Category Archives: (H) Hacking Tips

Hack Wi-Fi Network- Two Simple Working Methods and Their Fix

Wi-Fi SECURITY: METHODS OF ENCRYPTION

Before cracking a Wi- Fi network, you must be aware of basic encryption techniques that protect a Wi-Fi network. These three methods of encryption are the major sources of vulnerability associated with wireless networks. The different types of Wireless Encryption Security techniques include the following:

WEP: WEP is Wired Equivalent Privacy that can be cracked easily when configured appropriately. This method of encryption can be cracked within few minutes.

WPA: WPA is Wi-Fi Protected Access that provides strong security. Even then, there is possibility to crack if the Wi-Fi password if short. However, wireless networks can be hacked easily using various tools.

WPA2: WPA2 is Wi-Fi Protected Access 2 that also eventually provides high security. You can hack this method of Wi-Fi encryption at the time of packet generation from Wi-Fi access points.

TECHNIQUES TO HACK Wi-Fi (Encryption-based) NETWORK

If you are much interested in hacking high security encryption based Wi-Fi networks, you need to arrange few things that are required at the time of Hacking process. After arranging all the essential things, you can hack a Wi-Fi network using few tools and techniques that can be seen below:

REQUIREMENTS

  1. Kali Linux OS (includes aircrack-ng suite and wifite tool)
  2. External Wi-Fi Adapter or Inbuilt Wi-Fi Device

Hardware

  • You need to have an external Wi-Fi adapter that is required to hack a Wi-Fi network. If you want to crack a password that has less security, then you can use plug-n-play wireless USB adapter TP-LINK TL-WN722N that is exclusively available at Online E-commerce Websites i.e., at Flipkart and Amazon.
  • If you need a better range with good quality wireless adapter, then it is recommended to use Alfa AWUSO36NH along with a better antenna.
  • If you wish to hack Wi-Fi network for Ultimate range Wi-Fi antenna then, you can use TP-LINK TL-ANT2424B 2.4GHz 24dBi.

METHOD 1: HACK Wi-Fi Network using Wifite

Wifite is a Linux-based platform tool that is available on variant Operating Systems like Kali, Backtrack 5, BlackBuntu, BackBox and Pentoo. Wifite is basically used to attack multiple encrypted networks (WEP, WPA/2 and WPS) in a row that is customized to be automated with only a few arguments. Wifite is a wireless auditing tool that aims to be the “set it and forget it” method of hacking.

How to View Available Access Points?

  • As you are using Linux Operating System, Initially go to Application.
  • Now go to Kali Linux > Wireless Attacks > 802.11 wireless tools > Wifite.

Hack Wifi network-kali Linux

  • If you are unable to view Wifite then simply type ‘wifite’ in Terminal.
  • Here, you can see List of Available Wi-Fi Access Points. (you must be root).
  • Wait for few seconds in order to notice nearby Wi-Fi points like WEP, WPA/WPA2.

Steps to Hack WEP Encryption based Wi-Fi Network

Hacking a Wi-Fi network that uses WEP security encryption is relatively very easy when compared to other encryption methods. While using this Wifite tool, you must follow simple steps as given below:

  • Just choose the appropriate target NUM (1,2,3,..,n) in order to crack it.
  • Hacking a WEP key that ensures 100% possibilities of cracking the WEP WiFi password that currently uses 5 attacks.
  • Make sure that the attack is completed within 10 minutes.
  • You need not worry if one WEP WiFi attack fails, the other will come into action automatically for succeeding 10 minutes.
  • You can choose any attack. For instance, choose NUM 2 attack.
  • Within few minutes the WEP Wi-Fi network gets hacked.

Hack WEP Wi-Fi password - Techniques to hack Wi-Fi Network

  • You can see the WEP key that is present in the above image. It is a Hexadecimal representation of WEP WiFi’s password.
  • That WEP Key can be used as the Wi-Fi password.
  • Later, you can also convert the Wi-Fi password into actual password that is in the form of human readable mode using online Hex-to-ASCII converter.

Steps to Hack WPA Encryption based Wi-Fi Network

Hacking a Wi-Fi network that uses WPA security encryption is little bit tough when compared to WEP as this is highly protected encryption method. This can also be hacked when the password contains less number of characters. It takes less time to hack a Wi-Fi network that uses short passwords. In order to hack this type of Wi-Fi network you need to use Handshake capture.

Handshake Capture:

Handshake is a file that can be captured when Router (Wi-Fi Access Point) and client(s) (Laptop, Mobile or other Wi-Fi enabled devices) communicate to authenticate each other. You may have a doubt that, “What is the purpose of this Handshake file?” The main target is to hack Wi-Fi network i.e., password. This Handshake file comprises of Wi-Fi password but in encrypted form.

Brute-Forcing:

As the password is in encrypted form, let us try some other password combination on the encrypted password to acquire the original password. This process is known as Brute Forcing that is done offline. By using Brute-Forcing, the password present in the handshake file can be captured easily within few minutes.

Dictionary File:

In the below image, you can see dictionary which is a file that contains all known words from various sources usually phrased as Wi-Fi password.

Hack Wi-Fi network- WPA Security Encryption

  • As soon as you start WPA handshake capture, it displays a message as “Client Found”.
  • It generates a command using handshake capture (that contains password) as (TEST_C0-A0-BB-04-5C-A9.cap).
  • The above command cracks the password file that must be saved at /root/DICTIONARY/.
  • Till now, you have used two WPA attacks that are completed successfully.

Hack Wi-Fi Network-Password key found

  • You can see Key Found [Password 1] in the above image that displays the Master key and Transient key.

A password file usually contains words that are created using combination of different characters, numbers and special symbols. A password requires a lot of computational power if it a strong password including numbers and other special characters. The above WPA Wi-Fi Security Encryption got cracked easily because of easy password. Suppose, if you are but dealing with strong password, it might take more hours to crack the password.

METHOD 2: HACK Wi-Fi Network using WIFIPHISHER

Wifiphisher is a security tool that mounts the fast automated phishing attacks which are against WPA networks so as order to acquire all the secret passphrase of the particular Wi-Fi network. Unlike other methods of hacking, Wifiphisher is a type of social engineering attack that does not include brute forcing. It is very easy way to obtain WPA credentials of the users whom you wish to hack. Wifiphisher works on a platform that supports Kali Linux Operating System and is licensed under the MIT license.

How it Works?

Wifiphisher is a tool that is used to hack a Wi-FI network and this attack makes use of three phases:

PHASE 1:

  • Victim is being deauthenticated from their access point.

Method two to hack wifi network using wifiphisher1

  • Wifiphisher tries to jam all the target access point’s wifi devices continuously that are available within range by sending deauth packets to the client from the access point.
  • It discovers all the networks that are available in the access point range.

Method two to hack wifi network using wifiphisher2

  • This tool alters the access point of all the devices through the main server and broadcasts the address along with the deauth packets.
  • It starts generating fake access points by copying an access point from a set of access points shown below:

Method two to hack wifi network using wifiphisher3

PHASE 2:

  • This is the second phase where the Victim joins a rogue access point.
  • It asks for password authentication and in the backdrop, the tool tries to copy all the credentials of the possible Wi-Fi networks.
  • Wifiphisher sniffs the area and copies the target access point’s settings.
  • Now, this tool creates a rogue wireless access point that is modeled on the target by setting a NAT/DHCP server and forwards the right ports.
  • Consequently, because of the jamming, clients will start connecting to the rogue access point. After this phase, the victim is Mitimed.

Method two to hack wifi network using wifiphisher4

PHASE 3:

  • Victim is being served a realistic router config-looking page where the Wifiphisher tool employs a minimal web server that responds to HTTP & HTTPS requests.
  • As soon as the victim requests a page from the Internet, wifiphisher responds with a realistic fake page that asks for WPA password confirmation due to a router firmware upgrade.

Method two to hack wifi network using wifiphisher5

Method two to hack wifi network using wifiphisher6

Till now you have seen two techniques to hack Wi-Fi WEP, WPA/WPA2 Security using Wifite and WIFIPHISHER. By using these two server attacks, you can easily crack the Wi-Fi network.

How to Protect your Wi-Fi Network from getting Hacked?

From the above techniques, you might clearly understand that hacking a Wi-Fi network is an easy process. Now, it’s time to focus on tightening your Wi-Fi security. Now, you might get complete awareness about the security and Wi-Fi Network Hacking through this article. Follow some tips so as to enhance security of your Wi-Fi network.

  1. As WEP is an easy hacked Wi-Fi security encryption method, it is recommended to change Wi-Fi security from WEP to WPA/WPA2. WEP is now denigrated security protection.
  2. Change the password of your Wi-Fi network periodically so that if in case someone gets chance to hack your Wi-Fi password, they will not be able to use your free Internet for long period of time.
  3. Disable WPS as it has lots of vulnerabilities.

How to Bypass Right Click Block on Any Website

You might remember an experience where you tried to right-click on a web page but got a pop-up message saying that the “right-click functionality has been disabled”. Sometimes you may be trying to copy an image or view the source of a web page but when the right-click is disabled, these things would seem impossible. Bank websites and other sites that require a secure transaction such as a payment gateway are the ones to impose this kind of limited functionality on their pages. In this post, I will show you the ways by which you can easily bypass right-click block feature on any website.

In order to block the right-click activity, most websites make use of JavaScript which is one of the popular scripting languages used to enhance functionality, improve user experience and provide rich interactive features. In addition to this, it can also be used to strengthen the website’s security by adding some of the simple security features such as disabling right-click, protecting images,hiding or masking parts of a web page and so on.

How JavaScript Works?

Before you proceed to the next part which tells you how to disable the JavaScript functionality and bypass any of the restrictions imposed by it, it would be worthwhile for you to take up a minute to understand how JavaScript works.

JavaScript is a client side scripting language (in most cases), which means when loaded it runs from your own web browser. Most modern browsers including IE, Firefox, Chrome and others support JavaScript so that they can interpret the code and carry out actions that are defined in the script. In other words, it is your browser which is acting upon the instruction of JavaScript to carry out the defined actions such as blocking the right-click activity. So, disabling the JavaScript support on your browser can be a simple solution to bypass all the restrictions imposed by the website.

How to Disable the JavaScript?

Here is a step-by-step procedure to disable JavaScript on different browsers:

For Internet Explorer:

If you are using IE, just follow the steps below:

    1. From the menu bar, go to Tools -> Internet Options.
    2. In the “Internet Options” window, switch to Security tab and click on the button Custom level…

IE Security Settings

  1. From the Security Settings, look for the option Active scripting and select the Disable radio button as shown above and click on “OK”.
  2. You may even select the Prompt radio button, so that each time a page is loaded, you will have the option to either enable or disable the scripting.

For Google Chrome:

If you are using Chrome, you can disable the JavaScript by following the steps below:

    1. Click on the Chrome “menu” button (on the top right corner) and selectTools.
    2. From the “Settings” page, click on Show advanced settings…
    3. Now under Privacy, click on the button Content settings…

Chrome Content Settings

  1. Under the JavaScript, select the radio button which says “Do not allow any site to run JavaScript” and click on “Done”.

For Mozilla Firefox:

Steps to disable JavaScript on Firefox:

    1. From the menu bar, click on Tools -> Options.
    2. From the Options window, switch to Content tab, uncheck the option which says “Enable JavaScript” and click on “OK”.

Firefox Content Options

How to Bypass the Right Click Block?

In order to bypass the right-click block or any other restriction imposed by JavaScript, all you need to do is just disable it in the browser and refresh the same page, so that it now reloads without JavaScript functionality. You are now free to right-click on the page, view its source or even copy any of the images that you may want to. Don’t forget to re-enable the JavaScript once again when your job is over. Otherwise lack of JavaScript support may result in unusual rendering of web pages.

WhatsApp Spy: Spy on WhatsApp Messages

WhatsApp is one of the most widely used instant messaging applications during the recent years. Attractive features like cross-platform support and media sharing has made WhatsApp to be the top choice among most users. On the other hand, WhatsApp has also become a favorite application for many cheaters to exchange secret messages and maintain illicit relationships. Therefore, in order to investigate the truth about their partners or children it becomes inevitable for many individuals and parents to spy on WhatsApp.

Ways to Spy on WhatsApp

Some of the possible ways to spy on WhatsApp messages are as described below:

1. WhatsApp Spy using a Spy App: Easiest Way

Using a spy app is the easiest way to spy on WhatsApp messages. Although there are a handful of companies marketing substandard WhatsApp spy apps on the market today, there exists a few genuine ones as well that are worth considering. One of my favorite app to spy on WhatsApp is mSpy which is known for its quality and top notch features.

The following are some of the exciting features of mSpy which makes it a perfect to spy on WhatsApp messages:

mSpy Features:

  • Spy on WhatsApp Messages and Chats.
  • WhatsApp Spy on Group Messages.
  • Spy on Internet activity including social media like Facebook, WhatsApp,Twitter and Gmail.
  • Spy on GPS locations in real-time.
  • Spy on WhatsApp Contacts.
  • Spy on keystrokes, photos and videos.
  • Spy operation works in a complete stealth mode and thus remains undetected!.

How it Works?

You will have to download and install the mSpy app onto the target phone where you need to spy on WhatsApp messages. Installation and configuration takes only a few minutes. However, for this you should have the target phone in your hand at least for a few minutes.

Once the installation is complete, the monitoring process of all the above mentioned activities (WhatsApp messages, calls, SMS, Internet, GPS, camera etc.) will begin and the recorded logs are silently uploaded to your mSpy account. You can login to your online account at any time to view the logs containing WhatsApp messages and other activity details. You can download mSpy from the link below:

Download mSpy

Compatible Phones: Android, BlackBerry, Apple iPhone, Windows Mobile, iPad and Tablets.


2. Spoofing the MAC Address: The Difficult Way

The other way to spy on someone’s WhatsApp messages is to spoof the MAC address of the target phone from your phone. This method is somewhat considered difficult and require a moderate amount of technical skills to perform. Let me explain.

WhatsApp has a small vulnerability which allows you to run the same WhatsApp account on two phones provided they both have the same MAC address. For this, you will have to gain access to the target phone to record its MAC address and spoof the same on your device. This is how you can find the MAC address of the target phone:

For Android – Head over to Settings —> About phone —> Status—> Wi-Fi MAC address

For iPhone – Head over to Settings—> General —> About —> Wi-Fi address

For Windows Phone – Head over to Settings —> About —> More info —> MAC address

For BlackBerry – Head over to options —> Device —> Device and Status info —> WLAN MAC

Once you have recorded the target phone’s MAC address, you will have to spoof the MAC address on your android phone. After this is done, install WhatsApp on your phone, configure it using the target person’s phone number and verify the WhatsApp account using the verification code received on the target phone.

If you successfully manage to execute all the above mentioned steps, you will have a replica of the target user’s WhatsApp account running on your phone. That means you will receive notifications on your phone for each and every activity of the target WhatsApp user. To spy WhatsApp messages, I still recommend the usage of mSpy as this method is lot simpler than that of spoofing MAC address.

Download mSpy

How to Change Your IP Address

Change IP Address

Every time you connect to the Internet, your ISP (Internet Service Provider) assigns an IP address to your computer that makes it possible for websites and applications to keep track of your online activities and also pin point your physical location. Therefore, in order to protect your Internet privacy, it is often necessary to change your IP address.

Ways to Change IP Address

The following are some of the possible ways to change IP address of your computer:

1. Using a VPN: Best Way to Change IP Address

Even though there are several methods to change your IP address, using a VPN proxy is by far the best and most secure way. The following are some of the most popular VPN proxies that most Internet users prefer:


  • Hide My Ass VPN – Hide My Ass is one of the most popular and trusted VPN service that provides a fast and secure proxy server to allow people to easily change their IP address and also obtain IP address from any country of their choice.

Download Hide My Ass VPN

  • VyprVPN – VyprVPN offers the world’s fastest VPN services to make it possible for its clients to easily change their real IP using a proxy and supports wide range of operating systems.

Download VyprVPN


Advantages of using VPN over other methods:

  • Fast, secure and highly reliable. All your web traffic is encrypted to keep your data safe from hackers and also protect your privacy.
  • You can choose from a list of countries and locations to obtain a new IP address. This makes it possible to have your origin from any country of your choice.
  • Easily bypass regional blocks to access sites and content that are restricted for your location.

2.Change IP by Restarting the Router

Every time you connect to the Internet your ISP may assign a different IP to your computer called dynamic IP. If your Internet connection uses a dynamic IP you can easily change it just by restarting your network device such as modem/router. All you need to do is just turn off its switch for a few seconds and turn it on again to get a different IP address assigned.

Unlike using a VPN, this method has quite a few drawbacks. Your newly assigned IP will have the same location or country as before and therefore if you’re trying to bypass a country block it would not be possible. Moreover, if your Internet connection uses a static IP address, you will get the same IP assigned no matter how many times you restart your router.

3. Using Free Web Proxy to Change Your IP Address

If you cannot afford a VPN service or restarting the router doesn’t get you a new IP, you can try some of the free browser based proxy services that help you change your IP address and surf anonymously. The following are some of the websites that offer free proxy services:

Drawbacks of using free web proxies

Even though these services come free of cost they also come with some of the following drawbacks:

  • Most of them are slow and websites take a lot of time to load.
  • Security and privacy is questionable as most of these free services are unreliable.
  • Users have to bare with annoying ads and pop-ups as these sites need to generate revenue to compensate for free service.
  • Limited or no choice over the selection of your IP location.

How to Ensure that Your IP is Changed?

To know your current IP address just type what is my ip address on Google and your public IP address should be displayed in the search results. Once you’ve successfully implemented one of the above mentioned IP changing methods, you can re-check your IP on Google to make sure that you have got a new one.

Change IP Address

The above snapshot shows the Google search result page displaying a new IP address after the router is restarted.

Android’s SECRET Codes 2018

Android Secret/Hidden codes 2015 :-

 *#06# – IMEI (International Mobile Station Equipment Identity) number – essential in case your device is stolen and you want to block the thief from accessing your network

 *#*#7594#*#*  Make Power button turn off your device without displaying menu

*#*#4636#*#* – Display information about phone, battery, usage and WiFi

*#*#7780#*#* – Factory reset (deletes app data and apps, not firmware)

*2767*3855# – Complete phone wipe, including firmware (not to be used lightly!)

*#*#273283*255*663282*#*#* – Back up all your photos and videos
*#*#1472365#*#* – Test your GPS
*#*#1234#*#* – Display phone firmware and PDA info

 

androidpit-secret-testing-menu-w782
You can access the above screen on most Android devices by entering*#*#4636#*#* on the dialpad

 

*#*#232338#*#* – Show WiFi Mac address
*#*#8255#*#* – Access GTalk Service Monitor
*#*#36245#*#* – Access Email debug info Email
*#*#225#*#* – Events calendar
*#*#426#*#* – Debug info for Google Play Service
*#*#759#*#* – Access Google Partner Setup

#Samsung SECRET Codes :-

 

*#*#34971539#*#* – Show all camera information
*#*#197328640#*#* – Enable test mode for services
*#*#232339#*#* – Wireless LAN test
*#*#1575#*#* – Test your GPS (alternative to generic Android GPS test)
*#*#0*#*#* – Test your LCD display
*#*#4986*2650468#*#* – Display crucial phone information (PDA, Hardware, firmware etc.)
##778 (followed by the Call button) EPST menu

#HTC SECRET Codes New :-

*#*#3424#*#* HTC function test Program
*#*# – HTC Info menu
*#*#8255#*#* – Launch GTalk Service Monitor
##3424# – Diagnostic mode
##3282# – EPST menu
##8626337# – VOCODER
##33284# – Field trial menu
##786# – Reverse Logistics Support
##7738# – Protocol Revision

How To Reset Windows 8/8.1 Admin Password Without Knowing Old Password

How To Reset Windows 8/8.1 Admin Password Without Knowing Old Password

Today millions of users are using the latest version of Windows that is Windows 8 and 8.1 which is currently providing lots of features for their users. In this version you need to enter PIN or the password to access the administrator account but what if you forget your windows password. You think you need to install the new operating system in your computer system to access the services but actually you can change the password with the method with which we are here. So lets have a look on the method of How To Reset Windows 8/8.1 Admin Password Without Knowing Old Password. Yes it is possible and you can do  it with your self by just following a simple trick that i have discussed below.

How To Reset Windows 8/8.1 Admin Password Without Knowing Old Password

How-To-Reset-Windows-8-Password

How To Reset Windows 8 Password

This method is based on Windows 8/8.1 password cracking through other virtual OS that you will run on your computer without actually installing it. With this you will access the internal files of computer and reset admin panel.


Just proceed through below steps.

First of all you need to create a Linux Live Cd through linux ISO File.Now boot this CD in your computer through boot menu.Now there navigate to C:\Windows\System32.And there rename sethc.exe to sethc1.exe.And rename cmd.exe to sethc.exe.Now simply restart your computer.Now you will see you login screen, simply press shift button five times.You will see command prompt will open.34There type net user and hit enter.14Now you will see the name of administrator account note it down.Now type net user user_name new password and hit enter as shown in screenshots.24Thats it now type the password in login panel and you are logged in.

So above is all about How To Reset Windows 8/8.1 Admin Password Without Knowing Old Password. By this you can easily revover your forgotten password in windows and there will be no need to install new operating system in your computer to access the services. Hope you like the post, don’t forget to share it with your friend

How To Use Two WhatsApp (Dual WhatsApp) In Single Device (Latest) 2018

so today We are coming with a new trick to use two whatsapp account easily.here we have a new App Name OMWhatsApp ( Not Available On Playstore)


What is OMWhatsapp?.

OMWhatsapp is modified application of popular messaging app “Whatsapp”, which is modified for purpose of running two Whatsapp Account in single device or dual whatsapp in a device. Moreover, OMWhatsapp has all Whatsapp Plus mod, As this mod is presented to all of you again by Osama.
14600005
Use Multiple WhatsApp In Single Devive 2016 Mukeshtricks4u
#OMWhatsApp Features 
  1. Hide(Freeze) last seen
  2. Hide blue ticks
  3. Hide Double ticks
  4. Hide typing/recording
  5. Hide blue microphone
  6. Change WhatsApp Skin:
  7. You can change any color
  8. You can download & apply themes
  9. View photos/viedos without download
  10. Play voice notes without download
  11. Groups message counter
  12. Change icons
  13. Send Vedios up to 30Mb
  14. Send Full Quality photos
  15. Send up to 90 photo at once
  16. Whatsapp Calls&WhatsApp Web
  17. Anti ban
  18. Hacking Purpose.
  19. Stylish Status Bar.
  20. Emojiz Clear Options.
#What’s New on OMWhatsApp ?
  • Increase sending video limit to 1GB
  • Add Gradient Color MODS for ( Chats/Conversation/Calls/Contacts Screen )
  • Add MOD 2.1.9 to change color of Tabs Background on Main Screen
  • Add MOD 1.2.44 to change color of Delete Button on Emojis Header
  • (Fix Bubbles Style MOD ( Untidy Bubbles
  • Fix lag issue totally .. App works much faster and smoother than before
  • Add MOD 6.11 to disable Heads-Up notification ( In Lollipop )
  • Add MOD 1.4.1 to enable/disable showing contacts pics. in Conversation Screen
  • Add MOD 1.4.2 to show contacts pics. in Groups
  • Add MOD 1.4.3 to show my profile pic in Conversation Screen
  • Add MOD 1.4.4 to show my profile pic in Groups
  • Add MOD 1.4.5 to resize profile pics. in Conversation Screen
Process Of Installing…




PicsArt_1448876975801
Download OMWhatsapp

  • Download OMWhatsApp Apk From Our Site in Free Of Coast..
  • Install this Apk As You Install Other apps.
  • Complete All Steps as you completed in your Real Version Of WhatsApp.
  • After Mobile Number Verfication You CanUse Your 2nd WhatsApp in A Single Device.
  • Its Easy, There Is No Need To Uninstall The Real version of WhatsApp.
  • Enjoy !

#1 Link Click Here – Download OMWHATSAPP

#2 Link Click Here – Download OMWHATSAPP FREE 2016

PicsArt_1448876637256
PicsArt_1448876467336
PicsArt_1448876372148

So Above Is All About Using Of Two WhatsApp In A Single Device 2016. If You Have Any Query Then Comment Below.

How To Hack Facebook Account Using Backtrack 5r3 2018

#StepsTo Hack Facebook Account

#1.Install Backtrack From Official Site After Installation, Open your backtrack 5R3’s terminal and type : cd /pentest/exploits/set 


scr1


#2. Now Type On Opened Terminal And type: ./set to open “Social Engineering Tool kit“.

.set


#3. After SET Opening Select 1st Option 
1) Social Engineering Attacks
Type “1” and Hit Enter.

1+Social+Engineering+attacks


#4.Now Select Option 2 
2) Website Attack Vectors

scr4


#5.Now just Select 4th Option 
4 Tabnabbing Attack Method

scr5


#6.Now Select Option 2 
2) Site Cloner

scr6


#7.Now Here you Need to Add your IP,



scr8


#8.Now Here you need to add the URL of  FB

Note: if you want to hack Facebook then put here Facebook URL.

scr9


#9. Just Hit Enter

Scr10
 
 
#10.Paste Your IP in Address bar and Page  should be look like this..


login
 

When Victim Log in to your Page Details will come here.. 

 
result


if you want to Know your IP Open new Terminal and type: ifconfig

I
scr7

Why Facebook is prone to hacking? And how to stay away from Facebook account hacking?

Facebook has turned out to be the most revered social networking site. Right from individuals to that of large enterprises and companies holds an account with the facebook and it is looked upon as the best means to connect to friends. Along with its popularity come the problems like spamming and hacking activities. It has become the target for hackers as they know that it has got most number of users than any other site. There are also lots of personal and sensitive information shared through facebook.

It is also to be noted that many people are not aware of the security setting options and does not take necessary initiative to keep their account in the safe zone. This has further contributed to increase in the hacking activities by the hackers and spammers and they are at full go into the social networking site. Since, Facebook has become an essential means to keep connected to your dear ones, the only way to keep going with using it is to take care of the security processes that are associated with it.

Steps to Secure Facebook Account:

In order to prevent your account from getting hacked, there are few steps that need to be taken care of and looked into from time to time.

  • Change the facebook account password regularly
  • Email ID needs to be hidden
  • Ensure that the security answer is tough enough to crack
  • Activate Log-in notification facility
  • Set up a hard answer on your email security question

Prevent Hacking

It is necessary to keep changing the Facebook account password in order to prevent hacking. Also, it is necessary to keep the security question answer tough by providing a different sort of or unrelated answer to it. It’s enough that just you know what needs to be entered there. One also needs to make the best use of all of the security measures available with Facebook and to do that you need to be aware of it. If you are taking your privacy in the social networking site serious then keep yourself updated on the security aspects.

Get Good Anti-Virus Installed:

Having a good anti virus software installed to your system is very much essential that not only protects your facebook account but the whole of your system. It is one of the basic steps that need to be done when registering with a social networking site. Also, make sure that you do selective browsing in Facebook, so that you do not invite any of the viruses into your system.

Basic set up to follow:

  • Make use of a secure browser
  • Install software that detects authenticity of sites
  • Ensure that you do not share personal and sensitive information
  • Protect the mail through a strong privacy policy

On the whole, it is of immense necessity for one to take care of the security aspect of the Facebook account but your mail and system as well. This definitely contributes to the much needed extra layer of security for your account.

Find, Lock and Erase All Data On Your Phone Without Touching It

Did you know that you can actually lock your android phone without physical contact? Yes! Lock your android phone remotely and easily.

Of course! You are devasted you lost your beloved phone because someone stole it or you lost it somewhere and someone found it but won’t return it to you and you were deeply worried because someone might actually be browsing your private data such as images, videos, and text messages. Well, worry no more because this tutorial will teach you to totally erased all the data you have on your lost phone and lock it for good!

Requirements:

These requirements are important to get everything done remotely. So, it’s important you set these up beforehand in case the time comes you lost your phone. And also, if you realized you lost your phone you should immediately perform these actions otherwise, you are giving the thief a handful of time to make something to your phone.

  • Phone Location must be turned on.
  • The phone itself must be turned on.
  • It must be signed to your Google Account.
  • It must have an internet connection.
  • The “Find my Device” Feature must be turned on.

Find Your Phone Remotely

You can easily find your phone EXACT location using this feature! Yes, the exact location simply follows the tutorial and requirements must be met first.

Tutorial:

  • To get everything started to go android.com/find
  • Sign in with your Google email the same that account was signed on your phone.
  • Give time to connect to your phone.
  • Then it will give you the real-time location of your phone! Yes, REAL-TIME.

How to Find Android Phone Remotely

Lock Your Phone Remotely

Now on locking your android device its just a few clicks away. Lock your phone and enter your phone number know the holder of your phone to contact you. Which is unlikely if your phone was stolen.

Tutorial:

  • Click the “Lock” Option and then enter a message and your phone number to get your contact.
  • Just like the image below.
  • On the right (phone’s end), this is what it will look like.

How to Lock Android Device Remotely

Erase Data On Your Phone Remotely

If every action you do fails. The thief won’t return your phone then this is your last resort. Erase all the data in it for GOOD! This will erase all your pictures, videos, contact list, messages and everything. The phone will be like the phone you have just bought it, empty on anything. And it will still remain locked after this.

Tutorial:

  • Go to Erase feature and then click on the erase.
  • Done!
  • This will erase everything you have on your phone.

How to Erase all Data on your Phone Remotely

Google put a lot of effort there to get everything is secured for you and your data. These features are all put together to protect your data but your phone can still be operational after everything. The thief can still do some magic on your phones program and reset everything bypassing every security feature and make the phone working again.