Hack yahoo using fake login page

Fake login page

In this post I’ll show you to hack yahoo using fake login page to hack yahoo in simple steps.A Fake Login Page is a page that exactly resembles the original login page of sites like Yahoo,Gmail etc.However, these Fake login pages are created just for the purpose of stealing other’s passwords.

Here in this post I will give a procedure to create a fake login page of Yahoo.com.The same procedure may be followed to create the fake login page of Gmail and other sites.

Hack Gmail account using keylogger

The easiest way to hack gmail is by using a keylogger(Spy Software). It doesn’t matter whether or not you have physical access to the target computer. To use a keylogger it doesn’t need any technical knowledge. Anyone with a basic knowledge of computers can use keyloggers

1. Sniper Spy (Remote Install Supported)

Editors Rating: 8/10

SniperSpy is the industry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.
Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s!  This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!
Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel!
This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child
, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands!SniperSpy Features:
1. SniperSpy is remotely-deployable spy software
2. Invisibility Stealth Mode Option. Works in complete stealth mode. Undetectable!
3. Logs All Keystrokes
4. Records any Password (Email, Login, Instant Messenger etc.)
5. Remote Monitor Entire IM conversations
 so that you can spy on IM activities too
6. Captures a full-size jpg picture of the active window however often you wish
7. Real Time Screen Viewer
8. Remotely reboot or shutdown the PC or choose to logoff the current Windows user
9. Completely Bypasses any Firewall

For more information on this program and download details visit the following link

5 ways to Hack Email account passwords

Hack an email account

"How to hack email accounts passwords?" So many people have asked that question,and honestly its a dumb one,.There are many ways to hack an email account passwords but i am covering here 5 of them:

Make windows genuine in a minute

Make windows genuine
Make your Windows XP with Service Pack 2 geniune. Im not sure if this works on SP3.

This procedure described below will allow you to bypass the Microsoft Genuine Validation.
I hope this is the best way to make your copy of windows xp geniune.

How can your location be traced Via your IP

Ip gives it all
Most people wonder how do websites come to know of your location from IP.Now you too can find out.Forget users you can even sneak up on websites. Just enter IP/URL/mailid and vola all the details of are given.

This has some great tools that will help you. You can enter IP/URL/Domain name and much more.

Above is a pic of what it can do (It gives your location. who is your internet provider, how you are connected to him.
This software costs about 60$. What if you dont want to buy the software you can use the lite version. This give only how the data is sent., how are you connected yo him

What if you dont want to download any thing. then there are some online tools



visualware.com and more.

5 ways on How to block spams on gmail

What is SPAM?

Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. Most widely recognized form of spam is email spam.

While Gmail doesn't filter all spam messages that could reach your inbox, it still does a better job as compared to other webmails such as Yahoo Mail or Hotmail. Apart from consistent improvements being done on Gmail's filters, the utmost ingredient that contribute to the overall effectiveness is the use of community signals.


Recommended products by Rafayhackingarticles:

1.Remote pc spying softwares

2.Hacking and security books

3.IP Hiding Softwares



How to open two orkut account in one tab

Today i will show you a trick to open two orkut accounts in one tab ,This trick needs Mozilla Firefox 3 and this was requested by lots of readers,so on readers demand i am posting this trick. kindly show your feed back by commenting

Step 1:

First open Firfox and then login to Orkut.

Step 2:

After logging in Open a new Tab in Firefox and click on close button of the browser

Step 3

You will get a Dialogue box Click on SAVE

Step 4:

Then again open Firefox, you can see you are still logged in

Then On your Orkut home page, scroll down and at the bottom you will see go to orkut.com

Now you can see a new login screen has come
Login with your second account and Enjoy :)

What is a keylogger - Keylogger explained

Today, with the advent of a program called Keylogger it’s just a cakewalk to hack an account. It doesn’t matter whether or not you have physical access to the victim’s computer. Using a keylogger is the easiest way to hack an account. Any one with a basic knowledge of computer can use the keylogger and within few hours you can hack any account.

What is a keylogger?

A keylogger, sometimes called a keystroke logger, keylogger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer’s keyboard. Keylogger is the easiest way to hack an account if you have physical access to victim’s computer.

A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password


If you have physical access to the computer of the user that you are targeting, because it is a lot easier if you do. One option you have, that you will hear a lot if you ask this question, and anybody bothers to answer is to use a keylogger. A keylogger is an excellent option, and probably the easiest. There are a lot of keyloggers out there, ranging from hardware keyloggers, to software keyloggers. For this task, you won't need to buy a hardware keylogger, since the only advantage to a hardware one is that you can grab passwords that are given to access a certain local user on the operating system used. There are a lot of software keyloggers out there, and you can feel free to check out www.google.com to look at your options. I will go ahead and toss a couple of keyloggers out to try for those of you who seem allergic to search engines.

Once you have whatever keylogger you are going to use downloaded, just install it onto the computer you are wanting to monitor, and wait till next time they login to their email account. You will then have the password for the account. Another option you have if they use Outlook to access their email account, is to copy the *.dbx files for their Outlook account onto a floppy, and extract the emails at home (the dbx file stores the files stored in each Outlook folder on a given account, meaning the received and sent emails). When you are on the computer of the user you are targeting, look in

C:\Windows\ApplicationData\Identities\{ACblahblahblah}\Microsoft\ OutlookExpress\ and copy all the .dbx files onto a floppy. Then when you take the .dbx files back to your house, use DBXtract to extract the messages from these files. 

Which are the best keylogger now a days?

I have made a detailed post on this topic in my post Which spyware keylogger software to choose,You must prefer reading it

RAT:(Remote administration tool)

Another option you have if you have physical access is to execute a RAT (Remote Administration Tool, you may know these programs as trojans) server on the computer. Of course, you do not have to have physical access to go this route, but it helps. What you must understand is that these tools are known threats, and the popular ones are quickly detected by antivirus software, and thusly taken care of. Even ISPs block incoming/outgoing traffic from the most popular ports used by these programs.

What to do if your Google account gets hacked

What to do if your Google/gmail account is hacked?

It will be a nightmare for you if your google account gets hacked,Most of the people in these cases waste their money contacting the password recovery services wasting their money,I dont say they dont get back password,But you can do it by putting in some efforts

Download video from youtube with out software

Here is the easiest way to download any video from Youtube.

While playing the video on youtube.com, Copy its location from the address bar like www.youtube.com/watch?v=sasad7657dms2

then add the word ‘kick’ between www. and youtube.com/link…….

EXAMPLE: www.kickyoutube.com/watch?v=sasad7657dms2

That’s it, Download without any other software or going to any other site, as their are many but this method is the best one according to me. Enjoy :)

6 Ways How Hackers Can Hack Your Hotmail Passwords

Updated 2016: The best way to hack into a hotmail account is to compromise victim's computer and retrieve passwords, therefore we have released a book which explains secret techniques to hack into a hotmail account, so you can protect your account from being hacked.

Are you curious for "Hacking hotmail password" well then this post is just for you, Most people ask me to tell us the easiest way for hacking hotmail password,so here are some ways how hackers can hack your hotmail passwords so you can protect your self from these kinds of attacks

6 ways on How to hack orkut account

Most of people are curious to know on How to hack orkut account,due to rise in number of hackers,orkut security has became a challenging question for the security experts,my purpose of this post is not to teach you hacking but to make you aware of the hackers,Below are some of the methods written through which a hacker can hack an orkut account

How to protect your orkut account

I was asked by many people to tell me the way to protect your orkut account.PLese reply and show your feed backThis Simple Tutorial will Save you from Spam mails and Hacking Tricks used by Many hackers.
As you know you can hide your primary email address from non-friends but if by mistake you add a unknown person to your friend list, then he/she will be able to see your primary email address which you use to login. He can send dangerous emails (keyloggers etc.) and steal your Orkut account. There are two Methods to be safe:

Changing Primary Email:
Go To Edit Profle Page of your profile, then click on COntact tab and change your Primary Email address to some other id, which you don't use much. Your login id will remain same but your friends will see your other email id.

Using Fake EMail id:
It is the most effective way of hiding email id, but it requires a new account, If you have some larger communities and want safety, then follow this method:

 Create a new Orkut account, On the Sign Up page enter any id which does not exist like yourname@yourname.com, me@orkutaccount.com etc.
Then after entering other details, you will be redirected to your home page and with a message "Verify Your Email", Just igonore it and do as stated below
Now Go to google.com, you will see your fake id on the top-right corner yourname@yourname.com, You can see "My Account" Option there.
Go To "My Account Page" and create a gmail id from there. (You can see it under Try Some More)
Done! You have your new login id but your friends will still see your fake id :| Enjoy

The smile pockets a rattling controversy.



"Learn How to hack" is not a blog which promotes encourages and exite hackers,But its purpose is to aware people that what is going around. But in reality, our goal is to prevent hacking. We believe that unless you know how to hack (ethically), you cannot defend yourself from malicious hack attacks. Know Hacking but No Hacking!

Difference b/w ethical hacking and non Etihcal hacking:


The practice of breaking into computers without malicious intent, simply to find security hazards and report them to the people responsible.
The concept of "ethical hacking" is questionable because most people do notwant strangers trying to break into their computers, no matter how benign the motives. Malicious crackers almost always claim to be "ethical hackers" when caught.We do not allow strangers to attempt "ethical lockpicking" or "ethical burglary." Experiments to test the security of a system should only be done with the advance permission of the victim.


.They may use computers to attack systems for profit, for fun, or for political motivations or as a part of a social cause. Such penetration often involves modification and/or destruction of data, and is done without authorization and hence they should not be confused with ethical hackers.
They also may distribute computer viruses, Internet worms, and deliver spam through the use of botnets. The term may also refer to hackers who crack software to remove protection methods: copy prevention, trial/demo version, serial number, hardware key, date checks, CD check (NO-CD) or software annoyances like nag screens and adware.

Few articles (posts) on this site may contain the information related Hacking not the GUIDES of Hacking. They only provide information about the legal ways of retrieving the passwords. You shall not misuse the information to gain unauthorised access.

Some of the tricks provided by us may no longer work due to fixture in the bugs that enabled the exploits. We are not responsible for any direct or indirect damage caused due to the usage of the hacks provided on this site.

Warning:Hacking is a crime and we are not responsible for the way you use it



Hacking tools

Hacking tools:
A hacking tool is a program designed to assist with hacking, or a legitimate utility that can also be used for hacking. Examples include Nmap, Nessus Remote Security Scanner, John the Ripper, SuperScan, p0f, and Winzapper. Chocolate has also been designated as among the most potent hacking tools, due to its potential exploitation in social engineering attacks. Occasionally, common software such as ActiveX is exploited as a hacking tool as well.

Here is the list of some great hacking tools
Nmap is distributed with source code under the terms of the GNU General Public License and is a utility for network exploration or security auditing. Hackers have misused this program and administrators use it to find vulnerabilities.

Hidden object Locator

With this tool you can easily find hidden NDS objects in your tree. This download consist of two files an NLM file and a text with instructions.

Folder lock:Folder lockis a file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents This can even protect files on USB flash drives, memory sticks and other media.

Super Win Spy
WinSpy is a program designed to find out what has been done on your computer. You find out web sites visited, images, text, movies and files opened/saved or other details.


This is a daemon which logs the various IP packets sent to a a computer. It also displays information on the incoming packets and which can be logged and which need not.

scanlogd - a port scan detection toolscanlogd is a port scan detection tool that can help the IDS developer to deal with intrusion. This is an open source tool distributed under GNU lisence


Rafayhackingarticles is one of the very few popular Hacking/Internet security sites,Rafayhackingarticles reviews the top popular softwares and security services to bring forth the best softwares available.

Rafayhackingarticles ranks well for keywords related to Hacking,keylogger,security etc.As a result it represents a unique opportunity for those wanting to give their product or service the chance of being sneezed quickly throughout the blogosphere in a viral manner.

Why should you advertise on Rafayhackingarticles?

Rafayhackingarticles  is growing rapidly has now built its own reputation on web. It has high quality loyal readership and subscriber base which are increasing by leaps and bounds.

Rafayhackingarticles.blogspot.com has currently following stats:

My Popularity (by popuri.us)

Gets 100,000+ unique visits per month
Gets 230,000+ unique page views per month
14000+ RSS Readers
Alexa Rank – Click here
Google PR - 4

Advertising options and Rates

We offer the following modes of advertising

  1. Text Links (25$/Month)
  2. 125 x 125 Banner Ads (70$/Month)
  3. 468 x 60 Banner Ads (90$/Month)

Sponsored Reviews:

The blog accepts sponsored reviews at a rate of $60 per review. Sponsored reviews receive at least 5 days on the Front page. The gives your review maximum exposure to Rafay Hacking Articles readers.
Email Marketing
we have around 3000+ readers in our email list we can send your newsletter at the rate of 15$ per email

Sponsored Tweets

we have 8000+ followers in our Twitter account we charge 5$ per sponsored tweet.

If you are interested in advertising kindly contact me here



Rafay Baloch is the founder and CEO of RHA InfoSec, He has been into security research for more than 6 years now, He core area of expertise include Network Security and Web Application Penetration Testing, and author of "Ethical hacking and penetration testing guide". He is specialiseds in finding security vulnerabilities in Web application and frameworks and browsers, bypassing web application firewalls, HTML 5 attack vectors and breaking filters of modern web-browsers.

He has helped securing lots of organization and has done hundreds of responsible disclosures. he is best known for finding a remote code execution vulnerability inside PayPal for which he was awarded 10,000$ and also was offered a job by PayPal, Rafay is an active participant is bug bounty programs and is listed in large number of hall of fames including Google, Facebook Microsoft, Twitter, Dropbox etc.


Following are some of my publications:

 Modern Day Web Application Firewall Bypass

HTML5 Modern Day Attack And Defence Vectors

Ethical Hacking And Penetration Testing Guide


Hall Of Fames

Google Hall Of Fame


Microsoft Security Researchers Award Microsoft 

http://technet.microsoft.com/en-us/security/cc308575.aspx (August) http://technet.microsoft.com/en-us/security/cc308589.aspx (October) http://technet.microsoft.com/en-us/security/cc308589.aspx (November)

Ebay Responsible Disclosure Page 

Ebay Reported an XSS in Ebay, bypassed their security filters to make the vulnerability work: http://pages.ebay.com/securitycenter/ResearchersAcknowledgement.html

Adobe Security Acknowledgments 

“Adobe would like to thank the following individuals and organizations for reporting a security vulnerability or vulnerabilities in an Adobe online service, and for working with Adobe to help protect our customers.”


Acknowledged By RedHat And Twitter Found a Non-Persistent XSS: 

https://access.redhat.com/knowledge/articles/66234 Twitter WhiteHat: https://twitter.com/about/security

Apple's Responsible Disclosure Page: 


Dropbox Hall Of Fame (Reported Oauth CSRF): 


Zynga Whitehat (Got listed for reporting an XSS and a sqli) http://company.zynga.com/security/whitehats

Constant Contact Responsible Disclosures Page: 


OwnCloud And Tuneti Hall-of-Fame: 

http://owncloud.org/security/hall-of-fame/ Tuneti Hall-of-Fame:

Acquia's Reponsible Disclosure Page:


ifixit Responsible Disclosure Page:


Github Responsible Disclosure Page: 


Nokia Simens Hall Of Fame: 


37Signals Security Fame: 


Mahara Responsible Dislcosures List: 


SoundCloud Responsible Disclosure List:

Reported few Self-XSS and finally a CSRF to get listed: 

http://help.soundcloud.com/customer/portal/articles/439715-responsible-disclosure Gallery Bounties


EngineYard HallOfFame: 


Kaneva Hall Of Fame: 


Twilio Responsible Disclosure:


Get Harmony Responsible Disclosure: 


Gitlab Vulnerability Acknowledgements: 


Netfix Responsbile Disclosure: 


Nokia HallOf Fame:


Baracuda Labs Hall Of Fame


LastPass Security Hall Of Fame 

 Reported a Stored Cross Site Scripting (XSS) vulnerability under their Core products: https://lastpass.com/support_security.php

Acknowledgment By Eset Nod32 Antivirus Company:

Acknowledged By Avira

Acknowledgement By MEDIAFIRE

Acknowledgement By LAVASOFT

Acknowledged By National Bank Of Pakistan

Paypal's Job Offer

Internet Magazine


An Interview With EHN:


A detailed interview with Infinityloopers: 




Inside NewsPapers

Tribune NewsPaper: 



 “This was a basic-level attack,” said Rafay Baloch, a professional white hat who recently bagged $10,000 in Paypal’s bug bounty programme after exposing a critical vulnerability in the website. However, he said it is believed across many online forums that PKNIC is also vulnerable to SQL injection – the most powerful cyber attack, according to Open Web Application Security Project (OWASP). OWASP is the world’s largest organisation in terms of web application security and penetration testing. Through SQL injection, the hacker can extract the entire database from the target website, Baloch said.  

Brecorder News


ISLAMABAD: Rafay Baloch, an independent security researcher from Karachi, has been rewarded with $5,000 for reporting a remote command execution bug in the PayPal's website. According to details, the PayPal had announced that this reward initiative for those researchers who would report about the existence of a bug and its subsequent remote command execution, Technology Times Reported. 

Times Of India: 


In SoftpediaNews Several Times











Mentions in Other Popular Blogs:






http://www.soldierx.com/hdb/Rafay-Baloch http://www.mybloggertricks.com/2012/12/mohammad-chose-blogger-i-chose-hacking.html 




Featured Inside PaulDomCOM


"Pretty neat how you get offered a job if you can find bugs in someone's application. This is a slippery slope, some may get a job, others may get an orange jumpsuit and a cell mate named "bubba", but hey if it's worth the risk to you, go for it. This person is still in college, which is impressive. Less than impressive is just how many flaws are in Paypal. You would think that someone like Paypal would pay close attention to security, but it seems they do not. This makes me want to give up on security entirely, until I remember that I get paid to find vulnerabilities..."

TV Shows

Show On Kay2tv 

Social Networks

You can connect with me mostly on:

Contact Me

If you have a specific question you'd like answered, or simply want to get in touch, you can contact me via the form below, However I receive large volume of email on daily basis to its really difficult for us to respond to every request.

Update: Some of my readers are having issues with the contact form below, If the contact form does not work for you, Kindly refer the following direct link - http://www.emailmeform.com/builder/form/252295


Thank You

You must confirm your email address before An Introduction To Keylogger, RATS And Malware Book(see below) can send you his FREE weekly newsletter and  An Introduction To Keylogger, RATS And Malware Book .

 Go check your email and confirm your subscription RIGHT NOW! Look for an email from the address: rafay@mrcracker.com with the subject line: “Please confirm your newsletter subscription“.

Within that email, there should be a link you need to click to confirm that it is your email. Although it usually arrives instantly, sometimes it may take a couple minutes to arrive in your inbox. I look forward to sending you great content and I guarantee that you will never receive any spam whatsoever.
Rafay Baloch is an Independent security researcher, Internet marketer, Entrepreneur and a SEO consultant, He is the founder of RHA blog and multiple other blogs. Rafay got famous after finding a Remote Code Execution bug inside PayPal for which PayPal awarded him a sum of 10,000$ Read More..

Join In!

RHA © 2013. All Rights Reserved.