Monday, 22 June 2015

STARZRECORDS SERVICES

click on the ads by bkopay on my site to get amazing new offers and to rock your world

LIST OF WORLD BEST HACKERS

JUNE 23, 2014

10 Best Hackers The World Has Ever Known

   
  • 34.2k
Shutterstock
Shutterstock
In the world of web where we get the global connectivity, it is far easier to break into someone’s personal zone. By personal, we do not just mean the social media. The world wide web which has become the hub of storing and restoring information, considered to be the safest vault, is a mere toy in the hands of a few computer geniuses. Hackers, Black Hat Hackers, villains, crackers, cyber-criminals, cyber pirates as they are well-known, throw a malicious software or virus at a system to gain the access to the desired information. Piqued by curiosity, they may perhaps break into your system too. Here are top 10 hackers or the whiz kids who put the world in awe with their dexterity.

1. Gary McKinnon

Gary McKinnon must’ve been a curious, restless child, for to gain information on UFOs, he thought it better to get a direct access into the channels of NASA. He infiltrated 97 US military and NASA computers, by installing virus and deleting a few files. All the efforts to satisfy his curiosity, but, alas, curiosity killed the cat. It was soon found that McKinnon was guilty of having hacked the military and NASA websites from his girlfriend’s aunt’s house in London. While entering and deleting the files from these websites wasn’t enough, McKinnon thought of shaming the security forces by putting out a notice on the website that said, “Your security is crap.” Well, looks like McKinnon was something, if he could shut down the US Military’s Washington Network of about 2000 computers for 24 hours, making the hack, the biggest military computer hack of all time!

2. LulzSec

LulzSec or Lulz Security, a high profile, Black Hat hacker group, gained credentials for hacking into Sony, News International, CIA, FBI, Scotland Yard, and several noteworthy accounts. So notorious was the group that when it hacked into News Corporations account, they put across a false report of Rupert Murdoch having passed away. While the group claims to have retired from their vile duties, the motto of the group, “Laughing at your security since 2011!” stays alive. There are assertions of the group having hacked into the websites of the newspapers like The Times and The Sun to post its retirement news. Many, however, claim that this group had taken it upon itself to create awareness about the absence of efficient security against hackers.

3. Adrian Lamo

Adrian Lamo decided to switch careers when he realized the potentials of his skills. He became a news when he hacked into Yahoo!, Microsoft, Google, and The New York Times. This, although culminated into his arrest, it later helped him gain the batch of an American Threat Analyst. A guy who would hack into top-notch accounts sitting in the spacious and comforting cafeterias, libraries, internet cafes, soon turned Wikileaks suspect Bradley Manning over to FBI. While Manning was arrested for leaking several hundred sensitive US government documents, Lamo went hiding or should we presume, undercover?

4. Mathew Bevan and Richard Pryce

Targeting the over-sensitive nerves, what Mathew Bevan along with his alleged partner Richard Pryce did, could have triggered great many issues between USA and North Korea. The duo hacked the US military computers and used it as a means to infiltrate the foreign systems. The crucial contents of Korean Atomic Research Institute were dumped into USAF system. However, the contents were majorly relevant to South Korea and hence, less volatile. But this, nonetheless, could have led to a huge international issue.

5. Jonathan James

The first juvenile to be imprisoned for a cyber-crime at the age of 16, Jonathan James or better known as c0mrade, hacked into Defense Threat Reduction Agency of US department. Further, he installed a sniffer that scrutinized the messages passed on between the DTRA employees. Not only did he keep a check on the messages being passed around, in the process, he collected the passwords and usernames and other such vital details of the employees, and further even stole essential software. All this cost NASA to shut down its system and to pay from its pocket $41,000. c0mrade, however, had a bitter ending as James committed suicide in 2008.

6. Kevin Poulsen

How far would you go to win your dream car or a dream house? How far will you go to win an online contest or a radio show contest? Perhaps, you shall keep trying your luck, unless you are Kevin Poulsen! Poulsen infiltrated a radio shows call-in contest just so he could win a Porsche. Dark Dante, as he was better known, went underground after FBI started pursuing him. He, later, was found guilty of seven counts of mail, wire and computer fraud, money laundering and the likes. What turned out to be rewarding in Dark Dante’s case is – his past crafted his future. Poulsen now serves as a Senior Editor at Wired.

7. Kevin Mitnick

Clad in an Armani suit, when a bespectacled face in his mid-40s smiles at you from the computer screen, you can hardly consider the man a cyber-criminal. Such is the case with Kevin David Mitnick. Once upon a time, the most wanted cyber-criminal of US, now is an affluent entrepreneur. Kevin, who is now a security consultant, was convicted of hacking Nokia, Motorola and Pentagon. He pleaded guilty to seven counts of fraud that included wire fraud, computer fraud and of illegally interception a wire communication. After five years of incarceration that included eight months of solitary confinement, Mitnick now has started afresh. However, his knack with the computers is still reminisced and was even depicted on celluloid in the films Takedown andFreedom Downtown.

8. Anonymous

The concept of being a “digital Robin Hood” was far from being conceived, but in the computer age, it is very likely that someone somewhere has bagged this title. A “hacktivist group” called Anonymous are known with the penname of being the “digital Robin Hood” amongst its supporters. Identified in public by wearing a Guy Fawkes Masks, Anons, as they are widely known, have publicized themselves by attacking the government, religious and corporate websites. The Vatican, the FBI, the CIA, PayPal, Sony, Mastercard, Visa, Chinese, Israeli, Tunisian, and Ugandan governments have been amongst their targets. Although, Anons have been arguing whether to engage in a serious activism or a mere entertainment, many of the group members have clarified their intent which is to attack internet censorship and control.

9. Astra

Astra, a Sanskrit word for weapon was the penname of a hacker who dealt in the weapon stealing and selling. A 58-year-old Greek Mathematician hacked into the systems of France’s Dassault Group, stole vulnerable weapons technology data and sold it to different countries for five long years. While the real identity of the ASTRA remains untraced, officials have said that he had been wanted since 2002. Astra sold the data to approximately 250 people from around the globe, which cost Dassault $360 millions of damage.

10. Albert Gonzalez

How safe is internet banking? When we browse through the profile of this mastermind, we are certain that one ought to use the World Wide Web with immense care. For two long years, Albert Gonzalez, stole from credit cards of the netizens. This was recorded to be the biggest credit card theft in the history of mankind. He resold approximately 170 million credit cards and ATM numbers. He did so by installing a sniffer and sniffing out the computer data from internal corporate networks. When arrested, Gonzalez was sentenced to 20 years in Federal prison. TC mark

HOW TO HACK A PC

How to hack remote computer using IP Address

Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.
You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, www.website.com is hosted in separate web server rather than personal computer.
Another can be accessing your friend’s computer from your home. Again this is IP based and this is possible only when your friend’s computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible.
Well, both of the hacking has the same process. Let’s summarize what we must do.
  1. Confirm the website or a computer you want to hack.
  2. Find or trace their IP address.
  3. Make sure that IP address is online
  4. Scan for open ports
  5. Check for venerable ports
  6. access through the port
  7. Brute-force username and password
Now let me describe in brief in merely basic steps that a child can understand it.
First, getting the IP address of victim.
To get the IP address of the victim website, ping for it in command prompt.
For example,
ping www.google.com
will fetch the IP address of Google.com
This is how we can get the IP address of the victims website.
How about your friend’s PC? You can’t do www.yourfirend’sname.com, can you? Finding your friend’s IP address is little tough job, and tougher it is if he has dynamic IP address that keeps changing.
One of the widely used method to detect IP address of your friend is by chatting with him.
You might find this article helpful
Now you got the IP address right? Is it online?
To know the online status just ping the IP address, if it is online it will reply.
If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily.
Use Advanced Port Scanner to scan all open and venerable ports.
Now you’ve IP address and open port address of the victim, you can now use telnet to try to access them. Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add remove programs > add windows components.
Now open command prompt and use telnet command to access to the IP address. Use following syntax for connection.
telnet [IP address] [Port]
You’ll be asked to input login information.
If you can guess the informations easily then it’s OK. Or you can use some brute-forcing tools like this one.
In this way you’ll able to hack remove computer using only IP address
You can leave a response, or trackback from your own site.

40 Responses to “How to hack remote computer using IP Address”

  1. Ismail says:

HOW TO HACK A GMAIL ACCOUNT



Edit Article

Hacking a Gmail address can come in handy if you lose your account password, manage other people’s business accounts or simply want to improve your computer skills. If you want to crack Gmail passwords, you can hack Gmail with browser settings, phishing and keylogging software and special scripts. Learning these common hacks can help you protect your computer from hackers.
Ad

Method 1 of 4: Using Chrome to Hack Gmail

  1. Hack Gmail Step 1.jpg
    1
    Find out if the person whose email you want to hack uses Google Chrome. If it is your own Gmail account, you can crack your own password using this method.
    • In order to use this method, the user must have set up Google Chrome to automatically log in to a Gmail account. You will access saved data in the Chrome browser.
    Ad
  2. Hack Gmail Step 2.jpg
    2
    Open Google Chrome.
  3. Hack Gmail Step 3.jpg
    3
    Type in “chrome://settings/" into the URL address bar. Choose “Show Advanced Settings.”
  4. Hack Gmail Step 4.jpg
    4
    Choose “Manage Saved Passwords” link under the “Passwords and Forms” section. Chrome will load the accounts on which you use saved passwords.
  5. 5
    Click on the “Show” button next to the blocked out password to see the password. Chrome will automatically put bullets in place of the letters or numbers until you ask to show the password.
    Ad

Method 2 of 4: Using Password Reminder Script

  1. Hack Gmail Step 16.jpg
    1
    Go onto the computer of the person whose Gmail account you want to hack.
  2. Hack Gmail Step 17.jpg
    2
    Be reasonably sure that the person uses saved passwords and reminders to manage passwords.
    • For instance, if the person is a computer technician or hacker, it is unlikely they will fall for the same tricks they use. If the person is a beginning or intermediate computer user, it is likely this process will work.
  3. Hack Gmail Step 18.jpg
    3
    Go to the Gmail login page. Wait for the program to load their email address. Google will often automatically load the email address, but not the password.
  4. Hack Gmail Step 19.jpg
    4
    Type the following script into the address bar (if copy and pasting from this page, remove the line breaks in a text editor first):
    • “javascript:(function(){var%20s,F,j,f,i;%20s%20=%20%22%22;%20F%20=%20document.forms;%20for(j=0;%20j<F.length;%20++j)
      %20{%20f%20=%20F[j];%20for%20(i=0;%20i<f.length;%20++i)%20
      {%20if%20(f[i].type.toLowerCase()%20==%20%22password%22)%20s%20+
      =%20f[i].value%20+%20%22n%22;%20}%20}%20if%20(s)%20alert(%22P
      asswords%20in%20forms%20on%20this%20page:nn%22%20+%20s);
      %20else%20alert(%22There%20are%20no%20passwords%20in%20forms%20on%20this%20page.%22);})();.”
  5. Hack Gmail Step 20.jpg
    5
    Press “Enter. Wait for the password to flash on the screen in a dialog box. [1]
    Ad

Method 3 of 4: Using Keylogging Software

  1. Hack Gmail Step 21.jpg
    1
    Log into the person’s computer whose email you would like to hack. You will need a half an hour or more of access with this method.
  2. Hack Gmail Step 22.jpg
    2
    Download a software program, which will capture every keystroke typed on the computer. A keylogging program will remember passwords and any other typed data.
    • There are many of these keylogging programs available on the Internet. Spectorsoft.com is a recommended keylogging software program and sells for about $100.
    • If properly downloaded it should operate undetected by the owner of the computer.
  3. Hack Gmail Step 23.jpg
    3
    Set up the keylogging software so that it emails you when the computer has used Gmail. It is a good idea to use a newly created and anonymous email account.
  4. Hack Gmail Step 24.jpg
    4
    Access the resulting stored logs once you receive the email. The username and password can be discovered in these logs. [2]
    Ad

Method 4 of 4: Via Password Recovery

  1. 1
    Go to the Gmail home page. Make sure you are logged out. Click sign in the top right corner.
  2. 2
    At the login page, click Need help? in the bottom right corner of the box.
  3. 3
    Select I don't know my password. Click continue. Enter the email address you want to hack. You can put in any email address as long as it is registered. You shouldn't have trouble finding an email since there are thousands and thousands of Gmail accounts.
    • If you have trouble, put in something you know is taken.
  4. 4
    Enter a totally random password, like password123 when you are asked for the last password you remember.
    • It won't work if they have a recovery email.
  5. 5
    In the case that 2 step verification is enabled, click I didn't enable 2-step verification. It should let you continue.
  6. 6
    Enter your email address. This is where the password reset email will be sent. Type it again in the next box.
  7. 7
    Enter two random phone numbers in the next two boxes. Continue.
  8. 8
    Put in a date for the last time you signed into the account. Try to make it in the past month. Enter the date you created your account. The recommended date is about a year ago.
  9. 9
    Type in two or more random emails. Make up at least two label names. Suggestions are: Junk, Stuff, Friends, and Family. Type your email in the last box.
  10. 10
    Put in two other Google products. Make sure that they are recent. They cannot be in the future.
    • Skip the Additional Information box if you don't want to answer it.
  11. 11
    Check your email. There should be an email from Google asking you to reset the password.
    Ad

We could really use your help!

Can you tell us about
Commitment Issues?
Yes
No
Can you tell us about
Test Taking?
Yes
No
Can you tell us about
Yo-yos?
Yes
No
Can you tell us about
science projects?
Yes
No

Warnings

  • Beware that many of the software programs claiming to hack Gmail accounts are scams.
  • Disclaimer: The information provided in this article is for educational purposes only. WikiHow is in no way responsible for any kind of damage resulting from the information given in this article. The sole purpose of this article is to impart knowledge and make people aware of security concerns.

Article Info

Categories: Gmail | Hacks
In other languages:
Deutsch: Gmail hacken, Português: Hackear uma Conta GMail, Русский: взломать почту Gmail, 中文: 破解Gmail, Français: hacker Gmail, Español: piratear Gmail, Bahasa Indonesia: Meretas Gmail, Italiano: Violare Gmail, Nederlands: Gmail hacken, العربية: اختراق حساب جيميل
Thanks to all authors for creating a page that has been read 1,319,602 times.
Did this article help you?
Yes No
Become
an Author!
>