www.livetvd2.blogspot.com: How to Crack Internet Download Manager

Wednesday 13 May 2015

How to Crack Internet Download Manager

How to Crack Internet Download Manager
How to Crack Internet Download Manager (IDM) 






[Image: 5.jpg]

Hello Friends, today i am going to explain how to hack or crack Internet Download Manager (IDM) manually. IDM is the best Internet download manager available on internet but its not free and its cracked or patched versions contains viruses. Using this hack you can register the Internet Download Manager (IDM) for free using you own credentials i.e register on your Name and email ID. I am explaining the manual hacking method because most of my users said that patch and keygen contain viruses.


Now suppose you have updated your IDM (Internet Download Manager) and if you are using cracked or patched version, after updating IDM, it shows an error message that you have registered IDM using fake serial key. And after that IDM exits and hence it doesn't download anything.
This hack also works for trail IDM that means download a trail IDM from there site and register the professional i.e. full version of IDM with your credentials for free using my hack.

Let's start the tutorial, How to hack or crack IDM manually.

Steps Involved:

Step 1: Download the IDM trial or If you already have IDM installed Update it by going to Help---}} then to check for Updates.
 If you don't wanna update your version, Just click on Registration.
Step2: When you click on registration, Now a new dialog appears that is asking for Name, Last Name, Email Address and Serial Key.
Step3: Now Enter you name, last name, email address and in field of Serial Key enter any of the following Keys:
RLDGN-OV9WU-5W589-6VZH1
HUDWE-UO689-6D27B-YM28M
UK3DV-E0MNW-MLQYX-GENA1
398ND-QNAGY-CMMZU-ZPI39
GZLJY-X50S3-0S20D-NFRF9
W3J5U-8U66N-D0B9M-54SLM
EC0Q6-QN7UH-5S3JB-YZMEK
UVQW0-X54FE-QW35Q-SNZF5
FJJTJ-J0FLF-QCVBK-A287M
And click on ok to register.
Step4: Now after you click ok, it will show an error message that you have registered IDM using fake serial key and IDM will exit. Now here the hack starts.
Step5: Now Go to START --}} Then go to RUN  and type the following text and click enter:
notepad %windir%\system32\drivers\etc\hosts
For Windows 7 users, due to security reasons you will not be able to save hosts file.
The trick is below:
First of all go to C:/ drive then go to Windows Folder and then go to System32 folder and then go to Drivers folder and then go to Etc Folder, in the Etc folder you will see thehosts file.
Now right click on hosts file and go to its properties, then go to security tab and then select your admin account, just below u will see an edit button (in front of change permissions), Now give the user full control and write and read rights and then click on applyand then click on Ok, now u will be able to edit the hosts file and save changes in it.Step6: Now a notepad file appears something like this as shown below:



[Image: 555.JPG]

Now copy the below lines of code and add to hosts file as shown above:
127.0.0.1    tonec.com
127.0.0.1    http://www.tonec.com
127.0.0.1    registeridm.com
127.0.0.1    http://www.registeridm.com
127.0.0.1    secure.registeridm.com
127.0.0.1    internetdownloadmanager.com
127.0.0.1    http://www.internetdownloadmanager.com
127.0.0.1    secure.internetdownloadmanager.com
127.0.0.1    mirror.internetdownloadmanager.com
127.0.0.1    mirror2.internetdownloadmanager.com
After adding these piece of code, save the notepad file. And exit from there.
Now start your Internet download manager, and now you IDM has been converted to full version and specially when you update next time, your registration will not expire. That means it will remain full version for life time and you can update it without any problem.
Here is my proof of Successfully Hacking IDM:
[Image: 55.JPG]


INTERNET DOWNLOAD MANAGER (IDM) V 6.23 BUILD 9 + CRACK


Download Categories
Internet Download Manager can be used to organize downloads automatically using defined download categories.

Dynamic Segmentation
Dynamic Segmentation and Performance.

What's new in version 6.23 Build 9

(Released: Mar 26, 2015)

Fixed compatibility problems of Google Chrome extension with Kaspersky Internet Security

Instructions:
1.Unpack and install
2.Run universal web crack and crack
3.Wait till finished
4.Done.

                  Dowanload link










ProRAT(Hacking Trick)


ProRAT(Hacking Trick)



To show you an example of a malicious program, I will use a well known Windows Trojan, ProRat using a Rat tool you can hack any email account in world facebook, yahoo,gmail,..etc.
 [Image: HAMID.gif]
1. Download ProRat. Once it is downloaded right click on the folder and choose to extract it. antivirus wil detect it as trojan but it is a false positive detection.
2. Open up the program. You should see the following:
[Image: 3.JPG]

[/url]3. Next we will create the actual Trojan file. Click on Create and choose Create ProRat Server. 


4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options. 

[Image: 4.JPG]

5. Click on the General Settings button to continue. Here we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.
[Image: 5.JPG]
6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. In the example I will use an ordinary text document. 
[Image: 6.JPG]
[Image: 7.JPG]
7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I will stick with the default because it has icon support, but exe’s looks suspicious so it would be smart to change it. 
[Image: 8.JPG]
8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document. 


[Image: 9.JPG]




9. Finally click on Create Server to, you guessed it, create the server file. Below is what my server file looks like.
[Image: 10.JPG]


10. A hacker would probably rename it to something like “Funny Joke” and send it as an attachment to some people. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it. 
11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next. 
12. I’m going to run the server on my own computer to show you what would happen. Once I run it the trojan will be installed onto my computer in the background. The hacker would then get a message telling him that I was infected. He would then connect to my computer by typing in my IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to my computer and have full control over it. 


[Image: 11.JPG]


13. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all my computer files, he can shut down my pc, get all the saved passwords off my computer, send a message to my computer, format my whole hard drive, take a screen shot of my computer, and so much more. Below I’ll show you a few examples 


[Image: 12.JPG]


14. The image below shows the message I would get on my screen if the hacker chose to message me. 


[Image: 13.JPG]


15. Below is an image of my task bar after the hacker clicks on Hide Start Button. 


[Image: 14.JPG]


16. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.
[Image: 15.JPG]


As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.

No comments:

Post a Comment