โป๏ธHow to Hack the Home Routers and gain the Admin Rightsโฆ
๐ฎRequirements:
Port Scanner (zenmap,superscan or unicornscan.I use Zenmap)
Web Browser (Chrome,Firfox or Safari)
Internet Connection(Any kind of Internet connection)
First of all I want to tell you why I use Zenmap because Nmap is the best friend of hackers and Zenmap is the graphical user interface of nmap.
Instruction on How to Hack the Home Routers and gain the Admin Rightsโฆ
1. We should select an IP range. I have selected IP range that includes my public IP address.
XXX.XXX.30.0-XXX.XXX.30.255
2. Now letโs scan for home routers.
When you finished your scan, You can find IP addresses which has open ports such as http port(80), ftp port(21) and telnet port(23).
I have found many IP addesses with port 80 is opened.
So I stopped my scan.
3. Now you can access these addesses using your web browser because http port is opened and we need to find whether the web page is router log in page.
4. If you see the alert error messages, it says TD-8817. So we can Google for it or you can visit routerpassword.com to know the default router username and password
5. Now letโs try to access these IP addresses using default logins we just got on step 4.
Default username and passwords are not same for every routers.
With username : admin and password : admin, we can log in to the router administration page
Hope you found it useful
โ More tricks - itscybertech ๐ โญ
Sสแดสแด แดษดแด sแดแดแดแดสแด แดs๐
โ @itscybertech โ
๐ฎRequirements:
Port Scanner (zenmap,superscan or unicornscan.I use Zenmap)
Web Browser (Chrome,Firfox or Safari)
Internet Connection(Any kind of Internet connection)
First of all I want to tell you why I use Zenmap because Nmap is the best friend of hackers and Zenmap is the graphical user interface of nmap.
Instruction on How to Hack the Home Routers and gain the Admin Rightsโฆ
1. We should select an IP range. I have selected IP range that includes my public IP address.
XXX.XXX.30.0-XXX.XXX.30.255
2. Now letโs scan for home routers.
When you finished your scan, You can find IP addresses which has open ports such as http port(80), ftp port(21) and telnet port(23).
I have found many IP addesses with port 80 is opened.
So I stopped my scan.
3. Now you can access these addesses using your web browser because http port is opened and we need to find whether the web page is router log in page.
4. If you see the alert error messages, it says TD-8817. So we can Google for it or you can visit routerpassword.com to know the default router username and password
5. Now letโs try to access these IP addresses using default logins we just got on step 4.
Default username and passwords are not same for every routers.
With username : admin and password : admin, we can log in to the router administration page
Hope you found it useful
โ More tricks - itscybertech ๐ โญ
Sสแดสแด แดษดแด sแดแดแดแดสแด แดs๐
โ @itscybertech โ
โป Man in the middle attack ๐ ๐ฆนโโ๏ธ๐โโ
A man-in-the-middle (MiTM) attack is one in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other. The attack is a type of eavesdropping in which the entire conversation is controlled by the attacker. Sometimes referred to as a session hijacking attacks MiTM has a strong chance of success when the attacker can impersonate each party to the satisfaction of the other. MiTM attacks pose a serious threat to online security because they give the attacker the ability to capture and manipulate sensitive information in real-time.
The tutorial is coming soon about "MITM attack using android"
Stay connected ๐
Share And support us ๐
โ @itscybertech โ
A man-in-the-middle (MiTM) attack is one in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other. The attack is a type of eavesdropping in which the entire conversation is controlled by the attacker. Sometimes referred to as a session hijacking attacks MiTM has a strong chance of success when the attacker can impersonate each party to the satisfaction of the other. MiTM attacks pose a serious threat to online security because they give the attacker the ability to capture and manipulate sensitive information in real-time.
The tutorial is coming soon about "MITM attack using android"
Stay connected ๐
Share And support us ๐
โ @itscybertech โ
โค How are you guys โป
๐ฅ Get ready for 31st special - android programming paid pdf for free.
๐ฅ Get ready for 31st special - android programming paid pdf for free.
Final Results
89%
Fine ๐
11%
Not fine ๐
โโ Attention โ ๐๐๐๐
โป As you all know that 2019 is going to end and 2020 will start from tomorrow and in this occasion I am giving you the two paid pdf books for free today after 4:00 pm (GMT +5:30) โป
๐ฅ stay active after 4:00 pm (indian time) ๐
โAndroid programming 50 hacks
โAndroid programming pushing the limits
Goodbye ๐ 2019 with smile ๐
๐ฅShare and support ๐
โโโ @itscybertech โโโโ
๐ I Hope you will support me more in the 2020
โป As you all know that 2019 is going to end and 2020 will start from tomorrow and in this occasion I am giving you the two paid pdf books for free today after 4:00 pm (GMT +5:30) โป
๐ฅ stay active after 4:00 pm (indian time) ๐
โAndroid programming 50 hacks
โAndroid programming pushing the limits
Goodbye ๐ 2019 with smile ๐
๐ฅShare and support ๐
โโโ @itscybertech โโโโ
๐ I Hope you will support me more in the 2020
Cyber Techโข pinned ยซโโ Attention โ ๐๐๐๐ โป As you all know that 2019 is going to end and 2020 will start from tomorrow and in this occasion I am giving you the two paid pdf books for free today after 4:00 pm (GMT +5:30) โป ๐ฅ stay active after 4:00 pm (indian time) ๐ โAndroidโฆยป
๐ Android programming paid pdfs๐
Download and learn android in 24 hourse
Programming pdfs -
1: Android programming 50 hacks*
2: Android programming pushing the limits*
๐ฌ Price - free
๐ฅ Download - http://bit.ly/Andro_pro
โป Uploaded - 31 dec ,2019
Share and support ๐๐
โโโโ @itscybertech โโโโ
Today you will get two paid pdf books from here and both are free for you. Both are targeting android programming and development. How ever first one is basic and second is advance. Both are 5 stares rated in ethical worldDownload and learn android in 24 hourse
Programming pdfs -
1: Android programming 50 hacks*
2: Android programming pushing the limits*
๐ฌ Price - free
๐ฅ Download - http://bit.ly/Andro_pro
โป Uploaded - 31 dec ,2019
Share and support ๐๐
โโโโ @itscybertech โโโโ
Cyber Techโข pinned ยซ๐ Android programming paid pdfs๐ Today you will get two paid pdf books from here and both are free for you. Both are targeting android programming and development. How ever first one is basic and second is advance. Both are 5 stares rated in ethical worldโฆยป
Cyber Techโข pinned ยซ๐ Android programming paid pdfs๐ Today you will get two paid pdf books from here and both are free for you. Both are targeting android programming and development. How ever first one is basic and second is advance. Both are 5 stares rated in ethical worldโฆยป
Happy new year 2020
๐ฐ HAPPY NEW YEAR ๐ฐ
Let all your dreams come true this year, I wish you all a very Happy New Year! May the new year fill your heart with all the joy and bring you pleasure and profitable news all year round. Happy New Year 2020! May this year be fantastic for you, today and forever my beloved!.
CyberTech Send a Special Gift For You Click On Blue Line
๐ https://bit.ly/-_2020
โโโ @itscybertechโโโ
๐ฐ HAPPY NEW YEAR ๐ฐ
Let all your dreams come true this year, I wish you all a very Happy New Year! May the new year fill your heart with all the joy and bring you pleasure and profitable news all year round. Happy New Year 2020! May this year be fantastic for you, today and forever my beloved!.
CyberTech Send a Special Gift For You Click On Blue Line
๐ https://bit.ly/-_2020
โโโ @itscybertechโโโ