Welcome to Tricks4indya.

Tricks4indya is a blog/website where you get latest computer tips and tricks, hacking tricks, Windows tips and tricks and most important learn about Ethical Hacking.

Why you visit Tricks4indya daily?

Because Tricks4indya is not one taste blog and daily update(daily share two or three article sure). If you visit daily then you get different taste of article to read means those friends who don’t like to read HACKING article but like windows tips, awareness(to protect from hackers) article, information about newly technology…ect.

Wednesday 8 June 2011

Free UD Crypter to hack Email account password


We have discussed many times about FUD and UD Crypters on Tricks4indya. UD crypters are particularly useful if the victim has an antivirus installed on his computer. As we know, Keyloggers and RATs are used to hack Email account password of the victim. Most of the keylogger and RAT servers are detected and deleted by most antiviruses. So, there is a huge demand for FUD and UD crypters in hacker community. Today, I am adding one more free UD crypter to the list. Use it efficiently to hack email account of your friend.

What is UD Crypter???

If you are not knowing about FUD and UD Crypters, please refer my article FUD Crypter to bypass Antivirus in which I have explained all the basic concepts about crypters. I’ll be waiting here until you come back. So, let’s move further and learn about the way to use a UD Crypter.


UD Crypter – Hack Email account: -

1.   Download UD Crypter to hack Email account of your friend.
Password: - TRICKS4INDYA

2.   Create a server using Cybergate RAT. You can refer my article How to hack Email account by Cybergate RAT for help in creating the server.

Cybergate server scan report before using Crypter: -


As you can see, the server is detectable by most antiviruses and hence will be deleted on victim computer. Thus, you won’t be able to hack email account password of your friend. So, we will crypt the server to make it undetectable.
3.   Run the downloaded file on your computer. Hit on “Buscar Archivo” and select the Cybergate server you’ve created in Step 2. Hit on “Generate Pass” for 2-3 times to generate random string. Now, hit on button next to “Encryptar” to create the crypted Cybergate server.


Cybergate server scan report after using Crypter: -

Thus, Crypter has helped us in reducing the detection rate of our server. The server is now only detected by Avira antivirus. You can refer to our Undetection Techniques section to make this server FUD.
4.   Now, send the crypted server to your friend. Once he runs the server, you will be able to hack Email account.
Note: Since, the crypter is public, it will be detected by antiviruses very soon. The best way is to use the Winspy Keylogger – the best hacking software ever made which is FUD. It is personally recommended by Tricks4indya.

I hope you will be able to hack Email account password of your friend using the UD Crypter. I have tried the crypter with Cybergate and it is working perfect. The crypter may corrupt your keylogger. So, if you any problem in using this UD crypter to hack email account of your friend, please mention it in comments.


Enjoy UD Crypter to hack email account password…
Note: This is illegal and is for educational purpose only. Any loss/damage happening will not be in any way our responsibility.

If you want to keep up-to-date on the Ethical Hacking Tutorials news, latest Tips & Tricks, latest scams & most important awareness and are a member of Facebook, don't forget to Join the Tricks4indya Facebook page to keep informed about the latest security.

By: TwitterButtons.com

Friday 3 June 2011

What Is Doxing? – Doxing And Its Uses


First, let me explain what Doxing is. Doxing is the process of gaining information about someone or something by using sources on the Internet and using basic deduction skills. Its name is derived from “Documents” and in short it is the retrieval of “Documents” on a person or company.

You’re probably thinking, “Okay, so basically it’s getting information from searching someone’s email on Google right?” in a sense yes, but there are actually easier ways to get someone’s information online. The most popular and most common method is to use a website called Pipl (http://www.pipl.com/). Pipl allows you to search for full names, emails, usernames, and even phone numbers, thus making it a very useful tool for hackers. Another source hackers can use is Facebook (http://www.facebook.com). Sure, Facebook allows full name searches, but most hackers aren’t using it for its name search; they’re using it for its email search.

The main goal when Doxing is to find the target’s email (if you don’t have it). Your email is essentially your passport online; you sign up for websites using it, you have personal information on it, and if someone has access to it, they can essentially pretend to be you online. Once the hacker has the email, all he has to do is put it into Facebook or Pipl and he will be able to find you, assuming the email he has is connected to some account you have online. On the flipside of this, in order to find your email, the hacker either has to guess your email, befriend you on Facebook or hack one of your vulnerable friends and view your email that way. Once he’s done that, you’re in trouble.

Now, you’re probably thinking, “How’s he going to hack me with just my email?” well, that’s where Doxing comes in handy. If he can view your Facebook account, or he can find some other bit of information about you using Pipl, he can do what’s called reverting. Reverting is the process of using the target’s email’s recovery questions to gain access to the target’s email. Now, you may be thinking, “How’s he going to guess my recovery question answers?”well, take a second look at your recovery questions and ask yourself, “Can someone find this answer online?” If you answered yes, then you’re vulnerable to reverting. 

Any hacker reading this, that didn't previously know about reverting, would probably look at this and say This would never work!” but you have to remember… we’re all humans, and we all make mistakes. Surprisingly, this method works more often than you’d think, but it is not for anyone who is lazy. Doxers tend to spend a while searching around the web for information that they can use. 

Chances are, you’ve made some mistakes online, and if a skilled Doxer finds that mistake, then you’re in trouble. The Doxing method is based purely on the ability of the hacker to recognize valuable information about his target and use this information to his benefit. It is also based around the idea that, “The more you know about your target, the easier it will be to find his or her flaws.” 

How can you insure that you won’t be Doxed? 

Well, as the Internet becomes more and more useful and addicting, it will become harder to not get Doxed. The main issue for most victims is their security questions, and their password security. If a victim has a very easy-to-find recovery question, then the victim will be easily reverted within a matter of seconds. Also, if the victim has a simple password, it could get brute forced simply by using a wordlist that applies to the victim’s interests, likes, and fancies (of course, this method is not as popular).

So, the main rule to not getting hacked is: Have strong passwords, and almost impossible to guess recovery questions.


Note: This is illegal and is for educational purpose only. Any loss/damage happening will not be in any way our responsibility.

If you want to keep up-to-date on the Ethical Hacking Tutorials news, latest Tips & Tricks, latest scams & most important awareness and are a member of Facebook, don't forget to Join the Tricks4indya Facebook page to keep informed about the latest security.

By: TwitterButtons.com

Related Posts Plugin for WordPress, Blogger...
Twitter Delicious Facebook Digg Stumbleupon Favorites More