Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Friday, 30 May 2014

The Rats Crew-AIO.


What is Rats Crew AIO?

The Rats Crew-AIO is a software which helps you to increase the size of any file,change the icon of any file and also spoof the extension of any file format.
This software is a multipurpose tool which help the hacker's in many aspects to hide their malicious coded file by changing their extension or changing the icon or increasing the size of file..

Features of The Rats Crew-AIO:

  1. File Pumper(Increase the size of any file).
  2. Extension Changer(Change the extension of any file).
  3. Icon Changer(Change the icon of any file).

FOR MORE INFORMATION,JOIN OUR NERD PROGRAMMER FACEBOOK GROUP.

    PLEASE DON'T FORGET TO SHARE THIS INFORMATION AND APPLICATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


    Protected by Copyscape DMCA Takedown Notice Checker

Wednesday, 7 May 2014

Make Your Own KeyLogger.

AIRBORNE TEXT

What is KeyLogger?

A KeyLogger is a computer device or a program that records the real time activity of a computer user including the keyboard keys they press.You can not detect the presence of KeyLogger on your computer since it runs in background(Stealth mode) and also it is not listed in task manager or control panel or privacy purpose. It can be used by parents to keep eye on their children, company owners to spy on their employees or by hackers to steal account and information from the victim's computer.
Make your own undetectable KeyLogger within 10 minutes.Yes,all you need is visual studio and the source code of the KeyLogger which you can download from the link given below.

Steps for making your own KeyLogger :

  1. Download and install visual studio from here.
  2. Download the source code from here or from the download button given below.
  3. Watch the video tutorial given below about how to make your own KeyLogger within 10 minutes.


Click To Download KeyLogger By Nerd Programmer.

Alternate Downloading Link To KeyLogger.

Click To Download Source Code Of KeyLogger By Nerd Programmer.

Alternate Downloading Link To Source Code.

NOTE:The KeyLogger made by me and which is available for download is just a simple basic KeyLogger which will record all the keystrokes and store it in text file and you can find that text file at this path "C:\record.txt".
For security purpose,the KeyLogger.rar file is password protected.To get password contact us through contact form or email us at nerdprogrammergm@gmail.com



IF YOU STILL FACE ANY PROBLEM RELATED TO ABOVE INFORMATION,FEEL FREE TO CONTACT US AND WE WILL HELP YOU OUT AS SOON AS POSSIBLE :) .


FOR MORE INFORMATION,JOIN OUR NERD PROGRAMMER FACEBOOK GROUP.

PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

Protected by Copyscape DMCA Takedown Notice Checker

Saturday, 26 April 2014

Execute Any Bat/Cmd File Invisibly/Silently.


Sometimes we need to execute our special scripts silently on our victim system so that no one come to know about it even if they are standing infront of us and keep their eyes on what we are doing with their system.In such case,we always think about making or getting a software which can do our job silently without popping out the window and run our scripts silently/stealthily in background so that no one comes to know about it and also our job gets done.
Hacker's also sometimes need to hide the execution of their scripts in background because they don't want the victim to be suspicious on them.So for that i am sharing a script which will get your job done easily and execute your BAT/CMD files without popping out any window.

For tutorial purpose,i am using the folder prank(Folderprank.bat) trick in this.To know more about folder prank trick,click here.
My Folderprank.bat file is ready.All i now need to do is run the below script which will run my Folderprank.bat silently/stealthily without popping out any windows and no one will ever know about its execution until someone check their task manager all processes.
I will utilize Windows Script Host RUN method to invisibly execute BAT file in the background.

The script for running the BAT file silently is

Set WshShell = CreateObject("WScript.Shell")
WshShell.Run chr(34) & "C:\Folder Prank\Folderprank.bat" & Chr(34), 0
Set WshShell = Nothing 

Copy paste the above script in notepad and save it as "Any_Name.vbs" i.e. what ever name you want but with .vbs extension.I have saved the script with name "Silent Runner".If you don't save it with .vbs extension then the script will not run.So carefully make sure you save the above script with .vbs extension.
Also in above command you will find  "C:\Folder Prank\Folderprank.bat"   where "C:\Folder Prank\Folderprank.bat"  is the location of the Folderprank.bat on my computer.All you need to do is change this location with the location of your BAT/CMD file.
Once you change the location with the location of the BAT file,just save the script with  "Any_Name.vbs".
Now you are ready,just make sure you save both the vbs script and BAT file in same folder.Also make the BAT file hidden so no one know about it.
Open the "Any_Name.vbs" file and it will run the BAT/CMD files silently in background.To check whether it works or not,directly check the result of your BAT/CMD file or go in task manager>show all process>cmd.exe which means that your script is being running in background silently.



VIDEO TUTORIAL:



If you still face any problem related to above information,feel free to contact us and we will help you out as soon as possible :) .


FOR MORE INFORMATION,JOIN OUR NERD PROGRAMMER FACEBOOK GROUP.

PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

Protected by Copyscape DMCA Takedown Notice Checker

Thursday, 24 April 2014

KON-BOOT.

Kon-Boot is a only application which will silently bypass all the Admin/User login authentications of Windows based operating system without changing the default password.This is the only tool which will help you to login in any windows based operating system of which you are not knowing the password.It is easy to use and very fast application.
Kon-Boot is mainly created for Ubuntu,but now it supports more Linux distributions.
Kon-Boot can also crack an array of Windows and Linux operating system ranging from Windows XP to Windows 8.1,which makes it one of the first tools to break Windows 7 passwords.On the Linux from it supports Gentoo,Ubuntu,Debian and Fedora flavors.
By using this application you can bypass login authentication of the above mentioned operation system.

Download the Kon-Boot from the download button given below.

Steps for using Kon-Boot:

  1. Download the Kon-Boot from download button given below.
  2. Open the Kon-Boot folder,you will find a .exe file with name "KonBootInstaller",open it.
  3. If you get a warning about detaching all usb devices,etc,just ignore it and click on "ok",a new window will open with three installation methods first one will be install to CD(no EFI support),second one will be Install to CD(v2.1,no EFI support) and third install to USB disk(with EFI support).I have used the third option as pendrives are much faster then CD's.
  4. Once installation completes,just remove your device safely.Sometimes the installer stops not responding,just chill and wait for few minutes,when installation gets over,you will see a message about installation has been completed.If installer is not responding and have take more than 5 minutes,then you need to end the process and restart it as the application might get crashed.
  5. Your kit is now ready after the installation has completes,so next step is to insert your respective device(CD/Pendrive) in which you have installed the Kon-Boot.
  6. Start the Computer/System.
  7. Boot from the device in which you have installed the Kon-Boot.
  8. Hit enter to continue at the splash screen.
  9. When you are asked for password to login,hit enter.Thats all,no files are written to the disk by this utility.None are modified either.If you are getting error message then type anything in password field and you will be logged in.
  10. After your work is finished,reboot without the CD/Pendrive in which you installed Kon-Boot and you are back to the original password of Computer/System.
If you want to change the password of the system permanently,for windows,after login in the account,open cmd as administrator and type the following command "net user".This command will list the user account of the computer.Then type "net user Your_Admin_LoggenIn_User_Name password" where password will be the password which you want to keep and Your_Admin_LoggenIn_User_Name is the name of the user account you logged in.The password will be permanently changed by executing this command.


Note:The file is password protected for security reasons.If you are really interested in using this application,please contact us through contact form or by emailing us for getting password.We will give you the password of the file within 24 hours.


FOR MORE INFORMATION,JOIN OUR NERD PROGRAMMER FACEBOOK GROUP.

PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

Protected by Copyscape DMCA Takedown Notice Checker

Monday, 14 April 2014

Website Hacking Using The OpenCart Vulnerability.

OpenCart vulnerability


Hey guys,today after many day i am going to share some information on website hacking.I have performed this hack as a test locally on my website and it was 100% successful.All you need to do is to perform the below steps properly and inject your shells in the website which will do work for yours.

Steps for hacking website using OpenCart Vulnerability:

  1. Open Google and search this dork "Index of /fckeditor/editor/filemanager/connectors/" in google search,a new page will load showing the result which will contain list many website.Select anyone website you want.
  2. Open the select website which you want to hack.You will find a folder name "connector".Open that folder(if connector folder is not there,don't panic,stay calm and open the "test.html" file).Once you have open the connector folder,you will find a file with name "test.html",open that file.
  3. At top left corner you will find "connector,current folder and resource type".Change the "connector" from "ASP.net" to "PHP" and select the directory where you want to upload your shell,default directory is "root",you can change it from the field Current Folder by replacing "/" with the directory you want.Then select the resource file which by default is "files".You can change it to what ever you want(image,flash,media,invalid type,files).
  4. Now all you need to do is select the file you want to upload,for that click on choose file,browse to the file you want to upload,select it and click ok,then click on upload,Your file will be uploaded to the directory of the website.
  5. If it does not allow you to upload the "PHP" file,try uploading it your deface in html.Still same happens,then try uploading it as a image or a special kind of extension with some special shells.

NOTE:

If none of your scripts or shells work,then it means that either your shells or scripts are not powerful or the target is not vulnerable at all.But in most of cases the targets are always vulnerable but the shells and scripts are not that powerful.So make strong and powerful scripts and then try.Always use proxy(proxy chains) or vpn before doing such type of work for your safety :).

For more information,join our Nerd Programmer Facebook Group.

PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

Protected by Copyscape DMCA Takedown Notice Checker

Sunday, 30 March 2014

CRIOGENIC CRYPTER

WHAT IS CRYPTER?

Crypter is a software which is used by hacker's to hide  viruses, keyloggers or tools in any kind of file so that they do not easily get detected by antiviruses.By using crypter,any programmer can encrypt the source code of their virus,worm or any type of program to bypass antivirus detection.

Features of CRIOGENIC CRYPTER v0.3:

  1. Obfuscation.
  2. Real API's selection.
  3. Crypt files.
  4. Normal(8) encryption mode.
  5. High(11) encryption mode.
  6. Extreme(15) encryption mode.
  7. Max(20) encryption mode.
Click To Download CRIOGENIC CRYPTER.

    PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


Saturday, 15 March 2014

Heaven Crypter.

What is Crypter?

Crypter is a software which is used by hacker's to hide  viruses, keyloggers or tools in any kind of file so that they do not easily get detected by antiviruses.By using crypter,any programmer can encrypt the source code of their virus,worm or any type of program to bypass antivirus detection.


Features Of Heaven Crypter:

  1. Icon Changer (Real Icon or Steal Icon).
  2. Melt any Output.
  3. P2P Spreading.
  4. Record Used Setting  logs.
  5. Visit Website anytime.
  6. Execution Delay(execution timer).
  7. Preverse EOF Data.
  8. Add any script or source code to Start Up (HK_Current User, HK_Local Machine).
  9. Remove Paddings.
  10. Hide Files.
  11. Read Only Files.
  12. Install Location Changer.
  13. Multiple Compiler Options.
  14. Custom Process Blacklist.
  15. Antis.
  16. Block Sites.
  17. Assembly code Editor.
  18. In-built Script Compiler.
  19. Scan File.
  20. Hex Code Viewer.
  21. Produce Fake Message.
  22. File Binding.
Click To Download Heaven Crypter.

Alternate download link:
    PLEASE DON'T FORGET TO SHARE THIS INFORMATION AND APPLICATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


DW Admin and Login Finder.

What is Admin Login Finder?

Admin Login Finder is an application used for penetration script let you find the admin panel of the any website which you want.It finds the admin panels via Dictionary Attack method through an internal hosted list and shows the admin panel.Before using this i will suggest you to change your ip address and be stealth so that no one can track your location.
In this post,i am going to share a software "DW Admin and Login Finder v1.1" which will help you out to find the admin login panel of any website.


Features of DW Admin and Login Finder:

  1. Find Admin Login Panel.
  2. Fast Scan.
  3. Full Scan.
  4. Index Of.

Alternate download link..

    PLEASE DON'T FORGET TO SHARE THIS INFORMATION AND APPLICATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


Andreinick05's Virus Maker.

nerdprogrammer.in


What is Computer Virus?

A computer virus is a stealth program that is injected into your computer without your knowledge and runs against your wishes and frustrate you some time. Viruses can also replicate themselves. All computer viruses are man-made.A virus can replicates itself by being copied or initiating its copy to another program, computer boot sector or files,etc.Some viruses are also used to get useful information of users like credit card details,email-id passwords,etc.
Today i am going to share "Andreinick05's Batch Virus Maker"  which will help you to make some viruses easily.

 Andreinick05's Batch Virus Maker by nerdprogrammer.in

 Andreinick05's Batch Virus Maker by nerdprogrammer.in

 Andreinick05's Batch Virus Maker by nerdprogrammer.in

Features of Andreinick05's Batch Virus Maker:

  1. Disable Mouse.
  2. Disable Keyboard.
  3. Disable Internet.
  4. Swap Mouse Buttons.
  5. Infect RAR files.
  6. Infect BAT files.
  7. Infect "Is" CMD.
  8. Infect All Folders.
  9. Infect Auto Execution.
  10. Infect All Drives.
  11. Infect EXE Files.
  12. Run as Service.
  13. Delete All files (extension).
  14. Delete Hal.Dll.
  15. Delete My Documents.
  16. Open a Website.
  17. Format Selected Drives.
  18. Add to Start up.
  19. Virus Extension Changer.
  20. Custom Message Box.
  21. Shout Message Timer.
  22. Change Drive Name.
  23. Custom Command.
  24. Change User Password.
  25. Disable Windows Defender.
  26. Disable Windows Security Center.
  27. Disable Windows Firewall.
  28. Disable Windows Update.
  29. Disable Windows Back Up.
  30. Notepad Spam.
  31. Calculator Spam.
  32. Spam C Drive.
  33. AV Kill.
  34. Kill explorer.exe.
  35. Encrypted AV Kill.
  36. Netsend Spam.
  37. Message Box Spam.
  38. System Crash.

PLEASE DON'T FORGET TO SHARE THIS APPLICATION WITH YOUR FRIENDS.

NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


Sunday, 9 March 2014

Sonic Virus Creator.


What is Computer Virus?

A computer virus is a stealth program that is injected into your computer without your knowledge and runs against your wishes and frustrate you some time. Viruses can also replicate themselves. All computer viruses are man-made.A virus can replicates itself by being copied or initiating its copy to another program, computer boot sector or files,etc.Some viruses are also used to get useful information of users like credit card details,email-id passwords,etc.
In this post i am sharing "Sonic Bat-Batch File Virus Creator" with you all.This software will help you out to make some deadly computer viruses easily as you just need to to hit add the code of given viruses and when all viruses codes have been added by you,just hit the build and your virus will be ready to harm your victim's computer.

What is Sonic Bat-Batch File Virus Creator?

Sonic Bat-Batch File Virus Creator is a small tool which is made to generate the batch files codes for reboot,formatting,disabling regedit,etc on a single click.This tools combines all the batch file codes as per the user which can perform different task in a single batch file name as sonic.bat.

Features of Sonic Bat-Batch File Virus Creator.

  1. Change Log On Password.
  2. Change Time.
  3. Add Any Number Of New User.
  4. Disable Mouse.
  5. Disable Keyboard.
  6. Fork Bomb.
  7. Delete/Format System drive(C:).
  8. Drive Rename.
  9. Folder Flood(Desktop,Music,Picture,Root,Doc,System32,Windows,Programs)
  10. Swap Mouse Button.
  11. Print Alert Message
  12. Message Execution Timer.
  13. Shutdown With Option(Reboot,Log Off,Shutdown and Abort).
  14. Run On Startup. 
Click To Download Sonic Bat.

PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


Sunday, 2 March 2014

Yahoo Password Sender.

yahoo password stealer by nerd programmer

Yahoo Password Sender is a password stealer software.Password Stealers are malwares which are specially programmed and designed in such a way that it just transfer personal information like username,password,etc.
This Yahoo Password Sender transmits the username and password of the yahoo mail from the victims PC.
All you need to do is just put the require information in the software and click on build.It will build a exe file.Test the exe file and then just put this exe file in victim's computer.

Features of Yahoo Password Stealer:

  1. Steals yahoo password from victims computer.
  2. Includes Email login.
  3. Includes FTP login.
  4. Includes Icon(.ico) changer to change Icon.
  5. Includes server path change.
  6. Create Fake Error's.
  7. Include server extension changer.
  8.  Includes registry setting changer.

Join Our Facebook Group for Latest Updates
PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU SET THIS TRAP.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

Hack Username And Password Using Kali Linux.

Hack Email-id,Username and password or any user details by using Kali Linux.

Protected by Copyscape DMCA Takedown Notice Checker
Facebook hack by nerd programmer

Today,i am going to show you how you can get email-id,username and password or any user details you want by using KALI LINUX.

Steps for setting up your system.

  1. Download Kali Linux from here.
  2. Extract the contents of Kali Linux iso file which you  downloaded in step and copy it to pendrive or instead of pendrive burn the iso file in cd if you want to make a cd of it.
  3. After copying all contents to pendrive or burning the iso file in cd,reboot you system,press F8 on boot-time and select boot from pendrive if you have copied all the files in pendrive,else boot from cd-rom if you burn the iso file in cd.
  4. After selecting the boot from device,the kali installation window will open,install accordingly as per your requirement.
  5. NOTE:During installation,in mount point of selected installation drive,set mount point to "/".
  6. Remember the username and password while installation as this will be necessity for this hacking method.
  7. Once,installation is completed,system will reboot,login your account.
  8. Your system is ready for use.
Method which we are using to hack the username and password or any user details isSocial Engineering Toolkit method.


Now lets set it up.

  • Open terminal using ctrl+alt+t or click on the small black window image on the top left of your screen.
  • Once terminal is open,type the code carefully.
sudo root
 Then enter your root username and password.Don't close the terminal.

  • Next step is to open social engineering toolkit.For this type the below command in terminal.
se-toolkit

 You will see something in terminal of your system as shown below in the image.
  

ymail hack by nerd programmer
  • As shown above in image,you too will see the menu in your terminal.Press "1" and hit enter as we are going to do Social-Engineering Attacks.You will see something in terminal as shown below in the image.
facebook hack by nerd programmer
gmail hack by nerd programmer
  • Once again,you will get a menu as shown above in the image.We are going to select Website Attack Vectors,so press "2" and hit enter.You will see something as shown in the image below.
nerd programmer
  • In this method,we are going to get the credential of the victim,so press "3" and hit enter as it will select credential harvester attack method.This will open  new menu as shown below in the image.

facebook hack by nerd programmer
  • Since,we want the username and password which is credential of victim,so we need to trap the victim in a look a like page to original website page(like phishing page) and for that we need to clone a website.To do this,press "2" and hit enter which will open something like shown below.
    ymail
In above image,you might have noticed a red colour rectangle box made by me,in that box,you will find "tabnabbing:XXX.XX.XXX.X" where this "XXX.XX.XXX.X" is you computer IP address.To find IP address of your computer,open a new terminal and type the command given below.
su root
enter_your_root_password
 ifconfig
In above command,we first gain the root access,and then afterwards type "ifconfig"  and hit enter to get the IP address.
Copy paste this IP address at the end of "Tabnabbing:".I have used my IP address but for security reasons i can't reveal it,so i have posted here "XXX.XX.XXX.X".Please note that,if you don't put your computer IP address,they this method won't.After entering your IP address,hit enter.It will ask your to enter the url of website you want to clone as shown below.Here,i had entered "www.ymail.com" as i want to hack someone ymail account.The below image represents all the steps.
It will give a message that its working on cloning the site and will take a little bit time.
Once the process is completed,you will see something as shown in the image below.

  • The next step is the most important step,till now we have make your IP address go online and anyone who visit your IP address will see the page which will look like the website of whose url you entered to clone.In this step,you need to shortened your IP address by using services like ADF.LY, Binbox, Goo.gl,etc.Once you enter your ip address on these sites to shorten,they will provide you a link,all you need to do is just send this shortened link to your victim.
  • When the victim visit the url which you have sent them,the will see a same page of which                   url you had entered to clone the website.The victim will think that it is a original page and when the victim enters any of their information,you will see that information in the terminal.
  • In this example,i have used ymail.com.Therefore,the victim will see homepage of yahoo mail.This is only the login form,i have entered the login username as:"Kali used to hack email-id and password" and password as: "Hacking successfull".

NOTE:Victim can identify that the page is a trap as the address bar of browser will be having your IP address.For best results,send the shortened url to victim mobile and ask them to visit urgently,or you can say visit this link and login to get latest updates of their favourite contents,etc.

RESULT.

The username and password will be shown in terminal window and will be similar to the image shown below.

If you get stuck anywhere,feel free to contact us and get solution for  your problem related to this information.I will suggest you to use virtual box for using Kali Linux within your default operating system.Video tutorial will be given on demand.So if you need video tutorial related to this,just contact us from contact form below at right corner of this page.


Join Our Facebook Group for Latest Updates
PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU SET THIS TRAP.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


Protected by Copyscape DMCA Takedown Notice Checker

 

Subscribe to our Newsletter

Contact our Support

Email us: nerdprogrammergm@gmail.com

Our Team Memebers