High Tech Zone: HACK!NG

HACK!NG

More Simple Way To View Saved Password in Google Chrome


google chrome hacked
Previously i had showed you how to view saved password in google chrome. In this post i will show you same thing but with different method suggested by one of reader of Cool Hacking Trick name Palash. This trick is simple yet very powerfull  to view or hack saved password in google chrome. It does not  matter for which website the password is saved it will work on all of them. It will work on Facebook, Gmail, Yahoo, twitter and many more. If you get your hands on your friend computer  you can hack their password with this simple little trick. It does not require any software or addons to be installed on your computer. Lets get started.
                                                                                                                                  

 

What is RAT (Remote Access Trojan) ?


RAT
RAT stands for Remote Access Trojan or Remote Administration Tool. It is one of the most dangerous virus out their over the internet. Hacker can use RAT to get complete control to your computer. He can do basicly anything with your computer. Using RAT hacker can install keyloggers and other malicious viruses remotely to your computer, infect files on your system and more. In this post i will tell you about what hacker can do with your computer using RAT and tell you about some commonly use RAT by hackers.

                                            

   

 


How to view saved password in google chrome ?


Previously i had showed you how to view password behind asterisk. In this post i will show you a simple but very powerfull trick  to view or hack saved password in google chrome. It does not  matter for which website the password is saved it will work on all of them. It will work on Facebook, Gmail, Yahoo, twitter and many more. If you get your hands on your friend computer  you can hack their password with this simple little trick. It does not require any software or addons to be installed on your computer. Lets get started.


 


List of google dorks for sql injection


Today i am sharing with you a list of google dorks for sql injection which is one of most used method to hack a website.


 


Hacking Windows Xp


  • Get ready for some down-and-dirty hackin'! Over 200 serious hacks readers can use to force Windows XP to do it their way, written in the ExtremeTech no-holds-barred style
  • Sinchak doesn't waste time tweaking Movie Maker or Instant Messenger-these hacks are heavy-duty, detailed instructions for squeezing every drop of power from Windows XP and maximizing speed, appearance, and security
  • Not for the faint of heart! This book is written for users who aren't afraid to roll up their sleeves, risk voiding their warranties, take total control of the task bar, uninstall programs that are supposedly permanent, and beef up boot speed
  • Mines gems like unlocking hidden settings, customizing boot screens, supercharging online and program launch speed, maximizing the file system and RAM, and dumping hated features for good
  • Written by the creator of TweakXP.com, a site considered Mecca for Windows hackers and trusted by more than ten million Windows XP users worldwide
  • Includes a hacker's dream CD-ROM with a set of ready-to-install hacks, theme creation tools, custom boot screens, "undo" files that help the reader tinker with Windows XP's registry, and a whole lot more



 


Make a virus that disable Mouse



               I had previously posted on making different batch files like matrix effect, opening no of websites with one click which were interesting and completely harmless but today we will be making a batch virus which is harmfull it will disable your mouse so think before trying it on yourself.

 



CEH v7 Instructor Slides



     This package includes the following modules.
  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls and Honeypots
  • Buffer Overflows
  • Cryptography
  • Penetration Testing


 


List of some good proxy sites



             Below is the list of some good proxy site which you can use to surf anoymously on the internet . Even you can use this proxy sites to open block website in school or offices. For example you can use facebook if it is block at your school or office.


 

0 comments:

Author Image
  • Facebook
  • Twitter
  • Google Plus
Article By
I'm Founder and Author of High Tech Zone
Learn more about me and connect with me on Facebook, Twitter
Mahtab has written many awesome articles for us.
know more..