Friday, November 28, 2014



GBA4iOS is a neat little hack for the iPhone that allows you to play Gameboy games and it’s very easy to setup. It was available for iOS 6 but has now been updated to work with iOS 7. It even works on the iPad and it doesn't need jailbroken device :)


Features:
  1. Redesigned for iOS 7 
  2. iPad Support 
  3. Game Boy Color Support
  4. Cheats 
  5.  iOS 7 Controller Support 
  6.  Event Distribution 
  7.  Dropbox Sync 
  8.  Custom Controller Skins 
  9.  Sustain Button






Steps:
  1. First you need to set the date on your device to any time before the 19th of February. This is essential in getting the app installed.
  2. Then all you need to do is click this link when on your iPhone - Download GBA4iOS 2.0
  3. Then you’re all set. Enjoy gameboy games without jailbreaking your device :P :D

Wednesday, November 26, 2014

IntelliScreenX is a multi- purpose tweak that brings a variety of information to the lockscreen and notification center. It gives an at a glance view of Facebook, RSS, Mail and much more to the user right on the lockscreen and NC. And it's crack is almost impossible to find anywhere on internet. But you're lucky because here we provide you the rare crack of IntelliScreenX. So what are you waiting for ? Quickly grab your copy and enjoy free intelliscrrenX on your iDevices

How to install .deb file via ispirit?

Setps to install IntelliscreenX7:

1. Download .deb file (Download IntelliscreenX7)
2. Upload .deb file to your iDevice
3. Install .deb file via ispirit
4. Respring Springboard
5. Enjoy!










Monday, November 24, 2014

Steps:

  1.  First of all download and install wireshark. (Download Here)     Note: While Wireshark is getting installed, ensure that it installs the      Winpcap with it otherwise it won't work properly.
  2. Now go to the Capture button in the top menu of the Wireshark as shown below and select the interface( means your network card which can be Ethernet or WLAN).
  3. Now it will start capturing the packets through that Network card. What you have to do is just keep capturing the records for atleast 20 - 30 minutes for getting the best results. After 20 - 30 minutes, again go to capture and stop capturing the packets.
  4.  Now you need to filter your results, for this Go to the filter box and type FTP and SMTP one by one. Note: if you get records for FTP then hacker has used FTP server and if you didn't got FTP that means hacker has used SMTP, so give SMTP in Filter box.
  5. As you scroll down you will find the “FTP username” and “Password” for victims ftp account in case FTP server is used. And if hacker has used SMTP then you will find "email address" and its "password" that hacker has used to create keylogger.



Features:


  • Unlimited Money And Gold




Features:

  1. Unlimited Money
  2. Unlimited Glu
  3. Unlimited Club Coins



Download Deer Hunter 2014 Mod APK v 2.4.3


Features:

  1. Unlimited Money
  2. Unlocked all themes / costumes
  3. Unlimited Save Me Keys
  4. Set save me key cost to 1
  5. All boards available – ALL as in every one known to exist
  6. All characters available



Download Subway Surfers Mod APK 1.31.0

Saturday, July 12, 2014




 Basically there are five steps in order to hack anything in this world:

·         Information Gathering

·         Scanning

·         Gaining Access

·         Maintaining Access

·         Covering Tracks

In this post I’ll write about Information Gathering.







Information Gathering:


                Information gathering is a very important technique in order to begin with hacking. It means to gather as much of information about the target either it can be a network, can be a company’s website anything you want. Information gathering can be classified in two groups:

·         Active

·         Passive

Active


Means you are directly interacting with the target.

For example:  the telephone calls or by meeting with the person to extract its company’s info. Let’s consider an instance that a person is working in some company and got irritated with them and he decides to hack the company’s confidential data from some computer now as a member of the Company he has got some rights to talk to any official person in his company. So, he will just interact with them and will gather the information whatever is best for him. This means he comes under active information gathering Technique.

Passive


Means you are indirectly interacting with the target.

                For example:  Either on the news channel or by the source of internet. In this case if some cracker wants to crack the security of any website the best source of information gathering will be GOOGLE. He will just type the name of the company and all his information required to hack will be on GOOGLE.

Methods to gather the information:

·         Ping technique:   Ping technique is the best method to know the IP address of any website. Ping is actually used to check whether the connection between the target and the attacker’s machine is maintained or not.

o   Go to Start  -> cmd and click open

o   Type command ‘ping <name of the website>’ ex: ping nptrick.tk

We get the IP address but what is the use of getting an IP address. This IP address plays actually a very vital role in any of the hacking technique. Everything depends simply on the ip address.

·         Reverse Lookup:  After finding the IP address its time for reverse lookup. Reverse lookup is a technique which is used to check for the hosting that the website on which an attacker is going to attack is on dedicated server or on shared server. A dedicated server will only hold a single website. And a shared server will hold number of websites hosted on one single website.

There are many online tools available that will check for the reverse lookup like:





But apart from these online tools crackers usually prefer http://www.bing.com/ . The above techniques of information gathering are the best ones but there are some others like Domain Analysis in which the information about the DNS (Domain Name Service) are available.


·         Tools:

o   Netifera: Netifera is a tool which is used to gather the information through one single click. It is a very powerful tool which gives you a complete platform to gather the information about the target whatever the website you want to attack……………

How to do it is very simple. This tool is pre-installed in BACKTRACK – A Linux OS. The information which a cracker will gather be:

1.       IP ADDRESS

2.       REVERSE LOOK UP ( Check for shared or Dedicated)

3.       No. of websites hosted if it is shared

4.       DNS (DOMAIN NAME SERVICES) etc.

Now NETIFERA gives all such kind of information like this:

HOW TO OPEN NETIFERA:

                      Backtrack -> Information Gathering -> Network Analysis -> Network Scanners -> Netifera

Thursday, July 10, 2014

What is SIP?
SIP is an application layer control protocol used for signaling in VoIP. It is the most widely used and supported protocol in VoIP today. Due to it being an open protocol. It is supported on a wide array of commercially available devices like the Linksys PAP2, Cisco Phones, and many, if not all, IP PBXs. The protocol is used to create two party, multiparty, or multicast sessions, and is independent of the transport layer, meaning that it can use TCP, UDP, SCTP, ATM, etc. for signaling, and is both IPv4 and IPv6 compatible. It is also a text based signaling protocol, using UTF-8 encoding. This allows for human readable SIP messages.

                SIP typically operates on the default port of 5060, and connects servers with clients and other endpoints. It is voice, and video, and data compatible. Throughout its development, SIP has allowed for delivery of many of the advanced call processing features of SS7, including ANI, CPN, and DNIS delivery.
SIP supports five parts of establishing and terminating communications:
1.       User Location
2.       User Availability
3.       User Capabilities
4.       Session Setup: establishment of call parameters at both called and caller ends.
5.       Session Management: transfer and termination, modifying session parameters, and invoking services.
SIP communicates via messages. These messages are typically communicated via headers, not unlike http.

Exploiting SIP vulnerability
The first thing you are going to do is run wireshark on a computer on the same subnet as the computer that will hold the conversation. If it is easier for you, this can be on the computer that is going to be running the softphone, or any other computer that can sniff the packets. For myself I found it easier to set up my laptop to monitor the conversation, but that’s just me.
Since I chose to monitor the conversation from another computer/IP, I am going to need to use some trick to ensure that I get both sides of the conversation. For this I will implement an ARP cache Poisoning attack. This is accomplished using Arpspoof. I simply opened a terminal and typed:

arpspoof –i ath0 192.168.1.1 (this is because the host i.e. router is at 192.168.1.1)

I will write more on ARP Spoofing on future posts.
Now, fire up Wireshark, and begin to capture packets on the interface that is connected to the network. In my case that was my Wi-Fi card: ath0. Next, initiate a call with the softphone we configured in the last tutorial, and have a lovely conversation with whomever. Stop logging packets after the conversation is complete, and take a look at what you’ve got. In wireshark, click on Analyze -> Decode As, and select SIP from the list, then click Apply. Go back to the list of captured packets, sort them by protocol, and highlight a packet that reads something like:

“RTP type=ITU-T G.711 PCMU, SSRC=blah blah blah”.

Next click on Statistics -> RTP -> Show All Streams. This will show you all of the RTP streams that you captured. One will be the Forward stream, and one will be the Reverse. You can usually tell because of the IP addresses, but there is also a “find the reverse stream” button. Click on the forward stream, shift + click on the reverse, and click on the Analyze button.
Another window will pop up, and will have a button on the bottom left labeled “Save Stream”… or something very similar. Click on it, select .au, name your file and save. You can use Audacity to convert the .au file into a .wav or .mp3.
In Part-2 of this tutorial we will explore brute forcing authentication, DoS attacks, and injecting Audio into ongoing conversations using RTP packet injection techniques.



Sunday, July 6, 2014


Computer hacking is the practice of altering computer hardware and software to carry out a goal outside of the creator’s original intention. People who slot in computer hacking actions and activities are offend entitled as hackers.


                The term hacking can be termed as the art of breaching of the security of the admin panels or the control panels in order to extract the information. And the Principle of hacking also states that, “If a hacker or a malicious person wants to get into any system say server, computer systems or networks he/she will be there is nothing you can do to stop them. There’s only one thing you can do is to make it harder for them to enter into your security system.”

Always remember this quote that in this world nothing is 100% secure it’s just a matter of time that one day the security has to be broken.

Generally Hackers are divided into four classes:

Black Hat


Person having the extraordinary skill in hardware and software and implement their knowledge in the destructive manner. These are the persons whom definition in today’s world as a hacker. The Black Hat community actually does the hacking for the sake of enjoyment or revenge. As at present the Anonymous is famous as a Black Hat for taking revenge on the governments of different countries.

White Hat


Persons using their skills in a defensive way and secure their systems so that crackers do not gain access to these. And white hats are actually the persons who perform their skills to stop Black Hats. White Hats are also known as The HACKERS.

Grey Hat


Persons using their skills for both offensively and defensively. Grey Hats actually work in an offensive manner till when they got their rights but when time comes to take revenge they act like Black Hats.

Suicide Hackers


Those who do hacking and do not bother about if they have to spend 20 years in jail. This class of hackers are also known as the ‘script kiddies’. This class is basically a very dangerous class because these are young generation hackers and usually use the scripts that are made by others.
If you need a flat head screwdriver to remove a screw, would you use a cross head?
Of course you wouldn’t – it wouldn’t work for one reason. Similarly, if you needed to dig a hole would you use a spoon? While you’d get the job done the time wasted could be better invested elsewhere. It’s only natural to use the tool that’s been perfectly designed for the job yet, for some reason, when it comes to securing the corporate infrastructure, many are frightened by the idea of hiring a hacker. I believe they’re missing out.
                Not all hackers are the same so here are the skills, I believe, a hacker should display:

Out of the Box

My hacker definition sums this up perfectly. Rather than looking at how something should work, a hacker will approach it from a different angle. He won’t try your ‘security doors’ to make sure they’re locked, but instead push on the wall around to see if the bricks hold up and if the windows have glass – does the putty hold them in place.

‘No’ isn’t in his vocabulary

Tenacity is another key skill a hacker must possess – someone who doesn’t take ‘no’ for answer. Take a locked door – there are a number of ways of ‘opening’ it and a hacker will keep trying until he manages it. Of course the easiest way is to locate the key but, if one isn’t on hand, then can the lock be picked? Can it be drilled? What about cutting the lock out altogether? I think the phrase from a legendary film – You’re only supposed to blow the bloody doors off perfectly encapsulates a hacker’s enthusiasm to get the job done.

Morals of an alley cat

Now, before everyone starts baying for my blood, I don’t for one minute advocate paying a criminal for his services – unless they’re rehabilitated and you’re into second chances. However, a hacker needs to think and act like a criminal or what’s the point. Criminals don’t play by the rules and being afraid to push the boundaries is why a lot of companies end up experiencing breaches.

Porridge for breakfast

While I’ve said there’s no reason why a rehabilitated hacker shouldn’t be employed, it does raise serious concerns – primarily, why did they get caught? Professional hackers will pride themselves on their skill at infiltrating systems, undetected and will certainly not want to leave an electronic ‘fingerprint’. A criminal conviction shouldn’t be seen as a ‘qualification’ but rather testament that perhaps they’re not up to the job!

A big head

An egotistical hacker isn’t necessarily a brilliant hacker - in fact quite the reverse is often true. I’ve sat and listened to far too many people claiming responsibility for something that I’ve known they didn’t do – often because I was in fact responsible, but that’s for another time.
                There are a number of reasons why bragging is a bad trait in a hacker:
·         They should be able to prove their ability rather than just talk about it
·         If they’re loose lipped they could inadvertently expose the organization to ridicule
·         A hacker likes nothing better than ridiculing someone else’s inadequacy

SOURCE: Dominique karg – chief hacking officer at alienvault


Monday, February 3, 2014

Adobe® Photoshop® CS6 Extended software delivers even more imaging magic, new creative options, and the Adobe Mercury Graphics Engine for blazingly fast performance. Retouch with greater precision, and intuitively create 3D graphics, 2D designs, and movies using new and reimagined tools and workflows. Enhance your creativity and boost your productivity. Adobe® Photoshop® CS6 Extended software delivers blazingly fast performance with the new Adobe Mercury Graphics Engine, groundbreaking new Content-Aware tools, simplified 3D artwork creation, reengineered design tools, and more.

System Requirements:

  1. Intel® Pentium® 4 or AMD Athlon® 64 processor
  2. Microsoft® Windows® XP* with Service Pack 3 or Windows 7 with Service Pack 1. Adobe® Creative Suite® 5.5 and CS6 applications also support Windows 8.
  3. 1GB of RAM
  4. 1GB of available hard-disk space for installation; additional free space required during installation (cannot install on removable flash storage devices)
  5. 1024x768 display (1280x800 recommended) with 16-bit color and 512MB of VRAM
  6. OpenGL 2.0–capable system
  7. DVD-ROM drive
  8. This software will not operate without activation. Broadband Internet connection and registration are required for software activation, validation of subscriptions, and access to online services.† Phone activation is not available.

Features:

ASTOUNDING VISUALS AND PRECISION CONTROLS
FIFA 13 is more realistic than ever – with all the authenticity and innovation you’ve come to expect from the FIFA franchise. Matches come to life with groundbreaking graphics and the most responsive controls ever delivered on iOS.

SHOW YOUR SKILLS
The new Skill Move button lets you choose your favorite tricks with simple swipe gestures. Master free kicks and penalty shots with full touch control. Get in the game with realistic 360° player movement. Pull off defense-splitting passes, rifling shots, penalty kicks, and pro-style tricks.

CHALLENGE YOUR FRIENDS WITH ONLINE MULTIPLAYER
For the first time ever! Compete with friends anytime, anywhere using Online Multiplayer. Rise to the top of the Leaderboards and use superstars like Messi and Benzema to crush your competitors around the world. 

JOIN THE CLUB
EA SPORTS Football Club lets you connect to real-world competitions, support your favorite club, and connect with friends, rivals, and millions of other players around the world. Level-up and earn experience points to build status. You can even relive famous real-world football events through in-game challenges. 

REAL PLAYERS, REAL TEAMS, REAL LEAGUES
Featuring 30 leagues, 500 licensed teams, and more than 15,000 players. From the English Premiership and La Liga, to the German Bundesliga and beyond – take the superstars of football on the pitch in Quick Match, Manager or the brand new Online Multiplayer and Tournament game modes as you dominate your league and march toward glory in 32 authentic stadiums. 

SHOW OFF!
Now you can share your most glorious moments online – straight from Instant Replay!
NOTE: Device Firmware 4.0 and above required

Also Read: 

Install Crack application in iDevices without jailbreak !!



FIFA 13 captures all the drama and unpredictability of real-world soccer, and is driven by five game changing innovations which revolutionize artificial intelligence, dribbling, ball control and physical play. It is the largest and deepest feature set in the history of the franchise. These innovations create a true battle for possession across the entire pitch, deliver freedom and creativity in attack, and capture all the drama and unpredictability of the real-world game.


Features:

Attacking Intelligence - Players have the ability to analyse space, work harder and smarter to break down the defense, and think two plays ahead Plus, players make runs that pull defenders out of position and open
passing channels for teammates

Complete Dribbling - Face your opponent and use precise dribble touches combined with true 360-degree mobility with the ball. Be more creative and dangerous in 1v1 opportunities

1st Touch Control - A new system transforms the way players control the ball, eliminating near-perfect touch for every player, and creating more opportunities for defenders to capitalise on errant balls and poor
touches to win back possession

Installation Instruction:

  1. Burn or mount the image
  2. Install the game
  3. Copy the cracked files from the Crack directory on the disc to the install Game directory, overwriting the existing exe
  4. Before you start the game, use your firewall to block all exe files in the game's install directory from going online. Use the game setup before starting as well. It can be found in the following directory install-Game-fifa-setup
  5. Play the game. While in game, avoid all of the online options. If you have Origin installed, it may start it up. If that happens, ignore the prompt, play offline, and don't login
  6. Enjoy !!!

Monday, January 20, 2014


1. Goto Playstore on your S4, Search for NoBloat and install it.
2. Open NoBloat , Press Allow when Superuser pops up.
3. Select System apps.
4. Select apps you don’t use and choose Backup and Delete to remove it. (choosing this option will allow you to put them back if  you want it back)
 # To reinstall the apps you've removed, simply click on backed up apps and reinstall them.  
# After you realize you truly don’t want the app, then click on backed up apps, click on the app, and click delete backup to free up the storage space

Popular Posts

Recent Posts