Tuesday, August 25, 2015

Phishing Facebook with Mail form NEW

Step 1. Create a Wapka site
And Register Your Wapka Id
After That
Login To Ur Id Using Wapka Passport [ wapka passport means wapka email id ]
 








IF YOU DONT HAVE WAPKA ID YOU CAN MAKE IT 
After Login to ur Account Select your Site (my site is hdphishing121.wapka.mobi )

 








step-2 . Go to Admin mode










Step 3:Click On Edit Site 











Step 4. Click On mail form










 Step 5. In 1st Box Type Login and Then uncheck captcha ..











Step 6.Now click on Source code viwer and get your ID of your Site ..See Screenshot Below 










Check above setting for Source code viwer and submit 









Find your code and save it.........













Step 7: Now we have to hide mailform so other cannot see accept Admin
SO Go to Edit Site >> User  >>  Item Visiblity and then make mailform X-Visible in only Admin Mode












Step 8:
Got to the below link and copy the CODE one by one
goto Source code 1   copy code and find this ""XXXXXXX">" and add your code  at XXXXXX   
Now copy that goto EDIT SITE>> and upload at WXL code 

                











 Now paste code in XML/WXML Box which is in Edit Site












Step 10: Now Copy code from second link and just past at XML/WXML ...
   goto Source code 2  simply copy it and again EDIT Site >>Wxm code and paste

Now click on edit site > WML/XHTML code













 Ta da.....Your Site is Ready................

















Remember that the 2 Codes must be posted in the TOP OF THE MAIL FORM
Remain Sequence 



THATS ALL
YOU HAVE MADE A PHISHING PAGE !!!!!!!!!!!!!

What is the importance of backlink and Page Rank?

BACKLINKS ARE SOMETHING WHICH EVERY ONLINE PUBLISHER/AUTHOR TALKS ABOUT BUT THE QUESTION ARISES WHAT THE HELL BACKLINKS ARE ACTUALLY? IN THIS ARTICLE I WILL EXPLAIN FROM THE BASICS TO SOME ADVANCE LEVEL ABOUT BACKLINKS, MAKING WHITE HAT BACKLINKS AND THE IMPORTANT OF QUALITY, RELATED AND RELEVANT BACKLINKS.

The questions which we will be covering in this post are What is a backlink? What are internal and external links? Why is it important to have quality backlinks? What are quality backlinks? What is page rank? And What is Dofollow and Nofollow?
What is a backlink?

In simple terms backlink is a HTML clickable link from any site to your site or website page.The link should be the URL or web address on your page.

This simple means that if any other website puts a link from his page to any of your page in your website then it is counted as a backlink. The link can be in any form, it can be a text, picture or a button- the main thing is that by clicking on it the browser should open your page in the same window, another tab or in another window.


What is the difference between internal and external links?

An internal link- points to a page in your own website or blog. For example if you write any blogpost and post a link pointing to a page in blogger will be termed as an internal link.An external link- points to a page in another blog or website. It means that any link not containing blogger as the starting address is an external link. For example if you add a link from your Blogspot blog to any other bloging site then it is a external link.What is the need to create backlinks to your articles?Backlinks are created for two reasons:
  • For referred traffic- Whenever people see a link with anchor text (explained below) that interests them then they will visit your page through that link.
  • Search engine reputation- Search engines give any page some value or let’s call it points. Now if there is a link in that page to another page especially an external link then the points for the page whose link is given increases. So a backlink in simple terms has the power to increase your search engine ranking.

How to create the best backlinks?Not all backlinks give you the maximum profit. A few things are to be taken care of to make quality backlinks:
  • Anchor text- The words which are used to create a link are called anchor text. It is important that these words point to the subject matter of the page which is linked. An anchor text with unrelated anchor text will do no good.
  • Subject of article- Not only the anchor text but the subject of the article also matters when creating a backlink. For example if you create a link from a food recipe article to a Windows related article then such a link is going to do no good. People who have to come to see recipes are rarely going to be interested in Windows related articles. Therefore it is better to link to sites having similar subject matter as you.
  • Site quality- Opening a Blogspot blog and writing a small article for the sake of a link is not going to do any good to you. Nor you will get any referred visitor but search engines too won’t give you any points for link from such a site. Now for example if you are able to get a link from Microsoft to a Microsoft related article in your site then it is the best you can do.

Are all backlinks good or at least harmless?No, this is not the case. However most will say that it is not the case and even I don’t have a proof of it but it is suggested to avoid backlinks from:
  • Spam or adult sites unless your own site is an adult one.
  • Articles which have no relation to the article you are linking.

However I do not say that it is a total waste of time to get a backlink from a less reputed site even if the article is related. Who knows that site just might become famous one day and in such scenario that backlink is going to be highly profitable to you. And as higher quality links are hard to make you should not entirely avoid making low quality backlinks.
What are the places where I can easily make some backlinks?There are some easy ways to get backlinks. Here are a few:
  • Forums- Some sites allow external links in forum footer or otherwise in quality responses or reputed users.
  • Blogs: Search for blogs having similar type of content by using Google search (“inurl:blog” (your subject) and in the quality blogs leave a valid comment and include backlinks to your site through it.
  • Answer sites- Sites like Yahoo! Answers or Answerbag. Note that Yahoo! Answers requires you to be at least on level 2 to make links.
  • Blog directories offering Dofollow links like followlist
  • Social Bookmarking sites like Digg, Stumbleupon, Twitter, Facebook and redgage
  • Through guest posts- This is the best method however requires time to create a quality article which most blog owners except and offer Dofollow links in return.


Difference between Dofollow and Nofollow
If you are not even a basic technical person or have just learnt a few HTML tricks then you can stop now. All the important points about Backlinks have been discussed above. However if you can understand a few basic HTMLs and a comfortable will very basic coding then read on to know a little more about backlinks.
Google and other search engines have provided authors some controls to authors to tell the search engine bots how to consider a particular link. By adding some attributes authors tell bots what to do with a link.Nofollow attribute tells the Google bots not to follow the linked page. This also stops from your points being donated to the linked page. Therefore Nofollow links do not help in increasing your site reputation in search results.Dofollow tells web crawlers that it is okay to follow the other page and that we recommend other page. These links improve your search engine reputation.These tags do not interfere with the working of links for a human user and are only for the Web crawlers or search engine bots.

What are paid backlinks?
Some reputed website owners night ask you some amount to create backlinks to your site. In such a case the backlink can be called a paid one. However I suggest no to pay for backlinks. There is no dearth of reputed sites which will offer backlinks with just some quality write-ups.

Is it possible to create too many backlinks?
No, it is very difficult to get backlink from reputed sites leave aside creating too many backlinks. However there are some black hat methods where some people offers some xyz number of backlinks for a payment. I suggest not going for such offers as these backlinks are created in low quality websites which might be taken up as Google as link spamming and instead of increasing your sites reputation it might end up harming it.

What is Page Rank (PR)?
Page Rank is given by Google which ranges from 0 to 10. All websites start their PR from 0 and the higher a site has its PR higher the placement of their articles in the search engines. A lot of things help in determining the PR of a site. I have seen sites getting PR 3 within a span of 3 months as well as in 6 months. One of the site I am talking about is Thoughtfromgeeks which got its PR 3 in just 3 months and the other site is Googleplustips which got PR 3 in 6 months. As I was personally associated with Googleplustips I know that it got that rank due to the quality content and timely posting of the relevant articles. GPT got its PR 3 with just 60 articles. As for Thoughtfrokgeeks, backlinks and quality content help them get that PR.
Please note that SERP (Search Engine Results Page) is one thing and PR another. SERP is where you rank in search for a particular or set of keywords whereas PR denotes the overall ranking of the site. However, if you have high PR then your SERP will also be high.

Is site’s PR the same as page PR?

Most backlinks will point to the landing page and not the Homepage.Pages within the site will obviously have more value if the Homepage is ranked higher. However it is not suggested to link the Homepage unless the article at other site is specifically about your site. The rank of the site should be increased by increasing the rank of the internal pages.

Are advertisement links also counted as backlinks like of Adwords?

No, the ads of Google or other advertising firms are Nofollow and hold no value in search engines. There are not even read by the search engines. Moreover as they keep on rotating they wouldn’t hold any value in any case.

Wednesday, August 19, 2015

Wanna be a hacker then Read This ! ! !




Ah! so read the following:-
1. Learn TCP/IP, Basic Information gathering, Proxies, Socks, SSL, VPN, VPS, RDP, FTP, POP3, SMTP, Telnet, SSH.
2. Learn Linux, Unix, Windows – You can do this using vmware or any virtual desktop utility.
3. Learn a programming language that’s compatible with all OS – Perl, Python, C, ASM
4. Learn HTML, PHP, Javascript, ASP, XML, SQL, XSS, SQLI, RFI, LFI
5. Learn Reverse engineering and crack some programs for serials easy ones like mirc, winzip, winrar or old games.
6. Code a fuzzer for common protocols – ftp, pop3, 80, 8080 –
Pick some free software like ftp server, mail server, apache or iis webserver or a webserver all-in-one pack, or teamspeak, ventrilo, mumble.
7. Code a tool that uses grep to sort out unique code in source codes.
8. Make a custom IPtable, IPsec firewall that blocks all incoming traffic and out going traffic and add filters to accept certain ports that your software or scripts use.
9. Pick a kernel in linux or unix, also pick a Microsoft OS version
lets say Winxp pro sp2 put them on the virtual desktops (vmware) and find and code a new local exploit in those versions,
then install a Apache webserver on the Linux/Unix and a IIS webserver on the winxp pro and attempt to find and code a new local reverse_tcp_shell exploit.
10. Learn Cisco Router and Switch configuration and setup.
11. Learn Checkpoint Setup and Config
12. Learn Wifi scanning, cracking, sniffing.
13. Pick a person in you phonebook for the area code you live in or city then ring the person on a anonymous line like skype or a payphone or a carded sim and attempt to social engineer the person for his name, address, data of birth, city born, country born, ISP connected with, Phone company connected with, What bank he/she uses and anything else you can get.
Then Attempt to ring using a spoof caller ID software with the person’s phone number – call the ISP and try reset the password to his/her internet connection/web-mail, get access to bank account or ask them to send out a new *** to a new address (drop) with a new pin, reset of phone company passwords.
14. Use your information gathering skills to get all the information off a website like a shop then use the spoof caller-id software or hack your phone to show a new number of the Webserver’s Tech Support number then ring the shop owner and try get the shop site password.
15. Do the same thing but attempt to use a web attack against a site or shop to gain admin access.
16. Once got access upload a shell and attempt to exploit the server to gain root using a exploit you coded not someone else s exploit.
17. Make your own Linux Distro
18. Use your own Linux Distro or use a vanilla Linux gnome (not kde) keep it with not much graphics so you can learn how to depend on the terminal and start from scratch install applications that you will only need for a blackbox (Security test box), make folders for fuzzers, exploits, scanners..etc Then load them up with your own scripts and other tools ( By this stage you shouldn’t need to depend on other peoples scripts).
19. Learn macosx and attempt to gain access to a Macosx box whether it be your own or someone’s else.
20. Create a secure home network and secure your own systems with your own Security policies and firewall settings.
All this isn’t a over night learning it will take a nice 1 – 2 years to learn a bit of this 3+ years to learn most of it and even then you may need time to keep learn as IT keeps changing ever day.
As long as your dedicated to learning you won’t have any problems to become a hacker

Sunday, August 16, 2015

What is hash ?

When we open an account with any service provider, we are first of all giving them the password to our data. What happens then if it gets exposed in case of software vulnerability.

The problem with password is that you need to store the damn thing so you can access it later on to authenticate a login attempt.If the file is stored somewhere on the disk there will be a way to access it and the game is over.You might be thinking that such a file could be encrypted ,but then you just have another password to save somewhere.

This is where hash came in.

A hash is comparable to a persons fingerprint.A hash of any data is a fixed size "fingerprint" of that data.If we convert a piece of data say a password into hash, then it is not possible to get back the original data. How then such a password will help in securing passwords or even exposing them?

If a data is converted into hash, the computed hash will always be same for that data.Therefore is an application chooses to save password it saves its hash instead of plain text. And whenever user enters password it checks that it matches with the stored hash or not.A weak analogy case would be, you cannot get milk from curd, but you can check if a whit fluid is milk by seeing if it curdles.

A hash is different from encryption, since encryption by its very nature has to be reversible, which hash is not.

During registration system password hash is stored in its database and not the password.

And during login when user enters password its hash is computed and checked with the stored hash and if it matches the user is authenticated.

A popular hashing algorithm is MD5 (Message Digest algorithm 5) which always produces a hash of 128-bit.So for any input, whether is a 3-character or if it is a video file of a few gigabyte,the hash which MD5 will produce will be just 128-bit long.

Another hashing algorithm is SHA-1 (Secure Hash Algorithm) which produces 160-bit hashes.SHA-1 has been superseded by SHA-2, which has has four function that produces hashes of 224bit,256bit,384bit or 512bit.

Hashes can be used for other purposes than just securing passwords.You might be familiar with their usage by download sites for verifying the integrity of download.A download site may provide the MD5 and SHA-1 hash which is used to verify that download is error free,complete and intact. Any difference in hash will mean that the download is corrupted or malicious.Torrent file uses SHA-1 hashes for each piece of content you are downloading. In torrent downloading is done by dividing files is many packets and each packet has its hash. So if there is any type of error only that piece can be re-downloaded.

Evil Twin attack

Evil Twin Attack is attack is frequently carried upon wireless access points with malicious intentions. This attack happens when...