Best Hacking Movies List

Best Hacking Movies List

Last night while going through some forums i noticed that many were discussing about hacking movies. And I thought to post here about the same. So I searched a lot on it and prepared the best hacking movies list.

As a certified geek, it is always pleasing to see movies that involve Computer Hacking or hackers in action. Although most of these films don’t always represent the real deal, some of them have what it takes to excite, amuse, and inspire those who are passionate about computers

While none of these next movies depicts the true motions of computer hacking, most of these stories are memorable in some way, So here is Best hacking Movie List . Hacking movies lists are not just based on ‘hacking’, these are also based on ‘computer technology’ as well.



Hackers (1995)

Best Hacking Movies List
Best Hacking Movies List

Storyline: In Hackers, a young boy is arrested for writing a computer virus and is banned from using a computer until his 18th birthday. Years later, he and his friends discover a plot to unleash a dangerous computer virus, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.  Not too much of a thriller, but still worth watching to say you’ve seen it.

Sneakers (1992)

Best Hacking Movies List
Best Hacking Movies List

Storyline: Complex but lighthearted thriller about computers and cryptography, government and espionage, secrets and deception and betrayal.

Pirates of Silicon Valley (1999) 

Best Hacking Movies List

Storyline: Pirates of Silicon Valley is a semi-humorous documentary about the men who made the world of technology what it is today, their struggles during college, the founding of their companies, and the ingenious actions they took to build up the global corporate empires of Apple Computer Corporation and Microsoft Inc.  You’ve heard of both of those companies, so watch a (somewhat flawed) story on their founding


The Thirteenth Floor (1999)

Best Hacking Movies List

Storyline: Computer scientist Hannon Fuller has discovered something extremely important. He’s about to tell the discovery to his colleague, Douglas Hall, but knowing someone is after him.

The Matrix (1999)

Best Hacking Movies List


Storyline: The Matrix is about a man who is your average programmer by day, but at night he becomes a malevolent hacker.  He learns from mysterious underground hackers about the real nature of his existence and his main role in the war against the controllers of it

Takedown (2000)

Best Hacking Movies List

Storyline: This film is based on the story of the capture of computer hacker “Kevin Mitnick”.

Antitrust (2001)

Best Hacking Movies List
Best Hacking Movies List

Storyline: Antitrust is a film about a recent Standford graduate who goes to work as a private sector programmer.  When tragedy strikes, he learns the company isn’t what he thought.  He begins investigating the company and finds himself in the middle of several cybercrime scandals.  A great thriller and definitely worth watching.

Revolution OS (2001)

Best Hacking Movies List
Best Hacking Movies List

StroyLine : This documentary tells the story about the Linux operating system, and how it forwarded the philosophy of “open source” and free intellectual property. Not an action movie, but definitely interesting for people who want to learn more about why computer culture is the way it is. If you can find a copy of this, definitely rent it.

Middel man (2009)

Best Hacking Movies List
Best Hacking Movies List

StoryLine : Middle Men wants to tell the story of how porn took over the Internet from 1997 on. It did it, according to this “inspired by a true story” script, by figuring out how to let people buy hard-core porn online — photos and then movies — using a credit card, while disguising the purchases behind innocuous billing names

Minority Report (2001)

Best Hacking Movies List
Best Hacking Movies List

Storyline :  The story of “Minority Report” is many things, it’s a twisted tale of humanities future, a man’s journey to unravel the truth, and a depiction of a near utopian society. The story touched on many themes, forgiven

ess, redemption, and corruption, yet all of these very real themes would be lost if the story wasn’t believable.

Best Hacking Movies List

Storyline: is a 2001 documentary film that chronicles the dot-com start-up phenomenon and its eventual end. The film follows e-commerce website govWorks and its founders Kaleil Isaza Tuzman and Tom Herman from 1999-2000 as the Internet bubble was bursting.


Best Hacking Movies List
Best Hacking Movies List

Storyline:  Swordfish is a 2001 American thriller film directed by Dominic Sena and starring John Travolta, Hugh Jackman, Halle Berry, Don Cheadle and Vinnie Jones. The film centers around Stanley Jobson, an ex-con computer hacker who is targeted for recruitment into a bank robbery conspiracy because of his formidable hacking skills.

Deja Vu (2006)

Best Hacking Movies List

Storyline: An ATF agent travels back in time to save a woman from being murdered, falling in love with her during the process

Live Free or Die Hard 4.0 (2007)

Best Hacking Movies List
Best Hacking Movies List

Storyline :  An attack on the vulnerable United States infrastructure begins to shut down the entire nation! But as New York City police detective John McClane delivers old-school justice to a new breed of terrorist when a massive computer attack hacker on the U.S. infrastructure threatens to shut down the entire country

War Games : The Dead Code (2008)

Best Hacking Movies List
Best Hacking Movies List

Storyline: The United State’s Department of Homeland Security is led to believe an American teen hacker playing a terrorist-attack simulator game online is a real terrorist out to destroy the U.S.

Gamer (2009)

Best Hacking Movies List
Best Hacking Movies List

Storyline : In a future mind-controlling game, death row convicts are forced to battle in a ‘doom’-type environment. Convict Kable, controlled by Simon, a skilled teenage gamer, must survive 30 sessions in order to be set free. Or won’t he?

A Wednesday (2008)

Best Hacking Movies List
Best Hacking Movies List

Storyline: The film tells the story of a Police Commissioner, who gets an anonymous call. The anonymous caller demands that he release militants in exchange for information about the many bombs planted across Chennai city. The caller is serious as the police find a bomb planted very close to their headquarters.

The Social Network (2010)


Storyline: Harvard student Mark Zuckerberg creates the social networking website that would become known as Facebook, but is later sued by two brothers who claimed he stole their idea, and the co-founder who was later squeezed out of the business

Underground: The Julian Assange Story (2012)

Best Hacking Movies List
Best Hacking Movies List

Storyline : Julian Assange has told the story of his childhood and adolescence twice, most book on the first generation of computer hacking, Underground, for which Assange

23 (1998)


Storyline : The movie’s plot is based on the true story of a group of young computer hackers from Hangover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson’s “Illuminatus”, but soon he and his friend David start breaking into government and military computers

I try my best to cover all the movie related to hacking , computer technology etc. Tell me your views regarding Best Hacking Movies List. 

And also share movie in comment section , if you think which should be added in this list !! By the way which one is your Favorite movie ??

Read also our new post on List of hacking documentary

Keep Visiting !!

Proxies used as in Scanning phase

Proxy is a term that we use, when related to computers, to describe using a third party between the user and the internet. Its simply to hide yourself from notifying to any one.

Looking at the reasons to use a proxy

  • To hide your identity or location
  • Speed, web proxies are commonly used to cache web pages from a web server
  • Saving bandwidth for downloads, in cases where more users go through the same proxy to get the same files
  • Usage logs, the proxy server keeps track of who goes where
  • Security, the server scans the content for malware

Proxies used as Scanning phase
Free Proxy Servers
Search on Google so you can use them

Socks Chain
Its a program that works through a chain of Socks or HTTP proxies to conceal the IP-address

Proxy Workbench
It is a small proxy server which resides inside the network and monitor’s connection

Proxy Manager
it connects to internet and to downloads lists of proxy servers from various will have thousands of proxy server IP address within minutes.

Happy Browser Tool
it is a malfunctional web brower with many integrated tools though this you can dynamically change proxy server while browsing the web.

it uses different proxies every time you visit the internet,add thousand of proxies to the list and your firewall does not see a pattern in your traffic.

Proxies used as Scanning phase

TOR Proxy Chaining Software
Tor is a network of virtual tunnels connected together and works like a big chained proxy.It mask the identity of the orignating from the Internet.


Anonymous surfing

Anonymous Surfing browser

Browzar :
With browzar you can search and surf the web without leaving any visible trace on the computer you are using.

Torpark browser
it is free ,portable , zero-install, preconfigured, and encrypted which runs on Windows

Mowser and Phonifier
Surf the web using Mowser and Phonifier, a new service that is free and converts any website into a mobile phone friendly format

There are also some way for using a proxy

  • Analog X proxy
  • NetProxy
  • proxy+
  • JAP
  • Proxy Switcher lite
  • Proxomitron
  • Google Cookies
  • SSL proxy Tool
  • HTTP Port
  • HTTP Tunnel

Hope you enjoying the learning of hacking tutorials. Keep Visiting !!


Scanning is one of the three components of intelligence gathering of an attacker.Scanning is the second phase in steps of hacker.
Through scanning , hacker find the info. regarding victim sytems , like OS , System Architecture , IP adresses , service running on computer
to discover which ports are active , etc.


Port scanning Procedure


Basically there are 3 types of scanning which as follows :

  1. Port Scanning
  2. Network Scanning
  3. Vulnerability Scanning

Port Scanning : – A series of messages sent by someone attempting to break into a computer to learn about the Computer’s network services.
Each associated with a well known port number.

Network Scanning : – A procedure for identifying active hosta on network. Eother for the procedurethem or for network security assesment.

Vulenrability Scanning: – The automated process of proactively identifying vulnerabilities of computing systmes present in a network

Port scanning Procedure : –
1. ICMP Scanning
In this type of scanning, By pinging all in network finding the up hosts , it can run in parallel o that it can run fast.
It can also be helpful to tweek the ping timeout value with the -t option

2. Angry IP Scanner :-
It is used for Window Platform , can scan IPs in any range.its simply ping every IP to check if it is alive.

3. Firewalk Tool

It is a tool that employs traceroute like technique to analyze IP packet response to determine gateway ACL filters and map networks
it determine the filter rules of victim place.

Check for Open Ports
Three way Hand Shake take place for checking the Open ports.
Tools used for checking Open Ports

I will surely  post about  Tool used for Port scanning.

We got the live systems , its open ports and knowing about services our next step is Banner Grabbing/OS fingerprinting.
Os fingerprinting is the method to determine the operating system that is running on the target system.And its also have two made Active and passive.

Active stack Fingerprinting.
Based on the fact that OS vendors implement the TCP stack differently specially crafted packets are sent to remote OSs and the response is noted. The responses are then compared with a database to determine the OS. The firewall logs your active banner grabbing scan since you are probing directly

Passive Fingerprinting
Passive bannergrabbing refers to indirecetly scanning a system to reveal its OS system its also based on the diffrential implantation of the stack and the various ways an OS responds to it.It uses sniffing techniques instead of the scanning techniques. It is less accurate than active fingerprinting

There are also various tools regarding Bannergrabbing which are discuss in this post.

Vulnerability Scanning
Bidiblah Automated Scanner -: It automates footprinting, DNS enumeration , banner grabbing, port scanning , and vulnerabilities assessmnent into a single program. its methodology


ISS Security Scanner
ISS provide automated vulnerability detections and analysis of network systems
it perofrm automated , distributed or event driven probes of geographically dispersed network services .OS. routers/switches. firewalls and applications and then displays the scan results


  • Nessus
  • GFI LANGuard
  • SATAN (Security Administartor’s Tool for Analyzing Networks)
  • Retina
  • Nagios
  • Packet trap’s pt 360 Tool suite
  • Nikto

After finding the vulnerability , hacker have to draw network Diagrams of Vulnerable Hosts. For Network Diagrams i made a list which can hep you in it.

  • Friendly Pinger
  • LANsurveyor
  • IPsonar
  • LANState
  • Insightix Visibility
  • IPCheck Server Monitor

And the last step is regarding Preparing proxies. So here you can learn about proxies which is useful for this purpose.

Hope you are getting all the session, if have any query just ask in comment sections.
Keep visiting !!




Patches and Hotfixes

Hotfixes and Patches – These both words are very important in every aspect for us. Through both of them we can find lot of way to hack a victim. Actually these are use for security or vanishing loop hole purpose. but we can create fake Hotfixes and patches , before that we have to understand what exactly these updates are.

Hotfixes   -A hotfix  is a code that fixes a bug in a product. The users may be notified through emails or through the vendor’s website. Hotfixes are sometimes packaged as a set of fixes called a combined hotfix or service pack

Patch – A patch can be considered as a repair job in a piece of programming problem. A patch is the immediate solution that is provided to users.

Patches and Hotfixes

What is Patch Management – Patch management is a process used to ensure that the appropriate patches are installed on a system”. It involves the following:

  •  Choosing, verifying, testing, and applying patches
  • Updating previously applied patches with current patches
  • Listing patches applied previously to the current software
  • Recording repositories, or depots, of patches for easy selection
  • Assigning and deploying the applied patches

The first step in patch testing is the verification of patch source and integrity which helps you to ensure that update is valid and it is not altered the major components of patch testing include digital signature, checksums, Integrity Verification
Basically patch testing process take place in three different categories are

  • Testing patch installation
  • Testing application Patches
  • Testing Service Patches
Patches and Hotfixes
Patches and Hotfixes

Types of Patches defined by Microsoft – Microsoft releases patches to facilate updates to the windows OS and microsoft applications
Such patches fix known problem or bugs in an OS or application and are shipped in three format are

  • Hotfixes – As security fixes or Quick Fix Enginerring
  • Roll ups – merge updates of several Hotfixes into a single update file
  • Service packs -An update to a software version that fix a bug, include fixes not previously released and introduce new funcionality

There are also some tools used for management tools like Update Expert , Qfecheck , Shavlik NetChk protect ,Kaseya Patch management etc

Keep visting !!

Hacking Webservers 2

In previous post on Hacking web servers we cover Web applications and Web application vulnerabilities and now we discuss about tool to attack on web serves its countermeasure and Increasing Web Server Security

Any Web server software out of the box is usually vulnerable to attack , some vulnerability about Web Servers like

  • Web and application server misconfiguration
  • Default accounts and passwords
  • Overly informative error messages
  • DATA vulnerability
List of tool used for hacking websrevers and for security testing purpose
List of tool used for hacking websrevers and for security testing purpose

Examples include: $ y
• showcode.asp vulnerability
• Piggy backing vulnerability
• Privilege command execution
• Buffer Overflow exploits (IIShack.exe)
• WebDav / RPC Exploits

These components include protocol listeners, such as HTTP.sys, and services, such as World Wide Web Publishing Service (WWW service)
and Windows Process Activation Service (WAS)

Some points to keep in mind before Compromising Web Servers

Issues to consider

  • Dynamic Web pages
  • Connection to a backend database server
  • User authentication
  • What platform was used?

Does the Web Application Use Dynamic Web Pages?
Static Web pages do not create a secure environment . IIS attack example: Directory Traversal Adding .. to a URL refers to a directory above the Web page directory
Early versions of IIS filtered out , but not %c1%9c, which is a Unicode version of the same character

Connection to a Backend Database Server

Security testers should check for the possibility of SQL injection being used to attack the system. SQL injection involves the attacker supplying SQL commands on a Web application field

Connection to a Backend Database Server

Basic testing should look for Whether you can enter text with punctuation marks , Whether you can enter a single quotation mark followed by any SQL keywords , Whether you can get any sort of database error when attempting to inject SQL

User Authentication

Many Web applications require another server to authenticate users Examine how information is passed between the two servers
Encrypted channels, Verify that logon and password information is stored on secure places.
Authentication servers introduce a second target

What Platform Was Used?

Popular platforms include:

  • IIS with ASP and SQL Server (Microsoft)
  • Linux, Apache, MySQL, and PHP (LAMP)

Footprinting is used to find out the platform. The more you know about a system the easier it is to gather information about its vulnerabilities

Now here i am going to share of tools which is useful for hacking web servers and for Security Testers.Choose the right tools for the job , Attackers look for tools that enable them to attack the system. They choose their tools based on the vulnerabilities found on a target system or application.

List of Tools used for Hacking Web Servers and Security Testing

WebGoat project
Its Helps security testers learn how to perform vulnerabilities testing on Web applications developed by OWASP. It’s like HackThisSite without the helpful forum.Tutorials for WebGoat are being made, but they aren’t yet ready

Metasploit Framework

Metasploit framework is an advanced open-source platform for developing, testing, and using exploit code. A tool for penetration testing, exploit development, and vulnerability research. The framework was composed in Perl scripting language and consists of several components written in C, assembler, and Python.It runs on any UNIX-like system under its default configuration a customized Cygwin environment for windows OS users.

Immunity CANVAS Professional

Immunity’s CANVAS makes hundreds of exploits, an automated exploitation system, and a comprehensive, reliable exploit development framework available to penetration testers and security professionals worldwide. CANVAS Professional’s completely open design allows a team to adapt it to their environment and needs. CANVAS Professional supports Windows, Linux MacOSX, and other Python environments

Core Impact

CORE IMPACT is the first automated, comprehensive penetration testing product for assessing specific information security threats to an organization. By safely exploiting vulnerabilities in your network infrastructure, the product identifies real, tangible risks to information assets while testing the effectiveness of your existing security investments.


Cgiscan.c: CGI scanning tool written in C in 1999 by Bronc Buster. Tool for searching Web sites for CGI scripts that can be exploited. One of the best tools for scanning the Web for systems with CGI vulnerabilities


Written to scan Web sites looking for hosts that could be exploited by the PHF bug. The PHF bug enables an attacker to download the victim’s /etc/passwd file. It also allows attackers to run programs on the victim’s Web server by using a particular URL


GUI tool from Microsoft. It displays information that is not normally shown in a browser, such as HTTP headers. It also attempts authentication using Multiple HTTP methods, Configuration of host name and TCP port, HTTP 1.0 and HTTP 1.1 support
Anonymous, Basic, NTLM, Kerberos, Digest, and Negotiation authentication types Multiple connection types , Proxy support and Client-certificate support

There are  different types of vulnerability scanners according to their availability are:

  •  Online Scanners : e.g.
  • Open Source scanners : e.g. Snort, Nessus Security Scanner, and Nmap
  • Linux Proprietary Scanners : The resource for scanners on Linux is SANE
  • Scanner Access Now Easy. Besides SANE there is XVScan, Parallel Port , Scanners under Linux, and USB Scanners on Linux

Some Countermeasures regarding Hacking Webservers.

IISLockdown restricts anonymous access to system utilities as well as the ability to write to web content directories. It disables Web Distributed Authoring and Versioning (WebDAV) .It installs the URLScan ISAPI filter

  • URLScan

UrlScan is a security tool that screens all incoming requests to the server by filtering the requests based on rules that are set by the administrator

  • MBSA Utility

Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool that determines the security state in accordance with Microsoft security recommendations and offers specific remediation guidance

  • File System Traversal Countermeasures

Microsoft recommends setting the NTFS ACLS on cmd.exe and several other powerful executables to Administration and SYSTEM: Full Control only Remove the sample files, Monitor the audit logs,  Apply Microsoft patches and hotfixes regularly.

Methods to Increasing Web Server Security

  • Use of Firewalls
  • Administrator Account Renaming
  • Disabling the Default Websites
  • Removal of Unused Application Mappings
  • Disabling Directory Browsing
  • Legal Notices
  • Service Packs, Hotfixes, and Templates
  • Checking for Malicious Input in Forms and Query Strings
  • Disabling Remote Administration
  • Run Patches and Updates
  • Auditing and Logging
  • Run IISLockdown
  • Disable unnecessary Windows services

Hope you enjoying our tutorials on learn ethical hacking. keep visting !!

Hacking WebServers

Welcome back to the session of learning ABC of Ethical Hacking. Objective of this post is to describe Web applications, Explain Web application
vulnerabilities, Describe the tools used to attack Web servers , Countermeasures and Increasing Web Server Security.

Mainly there are two main Web servers are Apache (Open source) and IIS (Microsoft).

First of all we have to understand that every program is vulnerable. It is nearly impossible to write a program without bugs.Some bugs create security vulnerabilities simillar to this Web applications also have bugs.Web applications have a larger user base than standalone applications so
Bugs are a bigger problem for Web applications. So firstly we study about components of web application later on we move to vulnerability .

Hacking WebServers
Hacking WebServers

Web Application Components

Lets discuss some web application components  which is necessary to understand the Web applications

  • Static Web pages
  • Created using HTML
  • Dynamic Web pages
  • Need special components <form> tags
  • Common Gateway Interface (CGI) scripts
  • Active Server Pages (ASP)
  • PHP
  • ColdFusion
  • Scripting languages like JavaScript VBscript etc
  • ODBC (Open Database connector)

Common Gateway Interface (CGI)
Handles moving data from a Web server to a Web browser. The majority of dynamic Web pages are created with CGI and scripting languages
Describes how a Web server passes data to a Web browser. It relies on Perl or another scripting language to create dynamic Web pages.
CGI Languages – CGI programs can be written in different programming and its also need some scripting languages

  • C or C++
  • Perl
  • Unix shell scripting
  • Visual Basic

Active Server Pages (ASP)

We all says in small form known as ASP DOT NET. HTML pages are static—always the same means they users cant query to the static pages.
ASP creates HTML pages as needed.  They are not static , ASP uses scripting languages such as JScript or VBScript. Although all Web servers  does not support  ASP. IIS supports ASP andApache doesn’t support ASP as well
You can’t see the source of an ASP page from a browser. This makes it harder to hack into, although not impossible


Server-side scripting language used to develop dynamic Web pages. Uses its own proprietary tags written in ColdFusion Markup Language (CFML). CFML Web applications can contain other technologies, such as HTML or JavaScript

Visual Basic Script is a scripting language developed by Microsoft. You can insert VBScript commands into a static HTML page to make it dynamic. It also Provides the power of a full programming language Executed by the client’s browser

Ita a very Popular scripting language and JavaScript also has the power of a programming language functions like Branching , Looping, Testing and Connecting to Databases

Now we talk about Database connectivity. For hacking a web servers we have to learn about Database.
Web pages can display information stored on databases. There are several technologies used to connect databases with Web applications
Technology depends on the OS used

  1. ODBC
  2. OLE DB
  3. ADO

Open Database Connectivity (ODBC)

Standard database access method developed by the SQL Access Group. ODBC interface allows an application to access. Data stored in a database management system (DBMS). Can use Oracle, SQL, or any DBMS that understands and can issue ODBC commands
Interoperability among back-end DBMS is a key feature of the ODBC interface. ODBC defines Standardized representation of data types, A library of ODBC functions and Standard methods of connecting to and logging on to a DBMS

Object Linking and Embedding Database (OLE DB) and ActiveX Data Objects (ADO)
These two more modern, complex technologies replace ODBC and make up”Microsoft’s Universal Data Access“

Understanding Web Application Vulnerabilities
Many platforms and programming languages can be used to design a Web site. Application security is as important as network security
Attackers controlling a Web server can

  1. Deface the Web site
  2. Destroy or steal company’s data
  3. Gain control of user accounts
  4. Perform secondary attacks from the Web site
  5. Gain root access to other applications or servers

Open Web Application Security Project (OWASP)
OWASP is an Open source ,  not-for-profit organization dedicated to finding and fighting vulnerabilities in Web applications
It Publishes the Ten Most Critical Web Application Security Vulnerabilities. Its worth-full for us

Top-10 Web application vulnerabilities

  1. Unvalidated parameters HTTP requests from browsers that are not validated by the Web server Inserted form fields, cookies, headers, etc.
  2. Broken access control
  3. Developers implement access controls but fail to test them properly .For example, letting an authenticated user read another user’s files
  4. Broken account and session management .Enables attackers to compromise passwords or session cookies to gain access to accounts
  5. Cross-site scripting (XSS) flaws – Attackers inject code into a web page, such as a forum or guestbook. When others user view the page, confidential information is stolen
  6. Buffer overflows – It is possible for an attacker to use C or C++ code that includes a buffer overflow
  7. Command injection flaws – An attacker can embed malicious code and run a program on the database server. Example: SQL Injection
  8. Error-handling problems – Error messages may reveal information that an attacker can use
  9. Insecure use of cryptography – Storing keys, certificates, and passwords on a Web server can be dangerous
  10. Remote administration flaws – Attacker can gain access to the Web server through the remote administration interface

Remaining topics shoul be cover in our next post i.e Hacking web server 2

Reality behind Hacking Facebook, Gmail, Yahoo Accounts

Many of people searching on Google about  How to hack  facebook account , how to hack gmail or yahoo etc. And we got various article on regarding hacking these account. Even free/paid software/program/cracker link is also come for hacking these accounts. But whats the The Reality Of Hacking Facebook, Gmail, or Yahoo Accounts ???

Many people on net impressed by the word “hacking account”they think there is some mind blowing , extra talented people whom known as hacker can do anything , can hack anybuddy account. they have some Super technique to hack anyone account. But in reality the scenario is totally different.
Now the biggest fact about Hacking Facebook, Gmail, Yahoo Accounts are 99% accounts are hacked due to victim’s carelessness/lack of knowledge. And the technique involved for hacking the victim account is Keylogger , Phishing , Social Engineering and Click hijacking.


Reality Behind Hacking Facebook , G mail  ,Yahoo Accounts

We usually start like googling this, “how to hack gmail” , “softwares for hacking”, “how to hack facebook” etc. No doubt, they are at the right place. I would have rather use words – they are on the right track but will they open up the right door and gain something or they will just end up becoming a victim them self Reality behind Hacking Facebook, Gmail, Yahoo Accounts

Genrally we have signed up for an account(gmail,yahoo or any other reputed website)
Your password is stored only at two places

1. In website’s database
2. In your mind

Stealing password from the website’s database is quite tough task. i am not saying its impossible , yaa but its impossible for normal person. So the remaining option to steal the password is just from you. So here are some way which you have to keep in your mind to not to loose your Account.

1. Phishing– The most common way of hacking them is phishing.
The common type of phishing is Fake Login Page.
The victim is anyhow anyway made to enter his credentials in fake login page which resembles the genuine login page and gets hacked. For phishing before login you have to just the URL

.2. Keylogger–  Its a most common technique used even by a newbie for hacking account. its simply stores whatever you type. So always use Antivirus for your system.

3. Social Engineering – There is no patch to Human Stupidity.It is the hardest form of attack to defend. the best way to don’t share your password to anyone.i think Social engineering is very vast topic so its better to read all information regarding Social Engineering here.

4. Click Jacking – These days its quite famous technique to steal the password, mainly its used for facebook. many peoples for collecting enourmous likes for status fan page or subscribers , they goes for few website (Click jacking) and share its password. To know exactly about Click Hijacking click here.

Reality Behind Hacking Facebook , G mail  ,Yahoo Accounts

-> Does any free/paid software/program/cracker exist to hack such accounts ?

No .You might get numberless free or preminum softwares which claim to crack email accounts. The softwares just ask you to enter victim’s email and start cracking/generating password. I have already told you about two places where one’s password is. From where the hell ,these softwares would bring passwords for you ? . This kinda stuff is undoubtedly scam/rubbish.

-> Is there any free/premium online service to hack such accounts ?

No.You might have logged on to many websites that claim to crack any
email account for some amount of money. They are completely fraud and be aware of them. Dont lose your money there !!

List of Footprinting tools

hey , welcome back friends Hope you enjoying the session of Footprinting and in this post i share about a List of Footprinting tools

There are various tools which is used for Footprinting like Whois , Nslookup , ARIN , Neo Trace , Visual Route Trace , eMail Tracker Pro , Website watcher , Google Earth , GEO Spider etc.


List of Footprinting tools
List of Footprinting tools

These Footprinting tools can also be discuss as classified Categories

Foot printing tools for Inspecting Network

  • Bigbrother

It is designed to see how network is performing in near real time from any web browser.
it display  status information as web ages or WML pages for WAP-enabled devices.

  • BiLe Suite

Itself stand for Bi-directional Link Extraction
It contains a number of PERL scripts that can be used by a Penetration Tester to aid in the enumeration phase of a test

Alchemy Network tool and Advanced Administration tool are network diagnostic Tool.

  • My IP Suite

Its combines domain-to-IP Converter , Batch Ping , Tracert , Whois ,Website Scanner and Connection Monitor as well as an IP-to-country converter into a Single Interface.

Foot printing tools for Whois Tools

(get personal details and contact Info about the domain)

  • Wikto Footprinting tool
  • Whois Lookup
  • Smart Whois
  • Active Whois
  • Lan Whois
  • Country whois and Where Is IP (Geographical location of an IP)
  • ip2 country – utiltiy for converting IP’s address to the country’s name
  • CallerIP

Use callerIP to easily see when someone has connected to the computer , report IP address , adn run a trace on that IP address

Web Data Extractor Tool (to extract the targeted company contact’s data like email, phone, fax etc)

Foot printing tools for Online Whois Tools


Foot printing tools for DNS Information Extraction Tools

  • Dns Enumerator

its an automatd sub-domain retrieval tool and it scan google to extract the result

  • Spider Foot

– it will scarpe the the website on that domain as well as search Google, Netcraft,Whois and DNS to build up information

  • Nslookup
  • – through this you can extract DNS information such as: Mail server extensions , IP addresses.
  • Domain King and Expired Domains – it enable to search through a list of expiring domain names by Keyword, domian , Character lentgh and other criteria.
  • MSR Strider URL Tracer – it enable to scan a domain name to see the third party domains that it serves content from and/or whether the site is being redirected
  • Mozzle Domain pro
  • Domain research Tool

Foot printing tools for Locating Network Range

(Finding the range of IP addreses and Discerning the subnet mask)

  • ARIN 

It allows searches on the whois database to locate information on a network’s autonomous system numbers (ASNs), network-related handles, and other related point of contact (POC)

  • Tracerroute – It reveals the path IP packets travel b/w two systems.
  • 3D traceroute – allows visually traceroute program
  • Neo Trace and Visual route trace – allows visually traceroute program
  • Path Analyzer Pro – it delivers advanced network route tracing.
  • Maltego – its used for information gathering phase of panetration testing
  • Touchgraph – ->it allow for the creation and navigation of interactive graphs. (Ideal for organising link or mind mapping)

Foot printing tools for Mail Tracker

  • VisualRoute Mail Tracker – It shows the numbr oh hops made and the respective IP addresses, the node name,location, time zone and network
  • eMail Tracker Pro – the email analysis tootl that enables analysis of an email and its headers abutomatically, and provides graphical results.
  • Read Notify –
  • E-Mail Spiders also use for Foot printing
  • Foot printing tools for Locating Network Activity
  • GEO spider – its help you to detect,identify and monitoring your network activity onthe World map.
  • Geowhere – it handle many popular newsgroup to find answers to your queries in an easy and fast manner
  • Google Earth – its put a planet’s worth of imagery and other geo info.
  • List of Search Engine as Footprinting Tools
  • Kartto –
  • Dogpile – (Meta Saerch Engine)
  • Webferret – its searches the web quickly and throughly by instantly submiting the search query to multiple search engine
  • Robots.txt as for FootPrinting
  • Website Copier as for Footprinting

Keep visiting !!