Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting | Movies & Songs

Thursday, July 29, 2010

Indian Hackers Forum http://h4ck3rs.in/ Hacked by Pakistani Hackers

Indian Hackers Forum http://h4ck3rs.in/ Hacked by Pakistani Hackers

Now I am sure that by tomorrow morning, I am gonna see some defacements of biggest Pakistani website by INDIAN CYBER ARMY. Lets c.

Below is the screen shot captures of hacked website.

The below message has been published by Pakistani Hacker

[ Site Security Bypassed ]

(HACKED)

~&~

[ DEFACED By ]

[ HEX786 & Mister M0st Wanted ]

- = This Is A Result Of What You People Are Doing.YOu Think There Is No One Who Will React To YOur Acts.U R Crossing Limits By Hacking Our Gov Websites.We Talk About Harmony,We talk about friendship But U Have always took our Peace as our Weakness.Stop Racism.Just Keep In Mind,our Army Is Defending Our Borders,Our Police Is There In Our Streets & V R Here To Secure Our Cyber World.U R Not Better Then Us In Anyway. So U Were Trying To Make Our Internet Hell.Did You Ever Think About Your Cyberworld.You Are NOt Super Secure.All What YOu Do For Fun Is Exploiting A Common Man.This Was Meant To Show You That U R not Far AWay From Us.Stop This Cyberwar Or You Will Suffer A Lot. =-

[Message for Indians Hackers ]We Are Warning You, Stop this Cyber War You have Started Against Pakistan.Dont think that You're far Away from Us. We Will Make Your Internet Hell, See How We will Defeat You in Cyber War You'll Never Ever Forget. [ HEX786 ]


If You Play with Fire, You Get Burned.If You do Something Dangerous,You will Get hurt.If U Think Against About Us U Will Lose Your Mind.Because We R Away For Your Mind.

Download ZoneAlarm Extreme Security 2010

Download ZoneAlarm Extreme Security 2010

The ZoneAlarm Extreme Security package includes everything in ZoneAlarm Security Suite and integrates the comprehensive Web security features of ZoneAlarm ForceField, which includes anti-phishing and drive-by download protection, as well as Web site security detection, a privacy mode for shared computers, and more.The ZoneAlarm Internet Security Suite will not only eradicate threats but also prevent them from ever entering in the first place. Comprehensive protection defends your PC with robust firewall technology and stops identity thieves and spammers in a single, easy-to-use application.

ZoneAlarm ForceField application was created to be a lightweight software for your Web browser, designed to protect you from Web-based threats such as phishing and spy sites, theft, spyware downloads, and privacy invasions.
Here are some key features of "ZoneAlarm Extreme Security":

Antivirus:
· New engine delivers the best virus protection with significantly enhanced detection and removal capabilities. Hourly signature updates, expanded coverage, and faster detection to find and remove even the most recent and aggressive viruses.

Anti-Spyware:
· More robust detection and removal functions perform deeper scans at every level and purge spyware from your PC.

Anti-Spam & Anti-Phishing:
· Stops spam with automatic spam blocking that automatically adapts to the latest spamming techniques. Protects against phishing emails that attempt to steal your money or identity.

Identity Theft Protection :
· While ZoneAlarm continues to secure your identity information on your PC, these new Identity Theft Protection services also prevent identity theft over the Internet and even in the physical world.

Network and Program Firewall:
· Delivers proactive firewall protection with multiple layers of security that stop inbound, outbound, and program attacks while remaining completely invisible to hackers.

Operating System Firewall (OSFirewall):
· This additional layer of security prevents hard-to-remove spyware, including rootkits and kernel-level threats, from getting onto your PC and causing damage.

Auto-Learn:
· Allows hassle-free computer operation from the moment of installation by hiding unnecessary security alerts, thereby drastically reducing interruptions during the first two weeks as the product learns the programs you typically use. Automatically configures security settings, and rates threats according to level of potential damage they represent.

Game Mode:
· One-click control temporarily suppresses most security alerts and prevents them from interrupting your fun while maintaining maximum protection for your PC.

Wireless PC Protection:
· Automatically detects wireless networks and secures your PC from hackers and other Internet threats wherever you're connected - at home or on the road.

SmartDefense Service:
· Provides your PC with real-time security updates, improved response to breaking spyware threats, and new attack protection capabilities.

Superior Performance & Compatibility:
· Allows your PC to run quickly and smoothly.

Spy Site Blocking:
· Prevents spyware from getting on your PC by blocking its primary source: spyware distribution websites.

Privacy Protection:
· Manages and blocks pop-up ads, online profiling, cookies, cache, and scripts so you can surf in peace.

IM Protection:
· Protects your instant messages - even those sent between different services - so they can't be monitored.

Email Security:
· Quarantines suspicious attachments to help defend against unknown viruses; automatically halts outbound messages to keep you from accidentally infecting others.

Parental Control:
· Prevents children from viewing inappropriate content on Web sites.

Virtual Browsing:
· Builds a protective shield around your web browser. It creates a temporary clone of your browser so that anything you do on the web runs in a protected shell, sealed off from your PC.

Browser Threat Immunity:
· Immunizes your browser against security holes in Internet Explorer and Firefox. Prevents web sites from installing spyware and other malicious software onto your computer without your knowledge.

Private Browser:
· Erases all cache, cookies, history and passwords from the current session when you close the browser. This prevents the next person who uses the computer from seeing where you've been.

Keylogger & Screengrabber Jamming:
· Keeps your keystrokes and click trails private. Discovers and blocks silent spyware from stealing your identity.

Dangerous Download Detection:
· Detects dangerous downloads and alerts you to problems before they begin. You can download files safely, and free from worry that they might harm your computer.

Anti-Phishing:
· Click where you want, your personal information remains secure. Dual-engine anti-phishing identifies and stops fraudulent websites that trick you into revealing personal data.

Spy Site Blocking:
· Prevents spyware from infiltrating your PC by detecting and blocking websites known to distribute spyware.

Website Safety Check:
· Checks the credentials on every website you visit, so you know if the website is a safe place to enter data and download files.

Spyware Flushing:
· Auto-cleans your Web browser memory each time you close it, wiping away spyware and other dangers.

On-The-Fly Encryption:
· Temporary file encryption protects the data you enter online from spyware for an additional measure of security.

Seamless Integration:
· Compatible with all popular web browsers, including Internet Explorer and Firefox on XP and Vista.

Security Software Compatibility:
· Run ZoneAlarm ForceField with your current antivirus or security suite, for an essential level of critical web protection you would not have otherwise. It is compatible with all security software currently on the market.

Fast and Easy to Use:
· Installs in seconds and runs fast so it won't slow you down. You can surf the web like always, knowing your PC is protected. ZoneAlarm ForceField runs automatically, without any setup or training.

Requirements:

· 1 GHz or faster processor
· Minimum system RAM: 512 MB
· 250MB of available hard-disk space

DOWNLOAD PART 1

DOWNLOAD PART 2

ATM Hacking: How to Hack ATM Machine

ATM Hacking: How to Hack ATM Machine | Armed with exploits, ATM hacker hits the jackpot

Black Hat A startling percentage of the world's automated teller machines are vulnerable to physical and remote attacks that can steal administrative passwords and personal identification numbers to say nothing of huge amounts of cash, a security researcher said Wednesday.

At the Black Hat security conference in Las Vegas, Barnaby Jack, a security researcher with IOActive, demonstrated attacks against two unpatched models from two of the world's biggest ATM makers. One exploited software that uses the internet or phone lines to remotely administer a machine made by Tranax Technologies. Once Jack was in, he was able to install a rootkit that allowed him to view administrative passwords and account PINs and to force the machine to spit out a steady stream of dollar bills, something the researcher called “jackpotting.”

“It's time to give these devices an overhaul,” Jack told a standing room-only audience during day one of the two-day conference. “There hasn't been a secure development methodology from the get go. The simple fact is companies who manufacture the devices aren't Microsoft. They haven't had 10 years of continued attacks against them.”

In a second attack against a machine from Triton Systems, Jack used a key available for sale over the internet to access the model's internal components. He was then able to use a install his rootkit by inserting a USB drive that was preloaded with the malicious program.

Both Triton and Tranax have patched the vulnerabilities that were exploited in the demos. But in a press conference immediately following his talk, Jack said he was confident he could find similarly devastating flaws – including in machines made by other manufacturers as well.

Jack said he wasn't aware of real-world attacks that used his exploits, but this foiled attack from earlier this year appears to involve many of the same techniques.

“Every ATM I've looked at, I've found a game-over vulnerability that allows me to get cash from the machine,” he said.

To streamline his work, Jack developed an exploit kit he calls Dillinger, named after the 1930s bank robber. It can be used to access ATMs that are connected to the internet or the telephone system, which Jack said is true of most machines. The researcher has developed a rootkit dubbed Scrooge, which is installed once Dillinger has successfully penetrated a machine.

Jack said vulnerable ATMs can be located by war-dialing large numbers of phone numbers or sending specific queries to IP addresses. Those connected to ATMs will send responses that hackers can easily recognize.

Facebook Hacking: Hacker Proves Facebook’s Public Data Is Public | 100 million Facebook pages leaked on torrent site

Security specialist Ron Bowes has once again proven how easy it is to glean valuable user information from Facebook, by spidering Facebook’s online directory and compiling it all into one neat little torrent that could be downloaded off his site, SkullSecurity.com.

that provide access to the names, addresses and phone numbers of 100 million users, one fifth of Facebook. , which has the default dictum “Anyone can opt out of appearing here by changing their Search privacy settings.” Yeah, but should they have to?

These kinds of security breaches will only encourage more hackers desperate for attention. Now would be a good time for Facebook to set their default search to “Friends Only.” Why? Because most people are aren’t quite aware that check mark next to “Everyone” includes a hacker who can grab your personal info, package it up and sell it to the highest bidder.

According to Bowes the torrent contains (at 2.8 GB, our torrent is “still downloading”) …
  • The URL of every searchable Facebook user’s profile.
  • The name of every searchable Facebook user, both unique and by count (perfect for post-processing, datamining, etc).
  • Processed lists, including first names with count, last names with count, potential usernames with count, etc.
  • The programs [Bowes] used to generate everything [which makes it easy for other hackers to replicate the process]

Hackers post fascist slogans on Nazi camp website

Hackers replaced a "Book of the Dead" with neo-Nazi slogans and symbols on World War Two concentration camp Buchenwald's website (www.buchenwald.de) on Wednesday and completely erased the Mittelbau Dora camp website.

"Brown is beautiful," read one slogan in English, referring to the color of the uniform shirts of Adolf Hitler's SA stormtroopers. "We'll be back," threatened another in German.

"By damaging the services and documentation that we offer -- such as the Book of the Dead at Buchenwald concentration camp -- the perpetrators were trying to efface the memory of the victims of the crimes of the Nazis," said Volkhard Knigge, head of the Buchenwald memorial foundation, in a statement.

The foundation, which is dedicated to preserving the camp's remains in commemoration of the victims and promoting public knowledge and historical research into the Holocaust, said the hacker attack had been reported to police.

In Buchenwald the Nazis incarcerated nearly a quarter of a million people, many of them Jews, who were forced to work in arms factories. An estimated 56,000 of them died of exhaustion, starvation or illness, or were executed.

Mittelbau Dora nearby also provided forced labor for a Nazi weapons factory and it is estimated that one third of the 60,000 prisoners held there died.

Wednesday, July 28, 2010

Indian Cyber Army [ICA] official website www.indishell.in is Down

Indian Cyber Army [ICA] official website www.indishell.in is Down

Is this some bug or any kind of attack from Pakistani hackers. As we have posted that Pakistani official website is down from last 24 hours, it seems they are taking revenge & trying to breaking into INDISHELL. No official information has been received from any side. Lets WAIT & WATCH.

UPDATE-1: Due to some error on the harddisk, server got crashed. Admin is fixing the server and forum will be live soon

UPDATE-2: Its live with new features

WikiLeaks Exposed Sensitive Materials to The Public | Freedom of Information Act


WikiLeaks Exposed Sensitive Materials to The Public | Freedom of Information Act

Hi readers, here is a big surprise for you. Today while surfing, I have found a wonderful website http://www.wikileaks.org. Wikileaks is an international organization which publishes anonymous submissions and leaks of sensitive documents while preserving the anonymity of sources. Its website, launched in 2006.

Within a year of its launch, the site claimed a database that had grown to more than 1.2 million documents. Video posted on a website called Collateral Murder established Wikileaks as a prime portal for unauthorized, accurate accounts, documents and video from distant battlefields.

Wikileaks went public in January 2007, when it first appeared on the Internet. WikiLeaks combines the protection and anonymity of cutting-edge cryptographic technologies with the comfortable presentation style of Wikipedia, although the two are not otherwise related. WikiLeaks network also collects materials in person and from postal drops. WikiLeaks also run a network of lawyers and others to defend their work and their sources.

WikiLeaks information is distributed across many jurisdictions, organizations and individuals. Once a document published it is essentially impossible to censor.

WikiLeaks staff examine all documents and label any suspicions of inauthenticity based on a forensic analysis of the document, means, motive and opportunity, cost of forgery, what the authoring organization claims and so on. WikiLeaks become world leaders in this and have an enviable record: as far as can be determined, they have yet to make a mistake. This does not mean they will never make a mistake, but so far, method is working and have a reputation to protect.

FOR MORE INFORMATION VISIT: wikipedia

PAKHAXORS is Down | Pakistani Hackers Official Website

PAKHAXORS www.pakhaxors.com is Down | Pakistani Hackers Official Website

This website is down from last 24 hours. It seems some Indian Hacker again attack with DDOS attack on PAKIS. I have not received any official information regarding this. This is my assumption only. Todays its 28th July 12:15 PM.

If anyone from you open it, pls let me know. Leave a comment here with date & time.

Crazy009 hits 2 Pakistani Websites: Just Stepped into this Battle of Cyber War

Crazy009 hits 2 Pakistani Websites: Just Stepped into this Battle of Cyber War

This Indian Hacker informs freehacking team about this hacking via email. He has hacked 2 paki websites:

http://adeelnadeem.pk
http://www.utrack.com.pk

More details and screen shots of admin panel of hacked website is available @ http://crazy-techies.blogspot.com

Pakistni Provincial Disaster Management Authority official Website Hacked by Indian Hacker Mr.Jsy

Pakistni Provincial Disaster Management Authority official Websitehttp://www.pdma.gos.pk/pdma/ Hacked by Indian Hacker Mr.Jsy

http://pdma.gos.pk/pdma/portals/0/Mr.JSY.swf



Indian Cyber Army [ICA] Rocks: A message to Porkjokers (Pakhaxors)

Indian Cyber Army Rocks: A message to Porkjokers (Pakhaxors) | In response of one Indian website http://www.epwrf.res.in/shak.htm Indishell Team [ ICA] hacked all below Pakistani domains.


[NOTE: All this information has been received on mail by ICA team. We have not changed any thing and publishing all contents as it is. Freehacking Team]
  1. http://pakstar.com.pk/ica.html
  2. http://khushab.gop.pk/ica.html
  3. http://axisgroup.com.pk/ica.html
  4. http://www.csms.com.pk/ica.html
  5. http://aghscru.org.pk/ica.html
  6. http://azizrice.com/ica.html
  7. http://asiansoft-tech.com/ica.html
  8. http://alternate-gear.com/ica.html
  9. http://adamsecurities.com.pk/ica.html
  10. http://babasarch.com/ica.html
  11. http://clavis-ac.com/ica.html
  12. http://flowmatic.net/ica.html
Warning Message from Indian Cyber Army

Don't forget we are having your database center kids. Now one more indian site...& your whole servers will be messed up.

Another Gift by Indishell Team

Full home directory and Datbase back up with legal license :P


Password of the file : indiancyberarmy

This is a compliment gift to p0rkjokers next turn is of your passport site we are gonna leech all your immigration department stop defacing indian sites.

The below message has been published on all Pakistani hacked website by Indian Cyber Army

H4CK3D BY: STRANGER & INDIAN CYBER ARMY :)>-

gr33tz to : -[SiLeNt p0is0n]- - Mr.xxxx - Atul dwivedi - Neo - !nject0r - th3.RDX

= = = [ Indian Cyber Army ] = = =

[lucky@dns3 private]$ ./lucky_private_2010.csh-3.00#

uid=0(root) gid=0(root) gruppi=663(lucky)

This is Just A Warning To all Script kiddies Stop Being no0bs and Defacing indian sites dont provoke us to do something

your security was good but we like breaking it

SeRvEr R0oTeD SuCesSfUlLy

Long Live INDIA | Jai Hind

E-mail: | |

Tuesday, July 27, 2010

PAKHAXORS Hacked Indian Website in response to Sonics Solutions

PAKHAXORS Hacked Indian Website http://www.epwrf.res.in/shak.htm in response to Sonics Solutions

Hack Website Using DNN [Dot Net Nuke] Exploit

Hack Website Using DNN [Dot Net Nuke] Exploit

Using google DORK try to find the vulnerable website.

inurl:"/portals/0"

You can also modify this google dork according to your need & requirement

I have found these 2 website vulnerable to this attack:

http://www.wittur.se/
http://www.bsd405.org/

n00bs can also try both of these websites for testing purpose.

Open the home page and check any image which is located in /portals/0/
Check the location of the image. It should be located in /portals/0/

For e.g. in case of http://www.wittur.se ..the image is located at location- http://www.wittur.se/Portals/0/SHM.jpg

Waaooo it means this website is vulnerable and we can change the front page pic. Now the current image name is SHM.jpg. Rename the new image as SHM.jpg which you want to upload as a proof of you owned the system.

Now here is the exploit

Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx

HOW TO RUN ?

Simply copy paste it as shown below:

www.site.com/Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx

You will see the portal where it will ask you to upload. Select the third option File ( A File On Your Site
After selecting the third option, replace the URL bar with below script

javascript:__doPostBack('ctlURL$cmdUpload','')

After running this JAVA script, you will see the option for Upload Selected File. Now select you image file which you have renamed as SHM.jpg & upload here. Go to main page and refresh...BINGGOOOOOOOOOOOO you have hacked the website.

Pakistani Website Sonics Solutions Hacked by -c00lt04d-

Pakistani Website Sonics Solutions http://sonicssolutions.pk/Hacked by -c00lt04d- | -c00lt04d- is Staff Leader at Indian Cyber Army Official Forum http://indishell.in/board

The below message has been posted by the HACKER

--Porkies Stop Funding terrorism or these attacks wont stop!!--

--Porkjokers Beware!!! Am coming to knock you down!!--

Punjabi Hackers Tamal Hacked Safe Securities Pakistani Website

Punjabi Hackers Tamal Hacked Safe Securities Pakistani Website http://safesecurities.com.pk/. Tamal email id is . His online name is Silent Demon

Now lets begin step by step...how to hack websites using SQL Injection Vulnerability. Note that this is for educational purpose and if anybody use this to hack any website, I promise not to prosecute. In many countries it is illegal to use this attack. Here I am not going to share the exact method I have followed.

DO YOU WANT TO LEARN WEBSITE HACKING?? Learn how to hack website. Contact us on


Here are the screen shots for all the pages where we got Admin access. We have not change or deleted any thing.



Punjabi Hackers Hacked Bellevue School Website

Bellevue School Website http://www.bsd405.org/ has been hacked by Punjabi Hackers



How to Hack with c99 Shell Script: Download c99 shell script

c99 shell script upload hacking php enabled server

c99 shell script in text format to upload on unsecured uploader and command entire file system and execute a hack.

The c99 php (Hypertext Preprocessor) shell script is an awesome piece of hacking script. The only limitation of it being that it needs an unsecured uploader in order to get it uploaded and then the execution part is a piece of cake.

This c99 shell allows an attacker to hijack the web server process, allowing the attacker to issue commands, force brute etc on the server as the account under which PHP is running. The interface of this shell script is very user friendly, something not so much associated with hackers. Hackers are known to write either ugly looking interface codes or none interface at all, but this piece of code is very different, it may be called something which as been done very aesthetically.

In order for the script to work, the die statement needs to be removed, a piece of note has been attached so as to facilitate its removal. The usual process code for a hacker while using a c99 shell script is as follows-

1)Find out sites with an uploader.
2)Test if the file uploader is secure or not by uploading files with a server executable extension.
3)If yes then upload the shell script.
4)Execute the code by browsing to the uploaded page.
5)A well laid GUI of the upload directory will show up with a lot of relevant details.
6)Look for the details if whether safe mode is on or off, if safe mode is off then the entire server can be controlled and if its on then on the directory in which c99 shell script is uploaded will be controlled.
7)Apart from being able to chmod, modify and delete files c99 also lets its user brute force the ftp but it requires an additional dictionary file which can run into hundreds of MBs.
8)c99 shell can be self removed so the hacking can go undetected by just manipulating some configuration file parameters for example the admob or adsense publisher code.

Unlike its sister r57 script c99 is very much light and much more effective on a php enabled server. before newbie uploaders upload, execute or run this script to their servers, they should make sure that they upload it and test it in a very private and secretive manner. Uploading and running this script is a very risky affair so be careful. This script is a lovely piece of code to understand the exact mechanism of various types of hacks.

The all available shell hacking scripts can be freely downloaded from the following link. This link included:

DOWNLOAD HERE

C99 Shell

R57 Shell

Xhacker Shell v2

ASPXspy2

dQ99shell

Cmd Asp Shell

Vb Hacker Shell

CWShellDumper

C100 Shell

Tryag Bypass

Cgi.Pl

User.Pl User list perl

Safe0ver Bypass Shell

Sosyete Safe Mode Bypass Shell

Liz0zim Bypass Shell

Kacak Fso Shell v1.0

Ekin0x Shell

Zehir4 Asp Shell

Sim Attacker Shell

MySQL Shell

Remview Shell

Ajax Command Shell

AntiChat Shell

Efso Asp Shell

DOWNLOAD HERE

Indishell Indian Hackers Group 0wn3d Domain management & plesk panel of pakistan

Indishell Indian Hackers Group 0wn3d Domain management & plesk panel of Pakistan. Warning Message for Pakistani Hackers.

The below information has been received by Indian Hackers Group INDISHELL. This groups is running an underground hacking forum http://indishell.in

Get me there. My ID is amarjitsingh1984


Ro0t access to there linux box :P


There pleskpanel


Domains in our Indian Hackers Hand


INDIAN CYBER ARMY 0wn3d Pakistani Server

A warning to porkistan

Dont Mess with the best or we will kick your ass like the rest

Stop Hacking Small sites or your Whole Cyber space will be down forever

Monday, July 26, 2010

Crack PDF Password | Download Advanced PDF Password Recovery Tool

Crack PDF Password | Download Advanced PDF Password Recovery Tool

Get access to password-protected PDF files quickly and efficiently! Instantly unlock restricted PDF documents by removing printing, editing and copying restrictions! Advanced PDF Password Recovery recovers or instantly removes passwords protecting or locking PDF documents created with all versions of Adobe Acrobat or any other PDF application.

Features and Benefits
* Supports all versions of Adobe Acrobat, including Acrobat 9
* Supports GPU acceleration
* Supports all third-party products producing PDF files
* Instantly unlocks PDF documents with printing, copying and editing restrictions
* Removes “owner” and “user” passwords
* Recovers passwords to open
* Supports 40-bit and 128-bit RC4 encryption as well as 128-bit and 256-bit AES encryption
* Patent-pending Thunder Tables® technology recovers 40-bit passwords in a matter of minutes
* Dictionary and brute-force attacks with user-defined masks and advanced templates
* Three editions to satisfy the most demanding and savvy customers
* Optionally removes JScript code, form fields and digital signatures
* Batch mode allows automatic processing of multiple files
* Highly optimized low-level code optimized for modern multi-core CPUs

DOWNLOAD 1

DOWNLOAD 2 - Mirror

DOWNLOAD 3 - Mirror

Pak Haxors Verified Sellers Online SCAM by Dj.h@xOr & varified

Pak Haxors Verified Sellers Online SCAM by Dj.h@xOr & varified from www.pakhaxors.com

[NOTE: All the below information has been received by Mr.Amrik from Malaysia. We have not edited or changed any information received. If anyone have any proof against this information, feel free to contact FREE HACKING Team]

I am amrik from malaysia. I have been spam by Dj.h@xOr and also varified () from www.pakhaxors.com......I here by officially inform u guys not to support those kids

Here is the proof:

THIS IS MY CONVERSATION WITH dj.h@xor. He is a Ripper....dun trust him

Show Recent Messages (F3)

Got an iPhone or iPod Touch?
Send free SMS messages and access your contacts on the go with Yahoo! Messenger for the iPhone. Get it now.

Dj.h@xor: listen u their
Se7en: Online transfers :
Western Union
Moneygram
ikobo
Se7en: he show me this from the website
Se7en: how bout the malaysia fund transfers?
Dj.h@xor: u want rreal western union transfer its not cheap
Dj.h@xor: i can do western union transfer i an show u proof
Dj.h@xor: if u need
Dj.h@xor: but remember not cheap
Se7en: how to claim from the guy LR i send
Se7en: cheapest?
Dj.h@xor: we discuss price later first let me show u proof
Dj.h@xor: i have made a trf to my client just today
Dj.h@xor: u want to tracj his trf ?
Se7en: yes
Dj.h@xor: ok open westernunion.com
Dj.h@xor: and track this info
Dj.h@xor: mtcn 9168565031
Dj.h@xor: sender first name : inger
Dj.h@xor: last name : poulsen
Dj.h@xor: track this then come to me
Se7en: Status : Available for pick up by receiver
Dj.h@xor: see
Dj.h@xor: now this is call real person
Se7en: how to claim my LR from that guy?
Dj.h@xor: u cant
Dj.h@xor: its not paypal
Dj.h@xor: u cant claim LR
Se7en: he has to pay back
Dj.h@xor: i dont think so
Dj.h@xor: lr has no option for refund
Dj.h@xor: like paypal
Se7en: i know
Se7en: my balance left USD: $24.75
Se7en: he took USD49.50
Dj.h@xor: haha
Dj.h@xor: 24 $ , i never do trf for 24
Se7en: u got to.....just this time
Se7en: smallest amount?
Dj.h@xor: no tnx
Se7en: what can we get for 24?
Dj.h@xor: i dont know its ur money do watever u want to do
Se7en: what do u sell for 24
Se7en: then the cheapest WU transfer cost?
Dj.h@xor: for quick transfer , u will get ur trf in 10 minutes $200
Se7en: my bank balance left RM134.00
Se7en: how bout bank transfer to malaysia bro
Dj.h@xor: yes
Dj.h@xor: but price is same
Dj.h@xor: how much 134 = to usd ?
Se7en: USD33.90
Dj.h@xor: oh no no thats v cheap
Se7en: maybe u can....coz the verify seller is from ur site
Se7en: once get i will do again
Se7en: mera bharosa karo bhai
Dj.h@xor: no barosa warosa thing on business dude
Dj.h@xor: he scam u this does not mean i will change my fees
Dj.h@xor: i show u proof
Dj.h@xor: i think thats enough
Se7en: i know....
Se7en: how to find that guy? u know him rite?
Dj.h@xor: no i know him online
Dj.h@xor: and listen 1 thing
Dj.h@xor: dont spread any news at PH
Dj.h@xor: thats u got scam
Dj.h@xor: this is fame of PH
Dj.h@xor: i will gegt this man
Dj.h@xor: and try to recover ur money
Se7en: i want my refund
Dj.h@xor: if u post any shit on PH
Se7en: i will coz i got all his logs
Dj.h@xor: i will ban u and u will not get any refund
Se7en: bro
Se7en: u got any fullz?
Dj.h@xor: no i dont sell credit cards
Dj.h@xor: i only use it for myslef
Dj.h@xor: remember wat i said
Dj.h@xor: i9 will be leaving for now for few hours
Se7en: ok
Dj.h@xor: btw im from saudi arabia basically for lahore
Se7en: okies.....then whom u recomend to buy fullz?
Se7en: anyone?
Dj.h@xor: i will come later
Dj.h@xor: and tell u
Dj.h@xor is typing...
Dj.h@xor: c ya now
Se7en: k bye
Dj.h@xor has signed out. (7/22/2010 11:31 PM)

FINDING OF THIS ONLINE FRAUD
  1. Check the spelling of VERIFIED on PAK HAXORS forum. Its VARFIED. Is this spelling mistake or what ?? I have not found VARFIED in any dictionary.
  2. From the above chat it is very clear that DJ.h@xor is very much aware about the scam which has been done. The scammer is the verified seller on PAKHAXORS. Still DJ.h@xor is asking for money rather then helping the victim. Where is the authenticity for PH here. Are they doing hacking ONLY FOR MONEY ?? Bullshit man. According to Dj.h@xor online scam doesn't mean that he will change his fees. Very nice.
  3. Dj.h@xor threatened to the victim that if he spread this ONLINE SCAM news, he will ban him from the community. May God bless you KIDS.
  4. In their RULES section, nothing has been mentioned regarding what these KID's will do in case of such online SCAM. Nowhere they have mentioned regarding it on the forum.

Gmail Hacking: How to Hack Gmail: Best Gmail Hacks

Gmail Hacking: Best Gmail Hacks: How to Hack Gmail

100 Great Gmail Hacks for Email Addicts

Readers, I have found this tutorial very useful got all GMAIL ADDICTS. If you’re a Gmail user, you know that it’s a powerful email tool, even if you’re just using it for basic functions. However, there are so many options and hacks that you can take advantage of to take your email to the next level that it can be worth your while to learn a little bit more about what Gmail is really capable of doing. Read on to learn about 100 ways to hack Gmail for the better. Hope you link this.

Newer Posts Older Posts Home