INTRO
Hello Youtube My Name is Hashe Hacker and welcome to my blog.
Yeh Method bahut hi asaan hai apke paas android mobile hna chahiye aap khud facebook hack kr skte hai. Please Subscribe my Youtube Watch This Video
My Name is MHA. I Am A Student. And Hacking Is not a JOKE
Hello Youtube My Name is Hashe Hacker and welcome to my blog.
Yeh Method bahut hi asaan hai apke paas android mobile hna chahiye aap khud facebook hack kr skte hai. Please Subscribe my Youtube Watch This Video
Hello guys My Name is Hashe Hacker and welcome to my blog. In This Tutorial am gonna teach you how to crack bandicam screen recorder. Its very easy to install it in PC. Its use To Record Your Screen.
Grand Theft Auto or GTA is one of the most popular and widely played game of all time around the world. When it comes to video games, GTA is what most of the people prefer playing. In 2002, Rockstar Games launched the first edition of this action-adventure game named Grand Theft Auto: Vice City. At first it was launched only for Playstation, but as it got popularity, they developed and launched it for other platforms as well. Till date, more than 17.5 million copies of GTA Vice City have been sold so far making it one of the most popular video game of all time. If you haven’t played this game yet, then you should definitely download it today and start playing it. If you like action and open world games, then you will definitely like Vice City as it is an action-adventure third-person shooter video game.
As we said earlier that this is one of the most popular game out there which makes it more demanding. Presently Vice City game is available on all major platforms like Playstation, Windows, Xbox, OS X, iOS and Android. In this game the main aim is to pass all of the give missions with set objectives as a story. Apart from missions you can also roam around the city and use things available in the game. There are many kind of weapons available in this game too, which makes it somewhat violent. As the technology is improving, more and more people have started using mobile phones as their primary gadget. There is a downfall in use of video gaming consoles and PC for playing games all over the world.
Here is the Video. You Can Install the GTA Game by Follow this Video
Welcome back! I Am MHA and today we are hacking fscebook account using Z Shadow. Basically Z Shadow is a wesite for making a fake Page. Now Am using Hindi Language For Your Understanding....
I am starting this method step by step
Movavi video editor is a professional software for video editing which is easy to use, easy to learn, user friendly software. It is a very powerful software that has got all the features we need to edit a video. Due to its versatility it has been used by thousands of PC users.I personally recommend Movavi Video Editor to all those who want to be video editors for both beginners and advanced users.
Welcome back friends umeed hai aap sub log bilkul thek thak hoo ge. Dosto aaj hum baat kare ge keh hum kisi facebook ya kisi bhi website ke account ko kese hack kar sakte hein. Sath hi sath hum ye bhi jaane ge keh hum apne account hacking se kese secure kare keh koi hamara account hack na kar sake. Dosto wese to aaj jo method hum istmaal karne ja rahe hein wo phishing hi hai lekin ye method baqi sub phishing methods se easy hai aur iss se hum kisi bhi website ka fake login page bana ke account hack kar sakte hein. Dosto shuru karne se pehle me apko ye bata doo keh ye only for educational purpose ke liye hai. Agar aap iss method ko istamaal kar ke kisi ka facebook account hack kare ge to iss mein meri koi zimadaari nahi hai. Ye post sirf aap ko ye batane ke liye hai keh kese aap ka facebook account new method se hack kia ja sakta hai.
This post is only for educational purpose. It has been written to inform you that how your account can be hacked using new methods of phishing. I am not responsible for any illegal activity you do. It is also about to secure your Facebook or Gmail account from phishing attack. I am not hacking any person account in this post.
Dosto kali linux mein by default aik installed tool hota hai jis ko social engineering toolkit kaha jata hai. Credential harvesting social engineering toolkit ka hi aik part hai. Iss mein sub se pehle hum ko apna local ip address set karna hota hai jis pe hum ko victim ka email aur password show karna hota hai. Doosra ye keh jis website ka account hack karna hota hai iss ki aik clone website banai jati hai. Clone website ka matlb hai keh uss se milti julti aik website banai jati hai. Phir hum ne apna local ip address apne victim ko send karna hota hai aur jese hi victim waha apni login details enter karta hai to uss ki details hum ko mil jati hein.
1. Sub se pehle aap ko kali linux ko apni usb se boot karna pare ga. Agar aap ne apne pc pe kali linux install ki hui hai to aap waha se bhi boot kar sakte hein. 2. Kali linux boot karne ke baad desktop pe right click kar ke open terminal ke option ko click kare. 3. Jub terminal open ho jaye to aap ne waha ye command type karni hai aur enter ka button press kar dena hai. setoolkit 4. uper waali command type karne ke baad aap ko kuch aisi screen show ho gi so aap ne yaha pe Social Engineering Attack perform karna hai iss liye 1 type kar ke enter press kare.
5. Enter karne ke baad aap ko kuch aisi screen show ho gi so aap ne website attack vactors ke liye 2 type kar ke enter kar dena hai. 6. Ab aap ne credential harvester ko select karne ke liye 3 type kar ke enter press kar dena hai. 7. Ab site cloner waale option ko select karne ke liye 2 type kar ke enter kar dein 8. Ab aap ne apna local ip dena hai aur agar aap ko apna local ip nahi pata hai to aap desktop pe right click kar ke open terminal pe click kare aur ifconfig type kare jis se apko apna local ip show ho jaye ga. 9. Jese keh aap uper screenshot mein dekh sakte hein keh mera local ip 192.168.1.104 hai jo keh aap ka different bhi ho sakta hai. Aap iss ko copy kar ke wapis uss terminal mein paste kar dein jese keh aap ko neeche screenshot mein show ho raha hai. 10. Ab yaha uss website ka address likhe jis ka account hack karna hai jese me ne facebook ki site likhi hai. 11. Ab facebook site ka clone start ho jaye ga jis mein kuch seconds lug sakte hein aur jub ye complete ho jaye ga to aap ko kuch aisi screen show ho gi. 12. Ab apna local ip apne victim ko send kare. Aap ka local ip step 9 mein check karne ka method me aap ko bata chuka hoo jo keh mera 192.168.1.104 tha. 13. Apna local ip jub aap apne victim ko send kare ge aur wo iss ko open kare ga to uss ko full facebook jesa page dikhai de ga aur jub wo waha login kare ga to aap ko uss ka email password computer ke andar var folder var ke andar www aur uss ke andar html folder mein show ho jaye ga.
Hi, everyone. I’m MHA, a penetration tester at CompliancePoint (and also a customer of Rapid7). If you’re just getting started in penetration testing, or are simply interested in the basics, this blog is for you.
Kali Linux is an open source project that is maintained and funded by Offensive Security, a provider of information security training and penetration testing services. Kali has become a go-to distribution for hacking, and rightly so. In less than an hour, you can have a running pen testing box with more tools than you will ever use. There is nothing wrong with having a “full toolbox,” but sometimes loading individual tools on the distro of your choice can be a hair-pulling experience. With Kali, the developers have already installed key tools for you, so your experience is pain-free. I run Kali on all my laptops—in fact, this post is being written on Kali under a normal user account on my “sittin’ in the coffee shop” laptop.
You can often install Kali fully on your machine.
In other cases, the workstation you are provisioned for a pen testing job may require you to keep Windows as the primary operating system. In this case, you could install a virtualization tool (I recommend the free, Virtualbox solution) and run Kali in a virtual machine. However, the lack of memory on your Windows machine might cause it to crash frequently, and you may encounter restrictive policies such as the USB ports being disabled.
And finally, Kali’s site has instructions for installing to a USB drive with persistence to keep any saved data. This is a good approach, with one major problem; the method detailed by the instructions does not encrypt the USB drive. This lack of encryption is fine when playing with Kali against lab machines; but you wouldn’t want to keep real testing data on a non-encrypted drive, so this method isn’t safe. (Note: This is still a great way to learn Kali and have it running directly on your hardware without messing with your onboard OS. Still, it won’t work for "real" work.)
Install and run Kali from an encrypted external USB drive.
So how do you secure your data and also make sure you can prove indisputably that data cannot be transferred from the onboard drive of your personal laptop to the working USB drive that Kali is running on? Here’s a quick checklist for you to follow:
Before we go any further, I want to say use these tools only on systems that you have written authorization to test or systems that you personally own. Any use of these tools on a machine you do not have authorization to test is illegal. I don’t want any jailbirds on my watch.
Here’s a closer look at how you can implement this approach. In this example, I used a 1TB USB3 drive for the project but You can use your own and the speed difference wasn’t that different from the onboard drive. This method also works with flash cards.
To get started download a Kali Linux ISO and burn the ISO to DVD or Image Kali Linux Live to USB. Insert your external drive that you are going to install Kali on to (such as my 1TB USB3 drive) into a machine, along with the installation media you just created. Be sure a plug the external drive in BEFORE booting the system.
Follow the Kali Linux Hard Disk Install steps from the official docs up to step #9 where the installer screen reads “Partition disks” — These first 9 steps will take you through booting to you installation media and preparing to install to your external drive.
The next step will be setting up the drive, encrypting it, and partitioning the drive. The next dialog will ask you to select the type of partitioning for this install. Pick Guided – Use entire disk and set up encrypted LVM.
This will fully-encrypt the entire drive, as opposed to just encrypting the /home
directory. Remember, when pen testing, the tools store data in more than just the home directory, and log files contain all types of goodies.
In the next window, you will be asked to pick the disk to install on. WARNING! Be careful to pick the USB disk and not your local drive. If you pick your local drive you will wipe the operating system from that drive. Note in the window below you can see the USB drive and a VMware virtual disk. The virtual disk is the hard drive of the virtual machine being used for this demonstration. Select the USB disk and click “Continue.”
Next, you will be asked how to partition the drive. Use the default, which is to put everything on one partition, and click “Continue.”
You will then be asked to save the partitioning information, which will start the partitioning process. When you click “Continue,” all data will be lost on the USB drive you are installing to. Click “Yes” and then “Continue.”
This will start the disk encryption and partitioning process. First, the drive is fully erased and encrypted. This will take a while. Get a cup of coffee, or better yet, go for a walk outside. A 1TB drive will take about 10 hours for the encrypting process. A 64GB drive takes about 30 minutes.
Once the encryption is complete, you will be asked to give the drive encryption a passphrase. You will use this passphrase when booting up Kali. Note the term “passphrase.” Use something really long but easy to remember. A line from a song or a poem or quote. The longer the better. “Mary had a little lamb and walked it to town.” Even with no numbers in this phrase it would take John the Ripper forever to crack this. I know I tried.
Next, you will be ask to confirm these changes. Pick “Finish partitioning and write changes to disk” and click “Continue.”
Next, click the “Yes” radio button and click “Continue”.
Now the system will start the partitioning process.
After the partitioning process, the system install will start.
You will then be asked if you want to use a “Network Mirror.” Click “Yes” on this. This will select repo mirrors close to your location and help speed up you updates later when you update your system.
Your install process will now complete and you will be asked to reboot the system. Be sure to remove the install disk before rebooting.
Now we're ready to fire up Kali. Insert your Kali USB drive into your machine and power it up. In the beginning of the boot process you will be given the ability to manually select a boot drive. On my laptop you press F7. This will vary depending on the type and make of your machine. By whatever process your machine uses, you will be given a menu of the available drives to boot from. Pick the USB drive and continue. When the system boots you will be presented a screen asking for your passphrase. This is the passphrase we set earlier during the install. This is not the root login password. Enter the passphrase and hit the Enter key.
This will start the actual boot process of the system from the now unencrypted drive. Once the system is booted up you will be given the login screen below.
Now, let's login and continue our set up.
On your first login, check to be sure that everything is up to date. All operating systems need updates and all operating systems have flaws and vulnerabilities—even Linux—so be sure to update regularly. Please also remember that the tools on this distro are dangerous in the wrong hands, so don’t get caught with your pants down by getting hacked and freely give them the tools to burn down the rest of your network.
Ready? Pull up the terminal application of your choice type the following:
root@kalibook :~# apt-get update
This will refresh the update list and check for new updates. Next, run:
root@kalibook :~# apt-get -y upgrade
This will run the upgrade process the “-y” automatically answers “yes” to the upgrade. The system will run an upgrade of all applications. Reboot if necessary.
Success! We now we have a fully encrypted drive and a full installation of Kali we can plug into any USB bootable machine. Our data is secured and in no way touching the laptop drive (meaning we can hack away until the cows come home).
I hope you enjoyed this article and that you find it helpful in your work. Happy hacking!
I am MHA and you Are now on MHAblogger. So Guys i want you to firstly Subscribe my Youtube Channel for latest Videos of HAcking and Much more.