Google Page Rank Update !!!! Hackaholic Is Now a PR 2 Blog

Last evening Google updated their page ranks for websites and  I am  happy to tell you that Hackaholic is now a PR 2  Blog .This is the very first Google PR update for Hackaholic so i am really happy .At this moment i would like to thank all my blog readers for their continuous support and encouragement , This Wouldn’t Have Been Possible Without You . I also want to thank all my blogger friends for their continuous support and advice . Now Google with their updates have actually motivated me to write more articles , I am also panning to start a separate blog where i can concentrate more on penetration testing and coding ,

I  also got many e-mails from my blog readers requesting me to write more articles at  Hackaholic  . I have actually  planned to write articles on WiFi hacking  in the coming weeks so please be patient and i am  also planning to keep a lucky draw by end of next month to thank  all my blog readers ! .

So all i need now is your encouragement and feed backs so keep them coming !!!!!!!!!! 

How to Hack Passwords Using An USB Drive

As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE ,chrome and Firefox. There exists many tools for recovering these passwords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff /hack passwords from any computer.

Hack Facebook Accounts With Facebook Freezer

Yesterday when i was surfing on the net i came across an interesting script kidy tool Facebook Freezer  Actually this tool is not used for hacking Facebook but it is simply used to prevent users from logging into Facebook sounds cool ? ha . Follow the instructions given below to prevent your friends , from logging into their Facebook account

5 Ways To Speed Up Torrent Downloads

Can you speed up uTorrent? Yes, BitTorrent technology, like uTorrent, make downloading large files easy. However, some people are forced to wait hours for a download. There are ways to speed up uTorrent which will allow you to reduce the amount of time it takes to receive a large file .Here is the ultimate guide to speedup Torrent downloads

Hack a Remote Computer Using Realtime Spy

In one of my previous tutorials we discussed how we can use ardamax key logger to hack remote computers .In this article i will explain What is Realtime spy and i will also explain How you can use  Real time spy to hack remote computers

What is Real time Spy ?
Realtime-Spy is the latest in cutting-edge remote spy software monitoring technology that allows you to monitor ANY PC you own from ANYWHERE. Realtime-Spy is remotely installable .It is one of the best and the Cheapest spying softwares which is out there in the market

Brutus Password Cracker -Tutorial

Brutus is a well known password cracking  program .With Brutus you can either carry out a  brute force attack or a dictionary attack to crack passwords for HTTP, FTP, POP3, Telnet, SMB (Netbios), Netbus, Brutus is one of the fastest, most flexible remote password crackers you can get your hands on

Practical Packet Analysis using Wireshark Book -Download

If you are looking for books on Wireshark i would suggest you to have a look at this book  Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems. It not only teaches you how to use Wire shark but also teaches you  how to analyse packets in real world situations.

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

Wireshark is the world's most popular "packet sniffer," allowing its users to uncover valuable information about computer networks by analyzing the TCP packets that travel through them. This significantly revised and expanded second edition of Practical Packet Analysis shows you how to use Wireshark to capture raw network traffic, filter and analyze packets, and diagnose common network problems.

Author Chris Sanders begins by discussing how networks work and gives you a solid understanding of how packets travel along the wire. He then explains how Wireshark can be used to monitor and troubleshoot networks. Numerous case studies help you apply your new found knowledge to your networks. This revision offers more detailed explanations of key networking protocols; expanded discussions of wireless protocol analysis and an examination of network security at the packet level; expanded discussion of the meaning of packets and how they can offer insight into network structure; and new scenarios and examples. Whether fighting a virus infestation or a confounding connectivity problem, Practical Packet Analysis, 2nd Edition will help you find the problem and fix it.

Hack Windows Password Using Pwdump and John The Ripper

I have already written articles on How you can hack windows passwords Using various tools such as Ophcrack ,Chntpw and i have also written  an article on how to hack windows password using stick keys . In this article i will explain an another way to Hack/crack windows password using  Pwdump and John the ripper

Hack Windows Password Using Pwdump and John The Ripper 

Spy Cell Phones with Spyphone Gold

Spyphone Gold  (Spyera gold)  is the most advance cell phone keylogger on the market today. This is based on its supercharged features,reputation and great system core stability.It has been in the business of developing phone spy applications for over ten years which makes it one of oldest companies in this particular market. During this time Spyera’s engineering team has ensured that this product remained one of the leaders in the development of new phone spy features and also phone compatibility (e.g. Spyera was the first Blackberry spy app to work on O/S 6). Basically if you would like to monitor virtually any cell phone in any location in the world then Spyera is the way to go.

John The Ripper -Tutorial

John the Ripper  is probably the fastest, most versatile, and definitely one of the most popular password crackers available. It supports six different password hashing schemes that cover various flavors of Unix and the Windows LANMan hashes also known as NTLM (used by NT, 2000, and XP). It can use specialized wordlists or password rules based on character type and placement.

I got many Emails from my blog readers requesting me to write an article on how to use john the ripper ,But  actually there are may nice tuts on the net on this subject . So i taught instead of writing i can share one such article  The following article is written by  Renegade

An Introduction To Virus Coding

Virus coding is not as tough as you think its easy , Today Viruses are coded in various languages but the best are coded in Assembly and C. If i start writing tutorials on Assembly and C . I am sure most of my blog readers will never ever visit my site . 
As most of my blog readers are beginners so to make it easy for them .In this article  i will teach you how to code Batch File viruses which are the easiest to write and understand And for the intermediates who already know this stuff i will be adding links at the end of the post from where you can learn High level Virus Coding 

What is a Computer Virus ?

In my Previous article I explained about malware .In todays post i will be explaining about Computer Virus which is a type of malware

A computer virus is a program which reproduces itself. It may attach to other programs, it may create copies of itself (as in companion viruses). It may damage or corrupt data, change data, or degrade the performance of your system by utilizing resources such as memory or disk space.

There are thousands of viruses, and new ones are discovered every day. It is difficult to come up with a generic explanation of how viruses work, since they all have variations in the way they infect or the way they spread. So instead, we'll take some broad categories that are commonly used to describe various types of virus.

An Introduction To Malware

Malware is a generic term for bad software. Malware is an abbreviation for ‘malicious software’ computer program .Malware consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior .

Password Cracker 1.1 - Download

One of  my blogging  friends (Black star) has developed password cracking tool. Password Cracker 1.1 .This tool can crack  MD5,SHA-1,.. Hash codes using Dictionary Attack Method. Password Cracker 1.1 is open source (free) , you can download the tool from the following link 

World IPv6 Day Will Test New Internet Protocol

Mark your calendars: Wednesday, June 8, is World IPv6 Day. On that date, the Internet Society will oversee the first global trial for the new Internet protocol.

The society said it will be joined by a variety of web sites and Internet service providers, including Facebook, Google, Yahoo, Akamai and Limelight Networks. In all, more than 225 organizations will use IPv6 on their main services for a full 24 hours to test the technology and motivate other organizations to prepare for the hand off from the current IPv4, which is rapidly running out of addresses.

View Blocked Websites By SSH Tunneling

I have already  written many articles on How to view Blocked websites in schools and collages by Using Proxies , TORURL Filtering ..etc .In this tutorial i will explain an another way "SSH Tunneling" By which  you can view blocked websites .

What is SSH tunneling?
SSH  tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used to tunnel unencrypted traffic over a network through an encrypted channel.In easy language,you can surf net without being monitored and even surf blocked sites too .If you are to curious to know more about SSH and SSH tunneling  .please have look at my guest post on SSH  from Here  

Hacking Windows Password Using Chntpw

Sorry  folks for the late Updates.... I had gone to my native place so i was not able to update my blog .In this article we will see How to hack windows Password using Chntpw - (Change NT passwords ) utility

Concept :- 
Windows Stores user accounts passwords in a file SAM . Which is located in ( C:/windows/system32/config ) With chntpw  software utility we will be able to reset or blank local passwords used by Windows NT, 2000, XP, Vista, and 7. It does this by editing the SAM database It is included in many security focused Linux distributions such as BackTrack and Knoppix STD.
© 101hacker | Design by Mukund edited by John
Powered by Blogger