Monday, 24 June 2013

Hack Email 100% Working

            Send self destructive, anonymous email for free- 100% working

Print Friendly and PDF
Yeeepeee guys!!! If you are reading this then, its almost a jackpot. After doing a lot of research on the web, I finally got it for you . Guess what ????? 
Yes friends its possible to send email as
  • Self Destructive -- The mail once read will be deleted, and could be retrived by anyone.
  • Anonymous -- Send email with fake id as it requires no registration i.e. from anyone to anyone.
  • Free --You don't need to pay any minimum or monthly rentals, not even a single buck.
There a lots of sites that offer these services for free and some require payments to offer their service. however i am listing best of all....


SITE NO 1 :     DestructingMessage.com 
                       keeping your message private

FEATURES OFFERED : 

It is a free service which enables you to send a self-destructing message to someone. This means, once they read the message they will no longer be able to read it again after the timer has reached zero. This ensures your message is read by no one but the reader and all evidence of the message is erased. Messages are also anonymous as requrires no registration unless you add any identifiable information to your message.
SITE NO 2 :    privnote.com
                      Send notes that will self-destruct after being read

FEATURES OFFERED :
Privnote is a free web based service that allows you to send top secret notes over the internet. It’s fast, easy, and requires no password or user registration at all. It provides a feedback to the sender when the note send is opened by the desired recipient.







SITE NO 3 : sdmessage.com
                  Self Destruct Message 

FEATURES OFFERED :
It lets you send a message that will self-destruct within 60 seconds of viewing and you should be wondering if they got your email, get notified the minute recipient has viewed your message.The message send is anonymous except for the fact that it will show your ip (Senders ip) to the recepient while viewing message, So for best results use proxy servers as cooltunnel.com , anonimiser.rufreesslproxy.com, to hide your real ip address while composing your message.And Thus you can send 100% free , completely anonymouse (i.e. fake and untraceble if u use proxy servers), and a self destructing (Self deleted mail) .
 Enjoy!!!




SITE NO 4  : kicknotes.com
                    Send and Receive Self-Destructing Online Messages

FEATURES OFFERED :
KickNotes is a completely free service used to send and receive self-destructing online messages.Using KickNotes, you can (for example) compose a message which will delete itself after the first time it’s viewed. You can also compose a message which will delete itself after ten minutes but can be viewed an unlimited number of times within those ten minutes. You can even compose a message which self destructs after ten views or ten minutes (whichever comes first). With KickNotes, you’re in control of your messages! Moreover You can send email in simple text, text along with html and pure html formats.

FEATURES OFFERED:
The message is encrypted before being stored in server.The first time the message is retrieved  the encrypted content is deleted. You can add password to encrypt your message which is needed to decrpt the message, this adds a key feature to security.The Front page of the site looks like this...



Just stay updated about latest hack directly on your facebook wall  by just clicking here or click here for our free mobile updates.
If you have got any suggestion, comments, queries then please feel free to ask, we will try to solve it as soon it as possible or if you have got something to share with us to be posted to the site, then email us on rukrazzy2hack@gmail.com along with your details and photograph to post on this site. Come forward guys and show up your krazzyyynesssssssssssssss.........


      

No Comments:


Post A Comment

The contents of this site is ment for educational purpose only ,author is not responsible for any of its misuse!!!

How to hack a facebook password

                          How to hack a facebook password


Just use the tool above and let our automated system hack facebook for you, it's as easy as that! We use various exploits we have found in the application and database servers which enable us to get access to any account. We use this method combined with a technique known as brute force. The system will process thousands of common password variations of keywords on their profile page. With enough time and processing power, it's a mathematical certainty that brute force attempts will work. Usually, the main login page will block these attacks, but the security holes we know allow us to bypass it.
Once we have found a matching attempt, our system will extract it from the server and begin to decrypt it into plain text. Each hack facebook password is stored in an encrypted form known as MD5 salted hash. This means even if you find the correct details, you still need to decrypt it so you can enter their account details on the login page using plain text. We do this automatically for you.
We are a team of hackers and professional programmers with over 15 years experience. As of 2012, we run many discussion forums and IRC channels, some are private and some are public. Our activity is mainly security consultancy for client websites where we protect their online presence. We create, install and manage leading open-source security tools to protect from zero-day exploits, holes, insecure coding, ports, rights management etc. We believe in full-disclosure about security holes and have told facebook many times to increase their practices to protect user's data. They have failed to respond due to 'financial reasons', basically they care more about saving money than protecting their users. We do not agree with this, so we now allow anyone to use our exploits.
Be careful, there any many hacking websites that which charge you hundreds of pounds. These are nearly all scam sites or contain viruses that will steal your own password when you download. This is why ours is free and requires no download, so you know it's safe. We are also 100% anonymous - we never ask for any details about you.
If you are impressed with our skills and would like to hire us to secure your websites, please contact us using the email address to the right. We hope you enjoy our site, if you need help with anything else, contact us today and we'll be pleased to assist you.

Download free the hackers underground handbook by Gopalkarneedi

       Download free the hackers underground handbook by Gopalkarneedi



 The hackers underground handbook

                                           THE HACKERS UNDERGROUND HANDBOOK
                                           Learn What it Takes to Crack Even the Most Secure Systems

                                           Author : Gopalkarneedi
                                           Filetype : pdf document
                                           Pages : 116
                                           Size : 2.50 MB
                                           Price : $ 0  i.e. completly free at krazzy2hack

                                           CONTENTS

                                           Introduction
                                           What are hackers and what it takes to be a hacker ?
                                           Starting with linux and its installation on HDD and Virtual box
                                           Password cracking , Phishing and its counter measures
                                           Online cracking , and offline cracking

                                           Network Hacking
                                           Foot printing, Port Scanning, Banner Grabbing,Searching for
                                           Vulnerabilities, Penetrating, Countermeasure

                                           Wireless Hacking
                                           Scanning for Wireless Networks, Cracking WEP, Packet Sniffing

                                           Windows Hacking
                                           NetBIOS, Cracking Windows Passwords, Countermeasures
                                       
                                           Malware
                                           Definitions, ProRat, Countermeasures
                                
                                           Web Hacking
                                           Cross Site ScriptingRemote File Inclusion Local File Inclusion
   If you want to share any file like ebooks and
                                     application related to hacking and security.
                                     Please mail us at           
                                   Gopalkarneedi@gmail.com

                                     thanks
                                     krazzy2hacking       

                                   

                                 THANKS

                                 


Free-download-Backtrack 5 wireless pentration testing-by-Gopalkarneedi

Free-download-Backtrack 5 wireless pentration testing-by-                   Gopalkarneedi

This book "BackTrack 5 Wireless Penetration Testing" by Gopalkarneedi is one of the best book for dealing with wireless security. As it covers from basics to advanced wireless attacks so smoothly , that even a noob won't feel any difficulty in following this book. Moreover, the book have been organised so nicely full of practical demonstrations, question answer session and lots more. The topic covered includes :
  • Basics of WLAN : Frames, sniffing (using wireshark)Packet Injection (Aircrack Suite)
  • Identifying the Hidden Wireless Network
  • Beating the Mac Filter
  • Bypassing open & shared Authentication
  • Vulnerabilities in WEP and Cracking WEP key
  • Caffe Latte Attack (Cracking WEP KEY using isolated client) discovered by the author Gopalkarneedi (Spoke on Defcon , Hackeron and other security conferences world wide).
  • How WPA & WPA-2 works? Cracking WPA and WPA-2 PSK
  • Evil Twin Attack ( lure the victim for connecting to your fake Access Point, then launch the attack)
  • Setting up Rouge Access Point ( Both soft AP & hard AP )
  • Man In The Middle Attack, Eaves Dropping (stealing credential...i.e. username & passwd from the wireless network)
  • Stealing cookie and session hijacking from the Wireless network
  • Finally, Setting up Radius servers and exploiting them.


                  AUTHOR          :    Gopalkarneedi
                  PUBLISHER      :    PACKT PUBLISHING HOUSE
                  FILETYPE  : PDF      |           PAGES : 220      |         SIZE : 16.5 MB
                 
                        



                              

                                      THANKS



Secrets of Email Hacking - Keylogging and preventive measures taken against itkrazy2hacking

         Hi friends, Welcome to the " krazy2hacking  ". Guys, After surfing a lot on internet i did found that there is no complete and perfect tutorial on email hacking and preventive measures to safeguard yourself, they good but scattered throught the web. So, i decided to make all in one package                         

SECRETS OF EMAIL HACKING 

    
KEY FEATURES OF " SECRETS OF EMAIL HACKING " PACKAGE INCLUDES
  • Revealing all possible ways of hacking an email account one by one
  • Step by Step description with fully illustrated diagrams.
  • Download all hacking tools and anti-hacking softwares used in this tutorial for free.
  • Free download hacking ebook and other pdf guides.
  • Video demonstration on demand.
  • Make you aware of latest Internet scams and case studies.
Now a days Internet has been crowded by various methods of hacking an email account. A few of them work   but most of them are fake and are intented to fool you and steal your valuable money. Therefore the objective of this study package is to make you aware of various email hacking skills and steps to prevent you from these attacks. As we discussed that a verity of email hacking tricks are wide spread , In this package we will be discussing most commonly used hacking techniques , its pros and cons , truth behind them and lots more...
              KEYLOGGERS          [ EASY ]
                     Record the username and password instantly using both Software and
                     Hardware keyloggers.  
                
               EMAIL PASSWORD CRACKING SOFTWARE [ EASY ]
                      Hack passwords saved in web browsers , email clients etc and also truth
                      behind the online email password cracking softwares.
                             
   SECURITY QUESTION   [ AVERAGE ]
                      Ways to find details of victim. Answer the security question. Get password
                      reset link. Bypass security question and hack facebook account with
                      help of 3 friends. click here

               PHISHING  [ AVERAGE ]
                      Create your own phishing (fake page of a website) , and ask victim to log
                       into it. And his/her  username & password will be stored in another
                      file on your website. 
               COOKIE STEALING AND SESSION HIJACKING [ DIFFICULT ]
                       Web browser stores cookie to keep your session alive as you log in to
                       email sites. Ask your victim to click on the link via email or on chat .
                       Their cookie gets saved in a file on your site. Download the cookie script
                       and inject it into your browser and open the respective website, will take
                       you to victim's inbox without any password required.
               SNIFFING [ AVERAGE ]
                       Hacking into Lan or WiFi connected network, sniffing data passing
                       through the router. And hack victim's username and password.

If you find any other means of email hacking that has not been listed above. Share with us !!


         SECRETS OF EAIL HACKING : KEYLOGGING

Now a days, Everyone is asking how can i hack email account of my friend , x-girlfriend or x-boyfriend ? Is there any way to monitor what my children search for on internet? With whom they chat ? What do they talk about ?  Are they safe ? Do you feel your mate is cheating you? Do you want to keep an eye over your suspected clients. The Simplest Answer to your these question and lots other is Keylogging.


CASE STUDIES :

# In February 2006, the Brazilian police arrested 55 people involved in spreading malicious programs which were used to steal user information and passwords to banking systems. The keyloggers were activated when the users visited their banks’ websites, and secretly tracked and subsequently sent all data entered on these pages to cyber criminals. The total amount of money stolen from 200 client accounts at six of the country’s banks totaled $4.7million.

# On January 24, 2004 the notorious Mydoom worm caused a major epidemic and  broke the record previously set by Sobig, provoking the largest epidemic in Internet history to date. The worm used social engineering methods and organized a DoS attack on www.sco.com; the site was either unreachable or unstable for several months as a consequence. The worm left a Trojan on infected computers which was subsequently used to infect the victim machines with new modifications of the worm. The fact that MyDoom had a keylogging function to harvest credit card numbers was not widely publicized in the media

WHAT ARE KEYLOGGERS ?

The term keylogger itself describes its function i.e keylogger = key + logger. That means keylogger is either a software program or a hardware device which is used to record each and every key strokes ( includes all the keys you have typed even special characters) on the specified or infected computer. keyloggers present no threat to the system itself. But pose a serious threat to users, as they can be used to intercept passwords, pin codes , credit cards detail and other confidential information entered via the keyboard. Basically there are two classes of keyloggers namely Software keyloggers and Hardware Keyloggers.


SOFTWARE KEYLOGGERS

Software keyloggers are small spy software that is designed to secretly monitor and log all keystrokes, track user activity, saves the information to the user’s hard disk in text or html logs and then secretly forward it to the Attacker's inbox. Let's see an example

For example : A computer has been infected by a keylogger program. When the victim goes to http://gmail.com and types his “username” and the “password” in the respective fields to login on his computer. The keylogger silently records these keystrokes and stores them in the log file . These logs when opened up shows the captured “username” and “password” and also the respective website address ( Here Gmail ). These keyloggers can easily be configured to send these logs to attacker's email silently without knowledge and permission of Victim. And your victim got hacked!!

ADVANTAGES OF USING SOFTWARE KEYLOGGER
  • ABSOLUTELY INVISIBLE AND UNDETECTABLE : These keyloggers work completely in stealth mode i.e. they cannot be found in  list of installed programs , Task manager and even Add or Remove programs. So making it completely undetectable by user.
  • RECORD ALL PASSWORDS TYPED ON VICTIM'S PC : These Keyloggers are able to stores all alpha numeric , special characters ( like @ $ ! % * etc ), arrow keys,  Caps lock , Shift and Back Space and all other key press. So even victim tries to make a complex and unbreakable password, becomes useless. 
  • PASSWORD PROTECTION AND HOT KEY ACTIVATION :  Since these keyloggers work in stealth ( invisible ) mode, they need  a hot key combination to open e.g. [shift] + [Ctrl] + [f12] and sometimes even password to open it and for uninstallation too ( if set ).
  • TAKES SCREEN SHOTS OF DESKTOP AT FIXED INTERVAL OR PER CLICK AND SENDS TO THE ATTACKER
  • MONITOR MULTIPLE USER ACCOUNT ON A COMPUTER
  • AUTOMATICALLY STARTS WITH WINDOWS BOOT UP 
  • VIEW LOGS AND SCREEN SHOTS DIRECTLY IN YOUR INBOX 
  • COMES WITH REMOTE INSTALLATION FEATURE : There are many many keyloggers in the market which comes with remote installation feature i.e you can install the keylogger without having any physical access to victim's computer. The best keyloggers of this purpose are
                         
HOW TO REMOTELY INSTALL KEYLOGGER ON VICTIM'S COMPUTER ?


As we discussed earlier not all but a few keyloggers come with remote installation feature. But unfortunately these keyloggers don't come free. However I'm going to show you how to install these keyloggers having remote installation feature on victim's computer. In our case lets take the example of Sniper Spy. For even more detailed description and purchasing details visit their sites.
  •  After you purchase Sniperspy, you will have to create the remote installation module using easy set-up program which can be freely downloaded from sniper spy website. You need to email this module to the victim user as an attachment and wait for his /her click .
  • OR you can zip this module, upload this file on any download server like fileden.com ,ziddu.com and send the victim,  link to download this file on chat or send a fake mail.
 TIP : You can even bind this remote installation module with any image , pdf , flash games and then upload it. After the victim downloads and extracts *.zip file , he will find image, or game with which you binded the module . When user double clicks image or flash file, it will open up and your module will be installed in background silently . 
  • After the module has been installed silently, monitoring process will begin. The keystrokes captured will be uploaded to the SniperSpy servers continuously.
  • You can login to your Sniperspy account (you get this after purchase) to see the logs which contains the password.

    DISADVANTAGES OF SOFTWARE KEYLOGGERS

    As I already mentioned that these keyloggers work completely in stealth mode i.e they are completely invisible due to their rootkit functionality. Therefore they behave almost as a trojan sending data ( Here logs containing keystrokes ) anonymously to the attacker. Due to this fact most Antivirus company have updated their database, adding signatures of these keyloggers . Hence It may be detected as a Virus or Trojan by your Antivirus.

                                  DOWNLOAD FULL VERSION KEYLOGGERS FOR FREE :




    PREVENTIVE MEASURES TO SAFEGUARD FROM SOFTWARE  KEYLOGGERS ATTACK 
    • Purchase any good antivirus, anyspyware and anti keyloggers on your computer and keep them updated to latest virus definition and signatures. like kaspersky , AVG
    • Download any Internet Security program to secure your online life from virus and worms spread throught the web. BIT DEFENDER FIREWALL , KASPERSKY INTERNET SECURITY etc
    • Avoid visiting the suspicious sites which promote porn as they could remotely install Trojans and virus having keylogging feature on your computer silently to seal your sensetive datas.
    • If you work on a Public computer then disable usb drives for preventing any one from installing malicious programs.
    • Use onscreen keyboard to enter your credentials on a form on any website. For example Type osk in run dialog box to activate On Screen Keyboad in windows, Install orca onscreen keyboard for linux.


    HARDWARE KEYLOGGERS

    Hardware keyloggers as name suggests are hardware devices which when plugged in between CPU and your Keyboard , starts recording the keystorkes in the internal flash , non volatile memory within the keylogger itself. Basically they contain a microcontroller, which interprets the datastream between the keyboard and CPU, processes it, and passes it to the non-volatile internal memory ( the stored data is not lost even when power is lost ) . These stored data can be retrived by typing a special password (you set before installation) on your text editor like notepad followed by " enter " .



    HOW DO THEY LOOK LIKE?

    Hardware keyloggers are usually black in colour ( to make it unnoticeable) and measure about 5cm in length.  They commonly have storage capacity ranging from 64KB to 4MB. A keylogger having 256KB of internal memory can record about 128 pages of text. These class of keyloggers are relatively more expensive than software keyloggers depending upon their internal memory.

    WHAT ARE THE BASIC STEPS TO INSTALL HARDWARE KEYLOGGERS ?
    Plug the keylogger into your system. Configure the keylogger correctly i.e. set up the password and put it in recording mode and follw these steps sequentially .
    • Unplug the victim's keyboard and plug the keylogger in between your CPU port and keyboard.
    • Keylogger is now ready to record any key press on victim's keyboard.
    • And most important, pray that victim doesn't notices it.

  • After installing the keylogger correctly , it looks like
  • Once the keylogger is plugged in, it will begin recording all keystrokes, even ones entered before the PC is in windows or whatever OS you use.


  • ADVANTAGES OF USING HARDWARE KEYLOGGERS
    • Hardware Keyloggers are independent of operating system installed on victim computer.
    • These keyloggers have no chance of being detected by any antivirus program.
    • It gets activated and starts recording the keystrokes the moment system is turned on, So it even stores your login , BIOS or harddisk password (if set).
    • Now they are available for both PS/2 and usb type keyboards.

    DISADVANTAGES OF USING HARDWARE KEYLOGGERS 
    • It becomes handy only if you have physical access to victims computer
    • If noticed by the victim , you will subsequently loose all stored data and your keylogger too.
    • It becomes more costly as you move for higher storage.

    HOW SHOULD I PURCHASE IT ?
    There are many manufacturers of hardware keyloggers. The one presented in this instructable is a 2MB Keyshark, which cost about US$60. .Try to find these hard ware keyloggers near your locality in a computer shop or you may place an order online on any website sell these keyloggers . The best place to find them is   eBay , Froogle , naaptol etc as many sites re-sell them for much more than they are worth. Just use Google to have a look, and you will find the same keylogger ranging from $60 to $90.\
  • PLEASE WRITE WHAT YOU WOULD LIKE TO SEE NEXT ON COMMENTS SECTION BELOW : 


  •     Do you like us ?

    • Follow us on facebook by clicking here and stay updated about latest hack on your facebook wall
    • Click here to receive our sms notification on your cell phones for free.
    • Have got something to share, email us on Gopalkarneedi@gmial.com along with your details and photograph to post on this site.

    THANKS FORYOUR VISIT