Showing posts with label hacker tool. Show all posts
Showing posts with label hacker tool. Show all posts

Monday, July 7, 2014

How to make windows7 Genuine using CMD| Indihack

Have You Ever thought of Making Windows 7 Genuine Using Command Prompt Directly Without Using any Activation Crack, Remover, Wat or Loader ? – So Today Here I'm Going to Tell you a very Simple Procedure to Make Your Windows 7 Genuine Using Command Prompt. Because of the High Price of Original Windows 7 Not Everyone Can afford to buy Original Microsoft Windows 7 OS, So they Prefer to Use Cracked Version or Pirated Versions of Windows. Due to Use of Pirated Copy of Windows 7 they often face the Error “Windows 7 is not genuine” and because of this they are Unable to Change the Desktop Background Settings and Control Panel Settings and more. So Here is A Step by Step Tutorial on How to Make Windows 7 Genuine Using Command Prompt Without Using any Activation Cracks or Loader.

How to Make Windows 7 Genuine Using Command Prompt : Steps to Follow

  • First of all You need to Open Cmd ( Command Prompt ) as an Administrator.To Open it as an Administrator Type CMD. Click on Start menu and type CMD and right click on CMD and select run as Administrator, Shown below in the Image.


  •  Now Type the Command SLMGR -REARM in cmd as Shown below in the Image.




How to Make Windows 7 Genuine Using Command Prompt

  • Press Enter and Wait For Few Seconds
  • After a Few Seconds a Message Dialog Box Will open Specifying Command ‘ Completed Successfully. Please Restart the system for the Changes to Take effect ‘ as Shown below in the Image.
                                How to Make Windows 7 Genuine Using Command Prompt

  • Restart Your Computer and Your all done. Now You are Free of the Error ‘Windows 7 is Not Genuine’
Note - You Must Run Command Prompt as an Administrator Else this Method Will Not Work.

   

Tuesday, June 24, 2014

Airtel free internet hack 2014




Follow the steps to use free internet in airtel :-

  • First Download vpn from your-freedom.net
  • Register your account 
  • Make sure you remember your user name and password that you must use to login into vpn.
  • Now open the downloaded vpn


  • Select Configuration under action


  • Enter as given in the above picture (server connection)
  • In proxy settings enter as mentioned in above diagram.
  • Go to Account Information and enter your username and password.
  • Now click Save and exit
  • Now open Your Freedom  vpn, select port option and enter as mentioned in the image given below.








  • Now go to your browser(chrome or firefox ) .Go to proxy settings and enter the proxy as 127.0.0.1  and enter the port as 1234.
  •  Now connect your airtel modem (normal connection).
  • Go to status in vpn and select Start Connection.
  • Now you can access free internet.









Control Others Computer | indihack

How to control or hack friends computer using Darkcomment?












  • First download the dark comment file from the link given at the end of the post.  Remember this is only for educational purpose.
  • After downloading you will see in socket /net tab listening to 1 port. You can listen to same port or You can change the port.


  • Now click on the dark comment rat and click server module and select full editor.



  • Now you will see some settings which is mentioned above.



  • Now go to network settings and add your port which you are listening as mentioned before.



  • This stubing will not allow the user to to delete the file which you created .
  • You can also display the warning message when the user clicks on the virus created by you.
  • By enabling this You can disable the functions which is mentioned above.
  • You can also activate the key logger so that you can receive logging as email.

  • you mus tadd the line that is ip address to continue virus.
  • Next is to blind file that is to set your virus in soe file .  When the user click your file your virus will enter his system and You will get control of it.
  •  After blinding you can choose the icon for your file.

  • Now click build to stuff .  A box will appear which will promt you to select the path to save the virus.
  • After saving you can give it to your friends remember not to close dark comment. when your friend double click on it you will receive a message as below
  • Now  you will see user as given below.

 
  • Now right click on the above user and select control socket .Now You can control the computer from here.



You may also like : Airtel Free Internet Trick

 


 



                   http://fileice.net/download.php?file=3lo8e                  http://quickdl.net/3lo8e 




http://swiftdownload.net/3lo8e                             http://zoomfiles.net/3lo8e 







 


                                       
http://fileunlckr.com/93599             http://flamefile.com/93599 



http://redirectlock.com/93599                                            http://gripped.biz/93599


=======================OR====================

http://www.indihack.blogspot.com/p/blog-page_4.html







Monday, June 2, 2014

Hack website using havij

Download havij and hack website


http://samsclass.info/124/proj11/havij-21.png                                       


















Step1: Find SQL injection Vulnerability in a website and insert the string (like http://www.target.com/index.asp?id=123) of it in Havij as show below.(You Can Find Vulnerable WEbsite Using Automatic Scanner Like Acunetix Web Vulnerability Scanner 8. I will Show You How To Use It In My Next Article  

Download Acunetix 8.0

Download Acunetix 8.0 to scan for website vulnerability


https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrYKkrVhNMP7uYCWPtusXt8WTea0JTV7R8TF3LiB-7gP_sGTIVnbg9e-nilhxDMWiEuRkNWoBnvsw0-PuUFGRvSXf8nslqFOO4Fsl9EddVBx_-mig7nyF8wJZhQGY02airo7AWvBxX0Yw/s1600/Acunetix.Web.Vulnerability.Scanner.CE.jpeg

                                          Most Popular Vulnerability Scanner

Features At a Glance :- 


* Manipulation of inputs from URLs:
Acunetix WVS can automatically identify URL parameters and manipulate them to detect vulnerabilities. This technology is not present in any other competing vulnerability scanner.
Replace manual intervention with scanner intelligence* Automatic custom 404 error page identification:
Acunetix WVS 8 can automatically determine if a custom error page is in use, and recognizes it without needing any recognition patterns to be configured before the scan.
Interpret IIS 7 rewrite rules automatically
Using the web application’s web.config file, WVS 8 can automatically interpret rewrite rules without requiring any manual input.
Fix vulnerabilities while locking hackers out

Download Innobuzz hacking ebook

Download Innobuzz Ethical Hacking Kit CEH $300 in Free.

Innobuzz CEH V7 Video and Ebooks kits. Over 5000 Members downloaded in last 3 weeks. These Ebooks containing 32 Chapters Hacking tricks and method with full tutorial.. and video Kit containing 30 attack with clear and perfect way in 720p HD video. with additional Ebooks kits cost $300 but we providing for free to all indihack readers. All kits information and chapters detail given below.



https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3m_kaPd4eYqNaPhWI0LO-x_Yrw-qjjUvzd8hDv9CztPqWU-RmpUDQ2my2QnFjDq9nSnmMkTkfayKylVbEQizyOrjLyDsDrXgCnfO2bmceNv-ju4uYY9Mo8yKjoh8HVdNmxptVRGBg7EM/s1600/hacking+books.jpg


Innobuzz Ebook's Chapters

Chapter 1 - Introduction To Ethical Hacking
 
Chapter 2 - Networking & Basics

 
Chapter 3 - Footprinting

 
Chapter 4 - Google Hacking

 
Chapter 5 - Scanning

 
Chapter 6 - Windows Hacking

 
Chapter 7 - Linux Hacking

 
Chapter 8 - Trojans & Backdoors


Chapter 9 - Virus & worms

Chapter 10 - Proxy servers & Packet Filtering


Chapter 11 - Denial of service


Chapter 12 - Sniffers


Chapter 13 - Social Engineering


Chapter 14 - Physical Security


Chapter 15 - Steganography


Chapter 16 - Cryptography


Chapter 17 - Wireless Hacking

 Chapter 18 - Firewalls & Honeypots 

Chapter 19 - IDS & IPS 

Chapter 20 - Vulnerability Assessment

 Chapter 21 - Penetration Testing 

Chapter 22 - Session Hijacking

 Chapter 23 - Hacking Web Server 

Chapter 24 - SQL Injection 

Chapter 25 - XSS

Chapter 26 - Exploit Writing


Chapter 27 - Buffer Overflow


Chapter 28 - Reverse Engineering


Chapter 29 - Email Hacking


Chapter 30 - Incident Handling & Response


Chapter 31 - Bluetooth Hacking


Chapter 32 - Mobile Phone Hacking


===============================================
 Video kits attacks chapters
 

Chapter 1 - Introduction To Ethical Hacking
 
Chapter 2 - Wifi WEP Hacking

 
Chapter 3 - Wifi (WAP/WAP2) Hacking

 
Chapter 4 - Google Hacking and Google Dorks

 
Chapter 5 - Computer Hacking

 
Chapter 6 - Windows Hacking

 
Chapter 7 - Linux Hacking

 
Chapter 8 - BackTrack Tutorial


Chapter 9 - Virus & worms

Chapter 10 - Proxy servers & Packet Filtering


Chapter 11 - Denial of service and DDos Attact


Chapter 12 -Wireshark attact and cookies stealling


Chapter 13 - Social Engineering


Chapter 14 - Physical Security


Chapter 15 -
IDS & IPS

Chapter 16 -
Email Hacking

Chapter 17 - Wireless Hacking

 Chapter 18 - Firewalls & Honeypots 

Chapter 19 - IDS & IPS 

Chapter 20 - Vulnerability Assessment


========================================================================
Addtional kits contains about vulnerablity, internet scanning, tracing, online maarketing and much more.

Download this Innobuzz from the link given below and learn about hacking in a detailed manner.


 


 



                   http://fileice.net/download.php?file=3lo8e                  http://quickdl.net/3lo8e 




http://swiftdownload.net/3lo8e                             http://zoomfiles.net/3lo8e 







 


                                       
http://fileunlckr.com/93599             http://flamefile.com/93599 



http://redirectlock.com/93599                                            http://gripped.biz/93599


=======================OR====================

http://www.indihack.blogspot.com/p/blog-page_4.html