Home » Archives for February 2012
This is a very good technique that can be used to restore and retrieve
any Facebook account as long you have at least smallest of a clue of the
person whom you want to hack.If not,I'll provide you a few sties which
will help you find out more about him and quite easily answer his
recovery settings.Even though this method has only 50%-50% chances of
recovering a password.It is at least worth a try.If not we have to go to
other alternative options of Facebook Hacking
Matching Faces
I thought about this method as I was showing a friend through Teamviewer
the pictures that Facebook was showing me to identify the target's
friends. And obviously, I was clueless because I did not whom i was even
trying to hack.
What did I do? Well, as you can see the screenshot.
1.Suspicion
2.Security question
3.Confirm Identity
4.Confirm identity by identifying the friends on that account.
Before you try
answering any of the questions go to some of these sites and check out
what they do.They give you list of email address,nicknames,phone number
and other details which the user would have entered on the "World Wide
Web".
1.
http://com.lullar.com/
2.
http://www.pipl.com/email/
3.
http://www.spokeo.com
4.
http://www.emailfinder.com
5.
http://www.zabasearch.com/
6.
http://www.zoominfo.com
Also you can check this as well :
Free Facebook Hacking Software
Facebook provides the names of the target's friends. So, use that
information to essentially bypass the security of identification by
searching those names on Facebook search and matching the faces based on
the Target's friends.
It will only ask you match faces if you are logging in with the correct
password or if you get picked up from a different location.
Note that will need an extra Facebook account to search,
otherwise Facebook does not let you search. Close the 'Suspicion' page
and log in to your extra or your actual Facebook account and search for
the Target's friends.
Be sure to notice where your target lives so on the results you can
compare whether if the friend is the matching face or not. Be sure to
notice the names of the friends as well.
For example, if the name choices are:
George Bush
Adolf Hitler
Barrack Obama
Mohammed Ali
Lee Chang
And the picture given is of an middle eastern descent looking person,
you should obviously go with the name that sounds middle eastern.
Once you match the faces for the identification questions. You should be able to get in without a problem.
Apart from just blindly following this method.You should also try to
apply a little of your head into this game.You can actually chat with
your victim and extract all the details !
Hello Everyone,
I'm sure most of you guys have played Counter
Strike v1.6 at some point of your gaming experience ! So,if you have
forgotten that game then this is the time to bring it to life again
because i have more than 1000+ Maps and Bots as well !
What are Bots ?Bots are
something that can make your gaming experience more fun as they are
something like cheats ! For ex.Some bots will help you to look through
walls and some Bots help you to shoot your opponents head off at one
shot !!
Info :File size : 170 MB
File Extension : .rar (Zipped Archive)
Download :
http://www.mediafire.com/file/4ccog1yc5yh3p5x/Counter Strike 1.6 Maps.rarPassword : hackmeout.blogspot.com
Feel free to comment and share ! If you have any doubts contact me ! I'll get to you as soon as possible !
by hackmeout...
My first post on Phishing was how to install a phishing page and in
order to install a phishing page you need one.So in this article I'll
give you a sample of a World Of Warcraft (WoW) phishing page which i
made recently.It is quite easily to make a phishing page once you
understand the whole idea behind it.
File Details:
Download:
World Of Warcraft (WoW) Phishing Page
File Size: 4 KB
File Extension: .rar (Compressed Archive)
How to use it ?
I have made a generalized tutorial on how to use fake login pages and how to set them up for hacking over here :
How to Install / Setup / Use a Fake Login Page for hacking
If you follow that guide careful you should be able to use this file
successfully.If you have any problems on your way then just E-mail me
using the contact form or just leave a comment.I'll get to you
immediately.
What can i do with a Phishing page ?
The main reason i made this phishing page is so that you can have fun or
pull a prank on your friends by tapping their passwords using this
clone page of the original website.DO NOT cause any damage to anyone in
any manner.This is only for educational purposes and i DO NOT promote
fraudulent activities.
Stay tuned to this blog for more exiting downloads and tools !
by hackmeout...
As one of the members of this blog requested me to make this phishing
page I made it exclusively for him.If you want me to make you a phishing
page then please E-mail me.My first post on Phishing was how to install
a phishing page and in order to install a phishing page you need one.So
in this article I'll give you a sample of a Steam phishing page which i
made recently.It is quite easily to make a phishing page once you
understand the whole idea behind it.
File Details:
Download:
Steam Phishing Page
File Size: 4 KB
File Extension: .rar (Compressed Archive)
How to use it ?
I have made a generalized tutorial on how to use fake login pages and how to set them up for hacking over here :
How to Install / Setup / Use a Fake Login Page for hacking
If you follow that guide careful you should be able to use this file
successfully.If you have any problems on your way then just E-mail me
using the contact form or just leave a comment.I'll get to you
immediately.
What can i do with a Phishing page ?
The main reason i made this phishing page is so that you can have fun or
pull a prank on your friends by tapping their passwords using this
clone page of the original website.DO NOT cause any damage to anyone in
any manner.This is only for educational purposes and i DO NOT promote
fraudulent activities.
Stay tuned to this blog for more exiting downloads and tools !
by hackmeout...