Monthly Archives: July 2018

Hack Wi-Fi Network- Two Simple Working Methods and Their Fix

Wi-Fi SECURITY: METHODS OF ENCRYPTION

Before cracking a Wi- Fi network, you must be aware of basic encryption techniques that protect a Wi-Fi network. These three methods of encryption are the major sources of vulnerability associated with wireless networks. The different types of Wireless Encryption Security techniques include the following:

WEP: WEP is Wired Equivalent Privacy that can be cracked easily when configured appropriately. This method of encryption can be cracked within few minutes.

WPA: WPA is Wi-Fi Protected Access that provides strong security. Even then, there is possibility to crack if the Wi-Fi password if short. However, wireless networks can be hacked easily using various tools.

WPA2: WPA2 is Wi-Fi Protected Access 2 that also eventually provides high security. You can hack this method of Wi-Fi encryption at the time of packet generation from Wi-Fi access points.

TECHNIQUES TO HACK Wi-Fi (Encryption-based) NETWORK

If you are much interested in hacking high security encryption based Wi-Fi networks, you need to arrange few things that are required at the time of Hacking process. After arranging all the essential things, you can hack a Wi-Fi network using few tools and techniques that can be seen below:

REQUIREMENTS

  1. Kali Linux OS (includes aircrack-ng suite and wifite tool)
  2. External Wi-Fi Adapter or Inbuilt Wi-Fi Device

Hardware

  • You need to have an external Wi-Fi adapter that is required to hack a Wi-Fi network. If you want to crack a password that has less security, then you can use plug-n-play wireless USB adapter TP-LINK TL-WN722N that is exclusively available at Online E-commerce Websites i.e., at Flipkart and Amazon.
  • If you need a better range with good quality wireless adapter, then it is recommended to use Alfa AWUSO36NH along with a better antenna.
  • If you wish to hack Wi-Fi network for Ultimate range Wi-Fi antenna then, you can use TP-LINK TL-ANT2424B 2.4GHz 24dBi.

METHOD 1: HACK Wi-Fi Network using Wifite

Wifite is a Linux-based platform tool that is available on variant Operating Systems like Kali, Backtrack 5, BlackBuntu, BackBox and Pentoo. Wifite is basically used to attack multiple encrypted networks (WEP, WPA/2 and WPS) in a row that is customized to be automated with only a few arguments. Wifite is a wireless auditing tool that aims to be the “set it and forget it” method of hacking.

How to View Available Access Points?

  • As you are using Linux Operating System, Initially go to Application.
  • Now go to Kali Linux > Wireless Attacks > 802.11 wireless tools > Wifite.

Hack Wifi network-kali Linux

  • If you are unable to view Wifite then simply type ‘wifite’ in Terminal.
  • Here, you can see List of Available Wi-Fi Access Points. (you must be root).
  • Wait for few seconds in order to notice nearby Wi-Fi points like WEP, WPA/WPA2.

Steps to Hack WEP Encryption based Wi-Fi Network

Hacking a Wi-Fi network that uses WEP security encryption is relatively very easy when compared to other encryption methods. While using this Wifite tool, you must follow simple steps as given below:

  • Just choose the appropriate target NUM (1,2,3,..,n) in order to crack it.
  • Hacking a WEP key that ensures 100% possibilities of cracking the WEP WiFi password that currently uses 5 attacks.
  • Make sure that the attack is completed within 10 minutes.
  • You need not worry if one WEP WiFi attack fails, the other will come into action automatically for succeeding 10 minutes.
  • You can choose any attack. For instance, choose NUM 2 attack.
  • Within few minutes the WEP Wi-Fi network gets hacked.

Hack WEP Wi-Fi password - Techniques to hack Wi-Fi Network

  • You can see the WEP key that is present in the above image. It is a Hexadecimal representation of WEP WiFi’s password.
  • That WEP Key can be used as the Wi-Fi password.
  • Later, you can also convert the Wi-Fi password into actual password that is in the form of human readable mode using online Hex-to-ASCII converter.

Steps to Hack WPA Encryption based Wi-Fi Network

Hacking a Wi-Fi network that uses WPA security encryption is little bit tough when compared to WEP as this is highly protected encryption method. This can also be hacked when the password contains less number of characters. It takes less time to hack a Wi-Fi network that uses short passwords. In order to hack this type of Wi-Fi network you need to use Handshake capture.

Handshake Capture:

Handshake is a file that can be captured when Router (Wi-Fi Access Point) and client(s) (Laptop, Mobile or other Wi-Fi enabled devices) communicate to authenticate each other. You may have a doubt that, “What is the purpose of this Handshake file?” The main target is to hack Wi-Fi network i.e., password. This Handshake file comprises of Wi-Fi password but in encrypted form.

Brute-Forcing:

As the password is in encrypted form, let us try some other password combination on the encrypted password to acquire the original password. This process is known as Brute Forcing that is done offline. By using Brute-Forcing, the password present in the handshake file can be captured easily within few minutes.

Dictionary File:

In the below image, you can see dictionary which is a file that contains all known words from various sources usually phrased as Wi-Fi password.

Hack Wi-Fi network- WPA Security Encryption

  • As soon as you start WPA handshake capture, it displays a message as “Client Found”.
  • It generates a command using handshake capture (that contains password) as (TEST_C0-A0-BB-04-5C-A9.cap).
  • The above command cracks the password file that must be saved at /root/DICTIONARY/.
  • Till now, you have used two WPA attacks that are completed successfully.

Hack Wi-Fi Network-Password key found

  • You can see Key Found [Password 1] in the above image that displays the Master key and Transient key.

A password file usually contains words that are created using combination of different characters, numbers and special symbols. A password requires a lot of computational power if it a strong password including numbers and other special characters. The above WPA Wi-Fi Security Encryption got cracked easily because of easy password. Suppose, if you are but dealing with strong password, it might take more hours to crack the password.

METHOD 2: HACK Wi-Fi Network using WIFIPHISHER

Wifiphisher is a security tool that mounts the fast automated phishing attacks which are against WPA networks so as order to acquire all the secret passphrase of the particular Wi-Fi network. Unlike other methods of hacking, Wifiphisher is a type of social engineering attack that does not include brute forcing. It is very easy way to obtain WPA credentials of the users whom you wish to hack. Wifiphisher works on a platform that supports Kali Linux Operating System and is licensed under the MIT license.

How it Works?

Wifiphisher is a tool that is used to hack a Wi-FI network and this attack makes use of three phases:

PHASE 1:

  • Victim is being deauthenticated from their access point.

Method two to hack wifi network using wifiphisher1

  • Wifiphisher tries to jam all the target access point’s wifi devices continuously that are available within range by sending deauth packets to the client from the access point.
  • It discovers all the networks that are available in the access point range.

Method two to hack wifi network using wifiphisher2

  • This tool alters the access point of all the devices through the main server and broadcasts the address along with the deauth packets.
  • It starts generating fake access points by copying an access point from a set of access points shown below:

Method two to hack wifi network using wifiphisher3

PHASE 2:

  • This is the second phase where the Victim joins a rogue access point.
  • It asks for password authentication and in the backdrop, the tool tries to copy all the credentials of the possible Wi-Fi networks.
  • Wifiphisher sniffs the area and copies the target access point’s settings.
  • Now, this tool creates a rogue wireless access point that is modeled on the target by setting a NAT/DHCP server and forwards the right ports.
  • Consequently, because of the jamming, clients will start connecting to the rogue access point. After this phase, the victim is Mitimed.

Method two to hack wifi network using wifiphisher4

PHASE 3:

  • Victim is being served a realistic router config-looking page where the Wifiphisher tool employs a minimal web server that responds to HTTP & HTTPS requests.
  • As soon as the victim requests a page from the Internet, wifiphisher responds with a realistic fake page that asks for WPA password confirmation due to a router firmware upgrade.

Method two to hack wifi network using wifiphisher5

Method two to hack wifi network using wifiphisher6

Till now you have seen two techniques to hack Wi-Fi WEP, WPA/WPA2 Security using Wifite and WIFIPHISHER. By using these two server attacks, you can easily crack the Wi-Fi network.

How to Protect your Wi-Fi Network from getting Hacked?

From the above techniques, you might clearly understand that hacking a Wi-Fi network is an easy process. Now, it’s time to focus on tightening your Wi-Fi security. Now, you might get complete awareness about the security and Wi-Fi Network Hacking through this article. Follow some tips so as to enhance security of your Wi-Fi network.

  1. As WEP is an easy hacked Wi-Fi security encryption method, it is recommended to change Wi-Fi security from WEP to WPA/WPA2. WEP is now denigrated security protection.
  2. Change the password of your Wi-Fi network periodically so that if in case someone gets chance to hack your Wi-Fi password, they will not be able to use your free Internet for long period of time.
  3. Disable WPS as it has lots of vulnerabilities.

Dynamic Malware Analysis Tools

Dynamics Malware Analysis Risks

Please be aware of the fact that Dynamic Malware Analysis can put your system and network at risk, you will be executing real malware to analyse it’s behaviour. We advise you to only execute malware on virtual machines or dedicated systems in isolated networks which are not connected to the internet. We do not need an internet connection on our malware analysis machine since there are serveral tools available for simulating an internet connection. We will be covering a few of these tools in this article. Even though we’re executing the malware in virtual machines, it is not guaranteed that the host or your network is perfectly safe because malware developers always find surprising new ways for infection and make malware analysis harder to perfom.

Dynamic Malware Analysis Tools

As already mentioned we’ll be looking at the following tools for dynamic malware analysis: Procmon, Process Explorer, Regshot, ApateDNS, Netcat, Wireshark and INetSim. For your convenience we will supply a download link for the tools. We will be updating this list along the way so be sure to subscribe to our newsletter.

Procmon

Dynamic Malware Analysis Tools procmon

Procmon, or Process Monitor, is a free tool developed by Windows SysInternals and is used to monitor the Windows filesystem, registry and process activity real-time. The tool is a combination of 2 legacy tools; FileMon and RegMon. Procmon has some great features added on top of FileMon and Procmon like non-destructive filtering of data and boottime logging. Non-destructive filtering means that all data is captured but only filtered data is displayed to the user.

The latest version of Process Monitor is version 3.2 which can be downloaded here.

Process Explorer

Dynamic Malware Analysis Tools Process explorer

Process Explorer is also a free tool available from Microsoft which should be running when performing Dynamic Malware Analysis. Process Explorer is used to monitor the running processes and shows you which handles and DLL’s are running and loaded for each process.

The latest version of Process Explorer can be downloaded here.

Regshot

Dynamic Malware Analysis Tools Regshot

Regshot is a great open source utility to monitor your registry for changes by taking a snapshot which can be compared to the current state of your registry. This allows you to see the changes made to your registry after the malware has been executed on your system.

The latest version of Regshot is available for download here.

ApateDNS

Dynamic Malware Analysis Tools Apatedns

Another great tool for performing Dynamic Malware Analysis is ApateDNS. ApateDNS is a tool for controlling DNS responses and acts as a DNS server on your local system. ApateDNS will spoof DNS responses to DNS requests generated by the malware to a specified IP address on UDP port 53. The IP address or hostname is often retrieved from the malware by performing static malware analysis, for example by examining the resources sections, or by using sandboxes. ApateDNS is also capable of recovering multiple domains using the NXDOMAIN parameter since malware often tries multiple hosts to connect to.

ApateDNS is available from FireEye and can be downloaded using the following link: ApateDNS.

Netcat

Dynamic Malware Analysis Tools Netcat

Netcat, ncat or just simply nc is a tool used to read and write to network connections using TCP and UDP. Netcat is also called the Swiss Army Knife because of the many features it offers like: port scanning, port forwarding, tunneling, proxying and a lot more. Netcat is a great tool to perform Dynamic Malware Analysis because it can make almost any network connection a malware analyst might ever need. Netcat can be used to make inbound and outbound connections on any port and can be used in client mode for connecting and in server mode for listening.

A lot of malware communicates over port 80 (HTTP) and 443 (HTTPS) because on most systems these ports are not blocked by a firewall. When performing Dynamic Malware Analysis we could use ApateDNS to redirect a DNS request made by the malware to a host which is running Netcat in servermode listening to the specified IP address on the specified port. This way we can monitor the requests made by malware using ApateDNS for redirecting requests and Netcat for monitoring the requests. In the Dynamic Malware Analysis tutorials we will be covering the use of ApateDNS and Netcat in more detail.

Netcat can be downloaded from the Nmap website here and is also included in Kali Linux.

Wireshark

Dynamic Malware Analysis Tools Wireshark

Wireshark is one of the best network protocol analyser tools available, if not the best. If you didn’t know Wireshark you probably wouldn’t be reading this article about Dynamic Malware Analysis. Wireshark is used to analyse a network to the greatest detail to see what is currently happening and capture packets to files. Wireshark can be used for live packet capturing, deep inspection of hundreds of protocols, browse and filter packets and is multiplatform. When performing Dynamic Malware Analysis Wireshark can be used to inspects packets and log network traffic to files.

Wireshark is included with Kali Linux but also available for Windows and Mac. Wireshark can be downloaded here.

INetSim

Dynamic Malware Analysis Tools InetSim

INetSim is a Linux based tool build for Malware Analysis to simulate the most common internet services like http, https, DNS, FTP and many more. When performing Dynamic Malware Analysis on a windows machine you can use a virtual machine in the same network as you malware analysis machine to run INetSim. INetSim fakes the common internet services which malware might use and answers the requests made accordingly. For example when malware requests a file, INetSim will return the file. When malware scans a webserver, INetSim will return a Microsoft IIS webserver banner in order to keep the malware running. INetSim will also log all incoming connections so you can analyse which services the malware is using and what requests it makes. INetSim is also highly configurable, when a malware uses a non-standard port for a service, you can change the listener port on a specific service in INetSim. We will be covering INetSim in more detail in the Malware Analysis Tutorials on www.hackingtutorials.org in a little while.

Websploit Wifi Jammer

Now we will be exploring the Websploit Wifi Jammer module which we’ve edited to work with the latest version of Kali Linux. The Websploit Wifi Jammer module is a great tool to automatically disconnect every client connected to the targeted wireless network and access point. The WiFi Jammer module also prevents new and disconnected clients from connecting to the WiFi network. The module has been edited to work with Kali 2.0 and the new monitoring interface names (wlan0mon, wlan1mon etc.). For your convenience we’ve also set wlan0mon as the default interface. The edited Websploit Wifi Jammer module script can be downloaded using the following link:

Wifi Jammer Python File

 

 

Replace the script in the following directory in Kali Linux:

/usr/share/websploit/modules/directory_scanner.py

Websploit Directory Scanner

Let’s open a terminal and start Websploit with the following command:

websploit

Websploit start

Use the following command to view the list of available Websploit modules:

show modules

Websploit Modules

Module web/dir_scanner scans the target for common web directories. Use the following command to set web/dir_scanner:

use web/dir_scanner

Use the following command to show available options for the used module:

show options

Websploit show options

Use the following command to set the target:

set target [url]

And the following command to set the verbosity level:

set verbosity 1

Verbosity 0 = Show found directories (302 found and 200) only
Verbosity 1 = Show all

Now type Run to run the module against the selected target:

run

Websploit run directory scanner

Adding custom directories to Websploit Directory Scanner

Open the following file:

/usr/share/websploit/modules/directory_scanner.py

Add your directories to the following lines:

websploit directory Scanner custom dirs

Make sure you use this format: ‘/wp-admin/’,

 

DIY Nitrocellulose Cannon

DIY Nitrocellulose Cannon

This is a neat desktop project that will help you get rid of some stress by firing you own mini canon. The design is well thought out and the video goes over the build in great detail. The system is quite simple, an electrical current creates some heat and fires some Nitrocellulose. The end result looks fantastic and would fit well on the edge of your desk ready for battle with your office mate.

sr_adspace_id = 8883907;
sr_adspace_width = 300;
sr_adspace_height = 250;
sr_ad_new_window = true;
sr_adspace_type = “graphic”;



Hacked Gadgets

Mooltipass – Offline Password Keeper

Mooltipass – Offline Password Keeper

Mooltipass - Offline Password Keeper

 

Worried that a site hack will compromise your passwords? This unit stores your passwords on the Mooltipass using AES-256.

“The concept behind this product is to minimize the number of ways your passwords can be compromised, while generating and storing long and complex random passwords for the different websites you use daily. It is designed to be as small as possible so it can fit in your pocket. Simply visit a website and the device will ask for confirmation to enter your credentials when you need to login. The mooltipass main components are: a smart card connector, an Arduino compatible microcontroller, a FLASH memory, an OLED screen and its touchscreen panel. The OLED screen provides good contrast and good visibility.”

sr_adspace_id = 8883907;
sr_adspace_width = 300;
sr_adspace_height = 250;
sr_ad_new_window = true;
sr_adspace_type = “graphic”;



Hacked Gadgets

How to Bypass Right Click Block on Any Website

You might remember an experience where you tried to right-click on a web page but got a pop-up message saying that the “right-click functionality has been disabled”. Sometimes you may be trying to copy an image or view the source of a web page but when the right-click is disabled, these things would seem impossible. Bank websites and other sites that require a secure transaction such as a payment gateway are the ones to impose this kind of limited functionality on their pages. In this post, I will show you the ways by which you can easily bypass right-click block feature on any website.

In order to block the right-click activity, most websites make use of JavaScript which is one of the popular scripting languages used to enhance functionality, improve user experience and provide rich interactive features. In addition to this, it can also be used to strengthen the website’s security by adding some of the simple security features such as disabling right-click, protecting images,hiding or masking parts of a web page and so on.

How JavaScript Works?

Before you proceed to the next part which tells you how to disable the JavaScript functionality and bypass any of the restrictions imposed by it, it would be worthwhile for you to take up a minute to understand how JavaScript works.

JavaScript is a client side scripting language (in most cases), which means when loaded it runs from your own web browser. Most modern browsers including IE, Firefox, Chrome and others support JavaScript so that they can interpret the code and carry out actions that are defined in the script. In other words, it is your browser which is acting upon the instruction of JavaScript to carry out the defined actions such as blocking the right-click activity. So, disabling the JavaScript support on your browser can be a simple solution to bypass all the restrictions imposed by the website.

How to Disable the JavaScript?

Here is a step-by-step procedure to disable JavaScript on different browsers:

For Internet Explorer:

If you are using IE, just follow the steps below:

    1. From the menu bar, go to Tools -> Internet Options.
    2. In the “Internet Options” window, switch to Security tab and click on the button Custom level…

IE Security Settings

  1. From the Security Settings, look for the option Active scripting and select the Disable radio button as shown above and click on “OK”.
  2. You may even select the Prompt radio button, so that each time a page is loaded, you will have the option to either enable or disable the scripting.

For Google Chrome:

If you are using Chrome, you can disable the JavaScript by following the steps below:

    1. Click on the Chrome “menu” button (on the top right corner) and selectTools.
    2. From the “Settings” page, click on Show advanced settings…
    3. Now under Privacy, click on the button Content settings…

Chrome Content Settings

  1. Under the JavaScript, select the radio button which says “Do not allow any site to run JavaScript” and click on “Done”.

For Mozilla Firefox:

Steps to disable JavaScript on Firefox:

    1. From the menu bar, click on Tools -> Options.
    2. From the Options window, switch to Content tab, uncheck the option which says “Enable JavaScript” and click on “OK”.

Firefox Content Options

How to Bypass the Right Click Block?

In order to bypass the right-click block or any other restriction imposed by JavaScript, all you need to do is just disable it in the browser and refresh the same page, so that it now reloads without JavaScript functionality. You are now free to right-click on the page, view its source or even copy any of the images that you may want to. Don’t forget to re-enable the JavaScript once again when your job is over. Otherwise lack of JavaScript support may result in unusual rendering of web pages.

WhatsApp Spy: Spy on WhatsApp Messages

WhatsApp is one of the most widely used instant messaging applications during the recent years. Attractive features like cross-platform support and media sharing has made WhatsApp to be the top choice among most users. On the other hand, WhatsApp has also become a favorite application for many cheaters to exchange secret messages and maintain illicit relationships. Therefore, in order to investigate the truth about their partners or children it becomes inevitable for many individuals and parents to spy on WhatsApp.

Ways to Spy on WhatsApp

Some of the possible ways to spy on WhatsApp messages are as described below:

1. WhatsApp Spy using a Spy App: Easiest Way

Using a spy app is the easiest way to spy on WhatsApp messages. Although there are a handful of companies marketing substandard WhatsApp spy apps on the market today, there exists a few genuine ones as well that are worth considering. One of my favorite app to spy on WhatsApp is mSpy which is known for its quality and top notch features.

The following are some of the exciting features of mSpy which makes it a perfect to spy on WhatsApp messages:

mSpy Features:

  • Spy on WhatsApp Messages and Chats.
  • WhatsApp Spy on Group Messages.
  • Spy on Internet activity including social media like Facebook, WhatsApp,Twitter and Gmail.
  • Spy on GPS locations in real-time.
  • Spy on WhatsApp Contacts.
  • Spy on keystrokes, photos and videos.
  • Spy operation works in a complete stealth mode and thus remains undetected!.

How it Works?

You will have to download and install the mSpy app onto the target phone where you need to spy on WhatsApp messages. Installation and configuration takes only a few minutes. However, for this you should have the target phone in your hand at least for a few minutes.

Once the installation is complete, the monitoring process of all the above mentioned activities (WhatsApp messages, calls, SMS, Internet, GPS, camera etc.) will begin and the recorded logs are silently uploaded to your mSpy account. You can login to your online account at any time to view the logs containing WhatsApp messages and other activity details. You can download mSpy from the link below:

Download mSpy

Compatible Phones: Android, BlackBerry, Apple iPhone, Windows Mobile, iPad and Tablets.


2. Spoofing the MAC Address: The Difficult Way

The other way to spy on someone’s WhatsApp messages is to spoof the MAC address of the target phone from your phone. This method is somewhat considered difficult and require a moderate amount of technical skills to perform. Let me explain.

WhatsApp has a small vulnerability which allows you to run the same WhatsApp account on two phones provided they both have the same MAC address. For this, you will have to gain access to the target phone to record its MAC address and spoof the same on your device. This is how you can find the MAC address of the target phone:

For Android – Head over to Settings —> About phone —> Status—> Wi-Fi MAC address

For iPhone – Head over to Settings—> General —> About —> Wi-Fi address

For Windows Phone – Head over to Settings —> About —> More info —> MAC address

For BlackBerry – Head over to options —> Device —> Device and Status info —> WLAN MAC

Once you have recorded the target phone’s MAC address, you will have to spoof the MAC address on your android phone. After this is done, install WhatsApp on your phone, configure it using the target person’s phone number and verify the WhatsApp account using the verification code received on the target phone.

If you successfully manage to execute all the above mentioned steps, you will have a replica of the target user’s WhatsApp account running on your phone. That means you will receive notifications on your phone for each and every activity of the target WhatsApp user. To spy WhatsApp messages, I still recommend the usage of mSpy as this method is lot simpler than that of spoofing MAC address.

Download mSpy

How to Change Your IP Address

Change IP Address

Every time you connect to the Internet, your ISP (Internet Service Provider) assigns an IP address to your computer that makes it possible for websites and applications to keep track of your online activities and also pin point your physical location. Therefore, in order to protect your Internet privacy, it is often necessary to change your IP address.

Ways to Change IP Address

The following are some of the possible ways to change IP address of your computer:

1. Using a VPN: Best Way to Change IP Address

Even though there are several methods to change your IP address, using a VPN proxy is by far the best and most secure way. The following are some of the most popular VPN proxies that most Internet users prefer:


  • Hide My Ass VPN – Hide My Ass is one of the most popular and trusted VPN service that provides a fast and secure proxy server to allow people to easily change their IP address and also obtain IP address from any country of their choice.

Download Hide My Ass VPN

  • VyprVPN – VyprVPN offers the world’s fastest VPN services to make it possible for its clients to easily change their real IP using a proxy and supports wide range of operating systems.

Download VyprVPN


Advantages of using VPN over other methods:

  • Fast, secure and highly reliable. All your web traffic is encrypted to keep your data safe from hackers and also protect your privacy.
  • You can choose from a list of countries and locations to obtain a new IP address. This makes it possible to have your origin from any country of your choice.
  • Easily bypass regional blocks to access sites and content that are restricted for your location.

2.Change IP by Restarting the Router

Every time you connect to the Internet your ISP may assign a different IP to your computer called dynamic IP. If your Internet connection uses a dynamic IP you can easily change it just by restarting your network device such as modem/router. All you need to do is just turn off its switch for a few seconds and turn it on again to get a different IP address assigned.

Unlike using a VPN, this method has quite a few drawbacks. Your newly assigned IP will have the same location or country as before and therefore if you’re trying to bypass a country block it would not be possible. Moreover, if your Internet connection uses a static IP address, you will get the same IP assigned no matter how many times you restart your router.

3. Using Free Web Proxy to Change Your IP Address

If you cannot afford a VPN service or restarting the router doesn’t get you a new IP, you can try some of the free browser based proxy services that help you change your IP address and surf anonymously. The following are some of the websites that offer free proxy services:

Drawbacks of using free web proxies

Even though these services come free of cost they also come with some of the following drawbacks:

  • Most of them are slow and websites take a lot of time to load.
  • Security and privacy is questionable as most of these free services are unreliable.
  • Users have to bare with annoying ads and pop-ups as these sites need to generate revenue to compensate for free service.
  • Limited or no choice over the selection of your IP location.

How to Ensure that Your IP is Changed?

To know your current IP address just type what is my ip address on Google and your public IP address should be displayed in the search results. Once you’ve successfully implemented one of the above mentioned IP changing methods, you can re-check your IP on Google to make sure that you have got a new one.

Change IP Address

The above snapshot shows the Google search result page displaying a new IP address after the router is restarted.

Android’s SECRET Codes 2018

Android Secret/Hidden codes 2015 :-

 *#06# – IMEI (International Mobile Station Equipment Identity) number – essential in case your device is stolen and you want to block the thief from accessing your network

 *#*#7594#*#*  Make Power button turn off your device without displaying menu

*#*#4636#*#* – Display information about phone, battery, usage and WiFi

*#*#7780#*#* – Factory reset (deletes app data and apps, not firmware)

*2767*3855# – Complete phone wipe, including firmware (not to be used lightly!)

*#*#273283*255*663282*#*#* – Back up all your photos and videos
*#*#1472365#*#* – Test your GPS
*#*#1234#*#* – Display phone firmware and PDA info

 

androidpit-secret-testing-menu-w782
You can access the above screen on most Android devices by entering*#*#4636#*#* on the dialpad

 

*#*#232338#*#* – Show WiFi Mac address
*#*#8255#*#* – Access GTalk Service Monitor
*#*#36245#*#* – Access Email debug info Email
*#*#225#*#* – Events calendar
*#*#426#*#* – Debug info for Google Play Service
*#*#759#*#* – Access Google Partner Setup

#Samsung SECRET Codes :-

 

*#*#34971539#*#* – Show all camera information
*#*#197328640#*#* – Enable test mode for services
*#*#232339#*#* – Wireless LAN test
*#*#1575#*#* – Test your GPS (alternative to generic Android GPS test)
*#*#0*#*#* – Test your LCD display
*#*#4986*2650468#*#* – Display crucial phone information (PDA, Hardware, firmware etc.)
##778 (followed by the Call button) EPST menu

#HTC SECRET Codes New :-

*#*#3424#*#* HTC function test Program
*#*# – HTC Info menu
*#*#8255#*#* – Launch GTalk Service Monitor
##3424# – Diagnostic mode
##3282# – EPST menu
##8626337# – VOCODER
##33284# – Field trial menu
##786# – Reverse Logistics Support
##7738# – Protocol Revision

How To Reset Windows 8/8.1 Admin Password Without Knowing Old Password

How To Reset Windows 8/8.1 Admin Password Without Knowing Old Password

Today millions of users are using the latest version of Windows that is Windows 8 and 8.1 which is currently providing lots of features for their users. In this version you need to enter PIN or the password to access the administrator account but what if you forget your windows password. You think you need to install the new operating system in your computer system to access the services but actually you can change the password with the method with which we are here. So lets have a look on the method of How To Reset Windows 8/8.1 Admin Password Without Knowing Old Password. Yes it is possible and you can do  it with your self by just following a simple trick that i have discussed below.

How To Reset Windows 8/8.1 Admin Password Without Knowing Old Password

How-To-Reset-Windows-8-Password

How To Reset Windows 8 Password

This method is based on Windows 8/8.1 password cracking through other virtual OS that you will run on your computer without actually installing it. With this you will access the internal files of computer and reset admin panel.


Just proceed through below steps.

First of all you need to create a Linux Live Cd through linux ISO File.Now boot this CD in your computer through boot menu.Now there navigate to C:\Windows\System32.And there rename sethc.exe to sethc1.exe.And rename cmd.exe to sethc.exe.Now simply restart your computer.Now you will see you login screen, simply press shift button five times.You will see command prompt will open.34There type net user and hit enter.14Now you will see the name of administrator account note it down.Now type net user user_name new password and hit enter as shown in screenshots.24Thats it now type the password in login panel and you are logged in.

So above is all about How To Reset Windows 8/8.1 Admin Password Without Knowing Old Password. By this you can easily revover your forgotten password in windows and there will be no need to install new operating system in your computer to access the services. Hope you like the post, don’t forget to share it with your friend