Pages

Tuesday 8 May 2012

Facebook hacking


Learn all "5 Hack Facebook Methods - Download Free Hacking Tools, Algorithms, Tips/Tricks" Top 10 Passwords used by 60% Facebook Users. Free Hacking Protection Guide


Hack Facebook for Free

There are so many software that aim to hack of fb passwords online. These function differently, and it is important that you understand the process so you can make the necessary actions that will ultimately keep you safe and protected. Learning about these software also gives you an idea how passwords are created, distributed and stored. The most popular free software facebook hacking tools are - Hydra, Ophcrack, Dsniff, Rainbow Crack and John the Ripper. We Provide their particular descriptions and mode of operation with Free Download Link (No Credit Card Required). Many of them are available in both Windows and Linux version along with 32 and 64 bit support. 


Disclaimer :- Users are advised to use these software responsibly. The main intention to share this information is to create awareness about various hacking methods so that Facebook users can protect them-self from Hacking.

Hydra

Hydra was developed by a group called THC or The Hacker's Choice. It is a software project that invests in dictionary attack to check for simple and weak passwords on a single or more remote hosts that function on different services. This was made as a proof-of-concept utility to show the convenience of hacking simple and poorly selected passwords. The project also supports different protocols and services, such as Firebird, AFP, HTTP, HTTPS, MS-SQL, RSH, RLOGIN, SNMP, POP3, IMAP, Cisco auth, Cisco AAA, SMBNT and HTTP-PROXY among others. THC ceased production of the software in 2007 in accordance with German laws that prohibit the availability of hacking instruments to the public.


Ophcrack cracks Windows passwords through LM hashes via rainbow tables. This is a free open source software which is GPL licensed that also includes that importation of hashes from different formats, including direct dumping from Windows SAM files. On several coputers, Ophcrack can crack several passwords in just a few minutes. Alphanumeric passwords via rainbow tables are given freely by developers. Ophcrack is usually grouped with tables that let it hack passwords that are no longer than 14 characters long. This is available for download in 2 Windows XP tables. Ophcrack can crack NTLM hashes.

Dsniff 
Download it free from here dsniff-2.3.tar.gz

Dsniff is a password sniffer created by Dug Song. It is a package of utilities that include code to parse several application protocols and acquire a variety of information. Dsniff is a set of traffic analysis tools designed for many testings. It can also crush the regular behavior of switched networks and trigger network traffic from other hosts belonging to the same network segment to be visible. It focuses on HTTP, POP, LDAP, Rlogin, NFS, Citrix ICA, NAI Sniffer, Microsoft SQL protocols, OSPF, RIP, Telnet and FTP among others.

Rainbow Crack


RainbowCrack is a computer software that produces rainbow tables that can be utilized in password cracking. It is different from other brute force crackers because it utilizes big pre-computed tables known as rainbow tables that minimize the duration required to crack the password. The program was created by Zhu Shuanglei and uses an ehnaced time-memory trade-off cryptanalysis attack that started in Ophcrack. The purpose is to create rainbow tables and not to crack passwords individually.

John the Ripper

Download it free from here

This is a free software that cracks passwords. It runs on 15 platforms and was first developed for the UNIX OS. It combines different password crackers into a single package and autodetects hash types. It also includes a customizable cracker. It can run against different encrypted password formats like crypt password hash types found in many flavors.

Precomputation and salting are two methods commonly used by hackers to hack facebook by get into your system to try and manipulate, as well as acquire personal data. You should know more about the processes and find out how these work so you can stay safe and make use of the necessary precautions to keep everything secure for a long period of time. Knowing the method and understanding how it works will keep hackers at bay and your system safe.

Precomputation

Password cracking is also known as precomputation, which is the method of recovering passwords from information that has been saved or transmitted via a computer system. A very common method includes repetitively trying to guess the password. Hackers will make use of things that are related to you, such as your address, birth date or second name. The goal of the password cracking will help the user recover a lost or forgotten password, so that you can get unauthorized access to the system or for system administrators to verify for passwords that might easily be acquired and cracked. Even though putting a wholly different password is not a security risk, you still get system administration privileges. Password cracking is used to gain access to digital evidence in court cases.

Preventing Precomputation

The ideal method for preventing the cracking of password is to make sure that hackers do not access the encrypted password. For instance, encrypted passwords on the Unix operating system were first stored in a publicly accessible file. On newer systems, these are stored within the file, and are accessible only to programs that have enhanced privileges. However, several network protocols deliver passwords in cleartext or still use weak response and challenge schemes. You can stay protected by changing your password every now and then.

About Salting


Salt is made up of random bits used as one of the many inputs to a key derivation function. The other input is usually a pass phrase or password in cryptography. The output of the key derivation
function is saved as the password's encrypted version. The salt can also become a part of a key in a cipher or another algorithm. The function usually uses a hash function. Other times, a value generated earlier, called the initialization vector, is also used as the salt. Salt information tends to complicate the dictionary attacks that invest in pre-encryption of dictionary entries, wherein every bit of salt used will double the amount of computation and saving required. The salt value should be kept secret for security purposes. A number of protocols let the salt transmit as cleartext, together with the number of iterations used in producing the key to strengthen it.

More on Salting

Salt can also keep you protected from rainbow tables, which will extend the complexity and length of the password. If the rainbow tables do not get passwords that suit the length and complexity of the salted password, the password will stay secret. Once discovered, you will have to eliminate the salt from the password, before usage. 


Your password can be the very thing that allows hackers and other unscrupulous individuals into your system. It is important that you understand some of the complex algorithms to see how these work, just so you can make the necessary precautions and ensure that your facebook account and personal data stay safe for long. You should determine which one is most commonly used in your area, and try to invest in programs and methods that counter it.

Rule of Thumb for Facebook

Generally, if you pick a very easy password to remember, it will most likely be easier for the hacker to guess. Guessing or brute force attack will easily let the hacker into your computer, so the rule of thumb is to make passwords quite difficult to decipher. However, you should also refrain from choosing passwords that are very hard to remember, since these can minimize the safety of your computer and system. Users will need to electronically store the password or write it down for later use. Users might also have to use password resets all the time, if they forget and users will also re-use the password time and again. Users tend to subvert the system, by using very strict password strength requirements, such as mixing upper and lowercase letters, including digits and using words that are not readable.

Simple Password Transmission

Passwords are very prone to snooping or interception, while these are transmitted into the authenticating person or system. Once the password is brought as an electrical signal on an unsecured physical wiring between the central system that controls the database and the user access point, wiretapping can easily give out the facebook password. Any person who can watch the packets that have the logon data can easily snoop around without being caught.

Email is usually sent as cleartext, which makes it very easy to deliver to just any person curious enough to find out more. The email will be saved in 2 computers as cleartext, the recipient's and the sender's. Once it goes through intermediate systems during delivery, it will most likely be saved in one of the systems temporarily. Emailed passwords is a very unsafe way to distribute.

Via Encrypted Channels

If you use cryptographic protection, you reduce the snooping of passwords. The TLS or Transport Layer Security feature made into several internet browsers will let the user know of a SSL or TLS secure exchange with a serve by showing a closed lock image. There are also hash-based challenge-response methods. This requires the user to prove to the serve that the shared secret or password is already known. The stored form is then acquired by the server.

On Authentication

Remote authentication is also done by several systems. The attacker usually needs only the hash, instead of the original password so he can authenticate from a remote source. Zero-knowledge password proof can also be done, wherein knowledge of the password is proven without having to present it. There are also augmented systems like SRP-6 and AMP which can get rid of the limitation of hash-based methods. The hashed and unhashed password is used in this operation. 




Your email account is one of the most common platforms where unscrupulous individuals can take advantage and try to get into your personal data and financial status. Facebook is another medium that has a lot of hackers lurking at different corners, considering that there are more than 500 million registered users worldwide. You have to consider the past incidences and try to find more ways to get ahead so you stay safe and secure for long.

Sending You Emails

There are several companies that send you mail and make it seem like it's originating from Facebook to gain more credibility. However, you should be aware that most of these are only after your password, so they can hack into your account and manipulate your online activities. You might be wooed by lucrative and seemingly unbelievable offers, but be wary of these because you might be changing your password for the worse. For example, AT&T has been used by hackers to get into the emails of different registered users. The email will inform clients that they have to change and verify their password for security purposes. In reality, the hackers are only waiting for users to change into the new password so they can acquire this easily, thus easily getting into the user's email account and other sites where he is registered online.

Another Incident

There was also another incident wherein an employee of the Texas Power Company hacked into the system. The hacker logged into the VPN and sent emails to members of the engineering group that mans the nuclear reactor. The hacker was posing questions regarding the safety of the reactor, should the load be increased to the maximum. The energy forecast system of the company had to be closed down for a day, resulting to about $26,000 in losses.

Blackmails

You should also be wary of emails that seem to blackmail or force you to change items in your account. Usually, a pop-up window will appear and ask you to click on it so you can log on to Facebook or another landing page where you can change your password. The hacker created this window and page so he can view what you typed in. The blackmail usually comes in the form of a message indicating that you will lose your profile on Facebook or some data will be revealed to the general public if you do not comply.

The Facebook Password Change

This email attack has forced millions of people worldwide to comply and change their password. Some realized that information has been changed on their accounts, while others simply can no longer log into their account. Others report having their profiles used to sell or represent items they have no idea about. Identity theft is usually the result of the stolen passwords. Make sure you verify the source first and that it truly comes from Facebook, since a lot of hackers bank on the popularity of the website to gain people's trust online to Hack Facebook.

People take passwords for granted which might explain why too many also have their identities and other personal information stolen through the internet. You should be careful when picking passwords. Follow the right guidelines and make sure that you only visit websites that are reliable and also invest in their own security system and protection.

The Weak Point

Hackers will always try to find a weak point in the system to try and get through and retrieve your password. Once the system uses a poorly made password scheme in protecting stored passwords, the hacker can use the weak point and get even well-chosen ones. Microsoft Windows divides the characters of the password into two so that these are hashed separately. Thus, the hacker has to attack each one separately, which will require more time and effort, compared to just attacking a single password.

Making Your Facebook Password

People make the mistake of choosing passwords that are very obvious and easy to decipher. You might realize that you can spend months or weeks choosing the right name for your baby or your pet, but do not think twice when picking the right password. You have to understand that passwords should almost never relate to you. You have to also follow directions and suggestions by websites on how to write your password. Some of the best passwords are no less than 12 to 15 characters in length, use a combination of letters and numbers, use a combination of upper and lower case letters and use words that may not be readable or understandable.

Guessing by Hackers for How to Hack Facebook ?

Guessing involves linguistically deriving words until hackers get into the system. Dictionary attack is the most common and describes all attacks. Examples of passwords that can be guessed include not using any or just putting blank, using the words "admin" or "password", using the numbers "123" or "12345" and using "qwerty or asdf". You should never use your log in or user name. You should also refrain from using your middle or last name. Avoid using words or terms that relate to you, such as the name of your favorite pet or mother, your place of birth or your car license plate. Also, do not reverse the letters of your name or use your initials. Hackers can easily guess these.


Below is the Top 10 list of most commonly used facebook passwords:

1. password

2. 123456

3. qwerty

4. abc123

5. letmein

6. monkey

7. myspace 1

8. password 1


9. blink182



10. (your first name)
The Best Way to avoid being a target or identity theft, you should keep the hacker from reaching even your encrypted password. Encrypted passwords used to be saved in an accessible file. Now, these are kept within the file and can only be accessed by programs that have improved privileges. This will be very difficult for unscrupulous individuals to get during the initial stages. New Unix systems have changed traditional DES-based hashing of passwords with enhanced methods founded on Blowfish and MD5.

Other methods include changing your password every now and then. You can stay protected from brute forcing, wherein the hacker tries to get into your system within one shift. It is advisable that you change password every week or month.


Below is a quick stats to proof potential risk involved by using simple passwords.
How do you protect your account from hackers?

An unauthorized person who has access to your account can wreak havoc, even if it is just a social networking site like Facebook. For that you need to have a strong password, because a weak password can act as a key for hackers to hack their way into your account.
To secure your password:
Avoid using words, digits or names that are directly connected with you.
- Avoid default passwords, and change the given passwords as soon as you activate an account.
Have lengthy passwords.
Avoid using alphabets or numbers in a sequence.
Mix the upper and lower cases in your password, to make it complicated, taking care to remember your capitals.
Adding symbols can further secure your password.
Thus by providing maximum strength to your passwords, you can protect your Facebook and other personal as well as business accounts. Remember, safety should always be your first pre-requisite.
Posted by Aaraf


People using Zip to compress their files beside compression they are trying to lock their important data with password(s).
Now let suppose if you do this same thing with your important files and now you have forgotten password, now what to do now its time to crack it.
This article will teach you how to crack the password of Zip files.


By using a simple Linux terminal and command you can easily crack the Zip password, you can download FCrackZip from your software manager.

Use this command to get FCrackZip from terminal
$ sudo apt-get install fcrackzip

After installing this you have options to attack on your zip file, either choose brute force attack or dictionary attack.
Here is the simple usage example.
$ fcrackzip -v -b -p aaaaaa -u your_zip_file.zip





By looking the above picture you can easily see the brute force attack against a zip file that is password protected, it took around 30 minutes to find the password for this zip.


Posted by Aaraf


A virus is malicious software or a malicious program which hides in other program and execute when you open this program. A virus is inactive until you execute an infected program. If you want to know more about viruses or if you want to create your own virus than click
here.

Technology has been changed and changing rapidly, different viruses has an ability to destroy your anti-virus software so in this case a online virus scanner probably a good choice to use.

Here are the list of some more common anti-virus software vendors online scanner web link. If your anti-virus do not work properly or if you have any doubt that your computer has been infected by a virus so scan your computer online.
BitDefender

Bitdefender is going to be a popular anti-virus solution, BitDefender Online Scanner is an on-demand antivirus and antispyware tool that lets you see just how safe your PC is for yourself. It detects and remove any virus and spyware on your computer online. Click here to scan.

Kaspersky

Kaspersky is one of our favorite online virus scanner tool, it detect the virus and spyware using the same method as in the fully-functional anti-virus solution provides.It allows malware detection and to compare your result with the malware database for effective result. Click here to scan.

Panda Active Scan

Panda ActiveScan is Panda Software’s online antivirus, that works directly over the Internet. With a simple click from your browser you can scan all your files and e-mail for viruses. Click here to scan.


ESET Online Scanner
ESET Online Scanner is a user friendly, free and powerful tool which you can use to remove malware from any PC utilizing only your web browser without having to install anti-virus software. ESET Online Scanner uses the same ThreatSense® technology and signatures as ESET Smart Security/ESET NOD32 Antivirus, and is always up-to-date. Click here to scan.

OneCare Online Scanner

Windows Live OneCare safety scanner is a free service designed to help ensure the health of your PC. Click here to scan.



Posted by Aaraf

There are different computer tips and tricks available to impress anyone, If you are looking for some tips and tricks than read this article.

Lock A Folder In XP Without Any Software
  • For doing create a folder in C drive, suppose folder name is xyz.
  • Now open command prompt from start menu.


  • Now in command prompt type "attrib +s +h C:\xyz" without quotes and press enter.
  • This command will make your folder invisible and it will never seen by anyone even in the hidden file and folder.
  • If you want to make it visible again type "attrib -s -h C:\xyz"
  • By doing this you can lock any folder of your choice.

Hide Your Drive
This is a small but cool trick to hide your drive/partition of your choice, if you have a personal data in on a partition and you dont want any other to see this data than you can hide this partition in on XP,Vista,7 and 2000 too.
  • Open registry editor by going on start than run and type regedit.
  • Find this
    HKEY_CURRENT_USER\Software\Mcft\Windows\CurrentVersion\Policies
  • Click on explorer
  • Click on "nodrives" key on the right column.
  • You will see something like this "0000 00 00 00 00"
  • After the four set of zero ("0000") you have to write your partition name
  • The first column is for drives A-H, the second for I-P, the third for Q-X, and the fourth for Y-Z.
  • The value(s) of drive as follow:
  • 1 - A I Q Y
    2 - B J R Z
    4 - C K S
    8 - D L T
    16 - E M U
    32 - F N V
    64 - G O W
    80 - H P X
  • So, let's say you want to hide drive D. In the first column you would put "08"

Make An Invisible Folder




  • Create a folder when you have to enter the name of the folder.
  • Press ALT + 0160 if you do this exactly than your folder has no name.
  • Right click on the folder > properties > Change Icon .go through the list of icons and then you'll see an invisible icon choose it and then click OK.
  • Now your folder will be invisible and it can see only when you select it.

Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription or become our Facebook fan! You will get all the latest updates at both the places.
Posted by Aaraf
Remote Administration tools also known as RAT are windows Trojans or in simple terms programs used by a Hacker to get administrative privileges on the victim’s computer. Using a RAT you can do a lot of cool things such as “Upload, delete or modify data” , “Edit registry”, “Capture victim’s screen shot”, “Take control of victim’s Computer”or “Execute a virus” just with a click of a button.
Throughout this article I will teach you how to use Lost Door, a Windows RAT, to control and monitor a victim’s computer remotely.
Disclaimer: Coder and related sites are not responsible for any abuse done using this software.
Follow the steps below to setup a server for Lost Door.
  • Download Lost Door from here . (Update: In case the given download link doesn’t work, use this secondary download link. The password to unzip this file is “ehacking.nethungry-hacker.com” without double quotes.)
  • On executing the download file, you will see the following screen. Accept it
  • After it is open, right click on the window and click on create server
  • Now enter your IP address and DNS here. Leave the rest of the field as it is.
  • Now click on the ‘Options’ tab and choose the options as you want. To activate an offline keylogger is a good practice.
  • Now go to ‘Advanced’ Tab. There will options related to spreading. This will be used in case you have more than 1 victim.
  • Now just go to the ‘Create’ tab and click on create server. Your server is ready for use now and now send it to the victim.
Sending the server file to your victim
This is the most important thing after you have created your server file. If you want to take control on a single computer than you have to send this server file to the desired victim but if you want to affect more and more people than you have to use some spreading techniques.
  • If you have physical access to the victim’s computer then take the server file in a pen drive and just double click on your server file once you have injected the pen drive into that computer.
  • For those who don’t have physical access can use social engineering in order to get the victim execute that file on his computer.
Using Spreading to affect multiple victims
If you have more than one victim, then you have an option of using spreading technique. You might think that by creating multiple server files you can control multiple users. But here is a secret about spreading. When you select the spreading option, the server file will act as a worm which will spread itself across different computers via Email or any other channel. So your burden will be only to get one victim to execute that file on his computer, the remaining job of getting other victims will be done on its own.
Posted by Aaraf
Hello Friends,
The popularity of Twitter has increased tremendously in past few years. As a result a lot of Twitter Desktop applications are available to the users for download these days. These applications allow you to receive and post Tweets from your desktop without visiting your Twitter.com page. To reduce your burden of finding the appropriate app for you from such a big pool of apps, we have compiled a list of Best Twitter Desktop apps available in the market. Earlier I had compiled a list of 20 Best Twitter Desktop Apps for Windows. Today I give you 9 Best Twitter Apps for Mac.
1. EventBox
This just-for-Mac app is a favorite of many because it supports Twitter, Facebook, Flickr integration, feed reading with Google Reader and internet trend watching with Reddit and Digg . Keyboard shortcuts, hotkeys, Instapaper integration, and photo uploads to Flickr and Facebook make EventBox pretty nifty. It’s also got a very slick interface with a navigation menu on the left-hand side.
2. Mac Lounge
This app is incredibly appealing for its dead simple, single column interface and respectable feature set. We, of course, love the multiple account support, but also appreciate saved searches, quick access to view followers and following, and tweet options to link to tweet, copy tweet, or copy tweet URL. There’s also an accompanying iPhone app, which syncs with the desktop version and greatly improves the app’s relevance.
3. Nambu
This really sophisticated Mac app should be more than enough for any and all of your Twitter needs. You’ve got access to your followers and friends, custom groups, search (integrated with FriendFeed and One Riot), trends, tr.im and pic.im integration, multiple accounts, Ping .fm integration, filters, and three view options for a one or many column view of tweets.
4. Sideline:
Sideline is just a search and trending topic app from Yahoo, but it does a darn good job at satisfying those specific needs. You can view current Twitter trends, select to see the three latest tweets or pop out as its own saved search, and create custom search groups as tabs.
5. Skimmer:
It’s hard not to love this app. Not only is it beautiful to look at it, but it also tracks your favorite social sites. Skimmer’s certainly not an application for the social media beginner, but power users of Facebook, Flickr, YouTube, Blogger, and Twitter, will appreciate the aggregation of content, filtering options, view types, and enhanced content viewing experience.
6. Tweetie
A full-featured Twitter client which is available in free ad supported and ad-free versions. This Desktop app lets you view not only the tweets but also the entire conversation history leading to that tweet. It provides you with an independent compose windows that stay out of your way until you need them. Tweetie for Mac also has search trends to let you find out the hottest trend in Twitter. Other features include threaded DMs, user details, torn off search, bookmarklet, and preferences.
7. Twibble Desktop
Twibble is a bit of a riddle. It’s not a bad app when it comes to feature set, but it’s also not the most intuitive. You can manage multiple accounts, but all tweets are merged together in one stream. You can reply, DM, fav, RT, and copy tweets, but you’ll have to hover over the tweet to even know those behaviors are possible. You can also use keyboard shortcuts, filter your tweets for keywords, or conduct searches that open up in new windows, but Twibble just doesn’t seem to flow as easily as we’d like it to.
8. Twitterific
Lets you both read and publish posts or “tweets” using a clean and concise user interface designed to take up a minimum of real estate on your Mac’s desktop. The app shows a scrolling list of the latest tweets from your friends, or public feeds. Its features include multiple Twitter account support, auto refreshing, inline display of replies and DMs, shows no. of unread tweets, quickly delete tweets, auto show/hide new tweets, single click access to user pages and more.
9. TwitterPod:
This app isn’t known for its sophistication or advanced Twitter functionality. TwitterPod is a basic single column Twitter app with an inline browser and the ability to filter for just tweets with links. Its heyday has long since passed, but original fan boys and girls may still be using this for their twittering.
Posted by Aaraf





Facebook, the biggest social network with 500 million users, provides an interface to hit an unsuspecting crowd with malware and viruses. These viruses aren’t very difficult to detect if you are cautious enough. These Facebook viruses appear on your wall in forms of a bizarre or eye-catching stories and videos and once the user has clicked/liked the link, it is already late. The next step will be getting rid of your Facebook virus which is a time-consuming process. Its better to avoid spam messages and trojan viruses in the first place.
How to avoid it?
1. Think before you Act. Viruses on Facebook are sneaky. The hackers and cybercriminals who want your information know that Facebook users will often click on an interesting post without a moment’s thought. If a post sounds a bit over-the-top like a headline out of a tabloid, this is your first warning sign.
2. Try to avoid Links and videos with Catchy words like “funniest ever,” “most hilarious video on Facebook,” or “you’ve got to see this.” Do some keyword research to see if the post in question comes up in a search engine with information about a current virus or trojan.
3. Check the poster of the Suspicious content. If you receive a message from someone you do not know, this is an obvious red flag. Facebook video viruses also tend to pop up in your news feed or on your wall from friends you haven’t talked to in a while. Unfortunately, it’s likely this friend has already fallen victim to the latest virus on Facebook. After clicking on the story themselves, the message was sent out to all of their friends as well.
4 Avoid messages that have been posted by multiple users as the virus spreads among your friends who were not so cautious. If a link with title such as “Sexiest video ever” shows up all over your feed from all kinds of people (perhaps friends you would not expect to make such a post), this is another warning sign. Similar direct messages are a likely variant of the notorious Facebook Koobface virus which has used this approach in the past.
5. Do not fall for the “typical” money-transfer schemes. Chat messages from friends needing funds will usually sound suspicious. Everything can’t be screened before posting, so money transfer scams and hoax applications still find their way on to Facebook. You should also avoid applications that claim to do a full “Error check” or fix security problems related to your profile.
6. Update your anti-virus software frequently. If you do accidentally click on a post before realizing it is a hoax, do not click on any further links or downloads. If it’s too late and you have already been infected, the Facebook virus removal process may be effortless if you have a good anti-virus program to catch the virus, trojan or other malware early on.
What’s Next?
These were few important tips to safeguard your facebook account but your job isn’t done yet. Once you have detected that the link/post on your facebook wall is Malicious you should Mark it as SPAM so that the facebook support will stop it from spreading further and infecting other users.
If you have ever fallen victim of any such Malicious Scheme, please share your experience with all the users in form of comments so that others don’t fall victim of it.

No comments:

Post a Comment