Showing posts with label information of hacking. Show all posts
Showing posts with label information of hacking. Show all posts

Monday, July 7, 2014

Whatsapp hack sniffer

whatsapp


Hello to all APAJR Lab readers in last post i describe about how to protect your whatsapp account getting hack from your enemies or Hackers. Today i am going to show you How to hack your victim Whatsapp account using whatsapp sniffer and wifi.  Whatsapp sniffer is a tools used for hack a whatsapp account to read conservation, images, videos and chats. This whatsapp sniffer method only work when victim on same wifi network (open/wep/wpa/wpa2).

Requirement:

  • Rooted android phone
  • Supported platform ( Android, Nokia, IOS,) May we work on windows (Not rested). Not work on blackberry
  • You and Victim in same wifi network
  • Wifi security (Open/wep/wpa/wpa2)


How it work :


Whatsapp sniffer hack your victim whatsapp account, when both (you and your victim) in same wifi network (open/wep/wpa/wpa2). Whatsapp sniffer capture all packet and cookies from your victim device using whatsapp server and sent to your device. so your able to access your victim whatsapp account.

What we can do with whatsapp sniffer tools  :


your able to read all conservation, images, videos and your also able to chat with your victim account and contact. Your eligible to change your victim Names and personal information on whatsapp.




download here

How to make windows7 Genuine using CMD| Indihack

Have You Ever thought of Making Windows 7 Genuine Using Command Prompt Directly Without Using any Activation Crack, Remover, Wat or Loader ? – So Today Here I'm Going to Tell you a very Simple Procedure to Make Your Windows 7 Genuine Using Command Prompt. Because of the High Price of Original Windows 7 Not Everyone Can afford to buy Original Microsoft Windows 7 OS, So they Prefer to Use Cracked Version or Pirated Versions of Windows. Due to Use of Pirated Copy of Windows 7 they often face the Error “Windows 7 is not genuine” and because of this they are Unable to Change the Desktop Background Settings and Control Panel Settings and more. So Here is A Step by Step Tutorial on How to Make Windows 7 Genuine Using Command Prompt Without Using any Activation Cracks or Loader.

How to Make Windows 7 Genuine Using Command Prompt : Steps to Follow

  • First of all You need to Open Cmd ( Command Prompt ) as an Administrator.To Open it as an Administrator Type CMD. Click on Start menu and type CMD and right click on CMD and select run as Administrator, Shown below in the Image.


  •  Now Type the Command SLMGR -REARM in cmd as Shown below in the Image.




How to Make Windows 7 Genuine Using Command Prompt

  • Press Enter and Wait For Few Seconds
  • After a Few Seconds a Message Dialog Box Will open Specifying Command ‘ Completed Successfully. Please Restart the system for the Changes to Take effect ‘ as Shown below in the Image.
                                How to Make Windows 7 Genuine Using Command Prompt

  • Restart Your Computer and Your all done. Now You are Free of the Error ‘Windows 7 is Not Genuine’
Note - You Must Run Command Prompt as an Administrator Else this Method Will Not Work.

   

Tuesday, June 24, 2014

Airtel free internet hack 2014




Follow the steps to use free internet in airtel :-

  • First Download vpn from your-freedom.net
  • Register your account 
  • Make sure you remember your user name and password that you must use to login into vpn.
  • Now open the downloaded vpn


  • Select Configuration under action


  • Enter as given in the above picture (server connection)
  • In proxy settings enter as mentioned in above diagram.
  • Go to Account Information and enter your username and password.
  • Now click Save and exit
  • Now open Your Freedom  vpn, select port option and enter as mentioned in the image given below.








  • Now go to your browser(chrome or firefox ) .Go to proxy settings and enter the proxy as 127.0.0.1  and enter the port as 1234.
  •  Now connect your airtel modem (normal connection).
  • Go to status in vpn and select Start Connection.
  • Now you can access free internet.









Control Others Computer | indihack

How to control or hack friends computer using Darkcomment?












  • First download the dark comment file from the link given at the end of the post.  Remember this is only for educational purpose.
  • After downloading you will see in socket /net tab listening to 1 port. You can listen to same port or You can change the port.


  • Now click on the dark comment rat and click server module and select full editor.



  • Now you will see some settings which is mentioned above.



  • Now go to network settings and add your port which you are listening as mentioned before.



  • This stubing will not allow the user to to delete the file which you created .
  • You can also display the warning message when the user clicks on the virus created by you.
  • By enabling this You can disable the functions which is mentioned above.
  • You can also activate the key logger so that you can receive logging as email.

  • you mus tadd the line that is ip address to continue virus.
  • Next is to blind file that is to set your virus in soe file .  When the user click your file your virus will enter his system and You will get control of it.
  •  After blinding you can choose the icon for your file.

  • Now click build to stuff .  A box will appear which will promt you to select the path to save the virus.
  • After saving you can give it to your friends remember not to close dark comment. when your friend double click on it you will receive a message as below
  • Now  you will see user as given below.

 
  • Now right click on the above user and select control socket .Now You can control the computer from here.



You may also like : Airtel Free Internet Trick

 


 



                   http://fileice.net/download.php?file=3lo8e                  http://quickdl.net/3lo8e 




http://swiftdownload.net/3lo8e                             http://zoomfiles.net/3lo8e 







 


                                       
http://fileunlckr.com/93599             http://flamefile.com/93599 



http://redirectlock.com/93599                                            http://gripped.biz/93599


=======================OR====================

http://www.indihack.blogspot.com/p/blog-page_4.html







Sunday, June 15, 2014

Ethical hacking kit Free download|indihack

Download EC Council Ethical Hacking Kit CEH $300 in Free.

EC Council CEH V6 Video and Ebooks kits. Over 5000 Members downloaded in last 3 weeks. These Ebooks containing 67 Modules Hacking tricks and method with full tutorial.. and video Kit containing 30 attack with clear and perfect way in 720p HD video. with additional Ebooks kits cost $300 but we providing for free to all APAJR Lab readers. All kits information and Modules detail given below.
                


 
EC Council Ebook's Modules

Module 1 - Introduction To Ethical Hacking
 
Module 2 - Hacking Laws

 
Module 3 - Footprinting

 
Module 4 - Google Hacking

 
Module 5 - Scanning

 
Module 6 - Enumeration

 
Module 7 - System Hacking

 
Module 8 - Trojans & Backdoors


Module 9 - Virus & worms

Module 10 -
Sniffers

Module 11 - Social Engineering


Module 12 - Phishing


Module 13 - Hacking Email Accounts


Module 14 - Denial-of-Service


Module 15 - Session Hijacking


Module 16 - Hacking Web Servers


Module 17 - Web Application Vulnerabilities

 Module 18 - Web-Based Password Cracking Techniques

Module 19 - SQL Injection

Module 20 - Hacking Wireless Networks

Module 21 - Physical Security

Module 22 - Linux Hacking

Module 23 - Evading IDS, Firewalls and Detecting Honey Pots

Module 24 - Buffer Overflows

Module 25 - Cryptography

Module 26 - Penetration Testing


Module 27 - Covert Hacking


Module 28 - Writing Virus Codes


Module 29 - Assembly Language Tutorial



Module 30 -  Smashing the Stack for Fun and Profit

Module 31 - Windows Based Buffer Overflow Exploit Writing


Module 32 - Reverse Engineering


Module 33 - MAC OS X Hacking
 
Module 34 - Hacking Routers, cable Modems and Firewalls

 
Module 35 - Hacking Mobile Phones, PDA and Handheld Devices

 
Module 36 - Bluetooth Hacking

 
Module 37 - VoIP Hacking

 
Module 38 - RFID Hacking

 
Module 39 - Spamming

 
Module 40 - Hacking USB Devices


Module 41 - Hacking Database Servers

Module 42 -
Cyber Warfare- Hacking, Al-Qaida and Terrorism

Module 43 - Internet Content Filtering Techniques


Module 44 - Privacy on the Internet


Module 45 - Securing Laptop Computers


Module 46 - Spying Technologies


Module 47 - Corporate Espionage- Hacking Using Insiders


Module 48 - Creating Security Policies


Module 49 - Software Piracy and Warez

Module 50 - Hacking and Cheating Online Games

Module 51 - SQL Injection

Module 52 - Hacking RSS and Atom

Module 53 - Hacking Web Browsers (Firefox, IE)

Module 54 - Proxy Server Technologies

Module 55 - Data Loss Prevention

Module 56 - Hacking Global Positioning System (GPS)

Module 57 - Computer Forensics and Incident Handling

Module 58 - Credit Card Frauds


Module 59 - How to Steal Passwords


Module 60 - Firewall Technologies


Module 61 - Threats and Countermeasures



Module 62 -  Case Studies

Module 63 - Botnets


Module 64 - Economic Espionage


Module 65 - Patch Management

Module 66 - Security Convergence



Module 67 -  Identifying the Terrorist


========================================================================

Addtional kits contains about vulnerablity, internet scanning, tracing, online marketing and much more.

Download this EC Council from the link given below and learn about hacking in a detailed manner.


 


 



                   http://adfoc.us/22646343480153                  http://adfoc.us/22646343480185 




http://adfoc.us/22646343480191                             http://adfoc.us/22646343480199 







 


                                       
http://adfoc.us/22646343480108             http://adfoc.us/22646343480103 



http://adfoc.us/22646343479980                                            http://adfoc.us/22646343480103


=======================OR====================

http://www.indihack.blogspot.com/p/blog-page_4.html