1ND14N H4X0R5 T34M (IHT) JAI HIND JAI BHARAT

We are :- DeadManINDIA,Null_Port_Govind,Haxor Rahul,EagleShadow,Karate-Katrina,Spy-Hunter,Grey-Noob,Mr.R@66!T.

Saturday, 8 March 2014

How to get anyone's IP [ Picture Method ]

At first we must have 2 things:1) Victim2) Link for the websites, which i will tell you later3) Email address [optional]Let's start: 1. Find a victim, it can be anyone. I'll choose myself just to show you.2. Open http://iplogger.org/ OR http://www.whatstheirip.com/ ( I prefer iplogger, because you don't need an email address )3. So after you opened iplogger website, click on "Generate an invisible IPLOGGER" button. It should look like this4. Then...

Friday, 7 March 2014

[Tutorial] Setup Zeus Bot WITH Pictures & Tutorial

[Tutorial] Setup Zeus Bot WITH Pictures & Tutorial This Tutorial is for education purposes ONLY and I am NOT responsible in any way on how you use the information provided and what you do with the files. Thank you and enjoy reading.First of all I want to tell you that ZeuS Bot is the most illegal bot out there. It is the only bot that connects to a webhost and not to a IRC channel or a PC. It is highly illegal as it is considered as a banking...

Thursday, 6 March 2014

Some hash types

Some hash types  Domain Cached Credentials Example: Admin:b474d48cdfc4974d86ef4d24904cdd91 Used for caching passwords of Windows domain. Length: 16 bytes. Algorithm: MD4(MD4(Unicode($pass)).Unicode(strtolower($username))) Note: [1] MD5(Unix) Example: $1$12345678$XM4P3PrKBgKNnTaqG9P0T/ Used in Linux and other similar OS. Length: 34 characters. Description: The hash begins with the $1$ signature, then there goes the salt (up to 8 random characters; in our example the salt is the string "12345678"), then there goes one more $ character,...

How to use hashtag tool for identifying Hash type

HashTag: Password Hash Identification Click here to download source code or access it online at OnlineHashCrack Interested in password cracking or cryptography? Check this out. HashTag.py is a tool written in python which parses and identifies various password hashes based on their type. HashTag was inspired by attending PasswordsCon 13 in Las Vegas, KoreLogic’s ‘Crack Me If You Can’ competition at Defcon, and the research of iphelix and...

List of hash functions

Cyclic redundancy checks Main article: Cyclic redundancy check Name Length Type BSD checksum 16 bits CRC checksum 32 bits CRC crc16 16 bits CRC crc32 32 bits CRC crc32 mpeg2 32 bits CRC crc64 64 bits CRC SYSV checksum 16 bits CRC Adler-32 is often classified as a CRC, but it uses a different algorithm. Checksums Main article: Checksum Name Length Type sum (Unix) 16 or 32 bits sum sum8 8 bits sum sum16 16 bits sum sum24 24 bits sum sum32 32 bits sum fletcher-4 4 bits sum fletcher-8 8 bits sum fletcher-16 16...

Wednesday, 5 March 2014

Android cheet codes

1. Phone Information, Usage and Battery – *#*#4636#*#* 2. IMEI Number – *#06# 3. Enter Service Menu On Newer Phones – *#0*# 4. Detailed Camera Information –*#*#34971539#*#* 5. Backup All Media Files –*#*#273282*255*663282*#*#* 6. Wireless LAN Test –*#*#232339#*#* 7. Enable Test Mode for Service –*#*#197328640#*#* 8. Back-light Test – *#*#0842#*#* 9. Test the Touchscreen –*#*#2664#*#* 10. Vibration Test –*#*#0842#*#* 11. FTA Software Version –*#*#1111#*#* 12. Complete Software and Hardware Info –*#12580*369# 13. Diagnostic Configuration...