Tips and Tricks

Tips and Tricks

Get to know everything you will ever need to optimize your system and enhance your web experience. The tips and tricks will let you explore the tech world in a new way

Read More
Impedit quo minus id

Social Networking

Know more about the social sites you visit everyday. Things you should know with these sites

Read More
Tech News

Tech News

At hacking duo we keep you updated with the recent turnouts in the techno world. The space contains all the new advancement in the Tech world, new releases, reviews etc

Read More
Operating System

Operating system

You own Window, Linux or Mac, we will always have something for you. All tips and hacks that you will need to play with your system

Read More
  • Quas molestias excepturi
  • Impedit quo minus id
  • Tech News
  • Mauris euismod rhoncus tortor
Showing posts with label hacking. Show all posts
Showing posts with label hacking. Show all posts

Saturday, 8 October 2011

Keylogger is a spying software, it is used to monitor a given system. It records all the commands and typed activities on a given computer which is installed with a keylogger.
keyloggers are installed on a device to create a server program that would store all the keystroke records and will save them for you.
Keyloggers can be of different types such as surviliance keylogger and remote keylogger.
Surviliance keylogger is installed on the system to recordd and track the activity of company empolyes, spouse or tracking the online records of your children.

Remote keylogger is used mainly for hacking works, its considered to be one of the best hacking tools available now a days. But most of the keyloggers are detectable by anti-viruses and can be cleaned by the run-time scanning of anti-virus. so. hackers use different methods to hide the keyloggers. Writing simple software applications for keylogging can be trivial, and like any nefarious computer program, can be distributed as a trojan horse or as part of a virus. What is not trivial for an attacker, however, is installing a covert keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or IP address risks exposing the attacker.

So, I think your doubt about keyloggers are resolved. If you still have any doubt feel free to ask in comments.

Wednesday, 5 October 2011

In previous post I wrote about what is a RAT, hope you all read it. Now this time I am posting a tutorial about one of the most famous RAT program ProRAT.


1. First download a ProRAT program, (I will soon be updating this post by adding download link for proRAT) Extract all datas into the folder.

2. You will got a window something like this.
3. Now click on create button.
4. click on the "Create ProRAT server 342kbayt"
5. Now in "PC connective Notification Network". put your own IP address. You can find your IP address here

Now in "Mail notification" put your own email ID hope you know this(joking :-p). This column is used to connect ProRAT server to you computer and and send you email of the logs that its keylogger will record.

6. Now click on the "Create server" a pop up window would appear stating
           "The server has been created" the server will be created in the default directory i.e. in the folder were proRAT is kept.


7. Not everyone would be willing to click on anything with .exe extension so, what we need to do  is to hide the server.exe file. Best way is to bind it with another file such as some mp3 or some jpeg for which victim may fall for. Now click on the bind server with file option, click on select file browse and choose the file you want to bind server with click on bind.



8. Server file when created looks suspious, you can also change the server icon just go to server icon and choose the icon you want from the entire collection.

Now, you need to send this file to your victim, here you need some social engineering. First off all make a RAR archive for server as you can not send .exe file via email due to policies of service providers. Bind the file with any favorite song or picture of victim or to anything that victim will be compiled to click on and once he clicked he is all yours. 

PROs and CONS
  • ProRAT is a complete package, it is a RAT, a keylogger, binder etc.
  • ProRAT has been around for quite a long time.
  • As its around for quite a long time it can be detected by anti viruses during scan time but is undetectable during run time.
Hope you guys liked this tutorial please leave comment for any quires and suggestions.
by this method you can also hack any email or social networking accounts.

Monday, 3 October 2011

Hardware keyloggers are the hardware spying tool. It records all the typed key words of the users in its in built memory.
Hardware keyloggers are used by many cyber cafe owners to get into your accounts, not that silly email accounts or social sites, they have much more sinister plans, they want your bank account details. Yes most of the keyloggers are installed in order to get access to your banking details, that they can use to exploit your bank account.

Friday, 23 September 2011


The Remote Administrative Tool, or more commonly known as RAT over internet. It is used by hackers to remotely use and control single or multiple computers. It has many useful tools embedded into itself.

It can act as a keylogger.

  • It can capture screenshots.
  • It can control the cameras or web cam.
  • It can disable anti-virus.
  • Can cause system instability
  • Can be used to access files on victim computers.
  • Shell control
  • File management i.e uploading and downloading files.
  • Registry management
  • computer authority i.e you can shut down victim computer.
Most important function of RAT is its power to get access to the victim computer. Once you are in you could do anything you, most feature of RATs are product oriented.

RAT is basically a software that is used to create a server file which once is executed on victims computer, lets the hacker whole access to the system. The server file is provided with IP addresses of both of the attackers and the victim's.
The server file once created is crypted using any crypter to avoid its its detection from anti-viruses, most of the anti virus detects RATs as potential threats and could delete them to avoid this they are crypted. After crypting they are binded with any file with known extension so as to confuse victim to click on them. Once clicked victim is all yours.

RATs that utilize reverse connection have a few major advantages, such as the ones listed below.
  • Outgoing connections generally are less threatening, and are less likely to be detected or blocked by a firewall, such as a router.
  • Since the victim's computer is connecting to the remote administrator, he or she will not need to know the victim's IP in order to connect.
  • The remote administrator does not need to know to which or how many computers the RAT is being installed on, which allows for mass-distribution.
  • If mass-distributed, it is much easier to keep track of the computers the RAT is installed on, since they are all "calling home" by connecting to the remote administrator.
most popular RATs are :
  1. proRAT
  2. Cerberus
  3. Cybergate
  4. Blackshades
  5. Poison Ivy
  6. Schwarze Sonne RAT
  7. Syndrome RAT
  8. Team Viewer
  9. Y3k RAT
  10. Snoopy
Hope you liked this post, soon will be posting tutorial on how to use RATs.

Saturday, 17 September 2011


What is bluetooth hacking?

Blue-tooth hacking is hacking the other device without the knowing that device.It is also know as Bluesnarfing. Blue-tooth hacking not only limited to cell phones ,but it can also hacked the desktop computers, laptops etc. 

Their are types of blue-tooth hacking –
1.Bluesnarfing
2.Bluejacking 
3.Bluebugging

Friday, 16 September 2011

So, there is always sometime when you want to view the profile of some people, who have their profile locked up for out siders. So, the question arises how to view their profile.

Monday, 12 September 2011

Have you ever been told by your friend that he has hacked many gmail accounts with simple tricks by fooling the gmail server. He could have told you about the simple way by which he fooled the Gmail password recovery server and requested a password for a account, he want to hack.
This technique was used by one of my friends to plant as attack on me. This is really a good example of social engineering.

Thursday, 4 August 2011

Its have been quite a long time people have been asking about how to hack any email ID. You guys also have been googling for the same. In this post I will tell you the exact methods that is being used by hackers to hack email account.

Saturday, 30 July 2011

According to Wikipedia Domain Hijacking is defined as "process by which registration of a currently registered domain name is transferred without the permission of its original registrant, generally by exploiting a vulnerability in the domain name registration system."

Friday, 29 July 2011

With the previous version getting complains from users I have revised this article to make it more worthy and working.
This post will help you to hack any user with any account not only facebook. I used it because it is the most popular one. So, here is how it is done...

Saturday, 9 July 2011

This feature provides you with the information about your system like the availibility of current updates or installlation status of some program. But sometimes this becomes a mess and an unwanted thing. If you want to get reed of this, this post is for you.
windows registry is the database where all the information about the windows is saved. All your configurations, settings, and changes you made in the system got itself placed at the registry. 

Win7 and vista have more display features, but hacking your registry can make your system more faster and reliable. Messing up with registry could harm your computer so, please make a back before staring and please follow the exact steps.

Wednesday, 6 July 2011

Many of my friends wanted to know what to do in case, if they lost their BIOS password. In this post I will be teaching you about the methods to hack the bios password of a computer.

Friday, 10 June 2011

In this post i am going to discuss about the method to hack Facebook or any other account including orkut, gmail, yahoo, MSN, hotmail etc. This method is used to hack Facebook or any other account on a public WiFi system.