Now you all can invite me on skype for any kind of help required as my username is krackoworld


28 April 2011

How to Use Google as for Hacking Purposes?


Google-logo-1Now a days all you people might be aware of Google Hacking as it provides large number of services and platforms.For ex- Searching,blogger,Gmail,AdSense and many more .Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google.

1. Hacking Security Cameras

There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. All you have to do is use the following search query in Google. Type in Google search box exactly as follows and hit enter

inurl:”viewerframe?mode=motion”

Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. You will see something as follows

159

As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really a less refresh rate. But there are other search queries through which you can gain access to other cameras which have faster refresh rates. So to access them just use the following search query.

intitle:”Live View / – AXIS”

Click on any of the search results to access a different set of live cameras. Thus you have hacked Security Cameras using Google.

2. Hacking Personal and Confidential Documents

Using Google it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their Address, Phone, DOB, Education, Work experience etc. can be found just in seconds.

intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”

You can gain access to a list of .xls (excel documents) which contain contact details including email addresses of large group of people. To do so type the following search query and hit enter.

filetype:xls inurl:”email.xls”

Also it’s possible to gain access to documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query

intitle:index.of finances.xls

3. Hacking Google to gain access to Free Stuffs

Ever wondered how to hack Google for free music or ebooks. Well here is a way to do that. To download free music just enter the following query on google search box and hit enter.

“?intitle:index.of?mp3 eminem“

Now you’ll gain access to the whole index of eminem album where in you can download the songs of your choice. Instead of eminem you can substitute the name of your favorite album. To search for the ebooks all you have to do is replace “eminem” with your favorite book name. Also replace “mp3″ with “pdf” or “zip” or “rar”.

I hope you like this post and please pass your comments as well.


18 April 2011

How to Delete Locked Files Which Can’t be Deleted?


can-not-delete-file-or-folderNow a days File deletion is being a major problem as it get trucked by windows components or viruses.Sometimes when we want to delete a file or folder which are not in use we get fail due to some issues and may be error also. Unfortunately it acquires some space in our HDD and truly like a virus to us.Hence to solve this problem we come across with a software named as File ASSASSIN which delete/Unlock/Terminate any file form our computer very easily.This efficient freeware application terminates process, unloads modules, and closes remote handles to rid your system of suspected malware files. File Assassin's clear-cut interface includes drag-and-drop functionality to easily select the desired files. Or you can simply browse through your folders and select the process you want to terminate.Any of the three malware removal options (unlock file handles, unload modules, and terminate file processes) are quick and effective. An additional option deletes the file after it is unlocked.F-A will work perfectly on these errors or messages given below-

 

  • Cannot delete file: Access is denied.
  • Make sure the disk is not full or write-protected and that the file is not currently in use.
  • The source or destination file may be in use.
  • The file is in use by another program or user.

These are very common messages that occur when attempting to delete files that a particular malware infection put onto your system.

Remove, Move & Delete Locked Files in Windows

File ASSASSIN is an application that can delete any type of locked files that are on your computer. Whether the files are from a malware infection or just a particular file that will not delete – File ASSASSIN can remove it.

DeleteFileswhichCantBeDeletedandlocked Delete Locked Files Which Cant be Deleted

Simply download File ASSASSIN from one of the links below. If you selected the portable build, simply unzip and run the application, otherwise run the installer provided.

Start File ASSASSIN and select a file by dragging it onto the text area or select it using the (…) button. Next, select a removal method from the list. Finally, click Execute and the removal process will commence.

Download File ASSASSIN : Link (163.12 KB)

The program uses advanced programming techniques to unload modules, close remote handles, and terminate processes to remove the particular locked file. Please use with caution as deleting critical system files may cause system errors.

Enjoy!


08 April 2011

Hack Accounts,GPS Locations,SMS and Many more With Mobile- Spy


mobilespy (1)Every day I get a lot of emails from people asking how to spy on cell phone or How to hack a cellphone. To spy on a given cell phone all you need to do is install a good cell phone spy software on the target cell phone and once you do this you can silently record every SMS and information about each call. You can also see GPS positions every thirty minutes. Therefore we come with an intelligent software named as Mobile spy.

Mobile Spy is the next generation of smartphone spy software. Do you suspect that your child or employee is abusing their SMS or vehicle privileges? If yes, then this software is ideal for you. Install this small program directly onto your compatible smartphone you want to monitor to begin recording.Using the Internet capabilities of your phone, recorded activities, logs and GPS locations are quickly uploaded to your Mobile Spy account. To view the results, you simply login to your secure account at the Mobile Spy web site. Logs are displayed by categories and sorted for easy browsing.The software is completely stealth and works independently. Mobile Spy does not rely on the phone's call and message logs to record activities. So even if the user tries to delete their tracks, the data will still be retained and uploaded. Compatible with most models of iPhone, BlackBerry or Android phones! Also compatible with Windows Mobile, Symbian OS and iPad.


Why Mobile Spy?
There exists many cell phone spy softwares on the market and hence people often get confused about which cell phone spy software to go for. To make this job simpler for you we personally tested some of the top cell phone spy software's and based on the results we conclude Mobile Spy as be the best one.

 

Here is an overview of the entire process:

Mobile Spy is a hybrid software/service which allows you to monitor your smartphone in real time. This unique system records the activities of anyone who uses your compatible iPhone, BlackBerry, Android, Windows Mobile or Symbian OS smartphone. You install a small application onto your phone. It starts at every boot of your phone but remains stealth and does not show up in the running process list.
After the software is setup on your phone it will record an array of phone activities and then silently upload the data to your private Mobile Spy account using the Internet. When you want to view results, simply login to the Online Control Panel from any computer and enter your username and password to proceed.
Mobile Spy Features:

This powerful system gives you the ability to spy a cellphone and to monitor activities online in real time. Your logs are safely stored in your https-SECURED Mobile Spy account which is accessible only by you from any web browser using a username and password you create.
You can login anytime from any location to view results without needing access to the phone. The activities recorded are each described below. All activities include a date/time stamp and are searchable by phone number. All logs can be easily exported to CSV for importing to your database!
Calls Log
Each incoming and outgoing number is logged along with duration and time stamp.
SMS (Text Messages) Log
Every text message is logged even if the phone's logs are deleted. Includes full text.
GPS Locations Log


The device's current location is frequently logged using GPRS when signal available.
Web Site URLs Log
Each address visited in browser is logged. This feature is currently for iPhones only.
Log Summary
A summary of all activities can be shown along with separate viewers for each type.
The working of Mobile Spy is very simple and needs no extra knowledge to install and use.
Step 1- After you purchase Mobile Spy you’ll get a link to download the software. Along with this you’ll get a username and password for you online control panel.
Step 2- Install the downloaded cell phone spy software onto the target cell phone that you want to spy on. After the installation, spy software starts recording all the activities on the cell phone.
Step 3- Login to your online control panel to see the logs containing the recorded information.
Mobile Spy is fully compatible with the following cell phones
BlackBerry Phones
Android Phones
Apple iPhones
Windows Mobile Phones
Symbian OS 9.x and 8.x phones

Click Here for the Complete List of Compatible Phones. For more info on this product visit the Mobile Spy homepage with the link below Mobile Spy Homepage
So what are you waiting for? Go grab Mobile Spy now and start spying on any cell phone within hours. Visit the following link to order Mobile Spy Now!
Mobile spy - The Cellphone monitoring software

Download Here


03 April 2011

PayPal Hacking - Bypass PayPal payment to get Free Products Online


paypal_logo_sale.03Its being a long time since I have posted an article on my site so today by managing some time I founded a JavaScript which can be very helpful in downloading online products for free selling by other peoples or merchants which are on the payment seats.Its being a trend to sell eBooks,software's,games,links,products etc. online on the internet to earn some money. If we need something like that we have to give them payments through our PayPal accounts.Therefore, to solve that problem and make easy to poor people to afford that items PayPal hacking script is being launched.

Here is the Script-

javascript:top.location=document.getElementsByName('return')[0].value; javascript:void(0);

Steps needed to get free products-

1.First of all copy the script given above

2.Then open that website where the means of purchase is PayPal . For ex- www.ptcexpert.com.

3.Click on the PayPal button to purchase item and

3.In-between the loading time of PayPal payment by your account, Copy paste the JavaScript in the browser and press enter or you can directly paste the script in the browser address when the website opens.

4.you will be redirected to the downloading section.

5.That’s it!!!, you hacked that system.

Note-

It works well with the supported web-browsers like Google chrome,Firefox,opera,safari,ie etc. Sometimes the script wont work due to some strong security arrangements,Then you will try some other website.

Disclaimer-

I hold no responsibility for any kind of your actions to this script, Its being made only for educational purposes.

Enjoy Hacking !                                                                                                                                                                    Plz comment upon the websites you found which are hackable by this script.


 

Recent Posts

Review this blog on Bloggers.com

Recent Comments

| KrackoWorld (KoW) © 2014. All Rights Reserved | Style By All Web Designing | | Contact |