Uncategorized

WHAT IS FOOTPRINTING?

👣WHAT IS FOOTPRINTING?👣 

The systematic and methodical footprinting of an organization enables attackers to create  
a near complete profile of an organization’s security posture. Using a combination of  
tools and techniques coupled with a healthy dose of patience and mind-melding,  
attackers can take an unknown entity and reduce it to a specific range of domain names,  
network blocks, subnets, routers, and individual IP addresses of systems directly  
connected to the Internet, as well as many other details pertaining to its security posture.  
Although there are many types of footprinting techniques, they are primarily aimed at  
discovering information related to the following environments: Internet, intranet, remote  
access, and extranet. Table 1-1 lists these environments and the critical information an  
attacker will try to identify.
👣WHY IS FOOTPRINTING NECESSARY? 
Footprinting is necessary for one basic reason: it gives you a picture of what the hacker  
sees. And if you know what the hacker sees, you know what potential security exposures  
you have in your environment. And when you know what exposures you have, you  
know how to prevent exploitation. 
Hackers are very good at one thing: getting inside your head, and you don’t even know  
it. They are systematic and methodical in gathering all pieces of information related to  
the technologies used in your environment. Without a sound methodology for performing  
this type of reconnaissance yourself, you are likely to miss key pieces of information  
related to a specific technology or organization—but trust me, the hacker won’t. 
Be forewarned, however, footprinting is often the most arduous task of trying to  
determine the security posture of an entity; and it tends to be the most boring for freshly  
minted security professionals eager to cut their teeth on some test hacking. However,  
footprinting is one of the most important steps and it must be performed accurately and  
in a controlled fashion.
I will post on \”how to perform footprinting\” so stay tunned
Uncategorized

HOW TO GET HQ PROXIES FOR FREE!

HOW TO GET HQ PROXIES FOR FREE!

Hey guys
Exploit hacker is back with new unique tutorial 
2. Create an account or log in with a Google Account
3. Go to the sidebar and click on \”Proxy\”
4. Click on IP authentication
5. Copy and Paste your IP Address into the IP Authorization Box and Click Save Changes Button at the Bottom
6. Click on the Proxy tab again and then click on \”List\”
7. On the top there will be 3 settings, Proxy Country, Authentication Method, and Proxy list mode
8. Choose w/e Proxy Country you want but on Authentication Method make sure its put to IP Authentication and No-Gap Assignment for the Proxy List Mode
9. Click on Download Proxy List on the left of the Proxy List Mode Setting
10. Now you have HQ proxies that get ~1K CPM
ησтєѕ: ιƒ уσυ υѕє тнєѕє ση α νρѕ σя αησтнєя ¢σмρυтєя мαкє ѕυяє тнαт ιρ ιѕ ιη тнє ιρ αυтнєηтι¢αтιση ℓιѕт тσσ σя єℓѕє тнє ρяσχιєѕ ωιℓℓ ησт ωσяк
Uncategorized

Hidden Codes for Androids

Hidden Codes for Android
*#06#-IMEI number 
the
*#0*#-Enter the service menu 
*#*#4636#*#*-Phone information, usage statistics and battery 
*#*#34971539#*#*-Detailed camera information 
*#*#273282*255*663282*#*#*-Immediate backup of all media files 
*#*#197328640#*#*-Enable test mode for service 
*#*#232339#*#*-Wireless LAN tests 
*#*#0842#*#*-Backlight/vibration test 
*#*#2664#*#*-Test the touch screen 
*#*#1111#*#*-FTA software version (1234 in the same code will give PDA and Firmware version) 
*#12580*369#-Software and hardware info 
*#9090#-Diagnostic configuration
 
*#872564#-USB logging control 
*#9900#-System dump mode 
*#301279#-HSDPA/HSUPA Control Menu
*#7465625#-View phone lock status 
*#*#7780#*#*-Reset the/data partition to factory state 
*2767*3855#-Format device to factory state (will delete everything on the phone) 
##7764726-Hidden service
Uncategorized

Here is the complete list of Gmail keyboard shortcuts

Here is the complete list of Gmail keyboard shortcuts:

Compose and Chat
+ : Focus main window
: Focus latest chat or compose
+ . : Advance to next chat or compose
+ , : Advance to previous chat or compose
+ : Send
+ + c : Add cc recipients
+ + b : Add bcc recipients
+ + f : Access custom from
+ k : Insert a link
+ ; : Go to previous misspelled word
+ \’ : Go to next misspelled word
+ m : Open spelling suggestions
Formatting
+ + 5 : Previous font
+ + 6 : Next font
+ + – : Decrease text size
+ + + : Increase text size
+ b : Bold
+ i : Italics
+ u : Underline
+ + 7 : Numbered list
+ + 8 : Bulleted list
+ + 9 : Quote
+ [ : Indent less
+ ] : Indent more
+ + l : Align left
+ + e : Align center
+ + r : Align right
+ + , : Set right-to-left
+ + . : Set left-to-right
+ \\ : Remove formatting
Jumping
g then i : Go to Inbox
g then s : Go to Starred conversations
g then t : Go to Sent messages
g then d : Go to Drafts
g then a : Go to All mail
g then c : Go to Contacts
g then k : Go to Tasks
g then l : Go to Label
Threadlist selection
* then a : Select all conversations
* then n : Deselect all conversations
* then r : Select read conversations
* then u : Select unread conversations
* then s : Select starred conversations
* then t : Select unstarred conversations
Navigation
u : Back to threadlist
k / j : Newer/older conversation
o or : Open conversation; collapse/expand conversation
p / n : Read previous/next message
` : Go to next inbox section
~ : Go to previous inbox section
Application
c : Compose
d : Compose in a tab (new compose only)
/ : Search mail
q : Search chat contacts
. : Open \”more actions\” menu
v : Open \”move to\” menu
l : Open \”label as\” menu
? : Open keyboard shortcut help
Actions
, : Move focus to toolbar
x : Select conversation
s : Rotate superstar
y : Remove label
e : Archive
m : Mute conversation
! : Report as spam
# : Delete
r : Reply
+ r : Reply in a new window
a : Reply all
+ a : Reply all in a new window
f : Forward
+ f : Forward in a new window
+ n : Update conversation
] / [ :  Remove conversation from current view and go previous/next
} / { : Archive conversation and go previous/next
z : Undo last action
+ i : Mark as read
+ u : Mark as unread
_ : Mark unread from the selected message
+ or = : Mark as important
– : Mark as not important
+ t : Add conversation to Tasks
Uncategorized

What Is a Trojan?

What Is A Trojan? 

━━━━━━━━━━━━━
A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network.
A Trojan acts like a bona fide application or file to trick you. It seeks to deceive you into loading and executing the malware on your device. Once installed, a Trojan can perform the action it was designed for.
A Trojan is sometimes called a Trojan virus or a Trojan horse virus, but that’s a misnomer. Viruses can execute and replicate themselves. A Trojan cannot. A user has to execute Trojans. Even so, Trojan malware and Trojan virus are often used interchangeably.
Whether you prefer calling it Trojan malware or a Trojan virus, it’s smart to know how this infiltrator works and what you can do to keep your devices safe.
━━━━━━━━━━━━━
Uncategorized

HOW TO HACK WPA/WAP2 – WPS NETWORKS IN WINDOWS

HOW TO HACK WPA/WAP2 – WPS NETWORKS IN WINDOWS

LIMITATIONS:-
1] This Hack works on Wpa/Wpa2 – Wps Unlocked Networks only
2] Does not work on all Routers & all encryption\’s, so cannot hack all the wifi networks Available near you. At least this method can’t.
3] Not all Networks or routers can be hacked using this method
REQUIREMENTS:-
1] Laptop or USB wifi Adapter
2] Windows Operating System
3]  Wincap
4] JumStart
5] Dumpper
6] NetFrameWork 4.5
7] Wpa/Wpa2 – WPS Networks Available with at least 8% signal
LINK TO DOWNLOAD:-
(Note:- install above softwares one by one, even one of the Installation is wrong there will be many problems & errors in next process)
STEPS:-
1] After Downloading and Installing all the Software’s Open Dumper (No need of Installing Dumper, whenever you are interested in hacking, all you need to do is  open Dumpper )
2] Select your Network Adapter Now Click on “Scan”, There you can see all the available Wifi Networks
3] Now Move on to the “WPS” Tab
4] Select “All networks”
5] Now click on “Scan”
6] Select a Network That You Want Hack
7] Now Click On Start JumpStart
8] JumpStart Will Automatically Start The Process And Complete The Hack
9] Now The Hack is Completed, You are already connected to the network that you Hacked
10] Click on “Profiles” to see the Details and Passwords of the wifi Networks That You Hacked
11] Select  a Network and There you can find  the details and passwords of the networks that you hacked
12] There is another method to see the password of the network that you hacked
13] Right click on the Networks and select “Open Network and Sharing Center”
14] Now click on the “Connection: Network Name”
15] Then the Properties of the Connected Network Will Appear, Now select “Wireless Properties”
16] Now move to “Security” tab
17] Mark On “Show Characters” and the Password of the Wifi Network is Shown 
This is how a Wifi WPA/WPA2-WPS Network is hacked.
Uncategorized

Method To Get Free Facebook Followers

 Method to get Free Facebook followers 
1. Go to wefbee.com
2. Select auto friend request.
3. Then scroll down and click on the get token button.
4. Then login to your facebook account.
5. A token will be generated so copy paste the contents in the green box and paste it as you will be directed then submit.
6. You\’ll be directed to homepage where you will select auto friend request then tap on auto request hyperlink.
From there you will start receiving so many friend requests on your account but they will in turn be converted into followers.
Uncategorized

TERMUX BASIC PACKAGES BY RAYLESSBLOGGERS

TERMUX BASIC PACKAGES BY RAYLESSBLOGGERS
————————————————-
  pkg update -y
pkg upgrade -y
 pkg install python -y
pkg install python2 -y
 pkg install python2-dev -y
pkg install python3 -y
pkg install java -y
 pkg install fish -y
 pkg install ruby -y
pkg install help -y
pkg install git -y
pkg install host -y
pkg install php -y
 pkg install perl -y
pkg install nmap -y
 pkg install bash -y
pkg install clang -y
 pkg install nano -y
pkg install w3m -y
 pkg install havij -y
pkg install hydra -y
pkg install figlet -y
pkg install cowsay -y
pkg install curl -y
 pkg install tar -y
pkg install zip -y
pkg install unzip -y
pkg install tor -y
pkg install google -y
 pkg install sudo -y
 pkg install wget -y
pkg install wireshark -y
 pkg install wgetrc -y 
pkg install wcalc -y
pkg install bmon -y
pkg install vpn -y
pkg install unrar -y
 pkg install toilet -y
pkg install proot -y
pkg install net-tools -y
pkg install golang -y
pkg install chroot -y
termux-chroot -y
pkg install macchanger -y
pkg install openssl -y
pkg install cmatrix -y
pkg install openssh -y
 pkg install wireshark -y
termux-setup-storage -y
pkg install macchanger -y
apt update && apt upgrade -y
Uncategorized

How to Generate Proxy Using Android Phone / Termux

How to Generate Proxy Using Android Phone / Termux

Unlimited Proxy Generator Tool In Termux
Open Termux 
                        (Tap to copy Command)
$ apt update
$ apt install python2 
$ pkg install python2
[%] Download This Zip file And Save Your Download Folder and Open Termux [%]
$  cd /sdcard
$  cd Download       (Choose Your Download File Location)
$  unzip proxy-generator-master.zip
$  cd proxy-generator-master
$  pip2 install requests 
$  python2 proxy.py
Uncategorized

5 BEST WIFI HACKING TOOLS

5 BEST WIFI HACKING TOOLS
1. AirSnort
AirSnort is another popular tool for decrypting WEP encryption on a wi-fi 802.11b network. It is a free tool and comes with Linux and Windows platforms. This tool is no longer maintained, but it is still available to download from Sourceforge. AirSnort works by passively monitoring transmissions and computing encryption keys once it has enough packets received. This tool is simple to use. If you are interested, you can try this tool to crack WEP passwords.
 
2. Cain & Able
Cain & Able is a popular password cracking tool. This tool is developed to intercept network traffic and then discover passwords by bruteforcing the password using cryptanalysis attack methods. It can also recover wireless network keys by analyzing routing protocols. It you are trying to learn wireless security and password cracking, you should once try this tool.
 
3. Kismet
Kismet is the wi-fi 802.11 a/b/g/n layer2 wireless network sniffer and IDS. It works with any wi-fi card which supports rfmon mode. It passively collects packets to identify networks and detect hidden networks. It is built on client/server modular architecture. It is available for Linux, OSX, Windows and BSD platforms.
 
4. Airjack
Airjack is a Wi-Fi 802.11 packet injection tool. This wireless cracking tool is very useful in injecting forged packets and making a network down by denial of service attack. This tool can also be used for a man in the middle attack in the network.
 
5. WepAttack
WepAttack is an open source Linux tool for breaking 802.11 WEP keys. This tool performs an active dictionary attack by testing millions of words to find the working key. Only a working WLAN card is required to work with WepAttack.
Uncategorized

List Of Terms Used In The Field Of Hacking

List of terms used in the field of hacking.

1 Adware − Adware is software designed to force pre-chosen ads to display on your system.
2 Attack − An attack is an action that is done on a system to get its access and extract sensitive data.
3 Back door − A back door, or trap door, is a hidden entry to a computing device or software that bypasses security measures, such as logins and password protections.
4 Bot − A bot is a program that automates an action so that it can be done repeatedly at a much higher rate for a more sustained period than a human operator could do it. For example, sending HTTP, FTP or Telnet at a higher rate or calling script to create objects at a higher rate.
5 Botnet − A botnet, also known as zombie army, is a group of computers controlled without their owners’ knowledge. Botnets are used to send spam or make denial of service attacks.
6 Brute force attack − A brute force attack is an automated and the simplest kind of method to gain access to a system or website. It tries different combination of usernames and passwords, over and over again, until it gets in.
7 Buffer Overflow − Buffer Overflow is a flaw that occurs when more data is written to a block of memory, or buffer, than the buffer is allocated to hold.
8 Clone phishing − Clone phishing is the modification of an existing, legitimate email with a false link to trick the recipient into providing personal information.
9 Cracker − A cracker is one who modifies the software to access the features which are considered undesirable by the person cracking the software, especially copy protection features.
10 Denial of service attack (DoS) − A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet.
11 DDoS − Distributed denial of service attack.
12 Exploit Kit − An exploit kit is software system designed to run on web servers, with the purpose of identifying software vulnerabilities in client machines communicating with it and exploiting discovered vulnerabilities to upload and execute malicious code on the client.
13 Exploit − Exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to compromise the security of a computer or network system.
14 Firewall − A firewall is a filter designed to keep unwanted intruders outside a computer system or network while allowing safe communication between systems and users on the inside of the firewall.
15 Keystroke logging − Keystroke logging is the process of tracking the keys which are pressed on a computer (and which touchscreen points are used). It is simply the map of a computer/human interface. It is used by gray and black hat hackers to record login IDs and passwords. Keyloggers are usually secreted onto a device using a Trojan delivered by a phishing email.
16 Logic bomb − A virus secreted into a system that triggers a malicious action when certain conditions are met. The most common version is the time bomb.
17 Malware − Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.
18 Master Program − A master program is the program a black hat hacker uses to remotely transmit commands to infected zombie drones, normally to carry out Denial of Service attacks or spam attacks.
19 Phishing − Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking emails, in an attempt to gather personal and financial information from recipients.
20 Phreaker − Phreakers are considered the original computer hackers and they are those who break into the telephone network illegally, typically to make free longdistance phone calls or to tap phone lines.
Uncategorized

How to Install and Run Kali Linux on any Android Smartphone

How to Install and Run Kali Linux on any Android Smartphone

Steps To Install Kali Linux On Any Android:
1. First of all download and install Linux Deploy App in your android from the Google Play Store.
2. Now After downloading and installing it launch the app in your device and there tap on download button. 
3. Now there tap on Distribution option and change it to Kali Linux instead of Linux.
4. Now scroll up and click on the Install button at the top of  there.
5. Now wait for the download to complete time taken can be vary depending upon your internet speed.
6. Now download and install VNC Viewer App in your android from the Play Store.
7. Now launch the app and fill up the settings as displayed on the screenshot below. 
8. Now click on Connect button there.
9. Thats it you are done, Now Kali linux gets installed in your android and you can enjoy the dummy hacking environment in your android
Uncategorized

Different Type Of Hackers

Different Type Of Hackers 
━━━━━━━━━━━━━
 White Hat Hacker
━━━━━━━━━━━━━
First up, we have the perfect type of hacker to break the stereotype. The white hat hacker is a good guy, as ironic as it may sound. White Hackers, white hat hackers or ethical hackers are the people who test existing internet infrastructures to research loopholes in the system. They create algorithms and perform multiple methodologies to break into systems, only to strengthen them.
Think of this as a lockpick, who would work his way around locks, only to inform the owners of how to make the locks work better.
Famous white hat hackers have historically been pivotal in ensuring that large corporations maintain a strong network framework so that it is unbreakable against all other types of hacking. From being employees of the Government to being private consultants, white hackers help internet be a better and safer place.
 Black Hat Hacker
━━━━━━━━━━━━━
Simply put, these are the bad guys. Black hat hackers are responsible for all that is wrong with hacking. These guys break into systems purely with negative intentions. From stealing credit card information, to altering public databases, a black hat hacker looks to gain fame or monetary benefits from exploiting the loopholes in internet frameworks. Famous black hat hackers have notoriously robbed banks and financial institutions of millions of dollars, and invaluable private data.
 Grey Hat Hacker
━━━━━━━━━━━━━
A grey hat hacker usually has mixed intentions. As the color code implies, this hacker type does not have the good intentions of a white hat hacker, nor does he have the ill intentions of a black hacker. A grey hat would break into systems but never for his own benefit. Famous grey hat hackers have exploited systems only to make the information public, and to bring to limelight vast datasets of information that contains wrongdoings.
━━━━━━━━━━━━━
Uncategorized

Paypal Phone Vertification Bypass Method

Paypal Phone Vertification Bypass Method
1. Open Paypal In Normal Chrome And Incognito (Ctrl + Shift + N)
2. Put The Both Information In Chrome And Incognito (Put The Email And Pass)
3. Then Do This Fast , LOG IN Faster Both Then The Data Will
Encrypt So One Of The Chrome Or Incognito Will Get Log In And One Will Get Phone Vertification
Note :- You Have To Open Two Tabs One is Normal 2nd Incognito
Uncategorized

HOW TO GET .EDU E-MAIL 2020 | FAST & EASY | UNLIMITED E-MAILS

HOW TO GET .EDU E-MAIL 2020 | FAST & EASY | UNLIMITED E-MAILS 
1. (Not 100% necessary) Activate your VPN on the United States
2. Head over to http://apply.vccs.edu
3. Click “Sign up with email”
5. Randomize a United States Identity
6. Head over to https://temp-mail.org and generate an e-mail
7. On the edu apply, fill in the information given on the fake name & temp mail
8. After submitting, press “Continue” & the big red button “Apply Now”
9. Select any College, and then scroll all the way down to “Apply Now”
10. Fill it with the info provided on all pages. ( on the SSN,432-14-“xxxx”, replace the “x” with random numbers)
11. If you get an error about your address, just skip it
12. When you finally submit all the info take a printscreen and save it.
13. Hit “Go to my student account”
14. Make some security questions
15. Go to http://mail.email.vccs.edu and login
16. Done! You now have an edu mail..!
Uncategorized

Top Ways How Hackers Can Hack Facebook Accounts

Top Ways How Hackers Can Hack Facebook Accounts 

Note :-  This post is only for security purpose don\’t try any illigal activity and i\’m just shared these methods because protect our facebook account from these types of hacking attacks.
Mostly Hackers use these methods to hack facebook account 2017, So protect yourself from hackers. Must Read this post, and beware from hackers.
#1 Hack Facebook Account Password By Phishing
Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake log in page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim log in through the fake page the, the victims \”Email Address\” and \”Password\” is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.
#2 Hack Facebook Account Password By Keylogging
Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Keylogger is basically a small program which, once is installed on victim\’s computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.
#3 Stealer\’s
Almost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealer\’s are software\’s specially designed to capture the saved passwords stored in the victims Internet browser.
#4 Hack Facebook Account Password By Session Hijacking
Session Hijacking can be often very dangerous if you are accessing Facebook on a http (non secure) connection. In Session Hijacking attack, a hacker steals the victims browser cookie which is used to authenticate the user on a website, and use it to access the victims account. Session hijacking is widely used on LAN, and WiFi connections.
#5 Sidejacking With Firesheep
Sidejacking attack went common in late 2010, however it\’s still popular now a days. Firesheep is widely used to carry out sidejacking attacks. Firesheep only works when the attacker and victim is on the same WiFi network. A sidejacking attack is basically another name for http session hijacking, but it\’s more targeted towards WiFi users.
#6 Mobile Phone Hacking
Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are a lots of Mobile Spying software\’s used to monitor a Cellphone. The most popular Mobile Phone Spying software\’s are: Mobile Spy, and Spy Phone Gold.
#7 DNS Spoofing
If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.
#8 USB Hacking
If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser.
#9 Man In the Middle Attacks
If the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.
#10 Botnets
Botnets are not commonly used for hacking Facebook accounts, because of it\’s high setup costs. They are used to carry more advanced attacks. A Botnet is basically a collection of compromised computer.The infection process is same as the key logging, however a Botnet gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Botnets include Spyeye and Zeus.
Mostly hackers use these methods to hack facebook account password, We
Uncategorized

​​WHATSAPP HACKING PRIVATE METHOD

SURPRISE FOR YOU GUYS MOST DEMANDED TUTORIAL.

​​WHATSAPP HACK!NG PR!VET METHOD [DON’TSHARE
ɪɴ ᴛʜɪs ᴛᴜᴛᴏʀɪᴀʟ ᴡᴇ ᴡɪʟʟ sʜᴏᴡ ʏᴏᴜ ʜᴏᴡ ᴛᴏ ʜᴀᴄᴋ ᴡʜᴀᴛsᴀᴘᴘ ᴀᴄᴄᴏᴜɴᴛ ᴛʜʀᴏᴜɢʜ ᴍᴀᴄ sᴘᴏᴏғɪɴɢ ᴀᴛᴛᴀᴄᴋ. ғɪʀsᴛ ᴏғ ᴀʟʟ ᴛʜᴇ ʀᴇϙᴜɪʀᴇᴍᴇɴᴛs ᴏғ ᴛʜɪs ᴘʀᴏᴄᴇᴅᴜʀᴇ ᴀʀᴇ: 
⚠️ 1. ᴍᴏʙɪʟᴇ ᴘʜᴏɴᴇ ʀᴏᴏᴛᴇᴅ
⚠️ 2. ᴛᴀʀɢᴇᴛ\’s ᴘʜᴏɴᴇ ғᴏʀ 5 ᴍɪɴᴜᴛᴇs 
⚠️ 3. ʙᴜsʏʙᴏx ᴀɴᴅ ᴛᴇʀᴍɪɴᴀʟ ᴀᴘᴘ ɪɴsᴛᴀʟʟᴇᴅ ᴏɴ ʏᴏᴜʀ ᴀɴᴅʀᴏɪᴅ ᴅᴇᴠɪᴄᴇ 
⚠️ 4. ᴡɪғɪ sᴄᴀɴɴᴇʀ ( ɪғ ʏᴏᴜ ᴄᴀɴ\’ᴛ ʀᴇᴀᴄʜ ᴛʜᴇ ᴛᴀʀɢᴇᴛ\’s ᴘʜᴏɴᴇ ғᴏʀ ɢᴇᴛᴛɪɴɢ ʜɪs / ʜᴇʀ ᴍᴀᴄ ᴀᴅᴅʀᴇss ᴛʜʀᴏᴜɢʜ sᴇᴛᴛɪɴɢs ) ᴛᴜᴛᴏʀɪᴀL 
✨1. ᴜɴɪɴsᴛᴀʟʟ ᴡʜᴀᴛsᴀᴘᴘ ғʀᴏᴍ ʏᴏᴜʀ ᴘʜᴏɴᴇ ᴏʀ ᴅᴇᴠɪᴄᴇ. ʏᴏᴜ\’ʟʟ ɪɴsᴛᴀʟʟ ɪᴛ ᴀɢᴀɪɴ ᴀᴛ ᴛʜᴇ ᴇɴᴅ ᴏғ ᴛʜᴇ ᴍᴇᴛʜᴏᴅ, ʙᴜᴛ ʏᴏᴜ\’ʟʟ ɴᴇᴇᴅ ᴛᴏ ᴄᴏɴғɪɢᴜʀᴇ ɪᴛ ᴅɪғғᴇʀᴇɴᴛʟʏ, ᴀɴᴅ ᴛʜᴇ ᴇᴀsɪᴇsᴛ ᴡᴀʏ ᴛᴏ ᴍᴀᴋᴇ sᴜʀᴇ ʏᴏᴜ\’ʟʟ ʙᴇ ᴀʙʟᴇ ᴛᴏ ᴅᴏ ᴛʜᴀᴛ ᴄᴏʀʀᴇᴄᴛʟʏ ɪs ᴛᴏ ᴄᴏᴍᴘʟᴇᴛᴇʟʏ ᴜɴɪɴsᴛᴀʟʟ ɪᴛ ɴᴏᴡ. 
✨2. ᴏʙᴛᴀɪɴ ʏᴏᴜʀ ᴛᴀʀɢᴇᴛ\’s ᴘʜᴏɴᴇ. ʏᴏᴜ\’ʟʟ ɴᴇᴇᴅ ɪᴛ ғᴏʀ ᴛᴡᴏ ᴅɪғғᴇʀᴇɴᴛ sᴛᴇᴘs ᴛʜʀᴏᴜɢʜᴏᴜᴛ ᴛʜᴇ ᴘʀᴏᴄᴇss, ʙᴜᴛ ᴛʜɪs sʜᴏᴜʟᴅɴ\’ᴛ ᴛᴀᴋᴇ ᴛᴏᴏ ʟᴏɴɢ – ʏᴏᴜ sʜᴏᴜʟᴅ ʙᴇ ᴀʙʟᴇ ᴛᴏ ʀᴇᴛᴜʀɴ ɪᴛ ʙᴇғᴏʀᴇ ʏᴏᴜʀ ᴛᴀʀɢᴇᴛ sᴛᴀʀᴛs ᴛᴏ ᴍɪss ɪᴛ. 
✨ 3. ғɪɴᴅ ʏᴏᴜʀ ᴛᴀʀɢᴇᴛ\’s ᴘʜᴏɴᴇ\’s ᴍᴇᴅɪᴀ ᴀᴄᴄᴇss ᴄᴏɴᴛʀᴏʟ (ᴍᴀᴄ) ᴀᴅᴅʀᴇss. ᴀ ᴍᴀᴄ ᴀᴅᴅʀᴇss ɪs ᴀ ᴜɴɪϙᴜᴇ ɪᴅᴇɴᴛɪғɪᴇʀ ᴀssɪɢɴᴇᴅ ᴛᴏ ʏᴏᴜʀ ᴘʜᴏɴᴇ ᴏʀ ᴏᴛʜᴇʀ ᴅᴇᴠɪᴄᴇ ᴛʜᴀᴛ ᴇssᴇɴᴛɪᴀʟʟʏ sᴇʀᴠᴇs ᴀs ɪᴛs ᴏɴʟɪɴᴇ ɪᴅᴇɴᴛɪᴛʏ. ғɪɴᴅ ᴀɴᴅ ᴡʀɪᴛᴇ ᴅᴏᴡɴ ♧♧ʏᴏᴜʀ ᴛᴀʀɢᴇᴛ\’s ᴍᴀᴄ ᴀᴅᴅʀᴇss. ɪᴛ ᴛᴀᴋᴇs ᴛʜᴇ ғᴏʀᴍ ᴏғ sɪx ᴘᴀɪʀs ᴏғ ʟᴇᴛᴛᴇʀs ᴏʀ ɴᴜᴍʙᴇʀs, sᴇᴘᴀʀᴀᴛᴇᴅ ʙʏ ᴄᴏʟᴏɴs (01:23:45:67:89:ᴀʙ). ᴏɴ ᴀɴ ᴀɴᴅʀᴏɪᴅ, ғɪɴᴅ ᴛʜɪs ɪɴ sᴇᴛᴛɪɴɢs → ᴀʙᴏᴜᴛ ᴘʜᴏɴᴇ → sᴛᴀᴛᴜs → ᴡɪ-ғɪ ᴍᴀᴄ ᴀᴅᴅʀᴇss. ᴏɴ ᴀɴ ɪᴘʜᴏɴᴇ, ɢᴏ ᴛᴏ sᴇᴛᴛɪɴɢs → ɢᴇɴᴇʀᴀʟ → ᴀʙᴏᴜᴛ → ᴡɪ-ғɪ ᴀᴅᴅʀᴇss. ᴏɴ ᴀ ᴡɪɴᴅᴏᴡs ᴘʜᴏɴᴇ, ʟᴏᴏᴋ ɪɴ sᴇᴛᴛɪɴɢs → ᴀʙᴏᴜᴛ → ᴍᴏʀᴇ ɪɴғᴏ → ᴍᴀᴄ ᴀᴅᴅʀᴇss. ᴏɴ ᴀ ʙʟᴀᴄᴋʙᴇʀʀʏ, ɢᴏ ᴛᴏ ᴏᴘᴛɪᴏɴs → ᴅᴇᴠɪᴄᴇ → ᴅᴇᴠɪᴄᴇ ᴀɴᴅ sᴛᴀᴛᴜs ɪɴғᴏ → ᴡʟᴀɴ ᴍᴀᴄ.
✨ 4. ғɪɴᴅ ʏᴏᴜʀ ᴍᴀᴄ ᴀᴅᴅʀᴇss ᴜsɪɴɢ ᴛʜᴇ ɪɴsᴛʀᴜᴄᴛɪᴏɴs ᴀʙᴏᴠᴇ. ᴍᴀᴋᴇ sᴜʀᴇ ᴛᴏ sᴀᴠᴇ ɪᴛ sᴏᴍᴇᴡʜᴇʀᴇ sᴇᴄᴜʀᴇ, ᴀs ʏᴏᴜ\’ʟʟ ᴡᴀɴᴛ ᴛᴏ ᴄʜᴀɴɢᴇ ʏᴏᴜʀ ᴅᴇᴠɪᴄᴇ ʙᴀᴄᴋ ᴛᴏ ᴛʜᴀᴛ ᴀᴅᴅʀᴇss ᴏɴᴄᴇ ʏᴏᴜ\’ʀᴇ ᴅᴏɴᴇ. 
✨ 5. ᴄʜᴀɴɢᴇ (\”sᴘᴏᴏғ\”) ʏᴏᴜʀ ᴘʜᴏɴᴇ\’s ᴍᴀᴄ ᴀᴅᴅʀᴇss ᴛᴏ ᴛʜᴀᴛ ᴏғ ʏᴏᴜʀ ᴛᴀʀɢᴇᴛ. ᴛʜɪs ᴡɪʟʟ ᴀʟʟᴏᴡ ʏᴏᴜʀ ᴘʜᴏɴᴇ ᴛᴏ ᴘᴀss ᴀs ʏᴏᴜʀ ᴛᴀʀɢᴇᴛ\’s, ʟᴇᴛᴛɪɴɢ ʏᴏᴜ ᴄᴏɴᴠɪɴᴄᴇ ᴡʜᴀᴛsᴀᴘᴘ ᴛʜᴀᴛ ʏᴏᴜ ᴀʀᴇ ʏᴏᴜʀ ᴛᴀʀɢᴇᴛ ᴡʜᴇɴ ʏᴏᴜ ʟᴏɢ ɪɴ. ᴏɴ ᴀɴ ɪᴘʜᴏɴᴇ ᴏʀ ᴏᴛʜᴇʀ ᴅᴇᴠɪᴄᴇ, ɪɴsᴛᴀʟʟ ᴀ ᴍᴀᴄ sᴘᴏᴏғɪɴɢ ᴀᴘᴘ ʟɪᴋᴇ ᴍᴀᴄᴅᴀᴅᴅʏ x ᴏʀ ᴡɪғɪsᴘᴏᴏғ. ᴜsᴇ ᴛʜᴀᴛ ᴛᴏ ᴄʜᴀɴɢᴇ ʏᴏᴜʀ ᴍᴀᴄ ᴀᴅᴅʀᴇss. ᴏɴ ᴀɴᴅʀᴏɪᴅ, ɪɴsᴛᴀʟʟ ʙᴜsʏʙᴏx ᴀɴᴅ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ ᴇᴍᴜʟᴀᴛᴏʀ (ᴀᴘᴘs ᴀᴠᴀɪʟᴀʙʟᴇ ғᴏʀ ғʀᴇᴇ ᴏɴ ɢᴏᴏɢʟᴇ ᴘʟᴀʏ). ɪɴ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ, ᴛʏᴘᴇ \”ɪᴘ ʟɪɴᴋ sʜᴏᴡ\” ᴛᴏ sᴇᴇ ᴀ ʟɪsᴛ ᴏғ ɪɴᴛᴇʀғᴀᴄᴇs. ɪᴅᴇɴᴛɪғʏ ᴛʜᴇ ᴏɴᴇ ᴛʜᴀᴛ ʜᴀs ʏᴏᴜʀ ᴍᴀᴄ ᴀᴅᴅʀᴇss — ғᴏʀ ᴛʜɪs ᴇxᴀᴍᴘʟᴇ, ᴡᴇ\’ʟʟ ᴜsᴇ ᴛʜᴇ ᴇᴛʜ0 ɪɴᴛᴇʀғᴀᴄᴇ. ɪɴ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ ᴇᴍᴜʟᴀᴛᴏʀ, ᴇɴᴛᴇʀ \”ɪᴘ ʟɪɴᴋ sᴇᴛ ᴇᴛʜ0 ᴀᴅᴅʀᴇss xx:xx:xx:xx:xx:xx\” ᴀɴᴅ \”ɪᴘ ʟɪɴᴋ sᴇᴛ ᴇᴛʜ0 ʙʀᴏᴀᴅᴄᴀsᴛ xx:xx:xx:xx:xx:xx\”, ᴡʜᴇʀᴇ ᴇᴛʜ0 ɪs ᴛʜᴇ ɪɴᴛᴇʀғᴀᴄᴇ ʏᴏᴜ ɪᴅᴇɴᴛɪғɪᴇᴅ ᴀɴᴅ xx:xx:xx:xx:xx:xx ɪs ʏᴏᴜʀ ᴛᴀʀɢᴇᴛ\’s ᴍᴀᴄ ᴀᴅᴅʀᴇss. ᴛᴏ ᴄʜᴇᴄᴋ ᴛʜᴀᴛ ʏᴏᴜ\’ᴠᴇ sᴜᴄᴄᴇssғᴜʟʟʏ ᴄʜᴀɴɢᴇᴅ ʏᴏᴜʀ ᴍᴀᴄ ᴀᴅᴅʀᴇss, ᴇɴᴛᴇʀ \”ɪᴘ ʟɪɴᴋ sʜᴏᴡ ᴇᴛʜ0.\” 
✨ 6. ɪɴsᴛᴀʟʟ ᴀɴᴅ ᴄᴏɴғɪɢᴜʀᴇ ᴡʜᴀᴛsᴀᴘᴘ ᴏɴ ʏᴏᴜʀ ᴘʜᴏɴᴇ. ᴇɴᴛᴇʀ ʏᴏᴜʀ ᴛᴀʀɢᴇᴛ\’s ᴘʜᴏɴᴇ ɴᴜᴍʙᴇʀ ᴛᴏ sᴇᴛ ᴜᴘ ᴡʜᴀᴛsᴀᴘᴘ ʀᴀᴛʜᴇʀ ᴛʜᴀɴ ʏᴏᴜʀ ᴏᴡɴ. ᴛʜɪs ᴡɪʟʟ ᴀʟʟᴏᴡ ʏᴏᴜ ᴛᴏ ʀᴇᴄᴇɪᴠᴇ ᴛʜᴇɪʀ ᴍᴇssᴀɢᴇs ᴀɴᴅ sᴇɴᴅ ᴍᴇssᴀɢᴇs ғʀᴏᴍ ᴛʜᴇɪʀ ᴀᴄᴄᴏᴜɴᴛ. 
✨ 7. ɢᴇᴛ ᴛʜᴇ ᴄᴏɴғɪʀᴍᴀᴛɪᴏɴ ᴄᴏᴅᴇ ғʀᴏᴍ ʏᴏᴜʀ ᴛᴀʀɢᴇᴛ\’s ᴘʜᴏɴᴇ. ᴛʜɪs ᴄᴏᴅᴇ ᴡɪʟʟ ʙᴇ sᴇɴᴛ ᴛᴏ ᴛʜᴇɪʀ ᴘʜᴏɴᴇ ɴᴜᴍʙᴇʀ ᴀs ᴘᴀʀᴛ ᴏғ ᴛʜᴇ ᴡʜᴀᴛsᴀᴘᴘ ᴄᴏɴғɪɢᴜʀᴀᴛɪᴏɴ ᴘʀᴏᴄᴇss. ᴀᴄᴄᴇss ᴛʜᴇɪʀ ᴘʜᴏɴᴇ ᴏɴᴇ ʟᴀsᴛ ᴛɪᴍᴇ ᴛᴏ ɢᴇᴛ ᴛʜᴀᴛ ᴠᴇʀɪғɪᴄᴀᴛɪᴏɴ ᴄᴏᴅᴇ. ᴇɴᴛᴇʀ ɪᴛ ɪɴᴛᴏ ᴡʜᴀᴛsᴀᴘᴘ ᴏɴ ʏᴏᴜʀ ᴘʜᴏɴᴇ ᴡʜᴇɴ ᴘʀᴏᴍᴘᴛᴇᴅ, ᴀɴᴅ ʏᴏᴜ\’ʀᴇ ᴀʟʟ ʀᴇᴀᴅʏ ᴛᴏ ɢᴏ. ɪғ ʏᴏᴜ ᴅᴏɴ\’ᴛ ᴡᴀɴᴛ ʏᴏᴜʀ ᴛᴀʀɢᴇᴛ ᴛᴏ ғɪɴᴅ ᴏᴜᴛ ᴀʙᴏᴜᴛ ʏᴏᴜʀ sᴘᴏᴏғɪɴɢ, ᴍᴀᴋᴇ sᴜʀᴇ ᴛᴏ ᴅᴇʟᴇᴛᴇ ᴛʜᴇ ᴄᴏɴғɪʀᴍᴀᴛɪᴏɴ ᴄᴏᴅᴇ ғʀᴏᴍ ᴛʜᴇɪʀ ᴘʜᴏɴᴇ ʙᴇғᴏʀᴇ ᴛʜᴇʏ ᴄᴀɴ sᴇᴇ ɪᴛ.
 ✨ 8. ᴡʜᴇɴ ʏᴏᴜ ɴᴏ ʟᴏɴɢᴇʀ ɴᴇᴇᴅ ᴛᴏ ᴀᴄᴄᴇss ʏᴏᴜʀ ᴛᴀʀɢᴇᴛ\’s ᴡʜᴀᴛsᴀᴘᴘ ᴀᴄᴄᴏᴜɴᴛ, ᴄʜᴀɴɢᴇ ʏᴏᴜʀ ᴍᴀᴄ ᴀᴅᴅʀᴇss ʙᴀᴄᴋ ᴛᴏ ᴡʜᴀᴛ ɪᴛ ᴡᴀs. ʀᴇᴘᴇᴀᴛ ᴛʜᴇ ɪɴsᴛʀᴜᴄᴛɪᴏɴs ᴛᴏ ᴄʜᴀɴɢᴇ ɪᴛ, ʙᴜᴛ ᴛʜɪs ᴛɪᴍᴇ ᴄʜᴀɴɢᴇ ɪᴛ ᴛᴏ ʏᴏᴜʀ ᴏʀɪɢɪɴᴀʟ ᴀᴅᴅʀᴇss ʀᴀᴛʜᴇʀ ᴛʜᴀɴ ʏᴏᴜʀ ᴛᴀʀɢᴇᴛ\’s. ᴛʜɪs ᴡɪʟʟ ʀᴇsᴛᴏʀᴇ ʏᴏᴜʀ ᴘʜᴏɴᴇ ᴛᴏ ʜᴏᴡ ɪᴛ ᴡᴀs ᴏʀɪɢɪɴᴀʟʟʏ, ᴡʜɪᴄʜ ᴡɪʟʟ ᴇɴsᴜʀᴇ ᴛʜᴀᴛ ᴛʜᴇʀᴇ ᴀʀᴇ ɴᴏ ғᴜᴛᴜʀᴇ ᴘʀᴏʙʟᴇᴍs ᴡɪᴛʜ ɪɴᴛᴇʀɴᴇᴛ ᴜsᴀɢᴇ ᴏʀ ᴄᴏɴɴᴘᴘᴘᴇᴄᴛɪᴠɪᴛʏ. ️ɴʙ: ɪғ ʏᴏᴜ ᴄᴀɴ\’ᴛ ʀᴇᴀᴄʜ ᴛʜᴇ ᴛᴀʀɢᴇᴛ\’s ᴘʜᴏɴᴇ ᴛᴏ ɢᴇᴛ ᴍᴀᴄ ᴀᴅᴅʀᴇss ʏᴏᴜ ᴄᴀɴ ᴜsᴇ ᴀ ᴡɪғɪ sᴄᴀɴɴᴇʀ. ɪғ ʏᴏᴜ ᴄᴀɴ\’ᴛ ɢᴇᴛ ᴛʜᴇ ᴄᴏᴅᴇ ʙᴇᴄᴀᴜsᴇ ʏᴏᴜ ᴅᴏɴ\’ᴛ ʜᴀᴠᴇ ᴘʜʏsɪᴄᴀʟ ᴀᴄᴄᴇss ɪɴᴛᴏ ᴛʜᴇ ᴠɪᴄᴛɪᴍ\’s ᴘʜᴏɴᴇ ʏᴏᴜ ᴄᴀɴ ᴜsᴇ sᴏᴄɪᴀʟ ᴇɴɢɪɴᴇᴇʀɪɴɢ ᴀɴᴅ ɪғ ʏᴏᴜ ᴡᴀɴᴛ ғᴜʀᴛʜᴇʀ ʜᴇʟᴘ sᴇɴᴅ ᴜs ᴀ ᴘᴍ ᴋᴇᴇᴘ sᴜᴘᴘᴏʀᴛɪɴɢ.
Uncategorized

HOW TO CRACK ACCOUNTS – BARE BASICS | FOR NOOBS

 HOW TO CRACK ACCOUNTS – BARE BASICS | FOR NOOBS 
This is how to crack accounts for people who are literally noobs, meaning that you have no idea what cracking is and how it works. This would\’ve been something I wished I had when I started out cracking.
Basically what cracking is, it\’s taking combolists, and running them through a program to check if that info is valid. You usually want to use proxies so your IP doesn\’t get banned Combolists: It\’s a txt file full of emails and passwords, in the format email:pass Proxies: The \”gateway\” between you and the internet. Basically use this so your IP doesn\’t get banned. Checkers: These are the checkers you use to check the combolist. Steps of cracking: 1. Get a combolist 2. Get a checker for whatever account you want to crack 3. Get proxies 4. Load combolists and proxies into the checker 5. Press start Your checker should now start checking each email from different proxies to see if it\’s a valide combo for that service You use proxies since the company, let\’s say Disney again, will ban your IP for logging in too many times. The proxy makes it so it seems like your logging in from different locations each time. Beware cracking is ILLEGAL. But the risk is very low. Cracking is unethical. Anyway, have fun!
Uncategorized

Top Android Hacking Applications

Top Android Hacking  Applications
1. SpoofApp:- SpoofApp is a Caller ID Spoofing, Voice Changing and Call Recording mobile app for your iPhone, BlackBerry and Android phone. It’s a decent mobile app to help protect your privacy on the phone. However, it has been banned from the Play Store for allegedly being in conflict with The Truth in Caller ID Act of 2009.
2. Andosid:- The DOS tool for Android Phones allows security professionals to simulate a DOS attack (an http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones.
3. Faceniff:- Allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to. It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks.
4. Nmapper:- (Network Mapper) is a security scanner originally written by Gordon Lyon used to discover hosts and services on a computer network, thus creating a “map” of the network. To accomplish its goal, Nmapper sends specially crafted packets to the target host and then analyses the responses.
5. Anti-Android Network Toolkit:-zANTI is a comprehensive network diagnostics toolkit that enables complex audits and penetration tests at the push of a button. It provides cloud-based reporting that walks you through simple guidelines to ensure network safety.
6. SSHDroid:- SSHDroid is a SSH server implementation for Android. This application will let you connect to your device from a PC and execute commands (like “terminal” and “adb shell”) or edit files (through SFTP, WinSCP, Cyberduck, etc).
7. WiFi Analyser:- Turns your android phone into a Wi-Fi analyser. Shows the Wi-Fi channels around you. Helps you to find a less crowded channel for your wireless router.
8. Network Discovery:- Discover hosts and scan their ports in your Wifi network. A great tool for testing your network security.
9. ConnectBot:- ConnectBot is a powerful open-source Secure Shell (SSH) client. It can manage simultaneous SSH sessions, create secure tunnels, and copy/paste between other applications. This client allows you to connect to Secure Shell servers that typically run on UNIX-based servers.
10. dSploit:-Android network analysis and penetration suite offering the most complete and advanced professional toolkit to perform network security assesments on a mobile device.
11. Hackode:- The hacker’s Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cyber security professional to perform different tasks like reconnaissance, scanning performing exploits etc.
12.**Androrat**:- Remote Administration Tool for Android. Androrat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server.
13.**APKInspector**:- APKinspector is a powerful GUI tool for analysts to analyse the Android applications. The goal of this project is to aide analysts and reverse engineers to visualize compiled Android packages and their corresponding DEX code.
14.**DroidBox**:- DroidBox is developed to offer dynamic analysis of Android applications.
15.**Burp Suite**:- Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities.
16. Droid Sheep:- DroidSheep can be easily used by anybody who has an Android device and only the provider of the webm service can protect the users. So Anybody can test the security of his account by himself and can decide whether to keep on using the web service.
Uncategorized

The Certified Ethical Hacker (CEH)

The Certified Ethical Hacker (CEH) program is the most comprehensive ethical hacking course on the globe to help information security professionals grasp the fundamentals of ethical hacking. The course outcome helps you become a professional who systematically attempts to inspect network infrastructures with the consent of its owner to find security vulnerabilities which a malicious hacker could potentially exploit. The course helps you assess the security posture of an organization by identifying vulnerabilities in the network and system infrastructure to determine if unauthorized access is possible. 
COURSE MATERIAL 
1.PDFS
2. TOOLS
3.LAB MANUALS