Apple reveals 3 iPhone X models in their event at Cupertino.
iPhone XS - starting at $999
iPhone XS Max - starting at $1099
iPhone XR - starting at $699
iPhone XS - starting at $999
iPhone XS Max - starting at $1099
iPhone XR - starting at $699
Hack Facebook Account Password Using Brute Force
1⃣. First lets know something about Brute force attacks, “A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN).
2⃣. In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data.”
But, In our case I’ll be using a Python script and a Long Dictionary Of passwords.
Requirement
A Kali Machine / Or Any Python Engine Will work!
Facebook.py ( v1 or v2 )
A FaceBook id
CrackStation Word List!
STEPS
Step 1. Install Python-mechanize using command mention below
~#apt-get install python-mechanize
Step 2. Add facebook.py using the command below
~# chmod +x facebook.py [*]
~# python facebook.py
Step 3. Now enter |Email| or |Phone number| or |Profile ID number| or |Username| of the victim,
Step 4. Now Give The "Path" Of Your CrackStation Word list
Step 5. Now it will try all passwords present in the word list, So relax as it will take time depending on speed of your processor and password strength of your victim!
Any Question @anonyguy
Join Us @Techbyte
For any adverisment contact @roml3n
1⃣. First lets know something about Brute force attacks, “A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN).
2⃣. In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data.”
But, In our case I’ll be using a Python script and a Long Dictionary Of passwords.
Requirement
A Kali Machine / Or Any Python Engine Will work!
Facebook.py ( v1 or v2 )
A FaceBook id
CrackStation Word List!
STEPS
Step 1. Install Python-mechanize using command mention below
~#apt-get install python-mechanize
Step 2. Add facebook.py using the command below
~# chmod +x facebook.py [*]
~# python facebook.py
Step 3. Now enter |Email| or |Phone number| or |Profile ID number| or |Username| of the victim,
Step 4. Now Give The "Path" Of Your CrackStation Word list
Step 5. Now it will try all passwords present in the word list, So relax as it will take time depending on speed of your processor and password strength of your victim!
Any Question @anonyguy
Join Us @Techbyte
For any adverisment contact @roml3n
ethical hacking tutorials will go simultaneously.More topics will be added as the series goes on.
Starting tomorrow, we will start fundamentals of hacking, and ethical hacking (step-by-step) series will start following it.
With that, all members are requested to participate in the event to fulfill the (100k+ learners in three months) target, by forwarding our posts for new members in your channel or group chat.
~Admin
Starting tomorrow, we will start fundamentals of hacking, and ethical hacking (step-by-step) series will start following it.
With that, all members are requested to participate in the event to fulfill the (100k+ learners in three months) target, by forwarding our posts for new members in your channel or group chat.
~Admin
To remove the password of the computer in BIOS take out the battery of the motherboard for few seconds
And put it back
And put it back
paypal account Username: bswainca@yahoo.ca
Password: austin33 Address: General Delivery, A0A 1C0, Newfoundland, Bay Bulls
Password: austin33 Address: General Delivery, A0A 1C0, Newfoundland, Bay Bulls
HACKING A TARGET PREFACE
this is my new unofficial guide to hacking
the definitions i will give you will not be standard but they will help you understand
PORTS
a port is a door into a computer. when you hack a computer, you do it through a port
there are 65535 ports [ways to enter a computer] but mostly only 2 or 3 ports are open
examples of ports include telnet(port23) http(port80) ssh(port22) and ftp(port21)
open ports can tell us what software is running on the system
for example if port1433(msSQL) is open then it means there is a database on the site
subdomains
companies use different sites to allow their staff to log into their network. if you can find one, then you can attack it with an sql or xpath injection
here is an example
if our target site is m.com, then login.m.com is where to login and registration.m.com is where to register
watch out for the next post.!
~halo Zorayo
this is my new unofficial guide to hacking
the definitions i will give you will not be standard but they will help you understand
PORTS
a port is a door into a computer. when you hack a computer, you do it through a port
there are 65535 ports [ways to enter a computer] but mostly only 2 or 3 ports are open
examples of ports include telnet(port23) http(port80) ssh(port22) and ftp(port21)
open ports can tell us what software is running on the system
for example if port1433(msSQL) is open then it means there is a database on the site
subdomains
companies use different sites to allow their staff to log into their network. if you can find one, then you can attack it with an sql or xpath injection
here is an example
if our target site is m.com, then login.m.com is where to login and registration.m.com is where to register
watch out for the next post.!
~halo Zorayo
Join our Group chat @GEEKernel Rules of the Group .
1. Posts should be original. Give proper credits if your posts are copied.
2. Strictly no promotion allowed. Do not try to promote your page or youtube channels, blogs or websites & no offers.
3. Use 'Report to admin' option if you find anything inappropriate. (Reply to that message with "@admin")
4. Respect each other. Any kind of misbehavior will lead to permanent ban.
5. Any kind of offensive comments on religions, states, Political Parties or ethic group is strictly not allowed.
6. Posting #NOC (Not Original Content) as #OC (Original Content) will lead to ban.
7. If anyone ever ask how to hack Facebook or anything else then he/she would be banned.
8. First try to find your question on google, if you don't find it there then leave a post here.
If you see any post not following rules, please free to report post to admin.
Breaking above rules = BAN
1. Posts should be original. Give proper credits if your posts are copied.
2. Strictly no promotion allowed. Do not try to promote your page or youtube channels, blogs or websites & no offers.
3. Use 'Report to admin' option if you find anything inappropriate. (Reply to that message with "@admin")
4. Respect each other. Any kind of misbehavior will lead to permanent ban.
5. Any kind of offensive comments on religions, states, Political Parties or ethic group is strictly not allowed.
6. Posting #NOC (Not Original Content) as #OC (Original Content) will lead to ban.
7. If anyone ever ask how to hack Facebook or anything else then he/she would be banned.
8. First try to find your question on google, if you don't find it there then leave a post here.
If you see any post not following rules, please free to report post to admin.
Breaking above rules = BAN
what is the difference between a password and a hash
hacking is just like cooking
when you have pepper and tomatoes you can make stew with it right?
but that doesnt mean that after making the stew, you can get the tomatoes and pepper back.
when you have a password, you can use it to make a hash but after that there is no way to get the password back just like there is no way to get tomatoes from stew
cracking a hash means that we have the stew and we want to see the ingredients that were used to make it
so...
we mix all the spices in the world in order to see if we can get the stew
if we fail, we try another combination until we get the same stew and then we will know how it was cooked
this can take a lot of time just as much as cracking hashes takes a lot of time
database administrators store their passwords hashed so that even when you hack them, you have to go through the process of cracking the hashes
just to make our work tougher
~halo zorayo
hacking is just like cooking
when you have pepper and tomatoes you can make stew with it right?
but that doesnt mean that after making the stew, you can get the tomatoes and pepper back.
when you have a password, you can use it to make a hash but after that there is no way to get the password back just like there is no way to get tomatoes from stew
cracking a hash means that we have the stew and we want to see the ingredients that were used to make it
so...
we mix all the spices in the world in order to see if we can get the stew
if we fail, we try another combination until we get the same stew and then we will know how it was cooked
this can take a lot of time just as much as cracking hashes takes a lot of time
database administrators store their passwords hashed so that even when you hack them, you have to go through the process of cracking the hashes
just to make our work tougher
~halo zorayo
Cool Password Bro - Took Approx 72 Hours to Crack this + Evading WIDS, Patience is Key and it works 100% - I already knew I would get this result - If you know your Targets' Vulnerability, you will Succeed.
Ping
Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network. It measures the round-trip time for messages sent from the originating host to a destination computer that are echoed back to the source.
Giving it perspective, suppose you started a online multiplayer game, counterstrike. You aimed at the enemy and shot it, bulls eye, .. but wait a sec, the enemy just teleported somewhere else and shot you down.
What happened here? Your input took long time to reach the server and same for data transferring from server to you.
So, even if you have a fast internet of 100+ MBps, and slow ping rate, the webpages will load slow, messages will reach slow, and a real nightmare for gamers.
So, how to solve it?
Dns: The domain name system (DNS) is the way that internet domain names are located and translated into internet protocol (IP) addresses. The domain name system maps the name people use to locate a website to the IP address that a computer uses to locate a website.
In most of the cases, if your dns is good, the ping will be lower, and leading to faster internet.
To check ping speed, go to speedtest.net, and comment the results below.
To reduce the ping, join our group chat, and i'll provide you many ways of reducing it.
I've attached a cool looking speedtest result.
Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network. It measures the round-trip time for messages sent from the originating host to a destination computer that are echoed back to the source.
Giving it perspective, suppose you started a online multiplayer game, counterstrike. You aimed at the enemy and shot it, bulls eye, .. but wait a sec, the enemy just teleported somewhere else and shot you down.
What happened here? Your input took long time to reach the server and same for data transferring from server to you.
So, even if you have a fast internet of 100+ MBps, and slow ping rate, the webpages will load slow, messages will reach slow, and a real nightmare for gamers.
So, how to solve it?
Dns: The domain name system (DNS) is the way that internet domain names are located and translated into internet protocol (IP) addresses. The domain name system maps the name people use to locate a website to the IP address that a computer uses to locate a website.
In most of the cases, if your dns is good, the ping will be lower, and leading to faster internet.
To check ping speed, go to speedtest.net, and comment the results below.
To reduce the ping, join our group chat, and i'll provide you many ways of reducing it.
I've attached a cool looking speedtest result.
How ISP provide the internet?
imagine you are in a room, the room just have one door. And you need to go out of the room, how you do it?? You step out from the door. So the room is your lan, outside the door is the another network you want to reach, it may be the Internet. The gateway is the door, you step outside the room passing through the door. Now imagine you are inside a house, the house have one kitchen, one bathroom, and a room. Your router knows its own network, so if you ask it, where is the kitchen, it will reply where it is, but if you want to go outside of your house, the router will say, the exit door. Gateways, are a connection to everywhere else that is not designated as your network, you are in the 192.168.1.0/24 network, you want to query 8.8.8.8, your router will check it's own dns entries, and it will reply, I have no idea where this is, but I have a connection to outside that someone might know. So the packet will move forward, from your gateway, to isp router. And it will ask same query, hey isp, you know where is 8.8.8.8? Isp will say, its none of my clients, so it's somewhere outside my network, you know what, I have an outside gateway, I will forward you to it... And it will keep on and on, until it reaches the destination, or until it cannot be routed or ttl runs out of time... Is a big story, but that's how it works basically.
imagine you are in a room, the room just have one door. And you need to go out of the room, how you do it?? You step out from the door. So the room is your lan, outside the door is the another network you want to reach, it may be the Internet. The gateway is the door, you step outside the room passing through the door. Now imagine you are inside a house, the house have one kitchen, one bathroom, and a room. Your router knows its own network, so if you ask it, where is the kitchen, it will reply where it is, but if you want to go outside of your house, the router will say, the exit door. Gateways, are a connection to everywhere else that is not designated as your network, you are in the 192.168.1.0/24 network, you want to query 8.8.8.8, your router will check it's own dns entries, and it will reply, I have no idea where this is, but I have a connection to outside that someone might know. So the packet will move forward, from your gateway, to isp router. And it will ask same query, hey isp, you know where is 8.8.8.8? Isp will say, its none of my clients, so it's somewhere outside my network, you know what, I have an outside gateway, I will forward you to it... And it will keep on and on, until it reaches the destination, or until it cannot be routed or ttl runs out of time... Is a big story, but that's how it works basically.
After 15 days of struggle Finally I gets In To Artist Nick Gubi's Twitter Account
The SS7 vulnerability
This is a topic in phreaking.
Copyright protected
You have a phone and a sim card right?
You can send messages and receive calls
What is call roaming?
When you leave your country to maybe Siberia. If you turn on call roaming, whenever you leave your country
Your phone will tell your ISP
Hey I am no longer in Ethiopia so send all my messages to Siberia so that I can receive them
Get it?
That's call roaming
You are roaming in another network in another country
How does ss7 work
An attacker will write a script that says
Hey I am at <attackers location> so send all my messages here
Even though you are not roaming
Your ISP will forward all your messages to the attackers number
Now imagine if the attacker tries to hack your TG account
Telegra will send you a message with a code
If your ISP forwards that message to the attacker, he can use it to get in to your account and you wouldn't even know
That's all for now
I am not a phreaker so this is all I can tell you
Don't forget to share
~halo zorayo
This is a topic in phreaking.
Copyright protected
You have a phone and a sim card right?
You can send messages and receive calls
What is call roaming?
When you leave your country to maybe Siberia. If you turn on call roaming, whenever you leave your country
Your phone will tell your ISP
Hey I am no longer in Ethiopia so send all my messages to Siberia so that I can receive them
Get it?
That's call roaming
You are roaming in another network in another country
How does ss7 work
An attacker will write a script that says
Hey I am at <attackers location> so send all my messages here
Even though you are not roaming
Your ISP will forward all your messages to the attackers number
Now imagine if the attacker tries to hack your TG account
Telegra will send you a message with a code
If your ISP forwards that message to the attacker, he can use it to get in to your account and you wouldn't even know
That's all for now
I am not a phreaker so this is all I can tell you
Don't forget to share
~halo zorayo
Finally!
Our brothers (and sisters did it)!
Facebook has been hacked!
Remember guys nothing is impossible
~kasahun(halozorayo:)
Our brothers (and sisters did it)!
Facebook has been hacked!
Remember guys nothing is impossible
~kasahun(halozorayo:)
WELCOME TO THE FAMILY
who are hackers
hackers are people with the skill of entering remotely into computers to achieve a goal
are they bad?
generaly hackers dislike authority and the idea of peoples data being sold without their knowledge
so why do they hack?
for many reasons
mostly to tell people that their data is being collected and exploiting software so that programmers make safer apps
how do i become a hacker
just believe you are going to change the world
what do i need
if you want to use a phone to hack, make sure it has 2gig+ ram and install nethunter on it
if you have a pc just get any linux version
why linux
you can use any os to hack but linux is faster
what do i need to learn?
follow this posts and learn these in the order
python;ruby (beginner)
c (intermediate)
assembly (elite)
then learn about ports and standard hacking tools like hashcat, netcat nmap, psexec and metasploit
you will also need a stable internet connection
thats the minimum requirements
thanks!
welcome
~halozorayo join us @TechByte
who are hackers
hackers are people with the skill of entering remotely into computers to achieve a goal
are they bad?
generaly hackers dislike authority and the idea of peoples data being sold without their knowledge
so why do they hack?
for many reasons
mostly to tell people that their data is being collected and exploiting software so that programmers make safer apps
how do i become a hacker
just believe you are going to change the world
what do i need
if you want to use a phone to hack, make sure it has 2gig+ ram and install nethunter on it
if you have a pc just get any linux version
why linux
you can use any os to hack but linux is faster
what do i need to learn?
follow this posts and learn these in the order
python;ruby (beginner)
c (intermediate)
assembly (elite)
then learn about ports and standard hacking tools like hashcat, netcat nmap, psexec and metasploit
you will also need a stable internet connection
thats the minimum requirements
thanks!
welcome
~halozorayo join us @TechByte