WELCOME Learn Hacking web site

With our help approve your genuine adsense account within 4 hours only. We will Help you to get maximum revenue from your website blog,wordpress .ect show contact me www.fb.com/mayur.khokhar1

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Sunday, 30 September 2012

Download youtube Video By using VLC Media player | by hackingtrick 1:19 AM Jitendra saini 6 comments Hi , friend 's Today i am share A unique trick youtube to download video By using VLC Media Player and your browser. first --> open your youtube on your browser then open your video And copy URL. First-->Run your vlc then click Media->open network stream.. Third -->then paste URL in 'please enter network URL: ' --> Then click ' Play ' button in the player. --> Then Now, click Tools – Codec Information and at the bottom of the window you will see a Location box. Copy the long URL in the box and paste it on your browser’s address bar. The browser will now start playing the video file. You can download the video file to your desktop by doing a Save As…. Or you can choose to record the video. If U like this trick comment here and pressSubscribe Button Dont Forget Like Our Facebook Page.

Download youtube Video By using VLC Media player | by hackingtrick

Hi ,
friend 's Today i am share A unique trick youtube to download video By using VLC Media Player  and your browser.
first --> open your youtube on your browser then open your video And copy URL.
First-->Run your vlc then  click Media->open network stream..




Third -->then paste URL in 'please enter network URL: '




--> Then click ' Play '  button in the player.
 --> Then  Now, click Tools – Codec Information and at the bottom of the window you will see a Location box. Copy the long URL in the box and paste it on your browser’s address bar. The browser will now start playing the video file. You can download the video file to your desktop by doing a Save As…. Or you can choose to record the video.




If U like this trick comment here and pressSubscribe Button Dont Forget Like Our Facebook Page.

Speed Up Your Net Speed

Best Hacking Tricks To Increase Your Internet Speed | Speed Up Your Net Speed


we all know that a slow internet connection really costs time and makes feel annoying . many friends ask me the ways to increase their internet speed.however . it's possible to do to some extent and make your internet
much better then it was in the past.

There are Two tricks that will help you to increase your internet speed..


First Method- Speed Up Your Net Speed By 20%


1. First you go to start button

2. Go To Run

3. Type gpedit.msc And Then Hit Enter.

4.Then Expand Adminsitrative Templates.

5.Then Network

6.Then QoS Packet Scheduler.

Now A New List Appear . Click On Limit Reservable Bandwidth.
Just Disable it.

Now You Click On Apply .

That's It Now You Are Done !! :)

Now Just Restart Your Computer . And I hope You will Get change in Your Speed

Some Basic Tricks From My Side-
1. Use IDM To Boost Your Downloading Speed.

2. Use A Good Anti-virus in Your Computer.
3. Remove Unwanted Add-ons, Software,Unwanted Files Form Your Computer.

4.Update Your Drivers Periodically.

5.Keep A Good Maintennance Of Your Computer.

So I Hope this tricks was useful for you !!

Please Share Your Views Vis Comments On This Tips

Download youtube Video By using VLC Media player | by hackingtrick 1:19 AM Jitendra saini 6 comments Hi , friend 's Today i am share A unique trick youtube to download video By using VLC Media Player and your browser. first --> open your youtube on your browser then open your video And copy URL. First-->Run your vlc then click Media->open network stream.. Third -->then paste URL in 'please enter network URL: ' --> Then click ' Play ' button in the player. --> Then Now, click Tools – Codec Information and at the bottom of the window you will see a Location box. Copy the long URL in the box and paste it on your browser’s address bar. The browser will now start playing the video file. You can download the video file to your desktop by doing a Save As…. Or you can choose to record the video. If U like this trick comment here and pressSubscribe Button Dont Forget Like Our Facebook Page.

Download youtube Video By using VLC Media player | by hackingtrick

Hi ,
friend 's Today i am share A unique trick youtube to download video By using VLC Media Player  and your browser.
first --> open your youtube on your browser then open your video And copy URL.
First-->Run your vlc then  click Media->open network stream..




Third -->then paste URL in 'please enter network URL: '




--> Then click ' Play '  button in the player.
 --> Then  Now, click Tools – Codec Information and at the bottom of the window you will see a Location box. Copy the long URL in the box and paste it on your browser’s address bar. The browser will now start playing the video file. You can download the video file to your desktop by doing a Save As…. Or you can choose to record the video.




If U like this trick comment here and pressSubscribe Button Dont Forget Like Our Facebook Page.

National Informatics Centre (NIC INDIA) got hacked by Anonymous !

National Informatics Centre (NIC INDIA) got hacked by Anonymous !

National Informatics Centre (NIC INDIA) got hacked by Anonymous !


National Informatics Centre (NIC INDIA) got hacked by Anonymous (India). Purpose of this defacement is just to awake the Govt of India . Anonymous now start Operation India against corruption. Anonymous are world famous activist and always fight against Injustice.



Defaced Site : http://informatics.nic.in/oldnewsonline/abc.html


Just today Morning the Anonymous Core team announce the about operation India on there official Twitter :



All Indians and Anonymous are Invited to Join the Revolution against Corruption in India at : http://www.facebook.com/OperationIndia and on Twitter : https://twitter.com/#!/operationindia

When corruption, destruction and mayhem strikes from governments or corporations it is the goal of anonymous to awaken that entity and the public that a change must occur.As price pritchet once said, "change always comes bearing gifts."Anonymous is the gift we have been waiting for. Honest and trustworthy persons working hard on our behalf for the betterment of mankind.

Warning - This article is only for education purposes, HACKING begins is not responsible for any kind of damage cause by information provide in this article. 

Hack about 80% of every website out there

Hack about 80% of every website out there


All right,
You kids need to stop asking for someone else to hack your "friends" forum, your girlfriends myspace page, etc.

You want to learn to hack, stop asking stupid questions.

There is ONE tool, that was created originally to protect from hackers. Unfortunately, it's one of the best friends a hacker will ever have :

It's called Acunetix.

Acunetix is a tool that scans websites for known vulnerabilities. It will list all possible sql, xss, html injections, all java injections, all passwords and database weaknesses, all ftp weaknesses, etc. All form submissions exploits that the website can be targeted with. Remote upload and download vulnerabilities.

It will work in 80% of the cases, its database is updated regularly, but websites with latest updates and a good admin might not be targetable.

So here's the thing. Before you post anymore questions such as : "Can this website be hacked ?" or "How do I hack this forum ?", download Acunetix in the link below (I couldn't be bothered uploading a new one).

DOWNLOAD :
Acunetix Full Version HERE

PASSWORD : hf.net
(Uploaded by me, 100% clean)

Simply install it and copy the crack folder content into your Acunetix folder (replace files), and when you start the program, click on New Scan, follow the steps.

It will answer most of your questions. Take any known website, scan them and you'll find lots of little "medium risk" security problems etc. The program will explain what the potential harms are, not how to do them. The rest is up to you, do a bit of research, learn by yourself.

So use Acunetix, and stop asking stupid things that just make people think you have a pea for a brain.

Oh, and last tip : http://www.google.com is your friend. Don't forget it before you ask anything else.

website with denial of service attack

Flood a website with denial of service attack

What is a Denial Of Service Attack?

A denial of service attack (DOS) is an attack through which a person can render a system unusable or significantly slow down the system for legitimate users by overloading the resources, so that no one can access it.
If an attacker is unable to gain access to a machine, the attacker most probably will just crash the machine to accomplish a denial of service attack,this one of the most used method for website hacking

Types of denial of service attacks
There are several general categories of DoS attacks.Popularly, the attacks are divided into three classes:


bandwidth attacks,
protocol attacks
logic attacks


What is Distributed Denial of Service Attack?

In DDOS attack, The attacker launches the attack using several machines. In this case, an attacker breaks into several machines, or coordinates with several zombies to launch an attack against a target or network at the same time.
This makes it difficult to detect because attacks originate from several IP addresses.If a single IP address is attacking a company, it can block that address at its firewall. If it is 30000 this is extremely difficult.

Damages made By Denial of service attack:

Over past years Denial of service attack has made huge amount of damage,Many of the have been victimed of this attack
Its Real,On February 6th, 2000, Yahoo portal was shut down for 3 hours. Then retailer Buy.com Inc. (BUYX) was hit the next day, hours after going public. By that evening, eBay (EBAY), Amazon.com (AMZN), and CNN (TWX) had gone dark. And in the morning, the mayhem continued with online broker E*Trade (EGRP) and others having traffic to their sites virtually choked off.

This attack also recently hit twitter on 6th August 2009,lot of people had trouble on logging on twitter,It was brought down by denial of service attack,They tired up there server so no one can get on log on it.Websites like facebook,ebay etc have also been victim of this attack.



Now i will show you how you can flood a website with Denial of service attack. For this tutorial we will be using one of the most effective and one of the least known tools called "Low Orbit Ion Cannon", created by Anonymous members from 4chan.org, this program is one of the best for DDoS'ing, and I have successfully used it to DDoS websites. An internet connection as bad as mine (2,500 kb/s) was able to keep a site down for a day with this program running. Remember that this tool will work best with high internet speeds, and try not to go for impossible targets (like Google, Myspace,Yahoo). LOIC is used on a single computer, but with friends it's enough to give sites a great deal of downtime.

Prerequisites: Download LOIC (Low Orbit Ion Cannon). Open up LOIC.
(I am not giving a download link because then i will be accused for exiting hackers,try goggling).

Step 1: Type the target URL in the URL box.

Step 2: Click lock on.

Step 3: Change the threads to 9001 for maximum efficiency.

Step 4: Click the big button "IMMA FIRIN MAH LAZAR!"

Feel free to tweak around with these settings and play around with the program to get the best performance. Then minimize and go do whatever you need to do, the program will take care of the rest!


Warning - This article is only for education purposes, HACKING begins is not responsible for any kind of damage cause by information provide in this article.

SQL MAP

SQL MAP 

by:mayur khokhar softwere enginier




Welcome to "HACKING begins - An approach to introduce people with the truth of HACKING",In this article I'll tell you about SQLMAP. SQLMAP is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a kick-ass detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating
system via out-of-band connections.

Features

Full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, SQLite, Firebird, Sybase and SAP MaxDB database management systems.
Full support for five SQL injection techniques: boolean-based blind, time-based blind, error-based, UNION query and stacked queries.
Support to directly connect to the database without passing via a SQL injection, by providing DBMS credentials, IP address, port and database name.
Support to enumerate database users, users' password hashes, users' privileges, users' roles, databases, tables and columns.
Automatic recognition of password hashes format and support to crack them with a dictionary-based attack.
Support to dump database tables entirely, a range of entries or specific columns as per user's choice. The user can also choose to dump only a range of characters from each column's entry.
Support to search for specific database names, specific tables across all databases or specific columns across all databases' tables. This is useful, for instance, to identify tables containing custom application credentials where relevant columns' names contain string like name and pass.
Support to download and upload any file from the database server underlying file system when the database software is MySQL, PostgreSQL or Microsoft SQL Server.
Support to execute arbitrary commands and retrieve their standard output on the database server underlying operating system when the database software is MySQL, PostgreSQL or Microsoft SQL Server.
Support to establish an out-of-band stateful TCP connection between the attacker machine and the database server underlying operating system. This channel can be an interactive command prompt, a Meterpreter session or a graphical user interface (VNC) session as per user's choice.
Support for database process' user privilege escalation via Metasploit's getsystem command which include, among others, the kitrap0d technique


DOWNLOAD
SQLMAP

DOWNLOAD Hide IP Platinum

DOWNLOAD Hide IP Platinum 3.0.7.6 Full FREE

very day we read more stories about hackers who break into big business, stealing their identities and wreak havoc. No wonder that we have become more alert to the Internet and concerned about the privacy of the internet.


Then how can you stay safe online?

Now, a good solution for those who are concerned about online security is to use Hide IP Platinum to keep your real IP address and surf anonymously with other IP changing every 10 minutes. It aims to secure all the protocols on your PC, providing full encryption on your activities while working on the Internet, and more. Here's how it looks:


Well from the picture above has been described?
He was playing in the USA but that would be seen is the IP gadungannya hmmm .... are online in the UK.

Ok well for those who want to try to please download the program below:
DOWNLOAD FREE : Hide IP Platinum 3.0.7.6 (4.5 MB)
Crack IP Platinum (1 MB)

How to Root any Android Phone | Unlock Root

How to Root any Android Phone | Unlock Root Universal Android Rooting Software 

by:mayur khokhar softwere enginier

Rooting your device means obtaining "superuser” rights and permissions to your Android’s software. With these elevated user privileges, you gain the ability to load custom software (ROM’s), install custom themes, increase performance, increase battery life, and the ability to install software that would otherwise cost extra money.




Rooting is essentially "hacking” your Android device. Its same like to "Jailbreaking” your iPhone.


Why We Call it Rooting?


The word "root” comes from the Linux field and is used to describe a user who has "superuser” rights or permissions to all the files and programs in the software Operating System. The root user, because they have "superuser” privileges, can essentially change or modify any of the software code on the device.


If you see , your phone manufacturer/carrier only gives you "guest” privileges when you purchase your device. They do this for good reason… they don’t want you getting into certain parts of the software on your phone and screwing it up beyond repair. It makes it much easier for them to manage and update the devices if they lock it all down. This way, all the users are running the same unmodified version of the phone’s software. This makes it much easier for them to support the devices. But for hackers its boaring we like to play with the technology and especially for the tech-savvy crowd, only having "guest” privileges on your device is pretty lame and it locks down a lot of potentially useful features.

Problem in Rooting

The problem with Android rooting is that every phone is different, which means you need to find the right method for your particular device. But here we have a tool called Unlock Root .Unlock Root is about as simple as they come: install the USB drivers for your phone from the manufacturer's web site, plug in your phone, turn on USB debugging, and hit the big green "Root" button.


It claims to root around 250 devices from a ton of manufacturers. It can also unroot them with the click of a button, which is something not a lot of other root apps do.


Download Unlock Root:- http://www.unlockroot.com

Limitations of Rooting

Bricking

The number one reason not to root your device is the potential risk of "bricking” it. For those who do not know what is Bricking, Bricking your device means screwing up your phone software so badly that your phone can no longer function properly and is pretty much as useless as a brick. You would likely need to purchase a new Android device since the manufacturer of your device will void the warranty after any attempts at rooting.
Security Risk
There is an increased risk of unknowingly installing malicious software when you root an Android device. Root access circumvents the security restrictions that are put in place by the Android OS. There isn’t really an effective way to tell just what the application intends to do with that "superuser” power. You are putting a lot of trust into the developer’s hands. In most cases, these applications are open source and the community can take a look at the source code to assess the risk. But, nevertheless, the risk is there. May be the application your are using through rooting is from a hacker himself.

How to Download and Install Android Emulator

How to Download and Install Android Emulator | mayur khokhar


In this tutorial we are going to learn how to install any given Android application in Android emulator. i will help you to setup the android 1.1 and 1.5 emulator.You must have java installed on your machine before installing the Android emulator.



Install Java from here: Go to java.com and install to java.

If you already installed java or recently then you must know that the version of Java installed on your machine is correct or not.

Test installed java from here: Go java.com to check whether you have correct version of java installed or not. If you fine that correct version is not installed then follow the instruction provided in page and install the correct version of java.

After completion of java installation successfully follow below steps to install the Android emulator.
Download the android emulator


Android emulator comes with Android sdk.You can download latest sdk from:android.com

How to install android emulator

Downloaded android sdk will be in compressed format.Uncompressed it to the desired location [e.g. C:\Emulator]and you are done.

Android sdk commands for emulator

Launch the command prompt: Start>Run>Cmd.Locate the emulator.exe path where the android got installed, in this case go to C:\Emulator directory and navigate to tools directory e.g:C:\Emulator\Android\android-sdk-windows-1.5_r2\tools where emulator.exe is present.Navigate to tools directory path in command prompt like shown below.

Type: Emulator.exe -help and execute it. You will find the list of the useful commands related to emulator usage.

* Type: Android -h and execute it. You will find the list of the useful commands related to Android usage.

Android virtual device

Android virtual device is the emulator that we are going to create based on the specific platform of android
.E.g. Android1.1, Abdroid1.5, Android2.0 etc.

* Type: Emulator.exe -help-virtual-device and execute it for more information about android virtual device.

Setup the Android virtual device

This is the command format to create the android virtual device: android create avd -n [UserDefinedNameHere] -t [1 or 2 or 3 etc. based on which android platform you want to create]

* If you want to create android virtual device based on Android1.1 platform then type:android create avd -n MyAndroid1 -t 1
* If you want to create android virtual device based on Android1.5 platform then type:android create avd -n MyAndroid2 -t 2
* After executing one of the above command you will be prompted for the message like below to create custom hardware profile. Type no if you don't want to create custom hardware profile.

* Now after successful setup of android virtual device you will be prompted message like this depending on what platform android virtual device is created:"Created AVD 'MyAndroid1' based on Android1.1 or Created AVD 'MyAndroid2' based on Android1.5"

List of created android virtual devices

Type: Android list avd : This command will display the list of the created android virtual devices as shown in below screen shot.

Launch created android virtual device or emulator

A: Type:emulator.exe -avd [name of the emulator created] : In our case type:emulator.exe -avd MyAndroid1 or emulator.exe -avd MyAndroid2

Now you can see the emulator launched as below. Wait some time to get it initialized , ignore any error message if it appears if it is not blocking,It will also get the Internet connection automatically so you do not need to do anything to surf Internet in emulator. Now you are ready to start you application on emulator !

Facebook Founder is Most Popular Person on Google+ !

Facebook Founder is Most Popular Person on Google+ !

There's irony, like an old man turned 98 who wins the lottery and dies the next day, or a death row pardon two minutes too late, as well as several other examples Alanis Morissette gives in her song "Ironic." And then there's the fact that Facebook founder Mark Zuckerberg is currently the most followed user on Google+, the so-called Facebook killer that's harder to get into than Disney's Club 33.
As of this writing, Zuckerberg ranks No. 1 among Google's top 100 most popular Google+ users with 29,543 followers and 68 friends, according to Google+ Statistics. He has nearly 10,000 more followers than Google CEO Larry Page (19,878). That's also nearly more than Google's Senior VP of Social Vic Gundotra (15,793) and Google co-founder Sergey Brin (15,646) combined. And of the three Google bigwigs, Zuckerberg has 68 more Google+ friends than all of them put together.
Google+ Statistics creator Boris Veldhuijzen van Zanten offered an explanation to TechCrunch for Zuckerberg's rapid rise to the top of Google+ saying, "He has the most friends in the world, they made a movie about him, and he is more handsome than Larry and Sergey." Chinese general and military strategist Sun Tzu has another explanation, one that goes, "Keep your friends close, and your enemies closer."

'Stegobot' Steals Passwords,

'Stegobot' Steals Passwords, Credit Card Data from Facebook Pic


Take a look at your Facebook photo. Seems innocent enough, right? Well, what if behind the photo, hidden in kilobytes of data and totally invisible, was a list of all your passwords and even your credit card number?
It's terrifying — and as with most advanced computer hacking techniques, it's entirely possible.
Researchers from the University of Illinois at Urbana-Champaign and the Indraprastha Institute of Information Technology in New Delhi, India designed Stegobot, a proof-of-concept botnet that attaches to Facebook profiles, and more specifically, and dangerously, steals victims' confidential information, such as online banking and email passwords, through their Facebook pictures.
The researchers developed Stegobot to show how easy it would be for a hacker to use Facebook photos to sneakily spread large-scale online attacks.
['Shocking' Facebook Video Ends Up Owning Your Computer]
After gaining access to computers though the usual channels — infected attachments or redirects to malware-laden websites — Stegobot employs the technique of steganography to hide data in picture files without altering the picture's appearance, NewScientist explained.
That means the photo of you and your friends on the beach might be more revealing than you'd hoped.
It's possible, if Stegobot got its hands on it, that the traditional 720 by 720 pixel image could be harboring 50 kilobytes of data — plenty of space to hide and "transmit any passwords or credit cad numbers that Stegobot might find on your hard drive," NewScientist wrote.
As if the prospect of a computer harvesting your private financial data through your Facebook pictures wasn't scary enough, Stegobot can lurk in the shadows of your pictures and covertly infect all your Facebook friends.
After the botnet hides your personal information in a photo and a friend views your Facebook page, their computer becomes infected. They don’t even have to click on the corrupted photo for Stegobot to go to work.
From there, the masses of stolen data makes their way back to the botnet operator, who can extract the payload from each picture and can use it in whatever devious manner he wishes.
Thankfully, Stegobot only exists in a lab. For now.

***For free Breaking News Alerts just sms JOIN NAXATRANEWS to 567678********For free Adult Jokes just sms JOIN 18JOKES to 567678*****