Sunday 16 June 2013

HACK REMOTE COMPUTERS ON YOUR NETWORK

Note : I m not responsible for what ur going to do with this trick.






Firstly I Will Tell You What Is Internet Protocol (IP) ??



The Internet Protocol is the principal communications protocol used for relaying datagram (packets) across an
internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet. 



IP is the primary protocol in the Internet layer of the Internet Protocol Suite and has the task of delivering
datagrams from the source host to the destination host solely based on their addresses. For this Purpose, IP defines addressing methods and structures for datagram encapsulation

HACK WIFI USING WINDOWS

Hi all users I think many Windows users here are struggling to hack WiFi networks because most of the tutorials are based on Backtrack and other Linux Tools . So today I'm here for sharing a method to Crack WiFi networks using WEP security protocol .The WEP is a very vulnerable to attacks and can be cracked easily .
 

 

 It takes about 5-6 hours if the password is weak a high signal of the WiFi network you are going to hack and you have sometimes 10-12 for more complicated passwords and if the WiFi signal of the Network is weak .The time taken also changes if the WiFi network you are going to hack has many other clients already accessing it . 
 
 
You will be using two tools :
 
1. Commview for WiFi : You will use this tool for capturing the packets sent and recieved through the Access Point you are going to hack .The more packets you capture the better chances of cracking the password .You will need more than 1,00,000 minium packets to crack the password .The packets will be captured in the .ncp format .You will use this tool to
convert the .ncp to .cap .

SERIAL KEYS OF 50+ SOFTWARES

╚═►VMware Workstation v9.X ◄═╝
 
Serial Key:→↓
ZF3X0-4ZW0Q-0842P-E6PGC-PKRZF
VY19K-01X5L-084MY-MXMZG-MAUF2
YA5X2-FEFDK-H80VQ-4YWQC-MPARD
YU1WA-F1GD7-485UQ-ADNNT-XCAR6
GF1WR-FGZ5J-485RY-JGQQC-XZ2G8
AY3HA-F1D5N-08D7Q-Z6X5T-XK2G2
YG5EK-D1X8L-088XY-NNQEC-P3AW6
VF14H-0YFE5-48D2Z-ZDPNT-YFUZ8
ZU31H-2WY83-0853Y-Z5WQZ-ZAAC6
GC1WK-F8XEM-M812P-9WMG9-XUU9F
AY540-00W0M-088DY-GDQ7T-QL8Z8
FF34U-A5W11-H80UP-F6WNV-NL8V6
CF71K-AGD52-H894Q-Q4P7E-XL2R6
YZ5MA-6GXDP-0841Y-K4PNG-XK2ZF
========================================================================
 
╚═►NovaPDF Professional Desktop v7.7.387◄═╝

TOP 15 FREE HACKING TOOLS




1. Nmap





Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.

Sim Card Cloning

[Sim Cloning is Illegal. This Post is

Only  For Educational Use]

 
 
SIM cloning is the process in which a legitimate SIM card is duplicated. When the cloning is completed, the cloned SIM card's identifying information is transferred onto a separate, secondary SIM card. The secondary card can then be used in a different phone while having all calls and associated charges attributed to the original SIM card. The phrase SIM clone is often used to refer to the SIM card that has been successfully duplicated.

YES, a SIM Can be Cloned**
 
** There are Special considerations & Not All SIMs available, can be cloned.
 
You Need Special Hardware. NOT the ordinarily available SIM Reader/Writer. These "Writers" can ONLY insert SMS & Contacts . Nothing Beyond That.
The Hardware should be able to write to the EEPROM (or Programmable Memory) of the SIM.

NSA whistleblower: U.S has been hacking into China, Hong Kong

Former CIA employee Edward Snowden says the NSA's controversial PRISM program extends to China and Hong Kong, according to an interview with a Hong Kong newspaper.
 
The U.S. government had been hacking into computers in Hong Kong and China for years, says NSA whistleblower Edward Snowden.
The former CIA employee stirred up a hornet's nest recently when he leaked details about PRISM, a National Security Agency program that collects certain user information from Internet companies and phone service providers in an effort to track down terrorists.
In an interview with the South China Morning Post, Snowden said that PRISM actually extends to people and institutions in Hong Kong and mainland China. The NSA itself has been hacking into computers in Hong Kong and China since 2009, he added, citing documents that had not been verified by the Post.

Mozilla, EFF, ACLU rally public against electronic surveillance