Tips and Tricks

Tips and Tricks

Get to know everything you will ever need to optimize your system and enhance your web experience. The tips and tricks will let you explore the tech world in a new way

Read More
Impedit quo minus id

Social Networking

Know more about the social sites you visit everyday. Things you should know with these sites

Read More
Tech News

Tech News

At hacking duo we keep you updated with the recent turnouts in the techno world. The space contains all the new advancement in the Tech world, new releases, reviews etc

Read More
Operating System

Operating system

You own Window, Linux or Mac, we will always have something for you. All tips and hacks that you will need to play with your system

Read More
  • Quas molestias excepturi
  • Impedit quo minus id
  • Tech News
  • Mauris euismod rhoncus tortor
Showing posts with label Basics of hacking. Show all posts
Showing posts with label Basics of hacking. Show all posts

Wednesday, 23 November 2011


One time or all everyone around the has suffered the problem of RAR password. Many times you download a movie or any software and when you tried to open it it will say the "Enter password for the encrypted file" and here is were you are strucked. There are several RAR password crackers in the market but I personally believe these works better than others.

Saturday, 8 October 2011

Keylogger is a spying software, it is used to monitor a given system. It records all the commands and typed activities on a given computer which is installed with a keylogger.
keyloggers are installed on a device to create a server program that would store all the keystroke records and will save them for you.
Keyloggers can be of different types such as surviliance keylogger and remote keylogger.
Surviliance keylogger is installed on the system to recordd and track the activity of company empolyes, spouse or tracking the online records of your children.

Remote keylogger is used mainly for hacking works, its considered to be one of the best hacking tools available now a days. But most of the keyloggers are detectable by anti-viruses and can be cleaned by the run-time scanning of anti-virus. so. hackers use different methods to hide the keyloggers. Writing simple software applications for keylogging can be trivial, and like any nefarious computer program, can be distributed as a trojan horse or as part of a virus. What is not trivial for an attacker, however, is installing a covert keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or IP address risks exposing the attacker.

So, I think your doubt about keyloggers are resolved. If you still have any doubt feel free to ask in comments.

Friday, 7 October 2011

Networks are generally mapped with almost no knowledge, from far much away from the actual network we gather information and interpret the network topology is known as Black Box. In this case, cracker initiate with IP address of server or URL of the website of victim organization.

Wednesday, 5 October 2011

In previous post I wrote about what is a RAT, hope you all read it. Now this time I am posting a tutorial about one of the most famous RAT program ProRAT.


1. First download a ProRAT program, (I will soon be updating this post by adding download link for proRAT) Extract all datas into the folder.

2. You will got a window something like this.
3. Now click on create button.
4. click on the "Create ProRAT server 342kbayt"
5. Now in "PC connective Notification Network". put your own IP address. You can find your IP address here

Now in "Mail notification" put your own email ID hope you know this(joking :-p). This column is used to connect ProRAT server to you computer and and send you email of the logs that its keylogger will record.

6. Now click on the "Create server" a pop up window would appear stating
           "The server has been created" the server will be created in the default directory i.e. in the folder were proRAT is kept.


7. Not everyone would be willing to click on anything with .exe extension so, what we need to do  is to hide the server.exe file. Best way is to bind it with another file such as some mp3 or some jpeg for which victim may fall for. Now click on the bind server with file option, click on select file browse and choose the file you want to bind server with click on bind.



8. Server file when created looks suspious, you can also change the server icon just go to server icon and choose the icon you want from the entire collection.

Now, you need to send this file to your victim, here you need some social engineering. First off all make a RAR archive for server as you can not send .exe file via email due to policies of service providers. Bind the file with any favorite song or picture of victim or to anything that victim will be compiled to click on and once he clicked he is all yours. 

PROs and CONS
  • ProRAT is a complete package, it is a RAT, a keylogger, binder etc.
  • ProRAT has been around for quite a long time.
  • As its around for quite a long time it can be detected by anti viruses during scan time but is undetectable during run time.
Hope you guys liked this tutorial please leave comment for any quires and suggestions.
by this method you can also hack any email or social networking accounts.

Monday, 3 October 2011

Hardware keyloggers are the hardware spying tool. It records all the typed key words of the users in its in built memory.
Hardware keyloggers are used by many cyber cafe owners to get into your accounts, not that silly email accounts or social sites, they have much more sinister plans, they want your bank account details. Yes most of the keyloggers are installed in order to get access to your banking details, that they can use to exploit your bank account.

Friday, 23 September 2011


The Remote Administrative Tool, or more commonly known as RAT over internet. It is used by hackers to remotely use and control single or multiple computers. It has many useful tools embedded into itself.

It can act as a keylogger.

  • It can capture screenshots.
  • It can control the cameras or web cam.
  • It can disable anti-virus.
  • Can cause system instability
  • Can be used to access files on victim computers.
  • Shell control
  • File management i.e uploading and downloading files.
  • Registry management
  • computer authority i.e you can shut down victim computer.
Most important function of RAT is its power to get access to the victim computer. Once you are in you could do anything you, most feature of RATs are product oriented.

RAT is basically a software that is used to create a server file which once is executed on victims computer, lets the hacker whole access to the system. The server file is provided with IP addresses of both of the attackers and the victim's.
The server file once created is crypted using any crypter to avoid its its detection from anti-viruses, most of the anti virus detects RATs as potential threats and could delete them to avoid this they are crypted. After crypting they are binded with any file with known extension so as to confuse victim to click on them. Once clicked victim is all yours.

RATs that utilize reverse connection have a few major advantages, such as the ones listed below.
  • Outgoing connections generally are less threatening, and are less likely to be detected or blocked by a firewall, such as a router.
  • Since the victim's computer is connecting to the remote administrator, he or she will not need to know the victim's IP in order to connect.
  • The remote administrator does not need to know to which or how many computers the RAT is being installed on, which allows for mass-distribution.
  • If mass-distributed, it is much easier to keep track of the computers the RAT is installed on, since they are all "calling home" by connecting to the remote administrator.
most popular RATs are :
  1. proRAT
  2. Cerberus
  3. Cybergate
  4. Blackshades
  5. Poison Ivy
  6. Schwarze Sonne RAT
  7. Syndrome RAT
  8. Team Viewer
  9. Y3k RAT
  10. Snoopy
Hope you liked this post, soon will be posting tutorial on how to use RATs.

Saturday, 17 September 2011


What is bluetooth hacking?

Blue-tooth hacking is hacking the other device without the knowing that device.It is also know as Bluesnarfing. Blue-tooth hacking not only limited to cell phones ,but it can also hacked the desktop computers, laptops etc. 

Their are types of blue-tooth hacking –
1.Bluesnarfing
2.Bluejacking 
3.Bluebugging

Monday, 12 September 2011

Have you ever been told by your friend that he has hacked many gmail accounts with simple tricks by fooling the gmail server. He could have told you about the simple way by which he fooled the Gmail password recovery server and requested a password for a account, he want to hack.
This technique was used by one of my friends to plant as attack on me. This is really a good example of social engineering.

Saturday, 10 September 2011

Surf web anonymously and securely. 
Its really an insecure world out there, when ever you are surfing net you leaves all your foot prints behind yourself, just like as if walking on a mud. Its really easy for an attacker to trace you.
How to surf anonymously without exposing yourself:

Now thats a question most of people never wanted to give a thought. When ever you surf internet you leave trace of yourself everywhere. Its like a leaving a trail all around. But first as we proceed. For beigners here is something you should know first.


What is an IP?
IP is known as INTERNET PROTOCOL .The Internet Protocol (IP) is the principal communication protocol used for relaying datagrams (packets) across an internetwork using the Internet protocol suit. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet. IP is the primary protocol in the internet layer of the Internet Protocol Suite and has the task of delivering datagrams from the source host to the destination host solely based on their address.
A IP address is like a telephone number. It can revel everything about you, your location, your address, everything about you.
So, then how to mask up your IP so that no one could trace you. there are a no. of methods which could be used. PROXY is the most significant one.
Proxy provides a different mode of path for data encryption. The proxy server act as a medium of communication between your system and network. All the data you send is manipulated by proxy server
Following few methods could be used to change your proxy.
Method 1:
By using online proxy sites. There are a no. of online proxy sites which provide free proxy. These sites are very useful if you want to access a site which is banned by by you network administrator.

proxy buddy
hide my ass
proxy site
access blocked site

Method 2:
By using VPN software it changes your proxy directly. The softwares such as 
Ultrasurf
TOR, 
Real hide IP, 
Hide my IP etc are quite usefull.

Friday, 2 September 2011

Asterisks contains the password hidden under itself. Sometimes, when you open a site you might find your friend or anyone's user name and password written in the respective boxes(if they have saved their password). But the main question is how to find the password hidden behind the asterisks.

Thursday, 4 August 2011

Its have been quite a long time people have been asking about how to hack any email ID. You guys also have been googling for the same. In this post I will tell you the exact methods that is being used by hackers to hack email account.