I’ve always been fascinated by the movies where a geek inserts the Pendrive into PC to log in, something like NSA mainframe style. This can also be a method to keep your confidential information confidential when you’re away from the keyboard. So learn how to Lock And Unlock Computer With Pendrive here in HACKAGON.

Lock And Unlock Computer With Pendrive Hackagon

If you prevent access to your computer with just a password, you are missing out on an alternate and more secure way to lock down your computer.

Steps To Lock And Unlock Computer With Pendrive:

STEP 1: Insert your Pendrive into your system and wait for it to be recognized.

STEP 2: Go to Start >> Control Panel >> Administrative Tools >> Computer Management >> Disk Management Or directly type diskmgmt.msc in Run.

disk management hackagon

STEP 3: Then Right-click the partition whose name you want to change (click in the white area just below the word “Volume”) and Select “Change Drive Letter and Paths…

pendrive management hackagon
From here you can re-assign the drive letter it was given to “A” (Drive letter of Pendrive must be “A”).

STEP 4: Start >> Run >> syskey.

syskey hackagon

Click on “OK

syskey window hackagon

Syskey launched: Click “Update

Startup Key Hackagon

Choose “Store Startup Key on Floppy Disk” and Click “OK

save startup key hackagon

You’ll be prompted to enter your diskette. Make sure your Pendrive is inserted and writable. Restart and have fun. Don’t lose yours Pendrive. And, to revert this, you can run syskey again and choose to store it locally instead of “On a floppy disk”.

Enjoy the trick and Stay Secure. Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still face any kind of problem.

Hackers hack information or passwords in many ways not only in online but also in the offline mode. So to Hack Password Using USB Drive HACKAGON derived a small trick for stealing information or passwords from your Friend’s/Victim’s computer using USB Drive.

Hack Password Using USB Drive HACKAGON

Windows have the capability to store most of the passwords which are used on a daily basis by internet users, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Wireless Keys, Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE, Chrome and Firefox.

There are many tools for recovering these passwords from their stored locations. Using these tools and a USB drive you can create your own rootkit to hack password from your friends/college computer.

Steps to Hack Password Using USB Drive

  1. Download our file by just clicking on “HACKAGON USB Hacking.zip“.
  2. Extract the file you downloaded.
  3. Copy all the extracted files to your USB Drive.
  4. Remove and Re-Insert your USB Drive.
  5. If your PC autoruns the USB Drive then click on the option “Perform a Virus Scan” but in case if it doesn’t go to autorun mode because of your PC settings, then just go to My Computer –> Open your USB Drive and manually click on “HACKAGON.bat” file.
  6. Now it will go in action and performs the task.
  7. At the execution time if you find any popups then just hit on YES.
  8. You are done with all the process.
  9. Now, you’ll get some text files generated in your USB Drive, if you open them you will see usernames and passwords waiting for you.

This trick will work only if Victim stores his password in windows or if he opted for remembering the passwords.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still face any kind of problem.

Everybody is so much familiar with facebook and also about its huge amount of data storage. Facebook is one of the most widely used social networking sites, with more than 750 million users, as a reason if which it has become the number one target of hackers. So, HACKAGON will show the Best ways to Hack Facebook so that the readers of HACKAGON will stay aware from hackers and protect their facebook account from getting hacked.

Best ways to Hack Facebook Hackagon

So, know the top 10 methods of How Hackers Can Hack Facebook Account Password:

1# Phishing:

Phishing is the most popular assault vector utilized for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks, a hacker creates a fake login page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim logs in through the fake page the, the victims credentials like “Email Address” and “Password” is stored into a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.

To make it simple, let’s say that facebook phishing is a way to make and create fake facebook website according to the real website for negative purposes, such as stealing credentials, data, etc.

2# Keylogging:

A keylogger is a suspicious program that record your keystrokes, Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Keylogger is basically a small program which, once installed on victim’s computer, will record everything victim types on his/her computer. The logs are then sent back to the attacker by either FTP or directly to hackers email address. Some advanced keylogger’s are also there which can even take the screenshot of the victim’s desktop.

3# Stealers:

Almost 80% percent of facebook users uses stored password in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealers are software specially designed to capture the saved passwords stored in the victim’s Internet browser.

4# Session Hijacking & Cookie Stealing:

Session Hijacking & Cookie Stealing can be exceptionally perilous if you are accessing Facebook on an HTTP (nonsecure) connection. In Session Hijacking attack, a hacker steals the victim’s browser cookie which is used to authenticate the user on a website and use it to access the victims account. Session hijacking is widely used on LAN and WiFi connections.

The cookie which facebook uses to authenticate its users is called “Datr”, If an attacker can get hold of your authentication cookies, All he needs to do is to inject those cookies in his browser and he will gain access to your account. This is how a facebook authentication cookie looks like:
Cookie: datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc;

An attacker can use a variety of methods in order to steal your facebook authentication cookies depending upon the network he is on, If an attacker is on a hub based network he would just sniff traffic with any packet sniffer and gain access to victims account or If an attacker is on a Switch based network he would use an ARP Poisoning request to capture authentication cookies, If an attacker is on a wireless network he just needs to use a simple tool called Firesheep in order to capture authentication cookie and gain access to victims account.

5# Sidejacking:

Sidejacking attack is basically another name for HTTP session hijacking, but it’s more targeted towards WiFi users. It went common in late 2010, however, it’s still popular nowadays.

Sidejacking Attack Involves two Major Steps:

  • Capturing packets (Session Cookie): There are a wide variety of tools available that can Sniff packets containing “session cookies“. Use any packet sniffer such as Wireshark to sniff the packets between the target IP and the host. These tools can capture packets such as POST or GET requests used by Web browsers to send and receive data from the HOST. But we are mainly interested in grabbing the cookies, so carefully take out the cookie information from the sniffed Packets. Popular packet Sniffers: WireShark, Ethereal, etc.
  • Using Captured Session Cookie: Once you have the cookie information, the next task is to use this information to get access to victims user account. Using Sniffed Cookie you can actually log into your victims account even without knowing his/her password. To do this, you will require browser plugin that can manage and edit cookies. For firefox Browser, you can use Cookie Manager+ or Edit Cookies to do this task. Chrome users can checkout: Edit This Cookie or Cookie Manager.

To simplify this Task, Mr.Eric Butler a software engineer introduced a firefox extension called Firesheep. It is widely used to carry out sidejacking attacks but it only works when the attacker and victim are on the same WiFi network.

6# Mobile Phone Hacking:

Besides PC/Laptops, Billions of Facebook users access Facebook through their Smartphones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. There are a bunch of Mobile Spying software’s used to monitor a Cellphone. The most popular Mobile Phone Spying software’s are:

  • Mobile Spy
  • Spy Phone Gold.

7# DNS Spoofing:

In DNS Spoofing attack if both, the victim and attacker are on the same network then an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.

Basically, DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) resolver’s cache, causing the name server to return an incorrect IP address, diverting traffic to the attacker’s computer (or any other computer).

8# USB Hacking:

In USB Hacking attacks, if an attacker has physical access to your computer, he could just insert a programmed USB with a function to automatically extract saved passwords in the Internet browser.

For USB Hacking attack you need two things:

  • A USB Drive devoted to this.
  • The programs and files with the capability of consequently concentrating the spared passwords.

9# Man In the Middle Attack:

In Man In The Middle Attack, if the victim and attacker are on the same LAN and on a switch based network then a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.

Basically, In cryptography and computer security, A Man In The Middle Attack (often abbreviated to MITM, MitM, MIM, MiM or MITMA) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

10# Botnet:

Botnets are not commonly used for hacking Facebook accounts, because of it’s high setup costs. They are used to carry more advanced attacks. A Botnet is basically a collection of compromised computer. The infection process is same as the key logging, however, a Botnet gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Botnets include Spyeye and Zeus.

Basically, A botnet is a collection of compromised computers often referred to as “zombies” infected with malware that allows an attacker to control them.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still have any query or update related to this.