Category Archives: (O) Hacking Tricks

5 Ways to Protect Your Computer Against NetCut’s ARP Spoofing Attack

NetCut  is a Denial of Service type of tool that runs on Windows and is capable of cutting off a person’s internet connectivity when both are connected in the same local area network. Basically the ARP protocol is used to translate IP addresses to MAC addresses and NetCut exploits the weakness in the stateless ARP protocol due to the lack of authentication.

NetCut is very easy to use and can be used by anyone. Simply run the tool and it will detect all the connected devices in the same local area network. You can then select any target from the list followed by clicking the “Cut off” button, and within seconds the target will lose its internet connection. The affected target will have no idea what’s happened even if he/she has a firewall program installed.

netcut

Due to the way NetCut works, no firewall is able to prevent nor even detect the attack. In fact setting up static ARP entries like most other websites suggested will not protect you against NetCut attacks because NetCut directly attacks the gateway and not the user. Here is an investigation on how NetCut works and also the method to protect against the DoS attack. As we’ve mentioned earlier, none of the firewall software such as ZoneAlarm, Comodo, Outpost, GlassWire, SpyShelter, Privatefirewall, and etc is able to detect NetCut attack. However you can use XArp, which is a freeware tool that can detect ARP spoofing. By installing XArp and running it, you will be instantly notified when it detects an ARP spoofing attack including the attack from NetCut. The screenshot below shows a running XArp without attacks. Take note of the MAC address 00-21-5d-41-16-5a circled in red which is associated with the IP 192.168.2.8.

xarp no arp attacks

When NetCut starts attacking the IP 192.168.2.8 in an attempt to cut off the Internet connection, XArp immediately detects it and shows an alert popup with a few different messages. The most important message would be the one that reports that the MAC address for the IP 192.168.2.8 has been changed from 00-21-5d-41-16-5a to 03-27-75-49-18-73.

xarp alert

If you launch the XArp program from the notification tray icon, you will see that the MAC address for the IP 192.168.2.8 has been changed to 03-27-75-49-18-73 which is obviously wrong.

xarp arp attacks detected

This means that NetCut sends a spoofed packet to inform the gateway that the IP 192.168.2.8 is associated with an incorrect MAC address. Since the IP 192.168.2.8 isn’t mapped to the correct MAC address, the Internet connection breaks as well. Even a packet sniffer such as Wireshark confirms that spoofed packets are sent to the gateway with a wrong MAC address mapped to the IP 192.168.2.8.

wireshark netcut attack

When NetCut is actively attacking a target on the network, it will continuously send spoofed packets to the gateway so that there is no chance for the gateway to obtain the correct dynamic ARP table. Here we have 5 possible ways of protecting against NetCut attacks.

1. Static ARP Table in Router

Since NetCut sends spoofed packets to the router to mess with the dynamic ARP table, you can solve this problem by setting up a static ARP table in the router. Implementing static ARP routing will protect everyone that is connected to the network. However this is not really a solution for everyone because a lot of basic home based routers don’t support static ARP table and it doesn’t make sense to implement this on a public WiFi. Doing this on a large corporate network also requires a lot of manpower maintaining the IP to MAC address mappings.


2. NetCut

Ironically, the NetCut program that is used to cut off a person’s Internet connection has an option to protect against the attack. Simply make sure that the “Protect My Computer” checkbox is ticked and this will ensure that your IP address is mapped to the correct MAC address.

netcut protect my computer

Basically NetCut protects against its own attack by constantly sending packets to the gateway informing the router the correct mapping of the IP to MAC address. The router will be easily flooded with packets when NetCut is being used to attack and protect.

Download NetCut


3. NetCut Defender

If you’re not comfortable in having an attack program such as NetCut installed and running on your computer due to legal concerns, the author of NetCut also created a protection program called NetCut Defender. Basically it does the same thing as the “Protect My Computer” option found in NetCut except without the ability to cut off a person’s connection.

netcut defender

Nowhere on the official NetCut Defender’s website does it mention that it costs $9.99. You will start getting nagging popups to purchase the program after a couple of hours of usage. We cannot confirm the trial usage of NetCut Defender as we have not tested it extensively but what we can confirm is that it can surely keep you safe against NetCut attacks.

Download NetCut Defender


4. Outpost Firewall Pro

When NetCut is launched, it will automatically run an ARP broadcast sweep to detect all connected devices on the network. For example, if the computer running NetCut is connected to a network 192.168.2.1 gateway, it will perform an ARP sweep from 192.168.2.1 to 192.168.2.255. Unlike ICMP ping that can be easily blocked, ARP requests are normally responded and not blocked. When a device responds to the ARP request made by NetCut, the device is added to the list that can be attacked. Outpost Firewall Pro has an option to block ARP scan.

outpost attack detection report

Go to Settings > Advanced settings > Attack Detection > click the Customize button > select “Block host when it enumerates other computers on LAN” and click OK to close the Attack Detection window followed by clicking OK to save the Settings.

block host when it enumerates other computers on lan

Enabling this option will prevent your computer from being listed in NetCut. The attacker will most likely attack another computer instead of yours. Outpost Firewall Pro is a shareware that cost $29.95 for a 1 year subscription on a single license.

Download Outpost Firewall Pro


5. ESET Smart Security

ESET Smart Security is one of the few internet security applications that can be configured to disallow responses to an ARP request. By doing this, NetCut won’t be able to find your computer during an ARP sweep when the program is launched or when the “Refresh Net” button is clicked. To configure ESET Smart Security to block an ARP scan, open the program, go to Setup and click onNetwork. Click Advanced Personal firewall setup that is located at the bottom.

eset advanced personal firewall setup

Expand Network > Personal firewall and select IDS and advanced options. Uncheck “Allow response to ARP requests from outside the Trusted zone” and click OK.

eset allow response to arp request from outside the trusted zone

For this setting to take effect, you need to select the “Public network” as the desired protection mode of your computer in the network. Normally this option would show up when you are connected to a new network. To check the settings, at the Network protection setup, click on “Change the protection mode of your computer in the network“.

Select Public network option and click OK.

eset computer protection mode

The NetCut program won’t be able to find your computer on the network, thus keeping you safe from being attacked.
Read More:https://www.raymond.cc/blog/protect-your-computer-against-arp-poison-attack-netcut/

Hack Wi-Fi Network- Two Simple Working Methods and Their Fix

Wi-Fi SECURITY: METHODS OF ENCRYPTION

Before cracking a Wi- Fi network, you must be aware of basic encryption techniques that protect a Wi-Fi network. These three methods of encryption are the major sources of vulnerability associated with wireless networks. The different types of Wireless Encryption Security techniques include the following:

WEP: WEP is Wired Equivalent Privacy that can be cracked easily when configured appropriately. This method of encryption can be cracked within few minutes.

WPA: WPA is Wi-Fi Protected Access that provides strong security. Even then, there is possibility to crack if the Wi-Fi password if short. However, wireless networks can be hacked easily using various tools.

WPA2: WPA2 is Wi-Fi Protected Access 2 that also eventually provides high security. You can hack this method of Wi-Fi encryption at the time of packet generation from Wi-Fi access points.

TECHNIQUES TO HACK Wi-Fi (Encryption-based) NETWORK

If you are much interested in hacking high security encryption based Wi-Fi networks, you need to arrange few things that are required at the time of Hacking process. After arranging all the essential things, you can hack a Wi-Fi network using few tools and techniques that can be seen below:

REQUIREMENTS

  1. Kali Linux OS (includes aircrack-ng suite and wifite tool)
  2. External Wi-Fi Adapter or Inbuilt Wi-Fi Device

Hardware

  • You need to have an external Wi-Fi adapter that is required to hack a Wi-Fi network. If you want to crack a password that has less security, then you can use plug-n-play wireless USB adapter TP-LINK TL-WN722N that is exclusively available at Online E-commerce Websites i.e., at Flipkart and Amazon.
  • If you need a better range with good quality wireless adapter, then it is recommended to use Alfa AWUSO36NH along with a better antenna.
  • If you wish to hack Wi-Fi network for Ultimate range Wi-Fi antenna then, you can use TP-LINK TL-ANT2424B 2.4GHz 24dBi.

METHOD 1: HACK Wi-Fi Network using Wifite

Wifite is a Linux-based platform tool that is available on variant Operating Systems like Kali, Backtrack 5, BlackBuntu, BackBox and Pentoo. Wifite is basically used to attack multiple encrypted networks (WEP, WPA/2 and WPS) in a row that is customized to be automated with only a few arguments. Wifite is a wireless auditing tool that aims to be the “set it and forget it” method of hacking.

How to View Available Access Points?

  • As you are using Linux Operating System, Initially go to Application.
  • Now go to Kali Linux > Wireless Attacks > 802.11 wireless tools > Wifite.

Hack Wifi network-kali Linux

  • If you are unable to view Wifite then simply type ‘wifite’ in Terminal.
  • Here, you can see List of Available Wi-Fi Access Points. (you must be root).
  • Wait for few seconds in order to notice nearby Wi-Fi points like WEP, WPA/WPA2.

Steps to Hack WEP Encryption based Wi-Fi Network

Hacking a Wi-Fi network that uses WEP security encryption is relatively very easy when compared to other encryption methods. While using this Wifite tool, you must follow simple steps as given below:

  • Just choose the appropriate target NUM (1,2,3,..,n) in order to crack it.
  • Hacking a WEP key that ensures 100% possibilities of cracking the WEP WiFi password that currently uses 5 attacks.
  • Make sure that the attack is completed within 10 minutes.
  • You need not worry if one WEP WiFi attack fails, the other will come into action automatically for succeeding 10 minutes.
  • You can choose any attack. For instance, choose NUM 2 attack.
  • Within few minutes the WEP Wi-Fi network gets hacked.

Hack WEP Wi-Fi password - Techniques to hack Wi-Fi Network

  • You can see the WEP key that is present in the above image. It is a Hexadecimal representation of WEP WiFi’s password.
  • That WEP Key can be used as the Wi-Fi password.
  • Later, you can also convert the Wi-Fi password into actual password that is in the form of human readable mode using online Hex-to-ASCII converter.

Steps to Hack WPA Encryption based Wi-Fi Network

Hacking a Wi-Fi network that uses WPA security encryption is little bit tough when compared to WEP as this is highly protected encryption method. This can also be hacked when the password contains less number of characters. It takes less time to hack a Wi-Fi network that uses short passwords. In order to hack this type of Wi-Fi network you need to use Handshake capture.

Handshake Capture:

Handshake is a file that can be captured when Router (Wi-Fi Access Point) and client(s) (Laptop, Mobile or other Wi-Fi enabled devices) communicate to authenticate each other. You may have a doubt that, “What is the purpose of this Handshake file?” The main target is to hack Wi-Fi network i.e., password. This Handshake file comprises of Wi-Fi password but in encrypted form.

Brute-Forcing:

As the password is in encrypted form, let us try some other password combination on the encrypted password to acquire the original password. This process is known as Brute Forcing that is done offline. By using Brute-Forcing, the password present in the handshake file can be captured easily within few minutes.

Dictionary File:

In the below image, you can see dictionary which is a file that contains all known words from various sources usually phrased as Wi-Fi password.

Hack Wi-Fi network- WPA Security Encryption

  • As soon as you start WPA handshake capture, it displays a message as “Client Found”.
  • It generates a command using handshake capture (that contains password) as (TEST_C0-A0-BB-04-5C-A9.cap).
  • The above command cracks the password file that must be saved at /root/DICTIONARY/.
  • Till now, you have used two WPA attacks that are completed successfully.

Hack Wi-Fi Network-Password key found

  • You can see Key Found [Password 1] in the above image that displays the Master key and Transient key.

A password file usually contains words that are created using combination of different characters, numbers and special symbols. A password requires a lot of computational power if it a strong password including numbers and other special characters. The above WPA Wi-Fi Security Encryption got cracked easily because of easy password. Suppose, if you are but dealing with strong password, it might take more hours to crack the password.

METHOD 2: HACK Wi-Fi Network using WIFIPHISHER

Wifiphisher is a security tool that mounts the fast automated phishing attacks which are against WPA networks so as order to acquire all the secret passphrase of the particular Wi-Fi network. Unlike other methods of hacking, Wifiphisher is a type of social engineering attack that does not include brute forcing. It is very easy way to obtain WPA credentials of the users whom you wish to hack. Wifiphisher works on a platform that supports Kali Linux Operating System and is licensed under the MIT license.

How it Works?

Wifiphisher is a tool that is used to hack a Wi-FI network and this attack makes use of three phases:

PHASE 1:

  • Victim is being deauthenticated from their access point.

Method two to hack wifi network using wifiphisher1

  • Wifiphisher tries to jam all the target access point’s wifi devices continuously that are available within range by sending deauth packets to the client from the access point.
  • It discovers all the networks that are available in the access point range.

Method two to hack wifi network using wifiphisher2

  • This tool alters the access point of all the devices through the main server and broadcasts the address along with the deauth packets.
  • It starts generating fake access points by copying an access point from a set of access points shown below:

Method two to hack wifi network using wifiphisher3

PHASE 2:

  • This is the second phase where the Victim joins a rogue access point.
  • It asks for password authentication and in the backdrop, the tool tries to copy all the credentials of the possible Wi-Fi networks.
  • Wifiphisher sniffs the area and copies the target access point’s settings.
  • Now, this tool creates a rogue wireless access point that is modeled on the target by setting a NAT/DHCP server and forwards the right ports.
  • Consequently, because of the jamming, clients will start connecting to the rogue access point. After this phase, the victim is Mitimed.

Method two to hack wifi network using wifiphisher4

PHASE 3:

  • Victim is being served a realistic router config-looking page where the Wifiphisher tool employs a minimal web server that responds to HTTP & HTTPS requests.
  • As soon as the victim requests a page from the Internet, wifiphisher responds with a realistic fake page that asks for WPA password confirmation due to a router firmware upgrade.

Method two to hack wifi network using wifiphisher5

Method two to hack wifi network using wifiphisher6

Till now you have seen two techniques to hack Wi-Fi WEP, WPA/WPA2 Security using Wifite and WIFIPHISHER. By using these two server attacks, you can easily crack the Wi-Fi network.

How to Protect your Wi-Fi Network from getting Hacked?

From the above techniques, you might clearly understand that hacking a Wi-Fi network is an easy process. Now, it’s time to focus on tightening your Wi-Fi security. Now, you might get complete awareness about the security and Wi-Fi Network Hacking through this article. Follow some tips so as to enhance security of your Wi-Fi network.

  1. As WEP is an easy hacked Wi-Fi security encryption method, it is recommended to change Wi-Fi security from WEP to WPA/WPA2. WEP is now denigrated security protection.
  2. Change the password of your Wi-Fi network periodically so that if in case someone gets chance to hack your Wi-Fi password, they will not be able to use your free Internet for long period of time.
  3. Disable WPS as it has lots of vulnerabilities.

How to Bypass Right Click Block on Any Website

You might remember an experience where you tried to right-click on a web page but got a pop-up message saying that the “right-click functionality has been disabled”. Sometimes you may be trying to copy an image or view the source of a web page but when the right-click is disabled, these things would seem impossible. Bank websites and other sites that require a secure transaction such as a payment gateway are the ones to impose this kind of limited functionality on their pages. In this post, I will show you the ways by which you can easily bypass right-click block feature on any website.

In order to block the right-click activity, most websites make use of JavaScript which is one of the popular scripting languages used to enhance functionality, improve user experience and provide rich interactive features. In addition to this, it can also be used to strengthen the website’s security by adding some of the simple security features such as disabling right-click, protecting images,hiding or masking parts of a web page and so on.

How JavaScript Works?

Before you proceed to the next part which tells you how to disable the JavaScript functionality and bypass any of the restrictions imposed by it, it would be worthwhile for you to take up a minute to understand how JavaScript works.

JavaScript is a client side scripting language (in most cases), which means when loaded it runs from your own web browser. Most modern browsers including IE, Firefox, Chrome and others support JavaScript so that they can interpret the code and carry out actions that are defined in the script. In other words, it is your browser which is acting upon the instruction of JavaScript to carry out the defined actions such as blocking the right-click activity. So, disabling the JavaScript support on your browser can be a simple solution to bypass all the restrictions imposed by the website.

How to Disable the JavaScript?

Here is a step-by-step procedure to disable JavaScript on different browsers:

For Internet Explorer:

If you are using IE, just follow the steps below:

    1. From the menu bar, go to Tools -> Internet Options.
    2. In the “Internet Options” window, switch to Security tab and click on the button Custom level…

IE Security Settings

  1. From the Security Settings, look for the option Active scripting and select the Disable radio button as shown above and click on “OK”.
  2. You may even select the Prompt radio button, so that each time a page is loaded, you will have the option to either enable or disable the scripting.

For Google Chrome:

If you are using Chrome, you can disable the JavaScript by following the steps below:

    1. Click on the Chrome “menu” button (on the top right corner) and selectTools.
    2. From the “Settings” page, click on Show advanced settings…
    3. Now under Privacy, click on the button Content settings…

Chrome Content Settings

  1. Under the JavaScript, select the radio button which says “Do not allow any site to run JavaScript” and click on “Done”.

For Mozilla Firefox:

Steps to disable JavaScript on Firefox:

    1. From the menu bar, click on Tools -> Options.
    2. From the Options window, switch to Content tab, uncheck the option which says “Enable JavaScript” and click on “OK”.

Firefox Content Options

How to Bypass the Right Click Block?

In order to bypass the right-click block or any other restriction imposed by JavaScript, all you need to do is just disable it in the browser and refresh the same page, so that it now reloads without JavaScript functionality. You are now free to right-click on the page, view its source or even copy any of the images that you may want to. Don’t forget to re-enable the JavaScript once again when your job is over. Otherwise lack of JavaScript support may result in unusual rendering of web pages.

WhatsApp Spy: Spy on WhatsApp Messages

WhatsApp is one of the most widely used instant messaging applications during the recent years. Attractive features like cross-platform support and media sharing has made WhatsApp to be the top choice among most users. On the other hand, WhatsApp has also become a favorite application for many cheaters to exchange secret messages and maintain illicit relationships. Therefore, in order to investigate the truth about their partners or children it becomes inevitable for many individuals and parents to spy on WhatsApp.

Ways to Spy on WhatsApp

Some of the possible ways to spy on WhatsApp messages are as described below:

1. WhatsApp Spy using a Spy App: Easiest Way

Using a spy app is the easiest way to spy on WhatsApp messages. Although there are a handful of companies marketing substandard WhatsApp spy apps on the market today, there exists a few genuine ones as well that are worth considering. One of my favorite app to spy on WhatsApp is mSpy which is known for its quality and top notch features.

The following are some of the exciting features of mSpy which makes it a perfect to spy on WhatsApp messages:

mSpy Features:

  • Spy on WhatsApp Messages and Chats.
  • WhatsApp Spy on Group Messages.
  • Spy on Internet activity including social media like Facebook, WhatsApp,Twitter and Gmail.
  • Spy on GPS locations in real-time.
  • Spy on WhatsApp Contacts.
  • Spy on keystrokes, photos and videos.
  • Spy operation works in a complete stealth mode and thus remains undetected!.

How it Works?

You will have to download and install the mSpy app onto the target phone where you need to spy on WhatsApp messages. Installation and configuration takes only a few minutes. However, for this you should have the target phone in your hand at least for a few minutes.

Once the installation is complete, the monitoring process of all the above mentioned activities (WhatsApp messages, calls, SMS, Internet, GPS, camera etc.) will begin and the recorded logs are silently uploaded to your mSpy account. You can login to your online account at any time to view the logs containing WhatsApp messages and other activity details. You can download mSpy from the link below:

Download mSpy

Compatible Phones: Android, BlackBerry, Apple iPhone, Windows Mobile, iPad and Tablets.


2. Spoofing the MAC Address: The Difficult Way

The other way to spy on someone’s WhatsApp messages is to spoof the MAC address of the target phone from your phone. This method is somewhat considered difficult and require a moderate amount of technical skills to perform. Let me explain.

WhatsApp has a small vulnerability which allows you to run the same WhatsApp account on two phones provided they both have the same MAC address. For this, you will have to gain access to the target phone to record its MAC address and spoof the same on your device. This is how you can find the MAC address of the target phone:

For Android – Head over to Settings —> About phone —> Status—> Wi-Fi MAC address

For iPhone – Head over to Settings—> General —> About —> Wi-Fi address

For Windows Phone – Head over to Settings —> About —> More info —> MAC address

For BlackBerry – Head over to options —> Device —> Device and Status info —> WLAN MAC

Once you have recorded the target phone’s MAC address, you will have to spoof the MAC address on your android phone. After this is done, install WhatsApp on your phone, configure it using the target person’s phone number and verify the WhatsApp account using the verification code received on the target phone.

If you successfully manage to execute all the above mentioned steps, you will have a replica of the target user’s WhatsApp account running on your phone. That means you will receive notifications on your phone for each and every activity of the target WhatsApp user. To spy WhatsApp messages, I still recommend the usage of mSpy as this method is lot simpler than that of spoofing MAC address.

Download mSpy

How to Change Your IP Address

Change IP Address

Every time you connect to the Internet, your ISP (Internet Service Provider) assigns an IP address to your computer that makes it possible for websites and applications to keep track of your online activities and also pin point your physical location. Therefore, in order to protect your Internet privacy, it is often necessary to change your IP address.

Ways to Change IP Address

The following are some of the possible ways to change IP address of your computer:

1. Using a VPN: Best Way to Change IP Address

Even though there are several methods to change your IP address, using a VPN proxy is by far the best and most secure way. The following are some of the most popular VPN proxies that most Internet users prefer:


  • Hide My Ass VPN – Hide My Ass is one of the most popular and trusted VPN service that provides a fast and secure proxy server to allow people to easily change their IP address and also obtain IP address from any country of their choice.

Download Hide My Ass VPN

  • VyprVPN – VyprVPN offers the world’s fastest VPN services to make it possible for its clients to easily change their real IP using a proxy and supports wide range of operating systems.

Download VyprVPN


Advantages of using VPN over other methods:

  • Fast, secure and highly reliable. All your web traffic is encrypted to keep your data safe from hackers and also protect your privacy.
  • You can choose from a list of countries and locations to obtain a new IP address. This makes it possible to have your origin from any country of your choice.
  • Easily bypass regional blocks to access sites and content that are restricted for your location.

2.Change IP by Restarting the Router

Every time you connect to the Internet your ISP may assign a different IP to your computer called dynamic IP. If your Internet connection uses a dynamic IP you can easily change it just by restarting your network device such as modem/router. All you need to do is just turn off its switch for a few seconds and turn it on again to get a different IP address assigned.

Unlike using a VPN, this method has quite a few drawbacks. Your newly assigned IP will have the same location or country as before and therefore if you’re trying to bypass a country block it would not be possible. Moreover, if your Internet connection uses a static IP address, you will get the same IP assigned no matter how many times you restart your router.

3. Using Free Web Proxy to Change Your IP Address

If you cannot afford a VPN service or restarting the router doesn’t get you a new IP, you can try some of the free browser based proxy services that help you change your IP address and surf anonymously. The following are some of the websites that offer free proxy services:

Drawbacks of using free web proxies

Even though these services come free of cost they also come with some of the following drawbacks:

  • Most of them are slow and websites take a lot of time to load.
  • Security and privacy is questionable as most of these free services are unreliable.
  • Users have to bare with annoying ads and pop-ups as these sites need to generate revenue to compensate for free service.
  • Limited or no choice over the selection of your IP location.

How to Ensure that Your IP is Changed?

To know your current IP address just type what is my ip address on Google and your public IP address should be displayed in the search results. Once you’ve successfully implemented one of the above mentioned IP changing methods, you can re-check your IP on Google to make sure that you have got a new one.

Change IP Address

The above snapshot shows the Google search result page displaying a new IP address after the router is restarted.

Android’s SECRET Codes 2018

Android Secret/Hidden codes 2015 :-

 *#06# – IMEI (International Mobile Station Equipment Identity) number – essential in case your device is stolen and you want to block the thief from accessing your network

 *#*#7594#*#*  Make Power button turn off your device without displaying menu

*#*#4636#*#* – Display information about phone, battery, usage and WiFi

*#*#7780#*#* – Factory reset (deletes app data and apps, not firmware)

*2767*3855# – Complete phone wipe, including firmware (not to be used lightly!)

*#*#273283*255*663282*#*#* – Back up all your photos and videos
*#*#1472365#*#* – Test your GPS
*#*#1234#*#* – Display phone firmware and PDA info

 

androidpit-secret-testing-menu-w782
You can access the above screen on most Android devices by entering*#*#4636#*#* on the dialpad

 

*#*#232338#*#* – Show WiFi Mac address
*#*#8255#*#* – Access GTalk Service Monitor
*#*#36245#*#* – Access Email debug info Email
*#*#225#*#* – Events calendar
*#*#426#*#* – Debug info for Google Play Service
*#*#759#*#* – Access Google Partner Setup

#Samsung SECRET Codes :-

 

*#*#34971539#*#* – Show all camera information
*#*#197328640#*#* – Enable test mode for services
*#*#232339#*#* – Wireless LAN test
*#*#1575#*#* – Test your GPS (alternative to generic Android GPS test)
*#*#0*#*#* – Test your LCD display
*#*#4986*2650468#*#* – Display crucial phone information (PDA, Hardware, firmware etc.)
##778 (followed by the Call button) EPST menu

#HTC SECRET Codes New :-

*#*#3424#*#* HTC function test Program
*#*# – HTC Info menu
*#*#8255#*#* – Launch GTalk Service Monitor
##3424# – Diagnostic mode
##3282# – EPST menu
##8626337# – VOCODER
##33284# – Field trial menu
##786# – Reverse Logistics Support
##7738# – Protocol Revision

How To Reset Windows 8/8.1 Admin Password Without Knowing Old Password

How To Reset Windows 8/8.1 Admin Password Without Knowing Old Password

Today millions of users are using the latest version of Windows that is Windows 8 and 8.1 which is currently providing lots of features for their users. In this version you need to enter PIN or the password to access the administrator account but what if you forget your windows password. You think you need to install the new operating system in your computer system to access the services but actually you can change the password with the method with which we are here. So lets have a look on the method of How To Reset Windows 8/8.1 Admin Password Without Knowing Old Password. Yes it is possible and you can do  it with your self by just following a simple trick that i have discussed below.

How To Reset Windows 8/8.1 Admin Password Without Knowing Old Password

How-To-Reset-Windows-8-Password

How To Reset Windows 8 Password

This method is based on Windows 8/8.1 password cracking through other virtual OS that you will run on your computer without actually installing it. With this you will access the internal files of computer and reset admin panel.


Just proceed through below steps.

First of all you need to create a Linux Live Cd through linux ISO File.Now boot this CD in your computer through boot menu.Now there navigate to C:\Windows\System32.And there rename sethc.exe to sethc1.exe.And rename cmd.exe to sethc.exe.Now simply restart your computer.Now you will see you login screen, simply press shift button five times.You will see command prompt will open.34There type net user and hit enter.14Now you will see the name of administrator account note it down.Now type net user user_name new password and hit enter as shown in screenshots.24Thats it now type the password in login panel and you are logged in.

So above is all about How To Reset Windows 8/8.1 Admin Password Without Knowing Old Password. By this you can easily revover your forgotten password in windows and there will be no need to install new operating system in your computer to access the services. Hope you like the post, don’t forget to share it with your friend

How To Use Two WhatsApp (Dual WhatsApp) In Single Device (Latest) 2018

so today We are coming with a new trick to use two whatsapp account easily.here we have a new App Name OMWhatsApp ( Not Available On Playstore)


What is OMWhatsapp?.

OMWhatsapp is modified application of popular messaging app “Whatsapp”, which is modified for purpose of running two Whatsapp Account in single device or dual whatsapp in a device. Moreover, OMWhatsapp has all Whatsapp Plus mod, As this mod is presented to all of you again by Osama.
14600005
Use Multiple WhatsApp In Single Devive 2016 Mukeshtricks4u
#OMWhatsApp Features 
  1. Hide(Freeze) last seen
  2. Hide blue ticks
  3. Hide Double ticks
  4. Hide typing/recording
  5. Hide blue microphone
  6. Change WhatsApp Skin:
  7. You can change any color
  8. You can download & apply themes
  9. View photos/viedos without download
  10. Play voice notes without download
  11. Groups message counter
  12. Change icons
  13. Send Vedios up to 30Mb
  14. Send Full Quality photos
  15. Send up to 90 photo at once
  16. Whatsapp Calls&WhatsApp Web
  17. Anti ban
  18. Hacking Purpose.
  19. Stylish Status Bar.
  20. Emojiz Clear Options.
#What’s New on OMWhatsApp ?
  • Increase sending video limit to 1GB
  • Add Gradient Color MODS for ( Chats/Conversation/Calls/Contacts Screen )
  • Add MOD 2.1.9 to change color of Tabs Background on Main Screen
  • Add MOD 1.2.44 to change color of Delete Button on Emojis Header
  • (Fix Bubbles Style MOD ( Untidy Bubbles
  • Fix lag issue totally .. App works much faster and smoother than before
  • Add MOD 6.11 to disable Heads-Up notification ( In Lollipop )
  • Add MOD 1.4.1 to enable/disable showing contacts pics. in Conversation Screen
  • Add MOD 1.4.2 to show contacts pics. in Groups
  • Add MOD 1.4.3 to show my profile pic in Conversation Screen
  • Add MOD 1.4.4 to show my profile pic in Groups
  • Add MOD 1.4.5 to resize profile pics. in Conversation Screen
Process Of Installing…




PicsArt_1448876975801
Download OMWhatsapp

  • Download OMWhatsApp Apk From Our Site in Free Of Coast..
  • Install this Apk As You Install Other apps.
  • Complete All Steps as you completed in your Real Version Of WhatsApp.
  • After Mobile Number Verfication You CanUse Your 2nd WhatsApp in A Single Device.
  • Its Easy, There Is No Need To Uninstall The Real version of WhatsApp.
  • Enjoy !

#1 Link Click Here – Download OMWHATSAPP

#2 Link Click Here – Download OMWHATSAPP FREE 2016

PicsArt_1448876637256
PicsArt_1448876467336
PicsArt_1448876372148

So Above Is All About Using Of Two WhatsApp In A Single Device 2016. If You Have Any Query Then Comment Below.

How To Hack Facebook Account Using Backtrack 5r3 2018

#StepsTo Hack Facebook Account

#1.Install Backtrack From Official Site After Installation, Open your backtrack 5R3’s terminal and type : cd /pentest/exploits/set 


scr1


#2. Now Type On Opened Terminal And type: ./set to open “Social Engineering Tool kit“.

.set


#3. After SET Opening Select 1st Option 
1) Social Engineering Attacks
Type “1” and Hit Enter.

1+Social+Engineering+attacks


#4.Now Select Option 2 
2) Website Attack Vectors

scr4


#5.Now just Select 4th Option 
4 Tabnabbing Attack Method

scr5


#6.Now Select Option 2 
2) Site Cloner

scr6


#7.Now Here you Need to Add your IP,



scr8


#8.Now Here you need to add the URL of  FB

Note: if you want to hack Facebook then put here Facebook URL.

scr9


#9. Just Hit Enter

Scr10
 
 
#10.Paste Your IP in Address bar and Page  should be look like this..


login
 

When Victim Log in to your Page Details will come here.. 

 
result


if you want to Know your IP Open new Terminal and type: ifconfig

I
scr7

Hack Instagram Account Using BruteForce

Explanation

So, we will use the BruteForce attack method, which the program keeps putting in the passwords until we get the right one. I know, the program puts the password over and over again, it will take a long time, it might fail, but it is better than not doing it.

Step 1Clone It!

So first, we will need to get the program that keeps putting in the password.
To do that, simply type :

git clone https://github.com/Ethical-H4CK3R/Instagram.git

this command will clone the program to your computer.
Now you need to chmod the file and go to the directory of the program, so type :

chmod -R 755 Instagram && cd Instagram

Step 2Executing the Program

Now we cloned the program, so we now need to open the program.
Type : “ls” to see what is inside the folder.

Well, we know there are three things inside the folder, “Core”, “README.md” and “instagram.py”.
The executable program here is “instagram.py”.
We need to execute the program now, by typing :

python instagram.py

Oh no, Looks like there are some errors!
Doesn’t this show up?

It is because we do not have the txt file.

Remember, this is a BruteForce attack, we need to give it a lists of passwords so the program knows which password it should put in.

Step 3Get the Password Lists

If you are just trying to test either this works or not, then you guys can make your own password list and just type your own passwords there, but I am trying to legit get the password of my friend’s account.

Now, lets get the txt file.
Go to the browser, and search ” daniel miessler passwords github”.

Search it, go in the first link.

Now you will be in GitHub. Go in Passwords.

Choose one txt file, I will choose the 10 million password list.
The bigger the better, because you will have a higher chance of succeeding.
But, it will take up a lot of space…
If you chose one, click on the text file you chose.
It will say : “Sorry, file too large, you can view as raw”,something like that, and click on “view raw”.
And there will be a list of passwords.
To save them in your computer, right click it, click Save Page as, then save the text file in the Instagram folder.
The file should be in Home.
And click “Save”, then voila, the text should be in the folder.
Now we can execute it!

Step 4Executing It Once Again…

We just got the text file, so we can keep on hacking! Lets do the thing we did :
open the terminal, type :

cd Instagram

Now we are in the Instagram directory, type “ls” to see what is inside the folder.
Yes, there is the text file in the folder! lets execute the program by :

python instagram.py Username Thetextfile.txt

(To get better explanation, see the picture)

Now we are at the end! The BruteForce attack has started, it will say the attempts and what password it is currently trying.

Well, It would take a long time.

And Voila.(By the way the username Used on the explanation Pic is not the real one…)

Did It Work?

So, did it work for you guys? It worked for me, comment down below whether it worked or not.

Pro : It is easy to use, lots of beginners can use it
Con : It is a BruteForce attack, there are also a chance of failing