Skip to main content

Posts

Showing posts from March, 2018

GET ANYONE'S Wi-Fi PASSWORD WITHOUT CRACKING USING Wifiphisher

Welcome back, my hackers!   Do you need to get a Wi-Fi password but don't have the time to crack it? In previous tutorials, I have shown how to crack WEP, WPA2, and WPS, but some people have complained that cracking WPA2 takes too long and that not all access points have WPS enabled (even though quite a few do). To help out in these situations, I present to you an almost surefire way to get a Wi-Fi password without cracking—Wifiphisher. Steps in the Wifiphisher Strategy The idea here is to create an evil twin AP, then de-authenticate or DoS the user from their real AP. When they re-authenticate to your fake AP with the same SSID, they will see a legitimate-looking webpage that requests their password because of a "firmware upgrade." When they provide their password, you capture it and then allow them to use the evil twin as their AP, so they don't suspect a thing. Brilliant! To sum up, Wifiphisher takes the following steps: De-authenticate the user from t

Famous Hacker

In this chapter, I will have a brief synopsis of some of the famous Hackers and how they became famous. Jonathan James Jonathan James was an American hacker, illfamous as the first juvenile sent to prison for cybercrime in United States. He committed suicide in 2008 of a self-inflicted gunshot wound. In 1999, at the age of 16, he gained access to several computers by breaking the password of a server that belonged to NASA and stole the source code of the International Space Station among other sensitive information. Ian Murphy Ian Murphy, also known as Captain Zap, at one point of time was having high school students steal computer equipment for him. Ian selfproclaims to have been "the first hacker ever convicted of a crime". Ian's career as a master hacker was fabricated in 1986 after he and his unemployed wife decided to form some type of business. He has a long history of computer and Internet frauds. One of his favourite games is to forge Emai

FACEBOOK HACKING

I  will show number of ways to  Hack Facebook Account  that all hackers usually use to  hack Facebook Account . So beware from hackers and protect your facebook account from hackers. Our site provides only security tips to protect your facebook account from hackers . We sharing only these methods because if you know how to hack you must know how to secure. Must read carefully all these methods, beware from all attacks, and protect your facebook account from hackers. Note :-  This post is only for security purpose don't try any illigal activity and i'm just shared these methods because protect our facebook account from these types of hacking attacks. Top Ways How Hackers Can Hack Facebook Account. Mostly Hackers use these methods to  hack facebook account , So protect yourself from hackers. Must Read this post, and beware from hackers #1 Hack Facebook Account Password By Phishing Phishing is still the most popular attack vector used for hacking Facebook accounts. T

How To Become Ethical Hacker (10 Steps)

A hacker is basically someone who breaks into computer networks or standalone personal computer systems for the challenge of it or because they want to profit from their innate hacking capabilities.  The hacker subculture that has developed among these new-age outlaws is often defined as the computer underground, although as of late it has evolved into a more open society of sorts.  Today many of you want to become a hacker as everyone wants to see beyond security and private credentials.  So in this post i will tell you the best way to become Ethical Hacker   >> How To Become Certified Ethical Hacker ?   Today many businesses and government-related organizations that are serious about theirnetwork security hire ethical hackers and penetration testers to help probe and improve their networks, applications, and other computer systems with the ultimate goal of preventing data theft and fraud from that black hat and other hackers.  So you can earn through it by learnin

Turn ON Your PC Very Fast As Less Then In 10 Seconds.

I am going to tell you something very cool, interesting and very useful.   Alright so you wanna know how to Turn ON your PC very fast as less then in 10 seconds.   Here’s what you have to do to Turn your PC ON in 10 seconds.   Y ou have to do these following steps:-   1.Click on the START button then,   2.Go to RUN.   3.type Regedit and hit Enter.   4.this will open Registery Editor   5.Now look for the below key   HKEY_LOACAL_MECHINE-SYSTEM-CurrentControlSet-Control   ContentIndex   6.Now there find the Key Called “Startup Delay” Double Click On It.   7.Now where its Base Click Decimal.   8.Now its Default Value Is 4800000(75300:hexadecimal)   9.Change The Value To 40000 and click on OK   10.Now close the Registery Editor.   11.Now Y ou have Done it and Restart your PC and check the speed.   =======DO IT ON YOUR RISK!!==========  _________________________

TEACH FACT

what is R.A.T ? A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer.  RATs are usually downloaded invisibly with a user-requested program -- such as a game -- or sent as an email attachment.  Once the host system is compromised, the intruder may use it to distribute RATs to other vulnerable computers and establish a botnet.  Because a RAT enables administrative control.RATs can be difficult to detect because they usually don't show up in lists of running programs or tasks.  The actions they perform can be similar to those of legitimate programs.  Furthermore, an intruder will often manage the level of resource use so that a drop in performance doesn't alert the user that something's amiss.  _________________________ what is metasploit ? An open source attack framework first developed by H. D. Moore in 2003.  Metasploit is used for hacking into systems for testing purposes.  Metasp

Hacking Pc

If you are working in Office / Colleges and want to hack your friends & college mate PC then here is a trick. What do we need ? Windows Os Cain And Abel Step 1:-  Finding the target So first off we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local sub net. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross. Another window will pop up, make sure “ All host in my subnet ” is selected, and then click ok. It should begin to scan. Then IP’s, computer names, and mac addresses will show up Now remember the IP address of the computer you are going to be breaking into. If you can’t tell whether the IP address is a computer, router, modem, etc, that’s ok. During the next

COMPUTER PROGRAMMING LANGUAGE

Homepage C omputer programming languages are used to to communicate instructions to a computer. They are based on certain syntactic and semantic rules, which define the meaning of each of the programming language constructs. Today I’ve got a list of every programming language I could find. I divided them into the following categories: Interpreted Programming Languages Functional Programming Languages Compiled Programming Languages Procedural Programming Languages Scripting Programming Languages Markup Programming Languages Logic-Based Programming Languages Concurrent Programming Languages Object-Oriented Programming Languages Interpreted Programming Languages An  interpreted language  is a programming language for which most of its implementations execute instructions directly, without previously compiling a program into machine-language instructions. The interpreter executes the program directly, translating each statement into a seque