Posts

Showing posts from April, 2020

How To See Passwords for Wi-Fi Networks You've Connected Your Android Device To

Image
How To See Passwords for Wi-Fi Networks You've Connected Your Android Device To     The trouble comes when you want to actually see the password for one of the networks you connected to. Perhaps you want to connect a second device to a saved Wi-Fi access point, or maybe you're with a friend who wants to log in to the same hotspot. But without a way to access the actual passwords that your device has stored, you're out of luck. Thankfully, there are ways around this. If you're on Android 10 or higher, you can see Wi-Fi passwords right from your phone's settings. However, if you're on Android 9.0 Pie or lower, note that you will need to be rooted.  Method : Android 10 & Up This first method doesn't require root or even an extra app. But it does require that your phone is running Android 10 or higher. If your phone has been updated to this version, I'll outline a quick and easy way to see saved Wi-Fi passwords below. Step 1: Locate Wi-Fi Set

HOW TO HACK FACEBOOK ACCOUNTS USING KEYLOGGER

Image
HOW TO HACK FACEBOOK ACCOUNTS USING KEYLOGGER STEP 1: Create Server for Hacking Passwords First of all, for hacking any Facebook account password, we have to create our keylogger server that will run on the victim’s machine, capturing his keystrokes and emailing us the record. The keylogger server building process consists of several steps: 1. First of all download the Keylogger and a good binder. Binders are easily available via a Google search.  2. Extract the RAR file. Now you will get one folder and three files. 3. Open the Keylogger file. Here you will need a gmail ID and password. For safer use, create a fake Gmail account. 4. Click on server settings as shown. Here, enter the time at which you want to receive reports; it’s always preferable to use a 20 minute timer for receiving files. Click on the Output box to choose the location of the file and give it a name. We recommend using a system process name to make it undetectable, like svchost, or check any process name

Free Masters in Ethical Hacking Advance Course.

Image
  Masters in Ethical Hacking Advance Course.  WHICH COST AROUND COST $ 2k  But now [100% Free Of Cost.]         Masters in Ethical Hacking Advance Course. DOWNLOAD LINK 🔗 : https://mega..nz/folder/Masters-in-ethical-hacking-advance-course.   THIS IS VERY IMPORTANT COURSE TO NEXT LEVEL IN YOU ETHICAL HACKING JOURNEY.. FOLLOW THE DOWNLOAD INSTRUCTIONS WHICH GIVEN IN WEBSITE TO DOWNLOAD.. ( THE LATEST ADVANCE LEVEL COURSE ) 2020 COPY WITH CREDITS LIMITED EDITION... Follow the steps 1 install Aircrack-Ng     Let's get into monitoring network activity.  To better understand what kind of activity is taking place on John Smith's network, we'll use airodump-ng to monitor devices connecting to the network.  Airodump-ng is available in all popular Linux distributions and will work in virtual machines and on Raspberry Pi installations.  I'll be using Kali Linux to monitor Wi-Fi networks in my area. Airodump-ng is a part of the Aircrack-ng suite of wireless cracking u

What Is Encryption And How Does It Protect Your Data?

Image
What Is Encryption And How Does It Protect Your Data?  ━━━━━━━━━━━━━ Encryption is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information. Vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing connection to the web. It’s nearly impossible to do business of any kind without your personal data ending up in an organization’s networked computer system, which is why it’s important to know how to help keep that data private. Encryption plays an essential role. ━━━━━━━━━━━━━

How To Hack Your Neighbor with a Post-It Note, Part 1 (Performing Recon)

Image
How To Hack Your Neighbor with a Post-It Note, Part 1 (Performing Recon)   #hackingtutorials Using just a small sticky note, we can trigger a chain of events that ultimately results in complete access to someone's entire digital and personal life. Imagine arriving home one night after work and there's a Post-it note on your apartment door with the website "your-name-here.com" written on it.  Someone cautious may not immediately visit the website, but eventually, curiosity might get the best of them.  Let's have some fun exploiting human curiosity and get remote access to our neighbor's computer in the process. For this hack, we'll be using a seemingly harmless Post-it note to entice a target user into visiting a website that we control.  When the target user visits the website, they'll be tricked into opening a malicious file which will allow us to perform a variety of attacks on the compromised computer.  Such an attack may allow hackers t

How To Get Free VPN For Port Forwarding on Android

Image
How To Get Free VPN For Port Forwarding on Android  This Tutorial is Only for Educational Purpose. Please Don't Misuse of it. Else This is Your Reponsibility. Step 1:- Open Browser and Type free-proxy.xyz Step 2:-Then Unblock ipjetables.net (Some Times it Requires Proxy) Step 3:-Make A Fake Account Via Temp-Mail Step 5:- Open Settings and Search VPN Step 6:-Now Add a VPN As pptp & put pptp.ipjetable.net Step 6:-Now Add Password and Username Now You are Done

Machine learning (Artificial intelligence)

Image
Machine learning (Artificial intelligence)  Small explanation  A programming language is a language used to give instructions to a computer. These set of instructions is called code. A code takes some input, performs the set of instructions defined in the code to get an output. However in real world processes, the input is given, the output obtained is observed, but the code/logic is unknown. Machine Learning is the science of deriving the logic from the data of input and output observations. To derive the logic, certain mechanisms are used which are called machine learning algorithms.   Each machine learning algorithm has 3 components- a set of unknown parameters, a loss and an optimizer. Let's pick them up one by one. The machine learning algorithm specifies a well defined set of operations on the input variables and the unknown parameters to get an output prediction. This output prediction is different from the actual output. This difference is called loss. Our aim

Hacking Any Social Media Account

Image
  Hacking Any Social Media Account   The first step is to open an account with this Hacking sites  Sites used: z-shadow.co Smikta.net Shadowave.info After opening account with any one of them and logging in You would see different phishing links there Copy your preferred one but be warned the links are usually long so use either bit.ly or goo.gl or any other link shorter to shorten it Then paste it to your victims  You can convince them by lieing like this (There is a new site that pays Log in to get started <paste the link here>) As soon as they log in their log in email and password will be sent to you  That's it !!!  You have successfully hacked a Facebook/Any social media account

How to Install and Run Kali Linux on any Android Smartphone

Image
  How to Install and Run Kali Linux on any Android Smartphone    First of all download and install Linux Deploy App in your android from the Google Play Store.  Now After downloading and installing it launch the app in your device and there tap on download button.   Now there tap on Distribution option and change it to Kali Linux instead of Linux. Now scroll up and click on the Install button at the top of there.  Now wait for the download to complete time taken can be vary depending upon your internet speed.  Now download and install VNC Viewer App in your android from the Play Store.  Now launch the app and fill up the settings as displayed on the screenshot below.   Now click on Connect button there.  Thats it you are done, Now Kali linux gets installed in your android and you can enjoy the dummy hacking environment in your android.

TOP 11 VIRUSES OF ALL TIME

Image
TOP 11 VIRUSES OF ALL TIME : 1.The Elk Cloner virus was written for Apple DOS 3.3 and spread via   floppy disks; it displayed a short poem and was activated on its 50th use. The   Elk Cloner virus was the first PC virus.  2. The Brain virus was the first worldwide virus to also spread by floppy   disks, and the two brothers in Pakistan who wrote the virus did not intend for   it to be a destructive virus, yet despite their intentions, it materialized into one.  3.The Melissa virus was based on a Microsoft Word Macro and was designed   to infect e-mail messages by sending infected word documents to the first 50   people in a user’s outlook list. The Melissa virus was reported to cause more   than $50 million in damages to other computer users and businesses.  4. The I Love You virus infected millions of computers in a single day sim-  ply because the attachment stated “I Love You” and people’s curiosity caused   them to open the infected attachment, which, when opened, would

A BRIEF HISTORY AND KNOWLEDGE (INTRODUCTION) ABOUT COMPUTER VIRUSES

Image
A BRIEF HISTORY AND KNOWLEDGE (INTRODUCTION) ABOUT COMPUTER VIRUSES A computer virus is computer code that is designed to insert itself into other   software and, when executed, is able to replicate itself and propagate with the   host software or file. Viruses can be designed to damage the infected host by   corrupting files, stealing hard disk space or CPU time, logging keystrokes   to steal passwords, creating embarrassing messages, and other activities all   performed without the computer user’s approval or knowledge. Early viruses   were boot sector viruses and spread by computer users sharing infected   floppy disks. Other viruses attached to e-mail or a part of the body of an   e-mail, and when the code viruses were executed, a message with the virus   embedded was sent to other mail clients. In some cases, the code could be   designed to provide the scripts access to the user’s address book and could,   in turn, propagate and use those addresses to further propagat

How To Trace Location Of A Person By Chatting on WhatsApp, Facebook, Instagram, Snapchat

Image
  How To Trace Location Of A Person By Chatting on WhatsApp, Facebook, Instagram, Snapchat  There are some different methods that you can use according to your convenience as a complex is a method, better will be the result. So read out all the methods discussed below and use any of them to check out the location of any person by chatting on social sites.  Tracing IP Address Of Person On Facebook Chat Using Command Prompt By using the command prompt, you can actually trace out the IP address of a person whom with you are chatting on facebook. Just   Follow the steps below to proceed. 1⃣ First of all, start chatting with your friend whose IP address you want to get and make sure that all other apps and background process must be stopped. Now press Win+R of your keyboard. 2⃣ Now type cmd and hit enter. 3⃣ Now at the command prompt that appears type netstat -an and hit enter. 4⃣ Now note down the IP address of a person. 5⃣ Now you need to scan that IP address to know the actua

How To Help Protect Against Trojans

Image
  How To Help Protect Against Trojans ?  ━━━━━━━━━━━━━ 🔗 Here are some DOs and DON'Ts to help protect against Trojan malware. First, the DOs : 🔗 Computer security begins with installing and running an internet security suite. Run periodic diagnostic scans with your software. You can set it up so the program runs scans automatically during regular intervals. 🔗 Update your operating system’s software as soon as updates are made available from the software company. Cybercriminals tend to exploit security holes in outdated software programs. In addition to operating system updates, you should also check for updates on other software that you use on your computer. 🔗 Protect your accounts with complex, unique passwords. Create a unique password for each account using a complex combination of letters, numbers, and symbols. 🔗 Keep your personal information safe with firewalls. 🔗 Back up your files regularly. If a Trojan infects your computer, this will help you to restor

Terminologies used in penitration testing

Image
Terminologies used in penitration testing : Exploit :  An exploit is the means by which an attacker, or pen tester for that matter, takes   advantage of a flaw within a system, an application, or a service. An attacker   uses an exploit to attack a system in a way that results in a particular desired   outcome that the developer never intended. Common exploits include buffer   overflows, web application vulnerabilities (such as SQL injection), and con-  figuration errors. Payload :  A payload is code that we want the system to execute and that is to be selected   and delivered by the Framework. For example, a reverse shell is a payload that   creates a connection from the target machine back to the attacker as a Win-  dows command prompt (see Chapter 5), whereas a bind shell is a payload that   “binds” a command prompt to a listening port on the target machine, which   the attacker can then connect. A payload could also be something as simple as   a few commands to be execu

HOW TO INSTALL ANY APP THAT IS NOT AVAILABLE IN YOUR COUNTRY

Image
HOW TO INSTALL ANY APP THAT IS NOT AVAILABLE IN YOUR COUNTRY 1. Install an app that isn't available in your country If you're really keen to get an app that's not available in your country then you can still get your hands on it by using a VPN. 'VPN' means 'virtual private network'. It gives you a secure internet connection via private networks in locations outside of your current one. Basically, a VPN service can make it look like you're accessing the internet from a different location. It's important that you choose a credible VPN. We regularly feature VPN deals in our AndroidPIT Store if you're looking for a good one at a low price. Once you've downloaded a VPN, select the country whose Play Store you want to access in the VPN app, get the VPN up and running, then open the Play Store app. It should land on the Play Store ghomepage of the country you selected. Now you can get the app you desire.

Best Steam Alternatives For PC Gaming Needs

Image
  Best Steam Alternatives For PC Gaming Needs   #hackingtutorials  Steam has quickly become very popular among the gaming community and it’s pretty well deserved.  Steam offers great deals on games, a safe and secure experience for online gamers, a huge collection of games, and regular promotions for gamers from all around the world.  However, it’s not completely flawless, as its support service is constantly made fun of, plus not everyone is a fan of Valve’s monopoly on PC gaming.  Thanks to Steam’s popularity, there are a number of alternatives that bring new and exciting ways to find old favorite as well as new gaming titles that might have otherwise been unnoticed.  So, if you are tired of Steam and are looking for something new to quench your thirst for gaming, check out the 8 best Steam alternatives below ​1. GOG GOG is part of CD Projekt group, the developers of The Witcher game series.  It offers some amazing deals on popular computer games and DRM-free classic comp

SSH (Secure Shell)

Image
SSH (Secure Shell) SSH is a protocol similar to telnet which also facilitates connection to remote hosts for communication. However, SSH has an upper hand over telnet in terms of security. Telnet was primarily designed to operate within the local network and hence does not take care of security. On the other hand SSH manages to offer total security while connecting to remote hosts on a remote network or Internet. Akin to telnet SSH also uses a client software and requires a username and Password to establish connection with the remote host.

How to stress/boot/DDoS for free in 2020! [UNLIMITED ATTACKS

Image
 How to stress/boot/DDoS for free in 2020! [UNLIMITED ATTACKS ]  This is a very quick and simple tutorial on how to stress/boot/DDoS for free in 2020 without using your own connection! No rocket science really and I don't encourage anyone to use it against other people since it's just very annoying, but it can be used for stress-testing your own server for example!  Educational Purpose STRICTLY  Go and register :  https://www.stressthem.to/ Go to booter panel by clicking on circular icon  Once you're there all you have to do is fill in the IP and method you want, and the time in seconds, max time you can use on the free plan is 5 minutes (so 300 seconds)

How To Hack Facebook Account Using Kali Linux (For Educational Purposes Only)

Image
Hello, everyone , Today i am going to show you one method to hack Facebook account for you , using Kali-Linux. It is like phishing method but don't worry , you don't need to do all that heavy steps again,it is very simple all the stuffs(steps) is done by Kali Linux .... NOTE- THIS IS FOR EDUCATIONAL PURPOSE ONLY, PLEASE DON'T DO ANYTHING ILLEGAL. Requirements: 1- Laptop or Computer. 2- Net connection with speed. 3- Kali Linux installed system or bootable pendrive with kali linux . Process: 1) Open terminal using " CTRL + ALT + T " 2) type " sudo root " command (if you are not a root user) 3) enter your password 4) do all three steps if you are not a root user. Now,main steps  5) go to " Application " on the top left hand side 6) then go to " kali linux " 7) then go to " Exploitation tools" 8) then go to " social engineering toolkit " 9) then go to " setoolkit " Now it will show you som

How To Combine Two Wifi Connections To Get A Faster Internet

Image
How To Combine Two Wifi Connections To Get A Faster Internet You have more than one active internet connections and you are using only one at a time, while the other is resting? Don't let it be lazy. Combine them all to get combined internet speed. Say you have two connections of 1 Mbps each, you just can make 1+1=2. This can work regardless of the type of the connections, i.e. it may be wired, wireless or mobile communication. Method 1 of 4: Combining LANs Steps: 1. Turn everything on your computer, modems (in case of DSL). 2. Connect them on the relative ports. 3. Establish Connections. Dial or do whatever you need to do to establish an Internet connection and test each one by one separately. If all good proceed to the next step. 4. While each one is active and connected, navigate to the "Network Devices" folder of your computer. It usually stays under control panel. Windows 8 or Windows 8.1, press Windows D to navigate to the desktop, and the rest is the sa

How To Hack or Reset Trial Period of Any Software and Use Them Lifetime in PC

Image
How To Hack or Reset Trial Period of Any Software and Use Them Lifetime in PC   Follow the steps for running this Software in your Computer. #Hacks ①. Download “Runasdate” Software ②. Install Runasdate Software in your Computer PC. ③. Now run any trial software on your @devilbadhacker computer and write down the date of installation on your PC. ④. When your trial version gets over. Just Right Click on your software and select Runasdate. Now Runasdate software extend the trial period of your software by increasing trial period. With the help of this software, you can use any software on your PC for a lifetime, without spending money

Laptops & Computers Shortkey

Image
Laptops & Computers Shortkey s Ctrl+A - Select All Ctrl+B - Bold Ctrl+C - Copy  Ctrl+D - Fill Down Ctrl+F - Find Ctrl+G - Goto Ctrl+H - Replace Ctrl+I - Italic Ctrl+K - Insert Hyperlink Ctrl+N - New Workbook Ctrl+O - Open Ctrl+P - Print Ctrl+R - Fill Right Ctrl+S - Save Ctrl+U - Underline Ctrl+V - Paste Ctrl W - Close Ctrl+X - Cut Ctrl+Y - Repeat Ctrl+Z - Undo F1 - Help F2 - Edit F3 - Paste Name F4 - Repeat last action F4 - While typing a formula, switch between absolute/relative refs F5 - Goto F6 - Next Pane F7 - Spell check F8 - Extend mode F9 - Recalculate all workbooks F10 - Activate Menu bar F11 - New Chart F12 - Save As Ctrl+: - Insert Current Time Ctrl+; - Insert Current Date Ctrl+" - Copy Value from Cell Above Ctrl+’ - Copy Formula from Cell Above Shift - Hold down shift for additional functions in Excel’s menu Shift+F1 - What’s This? Shift+F2 - Edit cell comment Shift+F3 - Paste function into formula Shift+F4 - Find Next Shift+F5 - Find Shift+F6 - Previous

How To Configure Port Forwarding to Create Internet-Connected Services

Image
How To Configure Port Forwarding to Create Internet-Connected Services  #hackingtutorials Ports allow network and internet-connected devices to interact using specified channels.  While servers with dedicated IP addresses can connect directly to the internet and make ports publicly available, a system behind a router on a local network may not be open to the rest of the web.  To overcome this, port forwarding can be used to make these devices publicly accessible. Networked services and apps running on various devices make use of ports at specific numbers as a means to initiate connections and establish communications.  Different ports can be used simultaneously to easily separate and parse different types of traffic or requests.  Ports are generally associated with specific services, such that a client can connect to a server on a specific port and assume that the server will accept a connection at that port and respond appropriately. Some commonly used ports are shown belo

How To Force Restart the iPhone X When It's Acting Up

Image
How To Force Restart the iPhone X When It's Acting Up  #tips ​Every now and then, an iPhone will freeze up and become unresponsive due to a software glitch.  It can be a buggy app that somehow interferes with iOS or a software update that somehow didn't install properly.  Whatever the cause, it's safe to say that no iPhone is immune to this problem, not even the new iPhone X. Fortunately, iOS is an extremely stable platform, and minor software issues can often be solved by simply powering down.  Since a long-press on the Side button will activate Siri on the iPhone X, the process for turning the device off is different than other iPhone models. In order to get the "slide to power off" option, you either have to go through the Settings app to access the "Shut Down" button or press the Side button and either Volume Up or Down together. In that rare event where an iPhone X freezes up, however, a force restart — more commonly known as a hard rebo

How To Use Remote Port Forwarding to Slip Past Firewall Restrictions Unnoticed

Image
How To Use Remote Port Forwarding to Slip Past Firewall Restrictions Unnoticed   Local port forwarding is good when you want to use SSH to pivot into a non-routable network.  But if you want to access services on a network when you can't configure port-forwarding on a router and don't have VPN access to the network, remote port forwarding is the way to go. Remote port forwarding excels in situations where you want access to a service on an internal network and have gained control of a machine on that network via a reverse shell of some kind.  Whether you're a pentester or system admin, this is a good thing to know about. For example, let's say you compromise a public terminal in the local library and get some credentials.  You install a persistent reverse shell of some sort, which communicates back to your machine, but you don't have access to other services on the machine.  The victim machine might have an SQL instance configured on localhost only that