Hacker group Anonymous have declared war against ISIS after the attacks in Paris on Friday night.

Posting a video on YouTube, the group said it would use its knowledge to “unite humanity” and warned the terrorists to “expect us”.

Behind their signature mask, a spokesperson speaking in French said: “Anonymous from all over the world will hunt you down.

“You should know that we will find you and we will not let you go.

“We will launch the biggest operation ever against you.

click to check out Video :-ANONYMOUS WAR WITH ISIS



Trojan Horse | RAT | Configure and Use | Tutorial- Part 2 – BY HACKER DARKSTAR


Just go through the Part 1 which includes the basics of  TrojanClick here. This tutorial is about configuring and using a trojan. There are many trojans available on internet for free. Some popular ones are Beast, Pro Rat, Netbus , Back Orifice, Girlfriend, Sub 7. I will be using Pro Rat in this tutorial.


1. Prorat- Click here to download Trojan Prorat.
2. Hostname  –  Your IP address would probably be dynamic that it keeps changing everytime you disconnect and reconnect. You need a host name which always automatically keep pointing to your changing IP. Follow these steps -:

1. Log On to and register for an account.
2. Go to Hosts/Redirects -> Add Host and choose any free available hostname. Do not change any other option and simply click on Create Host.

3. Downloading and install their DNS update client available here Run it and enter your credentials. Update your host name and save it.

4. Lets check whether your IP has been associate with chosen host name or not. Go to command prompt and type ‘ping yourhostname’ (without quotes) , hopefully it should reply with your IP address.

Tutorial for configuring Trojan.

1. Open prorat.exe that you have downloaded.
2. Click on Create  and then Create ProRat Server

 3.  Enter your host name in the ProRat Notification field as shown. Uncheck all other options.

4. Click on general settings Tab and have a look at server port,password, victim name. Remember these things.Check out and configure other options as per your need. You can bind server.exe with any genuine file, change its icon etc.

5. Finally click on create  server and now its ready to be sent to victim.  Once victim installs it, it would automatically disable antivirus/firewall.

Modes of sending-: 
You must be thinking of sending this server.exe to victim through an email as an attachment but unfortunately you cant do so. The good option is  to upload it on any uploading site like and give downloading link to victim.

What after victim has run the server part ?

1.Click on ProConnective Tab and start listening to connections. Allow firewall if it asks you to open a port.
2.You will start listening to connections, I mean you will get a notification as shown when victim would be online.

Note: If you know victim is online and still its not listening to any connections. Trace victim’s IP,enter in IP field and hit connect. But its gonna work only if he is not behind any network and directly connected to internet. If you dont know how to trace IP, mention in comments.

What after successful connection ?

After you have managed to connect to victim’s machine. There are numberless interesting things to do. I leave this part on you.  Have Fun.

How to make it undetectable from antivirus ?
Though there isn’t any hard and fast way to make it fully undetectable from all antiviruses. The real way to do it is modify the source code of open source trojans available. Its very challenging job. There are many crypters which claim to make it undetectable but unfortunately hardly one out every hundred works. I would try to write next article on the same.

Contermeasure against Trojans –
The obvious coutermeasure against trojans is that do not accept downloading links blindly. Keep your antivirus up to date.

Detecting and removing Trojan –
Though trojan once installed is very hard to remove . It would hide itself from the Task Manager .Install Process Explorer and it would hopefully show you all process running including trojan. Kill the process and remove it. One good thing is to carefully check the open ports and services running through ‘netstat’ command. Anyways , the best option is to reinstall the windows.

Feel free to ask  the queries in comments 🙂

Trojan Horse (Basics) Part 1- BY HACKER DARKSTAR


Have you watched movie Troy ? okay lets leave . Have your wallpaper ever changed automatically ? Have the programs ever started without your initiation ? Have the browser opened unexpected websites automatically ? Simply have you ever felt that someone else is controlling your computer ? NO ?

Congrats, you probably haven’t been a victim of trojan yet :).
A trojan horse is a remote administration tool(RAT). This is some thing extremely dangerous.  A trojan gives the full control of victim’s PC to the attacker. 
 A trojan has two parts . One is client part (Control Panel) and other is server part (meant to be sent to victim).
The basic methodology of using a trojan is as follows:-
1. Attacker creates an executable file of size in kbs. This  is  server part of trojan and mostly called as server.exe

2.Attacker might hide this server.exe behind any genuine file like a song or image. Attacker gives this file to victim and victim is supposed to double click on it.
3.As victim run that server part , a port on victim’s computer gets opened and attacker can control his PC sitting remotely in any part of the world through the control panel(client part). Attacker can do anything with victim’s computer remotely that victim himself can do on his computer.
Note: Now I am assuming that you know a little bit about IP addresses that is lan/internal/private and wan/external/public IP.
Two different methods of working of Trojan.
1. Direct Connection : In this method, after the server part has been installed on victim’s machine, the attacker enters the public IP address assigned to victim’s computer for making a connection to it. But limitations of direct connection is that public IP address is most probably dynamic and gets changed everytime one disconnects and reconnects. So attacker needs to find out IP address of victim each time.Moreover the incoming connection like this is usually restricted by firewall.
The main limitation of direct connection is that you can not access the victim who is behind a router or a network beacuse victim’s machine is not assigned public/external/wan IP. It is only assigned private/internal/lan IP which is useless or meaningless for computers outside that network.The wan IP belongs to his router.

It doesnt matter how attacker is connected to internet. Attacker can be connected to internet any of three means.

Victim is behind a router in this case. (havent inserted the picture of victim behind a network, imagine that )

2. Reverse Connection: In this method, attacker enters his own IP address in server part while configuring it .So when the server part is installed on victim’s computer, it automatically makes connection with client part that is attacker. Also the firewall in victim’s machine would not restrict to outgoing connections. Problem in this case is same that attacker’s IP is also dynamic. But this can be over come easily. Attacker actually enters a domain name in server part which always points to his dynamic IP.

Reverse connection can bypass a router or a network.

You might be confused at this point. Kindly mention your queries/doubts in comments.




A really bad year for the world’s second-largest email service provider, Yahoo Mail! The companyannounced today, ‘we identified a coordinated effort to gain unauthorized access to Yahoo Mail accounts’, user names and passwords of its email customers have been stolen and are used to access multiple accounts.

Yahoo did not say how many accounts have been affected, and neither they are sure about the source of the leaked users’ credentials. It appears to have come from a third party database being compromised, and not an infiltration of Yahoo’s own servers.

“We have no evidence that they were obtained directly from Yahoo’s systems. Our ongoing investigation shows that malicious computer software used the list of usernames and passwords to access Yahoo Mail accounts. The information sought in the attack seems to be names and email addresses from the affected accounts’ most recent sent emails.”


For now, Yahoo is taking proactive actions to protect their affected users, “We are resetting passwords on impacted accounts and we are using second sign-in verification to allow users to re-secure their accounts. Impacted users will be prompted (if not, already) to change their password and may receive an email notification or an SMS text if they have added a mobile number to their account.”

People frequently use the same passwords on multiple accounts, so possibly hackers are brute-forcing Yahoo accounts with the user credentials stolen from other data breaches.

Yahoo users can prevent account hijacks by using a strong and unique password. You can use ‘Random strong password generator’ feature of DuckDuckGo search engine to get a unique & strong password.

Users are also recommended to enable two-factor authentication, which requires a code texted to the legitimate user’s mobile phone whenever a login attempt is made from a new computer.

Yahoo! was hacked in July 2012, with attackers stealing 450,000 email addresses and passwords from a Yahoo! contributor network

Google Nexus 6 getting ready to roar :-BY HACKER DARKSTAR

Google Nexus series is one of the most popular series of smartphones. Every year, Google adds a new smartphone member into the Nexus series. You must know, Google Nexus series not limited to just smartphones. But the base of the series is of course Nexus smartphone. Google has recently launched its 5th Generation smartphone the LG Nexus 5 and now expectations of people and the next generation technology is forcing people to imagine the next avatar of nexus series the Google Nexus 6 smartphone.

The Evolution:

Nexus 6

The history of Nexus series smartphone is pretty interesting. It started with HTC Nexus One in Jan 2010, then in Dec 2010 Samsung Nexus S, and then in Nov 2011 the Samsung Galaxy Nexus appeared. Later on, in 2012 LG Nexus 4 appeared which broke all the records in terms of sales and price to performance ratio. And the 2013 version is miles ahead then the previous history. Google revealed the LG Nexus 5 on the 31st October and since then the smartphone is selling like hot cakes. Google & LG has defined the standard of performance and specifications with the launch of Nexus 5. However, it is not all the best smartphone of the market but if we compare the price then, yes Nexus 5 is best. Since the Nexus 4, the count of fans of Nexus series reached to uncountable. If people knows, Google will reveal the next Nexus after 4 months and already market has pretty good smartphone manufactured by Sony, Apple, HTC or Samsung then also people will wait for the Nexus smartphone to come out. Yes, I belong to the same fan list. However, now the rumors and leaks for the next Google Nexus 6 smartphone would take the performance to the imaginary end. Yes, 16 nm scale manufactured chipsets are getting ready and with the octa-core processors power the performance would be unbeatable. This upcoming hardware would appear in 2014 for sure. Already many of the manufactures have announced such hardware that they might reveal at Mobile world congress in Feb 2014.

  • HTC Nexus One – Jan 2010
  • Samsung Nexus S – Dec 2010
  • Samsung Galaxy Nexus – Nov 2011
  • LG Nexus 4 – Nov 2012
  • LG Nexus 5 – Nov 2013
  • Google Nexus 6 – August 2014?

Nexus 6 release date

Since the launch of Nexus 4 and Nexus 5 in the early November of the year, now people have set the next Nexus 6 release date to be either late October 2014. But none can actually confirm you the release date of Nexus 6.

Nexus 6

But there is good news for Google smartphones fans that there is a probability and chances that Google may schedule the Nexus 6 release date in the second quarter of 2014, instead of 3rd quarter. This can be judge by the present smartphone market and the demands of people. The nexus series is affordable solution for those, who want to buy high-end smartphone at low or appropriate prices. And actually Nexus 5 is one of the best high-end smartphone in terms of design, performance, construction and handling. What else you need, it is the complete solution for every possible need of you in terms of smartphone. But we fans of technology and in the greediness of something new, we demand something better before time. Well, it happens sometimes only. Let’s cross our fingers and whisper in the ears of Google that we want, Google Nexus 6 should be released in the second quarter of 2014.

On Feb 27, Google’s Sundar Pichai confirmed the news that the new Nexus phone will not be launched during first half of the year, but he didn’t give any further indication of the actual launch date. Previously, Google has released Nexus 4 and Nexus 5 in late 2012 and 2013 respectively. So, that makes quite a strong case that Google Nexus 6 will be launched also in later part of 2014. Sit tight and relax and we’ll keep you all updated on the release date of Google Nexus 6.

Nexus 6 Display – curved, 3d or flexible?

If you have observed in the Nexus series smartphone, Google launch the Nexus smartphone in the end of the year and with all the high end specifications that are currently the trend or the things that would be just a new trend. Google maintains the equilibrium for the trend and demand. We don’t mean, it wait throughout the year and picks the positive high end specifications, mix them and create a beast. The originality of Nexus smartphone is always an impressive factor. However, to stand in the market, Google has to pick such specifications. Haters can pick any reason to criticize.

Nexus 6

 We can easily find few smartphone Geek that hate the nexus 5. But the reality is judged by the mass. If we talk about the future generation Google Nexus 6 smartphone, then it would of course match the trend of the time. Already Samsung and LG have taken the initiative to bring the curved display smartphone and the little success of the curved display smartphone has already defined its future and interest of people. The present chances are negligible that we would see curved display Nexus 6. But who knows, if Google has not even decided yet. They are busy in selling nexus 5, just kidding.

Just a month ago, a Chinese manufacturer has released world’s first 2K resolution display smartphone and the results and interest of people is pretty impressive and Samsung is also going to launch a such smartphone very soon. Now, you can judge the right trend. Better rendering capability, new color scheme, high end resolution is the demand of people and manufactures will of course take this to next level. 2K resolutions (Ultra High Definition) smartphone display could be normal in 2014 and Google would not lack in the race. Google is itself a winner and it will win for sure.  Soon, we will see the concept Nexus 6 images created by fans and designers. Also, there are rumors Galaxy Note 4 would come up with 2K / 4K resolution display.

Google Nexus 6 specifications

  • True octa-core, 2.4Ghz+ processor
  • At least 4GB RAM (the present trend is already reached to 3GB RAM)
  • 20MP ultra low light sensitivity camera sensor (expected)
  • 5 inches 2K UHD resolution display
  • 3100 mAh battery
  • Finger print and other security sensor
  • Health, atmosphere and thermo sensor
  • 64GB and 128GB memory versions

None of the manufacturer can complete the all the expectations of a smartphone geek. A geek can even demand for 8GB RAM in a smartphone. There are already few blogs that are not actually claiming but revealed in the rumors that Google Nexus 6 would support the 6GB RAM. I think they don’t mean, Nexus 6 so Ram also 6GB. Well, 6GB RAM is not sensible. Even 4GB RAM is more than enough for a smartphone but we can’t easily predict the hardware of smartphone after few months from now.

The new technology has given birth to the new smartphone era, which is continuously changing and evolving. The Nexus 6 design could be completely different from the present design. But Nexus 5 is the best-designed Nexus smartphone till to this date. And big brother, Nexus 6 might follow the same path and there is the maximum probability that manufactures of Nexus 6 would be LG only.

The Completion

At present not much information is available regarding the Google Nexus 6 release date, specifications, features and price. But the story will not end here. One of the internal leaks has revealed, Nexus 6 could be the final smartphone of the Google Nexus series. Because, what would be called the 2015th Nexus? Nexus 7? Well, already this name is occupied by tablet Google Nexus 7. However, positivity will never die inside the smartphone fans, we know Google will launch it with another name including nexus.

Google LG Nexus 6

Lets wait and expect something bigger from the Google this time. Don’t forget to like us on Facebook, twitter and share on G+ too. Your social signals are the fuel for our blog. It will always motivate us that you have liked the content and your comments are most welcome too.

Cheers, we would always bring you the latest update on Nexus 6, don’t forget to subscribe and our updates would directly reach to your mailbox. Happy Nexus!

Expected Best Price: Rs. 40,000(Indian currency)

Expected Best Price: $600(us dollar)

How to jailbreak your iPhone or iPad running iOS 7.0.4 with evasi0n 7 :-BY HACKER DARK STAR

How to jailbreak your iPhone or iPad running iOS 7.0.4 with evasi0n 7

evasi0n 7 has recently been updated with many fixes to both the jailbreak itself and to Cydia, which solve a lot of the concerns that kept us from recommending it until now. If you’ve been waiting patiently to jailbreak iOS 7.0.4, we can walk you through the entire process from start to finish. Here’s everything you need to know!

evasi0n 7 compatibility

The evasi0n 7 version 1.0.4 jailbreak is compatible with all iPhone, iPad, and iPod touch models running iOS 7.0 thru iOS 7.0.4 including the iPhone 5s, iPad mini with Retina display, iPhone 5, and any other device capable of running iOS 7.

Back up your iPhone or iPad

As always, make sure you backup your iPhone or iPad before attempting to jailbreak. Also, make sure you have updated to iOS 7.0.4 via iTunes and not over-the-air. This is mainly because OTA updates have been known to cause issues with the jailbreak process itself, so be sure you restore or update via iTunes before continuing.

How to jailbreak iOS 7.0.4 with evasi0n 7 version 1.0.4

  1. Back up your iPhone or iPad. Always do this before attempting to jailbreak.
  2. Download the evasi0n jailbreak tool: Download for MacDownload for PC
  3. Plug your iPhone or iPad into your computer.
  4. Launch evasi0n on your Mac or PC. If you’re on a Mac running Mountain Lion or Mavericks, you may have to right click the evasi0n jailbreak tool and clickOpen and confirm you’d like to open it.
  5. Click Jailbreak and then wait.
  6. After a few seconds, you’ll see a message asking you to unlock your iPhone or iPad and tap on the evasi0n7 icon. Do that now.
  7. You may be asked to unlock your device one more time if you have a passcode.
  8. evasi0n should now give you a message that your device was successfully jailbroken and the process is done. Just click Exit on your computer.
  9. Your device may reboot a few more times in order to complete the process and that’s it! You should now have Cydia on your iPhone or iPad once more.

Once the jailbreak is complete, you’ll want to pop into Cydia in order to update it. the filesystem will automatically update on its own but there may be other updates you need to install. Other than that, you’re good to go!

Have you jailbroken iOS 7 using evasi0n yet? Let us know what your favorite tweaks are in the comments as well as whether or not you’ve run into any issues so far!

trick For Hacking Open/Public/Security Cameras Using Google:-BY HACKER DARK STAR


I found this trick for hacking Open/public/security cameras using google on internet while I was browsing the internet. There are many security cameras which are open or not secured, used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. And mostly these security cameras are from different countries. All you have to do is use the following search query in Google. Type in Google search box exactly as follows and hit enter


Click on any of the search results (Mostly Top 5 ) and you will gain access to the live camera.
See in the image below:-

Thus you have hacked Security Cameras using Google.Don’t forget share this with your friends!!!!