Posts

Showing posts from March, 2016

Use Whatspp without Phone Number

Image
How to Use WhatsApp Without Phone Number or SIM Imagine being able to use WhatsApp without phone number or SIM card. In this post you will be learning two tried and tested methods of using this extremely popular messaging system on your Android tablet, iPad, PC and even your mobile phone that does not have a SIM card. Use WhatsApp Without Phone Number or SIM As mentioned above, we have tested two different methods of using WhatsApp without phone number or SIM card and you can try both these methods and use the one that is most convenient to you. Before we move to any of the two methods, you will need to go through the following prerequisites for using WhatsApp without phone number and SIM card. ...Download WhatsApp to your tablet, phone or PC if you already haven’t. In case you have already installed WhatsApp to your device, check whether or not you have verified WhatsApp yet. If you have already verified WhatsApp, then delete your current number from What...

SQL Injection for website

Image
SQL Injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution to dump the database contents to the attacker). SQL injection must exploit a security vulnerability in an application’s software, for example, when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database. So, Let’s Learn How To Deface Websites Using SQL Injection. SQL injection attacks allow attackers to spoof identity, tamper with existing data, cause repudiation issues such as voiding transactions or changing balances, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database serve...

Latest hack wifi through system 2016

HOW TO HACK WIFI USING A LAPTOP...!! (1 ) Comview. (2) Aircrack ng 1.0 (for windows) Step 1 : Download n install both software, wat u need now is to capture packets usin Comview for WiFi, packets r data dat is been sent back n forth frm d owners pc n d wifi adapter. Step 2 : Play comview, it'll 1st scan all d channels dat r available. Step 3 : Click capture once the desired wifi is found. Step 4 : Save all d data packets in d dump format, once u have enough data packets. Step 5 : Now open up d aircrack-ng gui.exe, for d aircrack menu. Step 6 : Open d folder wer u hav saved all ur packets n launch d aircrack ng gui. if u fail, it means dat u stil dont hav enough packets.. so capture more. Step 7 : Just wait for d password to be decrypted. And use the details to login n enjoy internet. Download links : (1 ) Comview for wifi : http://www.tamos.com/download/main/ca.php (2) Aircrack ng 1.0 (for windows) - http://www.tamos.com/download/main/ca.ph

Download Top 10 ‪#‎ANDROID‬ ‪#‎HACKING‬ apps

Download Top 10 ‪#‎ ANDROID‬ ‪#‎ HACKING‬ and ‪#‎ PENETRATING‬ apps 1. ‪#‎ WiFiKill‬ -----> WiFi Kill is one of the best app for disable other user wifi connection from your android mobile. You just need to download this amazing android app in your phone and you can easily kick off other user from connected wifi . Make sure your phone is rooted ex: if ur connected to ur clg wifi ..... just kill all the other phones wifi here is the download link :- http://www.mediafire.com/downl…/wycg4qyx4168euz/WiFiKill.apk 2. ‪#‎ WiFiInspect‬ -------> WiFi inspect android app scan your wifi networks for vulnerability. You can see other user ip address from this android app. Basically this android app scan other ip address, mac address and device name. here is the download link :- http://www.mediafire.com/dow…/w9zf3p8g1v5wyaq/WiFinspect.apk 3. ‪#‎ ZAnti‬ Penetration Testing Android Hacking Toolkit -------> This is one of favourite tools for hacking networks and run...

hacking dictionary

1# DDoS: DDoS (Distributed Denial of Service) is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack. 2# VPS: A virtual private server (VPS) is a virtual machine sold as a service by an Internet hosting service. A VPS runs its own copy of an operating system, and customers have superuser-level access to that operating system instance, so they can install almost any software that runs on that OS. 3# SE: Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. 4# HTTP: The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Hypertext is structured text that uses logical links (hyperlinks) between ...

DDoS attack - Distributed Denial of Service:

DDoS attack - Distributed Denial of Service: DDoS is short for Distributed Denial of Service. DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack. How DDoS Attacks Work According to this report on eSecurityPlanet, in a DDoS attack, the incoming traffic flooding the victim originates from many different sources – potentially hundreds of thousands or more. This effectively makes it impossible to stop the attack simply by blocking a single IP address; plus, it is very difficult to distinguish legitimate user traffic from attack traffic when spread across so many points of origin. The Difference Between DoS and DDos Attacks A Denial of Service (DoS) attack is different from a DDoS attack...

The Best Security Options For A Wireless Router

The Best Security Options For A Wireless Router: With new protocols and frequencies being used for routers in 2015 I thought I would do a write-up on how to secure a router in 2015. The information on this site is for legitimate wireless Pen-Testing professionals to do a wireless audit for companies or individuals to prevent wireless attacks on their networks. This post is for anyone who wants to secure their router in the best possible way protecting them from the current WiFi hacks that attackers use. Router Differences When it comes to routers manufactures they all have different interfaces and options. It is impossible to list in one post where the location of these settings are for the many routers that are sold. Most options will be universal such as WEP, WPA, WPA2 encryption, but how the options are activated will vary from one router to another. A routers interface options can always be Goggled or the manual found and looked at for its settings. The...

HACK FACEBOOK BY COOKIE STEALING

HACK FACEBOOK BY COOKIE STEALING ENJOy.. Three years ago I finished the series on Gmail Session Hijacking and Cookie Stealing , due to a tremendous response of readers I planned to write a post on Facebook cookie stealing and Session hijacking. Facebook session hijacking can also be accomplished via a very popular tool called Firesheep(On a Wifi Network Only), which I won't be explaining here because I have already written it before in my post Facebook Hacking Made Easy With Firesheep In this tutorial I will explain you how an attacker can capture your authentication cookies on a local area network and use them to hack your facebook account, Before reading this tutorial I would recommend you to part1, part2 and part 3 of my Gmail Session Hijacking and Cookie stealing series, So you could have better understanding of what I am doing here. Gmail Cookie Stealing And Session Hijacking Part 1 Gmail Cookie Stealing And Session Hijacking Part 2 Gmail Cookie Stealing An...

HACK FACEBOOK WITH Brute Force.

HACK FACEBOOK WITH Brute Force. brute force attack is nothing but the password guessing method with the different type of word combination. We need a tool: requirements: vmware kali linux OS python support (we have to install in kali) Python script wordlist steps to do: 1. Python Script - facebook.py(DOWNLOAD FORM MY DROP BOX: https://www.dropbox.com/…/%28FOR%20fb%20brute%20force%29%20… 2. Wordlist - e.g. pass.txt (download from) http://www.mediafire.com/…/saw0hqra0fw5r4r/MECA+Passlist.txt ) I have already installed python or Install python after installing step 1. https://www.facebook.com/bharatkumarqwe/videos/966796876745492/?permPage=1 see this link step 2. now run facebook.py <python facebook.py> Note: - This tool can crack facebook account even if you don't have the email of your victim # Hit CTRL+C to quit the program # Use www.graph.facebook.com for more infos about your victim kiki emoticon # Enter |Email| |Phone number| ...

Hack WEP wifi by using Android

Hack WEP wifi by using Android: Step 1: Firstly, if your android phone isn't rooted, try to root it, and also make sure that such android phone have a Broadcom bcm4329 or bcm 4330 chipest unlike the Nexus 7, Galaxy S1/S2, Nuxus 1, Htc Desire HD, etc. The presence of Cyanogen ROM on your device can be of use to make the bcmon app work through. Step 2: Then download and install bcmon, it's essential because it helps monitor mode on your broadcom chipest that helps in the PIN Cr acking. Step 3: After installation, run the app and tap "monitor mode" option. Step 4: Then tap the "Run bcmon terminal" option and type "airodump-ng" and Enter. Once the airodump loads finish, you would be directed to the prompt command in which you're to type "airodump-ng wlan0" then tap the Enter button. Step 5: In this stage, a Mac address would appear, in which you're to jot down. Step 6: Start scanning the channel by collecting...

Free internet

Image
we came with an app called " FEAT VPN ". Feat vpn is an application from where we can get free internet for Smart phones.   Features of Android Feat VPN: It supports both Named and Open Vpn config files. It compatible for all Android versions . It is available for free of cost, No need to buy. Rooting of the device is also not required. Beta version is Available for Higher Versions (4.0+) It is very easy to understand and easy to use.  There are many more Advantages by using Android Feat Vpn App. This would be the great way to get free internet for the Android Users. Steps to Use Open VPN On Android Phones: First you need to Download the Free Feat VPN For the Below links  For Android Version 2.x and 3.x. click here For Android Version 4.x. click here Create your own working Vpn  config to .zip and keep in your sdcard. Download a Feat Vpn Config file for Free. Step 1) Install the Downloaded Vpn in your Android mobile . ...

How to share VPN in Windows 7 using Wi-Fi

Image
How to share VPN in Windows 7 using Wi-Fi Just follow steps bellow. Step 1: Set up your laptop to be like a WiFi router. Open Command Prompt with elevate privilege. Click the Start button (1). In the search box (2), type: cmd In the list of results, right-click “cmd” (3), and then click “Run as administrator” (4). If you’re prompted for an administrator password or confirmation, type the password or provide confirmation. Verify if necessary drivers are installed: Type in Command Prompt (5): netsh wlan show drivers press “Enter”. If next to “Hosted Network Supported” is written “Yes” (6) then everything is ok and you can go to next step. If it says “No” then you have to install drivers for it. Create a WiFi network with SSID = cactusvpn and password = password: Type in Command Prompt (7): netsh wlan set hostednetwork mode=allow ssid=cactusvpn key=password Start your Wi-Fi network: Type in Command Prompt (8): netsh wlan start hostednetwork You should receive...

Possible Ways to Hack WhatsApp

Possible Ways to Hack WhatsApp The following are the only two ways to hack WhatsApp account: How to Spoof MAC Address on Android Phones A Media Access Control address ( MAC address) is a 12-character unique identifier assigned to a specific piece of hardware such as the network adapter of your WiFi device. In simple words, a MAC address can be used to uniquely identify your Android phone on the Internet or the local network. Spoofing MAC Address on Android Devices Even though MAC address is embedded on the hardware device during manufacture, it can still be spoofed to input a new one of your choice. Here is a detailed instruction on how to spoof MAC address on your Android phone. Before you spoof the MAC address, you need to record the original/current MAC address of your device which can be done according to the instruction below: On the Home Screen of your phone, tap Menu button and go to Settings . Tap About Device and go to Status Now scroll down to...