Now you all can invite me on skype for any kind of help required as my username is krackoworld


29 July 2011

Get free Backlink on my Blog – Contest Opens Today


ContestWow! its my first experience to open a Contest today on my blog with the support of my God and family very much. This includes getting a free backlink to your site on this Page for forever which leads to major exposure to your site or blog with traffic, PageRank and money also. To participate in this Contest, Please follow the below instruction and enjoy! Note- Offer ends on 30 august 2011 and results will be declared on 31st of Aug 11 by myself only. I hope all my readers will participate in it and will try to give maximum backlinks to you….

 

What to do to take part in this Contest ?

Ok, to be a part of this program,you have to complete at least 4 things given below and in the end when you completed, please tell me by commenting on this post only:

1. Write for Us ( for more information, visit this Page )
2. Become a fan of us at our Facebook Page.
3. Follow us at our twitter official Page.
4. Spread our Popular Posts you like most by +1,Like button,Tweet,Digg,Stumbling etc..
5. Give a Link to our site with description at your homepages or Pages only.
6. You can also write a review on Us at Alexa.
7. Share our Articles on your websites by giving proper credits to us.
8. Prepare a YouTube video on Us by mentioning our site,owner,description and moto.
9. Join our site with Google friend connect and Subscribe to our regular Email Updates.
10. Do maximum Bookmarking on our website at homepages and posts etc..

Enjoy and Complete above formalities by giving your best.


27 July 2011

Crack FTP Usernames and Passwords via Wireshark- A Packet Sniffing Tool


Crack usernames and passwordsIf you read by precious post on How to create an FTP server on your home Computer, then you will also love to read this post on How to Crack its Usernames & Passwords also. Hence today I am going to tell you this with one of the popular Packet sniffing tool called as Wireshark which has the power to crack anything in bytes as well as in alphabets also. So first start with its definition and working module- Basically Wireshark is a Packet sniffing tool in which it captures packets while going through a network. Below is a screenshot of it in working process.


image

Procedure

1. First of all download Wireshark from here and install it on your computer plus make sure to install Winpcap which comes with Wireshark installation package also.
2. Now go to capture button at the top and start monitoring.
3. Now type “FTP” at the filter and it will filter out all ftp connections.
4. As you scroll down you will find the “FTP username” and “Password” for victims ftp account and you will be done.

Other benefits

1. This method or tool can also be used as to know your victims Facebook Cookies usually datr and inject them via Cookie injector (Add-on) in Mozilla Firefox etc. This hack is known as FB cookie Authentication  hack.
2. This process can be used to hack Wireless networks also.


25 July 2011

Hack 3G in Tata DoCoMo and Access free Internet


3g-tata-docomo-internet-300x225_thumbNow a days 3G is spreading all over the world with the help of the popular telecom networks like Airtel,Tata DoCoMo,Vodafone,BSNL,Idea etc.. With the development of 3G ,People left 2G sims and now accessing internet,Live TV,Super fast games vey fastly. But the only problem is that it is too much costly. Hence to solve this issue,today I am telling you an trick in Tata DoCoMo which I am using currently to surf free internet on my Samsung wave. Its 100% safe and this 3G hack can be used by anyone who is having a phone with 3G supported and a DoCoMo sim with 1 rupee balance.

Procedure

1. First of all Create a new access point by going to connection settings.
Use the below settings for the access point.

    Name : Tata Docomo or any
    Access Point ( APN ) – tata.docomo.dive.in
    Homepage : www.krackoworld.com
    Proxy : 202.87.41.147
    Proxy Port : 8080

    2. Download opera mini handler usually above 5.0 version. 
    Use the below settings for handler

    • Default setting dive in
    • Set http in Custom Field in your Opera Mini handler
    • Socket Server to http://203.115.112.5.server4.operamini.com OR http://10.124.72.171.server4.operamini.com

    3. And lastly keep Proxy Type as blank.


    All Done! Enjoy free 3G in Tata DoCoMo....


    24 July 2011

    Register .Com, .Net, .Org, .In And Much More Domains Very Cheaply Via Coupon Codes Of GoDaddy


    godaddy_promo_codeRegistering Top most Domain in todays world is one of the most exiting and gainful thing to do for your Blog or Website because Sub-Domains or free domains like .co.cc, .tk, .co.nr etc.. did not help you to successful in your carrier or dream as they are hard to remember and not search engine friendly. Therefore today I come up with some Coupon codes also known as Voucher or Promo Codes of one of Biggest Company in registering domains,web-hosting and Email Marketing Called as GoDaddy.Com. What makes it bigger is its discounts via Coupons codes and the best ICANN-accredited Company. This site has more than 50 million domains under its management. So lets discuss its Coupon codes of 2011 below.

    Current Special Offers

    1. $7.99 .com domain renewals. Exp. unknown - gdbb776
    2. Save 25% off! Build your site fast and easy with Website Tonight from GoDaddy.com! – cjcwst25 or Click here to use it.
    3. $1.99 4GH Web hosting at GoDaddy.com – Click here to use it.

    Evergreen or Active Coupons

    1. $49.99 SSL Certificate for only $12.99 - WOWSSL
    2. $7.49 .COM Domains w/Free Instant Page Site – ggnxd047 or Click here to use it.
    3. $7.49 on New .COMs - cjc749fat
    4. 20% off regular-priced items when you order $40 or more - bb4940d5
    5. 15% OFF purchase of $30 or more. - gdz731bw
    6. Get .com domain renewals for $7.95 only - cjc795dom
    7. 15% off VPS & Dedicated Server. - fb2Serv15
    8. Deluxe website hosting for economy price- Save 37% at Go Daddy – Click here.
    9. Save 37% on Website Hosting at Go Daddy – Click here to use it.
    10. Save 20% on Premium Website Security SSL at GoDaddy.com – Click here to use it.
    11. 25% off Website Builders at Go Daddy! – Click here to use it.
    12. Get 20% off your order – HEAT20
    13. 30% off .COMs - Plus ICANN fee of 18 cents per domain name year. Discount is based on list price for new first year registration prices as of 7/11/2011 with final price reflected in your shopping cart at checkout. Discount applies to new registrations and renewals and cannot be used in conjunction with any other offer, discount or promotion, including sale pricing, bulk discounts, or special partnership discount programs. Domains purchased through this offer will renew at regular price after the initial term has expired. Offer expires Sunday, July 31, 2011 at midnight (Pacific Time). - gdz713ca

    Doubtful Coupons

    1. Save $1 on any order - cjcdeal74
    2. Get 50% off on all hosting plans plus get free domain name - SUMMERTIME
    3. Get .co domains for just $13.99 - PIRATE1399
    4. 10% off your order of $50 or more - Not applicable to ICANN fees, taxes, shipping and handling, sale priced domains and transfers, bulk domains and transfers, premium domains, Sunrise/Landrush domain registrations and pre-registrations, memberships or maintenance plans, additional disk space and bandwidth renewals, additional AdSpace advertising funds, custom page layouts, Go Daddy branded merchandise or gift cards. Discount reflected in your shopping cart - cannot be used in conjunction with any other offer, discount or promotion, or in connection with special partnership discount programs. Offer expires Sunday, July 31, 2011 at midnight (Pacific Time). – gdz727eh
    5. Save 25% on your purchase of $65 or more. 7/10/11 - gdz648bg
    6. Get web hosting for $1.99 only. - SOILDER3
    7. Buy a Go Daddy ® SSL Certificate, get any domain for just $1.99* – Click here to claim it.
    8. Get 15% off Search engine visibility plans - gdz614a
    9. Avail discount on WordPress hosting - cjcwphb01
    10. Spread the Word with a .ORG from GoDaddy.com - Compare and save at only $14.99! - cjcorg or Click here to use it.

    That’s it ! Special thanks to Retailmenot one who helps me to find out this Coupon codes very easily.


    18 July 2011

    Secure Your Wireless Home Network


    Wireless-Internet-SecuritySecuring Wireless Home Networks is one of the biggest problems that I have ever seen. As you all know that many software's like Kismet,Netstumbler etc. comes into action to break the security of it and get sensitive data plus information in it. So we have to be very attentive in this case, therefore below I am providing you some tips to get rid of this.
    Enjoy !

     

    Tips & tricks for Wireless Home Network Security

    1) Change Default Administrator Passwords and Usernames.
    2) Change the Default SSID (recommended).
    3) Turn on (Compatible) WPA / WEP Encryption.
    4) Disable SSID Broadcast.
    5) Assign Static IP Addresses to all Devices.
    6) Enable MAC Address Filtering.
    7) Turn Off the Network During Extended Periods of Non-Use (optional).

    I hope you all will enjoy it !


    16 July 2011

    Top 10 Killer Tips to Secure Your WordPress Blogs From Getting Hacked


    wordpress-security-tips (1)Now a days many of the blogs are hosted on WordPress due to its large number of features like plugins, login system, up gradation etc.. But the only thing lacked is that WordPress offers low Security enhancement and possibility of getting hacked by the hackers. Last night, I am searching on Google to find out some cool and useful tips to secure our WordPress Blogs to high level, but the only thing I get is “disappointment”. So today, I am going to explain some killer tips and tricks on WP-Config File,Brute force attacks,WordPress plugins, Security and even on its Version also. Have Fun @!

     

    1. Upgrade to the latest version of WordPress

    Hence the latest version of WordPress always comes with fixtures in  bugs and security vulnerabilities, therefore it is important to keep yourself updated at all times. Currently its new version is 3.2.

    2. Use Strong Passwords

    Make sure you have used a strong password for your login which makes it difficult for others to guess it. Use a combination of digits, special characters and upper/lower case to combine your password.

    3. Back up Your data Regularly

    It doesn’t matter how secure your WordPress blog is, build a habit to backup your data regularly for some extra security by installing a plugin named as wp-database-backup.

    4. Security Scan is must

    Install the wp-security-scan plugin and perform a regular scan of your blog for some security loopholes.

    5. Use Secret Keys in Your WP-Config File

    In WordPress, the wp-config.php file is the file that stores the information about the database of your blog mainly. This file contains the name, address and password of the MySQL database that stores all of your user info, blog posts and other important content.

    Using a secret key, you can make it even more difficult for someone to gain access to your account.

    6. Always remove your WordPress Version info

    According to Matt Cutts presentation – remove the tag in your header.php that displays the current version of your WordPress blog. It’s:

    <meta name=”generator” content=”WordPress <?php bloginfo(’version’); ?>” />

    Or, you can just modify it so that the version number isn’t displayed, to something like

    <meta name=”generator” content=”Powered by WordPress” />

    7. Encrypt your Login

    Whenever you try to login to your website, your password is sent unencrypted. If you are on a public network, hacker can easily ‘sniff’ out your login credential using network sniffer. The best way is to encrypt your login with the Chap Secure Login plugin. This plugin adds a random hash to your password and authenticate your login with the CHAP protocol. You can also use the AskApache Password Protect plugin which adds a 2nd layer of security to your blog by requiring a username and password to access anything in the /wp-admin/ folder.

    8. Protect your wp-admin folder

    You may just add a ht.access access to your Wp admin folder which restricts access by blocking all ip addresses expect the one who uses. Note- please place this file in admin folder only not in the root directory of your WordPress blog.

    order deny,allow
    deny from all
    allow from 255.168.088.59

    change 255.168.088.59 to your ip address from where you are doing blogging.

    9. Install Login Lockdown plugin to Stop Brute Force Attacks

    If an hacker wants to crack your login password using brute force attack, then he/she gonna failed by simply installing a plugin called login lockdown which prevents or disable the login function after some bad attempts from same ip addresses.

    10. Hiding your Plugins

    Again, from Matt Cutts point of view – put a blank index.html file in your /wp-content/plugins/ directory in order to hide up your used plugins from others. By default, you can actually view the contents of this folder, so everyone in this world knows about the plugins you have installed.

    Done !

    Stay Connected with Us

    If you want to remain update with these cool tips and tutorials at our blog, then kindly submit your email address below and get in touch with us. Note- After Submitting your email id below, please check you inbox and activate your feeds also for that.


    15 July 2011

    An introduction to Linux- Running, Learning and Choosing Distribution


    LinuxWhat is Linux ?- Let me clear you that Linux is a free, open-source, UNIX-like operating system. The name "Linux" comes from the Linux kernel, originally written in 1991 by Linus Torvalds. It can be installed on a wide range of computer hardware, starting from mobile phones,tablet computers, routers and video game consoles, to desktop computers, mainframes and supercomputers also. As you continue to learn how to hack, you will realize how important it is to learn how to use the Linux operating system. 

    Here are the couple of facts & figures about it:
    1. Millions of servers on the internet run on the Linux operating system. You must learn the operating system to be able to penetrate these web servers.
    2. Some of the best hacking programs only run on Linux.

    Choosing a distribution

    A Linux distribution is the Linux kernel (- central component of an operating system.) plus a collection of applications. If you are a beginner to Linux, I would suggest starting with Ubuntu as your first Linux distribution. It is simple to install and very user friendly.

    Running Linux

    There are many ways to get Linux up and running. I will show you the most popular methods below.
    • Live CD
    • VirtualBox
    • Wubi

    Learning Linux

    You can now learn Ubuntu running and Linux through many ways as given below :

    Enjoy D!


    14 July 2011

    Spyware Cease - The World’s Best Antispyware


    Spyware-CeaseIs your Antivirus unable to detect harmful keyloggers and spywares, if yes, So from now it again never happen as the worlds best antispyware- Spyware Cease comes into action to protect you. This software has a vast range of features which is discussed below and also labeled with the best choose of 2011-2012. Spyware Cease has the capability of detecting very-2 small keylogger and power of removing it. Its scan goes very deeply which helps you to find out micro-errors as well. And Also Last month, Its new version releases out with real-time guard protection which is a alternate to Noadware.

    Spyware Cease Features

    spyware_cease-185456-12738159971.Internet Tracks and Password Thieves Cleaner
    One simple click to delete malicious cookies from your computer system so as to clear Internet Tracks completely and minimize password thieves to protect your privacy!

    2.Real-Time Guard (NEW)
    Spyware Cease™ offers the real-time guard function to protect your PC from potential threats, minimizing interruptions. Spyware Cease will inform you by displaying a popup on the bottom right of the screen, whenever any program attempts to modify registry, so that your PC is always protected against spyware threats.

    3.Deep Scan
    Spyware Cease™ will completely scan your system registry and hard drives for spyware programs that installed on your PC. The free full scan will identify and list all threats.

    4.Powerfully Remove Spyware
    After scanning, Spyware Cease™ will clean up all malicious spyware programs that can continually generate unwanted popups, slow down PC speed, and hijack homepage, etc. The spyware programs include but are not limited to:

    • Adware
    • Annoyance
    • Browser Helper Object
    • Cracking Tool
    • Dialer
    • Downloader
    • Encryption Tool
    • Exploit
    • Rogue Security Software
    • FTP Server
    • Hijacker
    • Hostile ActiveX
    • Key Logger
    • Nuker
    • Password Cracker
    • Phreaking Tool
    • Proxy
    • SPAM Tool
    • Tracking Cookie
    • Trojan
    • Worm Creation Tool
    • Usage Tracks
    • P2P
    • Mail Bomber
    • Phreaking Tool

    5.Auto & Scheduled Scan
    By default, Spyware Cease™ will run a quick scan to the System Processes, Windows Directory and Users Directory for spyware programs. This is the most reliable way to clean up threats on your PC and restore your Internet confidence . Automatic scan can be scheduled by setting Schedule Task and Start time for the program to meet your need.

    6.System Analysis (NEW)
    By diagnosing PC System drivers, System process, HOSTS files, System services and Windows registry, Spyware Cease™ will generate a text that shows all Windows system information.
    You can receive a customized solution for your specific problem on your individual system, once you forward the Analysis Report and Scan Results LSR.lsr to Spyware Cease support team.

    7.Ignore Items
    After a scan is performed, you can right-click on the detected result to add the item to the Ignore List so that Spyware Cease™ will not remove the item and will ignore it on the next scan.

    8.Auto and Manual Update
    By default, Spyware Cease™ will automatically check for update as it starts up, or you can manually check for updates in the "Update" section.

    9.Vulnerability Scanner and Patch (New)
    Spyware Cease™ offers a suite of solutions to determine the configuration of every system service, and then compares the data found to thousands of vulnerabilities in its existing database.
    If any potential vulnerability is identified, Spyware Cease™ will repair it with the latest patch to greatly enhance the security of your computer system.

    10.Editors rating - 9/10 and McAfee SECURE.

    download_buttons1[2]


    13 July 2011

    The Hacker News - Complete Review


    thnAs all of you know that Hacking,Cyber security or hackers news keep us alive what's going around the world in the field of Ethical hacking and Security Tips. But what we need is a good site or platform where we can have a complete list of information about it. Hence to solve this issue, today krackoWorld Recommends the following website named as thehackernews (THN) which writes about the news and reviews related to Security,Hackers(Indian,Anonymous,Lulzsec,Pakistani,Albania,Tunisian,USA,Indonesia,Israeli),
    Linux,Tech,Hackers voice plus Hacking news,Cyber Crime,vulnerability etc.. This website also releases its magazines and giving you the opportunity to submit your articles regarding to its content for traffic and money. Below is a brief description of it !

    About the Website

    The Hackers News is an online Hacker News Organization. We propagate news specifically related to information security threats, Hacking threads and issues from all over the world. Our research teams search and compile news from tens of thousands of sites to bring you the most relevant Cyber Hacking titles in one location. In addition to news, we host blogs and discussions, education videos, as well as Hacker News Organization providing education series in Ethical Hacking and Countermeasure Techniques and technologies.
    The Hackers News is only information partner with some Media Services. Owned by Some Programmers , creator of the Exploits Technology as well as various other certifications in Computer Forensics, Advanced Security Analysis, Vulnerability Assessments, Penetration Testing, Secure Coding, Secure Application Design, Disaster Recovery, and much more.

    Official Website   : http://www.thehackernews.com/
    Facebook Page     : http://www.facebook.com/thehackernews
    Our Twitter           : http://www.twitter.com/TheHackersNews
    Email Updates      : http://feedburner.google.com/fb/a/mailverify?uri=TheHackersNews Sms Alert Service: http://labs.google.co.in/smschannels/subscribe/HackersNews

    I hope you enjoy this post and stay connected with Hacking and Security Related News.


    How To Trace An Email Address


    how-to-trace-an-email-addressThis is my second post after sharing my 1st post on hide your IP address related to the Labels of IP. Therefore, today I am going to tell you how to trace an email sent to you whether it is of your friend,relative, and anonymous also. In this, you have to find just Email header and your work will be done! And also providing you an software named as EmailTrackerPro which helps you to insert email header details & get the desired results.

     

    What is an Email header?

    Each email you receive comes with headers. The headers contain information about the routing of the message and the originating Internet Protocol address of the message. Not all electronic messages you receive will allow you to track them back to the originating point and depending on how you send messages determines whether or not they can trace an email address back to you. The headers don't contain any personal information. At most, the results of the trace with show you the origination IP and the computer name that sent the email. After viewing the trace information, the initiating IP can be looked up to determine from where the message was sent. IP address location information DOES NOT contain your street name, house number, or phone number. The trace will most likely determine the city and the ISP the sender used.

    How do I get the Email header to start the trace email process?

    Each electronic messaging program will vary as to how you get to the message options. I'll cover the basics to start the trace...the rest is up to you.

    • Outlook - Right click the message while it's in the inbox and choose Message Options. A window will open with the headers in the bottom of the window.
    • Windows Live - Right click the correspondence while it's in the inbox, choose Properties, then click the Details tab.
    • Gmail - Open the correspondence. In the upper right corner of the email you'll see the word Reply with a little down arrow to the right. Click the down arrow and choose Show Original.
    • Hotmail - Right click the memo and choose View Message Source.
    • Yahoo! - Right click the note and choose View Full Headers.
    • AOL - Click Action and then View Message Source.

    You can see that no matter the program, the headers are usually just a right click away.

    I've got the header, now how do I start the trace?

    The next step to trace an email address is to find the first IP listed in the header. This is most likely the IP initiating point. However, there are exceptions to this. You'll have to look at the information logically to deduce the originating IP.

    Download the EmailTrackerPro Software

    http://www.emailtrackerpro.com/download.html

    Final Step -

    Now Insert all the Email Header Details and more to EmailTrackerPro Software after opening it and get all the details of Email sender includes its address,name,date of Email sending etc..

    That’s it !


    Malware and its Types


    malwaresMalware, short for malicious software, consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior. Software is considered to be malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms,Trojan horses, spyware, dishonest adware, crimeware, most rootkits, and other malicious and unwanted software or program.

                                                         Types of Malware

    1. Trojan Horse

    Trojan virus or Trojan horse is one of the most common types of malware, Trojan virus is mostly used to control the victims computer rather than infecting or destroying files on victims computer. A Trojan horse once installed into victims computer can give a hacker complete access to your computer. Trojans are one of the most dangerous forms of malware.

    2. Computer Viruses 

    A computer virus a malicious program which is mostly developed to infect a computer, once it infects a computer it replicates or reproduces itself. A virus is just like a parasite and it needs another host to attach to in order to infect a computer.

    3. Worms 

    Worms are almost similar to computer viruses the only difference unlike computer viruses they do not require another host to attach to in order to infect a computer. Once a worm infects a computer it replicates itself. Computer worms are major threats to large networks.

    4. Keyloggers

    A Keylogger is a hardware or software device which monitors every keystroke, screen shots, chats etc. typed on the computer. A keylogger program does not require physical access to the user's computer. Any person with a basic knowledge of computer can use keylogger.

    5. Adware 

    Adware is the short form of Advertisement-supported software. Adware’s are commonly designed to display advertisements on your computers. However some of these adwares may contain harmful viruses and spying programs which can bring your computer system to knees.

    6. RATS 

    RAT is the short of “Remote Administration Tool” and is indeed one of the most dangerous types of malware. It’s very similar to a Trojan. Once a RAT is installed in a computer the attacker can do almost anything on the remote computer such as installing a keylogger, shutting down a computer, infecting files etc.

    Stay touch with us at Facebook and Twitter to enjoy these exciting posts very much.


    How to Flood a Website with Denial of Service Attack


    syn-floodAre you curious about how to flood a website with dos attack as most of the hackers do for fun, if yes then sit down and check this article below. I am going to explain 1 by 1 proper definitions of it and also tell how to perform this attack in the end.
    What is a Denial Of Service Attack?
    A denial of service attack (DOS) is an attack through which a person can render a system unusable or significantly slow down the system for legitimate users by overloading the resources, so that no one can access it.
    If an attacker is unable to gain access to a machine, the attacker most probably will just crash the machine to accomplish a denial of service attack,this one of the most used method for website hacking.

    Types of denial of service attacks

    There are several general categories of DoS attacks.Popularly, the attacks are divided into three classes:

    1. bandwidth attacks,
    2. protocol attacks
    3. logic attacks

    What is Distributed Denial of Service Attack?

    In DDOS attack, The attacker launches the attack using several machines. In this case, an attacker breaks into several machines, or coordinates with several zombies to launch an attack against a target or network at the same time.
    This makes it difficult to detect because attacks originate from several IP addresses.If a single IP address is attacking a company, it can block that address at its firewall. If it is 30000 this is extremely difficult.

    Damages made By Denial of service attack:

    damage_oneOver past years Denial of service attack has made huge amount of damage,Many of the have been victimed of this attack
    Its Real,On February 6th, 2000, Yahoo portal was shut down for 3 hours. Then retailer Buy.com Inc. (BUYX) was hit the next day, hours after going public. By that evening, eBay (EBAY), Amazon.com (AMZN), and CNN (TWX) had gone dark. And in the morning, the mayhem continued with online broker E*Trade (EGRP) and others having traffic to their sites virtually choked off.


    This attack also recently hit twitter on 6th August 2009,lot of people had trouble on logging on twitter,It was brought down by denial of service attack,They tired up there server so no one can get on log on it.Websites like Facebook,eBay etc. have also been victim of this attack.
    Now i will show you how you can flood a website with Denial of service attack. For this tutorial we will be using one of the most effective and one of the least known tools called "Low Orbit Ion Cannon", created by Anonymous members from 4chan.org, this program is one of the best for DDoS'ing, and I have successfully used it to DDoS websites. An internet connection as bad as mine (2,500 kb/s) was able to keep a site down for a day with this program running. Remember that this tool will work best with high internet speeds, and try not to go for impossible targets (like Google, MySpace,Yahoo). LOIC is used on a single computer, but with friends it's enough to give sites a great deal of downtime.

    Prerequisites: Download LOIC (Low Orbit Ion Cannon) from here, then Open up LOIC.
    Step 1: Type the target URL in the URL box.
    Step 2: Click lock on.
    Step 3: Change the threads to 9001 for maximum efficiency.
    Step 4: Click the big button "IMMA FIRIN MAH LAZAR!"

    Credits

    Special Thanks to RafayHackingArticles for redistributing this Article at my blog .
    Waiting for the Comments !

    Best Way to Learn Programming - Advantages & Disadvantages


    what is programming languageLots of readers often ask me that is learning programming is mandatory for a hacker to increase its potential, So the answer is “yes” but in some cases. Atleast we have the knowledge of little basics of it. hence programming helps us to became an elite hacker. Therefore today, I am going to tell you the advantages and disadvantages of learning programing and also how to learn it properly as well. Enjoy !

     

    Where should I start ?

    Many people finally decide that they are going to begin learning a programming language, but don’t know where to start. I believe that before you begin to learn a programming language, you should first master HTML (Hypertext Markup Language). HTML is part of what makes up all of the website pages you see on the internet. HTML is very easy to learn and it will helps you to have a look at source code. Blogging and template designing is also a best way to learn it in my point of view.

    From there I would suggest starting your programming life with C. C is one of the most popular languages, and it is what makes up the majority of the exploits out there today. C also makes up some of the most powerful hacking programs and viruses that are out there today.

    Advantages of Programming

    1. You’ll be considered an elite hacker.
    2. Imagine a black hat discovers a vulnerability and codes an exploit for it that no one else knows about. The black hat would be able to take down thousands of machines before anyone discovers and patches the vulnerability.
    3. You will feel so much more satisfied having created your own program or exploit. I promise you this.

    So my advice is, don’t settle for being a point and click hacker. Take some time to understand even just the basics of programming and an entire new world of hacking will open up to you.

    Disadvantages of Programming

    1. You’ll be considered an script kiddies.
    2. You don’t have your own point of view and rearrangement.
    3. You cannot find holes & vulnerabilities.
    4. No idea of creating your own tools and exploits etc.

    Best way to learn it

    1. Purchase a beginners book on your programming language usually in English. Before you choose the book, make sure you read the reviews to make sure it’s a good choice.
    2. It is important that once you begin learning the programming language through your book, you don’t take big breaks. Taking long breaks will cause you to forget things you learned in the beginning that apply to the rest of the book.
    3. Do ALL of the practice problems provided in the book. The only way you will become better is by applying what you learn.
    4. When something difficult comes up or something that makes no sense to you, don’t avoid or skip it. Instead embrace it! This is how you actually learn. If you still don’t understand it after going over it multiple times, find someone that can help you.
    5. Join a programming forum. Search for a website on your programming language that has a large user base. There will be many professionals on there that will be able to help you when you get stuck.
    6. Practice. Practice Practice. Think of ideas for fun programs that you could make and program them!

    Share it !

    Wants to share this article - no problem, but remember to provide proper credits to the author and its website as well.


    12 July 2011

    Learn Website Hacking with DVWA–Video Tutorial


    dvwa_greyNow a days website Hacking is becoming not so difficult to do as enhanced hacking software's comes into play. but one thing we need is safe and secure environment to practice our skills and learn. Therefore, today I am going to tell you how to hack a website with DVWA tools along with video. Firstly I want to clear 1 thing that what a DVWA is- Basically DVWA stands for Damn vulnerable web app and it allows you to learn and practice web application attacks in a safe environment. It is PHP/MySQL web app supported which is Damn vulnerable in nature and It's latest version is DVWA 1.7.

    Vulnerabilities

    • SQL Injection
    • XSS (Cross Site Scripting)
    • Login Brute Force
    • LFI (Local File Inclusion)
    • RFI (Remote File Inclusion)
    • Command Execution
    • Upload Script
    • Blind SQL Injection

    Special Instruction

    By reading this tutorial out, you are agreeing with KrackoWorld’s Disclaimer.

    Installation

    You can download DVWA 1.0.4 from here, below I am posting a video which will tell you step by step how to install DVWA tools on your computer and practice website Hacking.

    11 July 2011

    Download Mozilla Firefox 6.0 (Latest) for Enhanced Security Features


    mozillaI think all of you are aware of Mozilla Firefox as it is the best browser in the world. Many other browsers like Google chrome, IE, Opera, Safari are in the race against it. But the only thing lacked in the above browsers is either they are not much fast as the Firefox or having some poor security related issues. Developers of Mozilla Firefox are releasing its new version very fastly from 1.0 to 5.0 etc. And now its not being a week ago Mozilla has launched its product new version 6.0 named as Mozilla Firefox 6.0 Beta which security features are being discussed below to protect you from various harmful threats in the future. 

    Protect your Privacy

    • Do Not Track

      Many sites track your online behavior and sell that data to advertisers. Firefox lets you tell sites that you want to opt out of behavioral tracking.

    • Private Browsing

      Sometimes it’s nice to go undercover, so turn this feature on and protect your browsing history.

    • Clear Recent History

      Clear all your private data or just your most recent activity with a few quick clicks.

    • Forget This Site

      Having second thoughts about having visited a certain site? Remove every trace of ever having been there!

    • Content Security Policy

      Firefox lets sites explicitly tell it which content is legitimate, thus protecting you from cross-site scripting attacks.

    Browse with Security

    • Instant Website ID

      A color-coded system makes it easy to check on suspicious sites and avoid Web forgeries.

    • Anti-Phishing & Anti-Malware

      Firefox protects you from Trojan horses and spyware, and warns you away from fraudulent sites.

    • Secure Software Installation

      A secure connection is required before you can install add-ons and other 3rd party software.

    • Anti-Virus Integration

      Firefox integrates elegantly with your computer’s anti-virus software whenever you download.

    Stay in Control

    • Plugin Check

      Outdated 3rd party plugins can be a major risk, so we made it easy to find out what to update.

    • Parental Controls

      Enforce parental control settings you’ve entered on Windows 7 to stop unwanted downloads and more.

    • Customized Security Settings

      Control the level of scrutiny you’d like Firefox to give a site with a variety of customized settings.

    Download

    File Size- 15 MB
    Download- Click here

    Conclusion

    Now all have you read the features above, So in the end, I wish to say that only if you want a fast and secure browser then just choose Mozilla Firefox blindly as it is developed by great engineers with the process of scratching the bugs etc.

    Be Secure !


    09 July 2011

    Hack Credit Card – Generate and Check Numbers


    credit-cardAs requested by many readers that how to hack credit cards for money, today I am going to share best of my tools which can easily hack credit cards,CVV numbers and check accounts also. firstly I want to clear that what is credit card is- A credit card is a small plastic card issued to users as a system of payment. It allows its holder to buy goods and services based on the holder's promise to pay for these goods and services. The issuer of the card creates a revolving account and grants a line of credit to the consumer (or the user) from which the user can borrow money for payment to a merchant or as a cash advance to the user. Note- I have uploaded all my tools to sharecash.com as for security basis and it is not mandatory that these tools may work 100%.

    Credit Card Generator 2010

    creditcardgeneratorCredit Card Generator is actually a software to generate and validate a valid credit card. It brings out all details of the credit card !

    It is can be used by hackers to make instant money by
    activating it for shopping on online stores etc. This tool generates a 13 and 16 digits
    VISA, Master card, Amex and many more.


    Download Software 1 here, software 2 here and software 3 here.

    Credit Card Checker & Verifier

    EasyCreditCardCheckerUsing this software you may check MasterCard, VISA,
    Diners Club, EnRoute, Carte Blanche, AMEX, Discover, or JCB
    credit card numbers without submitting them online.

    Features:
    + Verify credit card numbers online
    + Automatically detects card type
    + Utilizes LUHN10 and first numbers verification algorithms

    Download Software 1 here, Software 2 here, software 3 here.

     

    All in 1 Credit Card Tools

    Did u ever tried to access a premium page without money? You probably failed. But now, all you have to do, is to generate a number with one of the tools and then copy paste it.

    Added more useful tools to this newest version. Now you can even generate Cvv2-protected number also.

    Download Here

    Credit Card Manager 2011

    creditcardmanagerCredit Card Manager will help you to store all personal credit card account-related information and keep track of credit card transactions as well !

    Credit Card Manager maintains transaction information, such as charges, payments and interest charged also. With it,we can see history also.

     


    Download Here

    That’s it ! I hope you like it and don’t forgot to subscribe my Email Updates.


    06 July 2011

    How to Use PayPal Even In Banned Countries ?


    paypal puzzleAs you all knows that PayPal is a great Online Money Transaction Service where people can send,receive,withdraw and even hold Payments. PayPal is an company of eBay Inc. and a US $2.23 billion worth company! :> Around 75% of online money transfer is now made via PayPal. But the only problem is that PayPal has their very strict rules and policies which banes countries like Pakistan,India,Egypt,Iraq,Afghanistan,Iran and more to use it. Therefore today I am going to tell you the solution along with examples.

     

    Restrictions made by PayPal to the banned Countries like India and More :

    • Export related payments for goods and services must not exceed $500.

    • Any balance or future payments must not be used to buy goods or services but transferred to a bank account within 7 days from the receipt of payment.

    • Credit/Debit cards must be used for payment processing through Paypal

    Complete List of Solutions :

    1. The Solution Lies With Your Friends and Relatives -( This is a true story of Mohammad Mustafa Ahmedzai from Mybloggertricks )

    I started web designing two years back and to receive payments from clients the only option I had was to use PayPal but since I live in Karachi Pakistan, PayPal was what I could not use. I searched day and night for a magic formula that could help me earn a living online. I had skills, clients but no payment source and that was disappointing. Those days were tough but it did not bother me for long. During a chat with a home town friend I came to know How Stupid Was I!

    That blessed man told me that Of Course PayPal is banned in Pakistan but he used to receive and send hundreds of dollars a week using his PayPal account from Pakistan. I asked how? He said you can not create a PayPal account from here using a Local bank account but you can Log Into a PayPal  account From a banned Country!

    For a complete list of PayPal Accepted Countries, Please Visit this link .

    If you have any trustful friend, family member or a relative living in any of the above countries, then you simply need to ask for there generosity in this serious case. How? Follow up.

    How I created my PayPal Account in Pakistan?

    I have a sister living in California USA. She is a housewife and an American National. I simply asked her if she could use her credit card to open a PayPal account for me using her Local Bank. Fortunately she was more than happy to help me out and it took her less than a week to fill all the legal forms and create an Online PayPal account. This whole process cost her less than $20 Dollars. Just after five days I was able to log into my PayPal account using my own Username and Password.

    Now whenever I have to withdraw some cash out of my account, I simply call my sis and she being the original owner of my account withdraws the amount using her Local Bank and credit card. Within 3 days I receive the amount at home through Western Union Cash Out

    This method works fine for me and is a simple practical way of using PayPal the other way Round. As simple as that! =)

    2. Bhavesh from Plenty of Ebooks Suggested some New Ways on Online Internet transactions and Payments.

    " The only solution right now is either use debit/credit cards for online payment or switch to Moneybookers or alertpay. The second option doesn't guarantee that your problem is solved forever because as more people switch to other options RBI can impose these rules on Moneybookers and alertpay as well in future.
    Another solution for payments is using VCC but not a very good idea I think.
    As for receiving money is concerned here is an eg. what you can do.
    Eg. You are about to receive 1000 USD from someone but the limit is 500 USD. So what you can do is get that 1000 in two transactions of 500 USD each. It doesn't matters how many times in a month you receive 500 USD.
    The rules are not fully implemented yet in all accounts. Some are able to send money as they used to do before and some cannot. Its just a matter of time when the rules are fully implemented.
    Although I don't see that anything is gonna change in these pathetic rules you can still take a step forward a make a petition on the following site informing RBI how these rules affects you.
    Here is the site where you can file your petition:
    Internet Entrepreneurs of India's Petition to RBI "

    What is a VCC ?

    "VCC (Virtual Credit Card) is somewhat like a temporary credit card you can say. It is valid just for just 24 hours. Not all banks provide this service. HDFC Net Safe provides a VCC.
    To create a VCC you need to have an actual credit/debit card. After creation you get a different 16 digit no. and CVV no. etc etc. which is not related to your actual credit/debit card. By this you can shop online without worrying because it will expire in 24 hrs. and also you can set a limit of how much to use in that VCC. So VCC is for some one who do not want to pay online regularly or for people who are concerned about the security. For people who pay regularly online then attaching a credit/debit card to PayPal is best option so far I think.
    And about alert pay and money bookers, I can say that money bookers is now getting popular after this PayPal issue. Many people are switching to them because these rules are only imposed on PayPal at the moment. But it will take time for online retailers because not all of them uses Money Bookers at the time because PayPal was ruling but I guess they will start adding money bookers as an option for payment as well. Again its just a matter of time :)"

    Do you have another Solution ?

    I would highly appreciate if you will post any other working method or solution that you may have practically applied and it worked for you in the Comments Box below.

    02 July 2011

    The Original Hacker Definition and Its Types


    hackers cap 

    What is an hacker?

    An hacker is someone who likes to tinker with electronics or computer systems to fun out. Hackers like to explore and learn how computer systems work, finding ways to make them do what they do better, or do things they weren’t intended to do. There are two types of hackers:

    White Hat : 
    These are considered the good guys. White hat hackers don’t use their skills for illegal purposes. They usually become Computer Security experts and help protect people from the Black Hats.

    Black Hat :
    These are considered the bad guys. Black hat hackers usually use their skills maliciously for personal gain. They are the people that hack banks, steal credit cards,Hack email id-passwords and deface websites.

    Hackers Hierarchy

    Script kiddies :
    These are the wannabe hackers. They are looked down upon in the hacker community because they are the people that make hackers look bad. Script kiddies usually have no hacking skills and use the tools developed by other hackers without any knowledge of what’s happening behind the scenes.

    Intermediate hackers :
    These people usually know about computers, networks, and have enough programming knowledge to understand relatively what a script might do, but like the script kiddies they use pre-developed well-known exploits (- a piece of code that takes advantage of a bug or vulnerability in a piece of software that allows you to take control of a computer system) to carry out attacks.

    Elite Hackers :
    These are the skilled hackers. They are the ones that write the many hacker tools and exploits out there. They can break into systems and hide their tracks or make it look like someone else did it. You should strive to eventually reach this level.

    What does it take to become an hacker?

    Becoming a great hacker isn’t easy and it doesn’t happen quickly. Being creative helps a lot. There is more than one way a problem can be solved, and as an hacker, you may encounter many problems. The more creative you are the bigger chance you have of hacking a system without being detected. Another huge quality you must have is the will to learn because without it, you will get nowhere. Remember, Knowledge is best power. Patience is also a must because many topics can be difficult to grasp and only over time will you master them. In the end, I would like to say only 1 line “ Exploring is the best way to become an successful Hacker in todays world “.

    That’s it !


     

    Recent Posts

    Review this blog on Bloggers.com

    Recent Comments

    | KrackoWorld (KoW) © 2014. All Rights Reserved | Style By All Web Designing | | Contact |