Now you all can invite me on skype for any kind of help required as my username is krackoworld


15 June 2014

List Of Facebook Proxy Sites 2014: 100% Working


Do you Want to Access Facebook on Blocked Network?

facebook proxy websites listIf Yes, then read this post carefully. Here today I am going to mention top list of Facebook proxy sites that work in 2014 to access blocked Facebook or URL Blocked. Well Proxy sites help you to bypass these passages and will open your Facebook or any account at Internet easily via Hiding IP addresses or use any other location IP’s. Now a days all these Social Bookmarking Sites include Facebook, Google +, Twitter are blocked at your near by schools and office, So that’s why proxy sites are must in order to open them illegally. One of popular network i.e Facebook, In case of blocked access to Facebook we can try Facebook login proxy sites list. In my notice, there are some of the proxies might be died, expired in time or some proxies doesn’t working well for you when you login in, therefore here I bring you top 3 Facebook proxy sites of 2014- 100% Working etc. Note- Before entering username and password make sure that the website is reliable and doesn’t store any personal details of yours.

Also SEE- How To Access Blocked Social Networking Sites?

How to Open Blocked Torrent Sites in India

What are Facebook Proxy Sites?

Facebook Proxy Sites are those which would help you to access or login Facebook at Blocked Network’s. Many times when you are trying to use Internet at the public Wi-Fi network or your office network, then you are not able to get through it. This is all because of admin of the public network places due to security reasons. But if you have the access to Facebook Proxy Login websites, then you can easily get through these blocked sites without any doubt.

Top 3 Facebook Proxy Websites of 2014:

1. The Facebook Proxy

Facebook Proxy is a especially dedicated for the aim of unblocking Facebook. This website allows you open Facebook from anywhere. While you are at office, school or any other organization this site will help you to access you Facebook account in a very simple manner. Just on the Home screen enter the Facebook URL and click "Go" , hence It will open the Facebook homepage for you.

2. Proxymice

Proxymice is a Facebook proxy site created by a group of professional web developers specially for those who wish to cant access Facebook normally. As compared to other fast browsing sites list, Give it a try and you wont be regret. They have provided a link in their sidebar that reads "Start Facebook Proxy" so that users can directly move to Facebook etc. Its so simple to use this.

3. Unblock Facebook Proxy

With the help of this proxy websites you will be able to break through all the network barriers to get access to your FB account such as Cyberoam. With the help of this site, not only can you get into your Facebook (FB) account, but can also browse through other sites as well. Now You have to go to the website and enter the URL to get the page where you can enter the credentials to access your account. That’ it!

All Done! I hope now it would be easier to access Facebook without any problem at blocked network. In case if you face any difficulties while using these Facebook login proxies, let us know. Now If you found this article useful, then please share this with all your friends or colleagues online/offline. Till then Peace!

Must SEE- Top 20 Methods on How to Hack Facebook Password in 2013



26 May 2014

Latest Backtrack Hacking Video Tutorials- GET DVD


backtrack videos After my B.Tech 3rd Year (6th SEM) Exams, Its my first post on krackoworld’s. Today I am giving you a gift video package related to latest Backtrack version. This includes nice collection of hacking videos using backtrack such as SQL injection, phone phreaking, wireless hacking, website hacking, network interfacing and many more etc. So what are you waiting for, just download the DVD from the below given link and start learning in details. Note- Please install utorrent or bitcomet software to download this torrent, So lets check out some of its ingredients. Have a look and Enjoy…

Videos Included in this DVD-

  • Episode 1 – Learn Network Hacking – Arp Poisoning
  • Episode 2 – Wireless Hacking – Cracking WEP
  • Episode 3 – Wireless Hacking – DeAuth
  • Episode 5 – Lock Picking – Bump Key
  • Episode 6 – Phone Phreaking – Beige Box
  • Episode 7 – Phone Phreaking/Network Hacking – Sniffing VOIP
  • Episode 8 – Lock Picking – DIY Padlock Shims
  • Episode 9 – Lock Picking – Mult-Disc Combo Locks
  • Episode 10 – Hacking Basics – MD5
  • Episode 11 – Website Hacking – Sql Injection
  • Episode 12 – Hacking Basics – Backtrack
  • Episode 13 – Website Hacking – XSS
  • Episode 14 – Staying Secure – SSH Tunnel
  • Episode 15 – Modding – Xbox Softmod
  • Episode 16 – Wireless Hacking – Cracking WPA
  • Episode 17 – Triple Boot – Windows, Backtrack, & Ubuntu
  • Episode 18 – Local Password Cracking
  • Episode 19 – Lock Picking Basics
  • Episode 20 – Ettercap
  • Episode 21 – XSS Tunnel
  • Episode 22 – Playstation 2 Softmod
  • Episode 23 – Cracking WEP Update
  • Episode 24 – Bypass Hotspot’s Access Controls
  • Underground – Install Backtrack 3 on USB
  • Underground – CSRF(Cross Site Request Forgery)
  • Underground – Alternate Data Streams
  • Underground – Local File Inclusion
  • Underground – Windows Privilege Escalation
  • Underground – Bluetooth Hacking
  • Underground – VMWare
  • Underground – Fix Google Mail Enumerator
  • Underground – Home Made Lock Picks
  • Underground – Downfalls of Anti-Virus Software Part 2
  • Underground – Downfalls of Anti-Virus Software
  • Underground – Evilgrade
  • Underground – Trojan Basics
  • Underground – Manipulating Windows User ***s
  • Underground – Combine Files
  • Underground – Password Phishing
  • Underground – Windows SMB Relay Exploit
  • Underground – Application Patching
  • Underground – Metasploit Autopwn
  • Underground – Email Spoofing
  • Underground – Introduction
  • Extracting Database Information from Information_Schema
  • FPGA MD5 Cracker
  • Arduino ARP Cop
  • Email Injection
  • Ping of Death
  • DNS Spoofing with Virtual Hosts
  • Bypass Cisco Clean Access & Cisco NAC Appliance
  • Dual Boot – Windows & Backtrack
  • Sql Injection Challenge How-to
  • How to use Intel Pro/Wireless 3945ABG in Backtrack 2
  • Local Privilege Escalation Vulnerability in Cisco VPN Client etc.

DOWNLOAD HERE



21 April 2014

How to Protect Yourself From the Heartbleed Bug or Attack


heartbleed bug Are you aware of Heartbleed Bug or not? If not, then this article is for you only. Well this is a very new bug out at the Internet and exposing everything about a user or website. Actually The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. So lets read its prevention and other info below.

How it Works?

The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.

Why it is called the Heartbleed Bug?

Bug is in the OpenSSL's implementation of the TLS/DTLS (transport layer security protocols) heartbeat extension (RFC6520). When it is exploited it leads to the leak of memory contents from the server to the client and from the client to the server.

How to Check your Site If they are are Vulnerable?

1.) First of all check if the sites you use every day on an individual basis are vulnerable to Heartbleed bug or not using http://filippo.io/Heartbleed/, and if you're given a red flag, avoid the site for now.
2.) LastPass also created a Web app that will tell you what kind of encryption a site uses, and when the encryption was last updated.
3.) Provensec also created a scanner at http://provensec.com/heartbleed/
4.) GlobalSign SSL Configuration Checker.

STEPS TO PROTECT YOURSELF FROM HEARTBLEED

  1. First Change your passwords. ALL of them. This article from Mashable will get you started.
  2. As long as you’re changing passwords, use this opportunity to start using different passwords for every site. It’s really easy with LastPass, which has a terrific free version. A password utility like this will securely generate, store, and enter passwords for you. Once you’ve used it for a week, you won’t want to go back to memorizing all of your passwords or using the same password on multiple sites (Heartbleed shows just how dangerous that can be).
  3. Never reuse same passwords again in the future.
  4. OpenSSL version 1.0.1 through 1.0.1f and 1.0.2-beta1 are Vulnerable and flaw is fixed in OpenSSL 1.0.1g. If you haven't yet, please update your system that use OpenSSL for TLS encrypted communications.
  5. It is good to use the two-factor authentication, which means with the password, the account requires a freshly generated pass code that shows up only on your personal Smartphone, before getting into certain websites for financial transaction.

That’s it! Enjoy and Be Safe. Any Comments are welcomed below.



31 March 2014

How to Disable Country Restriction on Google Play


google-play-logo Exams are Over and its time to put up an interesting post on Disabling Country Restriction on Google Play and enjoy any type of apps. Recently I noticed lots of android Smartphone users complaining about that blocked market for the country restricted users, therefore after reading a lot I personally founded a way out. I know you all may be well aware that you can easily enable the access to country restricted android market via some third party application but some users are complaining that even these third party application after emulating the SIM to another USA carrier doesn’t work well etc. So here is an alternative way to do that right.

Procedure to Disable the Country Restriction at Google Play to Download Apps

  • First of all Download any type of third party SIM emulator like Market Access, Market Enabler etc. Try Googling I can’t give link here without the developer permission If you need help ask in the comments will email you!
  • Now After that downgrade your upgraded market in case if your ROM had old Google Market when installed/Flashed, Here I am assuming that you had previous version of Market before Upgrading to newer Google Play So in this Case go to Manage Applications and Simply select Google Play and uninstall any updates from there, It will be reverted back to Android Market.
  • hence Emulate your SIM using the above mentioned program in first step and then Search any country restricted application like Google Maps and try Installing. It will take much time and after couple of minutes, download will start automatically
  • Incase, You have preinstalled Google Play when you purchased a phone with latest ICS release, then please uninstall that using Titanium Backup and then drop comment here, to get the link for Old Market for Android. Well, Ok one link is being posted here, Cheers Download and Install it and then emulate the SIM and woa, Its Working…

Download Attached File

All Done! Enjoy Apps Everywhere.



01 March 2014

Video: How to Crack Password Protected Zip Files Using Fcrackzip


fcrackzip Well After an long time, Today We are back with an exciting post on How to Crack Password Protected Zip Files using Fcrackzip with an Video Tutorial. Thus Fcrackzip is an zip password cracker, similar to fzc, zipcrack and others. This software is totally free to use and apply in seconds. I have seen many zipcrackers I found were able to find the passwords, either they didn't accept more than one zipfile, were awfully slow, or didn't do brute force attacks (which I needed), So Fcrackzip is all about doing things at perfect. Therefore lets learn more about it and watch the video carefully!

Top Features of Fcrackzip

  • FREE

    It doesn't cost anything, it will run on many architectures, and the source is freely available, so you can customise it to your needs. If you make improvements, don't hesitate to mail them to me, and I will include them in fcrackzip!

    One goal of fcrackzip was to provide a free but still fast zipcracker, so that other people can improve and contribute it further, in an open developement style.

    Other programs, like fzc, come not only without source, but the executable is even encrypted, so improving it or customizing it is difficult at best. (Maybe the programmers of other crackers don't want that people see how crappy their code actually is? Nobody knows for sure, but I see no other reason for this strange, but common, behaviour)

  • FAST

    On my old machine (a pentium-90), the portable C version is 12% slower than fzc, the fastest cracker I could find. Small parts of fcrackzip have been converted to x86 assembly, so it performs a bit faster (around 4%) than fzc now, on the same hardware (note: this is highly os/compiler dependent). Since the author of fzc claims that it is written fully in assembler, further improvements might well be possible. Incidently, on my new P-II machine, fcrackzip is almost twice as fast as fzc ;)

  • PORTABLE

    fcrackzip was written in ISO-C, and should run on most platforms, even 64 bit ones (maybe after some tweaking). I'll be glad to hear about portability problems so I can fix them.

  • FEATUREFUL

    fcrackzip will, at some later stage at least, support many more useful operation modes than other crackers. It already supports multiple zip files with multiple files. Remember that the code is only a few hours old!

    However, since version 0.2.0 fcrackzip also includes a mode to brute force cpmask'ed images, something no other program (that I know of) can do, so at least there is one feature other crackers don't have.

    And you can always implement your own modes.

Video Tutorial on How to Crack Zip Files Password?

That’s it! Enjoy, Credits- 101hacker

If anyone having any doubts and queries regarding the post, then Please comment below.



15 January 2014

How to Be Anonymous at Internet : Top Ways


being anonymous Well After managing some time today, I am going to write this article! Now a days being a top hacker, its better to be anonymous to view blocked sites or stay un-traced! In simple words, Anonymous means unidentified or unknown. So being it means a lot to a hacker for various purposes, also other people i.e student’s can be anonymous as well to operate blocked sites at Labs, Office etc. There are also many other benefits of it like doing a anony comment or many more. Therefore today I am going to tell you the real ways on How to be Anonymous at Internet. Have a look below.

3 Ways: How to Be Anonymous at Internet

1. Using Proxy

Well a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. In other words, A proxy is an address (IP address) of a Server and acts like a hub etc. We can be anonymous using various proxies. The best advantage of using proxy is that your real IP can be hidden and now work silently. This is also be used for connecting to the internet.

2. TOR Browser

Tor is free software for enabling online anonymity. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than three thousand relays to conceal a user's location or usage from anyone conducting network surveillance or traffic analysis. In simple words, Tor-proxy is a free proxy-server service that Internet users can use to hide their IP address while surfing the Web. I just love TOR.

Must SEE- Bypass Cyberoam Security–TOR Browser

3. VPN

Well VPN stands for Virtual Private Network, Basically it’s a private network which lets users to connect to other users or remote sites using a public network usually internet. As per wiki, A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network. It is done by establishing a virtual point-to-point connection through the use of dedicated connection and encryption.

That’s it! Enjoy and Please share this with your friends and Comment…

Or Subscribe to our Blog here!



25 December 2013

How to Boost IDM download Speed Upto Maximum?


idm-optimizer-maximum-speed-tutorial Are you fed up with slow speeds and Internet Download Manager (IDM) wont give you the proper downloading speeds, looking to optimize your speeds for better downloading then this article is for you. All of us knows that IDM is the best software to download things at faster way but it can also be optimized further with some settings. Therefore today I am going to tell you How top Boost IDM downloading speeds up to maximum and open all the ports of it etc. Note- I have mentioned two methods below, so pick up one to give a try and test!

How to Increase Downloading Speed of IDM Manually?

Step 1- Firstly of Open your IDM Tray icon in the bottom right.

Step 2- Then go to Downloads > Options.

Step 3- Now select the Connection option from the options and make the changes given below-

  • Change Connection Speed to “LAN 10Mbs”.
  • Be sure that BPS Field number has changed to 10000000 after changing connection Speed.
  • Then Change Maximum Connection Numbers to 16.

Now Save these settings by clicking the OK button. After saving these settings you will observe that your downloading speed is increased now. Enjoy!

I am damn sure from now, you will see the change in IDM Speed i.e doubled.

How to boost IDM speed with IDM Optimizer?

  • Firstly Download IDM Optimizer from Here.
  • Once it opened, you will see the following screen display :-
  • Now just hit the ” maximize now ” button and you are all done.
  • Now just restart your computer and see the difference in download speed.

That’s it! Have a nice day.



03 December 2013

Top 5 Must Have Iphone Security Applications 2014


top 5 iphone security apps Well after a very very long time, today I am here to introduce you some top 5 must have Iphone Apps of 2013-2014 etc. Sometimes we forget about our iPhones when it comes to security issue, but hackers, crackers and other bad guys don't forget this. As this result, criminals would love to get their hands in your iPhone with latest IOS release. Therefore these great security related iPhone apps helps you protect your iPhone, it's data, and even your home as well. Check it out now!

Top 5 Must Have iPhone Security Apps 2014:-

1. Find My iPhone

Here's a free way to find your lost iPhone, using another iOS device! Simply download this onto your iPad, iPod Touch or Mac, open it and log in with your Apple email ID. Find My iPhone will help you locate your missing device on a map, display a message, play a sound, remotely lock your iPhone or erase all your iPhone's data easily.

2. mSECURE

This app costs 9.99$ from the apple app store. This app has 256 bit blowfish encryption, auto-lock, password generator, cloud data protection, free backup utility, email attachment backup/restore, and optional self-destruct.

3. Alarm.com

The Alarm.com alarm system monitor and control application will let you arm, disarm, check the system's status and other tasks depending on what features you subscribe to. I just love this alarm.

4. Kryptos (for Secure VoIP calls)

Its free man! Kryptos is a Voice Over IP (VoIP) app for the iPhone that is intended to provide military-grade AES-encrypted phone calls (provided each party is using the Kryptos application to make and receive calls)

5. Pocket Cloud

Wow! This is the most expensive app on the list worth $14.99; however, it promises a secure and fast way to remotely connect, access files, pictures and applications with a simple installation, security and RDP/VNC compatibility etc.

All Done! Enjoy and Please share…



17 November 2013

Top 20 Best Hacking Forums of 2013-14


hacking forums If you are looking for some top best hacking forums of 2013 and 2014, then you are at very right place as today I am going to share the list of them. There are some hacking forums which are underground and only open for some users so I had some list of all underground hacking forums below. So get their question answer at there and also Please comment below if I missed anyone. Have a look!

Here is the list of Top 20 Best hacking Forums:

1. Hack Forums

2. Hack Hound

3. InterN0T - Underground Security Training

4. Hack-Tech • Security Forums

5. crackmes.de

6. SQL Injection | Coded by 4ur3x

7. Binary Revolution Forums

8. Hack This Site!

9. Opensc.ws - Trojan programming forum -

10. uNkn0wn.ws - Simply the best hacking board - Index page`

11. CyberTerrorists - The War On Cyber • Index page

12. r00tsecurity - your network for security and technology

13. www.alboraaq.com/forum

14. Hackers.mu Forums - Powered by vBulletin

15. WL-Group (Powered by Invision Power Board)

16. SSTeam - Security Scene Team

17. Forums (Powered by Invision Power Board)

18. Blackhat Forums - Underground Hacking and Security Community

19. Anonymous Hacking Forum

20. VIP Hack Forums

That’s it! Enjoy and Keep Posting there…


05 November 2013

How to Create your Own Virus Using Ultimate Virus Builder


create your own virus Hey What’s up today? I am again back with a bang article on Creating your own virus in seconds with the only software named as Ultimate Virus Builder 2013. Ultimate Virus Builder software offers you more than 50 options to customize your own maked virus. In this software you can set any icon for your virus ! Not only does this tool allow you to create own customize viruses, it can also help you spoof the extension of any file with the built in extension spoofer etc. But make sure that you don't make it run on your own pc as it can destroy it very badly! So lets look more on its features below-

Features of Ultimate Virus Builder

Download Ultimate Virus Builder

  • Add to startup
  • Disable System Repair
  • Disable Msconfig
  • Disable Explorer
  • Disable Regedit
  • Disable clipboard
  • Disable task manager
  • Disable CMD
  • Hide taskbar
  • Disconnect from the internet
  • Switch mouse buttons
  • Many more etc!

demo

Download Ultimate Virus Builder

Conclusion:

I hope you all will enjoy this tool and use it with your own risks. Note- I can’t help you if you have done any damage by this tool and inject the virus in your own computer. Have a nice day…Happy Diwali!



 

Recent Posts

Recent Comments

| KrackoWorld (KoW) © 2011. All Rights Reserved | Template Style by MBT | | Contact |