Reality behind Hacking Facebook, Gmail, Yahoo Accounts

Many of people searching on Google about  How to hack  facebook account , how to hack gmail or yahoo etc. And we got various article on regarding hacking these account. Even free/paid software/program/cracker link is also come for hacking these accounts. But whats the The Reality Of Hacking Facebook, Gmail, or Yahoo Accounts ???

Many people on net impressed by the word “hacking account”they think there is some mind blowing , extra talented people whom known as hacker can do anything , can hack anybuddy account. they have some Super technique to hack anyone account. But in reality the scenario is totally different.
Now the biggest fact about Hacking Facebook, Gmail, Yahoo Accounts are 99% accounts are hacked due to victim’s carelessness/lack of knowledge. And the technique involved for hacking the victim account is Keylogger , Phishing , Social Engineering and Click hijacking.


Reality Behind Hacking Facebook , G mail  ,Yahoo Accounts

We usually start like googling this, “how to hack gmail” , “softwares for hacking”, “how to hack facebook” etc. No doubt, they are at the right place. I would have rather use words – they are on the right track but will they open up the right door and gain something or they will just end up becoming a victim them self Reality behind Hacking Facebook, Gmail, Yahoo Accounts

Genrally we have signed up for an account(gmail,yahoo or any other reputed website)
Your password is stored only at two places

1. In website’s database
2. In your mind

Stealing password from the website’s database is quite tough task. i am not saying its impossible , yaa but its impossible for normal person. So the remaining option to steal the password is just from you. So here are some way which you have to keep in your mind to not to loose your Account.

1. Phishing– The most common way of hacking them is phishing.
The common type of phishing is Fake Login Page.
The victim is anyhow anyway made to enter his credentials in fake login page which resembles the genuine login page and gets hacked. For phishing before login you have to just the URL

.2. Keylogger–  Its a most common technique used even by a newbie for hacking account. its simply stores whatever you type. So always use Antivirus for your system.

3. Social Engineering – There is no patch to Human Stupidity.It is the hardest form of attack to defend. the best way to don’t share your password to anyone.i think Social engineering is very vast topic so its better to read all information regarding Social Engineering here.

4. Click Jacking – These days its quite famous technique to steal the password, mainly its used for facebook. many peoples for collecting enourmous likes for status fan page or subscribers , they goes for few website (Click jacking) and share its password. To know exactly about Click Hijacking click here.

Reality Behind Hacking Facebook , G mail  ,Yahoo Accounts

-> Does any free/paid software/program/cracker exist to hack such accounts ?

No .You might get numberless free or preminum softwares which claim to crack email accounts. The softwares just ask you to enter victim’s email and start cracking/generating password. I have already told you about two places where one’s password is. From where the hell ,these softwares would bring passwords for you ? . This kinda stuff is undoubtedly scam/rubbish.

-> Is there any free/premium online service to hack such accounts ?

No.You might have logged on to many websites that claim to crack any
email account for some amount of money. They are completely fraud and be aware of them. Dont lose your money there !!

List of Footprinting tools

hey , welcome back friends Hope you enjoying the session of Footprinting and in this post i share about a List of Footprinting tools

There are various tools which is used for Footprinting like Whois , Nslookup , ARIN , Neo Trace , Visual Route Trace , eMail Tracker Pro , Website watcher , Google Earth , GEO Spider etc.


List of Footprinting tools
List of Footprinting tools

These Footprinting tools can also be discuss as classified Categories

Foot printing tools for Inspecting Network

  • Bigbrother

It is designed to see how network is performing in near real time from any web browser.
it display  status information as web ages or WML pages for WAP-enabled devices.

  • BiLe Suite

Itself stand for Bi-directional Link Extraction
It contains a number of PERL scripts that can be used by a Penetration Tester to aid in the enumeration phase of a test

Alchemy Network tool and Advanced Administration tool are network diagnostic Tool.

  • My IP Suite

Its combines domain-to-IP Converter , Batch Ping , Tracert , Whois ,Website Scanner and Connection Monitor as well as an IP-to-country converter into a Single Interface.

Foot printing tools for Whois Tools

(get personal details and contact Info about the domain)

  • Wikto Footprinting tool
  • Whois Lookup
  • Smart Whois
  • Active Whois
  • Lan Whois
  • Country whois and Where Is IP (Geographical location of an IP)
  • ip2 country – utiltiy for converting IP’s address to the country’s name
  • CallerIP

Use callerIP to easily see when someone has connected to the computer , report IP address , adn run a trace on that IP address

Web Data Extractor Tool (to extract the targeted company contact’s data like email, phone, fax etc)

Foot printing tools for Online Whois Tools


Foot printing tools for DNS Information Extraction Tools

  • Dns Enumerator

its an automatd sub-domain retrieval tool and it scan google to extract the result

  • Spider Foot

– it will scarpe the the website on that domain as well as search Google, Netcraft,Whois and DNS to build up information

  • Nslookup
  • – through this you can extract DNS information such as: Mail server extensions , IP addresses.
  • Domain King and Expired Domains – it enable to search through a list of expiring domain names by Keyword, domian , Character lentgh and other criteria.
  • MSR Strider URL Tracer – it enable to scan a domain name to see the third party domains that it serves content from and/or whether the site is being redirected
  • Mozzle Domain pro
  • Domain research Tool

Foot printing tools for Locating Network Range

(Finding the range of IP addreses and Discerning the subnet mask)

  • ARIN 

It allows searches on the whois database to locate information on a network’s autonomous system numbers (ASNs), network-related handles, and other related point of contact (POC)

  • Tracerroute – It reveals the path IP packets travel b/w two systems.
  • 3D traceroute – allows visually traceroute program
  • Neo Trace and Visual route trace – allows visually traceroute program
  • Path Analyzer Pro – it delivers advanced network route tracing.
  • Maltego – its used for information gathering phase of panetration testing
  • Touchgraph – ->it allow for the creation and navigation of interactive graphs. (Ideal for organising link or mind mapping)

Foot printing tools for Mail Tracker

  • VisualRoute Mail Tracker – It shows the numbr oh hops made and the respective IP addresses, the node name,location, time zone and network
  • eMail Tracker Pro – the email analysis tootl that enables analysis of an email and its headers abutomatically, and provides graphical results.
  • Read Notify –
  • E-Mail Spiders also use for Foot printing
  • Foot printing tools for Locating Network Activity
  • GEO spider – its help you to detect,identify and monitoring your network activity onthe World map.
  • Geowhere – it handle many popular newsgroup to find answers to your queries in an easy and fast manner
  • Google Earth – its put a planet’s worth of imagery and other geo info.
  • List of Search Engine as Footprinting Tools
  • Kartto –
  • Dogpile – (Meta Saerch Engine)
  • Webferret – its searches the web quickly and throughly by instantly submiting the search query to multiple search engine
  • Robots.txt as for FootPrinting
  • Website Copier as for Footprinting

Keep visiting !!

Tools used for Website Download or Website Copier

In this post i am going to share a list of tools through which you can copy entire website and its depend how these tools will help you. These tools are listed as a Website copier. It downloads all items like videos , images, texts, etc. After downloading you can access entire site even when you are not connected with Internet.

Website copier is a valuable Footpriting tool. This tool mirrors an entire website to the desktop.You can footprint the contents of an entire website locally rather than visiting the individual pages.

Tools used for Website Download or Website Copier
Tools used for Website Download or Website Copier

the level of copying depend on the tool which you use and it also depends on your query. These are an easy-to-use offline browser utility. It allows you to download a Web site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer. These tools arranges the original site’s relative link-structure. Simply open a page of the mirrored Web site in your browser, and you can browse the site from link to link, as if you were viewing it online. Some of them can also update an existing mirrored site, and resume interrupted downloads.

It will help you when you don’t have Internet access. Whether you’re on a plane or your grandparent’s place in the country, life occasionally brings all of us to places where WiFi and 3G can’t reach.

  • Reamweaver – when a visitor visits a page on your Reamweaver site, Reamweaver gets the page from the target  domain , changes the words as you specify,and stores the result (along with images etc.)
  • Website Watcher – it can be used to get updates on the website , used for competitive purpose.
  • HTTrack Web Site Copier – Free tool
  • Website Ripper Copier –
  • SurfOffline 2.1 – Website downloader
  • WinWSD WebSite Downloader -its  a freebie

Keep Visiting !!

Competitive Intelligence Gathering

In this post i will try to make you learn a Competitive Intelligence Gathering to be used as a tool For footprinting. Because that’s the sole purpose why we are here.
Its a intelligent way to find the info. , basically its a process of gathering information about your competitors from resources such as the Internet.

Competitive Intelligence Gathering
Competitive Intelligence Gathering

We try to cover as Competitive Intelligence Gathering in Footprinting sense. Now the next thing is Why its needed ???
In today’s scenario, there is a cut throat competition in every sector. so it’s our work to keep an eye on our competitors. So Competitive Intelligence is needed to

  • compare your product with competitors product ,
  • Analyze your company position wrt competitiors
  • produce a profile of entire team
  • predict there tactics and method on their previous track record

Now next thing is how it should be done, so here are some ways by which you can perform Competitive Intelligence Gathering.

Competitive Intelligence Resource Index – “ “a search engine and list of sites for finding CI resources.

  1. Companies providing Competitive Intellience Services
  2. Carratu International (
  3. CI Centre (
  4. Corporate Crime management (
  5. Marven Consulting Group (
  6. Security Sciences Corporation (
  7. Lubrinco (

Competitive Intelligence Tool

Trellian – Trellian compiles and analyzes internet usage statictics to create a powerful competitive
tool that no buisness should be without

Web Investigator – its check sources , public databases and proprietary search databaese and allows to download and view reports of records

Relevant noise – Its a subscription based online search service that mines social media for buisness intelligence.

Reputica – The Reputica dashboard provides online source of information abou you repuation, with links to the primary sources which causes you reputica rating to go up or down.

Its enough information regarding Competitive intelligence gathering because our sole purpose is to use it as tool for Footprinting.

Keep visiting !!

Reconnaissance as Footprinting

The objective of this post is about to learn about First phase of  attack that is Reconnaissance. How Reconnaissance perform ???. if you join our session from this post so i will suggest to read further post in categories of Learn Abc of ethical hacking

As we already read about Reconnaissance ie its is a preparatory phase where we gather all the information regarding Victim.Its the first step of Steps perform by hacker.

Reconnaissance as Footprinting
Reconnaissance as Footprinting

Footprinting is the blueprint of the security profile of an Organization undertaken in a methodological manner. We already talk about Footprinting. Now we discuss further

Steps of Footprinting

  1.  Find companie’s external and internal URLs
  2. Perform Whois lookup for personl detail
  3. Extract DNS information
  4. Mirror the entire websie an look up names
  5. Extract archives of the website
  6. Google search for company’s news and press releases
  7. Use people search for personal information of employees
  8. Find the physical location of the web server like neo tracer tool
  9. Analyze company’s infrastructure details from job postings
  10. Track the email.

There are certain things which is required for Reconnaissance phase is like Footprinting , Competitive Intelligence Gathering , E-mail Spiders , List of Footprinting tools and Website Copier. Some of these topic are already posted and some of will be publish as soon as possible.

Next Phase is should be Scanning which will be published shortly.

Keep visiting !!

GNIIT course some real insights

I was wondering in country like India where you can find a computer center in every other home , a college offering computer course in every other street do joining GNIIT course give you edge over others ?
Is it worth investing your time and money in GNIIT course ? what should be the parameters of judging whether GNIIT course is good or bad . My mind was boggling very hard . i did my research . Took part in various discussions , talked to current and previous students who had taken a GNIIT course

Although you can see very beautiful adds of GNIIT course all over the media including newspapers and TV , i don’t think joining GIIT course is any worth .

GNIIT course some real insights
GNIIT course some real insights

Here are the reasons and comment

comparison between various centers like delhi center and pune center

By one student
The entire team of NIIT staff, faculty, centre head, accountants. it’s a complete mess out there.NiiT South Ex which claims to be one of the Best Centers in Asia i don’t even consider it to be a Model Centre any more.
It’s A Complete mess out there and best exapmle of highly mismanaged institute.
It’s not worth Being A Student Of NIIT

of course this student is very aggressive.


In terms of faculty i don’t think it’s even eligible for rating .Half the time our staff never turned up for classes. They never completely taught us the syllabus . During the final online exams they simply helped us to answer all the questions correctly .i have witnessed NIIT faculty helping students during exams for the GNIIT course.In some other batch the faculty are so bad that they walked out of the room and the students are having a gala time.

A GNIIT course

wish you could have posted it earlier. i wasted nearly 27k in NIIT Nungambakam. Guys don’t ever think of joining niit.i took .NET course which cover C#,ADO.NET and ASP.NET.first i was given a good trainer ( by luck it seems ) but it lasted only a couple of months.then comes the interesting part.A new MCA guy who don’t even have a basic qualification of proper communication started teach us.he never thought us actually he use to skip a lot and in fear treated people like a kid in schools.i reported about him to GL guess what they told “i only have problem” damn it and i silently studied my self from Microsoft materials.


Don’t bother to join it for placement . there are absolutely 0 placements.

This was my research on NIIT and GNIIT course offered at their centers across country. Do your own research if you want to be completely sure .

Facebook Tips – Check who Unfriend you

Facebook Tips – Check who Unfriend you

Facebook – A book who don’t have a face …. Apart from the joke , Today i will share a small trick with you , to how to check that who unfriend you from Facebook. Yesterday i got a mail , asking a same thing so i got a ideas to make a post on it.

Facebook tips and tricks
Facebook tips and tricks

Check Which of Friend Unfriended You or Deleted

Use the Unfriend Alerts Extension to Check Which of Your Friend have Unfriended You or Deleted from their Friends List.

Download Unfriend Alerts Extension For Chrome – Download Link

Download Unfriend Alerts Extension For Firefox – Download Link

Hope it will work for you !!

Steps Of Hacking

Hello friends, Welcome back to the module of learning ABC of Ethical Hacking. I got various mails regarding the module to add several topics and believe me friends i try my best to improve the module. Now today’s post is on Step of hacking. In this post i elucidate all task perform by hacker to hack.

Steps of Hacking

Hacker performs his Task in 5 Phases.

Steps Of Hacking
Steps Of Hacking

Steps Of Hacking

  1. Reconnaissance
  2. Scanning
  3. Gaining Scanning
  4. Maintaining access
  5. Clearing Tracks

Phase 1 – Reconnaissance

Reconnaissance refers to the preparatory phase where an attacker seeks to gather as much information as possible about a target of evaluation prior to launching an attack. In this phase hacker simply gather all the information regarding Target.

This Reconnaissance phase can be perform in two way

  • Passive reconnaissance involves acquiring information without directly interacting with the target.

• For example, searching public records or news releases

  • Active reconnaissance involves interacting with the target directly by any means

• For example, telephone calls to the help desk or technical department

Phase 2 – Scanning

Scanning refers to the pre-attack phase when the hacker scans the network for specific information on the basis of information gathered during reconnaissance. Hackers have to get a single point of entry to launch an attack Scanning can include use of dialers, port scanners, network mapping, sweeping, vulnerability and so on. In this phase we simply find the loop of hole of Target.

Phase 3 – Gaining Access

Gaining access refers to the penetration phase. The hacker exploits the loop hole (vulnerability) in the system. The attack can occur over a LAN, the Internet, or as a deception, or theft. Examples include buffer overflows, denial of service, session hijacking, and password cracking

Influencing factors include architecture and configuration of the target system, the skill level of the perpetrator, and the initial level of access obtained. In this phase we attack the Victim.

Phase 4 – Maintaining Access

Maintaining access refers to the phase when the hacker tries to retain his/her ownership of the system, The hacker has compromised the system

Hackers may harden the system from other hackers as well (to own the system) by securing their exclusive access with Backdoors, RootKits, or Trojans. Hackers can upload, download, or manipulate data, applications, and configurations on the owned system.

In simple manner Hackers put the compromised system in that where again he will get access easily.

Phase 5 – Covering Tracks

Covering Tracks refer to the activities that the hacker does to hide his misdeeds. In simple language hacker remove his all foot print so he will not caught.
Reasons include the need for  continued use of resources, removing evidence of hacking, or avoiding legal action
Examples include Steganography, tunneling, and altering log files.

All the above phase , and tools involved in these Phase;s will be cleared in further posts.

Keep visiting !!

Google Tips and Tricks

We all love Google , In fact many of us opening Google to check the our Internet connection is working or not !! I know its funny but its True.Google is the best place to search and find things that we do not know about. In this post i am sharing about Some Great Tips and Tricks for Googling. In my previous post Google Hacking i provided some tricks for Hacking aspirant but now today i provide information for the normal users.

Google Tips and Tricks
Google Tips and Tricks

Here are some crucial Way to refining your googling.

Google tips and tricks

Trick #1 : Find the definition of a word:

Google Tips and Tricks


Trick #2 : Identify Local Time for Any City in the World using Google

Google Tips and Tricks
Google Tips and Tricks


Trick #3 : Exclude Keywords in the Search

If you want Google to exclude a word while searching the web page, use – (minus) before the search as shown below. This example searches for the download ebooks, and without the word paid.

Google Tips and Tricks


Trick #4 : Movie Listings

Google can list the movies playing in your town with showtimes

Google Tips and Tricks


Trick #5 : Get all results from one specified site :

Google Tips and Tricks
Google Tips and Tricks


 Trick #6 : Identify Local Weather for Any City in the World using Google

To see the current weather in Mumbai do the following. Go-ahead and try this yourself for your local city and see how it works

Google Tips and Tricks


Trick #7 : Wildcard Search

The following search string can be very useful if you forgot the words in a lyric of a song you listened earlier. the wildcard symbol “*” will compare the possible results using the Google algorithm

Google Tips and Tricks

 Trick #8 : Accessing blocked websites

Want to catch up on the latest celebrity gossip from a site banned in your corporate firewall? Google can help you through cache option.

Google Tips and Tricks

Trick #9 : Convert Currency

To converter currency, simply enter the conversion you’d like done into the Google search box and Google will provide your answer directly on the results page.

Google Tips and Tricks
Google Tips and Tricks


Trick #10 : Tracking Flight Status

If you know the flight number, you don’t have to be calling the airline to check the status


Google Tips and Tricks

Trick #11 : Unit Conversion:

You can do unit conversion from one to another just by typing in Google as 12.5 cm in

Google Tips and Tricks
Google Tips and Tricks


Trick #12 : Searching for specific filetypes

If you are looking for a specific filetype, say a PowerPoint file to learn about Hacking, this is the right search string for you

Google Tips and Tricks

Trick #13 : Phonebook Search

Google can be your very own online phonebook

Google Tips and Tricks

Trick #14 : Mathematical Calculations using Google

Normally for doing the metric conversions we will be using some online conversion websites or conversion softwares. However just by using Google search box you can do calculations, unit conversions and money conversions as explained below.

You can use the Google search box as your scientific calculator as


Google Tips and Tricks


Trick #15 : Google Advanced Search Page

If you are not able to remember some of the advanced search syntax mentioned in this article, then use the Google Advanced search page as shown below.

Google Tips and Tricks
Google Tips and Tricks

Hope you enjoy above best 15 Google tricks , we will shortly publish more tricks.
Keep visitng