Wednesday, June 4, 2014

How to get .edu/education emails for free

So do you want to get into student discounts but don't have an .edu email? then follow this guide to easily get one for free.

Step one: go to HERE
Step two: Click "Create an account"
Step three: Select any of the student options, I usually go with college.
Step four: Click "Find" and click any school, doesn't matter. (Do not check the box)
Step five: !IMPORTANT! Check the box below the email boxes and do not fill anything into said boxes.

It should look like this


How to remove your last name from facebook

Requirements

• Brain
• Mozilla Firefox ( Any Version )
• Indonesian Proxy ( Hide My Ass Proxy )
• Patience
• Facebook Account

Step One :

Open Firefox & Go to HideMyAss.com and Scroll Down


Learn how a hacker can easilly steal your facebook account

These are all methods used by hackers to steal accounts Facebook know it now....


There are many ways in which hackers pursued by the penetration of Facebook accounts have been uncovered while not touching each other to rule it became known, but in this post I will try to offer you all the ways in which hackers penetrating accounts in Facebook, where I tried to do I just insert that still working or pose a danger to the accounts to the limits of the time of writing this post.

How to change Windows 7 password without logging in

1. You must turn on Sticky Keys (which is in the bottom right of the login screen).

2. You must shut down your computer and turn it on again.

3. You must immediately shut down your computer when it says "Starting Windows."

How to get a person's IP and boot people offline on xbox

Step 1. Download the following program, CAIN

Step 2. Open Cain and abel click the start/stop sniffer tab at top left just under file to activate it, Then head over to the "Sniffer tab".
Once at sniffer tab click the blue + at the top then click ok on the tab that pops up wherever it says "microsoft" thats your ip for your console
your gonna use that for the next step remember it.

Step 3. On the sniffer tab look at the bottom tabs click "apr"
Click white box on the very top the big one the blue + should turn blue.
Now you click your xbox's ip that you memorised for the first row of ips ex:192.168.1.9 on the second white tab you should click your modems default gate way ex:192.168.1.1

Step 4. Your nearly done all you gotta do now is click the start/stop button under file at the very top to start getting peoples ips.

Step 5. Once you have the persons ip just load up whatever flooding services you have and flood port 3074 with 100 and more threads with UDP


Tuesday, June 3, 2014

How to hide porn stuff on your PC/Computer



HIDE PORN STUFF OR IMPORTANT DATA !!


Suppose number of files named as Sexyboobs.avi , xxxsashagrey.avi ,mommyboobs.avi , bigtits.avi etc.....

Now What's common in it --> sexy names like boobs, hot,sex,xxx etc.

We are not supposed to put in hidden folder, its an old trick these days.

A smart ass friend/relative/brother of urs can unhide hidden folders and then make a search for specific keywords - sex,xxx,etc

And guess what , he would definitely get a file and ur private stuff in no more private



SOLUTION

Go to folder and search options > View > Tick Show hidden files >
Untick Hide extensions to known file types > Apply and Ok

Go to file you want to hide ex- sexyass.avi and when you rename delete the extension avi and name sexy ass and name it $%Q$# or any character names likes $@$#%#$ , ^%$, @#$, ^#$ etc
and after that file will changed with different non executable unknown icon .

Now the friend of urs will never search for these keywords - $@$#%#$ , ^%$, @#$, ^#$ and not able to get it .

Now place the file wherever you want to place and if your friend see it by chance, he will have no idea whether its porn or else .

Don't worry you can access it by double click and choose program as vlc or any media player you want to choose

One plus benefit for this trick that after playing that, file will not record in your vlc mediaplayer or any player file history , so complete privacy.

How to mine bitcoins efficiently / How to triple mine bitcoins

Current Rank for Mining #47


So I have been seeing a couple questions on how to get started bitcoin mining in a pool and I am going to share how to do one of the most easy and most profitable ways. With Bitcoin prices over 500$ each now is a great time to start.


Your first going to want to go to the pool site which is triplemining (best payouts)

-->Triplemining This is the sign up link I will explain more later


Now that we have a account head to the workers page and add a new worker. (don't make it too long)


Now that you have a account for the pool its time to set up the miner

I am going to assume that this is your first time mining and you have no idea what to do. Start by going here to
-->Guiminer

You will want to install this and put it somewhere you can access it again
Run Guiminer in the folder and you should see something like this

We will now make a new miner (if you got a message saying no open cl devices you need to update your drivers for your grapgics card. If you don't know what type you have open start and type dxdiag and you should find it.


Make any name for it and now click on server and find Triplemining, then enter your username and password for your worker and select your device to mine on. You can select as many cores to mine on as you want, the more you check the more you can mine. (remember your username is your account_worker like this)



Now click view at the top and click show summary, check mark autostart and click start

MAKE SURE TO SAVE YOUR MINER!
You should be mining now, If you get connection problems make sure you enter your workers details right.

You should be mining like a champ and remember that team you joined earlier well it earns a 1% bonus for whatever the miners get. If you join and mine in my team I will do a giveaway every 2 weeks giveing it all away which with enough people could become a good amount.

How to get a person's IP from chatting site



FAQs:
What is CMD?
CMD is an exe and can be used for a lot of things.(lol)To open CMD on your computer, press the Windows button. Type: Run
Then type cmd. If at school, cmd can sometimes be blocked, as CMD can be used to hack a lot of things such as network and passwords.

Type run into windows search


Then type cmd


Why do I need full admin access??
Because the command that we will be using needs admin access to run. If you are at school, too bad. Sorry.


Now lets get onto the real stuff. Here's the REAL tutorial. If you have any questions feel free to post or PM me.

1. Clear all browser history,cache,cookies
(I hope you all know how to do that...)

2. Pick a chatting site. Facebook, chat-avenue, google hangouts all work.

3. Now get into a conversation.

4. Now here's the fun part. Open CMD.



5. Type: netstat -an


6. There should be lines of numbers that should look like this:


7. Depending on how many people you are chatting with or if you cleared history or cache, scroll down or up to see the IPs

(I had to blot some numbers out to hide the IPs. It is against rules to post IP adresses.)

YOU ARE DONE!

How to crack WPA password with your Android device / Reaver for Android

Reaver for Android v1.10
Reaver-WPS GUI for rooted devices with bcm4329/4330 wifi chipset.

INFO:
Reaver for Android, short RfA, is a simple-to-use Reaver-GUI for Android devices with bcmon support.
It has some very cool features:



Detects automatically WPS-enabled routers.
All Reaver-Settings are accessible from an a simple-to-use GUI.
Activates and deactivates Monitor-Mode automatically when needed.
Provides a simple way to connect when Reaver finds the WPA-Key.



INSTALLATION

1.Download/install bcmon.apk from HERE and RfA.apk from the bottom of this post.
2.Run bcmon, if it crashes try a second time.
3.If all runs fine, start RfA.
4.After selecting an WPS-enabled router, click on "Test Monitor-Mode".
5.Now you can use RfA:), don't uninstall bcmon.
*Steps 1 - 4 are only for the installation, they don't have to be repeated once done.



COMPATIBILITY:



Developed and tested on: Nexus 7 2012 (Stock 4.3)
RfA *should* work on all devices with bcmon support (Broadcom bcm4329/bcm4330 chipsets)
Simply try by installing bcmon. Don't worry, if something goes wrong a simple reboot should fix everything.

Tested & works on:
Nexus 7 2012 (Stock 4.3, Cyanogen 9)
Huawei Honour (Cyanogen Mod based ROM)

Does NOT work on:
Samsung Galaxy S3/4/5
HTC One
LG G2
Nexus 4/5
Nexus 7 (2013)

How to make a fully undetectable (FUD) virus or RAT



REQUIRMENTS:--
1.BACTRACK 5r3
2. Your VIRUS

Step 1.---
first of all scan your virus on virustotal.com

it got detected..
STEP 2:---
Start your backtrack and place your virus on Desktop.
and Start TERMINAL in BACKTRACK and give permissions to your server using this command.

where server.exe is your virus name
STEP 3:--
start first your encoder in terminal typing this command.

after completion this your server is saved in another file name as SEVER2.exe
STEP 4:--
now again give permissions to new file
type this command

Step 5:--
Again start encoder type this command

STEP 6:--
again give permission to your virus

STEP 7:--
Start new ENCODER typing this command

STEP 8:--
Again give permission to your file

STEP 9:--
Again Start NEW encoder typing this command

STEP 10:--
now FINAL give permission to your file typing this command


HERE YOUR FINAL FUD IS CREATED FOR CHECKING
again go on VIRUSTOTAL.COM and scan your virus





WOW ITs UNDETECTABLE AND YOU ARE READY

How to make money while hacking - BITCOIN MINING/LOGGING/PPD



I suggest all of you to use :

- An encrypted VPN that keeps no logs:

I can tell you that there are MANY ways to earn money!
But I’ll tell you about how to earn money with RAT’s.

What is a RAT ?

A RAT is also a shortcut called Remote Administrator Tool. With this you can remote computers.

What is the best RAT ?
I suggest all of you Darkcomet to start with, after you’ve earned some money you should buy and use Blackshades.

Where can I get a RAT ?

Unfortunately i will not link RAT software here, it is up to you to skim the internet for RAT software.

If you’re using a RAT, you should crypt it FUD with a crypter!
The best crypters are the ones with no dependencies, long FUD time and one that has not many customers ( most of the time these crypters are expensive, but you’ll earn it in no time back if you make use of your installs!)

Now you’re safe and your RAT is setted up so now we can go to the moneymaking part!
I think everyone now has this question in his mind:

How can I earn money with my RAT ?
Well I’ll talk about these 3 ways:

1. Keylogger / Stealer
2. Bitcoin Mining
3. PPD Survey builder


1. Keylogger / Stealer



Darkcomet and Blackshades have the features for storing saved passwords and keyloggers, so USE THEM!

You can get many things with these features that are worth money!
Just look after what people like and what people really want!

By example : If you’re going looking for Runescape related stuff, you should upload a video to youtube related to Runescape. Use your brains on how to get to go for the RICH people on Runescape.
But I’ll give all of you a golden method!

What I did in the past was, I uploaded a video that goes about a Merchanting clan, if they wanted to join my clan they had to PM me on youtube why they want to join it. I answer their PM with my “Merchanting website” , they registered there and then they joined the clanchat that works on Java.
Ofcourse I putted my JavaDriveBy in the chat. So without them knowing they came in my trap. This really made me hundreds of dollars in no time!



2. Bitcoin Mining


What is Bitcoin?

Bitcoin is an experimental new digital currency that enables instant payments to anyone, anywhere in the world.

What is bitcoin mining ?

A bitcoin miner is an application that will make a bin that will mine bitcoins for you. To make a decent amount of money with this, you should spread your bitcoin miner to as many as possible computers as you can.

How to spread my bitcoin miner ?

A bitcoin miner is almost useless if it runs on a shitty computer. If you want to earn a decent amount of money with it you should spread your bitcoin miner to strong computers with a great CPU. But think for a second, wich computers should have that ? HARD CORE GAMERS OFCOURSE!
They are the easiest targets for this! Also people who love to make videos with Sony Vegas Pro, or people that love to use photoshop etc, just think of programs/games requires a good decent computer to let it work. So upload a youtube video related to a game, for example “Far Cry 3 – Multiplayer hack”. Put your DARKCOMET/BLACKSHADES server in the description and let the installs come! When you get your big amount of installs, you upload your bitcoin miner to a website that will host your bitcoin miner. After you’ve done that, you take your direct link of your bitcoin miner and you let it execute it by all your installs that you have.

How to use and get a bitcoin miner?

First you need to make a pool.
1. Register here : www.triplemining.com
Configure your miner to match the settings you set on your account. When you join, you create a worker which you then configure your miner's settings to meet your worker's settings. Then, you send your miner out to your bots and when they start mining, you'll get credited on TripleMining.

2. Download the bitcoin client the official website : http://www.bitcoin.org
After you downloaded and installed the client, you click on “Receive coins” and then you click on “Copy to clipboard”.
3. Now you log in to your triplemining account and you have to add workers.
Go to : https://www.triplemining.com/workers
4. Now you need a miner, go to the Premium sellers section, there are many members that sell bitcoin miners. If you found a seller, he will ask your bitcoin miners info, give him what he asks for.

When you receive your bitcoin miner, you upload it and execute it on all your installs that you have on your RAT! So upload a youtube video related to a game, for example “Far Cry 3 – Multiplayer cheat”. Put your DC/BS server link in the description and let the installs come! When you get your big amount of installs, you upload your bitcoin miner to a website that will host it. After you’ve done that, you take your direct link of your bitcoin miner and you let it execute it on all your installs.
Now keep spreading your server and do the same over and over for your money! How more you spread, how more you’ll get ;)


3. PPD Survey builder



When you have installs on your RAT, you can send them a virus that will lock his computer and they can’t do anything unless they will complete your survey. This can give you a decent amount of money if you have a good spreading method!

How to hide exe file in picture jpeg/jpg file

This tutorial will show you how to create JPG files that will act like EXE files.


The way Windows executes EXE files is stored inside the registry.
so is the way it executes JPG files.

This means that we need to make windows think a JPG file is an EXE file. But we cant do that without potentially damaging the OS's configuration or risk that any future changes made by programs will set JPG back to its default registry value.


What we need to do is create a file that will look like its a JPG (not be the icon, but by the type) and will act like an EXE. (Pretty simple huh?)

This will be our file:

"file.jpg "



notice the space after the ".jpg". This is no ordianry space, but a special char that for writing it, what you need to do is...:

Get the EXE you want to convert to "jpg":

rename it from "file.exe" to "file.jpg". Now press the rename again, and in the end of the .jpg, press the ALT key (dont let go of it) and on the keypad, type "0160". <---------IMPORTANT!!

this will look like this: "file.jpg ". you can now rename it to something like "my pic.jpg " to make it convincing


Go to:

Start -> Run -> RegEdit

Right click on the HKEY_CLASSES_ROOT key and New -> Key

Call it ".jpg " (the space represants the ALT+0160)

Inside it, you will find the (Default) string.

Double click on it and write "exefile".

Then right click anywhere but on the Default string and New -> String Value

Call it "Content Type". and edit it so it will say "application/x-msdownload".

Right click on the ".jpg " key and New -> Key

Call it "PeistentHandler".

Inside it, edit the Default string to "{098f2470-bae0-11cd-b579-08002b30bfeb}"

Now every EXE file that will have the ".jpg " type, will be executed like a regular EXE! But only on your computer.

Right click on the ".jpg " key and Export.

Call it something like "fix.reg" and tell the guy/gal you're sending the "picture" to that its a fix so that windows will be able to open your pic.

I recommand using an EXE joiner to join a real pic to an EXE file so the user wont suspect anything.

How To Create Unlimited Facebook Accounts *Without Any Phone Number*

Follow The Steps From 1 to 5 (Step By Step)
------
1- Download in GoogleChrome :
MASKME

2- Download in FireFox :
User Agent Switcher

3-Go to FireFox Browser > Tools > Default User Agent > Choose Iphone 3.0

4-Go To Google Chrome go to mask me extension and here's how you work on it:
https://www.abine.com/maskme/faq/

5- you navigate in firefox to Facebook.com you will see facebook Touch (mobile version
the link should be just like this : m.facebook.com

you will register with the masked emails and all the emails you did are forwarded to your email you made

in mask me.

It means : all the emails are connected into the masked mail inbox!
So every account needs a confirm so you will confirm all the accounts with same inbox <3

Have Fun!
PS: I know it's so useful

How to use nmap to scan for DDOS reflectors



Before we get into this here is the standard disclaimer. Do not scan any devices that you do not have explicit permission to scan. If you do not own the devices I strongly recommend you get that permission in writing. Also, port scanning may cause instability or failure of some devices and/or applications. Just ask anyone who lost ILOs to heartbleed. So be careful!

As we have seen in past diaries about reflective DDOS attacks they are certainly the flavor of the day. US-CERT claims there are several UDP based protocols that are potential attack vectors. In my experience the most prevalent ones are DNS, NTP, SNMP, and CharGEN. Assuming you have permission; Is there an easy way to do good data gathering for these ports on your network? Yes, as a matter of a fact it can be done in one simple nmap command.


nmap –sU –A –PN –n –pU:19,53,123,161 –script=ntp-monlist,dns-recursion,snmp-sysdescr <target>


Let’s break this down:

-sU –perform a UDP scan. Since all the services above are UDP I only need to scan for the UDP ports.

-A -perform operating system and application version detection. This will attempt to give you more information about what applications are running on the open ports. The -A option also includes operating system detection, but it is unlikely that operating system detection will work when scanning this few ports.

-PN –scan even if you can’t contact the IP. By default nmap will not scan any device it can’t contact. Unfortunately if a device is hidden behind a firewall nmap will not usually be able to detect the device and will omit it from the detailed scan. A downside of using –PN is that nmap will complete the detailed scan against the IP even if it doesn’t exist or no ports are open. If you are scanning a large number of IPs the scan will take a long time.

-n –don’t do a DNS resolution. By default nmap performs a DNS resolution. Not doing that resolution will speed up the scan somewhat.

-pU:19,53,123,161 –scan UDP ports specified. In nmap ‘–p’ is used to indicate which ports to scan. The ‘U’ tells nmap that the ports that follow are UDP ports. Since this scan is only scanning UDP ports (–sU) the ‘U’ is redundant. However over the years I have gotten into the habit of explicitly specifying which type of ports I want to scan unless I want to add some TCP ports (-pT:) to the scan at a later time.

The ports specified in this scan are:

19 – CharGEN
53 – DNS
123 – NTP
161 - SNMP

–script=ntp-monlist,dns-recursion,snmp-sysdescr – the –script= option enables the nmap scripting engine (NSE) and runs scripts when they make sense to run. In other words, the ntp-monlist script will only be run when the NTP port is found to be open. nmap has many scripts available which can be used to extend nmaps basic functionality.

The scripts specified on this scan are:

ntp-monlist – while any open NTP service can be used in a reflective DDOS attack the maximum amplification is achieved with NTP services that permit the monlist command to be executed. This script will do a check to see if monlist can be executed against an open NTP port.
Normally an open NTP service will look similar to:

123/udp open ntp NTP v4

If the monlist command is enabled on the ntp server, the ntp-monlist script will give you more information:

123/udp open ntp NTP v4

| ntp-monlist:

| Target is synchronised with 206.108.0.131

| Alternative Target Interfaces:

| XXX.16.1.71

| Public Servers (4)

| XXX.87.64.125 XXX.75.12.11 XXX.108.0.131

| Other Associations (596)

…etc…

dns-recursion – Normally public DNS servers will only answer DNS queries for which they are authoritative. A DNS server that permits and processes queries for names it is not authoritative are called recursive DNS servers and recursive DNS servers in most cases are misconfigured. The output for an open DNS port with recursion enabled will be similar to :

53/udp open domain Microsoft DNS 6.1.7600 (1DB04228)

| dns-nsid:

|_ bind.version: Microsoft DNS 6.1.7600 (1DB04228)

|_dns-recursion: Recursion appears to be enabled

snmp-sysdescr – attempts to extract more information from the SNMP service. An open SNMP service will look similar to:

161/udp open snmp SNMPv1 server (public)

With the snmp-sysdescr script it will usually display more information which may tell you more about the device you are scanning:

161/udp open|filtered snmp

|_snmp-hh3c-logins: TIMEOUT

|_snmp-win32-shares: TIMEOUT

Or

161/udp open snmp SNMPv1 server (public)

| snmp-sysdescr: Apple AirPort - Apple Inc., 2006-2012. All rights Reserved.

|_ System uptime: 9 days, 20:15:36.56 (85053656 timeticks)

Want to take a guess at what these devices are?

As you can see nmap provides a simple and effective way of scanning for the common ports used in reflective DDOS attacks. This diary has barely scratched the surface of nmap’s capabilities.