21 January 2012

Explaining phishing to new-bies

what is phishing ?

According to wikipedia " Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures "


Basic concept of phishing

A hacker create a fake login screen of some of the most popular sites likes gmail, yahoo, facebook.

The secound that a hacker will do is to upload the file to some hosting sites like 3gb.com, 110mb.com or 100webhost.com.

Now the hackers phishing page is uploaded and working fine now he will try to send the address of the phishing page to the victim through email spoofing or try social engineering.

To know how about gmail phishing page click here

NOTE - All this is for awareness and educational purpose. Don't be crazy enough to fool innocents.

How to hack Gmail account through phishing

Hi friends I hope you all are fine today I am going to post on article for “How To Hack Gmail Accounts” using Smart Gmail Phishing. Their are many Gmail Phisher available on net but I must say they all are outdated and most of them are detected, So I though to create a new Gmail Phisher which is very new and also created by me.




This article is for educational purpose only, We want to make you aware how hacking is done, So don’t misuse this hacking tricks. We are not responsible for any wrong thing done by you. This How To Hack An Email Is Just A Demo. 

Steps To Hack Gmail Account :-

1. Download Gmail Phisher Gmail Phiser ^ bcoders (New And Updated Gmail Phishing Page)
    password : bcoders.blogspot.com
2. This is compressed in .zip so first extract the folder to desktop
3. Upload all three files to my3gb.com. Or Any Other Hosting sites
    To know how to upload file to a web hosting site wait for my next post .
4. Now shorten (name.my3gb.com/index.html) in goo.gl every time for new victim .
5. Now, you have to send this link to victim and make him login to our fake phishing page.
6. Once you came to know that victim logined to our Gmail Phishing Page then check log.txt.
7. In log.txt you will see his username and password .

All steps are done, By this method you can Hack Any Gmail Account Easily. But still we are one step behind. Its easy to create and set up a Phisher, Its bit hard to trap victim in our phisher. You have create new ideas which chatting and mean while have to trap victim. This method is known as Smart Phishing or Smart Gmail Phisher. By this you can Hack Gmail Account For Free
How To Defense From Phishing ?
Never enter your account information to the unknown webpage, always check the address bar and thus the webpage real address.
So friends, I hope you enjoyed this New Gmail Phishing to Hack Accounts.If u have any problem regading this just leave a comment 

20 January 2012

Newly created grounds of BCA in indian IT sector

If you are doing BCA then you must have encountered a situation where you have asked a question - why are you doing BCA instead of b-tech ?



So lets try to answer this very simple que . First of all according to the resent tabloid that suggests
the recent outburst of BCA in the Indian IT sector.  The sector that was once ruled by the MCA as well as the B.Tech and M.Tech candidates are shifting towards the candidates who have earned their bachelor level degree in the demanding course of Computer Applications. There were over twice the amount of candidates of BCA placed in the Indian IT sector as compared to the B.Tech, MCA and M.Tech in the last years.

These stable platforms provide the ideal kind of job as well as work experience that is required in thrusting the candidates in the right direction. Enabling the candidates to be a multi tasked labors is also a major reason why they have successfully captured the IT market, and especially in the Indian market, where this aspects is taken under serious consideration. In the end we observe a change brought about due to the over all change in the course structure of the BCA course.  There fore, there are quite a few factors that have given a shift to the recent trends, like the one discussed above.
Like wise, the course has also acted as a protagonist in the recursion play that was encrypted to the Indian shores from the western fronts. Thus, the fore play helped to shift the balance in the BCA candidate sides and they also made the most out of it. Therefore in the end, we do conclude the shift in the Indian IT market towards this way will create a big opportunity to the young inspiring minds of BCA graduates .

13 January 2012

Art Of Email Spoofing : Fake Email Generation

Welcome to the era of  trickery, where  you may be able to trust your some friends, but can no longer trust their e-mails. Identity theft is quickly becoming the biggest issue when it comes to e-mail, and it has a name: e-mail spoofing. 




Email spoofing is an act by which you can send mail pretending to come from any fake address( For example 'support@microsoft.com', 'admin@facebook.com' etc.). No matter if you have access to the  sender address or not, even no matter if the sender address exists or not. It is a very common strategy used among hackers and spammers. It is becoming so common that you can no longer take for granted that the e-mail you are receiving is truly from the person identified as the sender.




How does it work?
Email spoofing is done by altering the original 'sender email id', 'sender name' and other parts of the mail. This is because SMTP does not support any type of authentication.


There are many ways to do so, some are as following:
1. Using Command prompt
2. Using email desktop services like Outlook
3. Using Websites offering mail spoofing
4. Using php scripts, to built own mail spoofing website.




Some sites that offer mail spoofing, so that you can do some experiments and can understand about it. Some sites are :

1. http://emkei.cz/ (with advanced options)
2. http://deadfake.com/Send.aspx 

Note: These sites are tested and working fine for gmail.


 NOTE: This article is for educational purpose only. We are not responsible for any kind of harm you make to yourself or others.

05 January 2012

Download your entire Facebook data in few click

Go to your "Account Settings" on the upper right corner under the drop down box.

At the bottom of your facebook page you will find written Download a copy of your facebook data.

click on "Download a copy" highlighted in blue.

It will take you to this page:
click on  "Start My Archives" Before allowing you to download the data, facebook will send an email to your primary email account which is mentioned in your profile and you will be asked to enter your password again. Click on the link which is send to your email address it will take you to facebook downloading page.

NOTE : Click On Download Now to download the zip file containing all your facebook data. All of your data will be downloaded to your local drive but there isn’t any option to download selected data i.e. you can’t download only your photo album or your wall posts. Everything related to you profile will be downloaded as a bundle in a zip file. My download file was only 8.23 MB in size and its size primarily depends on photos/videos that you have uploaded on facebook. After unzipping the file, open index.html to access facebook offline.

How to calculate execution time of your C program

Here is a short C program that will calculate the time of 300 squares and 300 cube of i ( where i is 1,2,3........300 )

/* timer.c - simple example of timing a piece of code */ 
#include <stdio.h> 
#include <sys/types.h> 
#include <time.h> 
main() 

int i; 
time_t t1,t2; 
(void) time(&t1); 

for (i=1;i<=300;++i) 

 
     printf("%d %d %d\n",i, i*i, i*i*i);
   
   
   (void) time(&t2); 
 
   printf("\nTime to do 300 squares and cubes= %d seconds\n", (int) t2-t1); 
 
}
Here we have used function time(&t1) that will calculate the time before the execution 
of the loop and save its value at the address of t1 and another function time(&t2)
which saves time after the loop is executed. In printf statement we are printing the 
difference of two time which is the time in which the loop is executed . hence you can
use this technique to find out your program execution timing.
Note : don't forget to add library files before compiling your C program.