Best books for hacking!!
1.Hacking: How to Hack Computers, Basic Security and Penetration Testing Ebook
Download Link : https://drive.google.com/file/d/0B4CdA3JV_23OSW5BTVlNU1RlaW8/view
2.Master the Kali Linux - From Noob to Expert Hacking - 8 Ebooks
Download Link : http://www.mediafire.com/file/wv4sun24cwoow17/Kali+tutorial.rar
3.Grey Hat Hacking - The Ethical Hacker's Handbook Ebook
Download Link : https://drive.google.com/file/d/0Bw1xURlCeiXiQXphUzlLTV8xWmM/view
4.Hacking The Art of Exploitation Ebook
Download Link : http://www.mediafire.com/file/ht5dy5dwmf4h0j7/hacking-the-art-of-exploitation.pdf
5.The Hacker's Underground Hand Book.
Download Link : http://www.mediafire.com/file/kb94m3pa9zahrv9/The-Hackers-Underground-Handbook.pdf
Here are few links ( Ebooks) that you guys might be interested.
1. The Hacker Playbook : Practical Guide To Penetration Testing
Link : http://www.allitebooks.com/the-hacker-playbook-practical-guide-to-penetration-testing/
2.The Hacker Playbook 2: Practical Guide To Penetration Testing
Link : http://www.allitebooks.com/the-hacker-playbook-2-practical-guide-to-penetration-testing/
3. Android Hacker's Handbook
Link : http://www.allitebooks.com/android-hackers-handbook/
4. BackTrack 5 Wireless Penetration Testing Beginner's Guide
Link : http://www.allitebooks.com/backtrack-5-wireless-penetration-testing-beginners-guide/
5. Black Hat Python
Link : http://www.allitebooks.com/black-hat-python/
1.Hacking: How to Hack Computers, Basic Security and Penetration Testing Ebook
Download Link : https://drive.google.com/file/d/0B4CdA3JV_23OSW5BTVlNU1RlaW8/view
2.Master the Kali Linux - From Noob to Expert Hacking - 8 Ebooks
Download Link : http://www.mediafire.com/file/wv4sun24cwoow17/Kali+tutorial.rar
3.Grey Hat Hacking - The Ethical Hacker's Handbook Ebook
Download Link : https://drive.google.com/file/d/0Bw1xURlCeiXiQXphUzlLTV8xWmM/view
4.Hacking The Art of Exploitation Ebook
Download Link : http://www.mediafire.com/file/ht5dy5dwmf4h0j7/hacking-the-art-of-exploitation.pdf
5.The Hacker's Underground Hand Book.
Download Link : http://www.mediafire.com/file/kb94m3pa9zahrv9/The-Hackers-Underground-Handbook.pdf
Here are few links ( Ebooks) that you guys might be interested.
1. The Hacker Playbook : Practical Guide To Penetration Testing
Link : http://www.allitebooks.com/the-hacker-playbook-practical-guide-to-penetration-testing/
2.The Hacker Playbook 2: Practical Guide To Penetration Testing
Link : http://www.allitebooks.com/the-hacker-playbook-2-practical-guide-to-penetration-testing/
3. Android Hacker's Handbook
Link : http://www.allitebooks.com/android-hackers-handbook/
4. BackTrack 5 Wireless Penetration Testing Beginner's Guide
Link : http://www.allitebooks.com/backtrack-5-wireless-penetration-testing-beginners-guide/
5. Black Hat Python
Link : http://www.allitebooks.com/black-hat-python/
All U need to know
Current things..
Technology Boxs,
@fans
#amazing quotes
@@ cool pics
Daily Facts, News, Trivia about Technology 📱🌐
Click here ~
@U need to know more
https://telegram.me/Generallyknowledgeable
**** Vívãx ***
Current things..
Technology Boxs,
@fans
#amazing quotes
@@ cool pics
Daily Facts, News, Trivia about Technology 📱🌐
Click here ~
@U need to know more
https://telegram.me/Generallyknowledgeable
**** Vívãx ***
Telegram
Know more
#General knowledge
# more on Technology
#No Ads!
#Funtime
%% Vivax %%
#Amazing facts
#This is 21 cent
#@$hutEé News
#Educational,.
# Entertainment
All in One
# more on Technology
#No Ads!
#Funtime
%% Vivax %%
#Amazing facts
#This is 21 cent
#@$hutEé News
#Educational,.
# Entertainment
All in One
FUN time
https://telegram.me/Generallyknowledgeable
@knowmore
*W H A T A L I F E*
The lawyer hopes you get into trouble, the doctor hopes you fall sick, the police hopes you become a criminal, the teacher hopes you are born stupid, the coffin maker wants you dead, only the thief wishes you prosperity in life so that he can steal from you.
IT'S WORLD'S THIEVES DAY , Send to any thief you know. It came to me by mistake,don't send it back to me, I am not a thief... 😂😂😂
https://telegram.me/Generallyknowledgeable
@knowmore
*W H A T A L I F E*
The lawyer hopes you get into trouble, the doctor hopes you fall sick, the police hopes you become a criminal, the teacher hopes you are born stupid, the coffin maker wants you dead, only the thief wishes you prosperity in life so that he can steal from you.
IT'S WORLD'S THIEVES DAY , Send to any thief you know. It came to me by mistake,don't send it back to me, I am not a thief... 😂😂😂
Telegram
Know more
#General knowledge
# more on Technology
#No Ads!
#Funtime
%% Vivax %%
#Amazing facts
#This is 21 cent
#@$hutEé News
#Educational,.
# Entertainment
All in One
# more on Technology
#No Ads!
#Funtime
%% Vivax %%
#Amazing facts
#This is 21 cent
#@$hutEé News
#Educational,.
# Entertainment
All in One
Mr.Know More :
t.me/Generallyknowledgeable
@knowmore
Hack Facebook Account Password Using Brute Force
1⃣. First lets know something about Brute force attacks, “A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN).
2⃣. In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data.”
But, In our case I’ll be using a Python script and a Long Dictionary Of passwords.
Requirement
A Kali Machine / Or Any Python Engine Will work!
Facebook.py ( v1 or v2 )
A FaceBook id
CrackStation Word List! Which I'll upload shortly.
STEPS
Step 1. Install Python-mechanize using command mention below
~#apt-get install python-mechanize
Step 2. Add facebook.py using the command below
~# chmod +x facebook.py [*]
~# python facebook.py
Step 3. Now enter |Email| or |Phone number| or |Profile ID number| or |Username| of the victim,
Step 4. Now Give The "Path" Of Your CrackStation Word list
Step 5. Now it will try all passwords present in the word list, So relax as it will take time depending on speed of your processor and password strength of your victim!
t.me/Generallyknowledgeable
@knowmore
Hack Facebook Account Password Using Brute Force
1⃣. First lets know something about Brute force attacks, “A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN).
2⃣. In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data.”
But, In our case I’ll be using a Python script and a Long Dictionary Of passwords.
Requirement
A Kali Machine / Or Any Python Engine Will work!
Facebook.py ( v1 or v2 )
A FaceBook id
CrackStation Word List! Which I'll upload shortly.
STEPS
Step 1. Install Python-mechanize using command mention below
~#apt-get install python-mechanize
Step 2. Add facebook.py using the command below
~# chmod +x facebook.py [*]
~# python facebook.py
Step 3. Now enter |Email| or |Phone number| or |Profile ID number| or |Username| of the victim,
Step 4. Now Give The "Path" Of Your CrackStation Word list
Step 5. Now it will try all passwords present in the word list, So relax as it will take time depending on speed of your processor and password strength of your victim!
Telegram
Know more
#General knowledge
# more on Technology
#No Ads!
#Funtime
%% Vivax %%
#Amazing facts
#This is 21 cent
#@$hutEé News
#Educational,.
# Entertainment
All in One
# more on Technology
#No Ads!
#Funtime
%% Vivax %%
#Amazing facts
#This is 21 cent
#@$hutEé News
#Educational,.
# Entertainment
All in One
Know more :
t.me/Generallyknowledgeable
HACK ANY COMPUTER WITH AN IP WITH MetaSploit
I am here to show you this magical tool called Metasploit that allows you to hack ANYunpatched computer with only it's IP. Lets begin...
1.) First you need to download Metasploit. The most up-to-date version is FREE at metasploit.com.
2.) You need PostgrSQL for your database. Download here: http://www.postgresql.org/.
Make sure you use all the defaults or Metasploit woun't work!
3.) Now lets get down to buisness... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III). Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...
4.) Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit gui.
5.) Now, in the window type:
db_connect postgres:ThePassYouChose@localhost:5432
The first time you do this you will see lots of text flash buy. Don't wory, this is normal.
6.)Type db_host to make sure you are connected correctally.
7.)Now type this:
db_nmap 000.000.000.000
Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...
8.) Now we get to the fun part; the automatic exploitation. Just type db_autopwn -t -p -e -s -b , watch the auto-exploitation start, go play Halo for a while, and then come back...
9.) After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.
10.) Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:
sessions -i ExploitNumber
___________________________________________
The features of Metasploit are mutch like a rat. Once you get into someone's computer, you can see their screen, controll their mouse, see what they type, see them, etc.
t.me/Generallyknowledgeable
HACK ANY COMPUTER WITH AN IP WITH MetaSploit
I am here to show you this magical tool called Metasploit that allows you to hack ANYunpatched computer with only it's IP. Lets begin...
1.) First you need to download Metasploit. The most up-to-date version is FREE at metasploit.com.
2.) You need PostgrSQL for your database. Download here: http://www.postgresql.org/.
Make sure you use all the defaults or Metasploit woun't work!
3.) Now lets get down to buisness... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III). Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...
4.) Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit gui.
5.) Now, in the window type:
db_connect postgres:ThePassYouChose@localhost:5432
The first time you do this you will see lots of text flash buy. Don't wory, this is normal.
6.)Type db_host to make sure you are connected correctally.
7.)Now type this:
db_nmap 000.000.000.000
Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...
8.) Now we get to the fun part; the automatic exploitation. Just type db_autopwn -t -p -e -s -b , watch the auto-exploitation start, go play Halo for a while, and then come back...
9.) After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.
10.) Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:
sessions -i ExploitNumber
___________________________________________
The features of Metasploit are mutch like a rat. Once you get into someone's computer, you can see their screen, controll their mouse, see what they type, see them, etc.
Telegram
Know more
#General knowledge
# more on Technology
#No Ads!
#Funtime
%% Vivax %%
#Amazing facts
#This is 21 cent
#@$hutEé News
#Educational,.
# Entertainment
All in One
# more on Technology
#No Ads!
#Funtime
%% Vivax %%
#Amazing facts
#This is 21 cent
#@$hutEé News
#Educational,.
# Entertainment
All in One



