Friday, 31 July 2015

How To Use Windows 7 without Activation (Ethical Hacking Tricks 2015)

Ethical hacking tricks
                                                             Ethical Hacking Tricks 2015

Let Start :-

 1. Go to Start > All Programs > Accessories > right click on Command Prompt and select run as administrator.

2. Type the below command and hit enter

slmgr -rearm
3. Now a pop will ask you to reboot you PC and then your trial period will extend to more 30 days. But the catch is that you can use this command upto 3 times which means you can extend your trial period to 120 days without activation.

4. Now by using another trick you can actually extend the trial period upto 240 days which means after applying all the tricks you can extend the trial period to 360 days as I promised
tongue emoticon

5.Go to Run > type regedit > there navigate to the following registry

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform
6. In the right pane navigate to SkipRearm and change its value to 1.

7. After doing the following changes you can use the slmgr -rearm command for another 8 times which results to extension of trial period upto 240 days.
120 days using slmgr -rearm command alone before editing registry
240 days using slmgr -rearm command alone after editing registry
I hope you like this post. In the future article I'll share a working version of 7 z loader. In the meanwhile if I'll be able to write my own code for the extension then I would love to share it here.

About Hacker Organization (Ethical Hacking Tricks 2015)

ethical hacking tricks
                                                                    Ethical Hacking Tricks 2015

Hacker-Craft is the name given to boats built by The Hacker Boat Co., the oldest builder of wooden motorboats in the world. It is an American company, founded in Detroit, Michigan in 1908 by John Ludwig Hacker (known as John L. Hacker or just "John L."). The company moved operations to New York State in the 1970s and continues to produce hand-built boats in Silver Bay, on the shores of Lake George, New York.

John L. Hacker (1877–1961) was a naval architect and American motorboat designer. His major design and engineering accomplishments include the invention of the "V"-hull design and the floating biplane for the Wright brothers. Hacker's success in the design and building of speed craft surpassed all others of the time.

John L. Hacker, the early years[edit]
Hacker-Craft's logo, hand-painted in gold leaf on the side of a mahogany runabout

Hacker was born in Detroit, Michigan on May 24, 1877. For four years, while working at his fathers business as a book-keeper, he attended night school and took a correspondence course in order to become an accredited marine designer. Once qualified (at the age of 22) he set about solving a number of problems that inhibited speed and performance in motor boats. Pleasure boats of the 1900 era were narrow, round bottomed launches that plowed through the water instead of planing over it as boats do nowadays. Hacker's first major task in boat design was to try to solve the problem of "squatting", which occurred with all the canoe-stern shaped powerboats of the 1900s. His theory was that if his boats were going to go fast, they would have to "plane" rather than plow through the water, but the tendency to plane was considered a highly dangerous mode that was to be avoided. Nonetheless, he built a test craft to prove his new theories—a 30-foot (9.1 m) runabout. The boat's propeller and rudder were mounted under the transom and a strut was used to position the propeller shaft. The boat also featured Hacker's revolutionary "V"-hull design, which produced stunning speed and efficiency at low horsepower.

In 1904, he designed Au Revoir, the fastest boat in the world at the time, and on August 12, 1908, building on this success, he founded the Hacker Boat Company in Detroit, upon purchasing and renaming an existing firm, Detroit Launch and Power Company. Coincidentally, this was the same day on which the first ever Model T Ford automobile was produced by his friend, Henry Ford.

His designs led to many advances that today's boat owners take for granted. Hacker's combination of design flair and engineering brilliance led him to create the shape and style that was to become the signature look of American speedboats. The list of his successes include: Pardon Me, the Minute Man, Thunderbird, El Lagarto, Bootlegger, Peerless, Dolphin, Kitty Hawk, Tempo VI, the Belle Isle Bear Cats, Lockpat II, and My Sweetie.
The birth of speed[edit]
John Hacker's 1911 Kitty Hawk, the fastest boat in the world between 1911 and 1915

In 1911, Hacker designed and installed two floats on the Wright Brothers' biplane so that it could take off and land on water. This was the first use of twin floats on an aircraft.

In the same year he designed Kitty Hawk, the first successful step hydroplane that exceeded the then-unthinkable speed of over 50 mph (80 km/h) and was then the fastest boat in the world. There followed a succession of Kitty Hawks, each building on the success of its predecessor and in the process breaking four sea-speed records.
In 1914, Hacker moved to Detroit and the Hacker Boat Company opened at 323 Crane Avenue. His runabout designs for Gregory's Belle Isle Boat & Engine Company were soon to bring success to the firm. The boats, called Belle Isle Bear Cats, proved popular with prominent owners like J.W. Packard and Henry Ford. The company was thriving and in 1921, Hacker decided it was time to open a satellite facility in Mount Clemens, Michigan. Two years later, he moved the entire boat building operation from Detroit to Mount Clemens.
Hacker Boat Company flourishes[edit]
The 1931 Lockpat II, capable of a then-incredible 60 mph

The boat works on the Clinton River in Mount Clemens continued to expand, and by 1928 they provided 35,000 sq ft (3,300 m) of floor space for the handcrafting of fine mahogany runabouts. That year the influential "Pageant of Progress" reported that the Hacker Boat Company employed sixty-eight men with demand growing rapidly. Sales for that year were $450,000 (about $5,000,000 2009 USD). His gleaming mahogany runabouts captured the public imagination with their elegant design and record-breaking speed and in the process quickly became the must-have play thing for the rich and famous.

In 1930, HRH the King of Siam ordered a custom-built 40-foot (12 m) Landau-top runabout powered with an 800 horsepower (600 kW) Packard engine. Business was booming. Only four authorized dealers offered Hacker boats to the public during this period. The company did most of its business through factory direct orders from the customer, and excelled in custom-built craft. A Hacker Craft in the 1920s and 1930s, especially the bigger models, could always be spotted by their long front decks, three-piece sectional windshield and shiny chrome.

The Great Depression had a devastating effect on the pleasure-boat market, but in 1935 Hacker took on a business partner, John Mcready, who quickly assumed day-to-day control of the company. Meanwhile, Hacker focused on designing boats in what was to become his golden period: he was responsible for a remarkable number of racing winners including El Lagarto (which won the Gold Cup in 1933, 1934 and 1935), Scotty, Scotty Too, My Sweetie, Miss Pepsi—all record breakers.

In all, Hacker was responsible for over twenty water speed records, five Gold Cup winners, four President's Race winners and numerous other speed trials and racing victories.

In Mount Clemens, Hacker Boat Company rebounded from the Depression with popular "utility" Hacker-Craft runabouts priced for the ordinary consumer. In 1935, the 17-foot (5.2 m) utility could be purchased for $975.00 ($13,000 2009 USD).

In 1939 Hacker was commissioned by property tycoon George Whitell to build what was to be one of his masterpieces and is now a national historic treasure, a 55 ft (17 m) commuter called Thunderbird. Considered to be one of the most beautiful wooden vessels of the 20th century, no sister ship has ever been built, despite requests to do so. Such is its status and history that Thunderbird was commemorated in 2007 by the U.S. Postal Service on a postage stamp.

Business was strong, and in 1952, Hacker Boat was awarded a government contract for the construction of 25 ocean-going picket boats for the U.S. Navy and 112 40-foot-plus (12 m) crash boats, 20 ft (6.1 m) sedan utility boats, and target boats. Hacker's designs included patrol boats, air-sea rescue boats, and cruisers.
Hacker Boat Company revitalized[edit]

In 1959 William Morgan of Morgan Marine, a boat-builder from Silver Bay, on Lake George, New York, acquired a controlling interest in Hacker-Craft with the aim of revitalizing the company's historic legacy. Having completed 60 Hackers already on the order books, they decided to increase production considerably.

Morgan Marine made significant structural and engineering modifications. The use of new technologies, unavailable to Hacker, allowed for improvements of the boats in a few subtle but important ways. First, engines were bigger. Where Hacker had used 110 hp (82 kW) engines, Morgan Marine was able to power these hulls with 350 hp (260 kW) or 454 hp (339 kW) Crusader engines that could eclipse 50 miles per hour. To accommodate these improved engines, Morgan Marine had to make the supports stronger than those used in the original designs. Morgan's biggest accomplishment, however, was improving the handling of the Hacker Crafts. If the old Hackers were run at top speeds, the bow could come out of the water and block the driver's view. By reworking the bottom design, Morgan ensured that the nose would remain level in the water.

At this time many of the original jigs had been lost, so, where necessary, they made new sand castings for the chrome and hardware, but the craftsmanship was unaltered, albeit with significant improvements. In all, Morgan made several significant concessions to improved technology—dual exhausts, rather than the original single exhausts, for enhanced engine performance; the use of stainless steel fittings and hardware throughout so that pitting was no longer a problem; state-of-the-art epoxy encapsulation and bonding techniques; triple planked bottoms completely encased in epoxy; double planked sides and deck saturated in epoxy; 25% more frames; double the number of floor timbers; up to 18 coats of varnish; the use of renewable-resourced Honduras mahogany; new improved steering for more maneuverability; and laminated windshields with either blue or green tints.

Use ERD Commander to Hack/ Reset Windows Password (Ethical Hacking Tricks 2015)

Ethical hacking tricks
                                                                   Ethical Hacking Tricks 2015

Sometimes It happen that just to secure the PC we put a very long and complex password which we forget at the time of Login. Recently one of my friend was also faced the similar trouble then I got my hands on a very cool tool which helps in resetting the windows password in no time. You can use it for hacking someone's PC too because its powerful yet very simple to use and requires no victim's interaction, all you need is just some free time with the targets machine.

ERD commander is mainly used by the cyber experts in troubleshooting the windows based issues. Resetting the windows is just like a branch of large tree. It mainly comes and used in a bootable disk, you can easily find its ISO image on internet or via torrent. This tool mainly includes:

Registry editor: Edits Windows Registry

Locksmith: Resets a user account's password

Crash Analyzer: Analyzes crash dumps

File Restore: Restores deleted files

Disk Commander: Repairs volumes, master boot records and partitions

Disk Wipe: Irrecoverably erases data from hard disk

Computer Management: A group of utilities that help retrieve system information, enable, disable or manage device drivers, Windows services and software that run during computer startup, inspect the event logs of the offline system and manage partitions.

Explorer: A file manager

Solution Wizard: A guidance tool that helps user choose the proper repair tool
TCP/IP Config: Displays and modifies TCP/IP configuration
Hotfix Uninstall: Uninstalls windows hotfixes

System File Repair: Revives corrupted or deleted system files by copying them from the Windows installation source

Search: Searches a disk for files

Standalone System Sweeper: An antivirus that scans a system for malware, rootkits, and potentially unwanted software. Uses the same engine as Microsoft Security Essentials and other Microsoft antivirus products. An independent version of this product which is currently in beta stage is available to general public free of charge.

ERD Commander originally included more tools, including a web browser.
Grab a copy of ERD commander via internet or torrent from your trusted link, I'll provide my link soon. Lets take a look at quick guide to reset windows password.

Insert the ERD commander disk and boot your PC, make sure that boot from CD is marked as first priority in Boot device menu.
In the pop up box select the System root, in my case its C:\WINDOWS
Now click on Start button > System Tools > Locksmith
It'll begin the Locksmith wizard. Click next on the first window

Now select the account type, and put any easy password like 123. Remember its not your final password, it'll help you only to logged into the account next time when you reboot the PC.

Click Finish and you're done.

Now eject the disk and reboot your PC.

Login to your account with the new password which you just reset. There It'll ask to reset password, here you can enter whatever password you want as your final password.
Note: ERD commander will work fine on windows XP, Vista, but not work well on all the versions of Windows 7. So if you're planning hack or reset the windows 7 password then it'll may not work however its worth giving a try.

How To Convert Private IP To Public IP (Ethical Hacking Tricks 2015)

Ethical Hacking Tricks
                                                                  Ethical Hacking Tricks 2015

Network address translation (NAT) enables you to access the Internet safely without having to change your private network IP addresses.
IP addresses are depleting rapidly due to widespread Internet growth. Organizations use private networks, which allows them to select any IP addresses they want. However, if two companies have duplicate IP addresses and they attempt to communicate with each other, they will have problems. In order to communicate on the Internet, you must have a unique, registered address. Just as the name implies, NAT is a mechanism that translates one Internet Protocol (IP) address into another.

Packet rules contains three methods of NAT. You commonly use NAT to map addresses (static NAT) or hide addresses (masquerade NAT). By hiding or mapping addresses, NAT solves various addressing problems.

Example: Hiding internal IP addresses from public knowledge

You are configuring a System i® platform as a public Web server. However, you do not want external networks to know your system's real internal IP addresses. You can create NAT rules that translate your private addresses to public addresses that can access the Internet. In this instance, the true address of the system remains hidden, making the system less vulnerable to attack.

Example: Converting an IP address for an internal host into a different IP address

You want private IP addresses on your internal network to communicate with Internet hosts. To arrange this, you can convert an IP address for an internal host into a different IP address. You must use public IP addresses to communicate with Internet hosts. Therefore, you use NAT to convert your private IP addresses to public addresses. This ensures that IP traffic from your internal host is routed through the Internet.
Example: Making the IP addresses of two different networks compatible
You want to allow a host system in another network, such as a vendor company, to communicate with a specific host in your internal network. However, both networks use private addresses (10.x.x.x), which creates a possible address conflict for routing the traffic between the two hosts. To avoid conflict, you can use NAT to convert the address of your internal host to a different IP address.

Static (map) NAT

Static (map) network address translation (NAT) provides a one-to-one mapping of private IP addresses to public IP addresses. It allows you to map an IP address on your internal network to an IP address that you want to make public.

Masquerade (hide) NAT

Masquerade (hide) network address translation (NAT) enables you the actual address of a personal computer private. NAT routes traffic from your personal computer to your system, which essentially makes the system the gateway for your personal computer.

Masquerade (port-mapped) NAT

Port-mapped network address translation (NAT) is a variation of masquerade NAT.
Parent topic: Packet rules concepts
Related reference
Creating IP filter rules

100 Useful Cmd Commands (Ethical Hacking Tricks 2015)

Ethical hacking tricks
                                                             Ethical Hacking Tricks 2015

Add Hardware Wizard - hdwwiz.cpl
Add/Remove Programs - appwiz.cpl
Administrative Tools - control admintools
Bluetooth Transfer Wizard - fsquirt
Calculator - calc
Certificate Manager - certmgr.msc
Character Map - charmap
Check Disk Utility - chkdsk
Clipboard Viewer - clipbrd
Command Prompt - cmd
Component Services - dcomcnfg
Computer Management - compmgmt.msc
Control Panel - control
Date and Time Properties - timedate.cpl
DDE Shares - ddeshare
Device Manager - devmgmt.msc
Direct X Troubleshooter - dxdiag
Disk Cleanup Utility - cleanmgr
Disk Defragment - dfrg.msc
Disk Management - diskmgmt.msc
Disk Partition Manager - diskpart
Display Properties - control desktop
Display Properties - desk.cpl
Dr. Watson System Troubleshooting Utility - drwtsn32
Driver Verifier Utility - verifier
Event Viewer - eventvwr.msc
Files and Settings Transfer Tool - migwiz
File Signature Verification Tool - sigverif
Findfast - findfast.cpl
Firefox - firefox
Folders Properties - control folders
Fonts - control fonts
Fonts Folder - fonts
Free Cell Card Game - freecell
Game Controllers - joy.cpl
Group Policy Editor (for xp professional) - gpedit.msc
Hearts Card Game - mshearts
Help and Support - helpctr
HyperTerminal - hypertrm
Iexpress Wizard - iexpress
Indexing Service - ciadv.msc
Internet Connection Wizard - icwconn1
Internet Explorer - iexplore
Internet Properties - inetcpl.cpl
Keyboard Properties - control keyboard
Local Security Settings - secpol.msc
Local Users and Groups - lusrmgr.msc
Logs You Out Of Windows - logoff
Malicious Software Removal Tool - mrt
Microsoft Chat - winchat
Microsoft Movie Maker - moviemk
Microsoft Paint - mspaint
Microsoft Syncronization Tool - mobsync
Minesweeper Game - winmine
Mouse Properties - control mouse
Mouse Properties - main.cpl
Netmeeting - conf
Network Connections - control netconnections
Network Connections - ncpa.cpl
Network Setup Wizard - netsetup.cpl
Notepad - notepad
Object Packager - packager
ODBC Data Source Administrator - odbccp32.cpl
On Screen Keyboard - osk
Outlook Express - msimn
Paint - pbrush
Password Properties - password.cpl
Performance Monitor - perfmon.msc
Performance Monitor - perfmon
Phone and Modem Options - telephon.cpl
Phone Dialer - dialer
Pinball Game - pinball
Power Configuration - powercfg.cpl
Printers and Faxes - control printers
Printers Folder - printers
Regional Settings - intl.cpl
Registry Editor - regedit
Registry Editor - regedit32
Remote Access Phonebook - rasphone
Remote Desktop - mstsc
Removable Storage - ntmsmgr.msc
Removable Storage Operator Requests - ntmsoprq.msc
Resultant Set of Policy (for xp professional) - rsop.msc
Scanners and Cameras - sticpl.cpl
Scheduled Tasks - control schedtasks
Security Center - wscui.cpl
Services - services.msc
Shared Folders - fsmgmt.msc
Shuts Down Windows - shutdown
Sounds and Audio - mmsys.cpl
Spider Solitare Card Game - spider
SQL Client Configuration - cliconfg
System Configuration Editor - sysedit
System Configuration Utility - msconfig
System Information - msinfo32
System Properties - sysdm.cpl
Task Manager - taskmgr
TCP Tester - tcptest
Telnet Client - telnet
User Account Management - nusrmgr.cpl
Utility Manager - utilman
Windows Address Book - wab
Windows Address Book Import Utility - wabmig
Windows Explorer - explorer

Keep Learning. Keep Rocking.

Wednesday, 29 July 2015


ethical hacking tricks
                                                                        Ethical Hacking  Tricks 2015

You might remember an experience where you tried to right-click on a web page but got a pop-up message saying that the “right-click functionality has been disabled”. Sometimes you may be trying to copy an image or view the source of a web page but when the right-click is disabled, these things would seem impossible. Bank websites and other sites that require a secure transaction such as a payment gateway are the ones to impose this kind of limited functionality on their pages. In this post, I will show you the ways by which you can easily bypass right-click block feature on any website.

In order to block the right-click activity, most websites make use of JavaScript which is one of the popular scripting languages used to enhance functionality, improve user experience and provide rich interactive features. In addition to this, it can also be used to strengthen the website’s security by adding some of the simple security features such as disabling right-click, protecting images, hiding or masking parts of a web page and so on.

How JavaScript Works?

Before you proceed to the next part which tells you how to disable the JavaScript functionality and bypass any of the restrictions imposed by it, it would be worthwhile for you to take up a minute to understand how JavaScript works.
JavaScript is a client side scripting language (in most cases), which means when loaded it runs from your own web browser. Most modern browsers including IE, Firefox, Chrome and others support JavaScript so that they can interpret the code and carry out actions that are defined in the script. In other words, it is your browser which is acting upon the instruction of JavaScript to carry out the defined actions such as blocking the right-click activity. So, disabling the JavaScript support on your browser can be a simple solution to bypass all the restrictions imposed by the website.

How to Disable the JavaScript?

Here is a step-by-step procedure to disable JavaScript on different browsers:

For Internet Explorer:

If you are using IE, just follow the steps below:
From the menu bar, go to Tools -> Internet Options.
In the “Internet Options” window, switch to Security tab and click on the button Custom level…
Bypass Right Click on Internet Explorer

3. From the Security Settings, look for the option Active scripting and select the Disable radio button as shown above and click on “OK”.
 4. You may even select the Prompt radio button, so that each time a page is loaded, you will have the option to either enable or disable the scripting.

For Google Chrome:

If you are using Chrome, you can disable the JavaScript by following the steps below:
Click on the Chrome “menu” button (on the top right corner) and select Tools.
From the “Settings” page, click on Show advanced settings…
Now under Privacy, click on the button Content settings
Under the JavaScript, select the radio button which says “Do not allow any site to run JavaScript” and click on “Done”.
Bypass Right Click on Chrome

For Mozilla Firefox:

Steps to disable JavaScript on Firefox:
From the menu bar, click on Tools -> Options.
From the Options window, switch to Content tab, uncheck the option which says “Enable JavaScript” and click on “OK”.
Bypass Right Click on Mozilla Firefox

How to Bypass the Right Click Block?

In order to bypass the right-click block or any other restriction imposed by JavaScript, all you need to do is just disable it in the browser and refresh the same page, so that it now reloads without JavaScript functionality. You are now free to right-click on the page, view its source or even copy any of the images that you may want to. Don’t forget to re-enable the JavaScript once again when your job is over. Otherwise lack of JavaScript support may result in unusual rendering of web pages.

Tuesday, 28 July 2015

Join Best Ethical Hacking Institute In Delhi

ethical hacking tricks 2015

ethical hacking tricks 2015


Ethical Hacking Tricks 2015
                                                                        Ethical Hacking Tricks 2015

Hello Friends, Today we will learn about how to disable app notifications in android phones. Android’s user base is increasing multiple folds day by day, so the app’s on the android play store. Most apps issue notifications to help users to know the status of app but sometimes users get annoyed by seeing lot of notifications on their phones. I think most of you are already aware with the fact that App Notifications drain your battery i.e. eats up your battery juice.

You might have noticed that when you connect your phone to internet, lot of notifications start appearing on your phone and that is really irritating. Find below a simple set of steps to turn off app notifications in just 4 steps.

Steps to disable App Notifications in Andorid Phones:

1. On any unwanted notification appearing in your notification bar, press on the notification for 2-3 seconds.

2 . This will show a message box showing APP INFO as option.

3. Click on App Info and uncheck the “show notifications”.

How to disable App Notifications in Android Phones

4. This will result into popup “Turn off Notifications”. Just click on ok and you will not get notifications from that Android App again.

That’s it Friends, this is how we can turn off or disable App Notifications in Android Phones.

If you want to enable notifications again just, go to manage apps and enable the notifications again.

WHAT IS SOCIAL ENGINEERING? (Ethical Hacking Tricks2015)

Ethical Hacking tricks 2015
                                                                      Ethical Hacking Tricks2015

Do you know what is social engineering, the first time I heard about social engineering I was like what the heck is this but when I dug deep into it, it was pretty simple. Many people would argue that social engineering is one of the most simple and effective means for gathering information about a target. Social engineering is the process of exploiting the “human” weakness that is inherent in every organization. When utilizing social engineering, the attacker’s goal is to get an employee to divulge some information that should be kept confidential.
Let us assume you are conducting a penetration test on an organization. During your early reconnaissance, you discover an e-mail address for one of the company’s sales people. You understand that sales people are highly likely to return product inquiry e-mails. As a result, you sent an e-mail from an anonymous address feigning interest in a particular product. In reality, you did not care about the product. The real purpose of sending the e-mail is to get a reply from the sales person so you can review the e-mail headers contained in the response. This process will allow you to gather additional information about the company’s internal e-mail servers.

Let us take our social engineering example one step further. Suppose our salesman’s name is mark twain which we found this information during our reconnaissance of the company website and in the signature of his e-mail response. Let us assume that in this example, when you sent the employee the product inquiry e-mail, you received an automatic reply with the notification that mark twain was “currently out of the office travelling overseas” and “would be gone for two weeks with only limited e-mail access.”

A classic example of social engineering would be to impersonate mark twain and call the target company’s tech support number asking for help resetting your password because you are overseas and cannot access your webmail. If you are lucky, the tech support people will believe your story and reset the password. Assuming they use the same password, you now have access to mark twain’s e-mail and other network resources like VPN for remote access, or FT P for uploading sales figures and customer orders.

Social engineering, like reconnaissance in general, takes both time and practice. Not everyone makes a good social engineer, not even myself I don’t consider to be a social engineer. In order to be successful, you must be supremely confident, knowledgeable of the situation, and flexible enough to go “off script.” If you are conducting social engineering over the phone, it can be extremely helpful to have detailed and well-written notes in case you are asked about some obscure detail.

Another example of social engineering is to leave USB thumb drives or CD s at the target organization. The thumb drives should be distributed to several locations in or near the organization. The parking lot, the lobby, the bathroom, and an employee’s desk are all great “drop” locations. It is human nature for most people to insert the thumb drive or CD into their PC just to see what is on the drive. In this example though, the thumb drive or CD is preloaded with a self-executing backdoor program that automatically launches when the drive is inserted into the computer. The backdoor is capable of bypassing the company firewall and will dial home to the attacker’s computer, leaving the target exposed and giving the attacker a clear channel into the as you can see from this passage that it’s a very mean process but you know that’s what hackers do we destroy stuff ,well the black hats from the wild west to be more specific those are the hackers that destroys stuff.

Friday, 24 July 2015

WHAT IS FOOTPRINTING ? (Etical hacking Tricks 2015)

                                                          Ethical Hacking Tricks 2015
So you want to know about Foot printing which is a very  basic tool for any hacker, you see Footprinting is the act of gathering information about a computer system and the companies it belongs to. Footprinting is the first step hackers take in their hacking process, even I did foot printing at first. Footprinting is important because to hack a system the hacker must first know everything there is to know about it.

Below I will give you examples of the steps and services a hacker would use to get information from a website, now buckle up and get ready to hack.

First, a hacker would start gathering information on the targets website i call this stealth mode. Things a hacker would basically look for are e-mails and names. This information could come in handy if the hacker was planning to attempt a social engineering attack against the company.

Next the hacker would get the IP address of the website. By going to and inserting the web site URL, it will spit out its IP address.
Next the hacker would Ping the server to see if it is up and running.
There’s no point in trying to hack an offline server right. pings a website from 34 different locations in the world. Insert the website name or IP address and hit “Ping”. If all packets went through, then the server is up and your ready to rock and roll.

Next the hacker would do a Whois lookup on the company website. Go to and put in the target website. As you can see this gives a HUGE amount of information about the company. You see the company e-mails, address, names, when the domain was created, when the domain expires, the domain name servers, and more!

A hacker can also take advantage of search engines to search sites for data. For example, a hacker could search a website through Google by searching “” this will display every page that Google has of the website.
 You could narrow down the number of results by adding a specific word after. For example the hacker could search “ email”. This search could list several emails that are published on the website. Another search you could do in Google is “inurl:robots.txt this would look for a page called robots.txt. If a site has the file “robots.txt”,
 it displays all the directories and pages on the website that they wish to keep anonymous from the search engine spiders
. Occasionally you might come across some valuable information that was meant to be kept private in this file. Now that’s it, use it and see what kind of results you get and remember hackers rule!!!!!.

SECRET HACK CODES FOR APPLE IPHONE 5, 5C, 5S, 6, 6 PLUS (Ethical Hacking Tricks 2015)

Ethical Hacking Tricks 2015
Hello Friends, today i am going to share several secret hack codes for Apple Iphone 5, 5C, 5S, 6 and 6 Plus. These iphone hack codes will help you to hack iphone mobiles and help you to explore more about your apple iPhone.

Secret Hack codes are those codes which are usually hidden from users for any misuse and exploit. As we all know Apple Iphone is very secured platform and thus very few hack codes of apple iphone are there on internet. Today i am sharing all the hack codes of apple iphone cellphones that i am aware of. And i surely hope you can’t find codes better than that. So friends let’s hack and explore our apple Iphone and tabs. I have tested these codes on my Apple Iphone 5S and friends iphone 6 plus. I am sure these will work on all previous apple iphones too.

Secret Hacking codes for Apple IPhone Mobile Phones:

1. Entering into Field Mode :  Field mode contains lots of iPhone inner settings, especially newest network and cell information.

*3001#12345#* and tap Call

2. IMEI Number : Shows your IMEI. No need to tap Call. IMEI is the unique identifier for your mobile phone hardware.


3. Call Forward Settings and Insights : Set interrogation for call forwards. Discover the settings for your call forwarding. You’ll see whether you have voice, data, fax, SMS, sync, async, packet access, and pad access call forwarding enabled or disabled.

*#21# and tap Call
4. Calling Line Presentation : This shows whether you have enabled or disabled the presentation of the calling line, presumably the number of the party placing the call.

*#30# and tap Call

5. Call Waiting Settings : Determine if call waiting is enabled. Shows call waiting status for voice, data, fax, SMS, sync data, async data, packet access and pad access. Each item is either enabled or disabled.

*#43# and tap Call
6. Check all Unanswered Calls : Check the number for unanswered calls. Show the number for voice call forwarding when a call is unanswered. Also show the options for data, fax, SMS, sync, async, packet access and pad access.

*#61# and tap Call

7. Check the number for call forwarding if no service is available. Just like the previous, except for no-service rather than no-answer situations.

*#62# and tap Call

8. Check the number for call forwarding when the iPhone is busy. And again, but for when the iPhone is busy.

*#67# and tap Call

9. Call Control Bars : Check all the usual suspects ( voice, data, fax,SMS, etc ) to see whether barring is enabled or disabled for outgoing.

*#33# and tap Call

10. Disable Call Forwarding : This code disable all call Forwarding.


11. Code to Hide your Number :


That’s all guys. Some of them might be operator specific i.e. works for prepaid phones only. But all codes deserves and try. Check these codes and let us know what all works for you. Hope you guys enjoyed new set of secret hack codes.