Skip to main content

Posts

How to make your SmartPhone work as Mouse and Keyboard

Hello friends, today we will learn how to make our Smartphone work as a Mouse and Keyboard remotely. We can also perform the below activities through this : 1. You can Manage your System Drives 2. Play Music of System 3. Restart, Log off, Shutdown and Lock the System Remotely 4. Control Youtube, VLC media player etc. Okay so lets begin, for performing this you will require : Unified Remote Server -> Click here to download Unified Remote App( To be installed on your SmartPhone) -> Click here to download Step 1 : Download the Unified Remote Server file from the link provided above and Install it. Step 2 : While Installing it, remember to check the "Windows Firewall Exception". After Installing it, Double click on the icon of Unified Remote Server. It will look like this : If you want to see what all things we can do remotely then check the Remotes tab. Step 3 : Since now our Server is up we are ready to make a connection with the App. D...

How to clear all the Event Logs with just a Click

Hello Friends, today we are going to learn how to clear all the event logs with a few clicks. Before that understand first what is Event logs and how can we view them. What are Event Logs ? According to Microsoft , Event logs are special files that record significant events on your computer, such as when a user logs on to the computer or when a program encounters an error. Whenever these types of events occur, Windows records the event in an event log that you can read by using Event Viewer. How to View them ? Go to Run Prompt ( WINDOWS +R ) -> Type "Eventvwr" -> Enter -> Now you will be able to see the event viewer console. This is the place where windows store all the event logs of your computer. Now the main question is, what is the need of clearing all this logs ? Whether you do some unauthorized access into a machine or run your own virus on the machine, everything is being recorded in the form of logs. So people can anytime go through thi...

How to Find which USB devices were Plugged in your system

Hello guyz, once again we are back with another interesting trick. Just Imagine, you are running a company where you have disabled the USB Access for your employees. But since there are many clever minded peoples,they will always try to connect some or the other USB devices. So in this case, today we have are going to show you all a way to knw wat all USB Devices are plugged into a specific System. 2 WAYS TO DO THIS :: 1. REGISTRY 2. POWERSHELL COMMAND >_ THROUGH REGISTRY STEP 1 :   Press " WINDOWS + R " button to open Run prompt -> Type " regedit.exe " and Enter STEP 2 :  Now you are on the Registry window -> Expand  HKEY_LOCAL_MACHINE -> SYSTEM -> CurrentControlSet -> Enum -> USBSTOR STEP 3 :  That's it done.. U can see the list of USB's devices connected on that system( Here we connected a Samsung mobile). >_ THROUGH POWERSHELL COMMAND STEP 1 :   Press " WINDOWS + R " button to open...

Hacking Facebook or any Email Account using IP Tab napping Method

Hi guyz, Today we r going to learn how to hack any Facebook or Email accounts using IP Tabnapping method. IP Tabnapping is similar to "Phishing technique" but here instead of using a web hosting site we will use own system IP address to get he email id and password. So for this you will require : 1. BackTrack OS ( We are using Backtrack5 R2 version, download it frm  www.backtrack-linux.org ) 2. Some social engineering tricks + Brain (most important thing) okay so lets begin : Step 1 : Open Backtrack, Click on  Applications  >  BackTrack  >  Exploiting Tools  >  Social Engineering Tools  >  Social Engineering Toolkit  >  Set Step 2 :  Now u are in the set console, you can see several options there like Social Engineering attack, Fast track penetration testing etc. Just type 1 and press Enter . This will open " Social Engineering attack ".  Step 3 : Now another window will appear Just typ...

How to Bypass SMS Verification send by any email Provider

In most of the websites, it asks to enter your phone number for verification. Sometimes you don't want to give it because of your privacy reasons. Even when we register in websites like Gmail, Yahoo , hotmail, rediffmail etc. they asks for SMS Verification. So today we will learn how to bypass this SMS Verification method using external number. For this method u can use the below mentioned website : 1.  http://receive-sms-online.com/ 2.  http://sms-verification.com So how it works. This websites will provide you with some numbers . For example we are using  http://receive-sms-online.com/  , In the below image u can see it is providing with some numbers. we will use this number to verify our account. Now give any of this number where it asking for number and for the verification click on the Number u gave, and refresh the page. You will get your code as shown on the image below : For any clarification do comment below. CREDITS :- ...

How to find Someone's IP & Location details in just 1 mins

Hello guyz, Today I'm gonna show you "How to find the IP address and Geographical Location of someone in just 1 minute", Easy and quick. This method is 100% working and accurate as tested by me so no useless comments! So lets start : Step 1 : Go to this website :  http://www.whatstheirip.com/ Step 2 : Enter your mail id and click get link . See the image for details. Step 3 : You'll see 2 links, Just copy either one of the link and send to your victim and make him open it, say "check out my new pic" or something like that (Don't open it by yourself). Step 4 :  Check your Inbox in the mail provided in step2. You'll see a mail with an IP address, You got his IP and Geo Location !! When your Victim or Friend opens that link he'll see an error page and he'll think it as a random error. Hope u guyz like this trick. Do comment if u have any problem in the above steps. Credits :- Amar Helloween, Haxor...

How to hack websites using Manual SQL injection

Hello Friends, Today we are going to learn how to hack a website using Manual SQL injection. The website which we will be using in this demo is :  www.unitedpurpose.org/ So, here is the Vulnerable link :  www.unitedpurpose.org/archive/article.php?id='100 So lets begin : Step 1 : First we have to find the number of columns present in the database. So to do that we have to implement the "order by" command in the vulnerable site. Example:  http://www.unitedpurpose.org/archive/article.php?id=100  order by 7 (any no. u have to guess it, i m using 13 ) *Remember if u get error in "order by 7" that means site has less than 7 columns,if we get the same page then the no. of columns is more than 7.. In my case the number of columns are 13. Step 2 : After getting the columns, its time to get the vulnerable column by using "UNION SELECT" no. of all columns 1 after another separated by commas(,). See the example for more clarification : Example :  ...