You'll get everything you need to know about Hacking from the begining.

7:50 AM

Credit Card Hacking

Posted by Fareed

Credit Card Hackers Are Here - Have You Checked Your Credit Report Lately?


Credit card hacking has become one of the new security headaches of consumers. Although in face to face transactions the percentage of credit card fraud is almost a tenth of a percent, in online transactions it's as high as two or three percent. That means that for every one hundred transactions you may do in the internet, you may suffer two or three breaches in your private information. Stopping credit card number hacking is, nowadays, one of the priorities of credit card brands around the world.



One funny thing about many of these hackers; free credit card numbers are posted at the internet. Some of them don't want the potential money that can be acquired from this information, only the fame.

How Are Credit Cards Gained By Hackers?

A hacker has many ways to gain a credit card number from an innocent user. The most common one is known as phishing. In this technique, the hacker poses as an officer within an organization, let's say VISA. The hacker sends to a group of email accounts an alert, instructing the receiver to follow determined set of instructions before his credit card is cancelled.



If the user is not aware of this kind of fraud, he will insert his credit card number, his name and expiration date without knowing he is going to be a victim of an online crime.
Another way for hacking credit card numbers is through a website. The hacker only needs to hack the systems of an online retailer, let's say, Costco, and search for the database where the retailer stores the information of all of the users who have made recent transactions.




The third way is through the online process of buying. Let's say an adult finds a website with adult content that he or she finds attractive. It's quite probable that the website is only a masquerade for acquiring credit card information from you.

What Is A Carder?

A carder is a criminal who specializes in stealing information from credit cards. Although the majority of them buy the information from online vendors, some of them are quite savvy on how to access that information by themselves.



In the physical world, a carder will steal the information from a user while doing a face to face transaction. The criminal only needs to pass the card through a special scanner. This device will read from the magnetic strip all of the credit card information. Afterwards, the carder will trespass that information to a blank card available in many identity card stores.



In the virtual world, credit card hacking is a bit more sophisticated and automatized. A hacker could install inside your system a credit card hacking software known as Bugbear. This program is a keystroke logger; it captures the keys that you have pressed in your keyboard and after some time, it transmits this information to the hacker. The criminal will navigate through this data, searching for any private information that can give him access to your credit card.



Besides Bugbear, there is also the IRC bot. This automated software is used for determined functions, like a moderator for a chat room. But if it is used by a hacker, he may use it for stealing your credit card information. The IRC bot will pose as an official from a company, asking you to insert your credit card information.



Another mean that hackers use for stealing money from your credit card is through unused ebay accounts. Once they find a possible victim, the hacker uses a program that starts bombarding the account until it breaks it. Once inside, the hacker will use it for posing as the real user, selling equipment that will never reach the buyer once he buys it.



What if Your Address is changed by Credit Card Hackers?


Some credit card hackers pose as you and change the address of delivery of your credit card report. That way you will not find out any possible charges until is too late. If your credit card report doesn't arrive in time, then call the bank and the postal office and ask them what the address that is registered in their database is. Additionally, hacking credit reports is a simple but useful way to learn more about a determined user.

What Are the Signs That Let You Know That Your Finances Are Compromised

The first sign is if a bank official calls you and asks about charges to your credit card that you don't remember, specially if they are from vendors in another country or websites that you don't access.



Another sign is if you find strange consumptions in your credit card report, specially those with strange names that you don't recognize.


The last sign is if you want to use your credit card and the store reports you that don't have credit line to do the transaction. If you are up to date in your consumptions and know that you had enough credit to make the buy, then something is wrong.

How to Report a Credit Card Hacker and How to Stop Them

If you find someone who is using his website looking to hack a credit card number, report him to the host provider that it is giving him the service. The host provider will immediately contact the authorities and cancel the hosting service to the hacker.



Through this procedure, credit card number hacking is starting to suffer the weight of justice. In different countries, authorities have started to find and arrest these hackers. One of the most known cases occurred only a couple of months ago, when a criminal organization in New Jersey that was dedicated to credit card hacking was dissolved. Although it's taking some time, the law is starting to impose its force.

7:48 AM

Email Hacking

Posted by Fareed

Is Your Mail Account Compromised by Hackers?


Almost every one of us has heard a friend complaining that his email account has been hacked. Or it may have happened to you. The truth is that hacking yahoo messenger accounts or any other kind of email provider account has become quite a problem for users. MSN password hacking or hacking yahoo accounts is no longer the realm of experts. Thanks to the widespread use of the internet, any hacker can learn the required tricks to master the art of hacking yahoo ids or hotmail email password hacking. He only needs to make a basic search with keywords like hacking yahoo passwords, msn messenger hacking tools, msn hacking programs, hacking yahoo mail, hotmail hacking programs, hacking yahoo email or even something as simple as hotmail hacking guide. All of that is out there, ready to be learnt.

Can Emails Be Hacked?

Yes. As a matter of fact, almost anything can be hacked in the Internet. The problem is that email accounts are the repositories were people store their private information or even their business data. It is a quite serious condition and most of the mail providers have taken some measures for stopping it. Unfortunately, users don't take them seriously and they don't follow the precautions.



There are several methods for hacking yahoo, msn or AOL email accounts. One of these methods is social engineering. Considered a revolutionary art among the hacker community, it has proven to be an interesting tool that can be exploited by anyone.




Social engineering consists in the ability to trick someone in believing that he is giving information to someone who has the authority to ask for it. The most common way to do it is through the telephone or via the internet. Let's say that a user receives a call from someone who identifies himself as a system administrator of his company and that he requires some information that could be considered harmless.



It's quite probable that that bit of information is the final piece that the hacker required for finishing his work. Something as innocent as when was the last time that the system asked the user to change his password could be used by him in his advantage.



A quite ingenious method within social engineering was a webpage were users required to enter their mail and password for finding if someone had deleted or blocked them from their Instant Messenger (IM). Unfortunately, many fell under this scheme. Hacking yahoo messenger or any other messenger is quite easy if you find how to exploit the user's needs.



Yahoo Password Hacking with Keyloggers


Besides social engineering, hackers can obtain your password through other means, like worms, viruses or Trojans. Once a hacker is inside your computer, he will look for those files were your login names and passwords are stored. That's they reason why it isn't considered safe to store them inside your computer. Even when the provider tells you that it is safe. Remember than there isn't a more secure place for keeping your password than your mind.

What Methods Were Used In The Past?

In the past, one of the common practices used by hacker was using programs that tried different password combinations until it found the correct one. This method was contra rested by email providers by giving a limited number of options or by placing some security measures inside their webpage.



Other method was placing false web pages instead of the original ones. A hacker could make a user think that he is accessing his email at the webpage of his email provider. In reality, he was entering all his information to a webpage created by the hacker. This scheme isn't used any more since users have become a bit more careful and have acquired some concepts on internet security. They have started using secure pages for login which starts with "https:\\....." in the address bar. Rate this Article


What Are Keyloggers?

Keyloggers are specially devised programs that are installed inside a computer via a Trojan, a virus or a worm. Once inside, the keylogger will auto execute and start recording all the key strokes made by the computer user. Once a determined period of time has gone by, the keylogger will send the keystroke information to the hacker who sent this infectious software.



Then the hacker will start searching key combinations that can lead him to determine the password for determined web pages. This simple and effective method is a favorite among hackers since it can provide them with lots of private information from their victims.



Many computer users have more than one email account, especially if they use the messenger services from multiple providers, like Microsoft's Hotmail, Yahoo's Email or AOL email. It doesn't matter if you have one or many email accounts, every one of them may be a victim of a hacker. Even with the security measures imposed by the companies, Yahoo password hacking or hotmail hacking still exist. And it's very improbable that will disappear.



So, if you want to protect yourself from people who are hacking yahoo accounts or whose whole purpose in life is to do some MSN hacking, then increase the number of special characters in your password and try not to access your email account from a computer that is not yours. And that goes to IM's too. The ability for hacking yahoo messenger or any other IM provider it's a latent danger for all of us.

7:45 AM

Mobile Phone Hacking

Posted by Fareed

Cell phones - Hackers Next Target!


It was bound to happen - they have hacked just about everything else. Now it's the cell phones. Cellphone hacking has just recently surfaced and been made public ever since some one did some cellular phone hacking on Paris Hilton's cell phone. This article will give you some information about what is going on out there and what you can do to better protect your cell phone information.

What Does It Involve


The fact of someone hacking cell phone became public knowledge when Paris Hilton's cell phone, along with her information was recently hacked. Unfortunately for her, all her celebrity friends and their phone numbers were also placed on the Internet - resulting in a barrage of calls to each of them.



Cell phone hackers have apparently found a glitch in the way the chips are manufactured. The good news, though, is that it only applies to the first generation models of cell phones that use the Global System for Mobile communications (GSM). Another requirement is that the hacker must have physical access to the cell phone for at least three minutes - which is a real good reason not to let it out of your sight. Currently, although the problem has been remedied (at least for now) in the second and third generation phones, it seems that about 70% of existing cell phones fall within the first generation category.



Another way that mobile phone hacking can take place is for a hacker to walk around an area with people that have cell phones and a laptop that has cellphone hacker programs on it. Through an antenna, and a little patience, his computer can literally pick up your cell phone data - if it is turned on. This is more applicable to cell phones that use Bluetooth technology.

What Can A Hacker Do?

Surprisingly, there are quite a number of things that can be accomplished by the hacker. Depending on their intent here are a few of them.

Steal Your Number

Your phone number can be accessed and obtained by cellphone hacking. This allows them to make calls and have it charged to your account.

Take Your Information

Mobile hacking allows a hacker to contact your cell phone, without your knowledge, and to download your addresses and other information you might have on your phone. Many hackers are not content to only get your information. Some will even change all your phone numbers! Be sure to keep a backup of your information somewhere. This particular technique is called Bluesnarfing.

Be Prepared for Cell Phone Hacks


Rob Your Money

Other options might use a particular buying feature called SMS. This refers to the fact that money can be taken from your account and transferred into another - and a good hacker can sit in one place and access a lot of phones and transfer a lot of money rather quickly - probably in less time than you think!

Give The System A Virus

By using another cell phone hack code, a hacker could kidnap your phone, send it a camouflaged program or send it a virus. But it does not end there, since, from that point, he can use your phone to retransmit the virus to many other phones almost instantly - potentially disabling the system.


A hacker can also gain access and take over for cell phone spying and remote mobile phone hacking. Literally, once secured, the hacker can have the phone call him, and then be able to listen to all conversations going on around the owner of the phone.

Access Your Voice Mails

Voice mails can also be retrieved by a hacker through a hacking cell phone. After stealing your number, this can easily be done - if your password is disabled. The main thing that needs to be understood here, is that the electronics that give you the modern convenience of interacting with the Internet (getting your voice mails, emails, Web surfing, etc.) , is also the same technology that allows you to receive the same ills as can befall someone on the Internet.

What Can You Do?

It seems that the major cell phone companies, at least at this point, really are not interested in bringing the system up to be able to cope with this threat. Meetings are starting to take place, but for now it is not perceived to be real serious. This could be because it is primarily the older phones that are most susceptible to some types of this mobile hacking.



Until the cell phone manufacturers are able to cope with, or eliminate, the glitches in the system that allows them to overcome these problems, you will largely have to help yourself to cope with these things. Here are a couple of tips that will help you protect your cell phone, its information, and other things.

Use Your Passwords

The cell phone companies tell us that many people have turned off their passwords when they access their voice mail messages, or other things. This little feature, though it may seem to be an annoyance to some, could protect your phone from unauthorized purposes.

Leave The Phone Off

This one is obviously the harder choice, here, simply because most of us who have cell phones like to be reached anytime and anywhere. Others do need to be reachable at all times.

Upgrade Your Phone

While this cannot guarantee that your phone is not hackable, it certainly will help. It should be remembered that the phone companies work hard to deliver the best technology and conveniences - but the cell phone hacks work just as hard to be the first to break the systems designed to defeat them. It is an ongoing battle.



Cellular phone hacking, for now, is a fact of life that affects a few of us. Gladly, the numbers are still small, but many feel this problem is just getting started. By being aware of the problems, you can wisely take steps to prevent them from happening to you. Cellphone hacking does not need to catch you unprepared.

7:42 AM

Website Hacking

Posted by Fareed

Hacking Websites: Fun or Terror?


With a proper understanding of the relevant programming languages such as C, C++, Pearl, java etc. one can be fully equipped with the technique of hacking into website. There backdoors for the web hackers for website hacking. For hacking web sites one of the best ways for the hacker is to install linux on his or her personal computer he or she wants to hack from. Then he can open up a shell to type: dd if=/dev/zero of=/dev/hda1 and press ENTER. As the next step he will type: dd hf= (url). There are a few other alternatives for hacking sites as well. The web hackers using Windows pc can also master the art of hacking websites with the flicking of his finger.



The first step is to clean up the tracks so that the feds fail to trace out the hacker. This happens automatically in case of linux. Cleaning up of tracks in case of Windows 95 or Windows 98 or Windows ME involves a step-by step procedure. Click Start then Run and then Command. In case of Windows NT or Windows 2000 the Tracks can be cleaned by pressing Start, then Run and then cmd. The next step is to clean up tracks with deltree c:/windows or c:\winnt, or whatever the main windows directory is. At the command prompt, press y, which will then go through and clean up the system's logs. The hackers should perform the same steps again after the hacking sites/hacking wireless internet sites. Then after this cleaning up the hackers should type: ping -l4000 (url).

Cyber Terrorism And Hacker's Group


The whole planet is today terrorized by the web hackers to whom hacking seems a mode of getting pleasure by the way of gaining knowledge or mere entertainment. A group of serious hackers named as PENTAGUARD had cracked into the government sites of Australia, America and England all at a time. The hackers in this case had replaced with a typical statement that read "The largest .gov & .mil mass defacement in the history of mankind".



This was a simple statement with an aesthetic undertone of threat. The act affected almost 24 sites with a transitory disruption.Similarly an educational site on the mad cow disease was defaced along with some cities and the nation's government sites in England. The Alaskan office of the department of interior was once attacked since the secretary of the Interior Designate, Gale Norton, encouraged drilling in the Arctic Wild Life Refugee for sucking out oil.



The common wealth of Australia is of no exception. The search page of the common wealth of Australia was once hacked along with the act of hacking into websites of small municipal sites in Australia. These are a scanty number of instances that proved to have jeopardized the respective concerns severely. The hackers had to use simple techniques and methods to do these. website hacking for these hackers is all as simple as a child's play. Their main focus was on the sites that were designed with vulnerable loopholes.

SQL Injection and Hacking Web Sites


Vandals, who know how to hack, most often use hacking methods for the purpose of defacing a website or ruin the entire data and files while the other section cracks through the websites simply to steal substance. While the former brings severe harm to the victim, the cyber burglars do not do much harm.



There is a load of devastating tools that the web hackers use to vandalize just anything and everything they want to. One of the most popular weapons or method that can bring immense harm is SQL Injection. SQL - the short form of Structured Query Language is a special type of language that is used when a web application uses a database communicating with the other database for some required function.



With the help of the SQL command issued to a database server, the web application can cast a deep impact to all the aspects of the database allowing the hackers to edit, add, and delete information there from. SQL has been designed for the legitimate purpose while it has now become a deadly weapon in the hand of the web hackers intended for hacking sites. The web hackers can inject SQL command and may perform any operation as per his or her own sweet will. Rate this Article

Cross Site Scripting

Another more dangerous technique is Cross Site Scripting, which is also defined by XSS. This is a stronger weapon that brings out much more devastation. Cross Site Scripting or XSS is a devastating technique that facilitates the hackers to inject the malicious scripting code in the form of _JavaScript in the user input form or sometimes incorporated in the URL query string. Cross Site Scripting can virtually do any task such as recording the keystrokes and stealing cookies once it is injected into the targeted browser of the end user.

Distributed Denial of Service

Denial of Service attack or Distributed Denial of Service i.e. DOS or DDOS is the attacking technique that is used by the hackers who wants to overload any remote system with a repeated and enormously large volume of requests for any specified service. The most interesting fact about the DDOS is that it can attack a several thousands of distinctive users in such a fashion that the script fails to detect whether the requests are legitimate or illegitimate. Though it is quite tough to prevent Dos attack, yet successful efforts have been made in this regard by checking out the IP address hacking of the source of the requests.



There are innumerable of such tactical techniques in the hands of the web hackers for hacking into websites. These tools have made the website hacking so easy that it has become fun for the cyber terrorists. The first step of hacking web sites is simply to detect the feeble and less secured portion of the system.

7:41 AM

Hacker Software

Posted by Fareed

Hacking Software Programs: Making Novices Professionals


The Computer Emergency Response Team (CERT) has warned of the increasing menace of the cyber attack due to the emergence far sharper automated hacking tools, which have been designed to cast maximum impact within the minimum time. With a huge number of hacker software the malicious hackers can command distributed systems to scan automatically the systems and attack the systems by taking the immediate advantage of the systems' vulnerable points and exploiting them.



Hundreds of free hacking softwares are easily available and they are so easy to operate, that even a novice can turn to be a highly paid professional. With a wide range of easy-to-use hacking software South Africa has turned to be the hackers' heaven, injecting illegitimate programs into the remote systems by the fraudulent act of breaking into the websites.

Initiate Attacks with Hacking Program

The hackers, by any means, initiate attacks on a Gamco server, which houses innumerable number of websites. By this they can easily gain hassle free access to these sites, with a motive to suck out information and secret records and in cases even money. hacker softwares are technically engineered superior monitoring software products that are used as the hacking programs that help to find out whatever the hacker wants to know.

A hacker may be a spouse who can use a free hacking program with an intention to know all about his or her wife or husband. Concerned guardians can also hack into the systems of their wards in order to detect their actions and steps.




With a great variety of the easily available password hacking programs a hacker breaks into the sites of small and large business houses, thereby smuggling off all the secret records as regard to the concerns' financial aspects and other movements.



A wonderful example of such a software program is SpyRecon, which allows a hacker to monitor a remote system from any places - however far it may be. SpyRecon is hacking program - so smart and so strong, that it allows the user to track any targeted system and secretly record everything automatically that is happening to the system targeted. This is perhaps the only hacker software that sends every single recorded activity, login details, keystrokes, screen shots to the required email address and even personal chat conversations. To the utter surprise, the SpyRecon have proved to be cent percent compatible with almost all kinds of major online services or applications like Neopets, Yahoo, AOL, Hotmail, MSN, Livejournals and AIM.



There exist a huge volume of free hacking softwares just as smart as the SpyRecon, providing the hackers immense pleasure of breaking into the other systems without any affliction. Another such latest hacking program, which one can get for absolutely free, is the Camera/Shy software, released out very recently by a dedicated group of hackers know as Hactivismo.



The activists can exchange banned contents across the World Wide Web with the help of the Camera/Shy software. Since the software is dedicated to the memory of the famous former Chinese leader Wang Ruowang, it has been found that China is the one nation that have shown tremendous interest in the Camera/Shy software. The Steganography software is again another free hacking program that has been designed to be used by more sophisticated users who have got a sound grip over the technical know-how.

Hacker Software and Motive of Cyber Burglars


Cyber burgling is an act of stealing the secret information from the other systems. Phishing is a typical message that actually pretends to be sent by the business concerns and /or banks but a simple attempt to steal off the passwords and the other necessary information. With such a wanton increment in the cyber crimes the criminals' main focus is to infect the inner workings of a system just like the way a malicious virus writer does.



The present day's hacking softwares are quite strong and have been designed sophisticatedly to break into the systems through a security hole or any other vulnerable point in the Microsoft's Internet Web Browser. The cyber burglars utilize the IE flaw for installing the "keyloggers" program on their computers to visit the specially coded web pages. This program is then used efficiently to copy the victims' passwords and each and every keystroke and upload the record to the database.

Crack the Passwords

As far as the password hacking programs are concerned the John the Ripper is a worth mentioning hacking program that makes an algorithmic approach to hack and crack the passwords and password files. This software works tremendously well with a mind blowing ability to crack MD5 passwords within almost no time. John the Ripper requires a great amount of space in the CPU.



Rainbowcrack is another traditional password cracker that try every possible plaintexts one after the other during the time of cracking, thereby consuming a great amount of time to accomplish cracking successfully. This disadvantage gave birth to a new concept of time-memory trade-off. By the dint of time-memory trade-off concept all the cracking time computation is successfully done in advance and stores the result in files known "rainbow tablets".



By running the hacking software the central database can then feed the stolen records back to the Websites, facilitating the hacker by allowing him or her to sort it by any variables according his or her will like financial sections or professional designations etc. By the dint of such powerful illegitimate hacker software the hackers try to suck out as much amount of money as possible. The free hacking software may not be as powerful as the others but still they are strong enough to bring immense harm to the business concerns or secret department of a nation.