Can a Computer really be made to “Explode”? – DailyJag

Just sometime back I saw Hollywood movie which showed that just the moment a guy clicked on software he just downloaded over the internet, his computer exploded and went like a bomb. This landed me to an amazing question “Can a computer ever explode? “

#hackers #virus #tech #technology #explode #hollywood

How to Crack a Wpa2-Psk Password with Windows

It,s very common question on the internet to How to hack a Facebook account password and how to hack a WiFi password. Even if you search on YouTube you will find a lots of tutorial to How to hack a WiFi password using backtrack. However, backtrack OS is not most handy OS for normal users. yesterday my one Facebook friend Lovito Tsuqu Kiho ask me to how to hack WiFi using commview using aircrack-ng.
Today i am going to show you how to a crack a Wp2-psk password with windows machine.
Software Requirement for this lab :-
1. CommView for Wifi ( Download)

2. Elcomsoft Wireless Security Auditor (Download)

Presently i am connected with my own wifi network Virusfound and i want to hack the password of Ultimate that is secured with Wpa2-psk encryption.
First you need to be capture the Wpa2, four-way handsake with CommView.
Open commView and click on the Start option
then click on the capture option to start the capture
now it will show you all available AP, Now click on the Tools > Select the Node Reassoication option ( if Node Rassociation is not working , then use WiFi Alfa card )
now select your target AP in the Send a deauthentication request from this AP option. it will show you all available client option.
now click on the Send Now option to send the packet for 4-way authentication. wait for some time so it will capture the packet.
now click on the Save option and choose your file format Commview Capture Files (*.ncf)
you capture work is done.
Now open Elcomsoft Wireless Security Auditor to crack your wifi password.
Click on the Import Data tab > select the Import CommViewLog option.
now it will show you information about AP and Multiple Handshake selection information. Click on Ok.
now click on the Start attack option and select the Dictionary Attack option. However you have other attack options are also available.
now within minutes it will found your password and it will show you the password.
Enjoy Wifi Hacking with Windows machine.

Hacking facebook on wifi LAN part 2

Im back with the second part of the post. At the end of the last post, we successfully re-routed all the traffic from the victim’s computer to the router through our computer.Next, we have to capture their facebook cookies through wireshark. So How do you go about doing that? It’s very simple actually.
  • Open up wireshark
  • Goto capture – > Interfaces in the top menu and select your interface. It’s usually the one which has an IP address and  a certain number of packets flowing through it.
  • Next goto capture and click on start.. It should look something like this
This window has all the packets sent from the victim’s/victims’ computer to the router and all the packets sent from the router to the victim.
Next in the filter type  “http.cookie contains datr”.  You ask why? Because, when a user logs in to facebook, he is given some cookies which is unique to him. If we replace our cookies with the victim’s cookies, we can login to his account as then facebook wont know the difference.
You now have the cookies. To get the information stored in the cookies,  right-click on any one of the cookie and click on Follow TCP stream.
In the TCP stream look for the line  Cookie: ( and all cookie names). If it doesn’t come, select some other packet in wireshark and click on follow tcp stream for that. You can see the source IP and destination IP in wireshark. So if you have more than one source IP , then you know you have the cookies of more than one account on your LAN. This is what I got when I did it.
So now you have it :D. The datr cookie, c_user cookie, lu cookie, sct cookie, w cookie and xs cookie. These are the main cookies you need.
Now open firefox and goto Once there, click on cookies in the web developer add on which you had installed in the last post. Then do the following
  • ·         Clear session cookies
  • ·         Delete domain cookies
  • ·         Delete path cookies.
IMPORTANT: Once you do this, again type in the URL and click enter. Basically you are reloading facebook after deleting all cookies.
Now login to your account with your username and password. After logging in , click on cookies in web developer add-on and click on “view cookie information”.
And there you have all your cookies :p. Now what to do?! I guess you know it by now. !
Click on “edit cookie” for each cookie there and replace the cookie value with the value you got through wireshark.
If you did not get all the  cookies in wireshark its OK! But mainly, you should look to replace the datr cookie, c_user cookie, lu cookie, sct cookie, w cookie and xs cookie.

After replacing all the  cookie values with the ones you got in wireshark, just refresh the facebook page. And thats it! You are in to the victim’s account! You have HACKED a facebook account on LAN.:D

Hacking Facebook on local wifi LAN


A lot of subscribers have been asking me on how to hack Facebook.

Well this is the tutorial that will let you hack not just facebook but any site on your local wifi/LAN.

Ok so in this post I am going to show you a way you can hack the facebook accounts of all the people who are on your network (LAN or wifi ) . I have tried this and believe me it works..This is really the best way to hack facebook accounts. Its much easier than installing RATs, Keyloggers or making phishing sites. Ok so off we go!

You will need 3 programs for this
Cain and abel :
Wireshark :
Web developer add-on for firefox :
So what exactly happens when you type in and login with your username and password. First download the web developer addon for firefox and then login to facebook. After you log in view the cookies in the web developer toolbar.
Ok now if you click on view cookie information, you will be able to see all the cookies which facebook has transmitted to your browser.
The main cookies are the c_user cookie (which identifies a person uniquely) and datr cookie..
So your aim must be to get the cookies of your victim through wireshark and then replace your cookies with the victim’s. So then, facebook will think you are the victim as you have his cookies and you will be logged in as the victim. Simple isn’t it? :P
So how do you do this..
First off install cain and abel.It will ask you whether you want to install the packet driver – WinPCap. Go ahead and install that also.Open up cain.
  • Click on configure on top and select your Network card. Mostly its the one with an IP address :p
  • Next click on the start/stop sniffer on top as shown below in green square.
  • Once you start the sniffer, goto the sniffer tab in cain, right-click and click scan mac address as shown below!
Ok now you should have a list of everyone on the network. It may take some time though. You can right-click on any one computer and find out its name.
Now what we are going to do is the actual shit!We are going to do an ARP poison ! What this means is that you fool the router in thinking that you are the victim, and you fool the victim in thinking that you are the router.
So initially victim -> router -> facebook. Now after ARP poison,  victim->hacker->router. This is called an MITM(Man in the middle) attack.You can google it for more info :p
Doing the ARP POISON
  • First Click the APR tab below in cain.
  • Click the white screen in the top frame
  • Click the blue plus on top.
Now you should get a list of all the devices on the left and a blank screen on the right..
In the left screen you should select the router IP. And in the right box, select the computers you want to target. To be safe its better to target one computer. But if you want some real fun then select all the computers on the right frame :D. Press ok.
WARNING: If there is a person at the router, he can know if you have just done an ARP poison. But where is the fun without the risk.:P
You can try googling on other methods to do arp poison safely.
In the top frame all the computer list should have got filled. now select the whole list and click on the nuclear button (top left of cain).

Thats it you are done with the arp poison. Just be careful, if you select too many computers, your computer cant handle the traffic and the network may just crash. I am reminding you, this should be done for ethical reasons !
Now all the data is passing through your computer. All you have to do is sniff the data in wireshark, get the cookie and replace your cookie with victim’s cookie.
Thats what ill be covering in part 2 of this post .

Please add my email to you contacts list to avoid this email from going to spam.

Shashank Agarwal
(Admin: Hack It Easy) 

Setting Webserver- Host Webpages on your own computer

you ever wondered to setup a website without signing up at any web
hosting site ? Learning web site designing and wanna keep testing how
your web pages look? Free Web hosting sites removing you phishing  
  pages ?
So solution to such kinda things is in this post.  Basically we are going to turn our pc to a server.
What is a server  ?

Server is we can say, any computer
that is serving something . Like webserver serves webpages, ftp
server serves files. Any computer can be turned into a server by simply
installing a server software. In this post,
I am using XAMPP . By
installing this, contents of a particular directory of  our computer
would accessible all over internet . Means one could access those
contents from any part of the world through our Public IP address.
You can place your web pages or whatever you wish in that directory.
Download XAMPP from here. This package consists of Apache http server (A), MySQL database (M), php (P),Perl (P) and X represents cross platforms.
After dowloading it, simply install it .
At last stage on installation you will get this . Press 1 to start XAMPP control panel.
The control panel would look like this
Click Start to start apache server. Now lets check whether its working,
Open your web browser and visit
your local machine address that is or localhost. Hopefully you
must get the XAMPP page as shown.
Now check whether it is accessible on internet. Type your Public/External Ip in your web browser and hit enter.
If you got a page as shown, follow the instructions :
1. Go to file httpd-xampp.conf
2. Remove “deny from all” and save the file.
3. Now restart the server and hopefully it would be all right now.
Now what ?
There must be a directory ‘htdocs‘ at location C:xampp. The contents of this particular directory will be available to every body. Suppose you place a file anything.html in ‘htdocs‘ directory. It would be accessible at
1.http://localhost/anything.html  or
( Obviously above two links gonna work on your own computer only.)
2. (where is your IP address)
You can start/stop this service simply through the control panel.
Thats all. And you have also use Filezilla(ftp server software) and Mysql (database) as per your need.

Get a domain name ?
Now you would want to get a domain name instead of  using the Public IP to check out your contents.
But how can we get a domain name because our IP is dynamic and to which IP domain name would point ?
Dont worry, we have a solution.
1. Log on to and sign up for an account. Choose available domain name.
2. Download their dynamic DNS update client and run on PC.

client would automatically keep updating your dynamic IP address and
that is how the selected domain would always be pointing to your IP

Note: You might need  do port forwarding if you are behind a router. Kindly mention the queries regarding that  in comments.

Trojan Horse | RAT | Configure and Use | Tutorial- Part 2

Just go through the Part 1 which includes the basics of  Trojan Click here.
This tutorial is about configuring and using a trojan. There are many
trojans available on internet for free. Some popular ones are Beast, Pro
Rat, Netbus , Back Orifice, Girlfriend, Sub 7. I will be using Pro Rat
in this tutorial.


1. Prorat- Click here to download Trojan Prorat.
2. Hostname  –
 Your IP address would probably be dynamic that it keeps changing
everytime you disconnect and reconnect. You need a host name which
always automatically keep pointing to your changing IP. Follow these
steps -:

1. Log On to and register for an account.
2. Go to Hosts/Redirects -> Add Host and choose any free available
hostname. Do not change any other option and simply click on Create

3. Downloading and install their DNS update client available here Run it and enter your credentials. Update your host name and save it.

Lets check whether your IP has been associate with chosen host name or
not. Go to command prompt and type ‘ping yourhostname’ (without quotes) ,
hopefully it should reply with your IP address.

Tutorial for configuring Trojan.

1. Open prorat.exe that you have downloaded.
2. Click on Create  and then Create ProRat Server

 3.  Enter your host name in the ProRat Notification field as shown. Uncheck all other options.

Click on general settings Tab and have a look at server port,password,
victim name. Remember these things.Check out and configure other options
as per your need. You can bind server.exe with any genuine file,
change its icon etc.

Finally click on create  server and now its ready to be sent to victim.
 Once victim installs it, it would automatically disable

Modes of sending-: 
You must be thinking of sending this server.exe to victim through an
email as an attachment but unfortunately you cant do so. The good option
is  to upload it on any uploading site like and
give downloading link to victim.

What after victim has run the server part ?

1.Click on ProConnective Tab and start listening to connections. Allow firewall if it asks you to open a port.
2.You will start listening to connections, I mean you will get a notification as shown when victim would be online.

Note: If you know victim is online and still its not listening to
any connections. Trace victim’s IP,enter in IP field and hit connect.
But its gonna work only if he is not behind any network and directly
connected to internet. If you dont know how to trace IP, mention in

What after successful connection ?

After you have managed to connect to
victim’s machine. There are numberless interesting things to do. I
leave this part on you.  Have Fun.

How to make it undetectable from antivirus ?
Though there isn’t any hard and fast way to make it fully undetectable
from all antiviruses. The real way to do it is modify the source code of
open source trojans available. Its very challenging job. There are many
crypters which claim to make it undetectable but unfortunately hardly
one out every hundred works. I would try to write next article on the

Contermeasure against Trojans –
The obvious coutermeasure against trojans is that do not accept downloading links blindly. Keep your antivirus up to date.

Detecting and removing Trojan –
Though trojan once installed is very hard to remove . It would hide itself from the Task Manager . Install Process Explorer
and it would hopefully show you all process running including trojan.
Kill the process and remove it. One good thing is to carefully check the
open ports and services running through ‘netstat’ command. Anyways ,
the best option is to reinstall the windows.

Feel free to ask  the queries in comments 🙂

Trojan Horse (Basics) – Part 1

Have you watched movie Troy ? okay
lets leave . Have your wallpaper ever changed automatically ? Have the
programs ever started without your initiation ? Have the browser opened
unexpected websites automatically ? Simply have you ever felt that
someone else is controlling your computer ? NO ?
Congrats, you probably haven’t been a victim of trojan yet :).
A trojan horse is a remote administration tool(RAT). This is some thing extremely dangerous.  A trojan gives the full control of victim’s PC to the attacker. 
 A trojan has two parts . One is client part (Control Panel) and other is server part (meant to be sent to victim).
The basic methodology of using a trojan is as follows:-
1. Attacker creates an executable file of size in kbs. This  is  server part of trojan and mostly called as server.exe

might hide this server.exe behind any genuine file like a song or
image. Attacker gives this file to victim and victim is supposed to
double click on it.

3.As victim run that server
part , a port on victim’s computer gets opened and attacker can control
his PC sitting remotely in any part of the world through the control
panel(client part). Attacker can do anything with victim’s computer
remotely that victim himself can do on his computer.
Note: Now I am assuming that you know a little bit about IP addresses that is lan/internal/private and wan/external/public IP.
Two different methods of working of Trojan.

1. Direct Connection : In this
method, after the server part has been installed on victim’s machine,
the attacker enters the public IP address assigned to victim’s computer
for making a connection to it. But limitations of direct connection is
that public IP address is most probably dynamic and gets changed
everytime one disconnects and reconnects. So attacker needs to find out
IP address of victim each time.Moreover the incoming connection like
this is usually restricted by firewall.
main limitation of direct connection is that you can not access the
victim who is behind a router or a network beacuse victim’s machine is
not assigned public/external/wan IP. It is only assigned
private/internal/lan IP which is useless or meaningless for computers
outside that network.The wan IP belongs to his router.

It doesnt matter how attacker is connected to internet. Attacker can be connected to internet any of three means.

Victim is behind a router in this case. (havent inserted the picture of victim behind a network, imagine that )

2. Reverse Connection:
In this method, attacker enters his own IP address in server part while
configuring it .So when the server part is installed on victim’s
computer, it automatically makes connection with client part that is
attacker. Also the firewall in victim’s machine would not restrict to
outgoing connections. Problem in this case is same that attacker’s IP is
also dynamic. But this can be over come easily. Attacker
actually enters a domain name in server part which always points to his
dynamic IP.

Reverse connection can bypass a router or a network.

You might be confused at this point. Kindly mention your queries/doubts in comments.

How to see saved password in Mozilla firefox

Here is simple hacking tutorial to view the saved passwords in Mozilla firefox.
While visiting public internet cafe ,some innocent peoples click the
“Remember” while mozilla asking for remembering.   This is one of the
benefit for us to hack their account in very simple way.

Follow these steps to see the saved Passwords:

  • click the “Tools” menu in menu bar.
  • Select Options
  • It will open a small window
  • Select the “security” tab in that small window
  • You can view “saved Passwords” button

  • Click that button.
  • It will another small window
  • There will be list of sites with usernames
  • Select One site and click the “show Password”
  • It will clearly show you the password

Install Backtrack on any Android Device

I found this amazing tutorial which will let you install the easy hacking operating system for hacker i.e “BackTrack 5” on an Android Device.

The most important thing was that they installed Backtrack using a VNC option. In this you don’t have to change your origina operating system and can access backtrack like an application only.

If you know linux you can probably write small script to run the backtrack 5 on your android device.

Description: Backtrack is a very popular linux distribution for penetration testing. It has hundreds of tools for pentesting and hacking. Now a version of backtrack is available for arm processor devices. Normally android based mobile devices uses arm processor so we can install arm version of backtrack on android devices.

This video explains very clearly step by step method of installing process of arm version of backtrack on android devices. Following are the steps and utility for the installation process.

1. Download terminal emulator,android vnc and arm version of backtrack.
2. Extract the content of img file and transfer it in to memory of android devices.
3. Install BusyBox and start it.
4. Open terminal emulator. use “cd” command to get in backtrack directory where extracted content is saved on memory card of device. In this case command is
cd /sdcard/BT5
5. Type “sh bootbt” and we will be in Backtrack.

Do tell us if this tutorial helped you out.