Welcome to Tricks4indya.

Tricks4indya is a blog/website where you get latest computer tips and tricks, hacking tricks, Windows tips and tricks and most important learn about Ethical Hacking.

Why you visit Tricks4indya daily?

Because Tricks4indya is not one taste blog and daily update(daily share two or three article sure). If you visit daily then you get different taste of article to read means those friends who don’t like to read HACKING article but like windows tips, awareness(to protect from hackers) article, information about newly technology…ect.

Wednesday 8 June 2011

Free UD Crypter to hack Email account password


We have discussed many times about FUD and UD Crypters on Tricks4indya. UD crypters are particularly useful if the victim has an antivirus installed on his computer. As we know, Keyloggers and RATs are used to hack Email account password of the victim. Most of the keylogger and RAT servers are detected and deleted by most antiviruses. So, there is a huge demand for FUD and UD crypters in hacker community. Today, I am adding one more free UD crypter to the list. Use it efficiently to hack email account of your friend.

What is UD Crypter???

If you are not knowing about FUD and UD Crypters, please refer my article FUD Crypter to bypass Antivirus in which I have explained all the basic concepts about crypters. I’ll be waiting here until you come back. So, let’s move further and learn about the way to use a UD Crypter.


UD Crypter – Hack Email account: -

1.   Download UD Crypter to hack Email account of your friend.
Password: - TRICKS4INDYA

2.   Create a server using Cybergate RAT. You can refer my article How to hack Email account by Cybergate RAT for help in creating the server.

Cybergate server scan report before using Crypter: -


As you can see, the server is detectable by most antiviruses and hence will be deleted on victim computer. Thus, you won’t be able to hack email account password of your friend. So, we will crypt the server to make it undetectable.
3.   Run the downloaded file on your computer. Hit on “Buscar Archivo” and select the Cybergate server you’ve created in Step 2. Hit on “Generate Pass” for 2-3 times to generate random string. Now, hit on button next to “Encryptar” to create the crypted Cybergate server.


Cybergate server scan report after using Crypter: -

Thus, Crypter has helped us in reducing the detection rate of our server. The server is now only detected by Avira antivirus. You can refer to our Undetection Techniques section to make this server FUD.
4.   Now, send the crypted server to your friend. Once he runs the server, you will be able to hack Email account.
Note: Since, the crypter is public, it will be detected by antiviruses very soon. The best way is to use the Winspy Keylogger – the best hacking software ever made which is FUD. It is personally recommended by Tricks4indya.

I hope you will be able to hack Email account password of your friend using the UD Crypter. I have tried the crypter with Cybergate and it is working perfect. The crypter may corrupt your keylogger. So, if you any problem in using this UD crypter to hack email account of your friend, please mention it in comments.


Enjoy UD Crypter to hack email account password…
Note: This is illegal and is for educational purpose only. Any loss/damage happening will not be in any way our responsibility.

If you want to keep up-to-date on the Ethical Hacking Tutorials news, latest Tips & Tricks, latest scams & most important awareness and are a member of Facebook, don't forget to Join the Tricks4indya Facebook page to keep informed about the latest security.

By: TwitterButtons.com

Friday 3 June 2011

What Is Doxing? – Doxing And Its Uses


First, let me explain what Doxing is. Doxing is the process of gaining information about someone or something by using sources on the Internet and using basic deduction skills. Its name is derived from “Documents” and in short it is the retrieval of “Documents” on a person or company.

You’re probably thinking, “Okay, so basically it’s getting information from searching someone’s email on Google right?” in a sense yes, but there are actually easier ways to get someone’s information online. The most popular and most common method is to use a website called Pipl (http://www.pipl.com/). Pipl allows you to search for full names, emails, usernames, and even phone numbers, thus making it a very useful tool for hackers. Another source hackers can use is Facebook (http://www.facebook.com). Sure, Facebook allows full name searches, but most hackers aren’t using it for its name search; they’re using it for its email search.

The main goal when Doxing is to find the target’s email (if you don’t have it). Your email is essentially your passport online; you sign up for websites using it, you have personal information on it, and if someone has access to it, they can essentially pretend to be you online. Once the hacker has the email, all he has to do is put it into Facebook or Pipl and he will be able to find you, assuming the email he has is connected to some account you have online. On the flipside of this, in order to find your email, the hacker either has to guess your email, befriend you on Facebook or hack one of your vulnerable friends and view your email that way. Once he’s done that, you’re in trouble.

Now, you’re probably thinking, “How’s he going to hack me with just my email?” well, that’s where Doxing comes in handy. If he can view your Facebook account, or he can find some other bit of information about you using Pipl, he can do what’s called reverting. Reverting is the process of using the target’s email’s recovery questions to gain access to the target’s email. Now, you may be thinking, “How’s he going to guess my recovery question answers?”well, take a second look at your recovery questions and ask yourself, “Can someone find this answer online?” If you answered yes, then you’re vulnerable to reverting. 

Any hacker reading this, that didn't previously know about reverting, would probably look at this and say This would never work!” but you have to remember… we’re all humans, and we all make mistakes. Surprisingly, this method works more often than you’d think, but it is not for anyone who is lazy. Doxers tend to spend a while searching around the web for information that they can use. 

Chances are, you’ve made some mistakes online, and if a skilled Doxer finds that mistake, then you’re in trouble. The Doxing method is based purely on the ability of the hacker to recognize valuable information about his target and use this information to his benefit. It is also based around the idea that, “The more you know about your target, the easier it will be to find his or her flaws.” 

How can you insure that you won’t be Doxed? 

Well, as the Internet becomes more and more useful and addicting, it will become harder to not get Doxed. The main issue for most victims is their security questions, and their password security. If a victim has a very easy-to-find recovery question, then the victim will be easily reverted within a matter of seconds. Also, if the victim has a simple password, it could get brute forced simply by using a wordlist that applies to the victim’s interests, likes, and fancies (of course, this method is not as popular).

So, the main rule to not getting hacked is: Have strong passwords, and almost impossible to guess recovery questions.


Note: This is illegal and is for educational purpose only. Any loss/damage happening will not be in any way our responsibility.

If you want to keep up-to-date on the Ethical Hacking Tutorials news, latest Tips & Tricks, latest scams & most important awareness and are a member of Facebook, don't forget to Join the Tricks4indya Facebook page to keep informed about the latest security.

By: TwitterButtons.com

Tuesday 31 May 2011

Hack Facebook Accounts - Download UD Remote Keylogger New Version


I have not posted any FUD Keylogger a long time. But today I am here with new UD Keylogger which will help you to "Hack Facebook Accounts" or any other accounts. This is the latest version of keylogger with many facilities and features. Though now only this keylogger is released at it came from FUD to UD. Confused I will make you understand.


What is the Difference in FUD and UD Keylogger ?

As the name indicates that FUD Keylogger is fully undetectable keylogger from any antivirus in the world. And UD Keylogger mean its only undetectable keylogger and though few antivirus can catch it as virus.



Hack Facebook Accounts – Download Remote Keylogger
 Here I am going to present a New Remote Keylogger which has the power to hack facebook accounts and to record all the key strokes typed.



Features Of new UD Remote Keylogger: -

  • UD - 3/33
  • You Can Use Gmail Account to get the logs
  • Add To Start Up also included
  • It also Kills Task Manager
  • Automatically Hides the virus after infecting the victim
  • Also Disables Registry Editing
  • Stops victim From Ending Your Keylogger's Process
  • New Icon Changer
  • File Binder
  • With Fake Error Message
  • Includes Time Interval

How To Use This Remote Keylogger for Hacking Of Facebook Accounts


·        Download The Remote UD Keylogger and extract the folder to desktop & Password: - TRICKS4INDYA

·        Open the Remote keylogger and enter new created Gmail account username and password

·        Select the other settings as you need and donot forget to change Time Interval to 2 min

·        If you want then use Icon changer, File Binder, etc and then click on Build Server

·        Now upload this keylogger to file sharing sites like megaupload.com, mediafire.com

·        Now send Server to victim by any mean and when he/she will click on server, he will be hacked

·        Now you will get the victim typed keystroke which also includes Hack Facebook Account Password

·        You can hack any account by this Remote Keylogger



So you are done, I am sure that you will enjoy this Remote Keylogger and if you have any problem then please do comment and share your problem. I am always ready to help you all.




Note: This is illegal and is for educational purpose only. Any loss/damage happening will not be in any way our responsibility.

If you want to keep up-to-date on the Ethical Hacking Tutorials news, latest Tips & Tricks, latest scams & most important awareness and are a member of Facebook, don't forget to Join the Tricks4indya Facebook pageto keep informed about the latest security.

Incoming search terms:-


  • Hack Facebook Account
  • Hacking of facebook account
  • Hack gmail account
  • Hack facebook account password
  • Hack facebook account online

By: TwitterButtons.com

Monday 30 May 2011

How to Spoof Caller ID – Caller ID Spoofing


Caller ID spoofing is the act of making the telephone network to display any desired (Fake) number on the recipient’s Caller ID display unit instead of the original number. The Caller ID spoofing can make a call appear to have come from any phone number that the caller wishes.

Have you ever wondered how to perform Caller ID spoofing? Read on to know more information on how to spoof Caller ID.

Unlike what most people think, an incoming call may not be from the number that is displayed on the Caller ID display unit. Because of the high trust that the people have in the Caller ID system, it is possible for the caller to easily fool them and make them believe that the number displayed on the Caller ID display is real. This is all possible through Caller ID spoofing.


How to Spoof Caller ID?

To use a typical service, a customer pays in advance for a PIN allowing them to make a call for a certain amount of minutes. To begin, the customer dials from any phone the toll free number given to them by the company and enters their PIN. They are then asked to enter the number they wish to call and the number they wish to appear on the caller ID. Once the "customer" selects the options, the call is then bridged and the person on the other end assumes someone else is calling them.

Many Caller ID spoofing service providers also allow customers to initiate spoofed calls from a web-based interface in addition to calling a toll free number and entering the ten digit number you want to display followed by the ten digit number you want to call. Some providers allow you to enter the name you would like to display along with the spoofed Caller ID number but in most parts of the United States for example, whatever name the local phone company has associated with the spoofed Caller ID number is the name that shows up on the Caller ID display.


Using a web-based spoofing form involves creating an account with a provider, logging in to their website and completing a form. Most companies require the following basic fields: -


1.   Source number

2.   Destination number

3.   Caller ID number

Once the user completes this form and clicks a button to initiate the call, the source number is first called. Once the source number line is picked up, the destination is then called and bridged together.
Some providers also offer the ability to record calls, change your voice and send SMS text messages.

Thus, you neither need to be a computer expert nor have any technical knowledge to spoof caller ID. For more information on SpoofCard service visit SpoofCard - Caller ID Spoofing Service.


How Caller ID Spoofing works?

Caller ID spoofing is done through various methods and using different technologies. The most commonly used technologies to spoof Caller ID is VOIP (Voice Over IP) andPRI (Primary Rate Interface) lines.

Today most VOIP systems provide an option for it’s users to enter whatever number they want in the calling party field and this number is sent out when they make a call. Hence it is easily possible for any user to spoof Caller ID provided they have a VOIP system and know how to properly configure it to spoof the Caller ID. However sites like SpoofCard provide an easy and cheap spoofing services for those who aren’t using VOIP systems that they can configure themselves.

Caller ID spoofing is possible and being performed right from the days Called ID system was introduced. However most people are unaware of the fact that it is possible to spoof Caller ID and make any number to be displayed on the receiver’s end. In the past, Caller ID spoofing service was mostly used by telemarketers, collection agencies, law-enforcement officials, and private investigators. But today, it is available to any Internet users who wish to spoof caller ID.


Note: This is illegal and is for educational purpose only. Any loss/damage happening will not be in any way our responsibility.

If you want to keep up-to-date on the Ethical Hacking Tutorials news, latest Tips & Tricks, latest scams & most important awareness and are a member of Facebook, don't forget to Join the Tricks4indya Facebook pageto keep informed about the latest security.

By: TwitterButtons.com

Monday 23 May 2011

Email Generator/Creator: Free Bulk Email address generator


If you are an internet addict, you will surely have a list of fake email addresses which you can use for registering on forums and other websites. It happens many times that we are asked to register in-order to access specific content. At such times, fake email addresses play an important role. So, to simplify this task, I am posting the Email Generator software which helps in generating free bulk email addresses. Thus, you can use this Email generator/creator software as bulk email address generator. I have provided link to download Email generator in the article below.



Email Generator/Creator – Bulk Email address generator: -


In order to use Email generator, follow the steps below: -
1.   Download Email Generator software to generator bulk email addresses.
Password: TRICKS4INDYA

2.   Run the downloaded Email creator software on your computer to see: -


3.   Now, uncheck “Random PWs” and enter the password you want to use for generated email addresses. Also, enter the number of email addresses you want to create in “How many” field.

4.   Hit on “Create Mails” and Email generator software will start generating @usa.net email addresses. After the specified emails are created, hit on Checkbox (highlighted in the image) and save the email list on your computer.

5.   Now, go to NetAddress and enter the login information using the email list created in step 4. You will find yourself logged in to your email account as shown: -


Credit: This Email generator software is created by ToolsRulez. This is one of the best email address generator softwares on web
That’s it. You can use Email Generator/creator software to create bulk email addresses. I have tried this free bulk email addresses generator and got no errors, worked perfect!!! If you encounter any problem in using Email Generator/creatorsoftware, please mention it in comments.

Enjoy Email generator software…

Note: This is illegal and is for educational purpose only. Any loss/damage happening will not be in any way our responsibility.

If you want to keep up-to-date on the Ethical Hacking Tutorials news, latest Tips & Tricks, latest scams & most important awareness and are a member of Facebook, don't forget to Join the Tricks4indya Facebook page to keep informed about the latest security.

By: TwitterButtons.com

Download UD Crypter to bypass Antivirus


I have not posted any UD crypter since many days on Tricks4indya. So, after series of the Cookie Stealing articles, I am back with a UD Crypter software which can help you in bypassing antivirus on your victim’s computer. We create keyloggers and trojans, send them to victim and unfortunately, if our server is detectable, it gets deleted by antivirus present on victim computer. So, we will use this UD Crypter software to bypass such deletion.



What is UD Crypter???

Well, I won’t extend this topic of UD Crypter over here as I have written an article FUD crypter. Please refer it and come back here. I will wait here till you come back.   So, finished reading the previous article??? Let’s move further then.



How to use UD Crypter???

After you’ve got the basics of UD Crypter, it’s time to use it now. Follow the steps below to bypass antivirus using UD Crypter: -

1.   Download UD Crypter to bypass antivirus.

Password: - TRICKS4INDYA
2.   Run the downloaded UD Crypter to see: -

3.   Hit on Browse button and select the server you want to crypt. If you haven’t created any server yet, you can refer the Cybergate tutorial to create a server. Hit on Crypt and select the destination path where you want to save the crypted file. Hit on Save. UD Crypter will crypt the server which is currently 1/6 as on NVT.

I hope that UD crypter will help you in bypassing antivirus detection on victim’s computer. You can use Cybergate or keyloggers to create servers. I have tried this UD Crypter and found it working perfect for my Cybergate. If you have faced any problem in using UD Crypter to bypass antivirus, please mention it in comments.


Note: This is illegal and is for educational purpose only. Any loss/damage happening will not be in any way our responsibility.

If you want to keep up-to-date on the Ethical Hacking Tutorials news, latest Tips & Tricks, latest scams & most important awareness and are a member of Facebook, don't forget to Join the Tricks4indya Facebook page to keep informed about the latest security.

By: TwitterButtons.com

Related Posts Plugin for WordPress, Blogger...
Twitter Delicious Facebook Digg Stumbleupon Favorites More