Know how to hack in easy way

Friday, 5 September 2014

On 01:45 by chandan singh in    No comments
Batch Virus is very interesting way to make you friend fool.
This is Only for prank actually it does not make any harm to your friends computer.
Below are the steps you have to perform to make prank on your friends.
Step 1: Open you notepad or any text editor installed on your computer.

Step 2: Copy the below code to your text editor.

@echo off
echo System check
echo -
echo -
echo RAM - Corrupted
echo -
echo Norton - FAILED
echo -

echo Virus infecting: ****-****-****-8894
echo -
echo your hard drive corrupted
echo -
echo -
echo Starting to reboot hardrive.
echo -
echo Do not attempt to quit.
echo -
echo Restart after 10 minutes approximately.
start Internet Explorer.bat

Step 3: Save your file now with any name with extension .bat

Step 4: Now send it to any friend through mail. When he/she will click on this file then this batch file will executed automatically.
You can try it on your system. Its not any harmful virus. It just a prank.

Wednesday, 30 July 2014

On 15:14 by chandan singh in    No comments

What is Hacker?

Hacker is person like Us, But he or she has great ability to think out of the box. He can think differently than other.
We can take hacker as in our daily life because if you know your work very well than others then are the hacker of that work.
But Here we are taking hacker in field of Web application hacking, Network hacking etc. So to be hacker he or she has to be the good knowledge of programming skills, different Operating system, Networking, protocols, understanding of application you are going to hack. To become a complete hacker is not an easy task. Hacker have to keep update himself from New vulnerability, New attacks, Bypass, attack vectors, New technology in web application, etc. So they have to study alot, research.

Skills Need to Become Hacker

  1. Understanding of programming concepts
  2. Operations of different Operating System
  3. A lot of Patience
  4. Understanding of application architecture
  5. Understanding of SQL
  6. And keep researching

You can Start Hacing with google hacking

Then After you explore differne type of vulnerability. Here you learn how to attack on application what are the different attacker, Vulnerability etc.

To be the best hacker always keep researching that what new technologies comming into the market, What new attacks are possible, New vulnerabilities are comming.
If i forget somthing then comment me i will update

Note: Do Not perform attacks on real live website otherwise you will be behind the bars. I am not responsible. This tutorial is for Educational purpose only.

Friday, 4 July 2014

On 23:18 by chandan singh in    No comments

Google Dorks | Google hacking

This post is also written by me on my website you can check out -Google Dorks

May be many of you don't know how google search engine power. Most of the time when you search any unusual thing on the google or any search engine you did't get perfect result that you want so at that time what can you do? and how you can get more accurate result from google search.

This post is all about Google hacking. Google hacking doesn't mean i am going to tell you how to hack google website or google server.
Google hacking real mean is how we can make our search more accurate and how can we decrease the number of search result so that we can get what we want using google dorks.

What is google dorks

Google dorks is also a query to the google but these are not usual as we all write to search on google. Google dorks are the filters which filter the unwanted search results and reduce the number of search result and make efficient search result. Click on the link to see full post google dorks

Thursday, 17 April 2014

On 14:29 by chandan singh in    No comments

How to hack - Website with Google Dork

How TO Hack Any Website with Google Dork

This hack is done by an exploit called PHPmyadmin Exploit.

Introducing the Dork: allinurl:index.php?db=information_schema

Using this dork you can bypass username and password and can also edit schema of that website.
You can see whole database or edit or delete it without knowing admin panel username and password.


Search on google: allinurl:index.php?db=information_schema

After that you will get many results. you can choose any one.
and click on the link.


Now you have the whole database of the website. Now you can do whatever you want. You can see the admin username by just finding users table in the database. you can see and update , delete the record in the database. for that you need some knowledge of databse or phpmyadmin.

what you can do Now?

  • you can see all username and password of users using this hack .
  • you can edit database of that website using this hack.
  • you can delete the tables and data using this hack.
  • you can also compromise the server using this hack.

On 13:46 by chandan singh in    No comments

The Heartbleed Bug

Heartbleed is vulnearbility in the very popular Openssl cryptographic software.
This vulnerability allows the attacker to steal the users's information. SSL/TSL provides the communication security and privacy over the internet applications such as, web , email, and VPN,
Heartbleed allows everyone to read memory of the system protected by the vulnerable version of OpenSSL.
This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.

Am I affected by the bug?

You are likely to be affected either directly or indirectly. OpenSSL is the most popular open source cryptographic library and TLS (transport layer security) implementation used to encrypt traffic on the Internet. Your popular social site, your company's site, commerce site, hobby site, site you install software from or even sites run by your government might be using vulnerable OpenSSL. Many of online services use TLS to both to identify themselves to you and to protect your privacy and transactions. You might have networked appliances with logins secured by this buggy implementation of the TLS. Furthermore you might have client side software on your computer that could expose the data from your computer if you connect to compromised services.

How to Find Out if Heartbleed Affects You

There are a few free resources available to help you with this:
McAfee Heartbleed checker
fillipo heartbleed checker
lastpass heartbleed checker

Change your password

If you are using your old password till now for different websites like email, Instant messanger, Admin panel,etc
Then its time to change your password.

More on Heartbleed

Official website

Saturday, 1 February 2014

On 19:17 by chandan singh in    2 comments
On 19:15 by chandan singh in    No comments
On 19:12 by chandan singh in    No comments
On 19:09 by chandan singh in    No comments
On 19:07 by chandan singh in    No comments
On 19:05 by chandan singh in    No comments

Monday, 23 December 2013

On 00:32 by chandan singh in    1 comment

Online Coding jobs,Projects, Web Designing, Part Time work without investment

Get custom programming done at!
Hello guys I am here for you guys,
Now Get online job, like following:

  • Online Part time coder job.

Just Click on any of the image:Get custom programming done at!

Get custom programming done at!

Monday, 7 October 2013

On 23:01 by chandan singh in    14 comments

Microsoft Windows offers a feature-rich interface and
several customization options that make it one of the most user friendly
operating systems in the world. However, computer geeks would still love to
hack the windows registry so as to add more extra features and functionalities
to their operating system.
If you’re one such geek who would like to customize windows
in your own way, here is a list of 8 interesting registry hacks that you need
to try.

1.Disable USB devices:
Disabling USB ports can be a smart idea t add security to
the computer. This can be really handy if the compute is on a public pace where
the chances of virus and other malware infection is really high. You can easily
disable access to USB ports with the following registry hack:

;      Open the
Registry Editor (start->Run->Type regedit and hit Enter)
            In the
registry, navigate to the following key:
            In the
right-side pane, double-click on “Start”.
            In the
“Value data” field enter 4 and click on “OK”
     Close the
Registry Editor and reboot.

To enable USB devices, follow the same procedure as above
except n the step-4 enter 3 in the “Value data” field.
Works on Window XP, Vista
and 7.

2. Disable Notification Balloons in Windows 7 and vista:
You can now disable the annoying notification balloons that
keep popping up frequently with warning messages and reminders.  Here is s a step by step  procedure to do that:

Open the Registry Editor and navigate to the following key:
Right-click on the right-hand pane, and create a new
Rename it to EnableBalloonTips, double-click on it and set
the “Value data” to 0.Reboot the compute to see the changes in effect.

3. ADD “Recycle Bin” to My Computer in Windows 7 and Vista:

Would you like to add the “Recycle Bin” icon to My Computer
then this tutorial is for you.
Let’s start:
            Open the
Registry Editor and navigate to following key:
Right-click on “NameSpace” and select New->key. Name the
key with the following name :{ 645ff040-5081-101B-9F08-00AA002F954E}
Now, Open “My computer” and hit F5 to refresh the screen.
This should show up the Recycle Bin” icon

4. Disable the windows task Manager:

            Need t
limit access to your computer by disabling the Task Manager?
Her is a simple registry hack to do this:

            Open the
Registry Editor and navigate to the following key:
Right –click on “Policies”. Select New-> Key and name the
key as System.
If you are on Windows XP, you need not create the new key
“System” as it is already present in it. So, you can directly navigate to :
Software\Microsoft\Windows\CurrentVersion\Policies\System in
the step-1
Right click on “System”, create a new “DWORD” and name it to
Double-click on the DWORD “DisableTaskMgr” and set the
“Value data” to 1 (0=Enable, 1=Disable).
To enable the Task Manager, Set the “Value data”  back to 0.
Works on Windows XP, Vista
and 7


Here is a simple hack to change the name of the Registered
owner on your computer:

            Open the
Registry Editor and navigate to:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion
On the right side pane, find the keys RegisteredOwner and
Double click on them to change the name to whatever you
To see the changes,, right click on “My Computer” and select
Work on Windows XP, Vista
and 7


You can now add your favorite programs to Windows Startup
without the need for using the start-up folder. Here is a way to do this:

Open the Registry Editor and
On the right side pane, create a new “String Value: and
rename it to the name of the program that you want to add (you can give any name,
it doesn’t matter).
Double click on the “String Value”, in the “Value data field
add the path of the executable program that has to execute at startup.
Reboot the computer to see the changes in effect.
Works on Windows XP, vista and 7.

and vista:

Ever wanted to pin a folder t the start menu to gain faster
access to it ?
Well , it is possible to add the Pin to start menu option
so  that you can plug your favorite
folders to start menu .
Here is a step by step procedure:

Open the Registry Editor and navigate to:

Right click on “ContexMenuHandlers” and select New-> key.
Name  the key as
Now, whenever you want to add a folder to Start Menu, hold
down the Shift key and right-click on the folder. You should click on the
folder. You should see the “Pin to Start Menu”
Option in the context menu”.


One of the new additions to windows 7 is the “Aero Shake.
Feature using which it is possible to grab a window using
it’s title bar and shake it.
This will minimize all the other open windows if any. It is
really a handy feature! However, if you ever wanted to disable this feature,
here is a solution:

Open the registry Editor and navigate to the following key:

Now, right click on “Windows”  key and create a new key called Explorer.
Right click on the “Explorer” key and create a new “DWORD”
called NoWindowMinimizingSortcuts and set it’s value to 1.
Close the registry editor and reboot the computer to see the
changes in effect.