Showing posts with label Gmail. Show all posts
Showing posts with label Gmail. Show all posts

Sunday, 17 February 2013

HOW TO HACK E-MAIL ACCOUNT PASSWORDS BY USING EMAIL HACKING SOFTWARE


've been posting a lot about Email Hacking on this blog. Now you know that there are many ways to hack email password, like bruteforcing, social engineering or Reverting, but the main two methods used to hack email passwords are Remote Keylogging and Phishing. In this article i'll show you how to hack email account password using keyloggers and trojans. Here I am demonstrating using PRORAT trojan. You can use any trojan or keylogger as per your ease. The basic functionality of all backdoors are same. Pls make note that all these hacking tools and softwares are detected by antivirus. You have to uninstall or close you running antivirus first. Now we can start.


How to Hack Email Account Passwords Using ProRat?

1. First of all Download ProRat. Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "pro".

2. Open up the program. You should see the following:

prorat
3. Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".
prorat2
4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.
prorat3

5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

Here is a quick overview of what they mean and which should be checked:
prorat4
6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.
prorat5
7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.
prorat7

8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons helpmask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.

prorat8


9. After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.

10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.


prorat9
12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.
prorat10
13. The image below shows the message that the victim would get on his screen if the hacker chose to message him.

prorat11

14. Below is an image of the victims task bar after the hacker clicks on Hide Start Button.

prorat12


15. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.
prorat13
As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.
NOTE: This Program Works if U Disable Your Antivirus..

Saturday, 12 January 2013

Computer ah (7.45 Gmail Drive)

 hih ciang in computer sung ah 7.45GB free in koih dan hi
a masa in a nuai aa na download in                      
download
download
1.na download khit ciang in install in
2.my computer sung ah lut in
3.other nuai ah Gmail Drive right click in
3.login as ah gmail id na password at in
4.OK
hih ciang in conection om ding ki sam hi conection om lo in ki ngah lo hi

Friday, 4 January 2013

Gtalk zawgyi

a thei khin sa te na mitsi voo....
gtalk ah kawl lai a ki at thei kei leh a nuai a bang in bawl in
1.setting ah lut in
2.change font
3.a nuai lam ah kai suk le cin zawgyi-one on ding tua meek in la
4.OK pia

Tuesday, 1 January 2013

password unlock

Gmail gtalk passward ong ki laih sak hi lo in ah unlock cih zong om thei hi te pen bang cih hih ding hi hiam cih leh a nuai a link ah lut in
https://accounts.google.com/DisplayUnlockCaptcha
na lut khit ciang in na gmail id leh na password at in la tuat khit ciang unlock meek le cin na
gmail ong ki hong thei kik ding hi
           

Sunday, 16 December 2012

Gtalk,Gmail,Hacker

gmail,gtalk na hack nop leh hih ki zang thei hi.a deih te in na download un
DOWNLOAD

Wednesday, 21 November 2012

Gtalk & gmail password

Gmail ai zong gtalk ai zong i hon ciang in remember password ah ki koih kha thei hi.remember password ah koih kha leng i sign out zong in password om den hi.computer shut down zong in i hon kik ciang in na om ding ding hi.tua a om nawn loh na ding in bang ci hih ding hi hiam cih leh a masa in mozila fire fox hong in a nuai a lim dan in bawl in
1.www.  om na gei a lei tung lim dan pen meek in la
 More information ah lut in
2.Cecuyity ag lut kik in
3.View save passwords ah lut kik in
4.Remove all meek in
hih teng hih khin le cin na password ong om nawn lo ding hi.
gtalk ai zong gmail ai zong in na sign in ding ciang in Remember password ah man pia kha kei in.na piak khak zen zan leh hih a tung a dan in na bawl le cin.

Saturday, 17 November 2012

Gmail ah myanmar Mp3 album koih sin dih ni

Gmail ah myanmar Mp3 album koih dih ni
a ma sa in na gmail mah hon ding hi lo dia
1.setting ah lut in
2.labs ah lut in la Add any gadget by URL zong in la Diable pen Enable pia in
la save change le cin inbox ong lut kik ding hi.
     setting ah lut kik in
3.Gadget ah lut in
 4.Add a gadget by URL a cih na nuai ah
http:
//music.all-channel.com/acmusic.xml
hih teng copy paste in la ADD meek in
a lim sung a om dan in nang a zong ong om ding hi

Gmail pan in ph.SMS khak dan

Tu a post pen a thei khin sa zong tam pi om ding hi hang a thei nai lo te a ding i cih na hi
a lim bek en leng zong ki tel in um ingh.
a masa in na gmail hong masa in.
1.setting sung ah lut in.
2.labs sung ah lut kik in
3.Disable pen Enable ah khel in
4.a nuai lam ah kai suk le cin saving om ding hi tua saving meek le cin na a ma thu in
inbox ong ki hong ding hi

5.online tu te tung lian a kuat sung ah Search,chat,or SMS om ding hi
tua teng ah ph.no.at in ph.no.na at ciang in country code guang in tua ph.no.na at khit ciang in Send SMS tel phei in.
a nuai a lim en in
6.na khak nop nu/pa min at in
7.na khak nop nu/pa om na gam tel in
8.save meek leu leu le cin a nuai a lim bang in ong om ding hi
9.online chat bang in om ding hi tua teng ah na lai at nop teng at in la ENTER meek in
tua hi leh naSMS khak nu/pa ph.sung ah SMS na lut ding hi.
10.Na SMS khak nu/pa in zong tua na khak na number tawh nang ong reply kik thei hi.
tel loh na a om leh ki kum toto ni

Friday, 9 November 2012

Gtalk tam pi na hin nop leh

na computer desktop tung a gtalk right cleck in
properties meek in
target: en leu leu in la    googletalk.exe'' nung lian ah /nomutex cin la at in
na at khit ciang in OK pia in
 

Saturday, 3 November 2012

email lui sung aa,contact om teng email thak ah na koih nop leh

gmail account lui pen hong masa in
compose tung lian ah gmail meek in
1.contact meek in
2.more
3.export in download box khat ong kia ding in save in
Gmail account thak pen hong leu leu in la
compose tung lian ah gmail mah meek kik
contact meek,more meek
4.a nuai a a eng tawh ki um
imports meek in
 5.browse meek den a na save pen guang kik in
6.import meek kik in
 hih teng na hih khit ciang in gmail lui sung a contact teng gmail thak ah ong om ding hi