Wednesday, January 28, 2015
Monday, January 26, 2015
How To Get a Free US Number !! (Part-1)
How To Get a Free US Number !! (Part-1)
Hello guys, Today i will show you how to get free US number.
We need US number sometimes. For Google account verify or other any account verify or sometimes for freelancing. So it is may be important for you. Often you can't get US phone number free for yours own.
But there is a way to take a US number for free. Remember it that you can't use this number for dialing. You can only use it for receiving calls. Lets go.....
Step 1. Go to 'Callcentric' directly from your browser.
Step 2. Now click 'sign up' from upper right side. Then one page will come like below and then fill the right side form what says 'new customer please sign up here'. Fill the form correctly with your 'first name', 'last name', choose a 'username', 'password' and then click on 'I am not robot' verification.
After verify you are not robot click on 'continue'.
Step 3. After you clicking continue a page will come who says that a confirmation email would sent to your email address. Please check your email for complete sign up process.
Step 4. Then you need to check your email account. Open your email and you can see one new email came from callcentric. Read this email and click the link for verify.
Step 5. After you clicking this link a page will come like below and you need to fill this form with solid information. You need not select 'state'. Leave empty the 'agent id' field. This is for US and Canadian citizen. Tick on the user license policy and agreement. Then press 'I agree, sign me up'.
Step 6. Now you completely created your callcentric account. You will be redirected to your account dashboard. Now you can buy a US number. But You need free number right? don't worry... find 'order a rate plan now' on dashboard and click on it.
Step 7. Order 'free phone number' from rate plan.
Step 8. After you clicking 'Get a number' a page will come like below and you need to fill the left form which is under 'find by location' tab. Fill this form step by step. Choose country 'US' and give state 'NY' and give a area code for NY. By the way, you can leave this field empty and press on 'look up'.
Step 9. Now you can see all available number like below. Choose one as your wish and hit on 'order now'.
Step 10. You will see a page like below and you need to click 'checkout'. It is your free shopping cart recite.
Step 11. you are now seeing a page which is warning for security and 911 information. There are a question 'are you using our service within united states or Canada?' You need to select 'no' and on 'digital signature' you need to put your last name. Then press 'submit'.
Step 12. After that a page will come again like a recite. And you need to submit again.
Step 13. Then you need to wait sometime and then a page will come that says that 'your order successfully completed'. From the page you need to click on 'go to my callcentric' from the below of page.
Step 14. Now you are successful and you have a US number by which you can receive a call. When some one call to your number you can check your callcentric voice mail and you can also set an application to receive call instantly.
You can see your number under the 'product' tab and can check your voice mail on the right side 'voice mail' tab.
That's all for today....
I will show you how to set an application for receiving instant phone call in next post..
Don't forget to like this post to get next post. And also you can like my Facebook page to get update.
Thanks to all.
Monday, December 22, 2014
Hack a computer by Trojan virus!
Hack a Computer by Trojan Virus!
Today we will learn about a Trojan virus which can control victim’s PC and can damage to him/her. ProRat v1.9 is dangerous professional hacking software. You can do many harmful works with this virus. Control PC, breaking security and password, format his/her hard drive, shutdown PC, Restart PC, know about file and folder and much other work you can do with this software.
Yes, this is really true. I will explain what you can do more
with this!
You need to disable your antivirus from your PC before use
it. It is better to off your antivirus totally. Because antivirus will detect
it like a virus and you could not work with this software.
Now you can download ProRat v1.9 software from this link.
Extract the downloaded file and find the main software to
install. You should work carefully with this software because if you work
without knowledge, it will harmful for your own PC. You should work with more
carefully.
You can hack someone’s PC by making a virus with this
software. You need to create a virus with this software and run your created virus
on victim’s PC.
At first start your ProRat v1.9 software.
Click on “create” and select “create prorate server
(342kbayt)”.
You will see a menu like this image below. You are seeing
many fields, all are important.
You need to set your IP in “pro connective notification” because ProRat
software will make a connection by it between you and victim. To set an IP
click on small red button (like a red circle arrow). This software will set
your IP automatically.You must remember incoming IP and you should write it in a note, because
you need this IP in future.
Set your email ID on “mail notification”, by this you will
inform about attacking victim and important information about victim’s PC.
First write your mail ID and click on test button. Check your notification mail.
Is it correctly comes to your mail ID or not? This can be stored to your spam
folder. Save your mail from there. After that all mail will stored to your
inbox by this mail ID.
You need to click small red button (arrow) to fill up “ICQ
pager notification” field. The software will set your ICQ pager notification
automatically.
You need not change anything on “CGI notification”.
So you finished notification part.
Now you need to set general setting. You also are seeing here
many fields.
You need not change in “server port”. Put it unchanged.
Give the “server password” as you like. There are given
123456 by default. You should give a new password so other ProRat user could
not connect to your victim.
Select a victim’s name. You can give any name here as you like.
You will see some tick box in below. Those are command to
your operation on victim’s PC. Set these options as your wish.
Now you finished general setting. The next term is “bind with file”.
You need to bind your Trojan virus with a file. You need to
tick on marking area for this and click on “select file”. You can add any type
of file here.
It is better to use image or small file with your Trojan
virus.
Yes, binding is complete now.
Next term is “server extensions”. Select “server extensions”
and set an extension for your Trojan’s server. In this term it is best to use
.exe extension, because you will get icon support and it will easy to cheat
with a victim.
Next term is “server icon”. Select an icon from “server icon”. You need
to be more careful in this term so you can cheat with a victim easily. Look, I
select there a flower icon.
You finished “server icon” setting.
Now click on the “create server” and a warning message will
come. Press ok on that and your Trojan virus is ready now.
You will see a “server.exe” file in ProRat folder and it is
your created Trojan virus. Do not run this server on your PC by mistake. Because
your PC could be damaged by this server. Rename your server with put a
similarity with icon. You should make this file more attractive so that victim
could not understand this file without antivirus. Then you need to compress
this file. The reason of compressing is generally antivirus program do not scan
compress file. Now you need to upload this file on mediafire or other hosting
site. You must send this file to victim anyway. You can write some special
about it and give a download link of this file. When you will success to send
this file to victim, victim will run this file and the Trojan virus will works
with the command you gave. If your victim has an internet connection then you
can get the full control of his PC. When the victim will injurious, you will
get email notification. What a funny!!
When you get email notification from victim’s PC, click the “connect”.
Before connecting you should write the IP address (notification 1).
Press ok with giving your created virus password. A message
will come like below.
You can take full control of victim’s PC by left side option
of this software. You also can format his hard drive from here.
I am saying again; please do not use this to damage anyone.
You only connected to victim’s PC. Now I am going to tell how
it works! You can get full control of victim’s PC by 24 commands. If I want to
tell all of them I need more time. So I am describing some of them.
Windows:
When you click windows you can see like below. You can refresh and many
other things from here to victim’s PC.
Message:
You can send message to victim by clicking “message” like below.
Chat:
You can chat with victim by clicking “chat”. Look in below.
Keylogger:
You can know more information of victim’s PC by clicking “keylogger”.
Look below.
Give damage:
You can format victim’s hard disk by clicking “give damage”
like below.
It is more. I cannot write all because of short time. Thank you
so much to read it.
Please follow this blog to find more hacking tips.
Do not apply this to damage anyone.
Bye bye!
Monday, December 15, 2014
How to hack a credit card ! (part-2)
How to Hack
Credit Card!
(Part-2)
In the laws of information and
technology, Credit card hacking is a punishable crime. So everyone read it and apply it with
own responsibility. For your any kind of work writer will not liable. This
post is for the educational purpose.
In the first part we learned about how to collect website’s admin and
user’s credit card information from shopping site or e-commerce site. Today we
will see how it possible to do shopping with those information.
Let’s start…
Use A VPN
VPN or virtual proxy
network enlarge a privet connection network to a public connection network. Its mean VPN connect your computer to a public
protocol and it will not possible to know your real
location. VPN engine encrypted your computer MAC address when you will use VPN.
You can use some online VPN without any cost. You also can use some free VPN
software. You can find much free VPN software in Google search.
I am not discussing in details about how
to use VPN or how to make a VPN network. But it is easy and best for use
because free VPN have a low bandwidth.
Use a R.D.P
R.D.P
or remote desktop protocol is a network channel by which you can access with
other computer connected to the same LAN. If you try to connect other computer
by RDP, its need to have RDP in another computer. A big amount of people
usually use windows operating system. Some are using Linux. These operating
system have connected with RDP server by default. Mainly TCP port 3389 is open port in RDP server.
Now if you want to access with victim’s computer then from windows control
panel with remote desktop connection you should put victim’s ip then connect. Suppose
victims ip is 192.180.23.45, put it and then connect to victims computer. it
will want a username and password and you need to put them from credit card
information list what’s we found in part 1. Then when it will connect you will
get the access with his computer. The reason of use RDP is shop online with
victim’s credit card information by his own identity.
Use of socks
Socks 5 socket secure is mainly a protocol who root the path of your internet
provider with your computer and pass your network in different side. Actually this
protocol is like a security fence. It’s like two part of layer who makes a
second part between your computer and internet provider. You can find here free
socks list.
You can buy it also. It is easy to use socks in Mozilla Firefox. At first
from tools, go to option-advanced-network-connection-setting. Now you will see
some box 1.no proxy 2.auto detect 3.use system proxy 4.manual proxy
configuration. You need to select 4. Now you need to give host ip of socks. Suppose
ip is 192.168.68.1 and port is 1802, give it and click ok and come out. You are
now connected to secured socks.
Credit card of victim
Now you
need victim’s credit card information. We saw in part-1 how to collect victim’s
information. You can get more information in internet or dark web. But many of
them may not work. Suppose some credit card information is like below.
First name: john
Last name: dare
Spouse name: mike
Father name: mike Dave
Billing address: 5005 w Rio vista ave
City: Tampa
State: Florida
Zip code:33634
Country: USA
Phone number: 425-315-5926
Credit card number: 5434-5487-8925-6317
Cvv2: 899
Card type: credit
SSN: 666-15-2154
Exp:
10 march 2016
You need not all information of credit
card. Some shopping site just want cvv, card number and exp date.
Let’s
go to shopping…..
Suppose you want to buy a DSLR camera or a smart phone. It is better to
order from your own country’s shopping site. You can get your things in a short
time by this. Either you can order from foreign website.
There are two system of credit in shopping site. One is VBV (verified by
visa) and other is non VBV. VBV is a secured transaction system of visa and you
need to give here all information about card. This type of payment system can
caught a hacker. Non VBV system by a verification method you can buy anything
but it may be hard to find faithful site.
At first open your VPN, select any country. Then connect victim’s computer
by RDP (remote desktop connection). Remember it, you must give the same country’s
ip which you get from card.
Now connect to socks 5 from Firefox. Remember you must put the same city
and country listed on victim’s information.
Now you need to open a email id with card holder’s name & other
information. And if you can access to his real email address it will great.
Go to any shopping site.
Now register on this website with your collected information information.
Then you need to give shipping address. It’s mean where you want to get
this product. Remember, do not give a address where you will be caught.
Select a product and give credit card
information in payment.
Then order it. Generally 95% product is come. If not come it’s bad luck. You
can use international courier service to buy product from abroad.
Today no more. But I will come with more new tricks.
Sunday, October 26, 2014
How To Hack a Credit Card ! (part-1)
How To Hack Credit Card !
(part-1)
In the laws of information and technology, Credit card
hacking is a punishable crime. So everyone read it and apply it with own responsibility.
For your any kind of work writer will
not liable. This post is for the educational purpose.
Now a days credit card is a important things
in our daily life. May be you do your more work with it. 2 kind of credit card
available.1. Debit card.2. Credit card.
Debit card:
The meaning of debit is ‘you have definitely put some money on your account and you can use it.
Credit card:
The meaning of credit is you have a limit on your account. If you cross that limit, then after the month you need to pay the bank.To use credit card on internet you need CC number and expiry date.
The meaning of debit is ‘you have definitely put some money on your account and you can use it.
Credit card:
The meaning of credit is you have a limit on your account. If you cross that limit, then after the month you need to pay the bank.To use credit card on internet you need CC number and expiry date.
CC number:
If you want to buy something from
internet you must have this information. If you want main balance you must have
also BIN code and account number. Then you can take money from ATM.
For example,
BINS=
The first six digit of CC number. (If the CC number is ‘1234567812345678’ then
BIN number will ‘123456’. I hope you understand that.
Now how you get money from credit card??
Now a days all kinds of bank is not cash
able directly. So they use a system called ATM or
ABM system. A bank have no one type of BIN number. Suppose
bank BIN is ‘412345-412370’ so bank give you the number by a similarity of your
town and city after put a part. So you cannot use it in other city.
Some cashable BIN list is given below.
Remember it, when you take Direct money
from ATM you should have 4 digit pin code. But for online it won’t need.
There are two way to hack a credit card.
1. Credit card scams
2. Credit card shopadmin.
Now we learn to shopadmin hacking because you
can buy something online with it and it needn’t 4 digit pin code. With this
method you will get account number.
It have different type likes VP_ASP,
X_CART etc. we will describe about
VP_ASP SHOP.
VP-ASP Shopping cart,
Verson:5.00
After that,
I suggest to go to that site
‘****://***.victim.com/shop/shopdisplaycatagories.asp’
Now find to database location. For that
the command will,
‘****://***.victim.com/shop/diag_dbtest.asp’
One page will come that is,
xDatabase
xDblocation
resx
etc.
In that very important is x database.
xDatabase: shopping140
Now to download the database file the
command will,
‘****://***.victim.com/shop/shopping140.mdb
‘****://***.victim.com/shop/resx/shopping140.mdb
It is not for all all term. This was my
term,
‘****://***.victim.com/shop/shopping500.mdb
Now you
will get a mdb file. Download it and open with a mdb file viewer. After open
you will get all information of admin.
Take log=in information from here.
I was
get a login portal here.
After log in its look like below.
You can
get more users card’s information from
here.
Card’s
information is too secret but I show a info for your understanding purpose.
The Post will continue.........
Bye for today....
Subscribe to:
Posts (Atom)