Skip to main content

Posts

Hacking Facebook Using SEToolKit (Phishing Attack)

  Facebook Hack By Social Engineering Toolkit (SET) Hack Facebook with Social Engineering, you can apply this method to hack Instagram accounts as well. But this tutorial is focused exclusively on how to hack Facebook accounts on Kali Linux with the Social Engineering Toolkit. But if you have just a little imagination you can apply the same steps you will learn in this tutorial and duplicate the process to hack another account for another website as well. Is pretty much the same with just a few small variations. What Is Social Engineer Toolkit (SET) The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open-source Python-driven tool aimed at penetration testing around Social-Engineering . SET has been given at large-scale conferences together with Blackhat, DerbyCon, Defcon, and ShmooCon. With over 2 million downloads, SET is that the standard for social-engineering penetration tests and supported heavily within th...

How To Create Your Own USB password Stealer?

  Make Your Own USB Stealer With This Tutorial What Is A USB Stealer? USBStealer is a Windows Based Password Hacker Tool that helps to Extract the password from Windows-Based Applications such as Chrome Password, FireFox Password, NetPassword, Admin passwords of the Windows Computer. In This tutorial, I will show you how to Create Your Own USB password Stealer. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passwords from their stored places. Using these tools and an USB pen-drive you can create your own rootkit to hack passwords from your friend’s/college Computer. While you’re making your own stealers, a better understanding of some Windows Run Commands...

Best 20 Ways to Secure Data, Passwords, Financial & Personal Information on Internet.

 🔰20 Ways to Secure Data, Passwords, Financial & Personal Information on Internet🔰 🌀Always turn on data backup 🌀Update your device software regularly 🌀Always turn off your PC after use 🌀Always Protect your Password 🌀Delete files properly 🌀Always turn off Bluetooth and Wi-Fi when not in use 🌀Protect Your Device With Security Lock 🌀Reset Your Device Properly Before Selling 🌀Don’t share personal information on random calls, SMS, or emails 🌀Be careful while shopping online 🌀Don’t share your personal information publically on social media 🌀Take care of the privacy settings of your device 🌀Don’t add any random person to your friend list on social media sites 🌀Avoid using Public wifi for personal browsing and online banking. 🌀Always sign out from important sites 🌀Always use two-way authentication 🌀Don’t open random links on email and WhatsApp 🌀Turn on SMS or email service for bank transactions 🌀Always use antivirus for your device 🌀Don’t let everybody use your de...

Host's Information Gathering In Linux

Information Gathering Using Harvester In Linux Tool To Be Used: Harvester Today we will learn about Information Gathering using theHarvester in Kali Linux. Good information gathering can make the difference between a successful penetration test and one that has failed to provide maximum benefit to the client. TheHarvester has been developed in Python by Christian Martorella. It is a tool which provides us information about e-mail accounts, user names and hostnames/subdomains from different public sources like search engines and PGP key server. This tool is designed to help the penetration tester on an earlier stage; it is an effective, simple and easy to use. The sources supported are: Google – emails, subdomains Google profiles – Employee names Bing search – emails, subdomains/hostnames, virtual hosts Pgp servers – emails, subdomains/hostnames LinkedIn – Employee names Exalead – emails, subdomain/hostnames New features: Time delays between requests XML results export Search a domain ...

How Do I Protect My Computer From Bots?

It’s Very Possible To Protect Your Computer From Bots, But it Takes Diligence And Knowing What To Look For. Use The Following Tips To Keep Your Computer Safe: 🌀Install Firewalls To Block Malicious Attacks And Never Turn Them Off. 🌀Use A Long And Complicated Password That Contains Numbers And Symbols. 🌀Never Use The Same Password For Multiple Programs. 🌀Install Quality Anti-Malware Software Such As Norton security to protect your device. 🌀Ensure Software Is Up To Date, And Never Ignore System Updates. 🌀Refrain From Using Flash Drives, Or Thumb Drives, In An Infected Computer. 🔺Share And Support Us🔻

🔰How To Get IP Address Of Any Snapchat User🔰

👨‍💻Easy MITM Attack 📜Required: - Mac OS X / Kali Linux   ( Or Any UNIX ) - A Phone Where You Have Snapchat On ( Im Assuming Its A Phone ) - Nmap - Some Tools And Little MITM Knowledge ! 👨‍🏫Here Is The Tut: 🌀Download Wireshark Here  (https://www.wireshark.org/)🌀Download Arpspoof Here (https://github.com/SuperMarcus/macos-arpspoof)  - MACOS only - Kali Linux Has This Already! 1. Fire Up Terminal And Ip Forward Your Laptop/pc With This Scripts: Kali -   sudo sysctl net.ipv4.ip_forward = 1              sudo net.ipv4.ip_forward = 1 Mac -  sudo sysctl -w net.inet.ip.forwarding=1 2. Find Your Phone Device Local Ip And Write It Down.       Nmap -sn <gateway ip>/24 Ex. nmap -sn (or -sP) 192.168.0.1/24 3. Spoof Your Phone.          arpspoof -i <interface> -t <phone ip> gateway Ex(mac):  arpspoof -i en0 -t 192.168.0.160 192.168.0.1 4. Fire up wireshark and fil...

How To Make An Easy And Basic Facebook Phishing Page

steps 1: Get Free Hosting At 000WebHost.(https://www.000webhost.com/) 2: Get Free Domain At Freenom(https://www.freenom.com/) 3: Download FB Phishing Page.zip From Here (https://mega.nz/#!FbAkmIIb!nwgqaLF_EUWpNq_DHROTgwTF1QvdsiQc2MstTbxmPw0) 4: Upload Zip File Via File Manager. 5: Link Database. 6: After Someone Login Via Your Website You Can See Victims Details At Hacked.txt. ✨Credits: HackPsychs 🔺Share And Support Us🔻

How To Send Fake Mails - Mail Spoofing Website

❓What can you do with this: Send a mail from an email you don't have access to. It does not work if you send the mail to gmail accounts as google has a good spam filter to prevent this. 1. You need to check if the domain owner has protected their domain against this. You can check it on valimail.com. If it says protected it does not work. If only one of the 2 records shows protected you can try. 2. Go to emkei.cz and fill the form with your mail and hit send. 🌀Now the email is on it's way with a fake mail as sender. 🔺Share And Support Us🔻

How To Crack Apple FileVault2 Encryption

STEP 1: Use dd to extract image of your targets FileVault2 encrypted disk: sudo dd if=/dev/disk2 of=/path/to/filevault_image.dd conv = noerr, sync STEP 2: Install fvde2john from Here  (https://github.com/kholia/fvde2john)STEP 3: Use hdiutil to attach to dd image: hdiutil attach -imagekey diskimage-class=CRawDiskImage -nomount /Volumes/path/to/filevault_image.dd STEP 4: Obtain the EncryptedRoot.plist.wipekey from "Recovery HD" partition https://github.com/libyal/libfvde/wiki/Mounting#obtaining-encryptedrootplistwipekey mmls /Volumes/path/to/filevault_image.dd fls -r -o 50450752 /Volumes/path/to/filevault_image.dd | grep -i EncryptedRoot icat -o 50450752 image.raw 130 > EncryptedRoot.plist.wipekey STEP 5: Verify and note the disk mount point for Apple_Corestorage: diskutil list .../dev/disk3s2 Apple_Corestorage STEP 6: Use EncryptedRoot.plist.wipekey with fvdeinfo to retrieve the hash: sudo fvdetools/fvdeinfo -e EncryptedRoot.plist.wipekey -p blablah /dev/disk3s2 Will return...

Recox: Web Application Vulnerability Scanner

Recox: Web Application Vulnerability Finder Recox combines numerous methods to form the ultimate web application reconnaissance tool. The main aim of the script is to find and then classify vulnerabilities within web applications. With its in-depth mechanism, it can help the user find unexpected vulnerabilities which are normally overlooked by other web application scanners. Recox: Web Application Vulnerability Finder  Recox automated numerous functions required in a manual penetration test to help the user save time and focus on the real issues instead. Some of these functions include:  Deep – Dom Scanner – Subdomain takeover – Passive Scan – Active Scan – CORS Misconfiguration – Zone Transfer Test – Web Content Discovery Deep JS Analysis Involves the extraction of source link and parameters inside the webpage. – Static Analysis (SAST) – Dynamic Analysis (DAST) Web – Info Comprises of three check-ups (not as technical as previous 2): – DNS Record Extraction – Subdomain –...

7 Best Hacking Tools Everyone Must Know

Ever since you enter the field of Ethical Hacking, you always want to have your hands get on most of the Hacking Tools. More tools you know, more your hacking career is about to fly off. So let’s discuss the best 7 hacking tools. 1.) Nmap It is a free and open-source tool that is used for network discovery and security auditing. Nmap is a powerful tool as it can be used to scan huge networks having thousands of machines. It is a command-line tool. Nmap suite also includes an advanced GUI that is called “ZenMap”. It supports a wide range of operating system which are: Linux Microsoft Windows FreeBSD OpenBSD Solaris IRIX Mac OS X It uses raw IP packets to determine: Hosts that are available on a particular network Services that are offered by these hosts i.e. Application name along with its versions Operating system and its version that is running on the target system Type of firewall on the target system Scans for the open ports using both TCP and UDP...