Monday, 29 October 2012

How To Clone Sim Cards

Have you ever tried of hacking sim cards. IF not follow this tutorial on cloning sim cards.
This is simple video tutorial where creating sim card reader is hard work and brute forcing is time consuming work. If you really want to clone sim card, you must have sim card reader and sim card reader application. I guess you can understand by watching this video.

We Are Back

Sorry for keeping you wait with out any updates on the hacks. So From now there will be daily updates on this blog.

Saturday, 29 September 2012

Encrypt Your Files With Secure USB

Encrypt Your Files With Secure USB

Recently i found an application which encrypts and decrypts file and folders . Actually it is the tool which is used for encryption of USB's but it also encrypts iles and folders too.

How To Change Mac Address In BackTrack 5 R3

As this tutorial is similar to the tutorial which i had shown you before.
So change your mac address from you terminal.

How To Hack Script Kiddies

Script Kiddies who are those is the first question which comes up in your mind. Script Kiddies are the guys/girls who hack others with the help of tools.

Tuesday, 25 September 2012

Random Passsword generator In cmd prompt

 Random Passsword generator In cmd prompt

I  was browsing in the internet and found an simple utility for generating random passwords. Folow this tutorial to generate random passwords.

Wednesday, 12 September 2012

How To Auto Save Passwords In Firefox

How To Auto Save Passwords In Firefox

Most of the people does not know to get the passwords directly. If an user simply types an passwords in firefox browser, then password will be save directly in to remember dialog.

Wednesday, 5 September 2012

How to View System Properties[Tip By Unter]

Thanks Unter for providing wonderful tip. This shortcut really helps out noobs to view their System properties.

Tuesday, 4 September 2012

How To Convert Text To ASCII

How To Convert Text To ASCII

Hackers convert text to ASCII characters because they have to inject these malicious characters by converting them to ASCII as they cannot use direct malicious text so they try using ASCII characters.
Zarabyte.com ha developed an awesome application which converts Text To ASCII.

Mac Address Changer For Windows

Hackers spoof ip 's and MAC Address,. Most of them spoof  MAC Address. In order to change the mac address they have to go the lan properties -> Configure -> Advanced -> Network Address.

Monday, 3 September 2012

How To Request New Ip From Your ISP


How To Request New Ip From Your ISP

Some times our IP address will be blocked from websites or banned from websites then we have to we have to request new ip from aour ISP. In thsi tutorial i will teach you how to request an new IP.

Sunday, 2 September 2012

How To Trace Location Of An Ip Address

How To Trace Location Of An Ip Address

Now a days there are many cyber attacks are going on. In order to find out the attacker who left his Ip Address in the log then you can easily trace his route by simply tracing the location.

How To Protect Yourself From Keyloggers


How To Protect Yourself From Keyloggers

Keylogger is nothing but an spyware which send the keystrokes of an victim's keyboard to an hacker.
Hackers use keyloggers to steal passwords ,credit card numbers and any other confidential data which has to be secured. When ever you type username & password on any site, key strokes will be forwarded to an hacker's mail box.

Saturday, 1 September 2012

Find Out Hash For An Files

Find Out Hash For An Files

HashMyFiles is small utility that allows you to calculate the MD5 and SHA1 hashes of one or more files in your system. You can easily copy the MD5/SHA1 hashes list into the clipboard, or save them into text/html/xml file. 

How To Crack MD5 Passwords With Cain

How To Crack MD5 Passwords With Cain

Most of the people does not know how to crack the passwords with the help of cain. In this tutorial i will show you how to Crack MD5 passwords.

Calculate Hashes For An String With Hashcalc

Calculate Hashes For An String  With Hashcalc

Have you ever wondered by calculating the hashes of  your name. No then follow this tutorial.Simply download an application called HashCalc , Which is freeware.

How To Create Application Bomber

How To Create Application Bomber

Application Bomber is an application where all the applications will be executed simultaneously , which eats the memory of an processor.Follow this tutorial to create an Application Bomber.

Friday, 31 August 2012

New Worm Called Monaco

Recently i have been working on a worm which effects the entire registry and disable task manager. If you execute this worm , your home page will be my blog http://theethicalhackerz.blogspot.com.

Thursday, 30 August 2012

How To Hack Tata Photon Password

How To Hack Tata Photon Password

If you are Tata Photon user and some one locked it and you want to use internet but you dont know the password. , in this tutorial i will show you to hack an Tata Photon .

How to Open My Computer From Run

How to Open My Computer From Run

Most of the people does not know how to open My Computer with the help of Run.So in this tutorial i will teach them.

How To Setup Fern Wifi Cracker

How To Setup Fern Wifi Cracker

Fern is an wifi cracker for Ubunu where ir crack the passwords for an Wireless networks. In this tutorial i will teach you to setup an fern Wifi Cracker.

DDOS Attack Using Notepad

DDOS Attack Using Notepad

1. Open Notepad.
2. In Notepad paste the following  text.

Thursday, 23 August 2012

Tool For Scanning Mac Address

Hackers use different tools. Different hackers use different tools so i liked this tool which i use often for mac spoofing.Mac spoofing is an spoofing of an mac address of an different machine around in the internet.

ESSPEE New Tool For Pen Testing

ESSPEE New Tool For Pen Testing 

ESSPEE is open source tool which is used for the pentest purposes. As it is an open source it runs on Linux Platforms. The features of this tool are mentioned below.

Tuesday, 24 July 2012

How to Disable Backtrack Services At Startup

How to Disable Backtrack Services At Startup


Many services of Backtrack 5 R2 are being started when you log into the machine. Most of the people doesn't know about services are started automatically. In order to deactivate the services , follow this tutorial.

Create Phishing Pages With SET

Create Phishing Pages With SET


SET is known as Social Engineering Tool Kit, which is used for the social engineering attacks. We can creat epayloads , phishing pages and lot more with the help of set. As SET is pre installed in bactrack 5 we dont have trouble for using set.

Anonymous FTP Finder

I was bored in home , so i tried to find some thing new to hack but i didnt find any thing to hack. I got an stupid idea to connect anonymous ftp. Then i searched every where for find the Anonymous FTP's.
I googled and i got a script for finding Anonymous FTP's.

Monday, 16 July 2012

How To Crack MD5 Passwords Online In Backtrack 5

How To Crack MD5 Passwords Online In Backtrack 5


You got the hash of an passwords , but dont know how to crack the passwords of an hash. So you need to know the password of an hash then you will search online by going to every site and crack the hash and all.
In this tutorial i will show you how to crack the passwords of an hash online in the internet.

Tuesday, 26 June 2012

How To Identify An Hash in Backtrack

How To Identify An Hash in Backtrack


The passwords which are stored in database are stored by an encryption. In order to crack the hsh we need to identify the hash . There are different kinds of encryption algorithm like md4,md5,sha1 etc.,

Friday, 22 June 2012

How To Download Videos From Terminal

How To Download Videos From Terminal


In windows you can easily download videos by using an applications directly but the linux is different but the most  easy part to download videos is by terminal.

Tuesday, 19 June 2012

SQL Post Vulnerability Found In Google And Facebook

SQL Post Vulnerability Found In Google And Facebook


SQL injection has been found on Google and Facebook . The vunerability has found by one of the inj3ct0rs crew and they also posted proof of concept.

Install Ubuntu Software Center For Backtrack5

Install Ubuntu Software Center For Backtrack5


In Backtrack 5 , there is no Ubuntu Software Center , To install Ubuntu Software Center here is the following tutorial.

How To Install Angry IP Scanner In BT5

How To Install Angry IP Scanner In BT5 


There are many tools provided in Backtrack but the tools are command line tools where we must use commands for that. We all know hackers use Linux OS, so we hackers love terminals too but in Backtrack we dont have GUI ip scanner so we scan ip's by angry ip scanner application.

SQLInjection Tool For Windows

SQLInjection Tool For Windows

Download SQL Injection tool for windows, this tool helps you to attack an website by blind SQL Injection. Even though its very easy to use as every one can use it.

Thursday, 14 June 2012

How To Use Metasploit Framework

How To Use Metasploit Framework

Metasploit framework is an one of the famous framework which is used exploiting the machine on the internet.
This framework is biggest framework with more exploits on the internet.
It contains different types of exploits from Front-End to Back End.

Most Commanly Used Hacker's Language

Most Commanly Used Hacker's Language

Hackers use their own language to speak for them selves and create the tools according to their programming language and also their own language for showing their names online.

How To Use SQLmap For SQL Injection

How To Use SQLmap For SQL Injection

Now a days most of us think that sql injection is not working , but the thing is sql injection is working ofr the most of sites now a days.

Tuesday, 24 April 2012

What Is MetaSploit

What Is MetaSploit


Metasploit is an framework which is used for the hacking of different kinds of applications,operating systems,web applications etc.,
Metasploit contains various exploits, payloads,modules etc.,

How To Install VLC Media Player In Backtrack

How To Install VLC Media Player In Backtrack


To install VLC Media Player here is the following command:

How To Install Chromium Browser In Backtrack

Chromium browser is an Google Chrome version of Linux operating system.
In backtrack Distribution the chromium browser will be installed, but the problem is we cannot use the Chromium browser. It is because it root does not has the previllages to use that application.

Saturday, 3 March 2012

Open Present Location Of File Browser Using Command Line

Open Present Location Of File Browser  Using Command Line

Click start -> run -> cmd.

How To Create Virus That Continuosly Opens Notepad

How To Create Virus That Continuously Opens Notepad

1. Click on Start-> Run -> Notepad.
2. In Notepad Paste the following code.

How To Protect MIcrosoft Word Document

How To Protect MIcrosoft Word Document

1. In Microsoft Word, Go to Tools ->  Options.

Friday, 17 February 2012

How To Disable Autoplay In Windows 7

How To Disable Autoplay In Windows 7

1. Click on Start -> Control Panel.
2. In Control Panel, click on Default Programs.

How To Know The Version Of Windows

How To Know The Version Of Windows

Most of the people dont know the versions of the windows they use, so i discovered a simple command that brings out the version of windows.

Saturday, 11 February 2012

How To Add Open With Notepad On Right Click

How To Add Open With Notepad On Right Click

Most of the users like "Open With Notepad" when they right click on the file they want. So this is the tutorial for those who want open with notepad on right click.

How To Disable Your Computer Might Be At Risk Pop Up

How To Disable "Your Computer Might Be At Risk" Pop Up

1. Click on Start -> Control Panel.

2. In Control Panel go to Security Center , A pop up window appears.

How To Generate Passwords In Backtrack 5

How To Generate Passwords In Backtrack 5

There are two simple commands to generate random passwords in backtrack 5

4 Android Apps Used For Hacking

4 Android Apps Used For Hacking

There are many Android apps to hack but it find these apps user friendly and good working. These Apps are the must apps for an hacker.

Friday, 3 February 2012

How To Add Defragment To Right Click For A Drive

How To Add Defragment To Right Click For A Drive

Most of the users of windows defragments  Hard Drive for increase in performance of the PC.
So this trick will help you to place defragment to the right click of your Windows Explorer.

How To Add Control Panel To Right Click

How To Add Control Panel To Right Click

We need control panel in many ways but we want to open it as soon according to the usage its better to keep the control panel to the right click by simply following these steps.

How To Change Registered Owners In Windows

How To Change Registered Owners In Windows

You can show up your geeky skills when your friend came to your home and watch the registered owners on your PC.

How To Disable Indexing Service In Windows

How To Disable Indexing Service In Windows

Disabling the indexing service is the best way to save the RAM and CPU time. Indexing service makes your windows to run slower as it take much RAM usage and CPU usage. So disable the Indexing Service saves RAM Usage.

Saturday, 28 January 2012

How To Add RecycleBin To My Computer


How To Add RecycleBin To My Computer


Hmm you want to add recyclebin in your my computer yeah it is very easy just follow these steps.

How To Display banner on Windows boots

How To Display banner on Windows boots


1. Click on start -> run.
2. In run type regedit and hit enter.

Thursday, 26 January 2012

How To Create Short Cut For Hibernation

How To Create Short Cut For Hibernation


1. Right Click on the empty desktop area, you will find different

Wednesday, 25 January 2012

Change Win7 Taskbar As Vista TaskBar

Change Win7 Taskbar As Vista TaskBar


1.Right click on the taskbar, you will find properties.

Tuesday, 24 January 2012

How To Kill All iexplore.exe at once

How To Kill All iexplore.exe at once

1. To kill all iexplore.exe process you must write a simple command, the syntax of the

Hide Desktop Icon Text on Win7

Hide Desktop Icon Text on Win7

1. Right-click on the shortcut, and then Rename .

Monday, 23 January 2012

How To Run Linux In Web Browser

How To Run Linux In Web Browser

Most of the people who want to do commands or work on linux ,installs linux on vmware player.
There is an alternative for the people around by working on commands online on the web browser.
In web browsers most of the people use linux for the usage they want.

Saturday, 7 January 2012

How To Change Mac Address In BackTrack 5

How To Change Mac Address In BackTrack 5

Many of them asked me thar how to change mac address in backtrack.

It is very easy to change mac address in backtrack as we can change mac address to any in a minute by using simple commands.

Let's start.
1. Open Terminal.
2. In terminal, type ifconfig eth0 down.