Dear Readers: HWS has recently started a new project for the students of engineering ====> The Engineering Projects

Write at HWS !!!

Guest Posting

How secure is your Computer ?

Check out your computer safety here . A lot of tools , tricks and hacks related to computer .

Blogger Tips and Tricks

A Lot of tips ,tricks and hacks related to blogger . Seo tricks to get maximum targetted traffic to your blog.

Easy ways to Earn Online

Online earning is not so difficult but it needs a lot of patience and hardwork. Here are some techniques to earn money through internet.

Facebook Tricks

A lot of facebook tips , tricks and hacks.It requires a lot of time but reading is must.

Pro Hacking

If you have knowledge about basic techniques then try this,but be careful as it is highly toxic.

Thursday, March 29, 2012

Command Prompt Tricks+Hacks Premier | part 1 ~ HACK WITH STYLE

Wednesday, March 28, 2012

Command Prompt Tricks+Hacks Premier | part 1

Hey guys how you been ? Hope you rockin it ;-)
Its been requested to make post on Command prompt commands , usage and other tricks. So i'll cover this part in parts .
Anyway if you want to know how to get IP then i have already posted on that , here is the link

>>Get IP of remote PC

Basic commands

  • dir : it lists all the files and directory in current location
  • cd : it takes the control to specified path. eg- suppose you are at c:\> and you type command cd users\public then it'll take you to c:\Users\Public>
  • cd.. : it takes you one directory back
  • systeminfo : it gives you all the information like processor,speed,hotfixes,RAM,hard-disk etc
  • md  : it makes a folder of a name which u have to specify. eg md hello
  • color : sets the color of command prompt and its text
  • echo : it displays the message 
  • echo message >> name.txt : it saves the message you have written to a file ,in this case , name.txt. 


you can use command shutdown with various parameter . eg >>shutdown /s

  • /l : it loggs you off
  • /s : it shutdowns the computer
  • /r : restarts the computer
  • /a : it aborts the shutdown. suppose you have used shutdown /s . it'll shutdown the computer in less then a minute and within that minute if you use shutdown /a then the shutdown process will be aborted
  • /p : turn offs the computer without any delay
  • /h : it hibernates the computer 
  • /s /c message : this combination shutdowns the computer with a message which you have to specify
  • /m : it is used to shutdown a remote computer but for that you have to know the login ID and Password of remote computer :-)


  • command /? : this is used to get the information about the specified command . suppose you want to know about md then you have to type md /?  and it'll display the information about that command.

These are very basic commands remember these . In next post i'll start batch file programming.  batch files are really interesting :-)

Hope you enjoyed this .. thanks for reading :)
Stay Tuned !!!
(comment and like plz )

" Copyright © 2012. All rights reserved by “Kumar Sourav"

Saturday, March 17, 2012

Access any other computer over the internet.

(For google chrome users only)

Access other computers or allow another user to access your computer securely over the Internet
Chrome Remote Desktop Beta enables you to enlist the help of a trusted resource for help in diagnosing and resolving problems with your computer through the internet.  Using Chrome Remote Desktop you can share access to your computer with an individual you trust, who will then be able to view your computer screen and control your computer remotely, just as if they were sitting beside you helping in person.  Sharing is fully secured, access is given only to the specific person you identify, and only on a one-time basis. If you are an IT helpdesk professional, Chrome Remote Desktop provides you with a simple and secure means to troubleshoot and resolve problems with your users' systems without having to leave your desk.

Chrome Remote Desktop is fully cross-platform, so you can connect any two computers that have a Chrome browser, including Windows, Linux, Mac and ChromeOS machines.  

                                         Get Chrome Remote Desktop Beta

I hope you guys enjoy it  :)

Sheharyar Sikandar

Friday, March 16, 2012

ARP-DNS Spoofing Attack using Cain & Abel.

Hey guys today i'm writing a very simple and interesting tutorial on DNS spoofing or poisoning attack using Cain & Abel.


DNS spoofing or DNS cache poisoning is a computer hacking attack in which data is introduced into a Domain Name System(DNS) name servers cache database, which causes the name server to return to an incorrect ip address, diverting traffic to another computer.
In simple words, it redirects the traffic to another website.

For example the victim wants to open but is redirected to


                                                                   Download Here


  • Install Cain & Abel and open it, go to configure and select your adapter.

  • Select Sniffer option and then select the start/stop sniffer option from the toolbar. Right click in the white area and then click on scan MAC addreses. 

  • After scanning click on the APR option in the left bottom corner. Then click on the + sign in the top and select the computers you want to mess with.

  • After that select APR-DNS and again click on + sign to add websites. (Now here i have entered, then click on resolve and type the website name that  you want to open up instead of (i have given

  • Now click on the start/stop option. 

  • Now wait for a minute and see what happens to the victim. (In my case when the victim will open he will be redirected to You can use any websites of your choice.


So this is it guys, hope you like it, comment for any queries  :)

Sheharyar Sikandar

Thursday, March 15, 2012

BackTrack 5: Using Metasploit to Hack computers

BackTrack 5 : using Metasploit

Hey guys , how u been. Long time since i posted . anyway m back with new tutorials :)
some day ago smarty ujjwal suggested me that i should make videos with explanation by myself instead of putting songs . So thanks to ujjwal and here i am with my first video on how to hack PC on your LAN with metasploit.   Although i used xp cause this is for education purpose. Anyway , you'll the idea on how to use metasploit.

 i dont want you guys to be a script kiddie and use watever u see , i want you to do a little research and make a better hacker :)


Guys plz comment and share and like .... thanks
Stay Tuned !!!!


Copyright © 2012. All rights reserved by “Kumar Sourav" & "xeo hacker

Wednesday, March 14, 2012

Convert a text into mp3

Hi friends,

Today i'm sharing a website with you, its specially for those of you who want to convert their text  into  .mp3.
You just copy and paste your text or may be type the text in their given space and you can get it downloaded in mp3.
No matter how long the text is, it will convert that. You can also select between male and female voice and also you have multiple languages option. So here is the link,

Hope you guys like it :))

Sheharyar Sikandar

Tuesday, March 13, 2012

Hack Wi-Fi named blink/thomson : tutorial by Michel Daoud

Hey guys , how you doing ?
hope you all fine . well its long since i posted . Actually m doing a little research on something. Soon i'll post tons of stuffs.

WELL HERE IS A TUTORIAL MADE MY Michel Daoud ! Hope you guys appreciate his work.


Ok so in this video he show you how to get password of wi-fi network if it name starts with blink or thomson !


Thats all guys :-)

Stay Tuned !
and say thanks to Michel Daoud ! :-)

thanks for watching

Monday, March 12, 2012

Hacking into someones pc using keylogger.

Hi friends this is Sheharyar Sikandar, hope u all are doing well :)
This a revised version of our post on hacking into someones's pc using keylogger. A lot of people have been asking about the newer cracked version of  keylogger. We had already provided you guys with ardamax keylogger 2.9. So now im posting ardamax keylogger 3.8.9.            

Ardamax keylogger 3.8.9

                                                 Download here

    Install the keylogger and register it using given key.

Remote installation

  • Make account on any web hosting site like
  • Go to FTP options and make new dir 
  • Now go to Remote installation option,
  • Once its open, click next 
  • Keep the installation folder to windows system folder, additional components to log viewer, check the box that say append the keylogger engine to file and select the file (This is optional, if you select any file here, it will also open once the keylogger file is opened), click next
  • Check all boxes in inadvisability, click next
  • Enable security, keep any password, check all boxes and click next
  • Leave the options to default (you may change them according to your wish), click next
  • Check send logs and select your desired time after which the logs will be sent to you, select delivery method to FTP, log format to HTML, and in include select everything as per your wish, click next
  • Now you have to give your web host details. In send to enter your webhost address like, then your username and password of that web host and then your dir name in which you want the logs to appear, test it, if it connects then click next, otherwise you might have made some mistake there, so review.
  • Then select the controls, screenshots, webcam, destination, icon as per your wish (icon should be such that it can trap the victim easily)
  • Click finish and here you are done with you remote keylogger file.

Now all you have to do is share this file and make someone open it. Once its opened you will start getting the logs on your FTP host.


Note : Any anti virus can detect this file, so if  you are smart enough to make the victim turn off his anti virus and then open it , thats really cool, otherwise if you want it to go undetected then you will have to crypt it. For that you will have to use any FUD (Fully undetectable ) crypter.

What is FUD crypter?

A FUD crypter is a software that can be used to encrypt your executable filesso that they can become undetectable with Antivirus & Anti-Spyware programs.
These executable files are mainly viruses, RATs, Keyloggers and other spyware programs.
Any FUD crypter stays undetected for a week or two and then the antivirus can detect its crypted file again. 

I couldn't find any working FUD crypter rightnow, but i will update you guys with a working FUD crypter soon :)

Feel free to comment about any of your queries .


Saturday, March 10, 2012

Facebook Launched Official Chat Messenger

Facebook messenger is basically a windows application which can be used to chat with your Facebook friends without opening any web browsers . The Facebook Messenger is available in both versions 32 bit and 64 bit for windows operating system.

The most useful thing of Facebook Messenger is that it provides access to chat box  and notifications in a much smaller window. If you are using your web browser open only to chat on Facebook or prefer your chat window and notifications to be visible 24/7, then the Facebook Messenger application might be very useful for you !
  • Chat and message with your friends on Facebook
  • See the latest updates from your friends in ticker
  • Get quick notifications about what’s going on


  • You can set up the app if you use Windows 7 on your computer. 
  • Facebook is currently working on a version of this app for Windows Vista. 
  • Please note that messenger do not currently support Windows XP. 
Note : Messenger will automatically install updates.


Armitage : Graphical Cyber Attack Management Tool

Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don’t use Metasploit every day. If you want to learn Metasploit and grow into the advanced features, Armitage can help you.

Armitage organizes Metasploit’s capabilities around the hacking process. There are features for discovery, access, post-exploitation, and maneuver.

For discovery, Armitage exposes several of Metasploit’s host management features. You can import hosts and launch scans to populate a database of targets. Armitage also visualizes the database of targets–you’ll always know which hosts you’re working with and where you have sessions.

Armitage assists with remote exploitation–providing features to automatically recommend exploits and even run active checks so you know which exploits will work. If these options fail, you can use the Hail Mary approach and unleash db_autopwn against your target database.


  • To use Armitage, you need the following:
  • Linux or Windows
  • Java 1.6+
  • Metasploit Framework 3.5+
  • A configured database. Make sure you know the username, password, and host.


Twitter Delicious Facebook Digg Stumbleupon Favorites More


Recent Posts

Join Me On Facebook

700+ Followers


meet women in Ukraine contatore visite website counter

Recent Comments

Follow Me On Twitter

1112+ Followers