Laptops, Netbooks, External USB Scanner etc. Also a rumor has it that the new iPhone Might have a Fingerprint scanner in the home button. It is a good and secure way to protect your data.
Pros :
Easy To Use.
Widely Available.
Cons :
Remember to clear the scanner after each scan or the print left on the scanner can be easily used by hacker.

Total Rating :
Security :
Comfort :

3D Face Analysis :

On Mobile Since Android 4.0, 3D Face Scan is an awkward way to unlock your mobile, It uses your  mobile/laptop camera to take a video of your whole face each time to unlock your device. But we don't think this type of security method is useful in Mobiles, Tough it is very useful in PC Security and Other stuff that you don't need to unlock every other second.
Pros :
Very Secure.
Very Difficult To Hack.
Cons :
Good Lightning needed.
Can be cracked by a video of your's.

Total Rating :
Security :

Comfort :

Behavior Pattern :

Everybody has different way of interacting with technology, And the Swedish Firm BehavioSac Has used it to create a new security system. In this method, You Need to enter your password and have to do it in the same way you did before. Other Factors Include : Typing Rhythm, Speed, And on touchscreen Devices : Angle of gestures, pressure of angles and other stuff !
Pros :
Highly Secure.
Easy To Use.
Cons :
Not available on the market Yet.
Could be a pain in the ass when you're drunk or sleepy.

Total Rating :
Security :
Comfort :

Conclusion :
With the increasing security risk, It Would be a good idea if the services we use everyday would get a security upgrade, And If the users follow some basic security tips, It would make them much more secure in the online world.

***For free Breaking News Alerts just sms JOIN NAXATRANEWS to 567678********For free Adult Jokes just sms JOIN 18JOKES to 567678*****