Category Archives: (O) Hacking Tricks

How To Identify Fake Facebook Accounts

How can you detect the Fake FB Profile. On these days we are getting so many friend request specially by girls, but there is no way to identify that account is fake or original. So don’t worry we are going to tell you simple method to detect fake Facebook account.

So this is a Facebook account which named by Sarikha Agarwal. Now we need to verify this account real or fake, so our first step is going to theimages.google.com and click on camera image.

 

So when you click on search by image you will get popup like below image.

 

 

Now go to that profile, right click on image and click on copy image URL

 


Now profile pic URL has copied.. now again go to images.google.com Tab and paste image URL

 

When you enter then you get related images search…
Now you can better see that this profile is real or fake..So here is a proof that this profile is fake. Enjoy the trick..

Be aware when you will going to add an beautiful or smart unknown person as your friend. So be checked first.. there are lot of fake profiles are create everyday.
This person might be spy on your profile and steal personal information like your photos, etc for their hacking stuffs.. So Be Safe Online..

How To Trace Your Facebook Profile Visitors

Now here we found who recently visited your profile.
Follow below steps for get to know your FB recent visitors
.

Step 1) Go to your Facebook Profile Page.

Step 2) Now Press Ctrl + U from your keyboard for see source code of your profile page.

Step 3) Now press Ctrl + F from your keyboard to open search box.

Step 4) Now search this code {“list”:

Step 5) You find some Facebook Profile Ids are like shown below. Click on example image for zoom.

ScreenShot_20160415011038


Step 6) There are some Facebook Profile Ids of your friends who visited recently.

Step 7) The first one ID’s are showing visits the most number of time.

Step 8) Now if your want to findout, Open a new tab Enter below link :
www.facebook.com/Facebook Profile Id

For Example : www.facebook.com/100011552407944

Enjoy The Trick.. 🙂

How To Hack Whatsapp Working Trick 2018

How To Hack Whatsapp – Today we have a new whatsapp hacking trick by which you can hack anyone whatsapp easily using an android app we given below this is the new hacking trick helps you more to get fun with your friends but please be sure that this trick is only for educational purposes only not to harm or irritate someone, be in mind this is only for educational purposes only don’t harm someone please. so i hope you all wants a trick by which you can hack anyone whatsapp, today we provide a app which sends a sms to your victim and then your victim is unable to use whatsapp, hope it’s really give you a great knowledge.

How To Hack Whatsapp
How To Hack Whatsapp 
What it actually Do To Hack Whatsapp- Some time you send a personal message to your friend and because of something your friendship is break down now you have a fear that your friend show your personal message to all other which you send them in friendship time, so what you have to do just try this trick by this trick helps you to force down your friend to delete your full conversation till that he or she will unable to use whatsapp. use this trick in genuine way only not to put someone in problem, this trick is to increase your knowledge and it is a example only, you can use this whatsapp trick in many ways but in a good manner. hope you are ready to know how to hack whatsapp.

How To Hack Whatsapp Working Trick Steps :

1. Firstly Download- Whatsapp Boomber
2. Now Install it and Open in your Android Device.
3. No Select Power Bomb Select 16x if you Destroy fully your friend’s whatsapp.
4. After Selecting You will enter to your Whatsapp Select The Contact on which you need to Hack.
5. Paste The Message and Send It To Your Friend, Boom!! Now he or she will unable to use whatsapp properly till he or she delet your full conversation.

How to Setup Your Laptop with Tracking Software in Case You Ever Lose It

laptop-on-subway

Apple offers a “Find My Mac” service to track a lost or stolen stolen Mac computer. However, Microsoft doesn’t provide an equivalent service for Windows PCs — not even for tablets running Windows 8.

If you’re using Windows and want the ability to track your laptop should it ever become lost or stolen, you’ll need to install some third-party software. There are many paid services that offer this feature, but there are also good free options.

The Basics

All such tracking services work similarly. You install a piece of software on your device and set up an account with the service. If you ever lose your device, you go to the service’s website, log into your account, and you can view the device’s location and control it remotely.

Be aware that it will likely be more difficult to track a laptop than a smartphone. A smartphone will probably be connected to a data network and be in standby mode, so it can communicate its location back to you. However, if a laptop is powered off or just not connected to Wi-Fi, it won’t be able to report back to you. A tracking service can offer some additional protection should you ever lose your laptop, but it will be harder to locate a lost laptop than it is to locate a lost smartphone.

Installing Prey

Prey offers tracking software for Windows, Mac, and even Linux PCs. Prey also offers tracking apps for Android and iOS, so you could use this one service to track all of your devices.

This service has paid pro plans, but the basic tracking service is completely free. The free service allows you to have three devices linked to your account and store up to ten location reports per device.

After installing Prey, you’ll be prompted to create a new user account or enter your current user account details.

prey-user-setup

Once you’ve logged in, Prey will immediately be up and running. Prey runs as a Windows service by default. If you want to configure it, you can open the Configure Prey shortcut in the Prey folder in your Start menu’s programs group.

configure-prey-on-windows

To have Prey check in more frequently so you’ll receive reports more quickly if you ever lose your laptop, select Options for Execution, and modify the Frequency of reports and actions setting.

prey-frequency-of-reports

Tracking Your Lost Laptop

You can now visit the Prey project’s website and log in with the same account details you entered on your computer. You’ll see your computer and any other linked devices.

prey-project-website

If you lose your laptop, you’ll need to click its name on your Prey control panel and set the slider from “OK” to “Missing.” Prey only tracks your device when it’s missing, so it isn’t constantly tracking your laptop’s location. Be sure to also enable the Geo feature, which uses your laptop’s internal GPS hardware or the names of nearby Wi-Fi hotspots to report its location.

You can also have Prey perform specific actions, such as setting off an alarm — this is useful if you misplace the laptop nearby. Of course, it’s not as reliable as sending an alarm to a phone, because the laptop must be powered on and connected to the Internet to receive this message and begin the alarm.

Be sure to save your changes afterwards.

prey-report-device-as-missing

Once you’ve set your laptop to missing, its status will become “Tracked, waiting for report.” When the Prey software on your laptop checks in with the Prey server, it will receive a message that it has been marked as lost and generate a report. You’ll only receive an alert if the laptop is powered on, connected to the Internet, and the Prey software is still installed.

There’s an “on-demand” mode where you can request a report immediately, but this feature is unavailable in the free version. If you can wait a few minutes for your report, the free version will work just as well.

prey-laptop-tracked-waiting-for-report

Once a report arrives, you’ll see it on the Reports tab. The report includes the information you selected, such as the laptop’s geographic location, its network status and IP address, and a screenshot of the computer’s desktop and webcam capture of its user. This information may help you get the laptop back, or may be helpful evidence when you report the laptop as stolen.

geolocate-lost-or-stolen-laptop


If you don’t want to use Prey for some reason, you may want to try LockItTight, which is also free.

4 Steps to Prevent Man in the Middle Attack ARP Poisoning in LAN

 

What is man in the middle attack? according to wikipedia:

In cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims and inject new ones, which is straightforward in many circumstances (for example, an attacker within reception range of an unencrypted Wi-Fi wireless access point, can insert himself as a man-in-the-middle).

And what is ARP poisoning or ARP spoofing? according to wikipedia:

a technique whereby an attacker sends fake (“spoofed”) Address Resolution Protocol (ARP) messages onto a Local Area Network. Generally, the aim is to associate the attacker’s MAC address with the IP address of another host (such as the default gateway), causing any traffic meant for that IP address to be sent to the attacker instead.

The man in the middle attack can happen because the attacker modified the ARP table(ARP spoofing) and change the ARP mapping to malicious attacker computer. Here I try to describe using picture(courtesy of: irongeek.com).

4 Steps to Prevent Man in the Middle Attack ARP Poisoning in LAN

If we as a human absolutely we will know who is Alan and who is Brian by recognizing them from their face, but for our computer they depend on the ARP table network mapping (OSI layer 2 and layer 3).

<table border=”1″ cellpadding=”1″ cellspacing=”1″ style=”width: 500px;”>

Name IP Address MAC Address Alan 192.168.1.2 00-00-00-00-00-00-00-01 Brian 192.168.1.3 00-00-00-00-00-00-00-02 Cracker 192.168.1.88 00-00-00-00-00-00-00-03

table>

So if Alan want to connect to Brian, the computer will translate Brian IP address(192.168.1.3) to its MAC address 00-00-00-00-00-00-00-02. The correct way is should be like that, but because the attacker doing an ARP spoofing or ARP poisoning they will change the ARP mapping. If the network already poisoned, when Alan want to send packet to Brian, Alan will translate Brian(192.168.1.3) with MAC 00-00-00-00-00-00-00-03 and vice versa.

In this tutorial I will show you how the ARP spoofing can be happen and how to prevent it in your own computer so you will not be the victim.

The scenario for today tutorial I will use Windows 7 as victim and Kali Linux as attacker.

4 Steps to Prevent Man in the Middle Attack ARP Poisoning in LAN:

Before start, you can download the Static ARP changer tools to change the ARP routing automatically (128% virus free guaranteed)

Download Static ARP Changer

1. First I will show you my Windows 7 ARP table before poisoned by the attacker

arp -a

4 Steps to Prevent Man in the Middle Attack ARP Poisoning in LAN

the red box in the picture above is victim router address and router MAC address is xx-xx-xx-5a-26-94. Victim IP address is 192.168.8.100.

Here is the attacker IP and MAC info:

4 Steps to Prevent Man in the Middle Attack ARP Poisoning in LAN

2. When attacker doing ARP spoofing by using arpspoof and attacking the victim:

arpspoof -i eth0 -t 192.168.8.100 -r 192.168.8.8

4 Steps to Prevent Man in the Middle Attack ARP Poisoning in LAN

Description:

-i eth0 –> attacker use the eth0 interface to perform the attack.

-t 192.168.8.100 –> attacker targeting the IP address 192.168.8.100.

-r 192.168.8.8 –> attacker will intercept the traffic between -t and -r where -r is the remote host or the router

3. When victim run the arp -a command again in his computer, the router MAC address was changed into the attacker computer.

4 Steps to Prevent Man in the Middle Attack ARP Poisoning in LAN

that’s mean every transaction the victim made will go through attacker computer first and then go to the real router. We need to protect the ARP mapping table to make the attacker cannot do this to us.

4. We need to run this command in our Windows PC

arp -s 192.168.8.8 xx-xx-xx-5a-26-94

Description:

-s –> add a static ARP table

192.168.8.8 –> your router IP address

xx-xx-xx-5a-26-94 –> your router MAC address

Note: If you get this error “The ARP entry addition failed: Access is denied.

try to run this command to know your interface name:

netsh interface show interface

4 Steps to Prevent Man in the Middle Attack ARP Poisoning in LAN

and then run this command to add static ARP:

netsh interface ip add neighbors “Wireless Network Connection” “192.168.8.8” “xx-xx-xx-5a-26-94”

now when we run again the arp -a command, our ARP table changed to static

4 Steps to Prevent Man in the Middle Attack ARP Poisoning in LAN

and when attacker run ARP spoofing again, our ARP table won’t changed because we already make it static :-)

Conclusions:

1. To prevent ARP spoofing and man in the middle attack in your local area network you need to add a static ARP.

2. This trick become troublesome if your router changed frequently, so if you use this prevention method you need to delete the old one and add the new one if it changed

3. You can download and use my Static ARP routing changer to change your ARP static routing automatically

Download Static ARP Changer

 

5 Ways to Protect Your Computer Against NetCut’s ARP Spoofing Attack

NetCut  is a Denial of Service type of tool that runs on Windows and is capable of cutting off a person’s internet connectivity when both are connected in the same local area network. Basically the ARP protocol is used to translate IP addresses to MAC addresses and NetCut exploits the weakness in the stateless ARP protocol due to the lack of authentication.

NetCut is very easy to use and can be used by anyone. Simply run the tool and it will detect all the connected devices in the same local area network. You can then select any target from the list followed by clicking the “Cut off” button, and within seconds the target will lose its internet connection. The affected target will have no idea what’s happened even if he/she has a firewall program installed.

netcut

Due to the way NetCut works, no firewall is able to prevent nor even detect the attack. In fact setting up static ARP entries like most other websites suggested will not protect you against NetCut attacks because NetCut directly attacks the gateway and not the user. Here is an investigation on how NetCut works and also the method to protect against the DoS attack. As we’ve mentioned earlier, none of the firewall software such as ZoneAlarm, Comodo, Outpost, GlassWire, SpyShelter, Privatefirewall, and etc is able to detect NetCut attack. However you can use XArp, which is a freeware tool that can detect ARP spoofing. By installing XArp and running it, you will be instantly notified when it detects an ARP spoofing attack including the attack from NetCut. The screenshot below shows a running XArp without attacks. Take note of the MAC address 00-21-5d-41-16-5a circled in red which is associated with the IP 192.168.2.8.

xarp no arp attacks

When NetCut starts attacking the IP 192.168.2.8 in an attempt to cut off the Internet connection, XArp immediately detects it and shows an alert popup with a few different messages. The most important message would be the one that reports that the MAC address for the IP 192.168.2.8 has been changed from 00-21-5d-41-16-5a to 03-27-75-49-18-73.

xarp alert

If you launch the XArp program from the notification tray icon, you will see that the MAC address for the IP 192.168.2.8 has been changed to 03-27-75-49-18-73 which is obviously wrong.

xarp arp attacks detected

This means that NetCut sends a spoofed packet to inform the gateway that the IP 192.168.2.8 is associated with an incorrect MAC address. Since the IP 192.168.2.8 isn’t mapped to the correct MAC address, the Internet connection breaks as well. Even a packet sniffer such as Wireshark confirms that spoofed packets are sent to the gateway with a wrong MAC address mapped to the IP 192.168.2.8.

wireshark netcut attack

When NetCut is actively attacking a target on the network, it will continuously send spoofed packets to the gateway so that there is no chance for the gateway to obtain the correct dynamic ARP table. Here we have 5 possible ways of protecting against NetCut attacks.

1. Static ARP Table in Router

Since NetCut sends spoofed packets to the router to mess with the dynamic ARP table, you can solve this problem by setting up a static ARP table in the router. Implementing static ARP routing will protect everyone that is connected to the network. However this is not really a solution for everyone because a lot of basic home based routers don’t support static ARP table and it doesn’t make sense to implement this on a public WiFi. Doing this on a large corporate network also requires a lot of manpower maintaining the IP to MAC address mappings.


2. NetCut

Ironically, the NetCut program that is used to cut off a person’s Internet connection has an option to protect against the attack. Simply make sure that the “Protect My Computer” checkbox is ticked and this will ensure that your IP address is mapped to the correct MAC address.

netcut protect my computer

Basically NetCut protects against its own attack by constantly sending packets to the gateway informing the router the correct mapping of the IP to MAC address. The router will be easily flooded with packets when NetCut is being used to attack and protect.

Download NetCut


3. NetCut Defender

If you’re not comfortable in having an attack program such as NetCut installed and running on your computer due to legal concerns, the author of NetCut also created a protection program called NetCut Defender. Basically it does the same thing as the “Protect My Computer” option found in NetCut except without the ability to cut off a person’s connection.

netcut defender

Nowhere on the official NetCut Defender’s website does it mention that it costs $9.99. You will start getting nagging popups to purchase the program after a couple of hours of usage. We cannot confirm the trial usage of NetCut Defender as we have not tested it extensively but what we can confirm is that it can surely keep you safe against NetCut attacks.

Download NetCut Defender


4. Outpost Firewall Pro

When NetCut is launched, it will automatically run an ARP broadcast sweep to detect all connected devices on the network. For example, if the computer running NetCut is connected to a network 192.168.2.1 gateway, it will perform an ARP sweep from 192.168.2.1 to 192.168.2.255. Unlike ICMP ping that can be easily blocked, ARP requests are normally responded and not blocked. When a device responds to the ARP request made by NetCut, the device is added to the list that can be attacked. Outpost Firewall Pro has an option to block ARP scan.

outpost attack detection report

Go to Settings > Advanced settings > Attack Detection > click the Customize button > select “Block host when it enumerates other computers on LAN” and click OK to close the Attack Detection window followed by clicking OK to save the Settings.

block host when it enumerates other computers on lan

Enabling this option will prevent your computer from being listed in NetCut. The attacker will most likely attack another computer instead of yours. Outpost Firewall Pro is a shareware that cost $29.95 for a 1 year subscription on a single license.

Download Outpost Firewall Pro


5. ESET Smart Security

ESET Smart Security is one of the few internet security applications that can be configured to disallow responses to an ARP request. By doing this, NetCut won’t be able to find your computer during an ARP sweep when the program is launched or when the “Refresh Net” button is clicked. To configure ESET Smart Security to block an ARP scan, open the program, go to Setup and click onNetwork. Click Advanced Personal firewall setup that is located at the bottom.

eset advanced personal firewall setup

Expand Network > Personal firewall and select IDS and advanced options. Uncheck “Allow response to ARP requests from outside the Trusted zone” and click OK.

eset allow response to arp request from outside the trusted zone

For this setting to take effect, you need to select the “Public network” as the desired protection mode of your computer in the network. Normally this option would show up when you are connected to a new network. To check the settings, at the Network protection setup, click on “Change the protection mode of your computer in the network“.

Select Public network option and click OK.

eset computer protection mode

The NetCut program won’t be able to find your computer on the network, thus keeping you safe from being attacked.
Read More:https://www.raymond.cc/blog/protect-your-computer-against-arp-poison-attack-netcut/

Hack Wi-Fi Network- Two Simple Working Methods and Their Fix

Wi-Fi SECURITY: METHODS OF ENCRYPTION

Before cracking a Wi- Fi network, you must be aware of basic encryption techniques that protect a Wi-Fi network. These three methods of encryption are the major sources of vulnerability associated with wireless networks. The different types of Wireless Encryption Security techniques include the following:

WEP: WEP is Wired Equivalent Privacy that can be cracked easily when configured appropriately. This method of encryption can be cracked within few minutes.

WPA: WPA is Wi-Fi Protected Access that provides strong security. Even then, there is possibility to crack if the Wi-Fi password if short. However, wireless networks can be hacked easily using various tools.

WPA2: WPA2 is Wi-Fi Protected Access 2 that also eventually provides high security. You can hack this method of Wi-Fi encryption at the time of packet generation from Wi-Fi access points.

TECHNIQUES TO HACK Wi-Fi (Encryption-based) NETWORK

If you are much interested in hacking high security encryption based Wi-Fi networks, you need to arrange few things that are required at the time of Hacking process. After arranging all the essential things, you can hack a Wi-Fi network using few tools and techniques that can be seen below:

REQUIREMENTS

  1. Kali Linux OS (includes aircrack-ng suite and wifite tool)
  2. External Wi-Fi Adapter or Inbuilt Wi-Fi Device

Hardware

  • You need to have an external Wi-Fi adapter that is required to hack a Wi-Fi network. If you want to crack a password that has less security, then you can use plug-n-play wireless USB adapter TP-LINK TL-WN722N that is exclusively available at Online E-commerce Websites i.e., at Flipkart and Amazon.
  • If you need a better range with good quality wireless adapter, then it is recommended to use Alfa AWUSO36NH along with a better antenna.
  • If you wish to hack Wi-Fi network for Ultimate range Wi-Fi antenna then, you can use TP-LINK TL-ANT2424B 2.4GHz 24dBi.

METHOD 1: HACK Wi-Fi Network using Wifite

Wifite is a Linux-based platform tool that is available on variant Operating Systems like Kali, Backtrack 5, BlackBuntu, BackBox and Pentoo. Wifite is basically used to attack multiple encrypted networks (WEP, WPA/2 and WPS) in a row that is customized to be automated with only a few arguments. Wifite is a wireless auditing tool that aims to be the “set it and forget it” method of hacking.

How to View Available Access Points?

  • As you are using Linux Operating System, Initially go to Application.
  • Now go to Kali Linux > Wireless Attacks > 802.11 wireless tools > Wifite.

Hack Wifi network-kali Linux

  • If you are unable to view Wifite then simply type ‘wifite’ in Terminal.
  • Here, you can see List of Available Wi-Fi Access Points. (you must be root).
  • Wait for few seconds in order to notice nearby Wi-Fi points like WEP, WPA/WPA2.

Steps to Hack WEP Encryption based Wi-Fi Network

Hacking a Wi-Fi network that uses WEP security encryption is relatively very easy when compared to other encryption methods. While using this Wifite tool, you must follow simple steps as given below:

  • Just choose the appropriate target NUM (1,2,3,..,n) in order to crack it.
  • Hacking a WEP key that ensures 100% possibilities of cracking the WEP WiFi password that currently uses 5 attacks.
  • Make sure that the attack is completed within 10 minutes.
  • You need not worry if one WEP WiFi attack fails, the other will come into action automatically for succeeding 10 minutes.
  • You can choose any attack. For instance, choose NUM 2 attack.
  • Within few minutes the WEP Wi-Fi network gets hacked.

Hack WEP Wi-Fi password - Techniques to hack Wi-Fi Network

  • You can see the WEP key that is present in the above image. It is a Hexadecimal representation of WEP WiFi’s password.
  • That WEP Key can be used as the Wi-Fi password.
  • Later, you can also convert the Wi-Fi password into actual password that is in the form of human readable mode using online Hex-to-ASCII converter.

Steps to Hack WPA Encryption based Wi-Fi Network

Hacking a Wi-Fi network that uses WPA security encryption is little bit tough when compared to WEP as this is highly protected encryption method. This can also be hacked when the password contains less number of characters. It takes less time to hack a Wi-Fi network that uses short passwords. In order to hack this type of Wi-Fi network you need to use Handshake capture.

Handshake Capture:

Handshake is a file that can be captured when Router (Wi-Fi Access Point) and client(s) (Laptop, Mobile or other Wi-Fi enabled devices) communicate to authenticate each other. You may have a doubt that, “What is the purpose of this Handshake file?” The main target is to hack Wi-Fi network i.e., password. This Handshake file comprises of Wi-Fi password but in encrypted form.

Brute-Forcing:

As the password is in encrypted form, let us try some other password combination on the encrypted password to acquire the original password. This process is known as Brute Forcing that is done offline. By using Brute-Forcing, the password present in the handshake file can be captured easily within few minutes.

Dictionary File:

In the below image, you can see dictionary which is a file that contains all known words from various sources usually phrased as Wi-Fi password.

Hack Wi-Fi network- WPA Security Encryption

  • As soon as you start WPA handshake capture, it displays a message as “Client Found”.
  • It generates a command using handshake capture (that contains password) as (TEST_C0-A0-BB-04-5C-A9.cap).
  • The above command cracks the password file that must be saved at /root/DICTIONARY/.
  • Till now, you have used two WPA attacks that are completed successfully.

Hack Wi-Fi Network-Password key found

  • You can see Key Found [Password 1] in the above image that displays the Master key and Transient key.

A password file usually contains words that are created using combination of different characters, numbers and special symbols. A password requires a lot of computational power if it a strong password including numbers and other special characters. The above WPA Wi-Fi Security Encryption got cracked easily because of easy password. Suppose, if you are but dealing with strong password, it might take more hours to crack the password.

METHOD 2: HACK Wi-Fi Network using WIFIPHISHER

Wifiphisher is a security tool that mounts the fast automated phishing attacks which are against WPA networks so as order to acquire all the secret passphrase of the particular Wi-Fi network. Unlike other methods of hacking, Wifiphisher is a type of social engineering attack that does not include brute forcing. It is very easy way to obtain WPA credentials of the users whom you wish to hack. Wifiphisher works on a platform that supports Kali Linux Operating System and is licensed under the MIT license.

How it Works?

Wifiphisher is a tool that is used to hack a Wi-FI network and this attack makes use of three phases:

PHASE 1:

  • Victim is being deauthenticated from their access point.

Method two to hack wifi network using wifiphisher1

  • Wifiphisher tries to jam all the target access point’s wifi devices continuously that are available within range by sending deauth packets to the client from the access point.
  • It discovers all the networks that are available in the access point range.

Method two to hack wifi network using wifiphisher2

  • This tool alters the access point of all the devices through the main server and broadcasts the address along with the deauth packets.
  • It starts generating fake access points by copying an access point from a set of access points shown below:

Method two to hack wifi network using wifiphisher3

PHASE 2:

  • This is the second phase where the Victim joins a rogue access point.
  • It asks for password authentication and in the backdrop, the tool tries to copy all the credentials of the possible Wi-Fi networks.
  • Wifiphisher sniffs the area and copies the target access point’s settings.
  • Now, this tool creates a rogue wireless access point that is modeled on the target by setting a NAT/DHCP server and forwards the right ports.
  • Consequently, because of the jamming, clients will start connecting to the rogue access point. After this phase, the victim is Mitimed.

Method two to hack wifi network using wifiphisher4

PHASE 3:

  • Victim is being served a realistic router config-looking page where the Wifiphisher tool employs a minimal web server that responds to HTTP & HTTPS requests.
  • As soon as the victim requests a page from the Internet, wifiphisher responds with a realistic fake page that asks for WPA password confirmation due to a router firmware upgrade.

Method two to hack wifi network using wifiphisher5

Method two to hack wifi network using wifiphisher6

Till now you have seen two techniques to hack Wi-Fi WEP, WPA/WPA2 Security using Wifite and WIFIPHISHER. By using these two server attacks, you can easily crack the Wi-Fi network.

How to Protect your Wi-Fi Network from getting Hacked?

From the above techniques, you might clearly understand that hacking a Wi-Fi network is an easy process. Now, it’s time to focus on tightening your Wi-Fi security. Now, you might get complete awareness about the security and Wi-Fi Network Hacking through this article. Follow some tips so as to enhance security of your Wi-Fi network.

  1. As WEP is an easy hacked Wi-Fi security encryption method, it is recommended to change Wi-Fi security from WEP to WPA/WPA2. WEP is now denigrated security protection.
  2. Change the password of your Wi-Fi network periodically so that if in case someone gets chance to hack your Wi-Fi password, they will not be able to use your free Internet for long period of time.
  3. Disable WPS as it has lots of vulnerabilities.

How to Bypass Right Click Block on Any Website

You might remember an experience where you tried to right-click on a web page but got a pop-up message saying that the “right-click functionality has been disabled”. Sometimes you may be trying to copy an image or view the source of a web page but when the right-click is disabled, these things would seem impossible. Bank websites and other sites that require a secure transaction such as a payment gateway are the ones to impose this kind of limited functionality on their pages. In this post, I will show you the ways by which you can easily bypass right-click block feature on any website.

In order to block the right-click activity, most websites make use of JavaScript which is one of the popular scripting languages used to enhance functionality, improve user experience and provide rich interactive features. In addition to this, it can also be used to strengthen the website’s security by adding some of the simple security features such as disabling right-click, protecting images,hiding or masking parts of a web page and so on.

How JavaScript Works?

Before you proceed to the next part which tells you how to disable the JavaScript functionality and bypass any of the restrictions imposed by it, it would be worthwhile for you to take up a minute to understand how JavaScript works.

JavaScript is a client side scripting language (in most cases), which means when loaded it runs from your own web browser. Most modern browsers including IE, Firefox, Chrome and others support JavaScript so that they can interpret the code and carry out actions that are defined in the script. In other words, it is your browser which is acting upon the instruction of JavaScript to carry out the defined actions such as blocking the right-click activity. So, disabling the JavaScript support on your browser can be a simple solution to bypass all the restrictions imposed by the website.

How to Disable the JavaScript?

Here is a step-by-step procedure to disable JavaScript on different browsers:

For Internet Explorer:

If you are using IE, just follow the steps below:

    1. From the menu bar, go to Tools -> Internet Options.
    2. In the “Internet Options” window, switch to Security tab and click on the button Custom level…

IE Security Settings

  1. From the Security Settings, look for the option Active scripting and select the Disable radio button as shown above and click on “OK”.
  2. You may even select the Prompt radio button, so that each time a page is loaded, you will have the option to either enable or disable the scripting.

For Google Chrome:

If you are using Chrome, you can disable the JavaScript by following the steps below:

    1. Click on the Chrome “menu” button (on the top right corner) and selectTools.
    2. From the “Settings” page, click on Show advanced settings…
    3. Now under Privacy, click on the button Content settings…

Chrome Content Settings

  1. Under the JavaScript, select the radio button which says “Do not allow any site to run JavaScript” and click on “Done”.

For Mozilla Firefox:

Steps to disable JavaScript on Firefox:

    1. From the menu bar, click on Tools -> Options.
    2. From the Options window, switch to Content tab, uncheck the option which says “Enable JavaScript” and click on “OK”.

Firefox Content Options

How to Bypass the Right Click Block?

In order to bypass the right-click block or any other restriction imposed by JavaScript, all you need to do is just disable it in the browser and refresh the same page, so that it now reloads without JavaScript functionality. You are now free to right-click on the page, view its source or even copy any of the images that you may want to. Don’t forget to re-enable the JavaScript once again when your job is over. Otherwise lack of JavaScript support may result in unusual rendering of web pages.

WhatsApp Spy: Spy on WhatsApp Messages

WhatsApp is one of the most widely used instant messaging applications during the recent years. Attractive features like cross-platform support and media sharing has made WhatsApp to be the top choice among most users. On the other hand, WhatsApp has also become a favorite application for many cheaters to exchange secret messages and maintain illicit relationships. Therefore, in order to investigate the truth about their partners or children it becomes inevitable for many individuals and parents to spy on WhatsApp.

Ways to Spy on WhatsApp

Some of the possible ways to spy on WhatsApp messages are as described below:

1. WhatsApp Spy using a Spy App: Easiest Way

Using a spy app is the easiest way to spy on WhatsApp messages. Although there are a handful of companies marketing substandard WhatsApp spy apps on the market today, there exists a few genuine ones as well that are worth considering. One of my favorite app to spy on WhatsApp is mSpy which is known for its quality and top notch features.

The following are some of the exciting features of mSpy which makes it a perfect to spy on WhatsApp messages:

mSpy Features:

  • Spy on WhatsApp Messages and Chats.
  • WhatsApp Spy on Group Messages.
  • Spy on Internet activity including social media like Facebook, WhatsApp,Twitter and Gmail.
  • Spy on GPS locations in real-time.
  • Spy on WhatsApp Contacts.
  • Spy on keystrokes, photos and videos.
  • Spy operation works in a complete stealth mode and thus remains undetected!.

How it Works?

You will have to download and install the mSpy app onto the target phone where you need to spy on WhatsApp messages. Installation and configuration takes only a few minutes. However, for this you should have the target phone in your hand at least for a few minutes.

Once the installation is complete, the monitoring process of all the above mentioned activities (WhatsApp messages, calls, SMS, Internet, GPS, camera etc.) will begin and the recorded logs are silently uploaded to your mSpy account. You can login to your online account at any time to view the logs containing WhatsApp messages and other activity details. You can download mSpy from the link below:

Download mSpy

Compatible Phones: Android, BlackBerry, Apple iPhone, Windows Mobile, iPad and Tablets.


2. Spoofing the MAC Address: The Difficult Way

The other way to spy on someone’s WhatsApp messages is to spoof the MAC address of the target phone from your phone. This method is somewhat considered difficult and require a moderate amount of technical skills to perform. Let me explain.

WhatsApp has a small vulnerability which allows you to run the same WhatsApp account on two phones provided they both have the same MAC address. For this, you will have to gain access to the target phone to record its MAC address and spoof the same on your device. This is how you can find the MAC address of the target phone:

For Android – Head over to Settings —> About phone —> Status—> Wi-Fi MAC address

For iPhone – Head over to Settings—> General —> About —> Wi-Fi address

For Windows Phone – Head over to Settings —> About —> More info —> MAC address

For BlackBerry – Head over to options —> Device —> Device and Status info —> WLAN MAC

Once you have recorded the target phone’s MAC address, you will have to spoof the MAC address on your android phone. After this is done, install WhatsApp on your phone, configure it using the target person’s phone number and verify the WhatsApp account using the verification code received on the target phone.

If you successfully manage to execute all the above mentioned steps, you will have a replica of the target user’s WhatsApp account running on your phone. That means you will receive notifications on your phone for each and every activity of the target WhatsApp user. To spy WhatsApp messages, I still recommend the usage of mSpy as this method is lot simpler than that of spoofing MAC address.

Download mSpy

How to Change Your IP Address

Change IP Address

Every time you connect to the Internet, your ISP (Internet Service Provider) assigns an IP address to your computer that makes it possible for websites and applications to keep track of your online activities and also pin point your physical location. Therefore, in order to protect your Internet privacy, it is often necessary to change your IP address.

Ways to Change IP Address

The following are some of the possible ways to change IP address of your computer:

1. Using a VPN: Best Way to Change IP Address

Even though there are several methods to change your IP address, using a VPN proxy is by far the best and most secure way. The following are some of the most popular VPN proxies that most Internet users prefer:


  • Hide My Ass VPN – Hide My Ass is one of the most popular and trusted VPN service that provides a fast and secure proxy server to allow people to easily change their IP address and also obtain IP address from any country of their choice.

Download Hide My Ass VPN

  • VyprVPN – VyprVPN offers the world’s fastest VPN services to make it possible for its clients to easily change their real IP using a proxy and supports wide range of operating systems.

Download VyprVPN


Advantages of using VPN over other methods:

  • Fast, secure and highly reliable. All your web traffic is encrypted to keep your data safe from hackers and also protect your privacy.
  • You can choose from a list of countries and locations to obtain a new IP address. This makes it possible to have your origin from any country of your choice.
  • Easily bypass regional blocks to access sites and content that are restricted for your location.

2.Change IP by Restarting the Router

Every time you connect to the Internet your ISP may assign a different IP to your computer called dynamic IP. If your Internet connection uses a dynamic IP you can easily change it just by restarting your network device such as modem/router. All you need to do is just turn off its switch for a few seconds and turn it on again to get a different IP address assigned.

Unlike using a VPN, this method has quite a few drawbacks. Your newly assigned IP will have the same location or country as before and therefore if you’re trying to bypass a country block it would not be possible. Moreover, if your Internet connection uses a static IP address, you will get the same IP assigned no matter how many times you restart your router.

3. Using Free Web Proxy to Change Your IP Address

If you cannot afford a VPN service or restarting the router doesn’t get you a new IP, you can try some of the free browser based proxy services that help you change your IP address and surf anonymously. The following are some of the websites that offer free proxy services:

Drawbacks of using free web proxies

Even though these services come free of cost they also come with some of the following drawbacks:

  • Most of them are slow and websites take a lot of time to load.
  • Security and privacy is questionable as most of these free services are unreliable.
  • Users have to bare with annoying ads and pop-ups as these sites need to generate revenue to compensate for free service.
  • Limited or no choice over the selection of your IP location.

How to Ensure that Your IP is Changed?

To know your current IP address just type what is my ip address on Google and your public IP address should be displayed in the search results. Once you’ve successfully implemented one of the above mentioned IP changing methods, you can re-check your IP on Google to make sure that you have got a new one.

Change IP Address

The above snapshot shows the Google search result page displaying a new IP address after the router is restarted.