Posts

FTP password Cracker Brute Force method

Image
Brute force attacks, what are they? Brute force attacks are actually very simple, but very important. I would like to start this section by saying that brute force attacks should  not  be your first choice when executing a hack. These attacks take a lot of processing power and a lot of time, both of which can be hard to come by. Let’s discuss this by setting up a little scenario. You’ve been tasked with gaining access to an FTP ( F ile  T ransfer  P rotocol) server within the network of a company that has hired you. You’ve tried all your other options, the service doesn’t appear to have any exploitable vulnerabilities, and the employees aren’t falling for any social engineering attacks. You’ve decided that it’s time to try a brute force attack and hope for the best. First, we need a word list. A word list is simply a long list of possible passwords. Once we have a word list, we can start the attack. In this attack, the tool is going to try and re-try to log into the FTP server

PwnPhone My Android is My hacking device

Image
Create A Pwn Device Android in your Hand mean All things are there. Building our First Mobile Hacking Device Now that we have a basic overview of what we’ll cover throughout this series, we can move on to building our own hacking device! We’ll start by explaining the tech behind the device we’re going to make, and then we’ll get right into it. It’s time to introduce a company that made the technology we’ll be using today,  Pwnie Express . Pwnie Express makes a variety of hacking devices available for purchase. Among these devices is the Pwn Phone. Normally you’d have pay a little over $1000 for a Pwn Phone. But for those with enough ambition, the Pwnie Express maintains the AOPP (Android Open Pwn Project), which allows us to  build  our very own Pwn Phone! Just a heads up; the AOPP only supports a handful of devices, before continuing, I recommend you make sure your device is supported! Now that we know where this technology is coming from, we can get building. We’ll be build

Session Hijacking

Image
Session Hijacking the best method Hello friemds due to busyness i was unable to post but i am returns now  nds, i am back and from now onwards we will explore the most advanced  Hacking  Techniques. One of them is  Session Hijacking . In today’s tutorial we will discuss How to  hack the online sessions  using Session Hijacking . In today’s  Hacking class , i will explain basics of Session Hijacking  like  What is session Hijacking  and Different types of Session Hijacking attacks  and different methods to  Hijack the sessions . In my next tutorial that is tomorrow i will explain you in Detail How to Hijack the Sessions and what tools you will need to Hijack the active sessions. So friends read on… How Session Hijacking works What is Session Hijacking? Let’s discuss them in common term’s,  Session Hijacking  by the name only it suggests that we are hacking someone’s active session and trying to exploit it by taking the unauthorized access over their computer syst

HACK FACEBOOK 100% SURE AND PURE

Image
           HOW TO HACK FACEBOOK 100% SURE &  PURE METHOD...                            I ntroducing you a new facebook hacking tricks... 100% sure  click here Z shadow and also download android app Download Sign up  send a link to the victim tell them to login  and you will get his detail like below thank you,. if any problem plz comment below

Download kali Linux Torrent Iso File Free

Download kali Linux Torrent Iso File Free  Image Name Direct Torrent Size Version SHA1Sum Kali Linux 64 bit ISO Torrent 2.9G 2016.2 25cc6d53a8bd8886fcb468eb4fbb4cdfac895c65 Kali Linux 32 bit ISO Torrent 2.9G 2016.2 9b4e167b0677bb0ca14099c379e0413262eefc8c Kali Linux 64 bit Light ISO Torrent 1.1G 2016.2 f7bdc3a50f177226b3badc3d3eafcf1d59b9a5e6 Kali Linux 32 bit Light ISO Torrent 1.1G 2016.2 3b637e4543a9de7ddc709f9c1404a287c2ac62b0 Kali Linux 64 bit e17 ISO Torrent 2.7G 2016.2 4e55173207aef7ef584661810859c4700602062a Kali Linux 64 bit Mate ISO Torrent 2.8G 2016.2 bfaeaa09dab907ce71915bcc058c1dc6424cd823 Kali Linux 64 bit Xfce ISO Torrent 2.7G 2016.2 e652ca5410a44e4dd49e120befdace38716b8980 Kali Linux 64 bit LXDE ISO Torrent 2.7G 2016.2 d8eb6e10cf0076b87abb12ee cb70615ec5f5e313 Kali Linux armhf Image Torrent 0.7G 2016.2 7aec28a2aa7f303467d29d7e3cf38fd372aefe4c Kali Linux armel Image Torrent 0.7G 2016.2 6b90d5a7f8d2627016e63caf5b895f7ca814c6c0 THANK YOU I hopeYou tha u find b

Backup your Lost Data on android

Image
BACKUP YOUR LOST DATA ON ANDROID WITHOUT ROOT... Hello friends I am going to tell you about how to backup your delete  data on android. REQUIRNMENT: PC Data Cable (orginal which working with your phone ) Wondershare Dr.Fone for Android 8.0.3 (Note You Have to buy this but you download its trial version follow that link DOWNLOAD ) Method: Turn on USB debugging mode in your android phone (GO to setting>Developer option>turn on Developer option>Select USB debugging) Connect your phone in your PC. Open DrFone Select option To backup data  thats all PLEASE SHARE MY BLOG>> Thank You SANDEEP KUSHWAHA

BRAKE BIOS PASSWORD

HOW TO BRAKE BIOS PASSWORD...... There are a lot ways to Crack the BIOS password. This is one of them but I would say that this one is more effective than the rest because the rest of the ways does not Guarantee you that it will Crack the BIOS password while in this case the Cracking is Guaranteed since in this we will remove the functionality of password protection of the BIOS. Follow the steps below: 1) Boot up windows. 2) go to dos-prompt or go to command prompt directly from the windows start up menu. 3) type the command at the prompt: “debug” (without quotes) 4) type the following lines now exactly as given……. o 70 10 o 71 20 quit exit 4) exit from the dos prompt and restart the machine password protection gone!!!!!!!!!!!!! PS: I tested this in Award Bios…….. There seems to be some issue regarding display drivers on some machines if this is used. Just reinstall the drivers, Everything will be fine……….. I have not found any other trouble if the codes are used