• A simple way to operate your friend's computer remotely

    Team viewer is a fabulous software through which you can connect to your friend's computer and operate his computer.Your friend's computer screen will be displayed on your computer and you can do whatever you want. Yes, it is true. But this is not actually a hack. To perform this operation, you should require your friend's permission to operate his computer. So, let's see how this software tool works for connecting you to your friend's computer.

  • Phishing attack (Hack your friend's email passwords)

    Hi friends. Are you having a low memory graphic card. Are you facing the problem of your games running slowly due to low graphics card. There's no need of increasing your graphics card. You can increase your gaming experience with out changing to high memory graphics card. So, now there is a solution for making your games run smoothly with out increasing your graphics card. That software is known as Game booster version 2.0.

  • Hack in to other IP addresses in your local LAN

    Hi friends today ur gonna learn how to hack into other IP addresses in your local LAN network. This technique i am going to say will work only for the internet users who are using local broad band internet connections like CCN, DVS, etc because these broadband internet connections doesn't use good authentication techniques.

  • Browse any web site without connecting to internet

    Wondering how.... It is actually possible with software known as Offline browser.The actual thing the software does is, you should enter the URL of website you want to browse offline in the text field of this software, and the software downloads the whole web site on to your hard disk. Then you can browse that website whenever you wish without connecting to the internet. Isn't it cool........!!!!!!!

  • Steal your friend's passwords from his computer

    Hi friends do you want to know all the passwords which are typed on your friends computer. Not only passwords, do u want to know all the activities that are being done on your friend's computer. Then there is a way to steal your friends passwords remotely through a fabulous software known as refog keylogger.

  • How to change a trail version software into full version software

    Many of us download the trail version softwares like 30 day trail,20 day trail etc. The common tecnique used by most of us to run the trail version software many days even after the expiration date of the trail is, we change the system date regularly to avoid the expiration of the software.This makes the software to run even after the trail version.

AFCEH

Powerpoint slides for all weeks of AFCEH course


WEEK-1
                            click here

WEEK-2
                            click here


WEEK-3
                            click here


WEEK-4
                            click here

How to hide a drive in your friend's computer



Hi friends. A thing you can perform on your friend's computer or even on your own computer is to hide any of the drives in your friend's computer and make him confused.
So lets see how to do it.

How to hack in to other IP addresses in your local LAN network


Hi friends today ur gonna learn how to hack into other IP addresses in your local LAN network. This technique i am going to say will work only for the internet users who are using local broad band internet connections like CCN, DVS, etc

Yahoo messenger hidden smileys

click on image to enlarge

Virtual Graphics card for your computer

                                                               click on image to enlarge
Hiiii..... friends. Here is the fabulous Graphics card emulator tool for playing almost all games with out the graphics card. This tool actually uses 128 MB of your DDR2 RAM and provides you a virtual 128 MB graphics card for your computer. It makes your games run smoothly without any breakages. Just downoad this tool

Steal your friend's passwords remotely (Refog keylogger)

Refog keylogger

Steal your friend's passwords remotely

Hi friends do you want to know all the passwords which are typed on your friends computer. Not only passwords, do u want to know all the activities that are being done on your friend's computer. Then there is a way to steal your friends passwords remotely through a fabulous software known as refog keylogger. All you have to do is just download the refog keylogger  DOWNLOAD IT HERE(torrent file).
NOTE: Donf forget to register the software after installation.
reference name: ZJGSJ33  
registration: A855GM-93NLL-AMT2A-98EBN-RSDVB-LV3X7

You can install this software in your own computer to monitor the activities and keystrokes from your own computer.

Improving your browsing speed in Windows 7


Hii friends... this is yet another important tweak you can do in the Windows 7 to improve your Internet browsing speed. Just follow the below steps. Thats it

1. Go to start and open Run (Shortcut is windows button+R button ).
2. Now Type gpedit.msc and press Enter.


There is a secret hidden feature inside the Windows 7. i.e Windows 7 God mode. With the help of God mode you can change the settings of Windows 7 and make it work in your own way.


To do this you should do the following.


Its always a better Idea to make your Windows 7 up to date. Most of the Windows 7 users find many problems related to hardware and software functionalities do not work properly. This is due to incompatibility of your windows 7 drivers with your computer hardware. The main reason behind this is the Windows 7 will automatically installs the drivers required for your system automatically when you install the Windows 7.

Google web accelerator





















Google Web Accelerator is an application that uses the power of Google's global computer network to make web pages load faster. Google Web Accelerator is easy to use; all you have to do is download and install it, and from then on many web pages will automatically load faster than before.
Google Web Accelerator uses various strategies to make your web pages load faster, including:
  • Sending your page requests through Google machines dedicated to handling Google Web Accelerator traffic.
  • Storing copies of frequently looked at pages to make them quickly accessible.
  • Downloading only the updates if a web page has changed slightly since you last viewed it.
  • Prefetching certain pages onto your computer in advance.
  • Managing your Internet connection to reduce delays.
  • Compressing data before sending it to your computer.

Google Web Accelerator screenshot 1

Free windows 7 activator for making it geniuine


Hi friends....
Is your windows 7 sick of getting message like "your copy of windows is not genuine". Then there is a solution to get rid of this.Here is the software windows7 activator which makes your windows genuine. The best way to use the windows 7 activator is as follows.




Among the above firewalls Comodo firewall is best and most preffered one.

Creation of really reallyy bad virus...


Hi friends now i'l show you how to create a really worst virus. This virus repeatedly executes the batch file and displays infinite number of message dialogues. There is no way, the victim could stop this process. So, in turn the computer will get hanged.

So. now getting in to actual scenario, the process of creating this virus is as follows.


Some times you find that the Windows Task Manager is disabled by the Administrator. Then there is a simple solution to get back the Windows Task Manager. Just follow this.

1. Go to start menu.
2. Open Run command (simply type "windows key + r" to open it directly).
3. Then type the following and press enter.

REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 0 /f

4. Thats it. :-)

Panda AntiVirus pro 2010 (Best Antivirus Software)



PANDA AntiVirus is one of the top 10 AntiVirus softwares. This Antivirus software is very effective and doest even allow any viruses or malicious codes to stay in your PC. As soon as, if any Virus files or malicious scripts that effect your system, enters your computer, PANDA detects those files as harmful ones and automatically removes those virus files from your computer. So, no user involvement is required to remove the viruses. Its very effective.




Optimize your Ram by simple VB script

It's a simple way to optimize your RAM by writing VB script program.

Follow the below steps:

1.open notepad.
2.copy the following in to notepad.

 mystring=(80000000)

3.Now save this file as RAM.vbe
4.Now whenever you find your computer is working at a slower pace, just execute this file and your RAM would be optimized for the better performance.

Just give a try and you'l observe the change in your RAM performance


First download the Internet download manager and extract it.
Now follow the below steps very carefully.

To crack the Internet download manager You must do as follows:

1. Exit IDM If It exists
2. Disconnect from the internet, 
3. Copy & paste the followings to your desktop:
- The whole Folder Internet download manager you downloaded.

OpenDNS server to increase browsing speed

change your DNS server settings as following

This is more effective and more faster than public DNS servers published in previous posts. You'l be amazed to see the increase in the browsing speed of your internet.

Preffered DNS: 208.67.222.222
Alternate DNS: 208.67.220.220

Optimize your system speed by limiting the RAM usage by the Firefox

If you are running with a low RAM on your computer you can improve the system performance a little by reduce the RAM usage of FireFox browser on your computer. Some times Firefox can take more RAM potential than it needed. So we need to limit the RAM usage of Firefox browser by changing the Firefox configuration.

Steps to Disable Over RAM usage of Firefox Browser


The actual purpose of DNS servers are to match the IP address of the websites with their actual domain naes and then allowing us to connect to that specific websites. Our Internet Service Provider (ISP) provides us with their own DNS sever and that DNS server is shared between all the computers in that particular network. The DNS server provided by your ISP may be slow due to some reasons. So, if you want a good browsing speed for your computer the other choice is to use PUBLIC DNS SERVERS. You will definitely notice the increase in the browsing speed of your internet.

Here are a few Public DNS servers list. Try these any of these DNS servers and you will definitely observe the change in your internet speed

Now, no more download limits and no more waiting time required for downloading files from the Rapidshare.com . Here is the list of 100 rapid downloader sites for you.
The thing you should do is just copy the URL of the rapidshare.com file which you want to download and enter that URL in any of the sites mentioned below.
You can use any of the sites mentioned below.
Thats it.... :)

Create a simple, but very powerful virus on your own

Hiiii friends. Want to create a simple virus and send it to your friend.
This is a very simple code. But it crashes your friends computer. So, dont try this on computer.

So, Just follow the below steps:


You can do a simple trick on your AntiVirus software to check its efficiency.
Do the following to do this.

1. First open a note pad.
2. Type the following code in your note pad file.


X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

Convert any E-book into a flippable book


SEE DEMO OF FLIPPABLE BOOK HERE FIRST
Yes.... its true...!!!!

Usually we find difficulty in reading E-books through Acrobat reader. So this is yet another way with which you can turn out any E-books or pdf files in to a flippable book with which you can read the contents of that E-book very easily.

Video DownloadHelper 4.8


Most of us find difficulties in downloading the flash videos from various websites like youtube, metacafe, dailymotion etc. With this addon you can easily download any video and audio files from various websites. There are many supported websites available for this addon. 

Windows vista Key finder

Download this simple tool which finds the Windows vista product key.

Just put the Vista DVD in to your DVD tray and run this software. The tool extracts the product key from your vista DVD. Thats it....... :-)

DOWNLOAD IT HERE


Tool looks like this:

Find Windows Vista product keys – Windows Vista Key Finder

Windows Vista Key Finder

Improving the firefox browsing speed 3 to 30 times faster


Try this Firefox tweak and you’ll see that you’re surfing the Internet from 3 to 30 times faster!
To get started, open your Firefox web browser. In the address/location bar type [about:config] and then press your Enter key. (NOTE: DON’T TYPE THE BRACKETS.)


Tweak #1:
In the Filter bar type [network.http.pipelining]. Then, double-click on this line under Preference Name in order to change the value from false to true.

Just download this Hacking tool
DOWNLOAD NOW
Now enter the new password for the Windows XP. It doesnt asks u for the previous password.
Using this tool you can even delete the previous password

Tool loks like this:

click on image to enlarge

Wondering how....
It is actually possible with software known as Offline browser  (Download it).
The actual thing the software does is, you should enter the URL of  website  you want to browse offline in the text field of this software, and the software downloads the whole web site on to your hard disk. Then you can browse that website whenever

Changing the trail version software into full version software


Many of us download the trail version softwares like 30 day trail,20 day trail etc. The common tecnique used by most of us to run the trail version software many days even after the expiration date of the trail is, we change the system date regularly to avoid the expiration of the software.This makes the software to run even after the trail version.

Skip screen addon for Mozilla firefox


SkipScreen addon is a really useful firefox  addon for lot of users who download  various types of files from the popular file sharing sites like Rapidshare, Megaupload, zShare, Mediafire, and more.
Most of these file sharing web sites have a annoying waiting time limit before a free user can start downloading the requested file. So, SkipScreen can be really useful in saving your time wasted seeing the download waiting time as it removes the screen of download waiting time from these media sharing sites.

So, till now we learnt about changing our MAC address. Now coming to the actual scenario, what is the actual need to change our MAC address. One of the interesting thing we can do by changing our MAC address is, we can actually increase our internet connection speed. Thinking how......!!

SO, for example let us consider that we are connected to the internet through a low speed internet connection with a 128kbps plan for which dowload speed is low. And if we want to change our internet connection speed to 512kbps plan or even higher, it can be done easily by MAC address spoofing.

Simply follow the below steps.

Till now we learnt to know the MAC address of a remote computer through pinging the remote computer and checking all the received packets for the actual remote computers data packet and its corresponding MAC address using a data sniffer software. But it is a very long process and quite confusing for the begginers to execute.
So, now here is the very straight forward way to find out the remote computer's MAC address. Just simply download the fabulous tool known as Zenmap (download it here). 
Follow the below steps:
1. Install the software which looks like following.
click on image to enlarge
2. Now if you carefully observe the above screenshot, the tool contains target textfield. Now you should enter the IP address of the remote system for which you want to find out the MAC address. 
3. Now in the right side top corner click scan button.
4. After a few seconds the information about the remote system will be displayed in the text area below.
5. Now there will be MAC address of the remote system in the printed information.
                  Thats it.....!!!!!

for example 
see the following screen shot for how the MAC address will be visible in the information where I am entering the 192.168.199.5 (which is one my my local IP addresses with in my broadband network range) as the input to the target text field.
Now it finds out all the open ports for the given remote computer. And it also displays the respective MAC address which we all need. :-)
click image to enlarge
 
click image to enlarge

NetBus- A fabulous trojan

NetBus is the famous trojan which can be used to gain the remote access for the victim's computer. There are various in-built optoins present in the Netbus trojan to perform various hacks on the victims computer.
When you install the NetBus trojan on your computer two files are installed on your computer. Look the following screenshot.
 Click on the image to enlarge it
DOWNLOAD NETBUS HERE
From the above screenshot you observe 2 files

EXE binders

For remote access of the target computer, an attacker should first install a trojan on the victim's computer. An attacker cannot send the trojan to the victim's computer directly because the victim can recognize that the received file is a trojan. So instead of directly sending the trojan to the victim's computer, the attacker binds the trojan to any of the executable files like calculator.exe or any flash games etc and sends to the victims computer. When the victim receives the executable file he thinks that that is a normal executable file and executes it.

Trojans

Trojans are the Remote Administration Tools that allow the remote control and access to the attacker.
Once the trojan is installed on the target computer, then the attacker can remotely access all the software and hardware of the target computer. Simply saying, a complete access will be handed over to the attacker and he can access the remote system as he like. But the trojans can be easily detected by all antivirus softwares.

Some of the Trojans are :

1. NetBus (click here)

2. Backorrifice

3. GirlFriend

4. subSeven

Host file

The host file is the file which are present in the windows by default.
Host file is present in the following path in windows.
Windows/System32/drivers/etc.
In host file we can give the Domain names with their respective IP addresses.As a result we can observe the increase in the speed of accessing the websites which are entered in the host file.
We can play with Host file in the following manner.


Zenmap is a fabulous tool actually an extension to Nmap
Zenmap is an excellent graphical user interface tool which can be used fort port scanning the remote computer.
using zenmap tool you can find the following information regaurding the remote computer.

Download zenmap (click here to download zenmap).

What can you find using Zenmap???????

Port scanning

Port scanning is an important technique for every hacker.
Actually it is an art of scanning the target computer to determine the list of open ports and listening for connections.
This can be actually done by connecting the ports on the target system one by one.

What are ports actually??????????

                        Ports are considered as the doors through which the data is sent and recieved to and from the network.
Hardware ports are the sockets behind CPU to which various devices are connected.


First of all you should install a data sniffer software to know the remote computer's MAC address.
Install any data sniffer you like on your computer.
I prefer Colasoft Data sniffer software ( download here)

STEPS:
1. Open the data sniffer software and run it.
2. Now your friend's MAC address whose IP address is 192.168.199.7

Every ethernet card has a unique MAC address assigned to it.
You can see your ethernet card's MAC address from command prompt.

Simply open cmd prompt and type following

ipconfig /all
Following will be displayed on the screen.

In My system i am connected to internet using Realteck Family PCI ethernet card
so my MAC address is visible in themarked area of below screen shot

Simply visit the web site
WhatIsMyIpAddress.com
               or
WhatIsMyIp.com


Ping sweeping

Ping tool is commonly used for detecting whether a remote host is alive or not.
It makes use of ICMP protocal for detecting whether the remote host is alive or not.

Ping can also be missused to perform the following attacks.

1. Denial of service attack (DOS).
2. OS(Operating system) detection purposes.

Various tools for performing ping sweeping are

1. Cping

2. Fping

3. SuperScan

4. Ping Sweep
          
5. Nmap
      
6. WS_ping pro pack
         

Most of the file hosting websites enforce a download limit for the free users.
The phenomena is that the download limit restriction is provided on basis of the total no. of files we download or the total size of the files we download.

So, if you want to overcome these restrictions and download as many files you want Do either of the following simple tecniques.


1. Simply delete the cookies of your web browser.

                                    OR

2. Use a different web browser when download limit is reached in one web browser.

Proxy bouncing

Proxy bouncing can be treated as an extension for proxy servers.
In proxy bouncing we connect to the internet using multiple Proxy servers. Therefore much more security is provided for our computer.

Tools: MultiProxy (Download here)

Proxy servers

Proxy servers acts as a buffer between your computer and the internet.
So your identity is hidden and is not visible to the internet. Instead the proxy server's IP address is visible to the internet when you use proxy servers.
Famous proxy servers are

1. Wingate (Download here)
2. Winproxy (Download here)

Fport

Fport is a tool which allows you to map all the open ports, their respective processes, applications and path names for any remote computer

It is a fabulous software and you can just download it here (Download Fport)

Changing your MAC address

Mac address is actually unique 12 digit hexa decimal number assigned to the every ethernet card during manufacturing. It is very simple to change your computer's MAC address by doing slight modifications in your windows registry editor or either by using ready made softwares.
One of those softwares is Etherchange ( download it ). But Eterchange will not run on the windows vista and Windows 7 onwards. Etherchange software can be used in windows XP, NT and 2000. But in Windows vista and Windows 7 you can change the MAC address manually through registry editor. It involves the following steps.

so the process of changing your MAC address through the windows registry editor is as follows.
1. Go to windows registry by typing regedit in your run command.
2. Now go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972- E325-11CE-BFC1-08002BE10318}

click on image to enlarge

3. Now double-click {4D36E972- E325-11CE-BFC1-08002BE10318}.
click on image to enlarge

4.  List will be opened which looks like 001,002,003...................,0016.
5. Now you chould manually check all the keys ie 001,002,003...................,0016 for where your ethernet card is present. You should check the the right side pane for your ehernet card(ethernet card is actually the your ethernet card manufacturer name).
click on image to enlarge

6. You will found your ethernet card in one of the keys (001,002,003...................,0016), now in the right side pane right click your mouse and select new string value. Then enter the name for that string value as NetworkAddress. Observe that in the NetworkAddress N and A are capitals.
7. After giving the name to the string value double click the NetworkAddress.
8. Now in the value data field enter the new MAC address for your computer.

click on image to enlarge

9.Now either disable your network adopter and enable it  OR simply restart your computer.
10. Now the work is done. Your MAC address is changed.
              Thats it guys. Now just play around with all the IP addresses in your Local LAN.....!!!! : )

AFCEH

WEEK-1
                            click here

WEEK-2
                            click here


WEEK-3
                            click here


WEEK-4
                            click here

Week-4

encryption-protectng your files 
meet in the middle attack
introduction
The attack
Shell accounts
Shell accounts-2
USB hacking
Undeleting the deleted data
Undeleting the deleted data-2
Permanantly removing data:eraser
tripwire
sysinternals
task kill attack
shoulder surfing
dumpster diving
Road sign hacking
steganography
steganography-2
water marking
steganalysis
Wireless hacking
introduction
setting up a wireless network
wireless security
poisoned hotspots
important terminology
War driving
war driving: How does it work
war driving tools
demo
war driving & GPS mapping
finding WIFI hotspots on the internet
demo
re-Assosiation requests
De-Authentication attacks
countermeasures against war driving
wireless data sniffers
how are wireless connections established
MAC filtering attacks
DOS attacks against wireless networks
WEP security loopholes
Cracking WEP security loop holes
cracking WEP, WPA, WPA2:tools
ARP request relay attack
cracking WEP keys
caffe Latte attack
improvements in WPA over WEP
cracking WPA & WPA2
recoverign WEP & WPA keys from local machine
demo
computer forensics
honeypots
penetration testing & vulnarability assesment
penetration testing & vulnarability assesment-2
backtrack
AFCEH relearn program
AFCEH retake praogram
AFCEH exam kit

Week-3

Identity thefts
input validation attacks
SQL injection
Cross site scripting attacks
Missuse of hidden HTML tags
Cannonicalization attacks
HTTP response splitting
Web hacking
buffer overflows
Passive Sniffing Attacks
demo
What is a switch?
What is a hub?
Router vs hub vs switch
introduction
countermeasures
active sniffing attacks
ARP poisoning attack
demo
MAC flooding attack
MAC duplication attack
playing with ARP tables
demo
countermeasures
demo
social networking websites security
windows 7 & windows vista password cracking
demo
password cracking
windows 7 & windows vista bypassing the login prompt
demo
windows 7 & windows vista online password cracking
Captcha
introduction
A good captcha system
recaptcha
mail hide from recaptcha
demo
cracking captcha
cracking megaupload captcha
future trends
my favourite twitter scripts
my favourite facebook scripts
my favourite youtube scripts
Tab napping
introduction
tools
demo
DNS poisoning attacks introduction
DNS poisoning sniffing attack
DNS cache poisoning Birthday paradox
DNS poisoning birthday attack
modern day DNS attacks:search engines
modern day DNS attacks:Fat fingers attack
modern day DNS attacks:Domain hijacking
demo
modification on user computers
Hacking demo
Accessing blocked sites using public DNS systems
demo
countermeasures
demo:FCrDNS

Week-2

ICMP scanning
OS finger printing
zenmap
demo
Detection-screenca
Passive fingerprinting with p0f
demo
web server fingerprinting
avoid OS detection:change default values
demo
packet generation software
demo
Packet generator:Nping
demo
conclusion
E-Mail forging
DOS attacks
Reflective DDos attacks
password cracking attacks
password cracking attacks-2
Cracking saved passwords in browsers
introduction
google chrome
firefox
internet explorer
tools
demo
counter measures
password managers
introduction
keePassX
demo
LastPass
ClipperZ, KeePass.info, Vulnarabilities
Sniffers
Keyloggers
Trojans
EXE binders
EXE binders-2
FireWall tunneling using SSH & Putty
introduction
Steps to follow
Unvlocking p2p File Sharing tools using SSH & putty
Unblocking P2P File Sharing tools using tecniques
demo

HTTP tunneling
introduction
How it works
Tools of trade
demo
Port forwarding
introduction
How it works
Configuring the router
Portforward.com
DYNDNS
Source port forward using fpipe
port forwarding vs port triggering

Week-1

Who is hacker
what will you learn in course?
The anatomy of an IP address
The anatomy of an IP address demo
Network address translation
Internal vs External IP address
Hacking demo:The anatomy of an IP address
MAC addresses
Demo
MAC address spoofing
demo
how to find the remote computer mac address
demo
changing the MAC address
Fport
Demo
Proxy servers
Proxy servers part 2
Tor:anonimty online
demo
Hacking file hosting web sites
bypassing the Ads & Multiple links_Part1
demo
Bypassing the Ads & Multiple links_Part 2
Bypassing the Download wait countdown
bypassing the download limit
Shortened URL vulnarabilities
Introduction
Threats
Previewing the shortened URL
Hacking demo
ping sweeping
traceroute
whois
reverse DNS lookups
Host files
Host files part-2
Netcat
demo
Ncat
demo
Port scanning
Deamon banner grabbing
Scanline
demo