Welcome to Tricks4indya.

Tricks4indya is a blog/website where you get latest computer tips and tricks, hacking tricks, Windows tips and tricks and most important learn about Ethical Hacking.

Why you visit Tricks4indya daily?

Because Tricks4indya is not one taste blog and daily update(daily share two or three article sure). If you visit daily then you get different taste of article to read means those friends who don’t like to read HACKING article but like windows tips, awareness(to protect from hackers) article, information about newly technology…ect.

Tuesday 31 May 2011

Hack Facebook Accounts - Download UD Remote Keylogger New Version


I have not posted any FUD Keylogger a long time. But today I am here with new UD Keylogger which will help you to "Hack Facebook Accounts" or any other accounts. This is the latest version of keylogger with many facilities and features. Though now only this keylogger is released at it came from FUD to UD. Confused I will make you understand.


What is the Difference in FUD and UD Keylogger ?

As the name indicates that FUD Keylogger is fully undetectable keylogger from any antivirus in the world. And UD Keylogger mean its only undetectable keylogger and though few antivirus can catch it as virus.



Hack Facebook Accounts – Download Remote Keylogger
 Here I am going to present a New Remote Keylogger which has the power to hack facebook accounts and to record all the key strokes typed.



Features Of new UD Remote Keylogger: -

  • UD - 3/33
  • You Can Use Gmail Account to get the logs
  • Add To Start Up also included
  • It also Kills Task Manager
  • Automatically Hides the virus after infecting the victim
  • Also Disables Registry Editing
  • Stops victim From Ending Your Keylogger's Process
  • New Icon Changer
  • File Binder
  • With Fake Error Message
  • Includes Time Interval

How To Use This Remote Keylogger for Hacking Of Facebook Accounts


·        Download The Remote UD Keylogger and extract the folder to desktop & Password: - TRICKS4INDYA

·        Open the Remote keylogger and enter new created Gmail account username and password

·        Select the other settings as you need and donot forget to change Time Interval to 2 min

·        If you want then use Icon changer, File Binder, etc and then click on Build Server

·        Now upload this keylogger to file sharing sites like megaupload.com, mediafire.com

·        Now send Server to victim by any mean and when he/she will click on server, he will be hacked

·        Now you will get the victim typed keystroke which also includes Hack Facebook Account Password

·        You can hack any account by this Remote Keylogger



So you are done, I am sure that you will enjoy this Remote Keylogger and if you have any problem then please do comment and share your problem. I am always ready to help you all.




Note: This is illegal and is for educational purpose only. Any loss/damage happening will not be in any way our responsibility.

If you want to keep up-to-date on the Ethical Hacking Tutorials news, latest Tips & Tricks, latest scams & most important awareness and are a member of Facebook, don't forget to Join the Tricks4indya Facebook pageto keep informed about the latest security.

Incoming search terms:-


  • Hack Facebook Account
  • Hacking of facebook account
  • Hack gmail account
  • Hack facebook account password
  • Hack facebook account online

By: TwitterButtons.com

Monday 30 May 2011

How to Spoof Caller ID – Caller ID Spoofing


Caller ID spoofing is the act of making the telephone network to display any desired (Fake) number on the recipient’s Caller ID display unit instead of the original number. The Caller ID spoofing can make a call appear to have come from any phone number that the caller wishes.

Have you ever wondered how to perform Caller ID spoofing? Read on to know more information on how to spoof Caller ID.

Unlike what most people think, an incoming call may not be from the number that is displayed on the Caller ID display unit. Because of the high trust that the people have in the Caller ID system, it is possible for the caller to easily fool them and make them believe that the number displayed on the Caller ID display is real. This is all possible through Caller ID spoofing.


How to Spoof Caller ID?

To use a typical service, a customer pays in advance for a PIN allowing them to make a call for a certain amount of minutes. To begin, the customer dials from any phone the toll free number given to them by the company and enters their PIN. They are then asked to enter the number they wish to call and the number they wish to appear on the caller ID. Once the "customer" selects the options, the call is then bridged and the person on the other end assumes someone else is calling them.

Many Caller ID spoofing service providers also allow customers to initiate spoofed calls from a web-based interface in addition to calling a toll free number and entering the ten digit number you want to display followed by the ten digit number you want to call. Some providers allow you to enter the name you would like to display along with the spoofed Caller ID number but in most parts of the United States for example, whatever name the local phone company has associated with the spoofed Caller ID number is the name that shows up on the Caller ID display.


Using a web-based spoofing form involves creating an account with a provider, logging in to their website and completing a form. Most companies require the following basic fields: -


1.   Source number

2.   Destination number

3.   Caller ID number

Once the user completes this form and clicks a button to initiate the call, the source number is first called. Once the source number line is picked up, the destination is then called and bridged together.
Some providers also offer the ability to record calls, change your voice and send SMS text messages.

Thus, you neither need to be a computer expert nor have any technical knowledge to spoof caller ID. For more information on SpoofCard service visit SpoofCard - Caller ID Spoofing Service.


How Caller ID Spoofing works?

Caller ID spoofing is done through various methods and using different technologies. The most commonly used technologies to spoof Caller ID is VOIP (Voice Over IP) andPRI (Primary Rate Interface) lines.

Today most VOIP systems provide an option for it’s users to enter whatever number they want in the calling party field and this number is sent out when they make a call. Hence it is easily possible for any user to spoof Caller ID provided they have a VOIP system and know how to properly configure it to spoof the Caller ID. However sites like SpoofCard provide an easy and cheap spoofing services for those who aren’t using VOIP systems that they can configure themselves.

Caller ID spoofing is possible and being performed right from the days Called ID system was introduced. However most people are unaware of the fact that it is possible to spoof Caller ID and make any number to be displayed on the receiver’s end. In the past, Caller ID spoofing service was mostly used by telemarketers, collection agencies, law-enforcement officials, and private investigators. But today, it is available to any Internet users who wish to spoof caller ID.


Note: This is illegal and is for educational purpose only. Any loss/damage happening will not be in any way our responsibility.

If you want to keep up-to-date on the Ethical Hacking Tutorials news, latest Tips & Tricks, latest scams & most important awareness and are a member of Facebook, don't forget to Join the Tricks4indya Facebook pageto keep informed about the latest security.

By: TwitterButtons.com

Monday 23 May 2011

Email Generator/Creator: Free Bulk Email address generator


If you are an internet addict, you will surely have a list of fake email addresses which you can use for registering on forums and other websites. It happens many times that we are asked to register in-order to access specific content. At such times, fake email addresses play an important role. So, to simplify this task, I am posting the Email Generator software which helps in generating free bulk email addresses. Thus, you can use this Email generator/creator software as bulk email address generator. I have provided link to download Email generator in the article below.



Email Generator/Creator – Bulk Email address generator: -


In order to use Email generator, follow the steps below: -
1.   Download Email Generator software to generator bulk email addresses.
Password: TRICKS4INDYA

2.   Run the downloaded Email creator software on your computer to see: -


3.   Now, uncheck “Random PWs” and enter the password you want to use for generated email addresses. Also, enter the number of email addresses you want to create in “How many” field.

4.   Hit on “Create Mails” and Email generator software will start generating @usa.net email addresses. After the specified emails are created, hit on Checkbox (highlighted in the image) and save the email list on your computer.

5.   Now, go to NetAddress and enter the login information using the email list created in step 4. You will find yourself logged in to your email account as shown: -


Credit: This Email generator software is created by ToolsRulez. This is one of the best email address generator softwares on web
That’s it. You can use Email Generator/creator software to create bulk email addresses. I have tried this free bulk email addresses generator and got no errors, worked perfect!!! If you encounter any problem in using Email Generator/creatorsoftware, please mention it in comments.

Enjoy Email generator software…

Note: This is illegal and is for educational purpose only. Any loss/damage happening will not be in any way our responsibility.

If you want to keep up-to-date on the Ethical Hacking Tutorials news, latest Tips & Tricks, latest scams & most important awareness and are a member of Facebook, don't forget to Join the Tricks4indya Facebook page to keep informed about the latest security.

By: TwitterButtons.com

Download UD Crypter to bypass Antivirus


I have not posted any UD crypter since many days on Tricks4indya. So, after series of the Cookie Stealing articles, I am back with a UD Crypter software which can help you in bypassing antivirus on your victim’s computer. We create keyloggers and trojans, send them to victim and unfortunately, if our server is detectable, it gets deleted by antivirus present on victim computer. So, we will use this UD Crypter software to bypass such deletion.



What is UD Crypter???

Well, I won’t extend this topic of UD Crypter over here as I have written an article FUD crypter. Please refer it and come back here. I will wait here till you come back.   So, finished reading the previous article??? Let’s move further then.



How to use UD Crypter???

After you’ve got the basics of UD Crypter, it’s time to use it now. Follow the steps below to bypass antivirus using UD Crypter: -

1.   Download UD Crypter to bypass antivirus.

Password: - TRICKS4INDYA
2.   Run the downloaded UD Crypter to see: -

3.   Hit on Browse button and select the server you want to crypt. If you haven’t created any server yet, you can refer the Cybergate tutorial to create a server. Hit on Crypt and select the destination path where you want to save the crypted file. Hit on Save. UD Crypter will crypt the server which is currently 1/6 as on NVT.

I hope that UD crypter will help you in bypassing antivirus detection on victim’s computer. You can use Cybergate or keyloggers to create servers. I have tried this UD Crypter and found it working perfect for my Cybergate. If you have faced any problem in using UD Crypter to bypass antivirus, please mention it in comments.


Note: This is illegal and is for educational purpose only. Any loss/damage happening will not be in any way our responsibility.

If you want to keep up-to-date on the Ethical Hacking Tutorials news, latest Tips & Tricks, latest scams & most important awareness and are a member of Facebook, don't forget to Join the Tricks4indya Facebook page to keep informed about the latest security.

By: TwitterButtons.com

Saturday 21 May 2011

Wireshark Tutorial: Download Free Packet sniffer


Hello friends. We have been talking about Cookie stealing since last few days. As I said in my previous article Cookie Stealing to hack Email account, Wireshark is the best free packet sniffer software ever made. So, I am posting this Wireshark tutorial to help you in capturing victim packets using this free packet sniffer software. So, download Wireshark and follow this Wireshark tutorial to hack email account.


Wireshark tutorial to capture cookies: -


Wireshark is the best free packet sniffer software available today. Actually, it was developed for making a network secure. But, the same software is now used by hackers to test for vulnerability and security loopholes in the network and to attack the network accordingly. Cookie stealing being one of the types of hacks implemented using this Wireshark software
Below, I have listed steps on how to capture Facebook cookies. This will help you to know how Wireshark can be used to sniff packets and capture cookies.
·        Free download Wireshark software to capture cookies.
Password: TRICKS4INDYA

·        Install and run this Wireshark application. Go to Capture -> Interface to see all the interfaces to your computer. Select the interface (usually LAN) and hit on Start so that Wireshark will start capturing all the packets on this interface.


Note: - You can sniff your own packets by selecting your local interface.

·        You will see all the packets captured by Wireshark on the interface.

·        Now, if you wanna capture Facebook cookies, enter: http.cookie contains “datr”in Filter textbox and hit on Enter. Wireshark will filter all the packets as shown: -


Note: If your “Filter” box turns red after pasting the above code in it, please type the code manually in the Filter box. The red issue will be fixed. I guess the issue is caused due to double quote present just before datr. Please correct it.

·        Now, look for packet with info “GET/HTTP/1.1″. Right click -> Copy -> Bytes(Printable Text Only). In this step you have successfully copied all the contents of victim Facebook account cookie. Now, its time for injecting this copied or stolen cookie in your own browser so that you can hack victim facebook account.


I will post on how to inject this copied cookie in your browser in my next article.
So friends, this was a short Wireshark tutorial explaining how to use free packet sniffer to capture cookies. I have tried my best to keep this Wireshark tutorial simple. If you find any problem in this Wireshark tutorial, please mention it in comments.

Enjoy hacking facebook using Wireshark tutorial…

Note: This is illegal and is for educational purpose only. Any loss/damage happening will not be in any way our responsibility.

If you want to keep up-to-date on the Ethical Hacking Tutorials news, latest Tips & Tricks, latest scams & most important awareness and are a member of Facebook, don't forget to Join the Tricks4indya Facebook page to keep informed about the latest security.

By: TwitterButtons.com

Friday 20 May 2011

Cookie Stealing: How to hack an Email Account


I posted articles on Phishing and Keylogging - the two best methods to hack an Email account. Today I am writing about a new topic on Tricks4indya - Cookie Stealing. I observed that cookie stealing is neglected by some fellow hackers (even I was one of them). But, recently, I discovered that cookie stealing can be pretty handy to hack an Email account. In the following article, I have covered basics of how to hack an Email account using Cookie Stealing.


How to hack Email account: -

If you are a newbie and don't know about cookie, then for your information, Cookie is a piece of text stored on user computer by websites visited by the user. This stored cookie is used by webserver to identify and authenticate the user. So, if you steal this cookie (which is stored in victim browser) and inject this stealed cookie in your browser, you can imitate victim identity to webserver and enter his Email account easily. This is called Session Hijacking. Thus, you can easily hack Email account using such Cookie stealing hacks.


Tools needed for Cookie stealing attack: -

Cookie stealing attack requires two types of tools: -


1.   Cookie capturing tool

2.   Cookie injecting/editing tool


1.   Cookie capturing tool: -

Suppose, you are running your computer on a LAN. The victim too runs on same LAN. Then, you can use Cookie capturing tool to sniff all the packets to and from victim computer. Some of the packets contain cookie information. These packets can be decoded using Cookie capturing tool and you can easily obtain cookie information necessary to hack Email account. Wireshark and HTTP Debugger Pro softwares can be used to capture cookies.


2.   Cookie injecting/editing tool: -

Now, once you have successfully captured your victim cookies, you have inject those cookies in your browser. This job is done using Cookie injecting tool. Also, in certain cases after injection, you need to edit cookies which can be done by Cookie editing tool. This cookie injection/editing can be done using simple Firefox addons Add N Edit Cookies and Greasemonkey scripts. I will write more on these two tools in my future articles.


Drawbacks of Cookie Stealing: -

Cookie Stealing is neglected because it has some serious drawbacks:

·        Cookie has an expiry time i.e. after certain trigger cookie expires and you cannot use it to hijack victim session. Cookie expiry is implemented in two ways: -
                     i.        By assigning specific times tamp(helpful for us).

                    ii.        By checking for triggers like user exiting from webbrowser. So, in such cases, whenever user exits from his browser, his cookie expires and our captured cookie becomes useless.

·        Cookie stealing becomes useless in SSL encrypted environment i.e. for https (Secure HTTP) links. But, most Email accounts and social networking sites rarely use https unless vicitm has manually set https as mandatory connection type.

·        Also, most cookies expire once victim hits on LogOut button. So, you have to implement this Cookie stealing hack while user is logged in. But, I think this is not such a serious drawback because most of us have the habit of checking "Remember Me". So, very few people actually log out of their accounts on their PCs.


So friends, this was a short tutorial on basics of how to hack Email account using Cookie Stealing. As I have stated, Cookie stealing has some disadvantages. But, I think Cookie stealing is a handy way to hack an Email account. In my next articles, I will post a detailed tutorial to hack Facebook and Gmail accounts using Cookie stealing. If you have any problem in this tutorial on how to hack Email account using Cookie stealing, please mention it in comments.

Enjoy Cookie stealing trick to hack Email account...

Note: This is illegal and is for educational purpose only. Any loss/damage happening will not be in any way our responsibility.

If you want to keep up-to-date on the Ethical Hacking Tutorials news, latest Tips & Tricks, latest scams & most important awareness and are a member of Facebook, don't forget to Join the Tricks4indya Facebook page to keep informed about the latest security.

By: TwitterButtons.com

Related Posts Plugin for WordPress, Blogger...
Twitter Delicious Facebook Digg Stumbleupon Favorites More