BCA

0 Team Viewer v8.0.17292 Corporate Edition Multi Language Including Patch

Friday, November 28, 2014
Team Viewer v8.0.17292 Corporate Edition Multi Language Including Patch

Team Viewer v8.0.17292  Advanced Supervisor is usually an elective repository application which outlets your spouse details in a repository which may also be discussed over the network with different supporters. It also features a advanced recording and reporting characteristics for your own marketing and sales communications. Representative from the system is included just in the TeamViewer Advanced permits or more. With no receiving a licence, that get is limited to a complete connected with 5 lovers and works extremely well for your purposes from the demo. Handheld remote control devoid of Set up: , Along with system can remotely handle almost any PC at any place on the internet. No installing is necessary, simply just function the appliance in both equally sides and connect – possibly via limited firewalls. Rural seeing connected with solutions, remedies and products and services: And also allows environment – your second pertaining to publishing your own computer’s desktop to a companion. Display your own demos, solutions and demonstrations over the internet inside moments – reside from your screen. Data file Transport: Method incorporates incorporated record exchange which permits you to backup data files and directories in order to and from a remote companion – which usually furthermore performs guiding firewalls.

Teamviewer 9 Crack, license code, keygen Full Download
Teamviewer 9 Crack, license code, keygen Full Download

Team Viewer v8.0.17292 Download Here

TeamViewer v9 0.24322 crack Download here

Read more

0 Hack Remote Computers using PRORAT

Monday, November 24, 2014

Hi guys..today i am going to show you how to set up ProRat and how to hack a computer using it. Well, i am going to finish up RAT setup articles with this. I will give the counter measures in my next article. As i haven’t written any articles on direct connection Trojans, I decided to write the one on PRORAT.
If you are new to RATing, it is strongly recommended to read my previous articles which give you all the basic and advanced stuff about RATs.

Hack Remote Computers using EXTREME RAT
Trojans and RATs- Know The Facts
DARK-COMET v4.2 RAT TUTORIAL

procedure to setup ProRat

STEP 1. First of all Download ProRat from here. Once it is downloaded extract it. A password prompt will come up. Enter the password.The password  "pro".

STEP 2. Open up the program and You should see the following window.


STEP 3. Click on the "Create" button in the bottom. Choose "Create ProRat Server".


STEP 4. Next put your IP address so the server could connect to you. You need not enter your IP address manually, you can do this by just clicking on the little arrow. it automatically fills your IP address.
Next put in your e-mail so that when and if a victim gets infected it will send you an email.


STEP 5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager. Just follow the steps as shown in the figure.


STEP  6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. You can select an image, text file or pdf file, So as to make the victim trust your file.


STEP  7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate.    I prefer using .exe files.


STEP  8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is.


STEP  9. After this, press Create server, your server will be in the same folder as ProRat. Start giving this file to your victim. When the victim double click the file, his computer will be in your control.


STEP  10. Now the hacker has lot of options to choose from. He can do many funny things with the victim’s computer.



NOTE: In this tutorial, i put the victim’s IP as 127.0.0.1 as i am testing it on my computer. Inorder to hack a remote computer, you need to get the IP address of your victim. If you dont  know how to find an IP address, you can read my article on finding out remote IP address from here.

How to hack an IP address of a remote computer


Hope you enjoyed the tutorial. :)
Read more

0 How to hack an IP addess of a remote computer

How to hack an IP addess of a remote computer



In my previous post i have explained every thing about IP addresses. If you didnt read it, you can read it here.
Today i am going to show you how to hack an IP address of a remote computer.
Many of you may be curious to know how to find IP address of a person when you are chatting on yahoo messenger, google talk etc..
Even though there are different methods to hack IP, i am showing you to hack using PHP script.

What can you do with an IP address?
Well you can hack a computer using it's IP address.
You can find the location of the computer using its IP address.

Things required:
1)  PHP script to catch the IP.
2) .txt file to store the IP.
you can download them from here.

Procedure:
Step 1: First create an account in any free webhosting site.
          examples are www.110mb.com
                              www.drivehq.com
                              www.t35.com
                              www.my3gb.com
Step 2: Extract the IP finder script you have downloaded.
Step 3: Now Upload the files onto the free web hosting site.
Step 4:Give the link of ip.php script to your friend.

When he clicks the link, his IP address will be strored in the ip_log.txt file.

DEMONSTRATION:

Here i have uploaded my scripts on to www.my3gb.com


and i clicked the ip.php link.
Now my IP address is stored in the ip_log.txt file

You can check out this with www.showmyip.com
Finding the location of the computer:
Now pick the IP address you got from the victim and open www.ip2location.com
here enter the IP address in the box and click "find location".
Thats it..

Hope you enjoyed this tutorial. :)
Read more

2 All about IP addresses



I feel that the first and foremost thing to learn hacking is to know about IP address. So i am starting my hacking related posts with IP address.
In this post i have written all the basic concepts of IP addresses.
My next post will be on hacking IP address of a remote computer.
So before that lets have a glance at the basics of IP..


What is an IP address?
If a post man wants to deliver a letter to you, first he needs to know the address of your home. In the same way Computers on the Internet need to find one another in order to communicate. Each computer therefore has a unique identifying number known as an IP address.
Simply.. Every system connected to internet must have a unique address. This address is called IP address.
Every URL (say, “www.google.com”) has its own numbered Internet Protocol or IP address.
An IP address looks something like this:74.125.19.147
An IP address is a series of numbers that tells us where a particular device is on the Internet network.


Public IP address
A public IP address is assigned to every computer that connects to the Internet where each IP is unique. Hence there cannot exist two computers with the same public IP address all over the Internet. This addressing scheme makes it possible for the computers to “find each other” online and exchange information. User has no control over the IP address (public) that is assigned to the computer. The public IP address is assigned to the computer by the Internet Service Provider as soon as the computer is connected to the Internet gateway.

Public IP addresses can be divided into two types.
They are STATIC and DYNAMIC..

what is static IP?
A static IP address does not change and is used primarily for hosting webpages or services on the Internet. 

Disadvantages of static configuration
This requires manual configuration of each and every computer.
Every time care must be taken that no two systems should have same IP.
This manual configuration has many problems when number of systems increase.

Dynamic IP
On the other hand a dynamic public IP address is chosen from a pool of available addresses and changes each time one connects to the Internet. Most Internet users will only have a dynamic IP assigned to their computer which goes off when the computer is disconnected from the Internet. Thus when it is re-connected it gets a new IP.
To do this Dynamic Host Configuration Protocol (DHCP) was developed.
A DHCP server is a software program that assigns IP addresses to computer dynamically.
Advantages
Administrators of large networks save hundreds of hours per year over manual configuration of computers.
No IP address conflict.
Users need not know about manual configuration.

Private IP address
An IP address is considered private if the IP number falls within one of the IP address ranges reserved for private networks such as a Local Area Network (LAN). The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private networks (local networks):

10.0.0.0 – 10.255.255.255 (Total Addresses: 16,777,216)
172.16.0.0 – 172.31.255.255 (Total Addresses: 1,048,576)
192.168.0.0 – 192.168.255.255 (Total Addresses: 65,536)

How to find your Private IP?
go to start->open RUN->type cmd. Then command prompt will be opened->type the command "ipconfig" without brackets. 
The number that you see against “IPV4 Address:” is your private IP.

How to find your public IP?
You can check your public IP address by visiting www.whatismyip.com

Read more

0 Hack Windows Passwords Using OphCrack

Hack Windows Passwords Using OphCrack

Have you ever thought of breaking into your friend’s password protected computer to steal his confidential  files? What if you forget  the password of your computer? This article will answer all these questions.
In this article i am going to show you how you can hack windows password using OPHCRACK LIVE CD.

What is OPHCRACK??

Ophcrack is a free open source program that cracks Windows passwords by using NTLM hashes through rainbow tables. By default, ophcrack is bundled with tables that allows it to crack passwords no longer than 14 characters using only alphanumeric characters. For more about rainbow tables please visit this link.

Procedure to Hack:

Step 1: Download ophcrack live cd from here. 


Step 2: Make abootable CD/DVD with the downloaded iso file.
Follow the steps to create a bootable CD/DVD.
First download the ISO burner software from here. I selected this software because there is no need of installation. You can use it just by double clicking the file you downloaded. 
Now put your blank CD in CD drive. 
When you double click isoburner software, it shows the following screen.You can locate the file by clicking on the “open” option. and then click Burn button.



 Step 3: put the CD/DVD in your CD-DRIVE
 Restart your computer and change your boot options to “boot from CD/DVD”
 You can do this by  continuously pressing F12  or  F10 when it is restarting. You may use del or esc also. This option changes computer to computer. 
Then follow the instructions that shows. It is self explanatory so you can easily understand that. Once if ophcrack loads completely, it will automatically get your Windows password. 

Hope you enjoyed the article
Read more

0 How to Use Google for Hacking

How to Use Google for Hacking

Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed.
In this post, you will find the information on how to use Google for exploitingsecurity vulnerabilities that exists within many websites. The following are some of the ways to use Google for hacking:

1. Using Google to Hack Security Cameras:

There exists many security cameras that are used for monitoring places like parking lots, college campus, road traffic etc. With Google, it is possible to hack these cameras so that you can view the images captured by them in real time. For this, all you have to do is just use the following search query in Google. Type in the Google search box exactly as given below and hit enter:
inurl:”viewerframe?mode=motion”
Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. You will see something as follows:
Hacking Live Camera
As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really a less refresh rate. But there are other search queries through which you can gain access to other cameras which have faster refresh rates. In order to access them, just use the following search query:
intitle:”Live View / – AXIS”
Now, click on any of the search results to access a different set of live cameras. Thus, you have hacked Security Cameras using Google.

2. Using Google to Hack Personal and Confidential Documents:

Using Google, it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their Address, Phone, DOB, Education, Work experience etc. can be found just in seconds.
intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”
You can gain access to a list of .xls files (excel documents) which contains contact details including email addresses of large group of people. To do so, type the following search query and hit enter:
filetype:xls inurl:”email.xls”
Also, it is possible to gain access to the documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query:
intitle:index.of finances.xls

3. Hacking Google to Gain Access to Free Stuffs:

Ever wondered how to hack Google for free music or eBooks. Well, here is a way to do that. To download free music, just enter the following query on Google search box and hit enter.
“?intitle:index.of?mp3 eminem
Now, you’ll gain access to the whole index of Eminem album where in you can download the songs of your choice. Instead of eminem you can substitute the name of your favorite album. To search for the eBooks all you have to do is replace “eminem” with your favorite book name. Also replace “mp3″ with “pdf” or “zip” or “rar”.
I hope you enjoy using Google for hacking stuffs on the Internet. If you’ve liked this post, please pass your comments.
Read more

1 New method to bypass facebook photo verification roadblock

Thursday, November 20, 2014

New method to bypass facebook photo verification roadblock



This is the new method to verify the photos even if the profile is blocked: 

1-go to Google images search
2- type facebook+"name of 1st friend" copy & paste from blocked account
3-search , you will see the picture of the 1st friend in the 1st 3 results
4-if you didn't identify the picture, repeat the same 
5-if you didn't identify the friend.simply skip the picture and you will get another one (always you have 2 skips/picture)
6-after you identify the 5 pictures facebook will ask you to change your password and email password
7-change your facebook account password and confirm that you change your email password (even you don't)
8-now every thing is OK 
9-if you see this message(no verification method is available now) just logout and wait 1 hour to login,if you failed to verify the photos, facebook will give you 1 chance to verify 5 pictures every 1 hour.
if you find this method helpful don't forget to hit Thanks
Read more

0 [Method] Bypass Facebook's Photo Verification

[Method] Bypass Facebook's Photo Verification



Hi, all of my facebook accounts used to get suspended, and I had no way to compete the verification, so I just left the account and made a new one. I gave up on it until today, and I just read lakim0's thread about facebook monetization.

He reccomended saving all of the links as URL's using an addon for Firefox, which inspired me to make this method. This works only before you get suspended, so it won't work otherwise.

Step 1) Open up Firefox or chrome, and navigate to your facebook profile. Click the friends tab.

Step 2) A list of your friends, along with their profile pictures will be displayed.

Step 3) In Firefox: Click file, Save Page As, then create a folder to store your friends in. Save the file in their, call it 'one'

In Chrome: Click the triple line, then save page as, then follow the steps above.

Step 4) Click next page, then repeat. You will have a folder containing html pages, which can be opened in Firefox or chrome. They will basically be working snapshots of your friend list. Hit Ctrl+F to find a name, and then click their profile to see their Images. You now have a searchable database of your friends profiles.

Tips:


  • Make sure you do this regularly, and I reccomend you keep backups of the friend list, so that if something bad happens to the latest list, you still have the previous.



  • If you are good at coding, you could create a single html file that contains iframes for all of the friendlist you have saved. You will have one big searchable page, which will make it easier at the verification.



  • Remember at verification, you are under a time limit, so do anything you can to reduce time.


Overall, I hope this method helps a lot of people on BHW!
Read more

0 How i bypassed facebook photo tag verification..

Monday, November 17, 2014

How i bypassed facebook photo tag verification..


           

                         
                Facebook photo tag verification is one of crap security system, usually facebook forces one to verify this , once their it seems to be un usual activity like adding more friends,  joining more groups in a short period of time,. so you came here to know how i passed the security system,...let me say in easy words..

Note : Less friends [50-100] = Easy to Get back

                                                          More than 100 friends = Difficult to get back [have to do more work]



Method 1: How i bypassed the security verification 

            What i did is joined more groups with in sum of time and that made the robots to prove that i am the right person using the account ??, Okay follow the simple steps 

  1. Use windows browser like chrome or firefox for this ,
  2. Enter your email and password and you will be forced to enter the captcha [authentication] and then you were asked to identify the photos of the friends [basically this is a tagged photos & profile pictures]
  3. Here we will get 5 photos + 2 skip option 
  4. Now get a snipping tool [default in windows 7,8] and capture those 7 pictures one by one and save with 1,2,3.... [use both skip options]
  5. Repeat the step 4 again [depends on number of friends you have] between 50-100 then you need atleast 20 images..
  6. Now check back your email social tab for the notifications [AAA confirmed your friend request] , note down all the names in a notepad 
  7. Now go to facebook and enter those names in search and get their profile --> photos [Get one spar account to get full access to profiles]
  8. Check back and compare the photos on their time line with the photos you have snapped, once you found on rename those images with their profile name...
  9. Once you find all your friends photos now try to solve the security.... 
Note : If you feel , your account is important then you have to do this procedure.

Method 2 : Seeking help from Support 

       As i said earlier the above first method works if you have 50-100 friends and it is very hard to get back if you have more than 1000 friends using that method., And now this is the only way to get back  your account by appealing to fb support with your government issued Photo ID card..

  • Go to this link with your blocked Fb account
  •  Select "I have gov-issued photo ID"
  • Enter your Name & DOB from Photo ID [Name & DOB should match with the user name that your have in facebook ]
  • Now upload the Photo Id issued by the government [Address is not important so you can blur/hide it..]

  • If profile pic is your's then it will be easy for the support to identify you...
Good Luck..
Read more