Posts

Showing posts from February, 2016

Keyboard Dancing Led Light Trick

Image
In this part i will show you to make interesting file using notepad which will make keyboard led to dance. basically we will be creating a visual basic script.  1. Open  Notepad  and copy below codes into it. Set wshShell =wscript.CreateObject("WScript.Shell") do wscript.sleep 100 wshshell.sendkeys "{CAPSLOCK}" wshshell.sendkeys "{NUMLOCK}" wshshell.sendkeys "{SCROLLLOCK}" loop     2. Then save this file as  dance.vbs  (name can be anything but .vbs is must)     3. Open your save file and see your keyboard led blinking like disco lights.

How to crack android phone pattern

Image
Today we will learn how to unlock android phone pattern... 1. Bypass Android Pattern Lock from ADB Tool You can bypass or disable your android pattern lock from usinh ADB (Android Debugging Bridge) Tool. You can download this tools from its official website. ADB tools work with your Window PC Linux, You can easily bypass android lockscreen from ADB Tools. Download ADB Tools with Drivers for Window 7, Window 8.1 and Window 10. Make Sure USB Debugging is enabled in your android phone. If your Mobile USB Debugging is not enabled in your android phone, you can;t use this method. Download and Install ADB Drivers in your Window PC. Connect Your Android Phone with your Window PC. Open Command Prompt , type adb devices and press enter. Now you see your Device Name with its model number. Type   one by one these commands in your Command Prompt Screen Bypass Android Pattern Lockscreen from ADB using CMD               adb shell  su    rm /data/system/gesture.key Now

Hack google cameras

Image
Hack Google To Do Cool Stuff 1st Hack :- Viewing Still Security Cameras Using Google :- >> Open Google And Type : inurl:"viewerframe?mode=motion" In The Search Bar And Search,Open Any Results Shown To See Other's Security Cameras !! 2nd Hack :- Viewing Motion Security Video Cameras Using Google :- >> Open Google And Type : intitle:"Live View / - AXIS" In The Search Bar And Search,Open Any Results Shown To See Other's Online Video Cameras !! 3rd Hack :- Unspidered Sites Using Google :- >> Open Google And Tye : "robots.txt" "disallow:" filetype:txt In The Search Bar And Search,Open Any Results Shown To See Hidden WebPages !! 4th Hack :- Frontpage User Info Using Google :- >> Open Google And Tye : inurl:_vti_pvt "service.pwd" In The Search Bar And Search,Open Any Results Shown To See Other's Frontpage User Info !! 5th Hack :- PHP Photo Album Hack Using Google :

Enable GOD MODE in windows

Image
Enable GODMODE in windows::::::: Hi, guys today i have some interesting. Today we do how to enable GODMODE in windows......   1. On your desktop  right click  and create a New Folder.   2.  Rename  this folder to the code given below. GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}   3. Done now double click on this folder and you will have access to all your windows operating system settings

Google search tips for hacking

Google search tips for hacking    Google search engine can be used to hack into remote servers or gather confidential or sensitive information which are not visible through common searches. Google is the world’s most popular and powerful search engine. It has the ability to accept pre-defined commands as inputs which then produces unbelievable results. Google’s Advanced Search Query Syntax Discussed below are various Google’s special commands and I shall be explaining each command in brief and will show how it can be used for getting confidential data. [ intitle: ] The “intitle:” syntax helps Google restrict the search results to pages containing that word in the title. intitle: login password will return links to those pages that has the word "login" in their title, and the word "password" anywhere in the page. Similarly, if one has to query for more than one word in the page title then in that case “allintitle:” can be used instead of “intitle

Shutdown a computer by cmd

Steps 1.  Press window key+R 2.   Type cmd and press Enter. Helpful? Do a Remote Shutdown for a PC on a LAN Step 3" 3.  Type in shutdown -m \\computername , replacing "computername" with the name of the computer you wish to shutdown or the computer's IP address.    4.     Experiment with the shutdown commands switches. -r will force a restart, disabling any services or user interaction from interrupting it. -c "comment" will force a comment to appear on the system being shutdown. -t xx will force a timeout for "xx" seconds. For example, -t 60 would perform a shutdown after a 60-second timeout. -a will abort the shutdown. A full command example: shutdown -m \\myserver -r -c "This system will shutdown in 60 seconds" -t 60

Google dorks

Posted by Piyush Manral intext:"enable secret 5 $" intext:"EZGuestbook" intext:"Web Wiz Journal" intitle:"index of" intext:connect.inc intitle:"index of" intext:globals.inc intitle:"Index of" passwords modified intitle:"Index of" sc_serv.conf sc_serv content intitle:"phpinfo()" +"mysql.default_password" +"Zend s?ri?ting Language Engine" intitle:dupics inurl:(add.asp | default.asp | view.asp | voting.asp) -site:duware.com intitle:index.of administrators.pwd intitle:Index.of etc shadow intitle:index.of intext:"secring.skr"|"secring.pgp"|"secring.bak" intitle:rapidshare intext:login inurl:"calendars?ri?t/users.txt" inurl:"editor/list.asp" | inurl:"database_editor.asp" | inurl:"login.asa" "are set" inurl:"GRC.DAT" intext:"password" inurl:"Sites.dat"+"PASS=&qu

Hacking Techniques in Wireless Networks

Image
Hacking Techniques in Wireless Networks 1.      Introduction 2.      Wireless LAN Overview 2.1          Stations and Access Points 2.2          Channels 2.3          WEP 2.4          Infrastructure and Ad Hoc Modes 2.5          Frames 2.6          Authentication 2.7          Association 3.      Wireless Network Sniffing 3.1          Passive Scanning 3.2          Detection of SSID 3.3          Collecting the MAC Addresses 3.4          Collecting the Frames for Cracking WEP 3.5          Detection of the Sniffers 4.      Wireless Spoofing 4.1          MAC Address Spoofing 4.2          IP spoofing 4.3          Frame Spoofing 5.      Wireless Network Probing 5.1          Detection of SSID 5.2          Detection of APs and stations 5.3          Detection of Probing 6.      AP Weaknesses 6.1          Configuration 6.2          Defeating MAC Filtering 6.3          Rogue AP 6.4          Trojan AP 6.5          Equipment Flaws 7.