Tips and Tricks

Tips and Tricks

Get to know everything you will ever need to optimize your system and enhance your web experience. The tips and tricks will let you explore the tech world in a new way

Read More
Impedit quo minus id

Social Networking

Know more about the social sites you visit everyday. Things you should know with these sites

Read More
Tech News

Tech News

At hacking duo we keep you updated with the recent turnouts in the techno world. The space contains all the new advancement in the Tech world, new releases, reviews etc

Read More
Operating System

Operating system

You own Window, Linux or Mac, we will always have something for you. All tips and hacks that you will need to play with your system

Read More
  • Quas molestias excepturi
  • Impedit quo minus id
  • Tech News
  • Mauris euismod rhoncus tortor
Showing posts with label account security. Show all posts
Showing posts with label account security. Show all posts

Sunday, 14 September 2014


Every computer connected to internet has its own IP address allotted to it, this IP address is unique and can be easily traced back to that computer.
Privacy is a big concern among internet users. If you are concerned about your privacy or dont want to reveal your original identity and are searching for ways to hide your ip then you are at the right place.
In this post we are going to discuss some of the best ways to hide your ip address and keep your identity safe online.

The safest and most popular ways to hide your ip is by using a proxy server. A proxy server is a server that act as an intermediate between your computer and the network to which it is connected. So, when you are using a proxy server you are not directly communicating with the network you are sending the requests to Proxy server which in turn sends them to network and then it receive the response and show it back to you. Thus your IP is kept hidden from your network. 

Lets now discuss about type of Proxy servers:

Website based Proxy server

This is the simplest method. There are tons of website on internet that provide free and padi proxy services for users. These website doesn't require you to install any additional software on you computer. Here are the list of some of the most famous proxies.
Most of these websites provides a field to enter the URL of the website you want to open. Once you enter the URL they will establish a connection with the target site and will show the result to you. The only downside of these sites are that some of them doesn't offer SSL connection and you are often presented with annoying adds during your browsing session.

Browser Configured Proxy Servers:

There are many free open proxies that are available in internet. You can obtain the the IP address of one of these free proxy servers and can configure your browser to start using them directly. The only downside is slow connection and few bottlenecks.

VPN Services:

VPN services are one of the most trusted services to hide your IP and safeguard your data and identity over internet. Here is the list of few VPN services that you can try yourself.
For any queries and questions please feel free to comment.

Saturday, 13 October 2012

Ubuntu is far more flexible and reliable than other OS around but imagine if you just forget your password and con't login in you account, isn't it an horrible idea? there are ton of things that may lead you to forget your password. But here is a method that could help you through your trouble. 

Tuesday, 22 November 2011

Creating a password is one of the most important part of ones online events. Its should be tricky, simple to remember and so much strong that it should be not guessed. To remember passwords people always uses very small and simple words related to their life or anything. But simple password posses threat to their anonymity. So, in the Zest weak password is the fastest way to get yourself hacked.

Monday, 21 November 2011


Facebook is one of the most used social networking website in the world and is also has one of the most attacked site. So, what we can do to prevent our account from getting hacked? Here are some tips that could help you to secure your facebook accounts from hackers.
Just login to your facebook account and follow these simple steps:

1. Control your privacy settings: make sure you are sharing only the informations that are needed to be shared, because sometimes a hacker may need only a little chunk of information about you to infiltarate your account.

Block the people and apps that seems suspicious, manage all your friends and configure how they access your data. Make sure that all the informations you share should not give a hint about your password.

2. Don't accept too much friend requests: Many hackers uses fake accounts to add themselves to the people and gain some bits of informations to tackel their accounts. 

3. Don't use much apps: many apps are on the facebook that compramises the user informations so you should not use any app if you are not sure.

4. Your password: Don't ever share your password, I know thats a old tale but is very important. Keep your password complex and don't share it with people.

Saturday, 8 October 2011

Keylogger is a spying software, it is used to monitor a given system. It records all the commands and typed activities on a given computer which is installed with a keylogger.
keyloggers are installed on a device to create a server program that would store all the keystroke records and will save them for you.
Keyloggers can be of different types such as surviliance keylogger and remote keylogger.
Surviliance keylogger is installed on the system to recordd and track the activity of company empolyes, spouse or tracking the online records of your children.

Remote keylogger is used mainly for hacking works, its considered to be one of the best hacking tools available now a days. But most of the keyloggers are detectable by anti-viruses and can be cleaned by the run-time scanning of anti-virus. so. hackers use different methods to hide the keyloggers. Writing simple software applications for keylogging can be trivial, and like any nefarious computer program, can be distributed as a trojan horse or as part of a virus. What is not trivial for an attacker, however, is installing a covert keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or IP address risks exposing the attacker.

So, I think your doubt about keyloggers are resolved. If you still have any doubt feel free to ask in comments.

Thursday, 6 October 2011


In my previous post I wrote about hoe to configure your prorat server in the post


Hack any computer with ProRAT

in my previous post I wrote the method by which you could configure prorat server to hack any PC. BY the previous method you can also hack any email account that has been created on that PC or being used on that PC.


Now I am providing you with the link for downloading ProRAT program. Just download the file extract the .rar and use your ProRAT to create your own server and hack any PC.

click here to download

Hope you guys liked it post with your valuable comments if any problem contact me

Wednesday, 5 October 2011

In previous post I wrote about what is a RAT, hope you all read it. Now this time I am posting a tutorial about one of the most famous RAT program ProRAT.


1. First download a ProRAT program, (I will soon be updating this post by adding download link for proRAT) Extract all datas into the folder.

2. You will got a window something like this.
3. Now click on create button.
4. click on the "Create ProRAT server 342kbayt"
5. Now in "PC connective Notification Network". put your own IP address. You can find your IP address here

Now in "Mail notification" put your own email ID hope you know this(joking :-p). This column is used to connect ProRAT server to you computer and and send you email of the logs that its keylogger will record.

6. Now click on the "Create server" a pop up window would appear stating
           "The server has been created" the server will be created in the default directory i.e. in the folder were proRAT is kept.


7. Not everyone would be willing to click on anything with .exe extension so, what we need to do  is to hide the server.exe file. Best way is to bind it with another file such as some mp3 or some jpeg for which victim may fall for. Now click on the bind server with file option, click on select file browse and choose the file you want to bind server with click on bind.



8. Server file when created looks suspious, you can also change the server icon just go to server icon and choose the icon you want from the entire collection.

Now, you need to send this file to your victim, here you need some social engineering. First off all make a RAR archive for server as you can not send .exe file via email due to policies of service providers. Bind the file with any favorite song or picture of victim or to anything that victim will be compiled to click on and once he clicked he is all yours. 

PROs and CONS
  • ProRAT is a complete package, it is a RAT, a keylogger, binder etc.
  • ProRAT has been around for quite a long time.
  • As its around for quite a long time it can be detected by anti viruses during scan time but is undetectable during run time.
Hope you guys liked this tutorial please leave comment for any quires and suggestions.
by this method you can also hack any email or social networking accounts.

Monday, 3 October 2011

Hardware keyloggers are the hardware spying tool. It records all the typed key words of the users in its in built memory.
Hardware keyloggers are used by many cyber cafe owners to get into your accounts, not that silly email accounts or social sites, they have much more sinister plans, they want your bank account details. Yes most of the keyloggers are installed in order to get access to your banking details, that they can use to exploit your bank account.

Friday, 23 September 2011


The Remote Administrative Tool, or more commonly known as RAT over internet. It is used by hackers to remotely use and control single or multiple computers. It has many useful tools embedded into itself.

It can act as a keylogger.

  • It can capture screenshots.
  • It can control the cameras or web cam.
  • It can disable anti-virus.
  • Can cause system instability
  • Can be used to access files on victim computers.
  • Shell control
  • File management i.e uploading and downloading files.
  • Registry management
  • computer authority i.e you can shut down victim computer.
Most important function of RAT is its power to get access to the victim computer. Once you are in you could do anything you, most feature of RATs are product oriented.

RAT is basically a software that is used to create a server file which once is executed on victims computer, lets the hacker whole access to the system. The server file is provided with IP addresses of both of the attackers and the victim's.
The server file once created is crypted using any crypter to avoid its its detection from anti-viruses, most of the anti virus detects RATs as potential threats and could delete them to avoid this they are crypted. After crypting they are binded with any file with known extension so as to confuse victim to click on them. Once clicked victim is all yours.

RATs that utilize reverse connection have a few major advantages, such as the ones listed below.
  • Outgoing connections generally are less threatening, and are less likely to be detected or blocked by a firewall, such as a router.
  • Since the victim's computer is connecting to the remote administrator, he or she will not need to know the victim's IP in order to connect.
  • The remote administrator does not need to know to which or how many computers the RAT is being installed on, which allows for mass-distribution.
  • If mass-distributed, it is much easier to keep track of the computers the RAT is installed on, since they are all "calling home" by connecting to the remote administrator.
most popular RATs are :
  1. proRAT
  2. Cerberus
  3. Cybergate
  4. Blackshades
  5. Poison Ivy
  6. Schwarze Sonne RAT
  7. Syndrome RAT
  8. Team Viewer
  9. Y3k RAT
  10. Snoopy
Hope you liked this post, soon will be posting tutorial on how to use RATs.

Monday, 12 September 2011

Have you ever been told by your friend that he has hacked many gmail accounts with simple tricks by fooling the gmail server. He could have told you about the simple way by which he fooled the Gmail password recovery server and requested a password for a account, he want to hack.
This technique was used by one of my friends to plant as attack on me. This is really a good example of social engineering.

Saturday, 10 September 2011

Surf web anonymously and securely. 
Its really an insecure world out there, when ever you are surfing net you leaves all your foot prints behind yourself, just like as if walking on a mud. Its really easy for an attacker to trace you.
How to surf anonymously without exposing yourself:

Now thats a question most of people never wanted to give a thought. When ever you surf internet you leave trace of yourself everywhere. Its like a leaving a trail all around. But first as we proceed. For beigners here is something you should know first.


What is an IP?
IP is known as INTERNET PROTOCOL .The Internet Protocol (IP) is the principal communication protocol used for relaying datagrams (packets) across an internetwork using the Internet protocol suit. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet. IP is the primary protocol in the internet layer of the Internet Protocol Suite and has the task of delivering datagrams from the source host to the destination host solely based on their address.
A IP address is like a telephone number. It can revel everything about you, your location, your address, everything about you.
So, then how to mask up your IP so that no one could trace you. there are a no. of methods which could be used. PROXY is the most significant one.
Proxy provides a different mode of path for data encryption. The proxy server act as a medium of communication between your system and network. All the data you send is manipulated by proxy server
Following few methods could be used to change your proxy.
Method 1:
By using online proxy sites. There are a no. of online proxy sites which provide free proxy. These sites are very useful if you want to access a site which is banned by by you network administrator.

proxy buddy
hide my ass
proxy site
access blocked site

Method 2:
By using VPN software it changes your proxy directly. The softwares such as 
Ultrasurf
TOR, 
Real hide IP, 
Hide my IP etc are quite usefull.

Friday, 9 September 2011

 
Have you ever got suspecious that someone else might be using your facebook account. Have you ever find out if there is any unknown activity going on in your wall, or you see some post or comments that you have not written then this post is for you.
Nearly everyone has encountered an attack on their facebook account, even I did. So, here toutorial that will guide you to setup your facebook account to prevent any unknown or unwanted activity.

Wednesday, 27 July 2011

Gmail has became one of the most popular email service provider and thus one of the favorite targets of hackers. A lot of complain have been found about spamming, email bombing and phishing. Most of us have witnessed the spams flooding our inbox. Have you ever wondered were the hell that all mail came from. 
You must have heard about phishing. You got some link you click on it and fill up the form and your account gets hacked. Ya that is phishing. So, when a email is send by a hacker to you most probably it feels like, it came from the genuine source. There are a lot of method of email spoofing, that I will discuss in my upcoming post. Now, coming to the main topic.
Imagine you got a mail, now you want to know where did it came from. So, what to do:

  • login to your gmail account.
  • Open the email you want to track down
  • Click on reply button and then on show original button.



 A new tab will get opened showing you the source code, look on for recieved: from it actually appears in 7th line.


the IP address in the blue box is of the IP address through which this mail was sent to you. Just copy the address. It will give the detailed information about the IP.


Sunday, 17 July 2011

Malwares are actually a program ( code, active script, software etc) that is used to infect any computer and carry on their pre determined objective without even letting the user getting slightest hint. Malwares are a menace from a long time. In this post I will discuss about some of the malware around us.
Is you computer running slow, or you are getting trouble in starting your programs, it may be possible that your computer is infected by malwares.

Saturday, 2 July 2011

Whenever you insert your pendrive into a computer there is a risk of getting it infected by the viruses in that system. Most of the guys fear this most. In this post I will tell you a method to protect your pendrive from the virus attack

Friday, 10 June 2011

 So, after i wrote firesheep article many guys asked me if there is any way to know if anyone is using firesheep on my wifi to hack me or on how to save myself from a firsheep attack? So, I thought to share a simple method to avoid yourself getting hacked on any public wifi.