Skip to main content

Posts

Showing posts from July, 2016

New facebook hack method

H ow to Hack Facebook Password 2016 In Short Viral: We are accomplishment to reveal all the  methods that mostly hackers can use these top ways/methods to How to Machine Facebook Informing Parole easily (Educational Design Exclusive & Watch from Hackers). My motto of this job watch you from hackers. I instrument demonstrate figure of construction to Pol Facebook Statement that all hackers ordinarily use to programme Facebook Account. So beware from hackers and protect your facebook informing from hackers. Our situation provides only surety tips to protect your facebook record from hackers . We intercourse exclusive these methods because if you jazz how to nag you must copulate how to established. Must indicate carefully all these methods, watch from all attacks, and protect your facebook ground from hackers. Note :-  This communication is only for precaution usefulness don’t try any illigal trait and i’m righteous common these methods because protect our facebook declare from

How to make money from google and microsoft

Smart hackers could exploit a loophole that could allow them to steal a significant amount of cash from Google, Microsoft and Instagram using a Premium rate phone number. Security researcher Arne Swinnen from Belgium has discovered an ingenious way to steal money from big tech companies like Google, Microsoft, and Instagram using their two-factor authentication (2FA) voice-based token distribution systems. Swinnen argues that any attacker with malicious intent could create fake Google, Microsoft or Instagram accounts, as well as premium phone services, and then link them together. The attacker could then request 2FA voice-based tokens for all fake accounts using an automated scripts, placing legitimate phone calls to his service to earn him quite a nice profit. Swinnen created accounts on Google, Microsoft Office 365 and Instagram and then tied them to a premium phone number instead of a regular one. As a result, whenever one of these three services would call the account's p

Kali linux android simply amazing

How to Install and run Kali Linux on any Android Smartphone TUTORIAL FOR INSTALLING AND RUNNING KALI LINUX ON ANDROID SMARTPHONES AND TABLETS Kali Linux is one the best love operating system of white hat hackers, security researchers and pentesters. It offers advanced penetration testing tool and its ease of use means that it should be a part of every security professional’s toolbox. Penetration testing involves using a variety of tools and techniques to test the limits of security policies and procedures. Now a days more and more apps are available on Android operating system for smartphones and tablets so it becomes worthwhile to have  it on your smartphone as well. Kali Linux on Android smartphones and tablets allows researchers and pentesters to perform ” security checks” on things like cracking wep Wi-Fi passwords, finding vulnerabilities/bugs or cracking security on websites.  This opens the door to doing this from a mobile device such as a phone or a tablet. You can also

Invisible oh come on

Are we a step closer to making invisibility cloak a reality?   Scientists inching closer to create invisibility cloak Being an ardent Harry Potter fan, I was always fascinated by the sci-fi invisibility cloak that Harry Potter wore to hide himself from view while in the Hogwarts library. I used to always wonder what if such invisibility cloaks become a reality. Well, it looks like they may… Scientists at Queen Mary University of London (QMUL) have developed a new material using a composite material with nano-size particles that has been able to make test objects “disappear.” For the first time, researchers demonstrated a practical cloaking device that has the ability to make curved objects seem flat to electromagnetic waves. The material makes use of somehow “manipulating” radio waves for it not to appear to monitors. The researchers coated a curved surface with a nanocomposite medium, which has seven distinct layers (called graded index nanocomposite) with electric properties.

Hacking wifi password

  How To Find Wi-Fi Password Using CMD Of All Connected Networks :  It is very easy to find WiFi password using few cmd commands. This command works even when you are offline or you are connected to some other WiFi network. Using this command, we can further optimize our particular WiFi network like turning on some features such as mac randomization, changing the radio type of your WiFi etc. Whenever we connect to a WiFi network and enter the password to connect to that network, we actually make a WLAN profile of that WiFi network. That profile is stored inside our computer along with the other required details of the WiFi profile. Instead of using a GUI to find the individual passwords, we can also look for the WiFi password of that particular WiFi network using cmd.These steps work even when you are totally offline or you are not connected to the particular wifi you are looking the password for. How to know the WiFi password using cmd: Open the command prompt and run it as adm

Omnirat save us

OmniRAT :– $25 tool to hack into Windows, OS X and Android device $25 OmniRAT is a “Remote Administration Tool” which can hack into Windows, OS X and Android run devices OmniRAT is a software that lets you hack into computers running on Windows and Mac OS X in addition to hacking Android smartphones and tablets. OmniRAT can can spy on communications, secretly record conversations, snoop on browsing histories and take complete control of a remote device. And its cheap. OmniRAT is available on the dark web underground forums for $25 compared to another notorious malware, DroidJack which is sold for $210. Security researcher Nikolaos Chrysaidos from anti-virus maker Avast who discovered the OmniRAT and calls it a Remote Administration tool  .  In his blog post   Chrysaidos describes how he believes hackers have infected Androids with OmniRAT after sending an SMS. Chrysaidos says that OmniRAT can also be used for legitimate purposes, with the permission and consent of the

Remote shutdown a computer who is in your network

Step 1 how to open the cmd: 1. long press the start button and click "R" 2. there you go... type CMD 3. OK STEP 2 GUIDES commands on cmd: ipconfig - to show your ip address net view - to show who connected to your network tracert (computer name that you can see on net view) - showing his/her ip address shutdown -i    - remote shutdown app..