Category Archives: (D) Advanced Hacking

Hacking Vax’s & Unix

Hacking onto a unix system is very difficult, and in this case, we advise
having an inside source, if possible. The reason it is difficult to hack a
vax is this:  Many vax, after you get a carrier from them, respond=>
They give you no chance to see what the login name format is.  Most commonly
used are single words, under 8 digits, usually the person's name.  There is
a way around this:  Most vax have an acct. called 'suggest' for people to
use to make a suggestion to the system root terminal.  This is usually watched
by the system operator, but at late he is probably at home sleeping or
screwing someone's brains out.  So we can write a program to send at the
vax this type of a message:
A screen freeze (Cntrl-s), screen clear (system dependant), about 255
garbage characters, and then a command to create a login acct., after which
you clear the screen again, then unfreeze the terminal.  What this does:
When the terminal is frozen, it keeps a buffer of what is sent.  well, the
buffer is about 127 characters long. so you overflow it with trash, and then
you send a command line to create an acct. (System dependant).  after this
you clear the buffer and screen again, then unfreeze the terminal.  This is
a bad way to do it, and it is much nicer if you just send a command to
the terminal to shut the system down, or whatever you are after...
There is always, *Always* an acct. called root, the most powerful acct.
to be on, since it has all of the system files on it.  If you hack your
way onto this one, then everything is easy from here on...
On the unix system, the abort key is the Cntrl-d key.  watch how many times
you hit this, since it is also a way to log off the system!
A little about unix architechture: The root directory, called root, is
where the system resides.  After this come a few 'sub' root directories,
usually to group things (stats here, priv stuff here, the user log here...).
Under this comes the superuser (the operator of the system), and then
finally the normal users.  In the unix 'Shell' everything is treated the same.
By this we mean:  You can access a program the same way you access a user
directory, and so on.  The way the unix system was written, everything,
users included, are just programs belonging to the root directory.  Those
of you who hacked onto the root, smile, since you can screw everything...
the main level (exec level) prompt on the unix system is the $, and if you
are on the root, you have a # (superuser prompt).
Ok, a few basics for the system... To see where you are, and what paths
are active in regards to your user account, then type
=> pwd
This shows your acct. seperated by a slash with another pathname (acct.),
possibly many times. To connect through to another path,
or many paths, you would type:
You=> path1/path2/path3
and then you are connected all the way from path1 to path3.  You can
run the programs on all the paths you are connected to.  If it does
not allow you to connect to a path, then you have insufficient privs, or
the path is closed and archived onto tape.  You can run programs this way
you=> path1/path2/path3/program-name
Unix treats everything as a program, and thus there a few commands to
To see what you have access to in the end path, type=>
for list.  this show the programs you can run.  You can connect to
the root directory and run it's programs with=>
By the way, most unix systems have their log file on the root, so you
can set up a watch on the file, waiting for people to log in and snatch their
password as it passes thru the file. To connect to a directory, use the
=> cd pathname  This allows you to do what you want
with that directory.  You may be asked for a password, but this is a good
ay of finding other user names to hack onto.
The wildcard character in unix, if you want to search down a path for
a game or such, is the *.
=> ls /*
Should show you what you can access. The file types are the same as they
are on a dec, so refer to that section when examining file.  To see what is
in a file, use the
=> pr
filename command, for print file.
We advise playing with pathnames to get the hang of the concept.  There
is on-line help available on most systems with a 'help' or a '?'.
We advise you look thru the help files and pay attention to anything
they give you on pathnames, or the commands for the system.
You can, as a user, create or destroy directories on the tree beneath you.
This means that root can kill everything but root, and you can kill any
that are below you.  These are the
=> mkdir pathname
=> rmdir pathname
Once again, you are not alone on the system... type=> 
to see what other users are logged in to the system at the time.  If you
want to talk to them=>
write username 
Will allow you to chat at the same time, without having to worry
about the parser.  To send mail to a user, say
=> mail
And enter the mail sub-system. To send a message to all the users
on the system, say
=> wall
Which stands for 'write all'. By the way, on a few systems,
all you have to do is hit the <return> key to end the message,
but on others you must hit the cntrl-d key.
To send a single message to a user, say
=> write username
this is very handy again!  If you send the sequence of characters discussed
at the very beginning of this article, you can have the super-user terminal do
tricks for you again. 

If you want superuser privs, you can either log in as root, or edit your
acct. so it can say
=> su
this now gives you the # prompt, and allows you to completely by-pass the
protection.  The wonderful security conscious developers at bell made it
very difficult to do much without privs, but once you have them, there
is absolutely nothing stopping you from doing anything you want to.
To bring down a unix system:
=> chdir /bin
=> rm *
this wipes out the pathname bin, where all the system maintenance files are.
Or try:
=> r -r
This recursively removes everything from the system except the remove
command itself.
Or try:
=> kill -1,1
=> sync
This wipes out the system devices from operation.
When you are finally sick and tired from hacking on the vax systems, just
hit your cntrl-d and repeat key, and you will eventually be logged out.
The reason this file seems to be very sketchy is the fact that bell has 7
licenced versions of unix out in the public domain, and these commands are
those common to all of them.  I recommend you hack onto the root or
bin directory, since they have the highest levels of privs, and there
is really not much you can do (except develop software) without them.

WAFNinja – Web Application Firewall Attack Tool – WAF Bypass

WAFNinja is a Python-based Web Application Firewall Attack Tool designed to help penetration testers execute WAF bypass by automating the steps necessary to bypass input validation.

WAFNinja - Web Application Firewall Attack Tool - WAF Bypass


The tool was created with the objective to be easily extendible, simple to use and usable in a team environment.

What can WAFNinja Web Application Firewall Attack Tool Do?

Many payloads and fuzzing strings, which are stored in a local database file come shipped with the tool.

WAFNinja supports:

  • HTTP connections
  • GET requests
  • POST requests
  • Using Cookies (for pages behind auth)
  • Intercepting proxy

Using WAFNinja for WAF Bypass

Examples of Web Application Firewall Attacks




You can download WAFNinja here:

Or read more here.

How to Identify Network Vulnerabilities with NetworkRecon.ps1

nitially, I attempted to build a tool that would collect and analyze traffic presenting output similar to that produced by PowerUp.ps1 Invoke-AllChecks as seen below. PowerUp is used to provide very concise feedback indicating where an operating system’s configuration might allow privilege escalation. The intent for this script was to do the same for network protocol abuse.

In investigating the available options, I found that working with the facilities for packet capture and analysis using PowerShell (particularly Windows 7 and older operating systems) were not optimal for creating this output in all cases.

Fortunately, I was already familiar with Invoke-Inveigh written by Kevin Robertson and included in several other exploitation frameworks. After running into issues with the collect and analyze workflow, I adopted the packet sniffing capabilities observed in this and other tools as an alternative.

The script includes three functions; Invoke-NeighborAnalysis, Invoke-TraceCollect, and Invoke-LiveAnalysis. These functions provide different detective capabilities to identify CDP, DTP, VTP, LLDP, mDNS, NBNS, LLMNR, HSRP, OSPF, and VRRP protocols which may be used for information gathering or indicate vulnerability to attack. In addition, the script analyzes DHCP responses looking for options that indicate network boot is supported.


Invoke-NeighborAnalysis attempts to detect the presence of the protocols listed above at layer 2 of the OSI model. This function uses the output from either “arp -a” or Get-NetNeighbor based on the supported PowerShell version. The output is analyzed looking for corresponding multicast layer 2 and layer 3 addresses indicating that a protocol is likely in use and visible from the end host. The packet sniffer uses a raw socket and doesn’t collect Ethernet frames. As a result, this is the only way that CDP, DTP, VTP, and LLDP can be detected at present. I did some research on collecting Ethernet frames using PowerShell but came up empty handed. Output from Invoke-NeighborCacheAnalysis can be seen below.


Invoke-TraceCollect does exactly what it sounds like. It simply records network traffic in a trace file for a user specified period (default is 5 minutes) so the user can move the traffic off and analyze it with another tool.  This function will output either a “.cap” file or a “.etl” file depending on the operating system features. Windows 8.1 and newer supports the Protocol Engineering Framework (PEF) PowerShell commandlets by default.  This framework allows one to directly save a network trace in packet capture format. Older versions of Windows support the Event Trace Log (ETL) format which records packets in an XML and binary format. ETL format can be converted to packet capture as well. However, Microsoft Message Analyzer (an additional Microsoft software package) is used to do so. The output from this function simply indicates which format is being used and where the trace file is being written. To run this function, you must have administrator permissions on the target computer.


Invoke-LiveAnalysis uses a raw IP socket to pick traffic up off of the wire and perform analysis. This method uses the layer 3 multicast addresses and well known ports to identify the presence of protocols of interest.  The user is notified when mDNS, NBNS, LLMNR, HSRP, OSPF, or VRRP packets are observed. Notifications include details parsed from observed traffic such as authentication method, passwords or hashes used, and hostnames for which queries are observed.  Output from several of the protocols above can be seen in the screen captures below.

The protocols listed above were selected due to the presence of attacks and tools available for each. Protocols and their related vulnerabilities are identified below.

  • CDP and LLDP may expose information valuable to an attacker such as Layer 2 device names and firmware revisions.
  • DTP and VTP may allow an attacker to access protected areas of the network through VLAN hopping attacks.
  • mDNS, NBNS, and LLMNR may allow an attacker to send poisoned responses to multicast name resolution request. These attacks, executed by tools like Invoke-Inveigh and Responder, can result in credential compromise or direct exploitation by directing requesting hosts to an attacker controlled computer.
  • HSRP and VRRP may allow an attacker to become a Man-in-the-Middle (MitM) by electing an attacking computer as the active router in a redundant configuration.
  • OSPF may allow an attacker to become a MitM by manipulating the OSPF routing table.
  • Discovery of DHCP boot options may allow an attacker to boot an authorized operating system or download and analyze the boot image for valid credentials.

The end goal for this tool is to include intelligence gathering and attack capabilities for all of the Layer 3 protocols identified above.  Further investigation into Layer 2 protocols will continue to determine whether Layer 2 attacks will be possible using the native PowerShell interface.

You can find the full script at and an expanded explanation of each of the functions at .

jSQL – Automatic SQL Injection Tool In Java

jSQL is an automatic SQL Injection tool written in Java, it’s lightweight and supports 23 kinds of database.jSQL - Automatic SQL Injection Tool In Java

It is free, open source and cross-platform (Windows, Linux, Mac OS X) and is easily available in Kali, Pentest Box, Parrot Security OS, ArchStrike or BlackArch Linux.


  • Automatic injection of 23 kinds of databases:
    • Access
    • CockroachDB
    • CUBRID
    • DB2
    • Derby
    • Firebird
    • H2
    • Hana
    • HSQLDB
    • Informix
    • Ingres
    • MaxDB
    • Mckoi
    • MySQL{MariaDb}
    • Neo4j
    • NuoDB
    • Oracle
    • PostgreSQL
    • SQLite
    • MS SQL Server
    • Sybase
    • Teradata
    • Vertica
  • Multiple injection strategies: Normal, Error, Blind and Time
  • SQL Engine to study and optimize SQL expressions
  • Injection of multiple targets
  • Search for administration pages
  • Creation and visualisation of Web shell and SQL shell
  • Read and write files on host using injection
  • Bruteforce of password’s hash
  • Code and decode a string


Install Java 8, then download the latest release of jSQL Injection and double-click on the file jsql-injection-v0.79.jar to launch the software. You can also type java -jar jsql-injection-v0.79.jar in your terminal to start the program. If you are using Kali Linux then get the latest release using commands apt update then apt full-upgrade.

Future Roadmap

  • Netezza Support
  • Test coverage with Jacoco
  • Integration test with Docker and JPA Hibernate Jooq
  • Maven
  • Core swing CLI
  • Full Path Disclosure
  • DIOS RoutedQuery OOB UpdateInsertDelete
  • Bruteforce HTTP Auth using NTLM
  • Arabic translation
  • Command-line interface
  • Dictionary attack
  • WAF Detection
  • Program self-updater

You can download jSQL here:


Or read more here.

EvilAbigail – Automated Evil Maid Attack For Linux

EvilAbigail is a Python-based tool that allows you run an automated Evil Maid attack on Linux systems, this is the Initrd encrypted root fs attack. An Evil Maid attack is a type of attack that targets a computer device that has been shut down and left unattended.

EvilAbigail - Automated Evil Maid Attack For Linux

An Evil Maid attack is characterized by the attacker’s ability to physically access the target multiple times without the owner’s knowledge.



  • Laptop left turned off with FDE turned on
  • Attacker boots from USB/CD/Network
  • Script executes and backdoors initrd
  • User returns to laptop, boots as normal
  • Backdoored initrd loads:
    • (Debian/Ubuntu/Kali) .so file into /sbin/init on boot, dropping a shell
    • (Fedora/CentOS) LD_PRELOAD .so into DefaultEnviroment, loaded globally, dropping a shell.

Supported Distros

  • Ubuntu 14.04.3
  • Debian 8.2.0
  • Kali 2.0
  • Fedora 23
  • CentOS 7

You can download EvilAbigail here:

Start your Own Darknet : How to Create a .Onion Website on the Dark Web

This part is all about: How to create a .onion website on the dark web

The article is a bit complex, you need to know some code and servers, or at least – to have the wheel to learn.

It is assumed that about 95% of www content is delivered over the dark web. Just 5% of the web is visible to us via Google and other search engines. The rest is hidden on the dark web where one can only access it using a special browser called Tor. In this tutorial I will teach you how to start a .onion website, a website only accessible on the Tor network.

Technically speaking creating a dark web site, or a .onion website, isn’t much different than creating a regular, open web website.

You can use any programming language or web framework to create it, however there are a few things to keep in mind. Dark web services never request for a visitor’s email address in order for him to create a member account. Upon registration, users select their desired password and are given a unique identifier in the form of a PIN code or a mnemonic to reset their password. Dark web sites will also never link to css or a javascript library, nor use javascript code as part of their website. Creating an .onion web site is therefore similar to creating regular web sites, except that some security and privacy issues need to be thought of when creating them.

To summarise, running a .onion site raises some unique challenges:

  • You need to make sure you pay for your site’s hosting anonymously, using a credit card or pay pal to pay for your hosting is out of the question!
  • Your site should avoid using Javascript, Flash or Java – therefore you should disable them on your .onion site.
  • You cannot afford any security holes on your server.
  • Your site might attract questionable user content that might go against certain legalities.
  • Your server should never send any emails. It is a common practice on .onion sites not to ask for one’s email.
  • Your site should only be served over https, never over http.

Sites on the Tor network use a .onion domain names .onion.

Unlike the regular, visible web domain name system, you don’t have to purchase or register a domain name to set up a dark web site. Anyone can create a .onion address. Basically each hidden service generates a public and private key pair in the process of setting up the service. The onion address is simply a hash of your service’s public key. Since only the administrator should have the private key, kept in private for himself, no other onion service can impersonate your hidden service. I will explain in details how this is done further down in this tutorial.

I recommend using Debian linux to host your onion site. From here under, I will assume a basic knowledge of linux OS.

What you will need:


  1. A dedicated web server hosting service paid in bitcoin. Up to 100 USD monthly costs.
  2. An anonymous VPN account to further mask your identity. 2-9 USD monthly costs.
  3. A uniform server package consisting of PHP, MySQL and Apache. Free!
  4. Tor browser bundle. Free!

Start with a fresh install on the web server. Make sure you never give personal information to the hosting company so you maintain your privacy 100%.

We will use nginx as the web server to serve the web site and configure it to only listen for tor connections.

[indicator label=”Starting the Proces” value=”10″]

Install the web server (nginx) for your .Onion Site

$ sudo apt-get install nginx

By default nginx is broadcasting what version it is running. Let’s set server_tokens to off on /etc/nginx/nginx.conf:


http {

server_tokens off;


On /etc/nginx/nginx.conf, make sure we also disable logging:

http {

# Logging Settings

#access_log /var/log/nginx/access.log;
#error_log /var/log/nginx/error.log;

error_log /dev/null crit;

[indicator label=”You are getting close to your first .onion site” value=”35″]

Configure your server to listen on port 8080

Your web site files default location would be placed in /usr/share/nginx/www (Debian default), so this is the complete contents of your sites-available/default file:

server {
listen default_server;
server_name localhost;

root /usr/share/nginx/www;
index index.html index.htm;

location / {
deny all;


[indicator label=”allmost there!” value=”55″]

Restart your web server


$ sudo service nginx restart


Disable server logging:

$ sudo apt-get remove –purge rsyslog

Disable any service on the server that might send out emails:

$ sudo apt-get remove –purge sendmail
$ sudo apt-get remove –purge exim
$ sudo apt-get remove –purge postfix

Make sure you remove wget, so if your server is compromised, it can’t be used to identify your host through malicious scripts:
$ sudo apt-get remove wget

In /etc/ssh/sshd_config file (If allowing ssh), make sure to disable the Debian banner which can be used to identify the Debian version from the public ip:
DebianBanner no

[indicator label=”Just 2 more clicks and you there” value=”85″]

Install Tor on your web server

Head on to docs to add the Debian repo so you can sudo apt-get install tor from the tor project repository.

sudo apt-get install tor

Edit /etc/tor/torrc

HiddenServiceDir /var/lib/tor/hidden_service/
HiddenServicePort 80

Restart the tor service

$ sudo service tor start

Now, after Tor is started, it will create a private/public key pair in your HiddenServiceDir, from which your site’s unique .onion domain name will be created.

To view those key files, run:
cd /var/lib/tor/hidden_service/



if you would run the below command it would show you your site’s newly generated .onion domain name, e.g: ghyt14wfhbkk3gzv.onion:
cat hostname

Now open your Tor browser, if you head on to ghyt14wfhbkk3gzv.onion you should see your nginx default site page:

[indicator label=”Boom! you manage your own .Onion site” bg=”#5bc668″ value=”100″]

A few things to keep in mind:

  • Once your site is built and running, check its html source code, make sure you don’t use any javascript files nor link to any google fonts or 3rd party css files that might reveal your server’s public IP address.
  • Make sure you install https and always serve your site over https.
  • Never share your site’s private key with anyone. If you do so someone else can impersonate your server. You must get a new domain name or .onion address.
  • Always keep your server software up to date
  • For extra security and your identity masking, always access the dark web over VPN. Pay for your VPN & Hosting service using bitcoin. As an extra precaution, use a Bitcoin Tumbler before transferring bitcoin to your bitcoin wallet to fund your dark web venture. Use that wallet for any payments related to this venture.

theHarvester – Gather E-mail Accounts, Subdomains, Hosts, Employee Names – Information Gathering Tool

theHarvester is a tool to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database.

This tools is intended to help Penetration testers in the early stages of the project It’s a really simple tool, but very effective.

The sources supported are:

  • Google – emails,subdomains/hostnames
  • Google profiles – Employee names
  • Bing search – emails, subdomains/hostnames,virtual hosts
  • Pgp servers – emails, subdomains/hostnames
  • Linkedin – Employee names
  • Exalead – emails,subdomain/hostnames

New Features

  • Time delays between requests
  • XML and HTML results export
  • Search a domain in all sources
  • Virtual host verifier
  • Shodan computer database integration
  • Active enumeration (DNS enumeration,DNS reverse lookups, DNS TLD expansion)
  • Basic graph with stats



Searching emails accounts for the domain, it will work with the first 500 google results:

Searching emails accounts for the domain in a PGP server, here it’s not necessary to specify the limit.

Searching for user names that works in the company microsoft, we use google as search engine, so we need to specify the limit of results we want to use:

Searching in all sources at the same time, with a limit of 200 results:

You can download theHarvester here:

LazyDroid – Android Security Assessment Tool

Lazydroid is a tool written as a bash script to facilitate some aspects of an Android Security Assessment.

LazyDroid - Android Security Assessment Tool


It provides some common tasks such as:

  • Set the debug flag of an application to true
  • Set the backup flag of an application to true
  • Re-Build the application
  • Re-Sign the application
  • Smart log extraction of an application
  • Extract the APK of an application installed from Google Play
  • Download any mobile folder (/sdcard/, application data folder, other)
  • Compare two different snapshots of the same folder
  • Insert Frida gadget in the APK (for example when the phone is not or cannot be rooted, and thus Frida server cannot be run)


Lazydroid requires Linux or Mac OS to run and the next tools installed:

  • apktool
  • jarsigner
  • adb
  • aapt (Android Asset Packaging Tool, part of the SDK)
  • your keystore and alias
  • Frida Agent (pip install frida)


To run the steps would be the following:

You can download LazyDroid here:

Or read more here.

110+ Free Proxy Sites – Free Proxy Servers

Many times, we face problems while accessing some websites. These problems arise due to the webpage not been available on the website / URL is blocked. However, you still need to access these sites from a place where it is blocked. So, the best method or solution here to access your useful websites is by using a proxy website. Proxy websites are designed to open many restricted websites which are blocked and places like colleges, government offices, schools, and other IP restricted areas.

Proxy sites therefore not only help you to access your blocked content but also help to surf the Internet anonymously. These sites are very easy and helpful to use. These sites simply redirect your entire traffic through the network by their service so that you can access the website directly. This is possible because when websites are blocked that servers are not blocked necessarily.
Hence today we have compiled a list of proxy websites which are helpful to you in many kinds of situations.

1.Skull Proxy 
This is the newest yet most powerful proxy server that you should use to access your desired site. The load time of the page is also quite low. This gives way for fast and easy access.

2.Hidester | Anonymous Free Web Proxy 

Many people use this proxy site for various reasons. Cool one of them is to avoid tracked by government multinational and even cybercriminals. This site can easily allow you to view your content from behind a Firewall or even unlock content at work.
It is absolutely safe and easy web proxy which will guarantee your privacy.

3. Hide My Ass VPN 

This is perhaps the most well-known proxy in the industry which is both available in the free and premium version.

4. – Best proxy server 

Of many proxy websites, available this is one of the best because of multiple advantages. It is an awesome website with completely free services. The homepage contains a URL box where we have to directly enter the URL we want to access. There are many more options such as enabling JavaScript and cookies can be allowed depending on our choices. The website is also clean with not too many ads or pop ups.


This is again a very impressive proxy server which has an amazing site interface. It has really nice responsive UI similar to many professional websites. This website also provides with several service from different parts of the countries like US and Europe. So, if one of the proxy servers does not work for you then another will work surely. There are many more additional options to manage cookies and edit user agents too.

100+ Free Proxy Sites – Free Proxy Servers 



  1. Vtunnel –
  2. 4everproxy –
  3. Unblock My Web –
  4. YouTube Unblock Proxy –
  5. Working Proxy –
  6. New Ip Now –
  7. Proxy 2014 –
  8. –
  9. Unblock YouTube Free –
  10. Proxify –
  11. Ninja Clock –
  12. –
  13. HideMyAss –
  14. AnonyMizer –
  15. kProxy –
  16. Zfreez –
  17. AnonyMouse –
  18. Free Open Proxy –
  19. Vobas –
  20. Don’t Filter –
  21. BlewPass –
  22. Unblock YouTube Beat School –
  23. HideOnline Proxy –
  24. Hiding Your Info –
  25. Free YouTube –
  26. Unblocker –
  27. Fast USA Proxy –
  28. YouTube Free Proxy –
  29. Proxyo –
  30. Quickproxy –
  31. Defilter –
  32. Free Proxy Server –
  33. Free YouProxyTube –
  34. The Best Proxy –
  35. EXCS –
  36. VPN Browse –
  37. ProxyOne –
  38. Rapid Proxy –
  39. Web Proxy Free –
  40. Hide The Internet –
  41. Greatest Free Proxy –
  42. Just Proxy –
  43. Singapore Proxy –
  44. Travel VPN –
  45. Proxy-2014 –
  46. PRO Intern –
  47. Host App –
  48. Fun Proxy –
  49. Fast Time –
  50. Can’t Block This –
  51. Work Host –
  52. Proxy Call MeNames –
  53. Singapore Proxy –
  54. Travel VPN –
  55. PRO Intern –
  56. Host App –
  57. Fun Proxy –
  58. Fast Time –
  59. Work Host –
  60. Proxy Call MeNames –
  61. Suede Proxy –
  62. To Proxy –
  63. US Proxy –
  64. Spedo –
  65. PHProxy –
  66. London Proxy –
  67. Kr Proxy –
  68. America Proxy –
  69. PK Proxy –
  70. Brazil Proxy –
  71. Canada Proxy –
  72. CA Proxies –
  73. WebSurf Proxy –
  74. Proxy 2015 –
  75. FB Proxies –
  76. US Proxy –
  77. You Liaoren –
  78. Proxy Internet –
  79. Fish Proxy –
  80. Zacebook PK –
  81. Jezus Loves This Proxy –
  82. German Proxy –
  83. Proxys –
  84. Justun Block IT –
  85. Proxy This –
  86. kProxy Site –
  87. ViewTube –
  88. HideMyTraxProxy –
  89. Proxay –
  90. Working Proxy –
  91. F4FP –
  92. Sporium –
  93. Saoudi Proxy –
  94. Proxy Browse –
  95. Proxy 4 Freedom –
  96. PRO Unblock –
  97. Star Doll Proxy –
  98. HideMyAss UK –
  99. DZ Hot –
  100. TiaFun-
  101. 1FreeProxy –
  102. Network ByPass –
  103. Me Hide –
  104. Go Proxy –
  105. Zalmos –
  106. Intern Cloud –
  107. Xite Now –
  108. Surf For Free –
  109. Hidden Digital –

Learn How To Hack Wifi Password From Android – 2017

Hack wifi with android: Latest tricks to crack wifi password without root your android device. Yes, you read correctly this latest article helps you to hack neighbors wifi password using CMD ( Command Prompt ). Finally, we got the full working trick to crack wifi internet connection using Android device. We have received many requests from our blog readers about How to hack wifi with android.


How To Hack Wifi Password In Android

WPS (WiFi Protected Setup) is a standard wireless network security. The main purpose of this wireless protocol is to know wireless security. This security protocol is developed by Wifi Alliance in 2006 with the aim to make a fully secure wireless internet network. Android is a Linux Kernal based operating system so you can easily unlock wifi passwords. But you need to very small requirements and follow certain steps. Most of the airtel broadband use Dlink routers and this router mostly hacked by a rooted android device.

Methods to find wifi password on iPad is very simple and easy to implement. There are lots of tricks available on the internet. But most of the tricks are not working or fake tricks available. Today in this article we are going to share best hacking software for windows. We are getting daily lots of question like how to crack wifi password? How to find wifi password without root?



Method 1: WPS Wireless Scanner APP

WPS Wireless Scanner APP is a one of the most popular android application to crack wifi on non rooted android device. Now just follow below step by step process.

  • First, step to download WPSPIN android application from below link.

Download WPSPIN Android Apk

  • After download install this app on your android device and open it.
  • This android application will automatically scan for WPS enabled wireless networks.
  • After scan complete click on the WiFi connection.
  • And note down the eight digit pin number.
  • You can use this 8 digit pin number instead of a password.
  • Now enter the 8 digit pin number in place of a password of Wifi.
  • And enjoy the free wifi internet connection.

Method 2: Wifi WPS WPA Tester – Hack Wifi On iPhone

Wifi WPS WPA tester is the best android application to bypass any wifi password. Wifi WPS WPA Tester only supports latest version of android 5.O & Android Marshmallow. Your android device is must be updated. Follow below step by step process to use wifi WPS WPA tester apk.

  • Download WPS WPA tester android application from below direct download link.

Download Wifi WPS WPA Tester App

  • After download just install WPS/WPA tester app in your android device and open it.
  • After that click on the refresh button.
  • If you find a green button that means this app automatically hack wifi.
  • If this app shows red button it means wifi is strongly password protected.
  • Choose any green signal WiFi connection and click on connect automatic pin.
  • This app finds password within a few seconds.
  • And enjoy the free wifi on non rooted android device.

Method 3: Using AndroDumper Android App

AndroDumper apk is another best android application which helps you to hack wifi passwords on non rooted android device. For use, Andro Dumper android application follows below step by step process.

  • Download AndroDumper android application from below link direct download link.

Download AndroDumper Apk

  • After download install AndroDumper app in your android device and open it.
  • Now press the refresh button at top of the screen.
  • Select try connects option from the pop-up and this app finds wifi password within a few seconds.
  • Enjoy free wifi on non rooted android device.

Tricks 4: Wifi Password Scrapper

Wifi password scrapper is a most useful android application on google play store. This android app not required rooted android device so you can use this android application on non rooted android device. This app scans for available wifi network and hacks their password. Just follow below step by step process.

  • First download wifi password scrapper android application from below direct download link.

Download Wifi Password Scrapper

  • After download install in your android device and open it.
  • Now refresh for getting available networks.
  • On available wifi networks, you can see a green lock icon.
  • Click on the green lock icon and this app automatically connect to wifi networks.

Hack wifi using Kali Linux without wordlist.

Method 5: Bcmon Android Apk

Bcmon app is used to enable monitor mode on your rooted android device. But this method is only used for broadcom chipset supported android device. Bcmon means broadcom bcm4329/4330 wifi chipset. The best part of this app is also supported wifi cards. Bcmon app is required the rooted android device. This android app required rever android app is used to attack WPS enabled routers and find the WPA key. Bcmon App required approx 2-3 hours to crack WPS enable wifi network. And sometimes it will never successful it depends on the network type. Here we are providing latest and 100% working trick to how to hack wifi internet connection.

Requirement For Use Bcmon App On Android

  • Android device must be supported broadcom wifi chipset
  • The device is must be rooted.

Follow below step by step process to crack WPA/WPA2 enable wifi on the android device using Bcmon android application.

  • The first step to download Bcmon android application from below link direct download link.

Download Bcmon app

  • After download install Bcmon app in your android device and open it.
  • And install firmware tools and click on enable monitor mode
  • Now download rever and install on your android device.
  • After that check the box of an automatically advanced setting option.
  • Rever is used to check available access point of WPS enables wifi networks.
  • After scan chooses the WPS to enable network and click on start attack button.

Hack WEP Enable Wifi In Android Device

WEP is very weak wireless network security protocol. And is no more preferred protocol because WEP is not secure than WPA and this protocol is hacked within a second. This method is also required rooted android device and Bcmon android app. For crack WEP enables wifi network to follow below step by step process.

  • First, download Bcmon android app from below direct download link.
  • After that install in your rooted android device and open.
  • Now click on run Bcmon terminal option.
  • Type airdump-ng command in terminal and hit enter.
  • Now on new window type airodump-ng wlan0 and hit the enter button.
  • After that open rever app and note down the wifi name, a broadcasting channel and Mac address of WEP wifi network.
  • Start scanning the wifi and collect packages. Now type the below command

airodump-ng -c channel# –bssid MAC address -w outputfile ath()

  • MAC address is the MAC address of the router and channel# is the broadcasting channel. The complete command is below.

airodump-ng -c 9 –bssid 00:19:2G:7E:80:20 -w outputfile ath()

  • Now continue scanning until is collect 20,000 to 30,000 packets and run aircrack-ng outputfile*.cap command.
  • This process take approx 2-3 hours. The wifi key in form of hexadecimal number and remove from the key.

Methods 6: ZAnti

ZAnti is another wifi password hacking tool for android device. This android application is penetration testing android app. In ZAnti android app you can alter the settings of your wifi network that is internet accessed by the wifi can be altered using this android application. Using ZAnti app you can change the website images on the wifi network. You can change google search result on the wifi network, Do session hijacking on the wifi network and you can check the IP address and MAC address of other connected wifi users device.

Method 7: Wifi Kill

The main purpose of Wifi Kill android application is to hack any wifi password free and disconnect the all available connected user to the network. This app provides you authority to kick off other connected devices from your network. Wifi Kill android application is work on latest version of the android device like android 4.0+. If this android application falls in wrong hand then it’s very dangerous app. So Don’t make this android application illegally to be on safer side.

Download Wifi Kill

Crack Wifi Password Software Free Download

Wifi password hacker software is latest and one of the best software for computer and laptop. Using this software you can easily access your friend’s wifi network without getting permission or authorized by an administrator. This software is very easy to use and user friendly interface makes very popular. For use this cracking software you do not need to any technical knowledge. This awesome software allow you to download any files, software, movies, videos, games and much more without virus.