Posts

Showing posts from November, 2018

Hacking Facebook User With Social Engineering Method.

Image
Type : Tutorial Level : Medium Attack Type :  Social Engineering Almost more than 70% people in this world know about  facebook , the largest and biggest social network website. Some of  facebook users  even called themselves as  facebook addict  where they will feel something missing in their life while they didn't open  facebook  in a day. Nowadays if you saw news and information about growth of internet  users  was very rapid, but some of them didn't know about securing themselves while on internet; or at least knowing while something abnormal happen in a website they visited. Actually I've already wrote other  tutorial  related with  facebook hacking tutorial : 1.  Hacking Facebook Using Man in the Middle Attack 2.  Facebook Hacking using Fake page Phishing Method Today I will wrote a simple  tutorial  about  Facebook Hacking  using  Social Engineering  method. Actually not a full  tutorial , but at least you can get the conclusion how attacker d

Tutorial Hacking Facebook Using Phishing Method, Fake Facebook Website.

Image
Usman Tech Breaker Type : Tutorial Level : Medium – Hard Before This tutorial i wrote a tutorial about  hacking facebook  : 1- Tutorial Hacking Facebook Using Phishing Method, Fake Facebook Website. There's some readers ask about  phishing  technique. This  tutorial  continued from my last  tutorial  about " Hacking Facebook Password Account " in  phishing  section. What is  phishing ? According to  Wikipedia  : Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. To make it simple, let's say that  facebook phishing  is a way to make and create  fake facebook website  according to the real  website  for negative purpose, such as : stealing credentials,  data , etc. Okay…to make it more simple, let's start the  tutorial ….hands on will make us understand better isn't it?   LoL Requirement : 1.  facebook  o

Hacking Facebook Using Man in the Middle Attack Hacking Facebook Using Man In The Middle Attack.

Image
In the picture above, the attacker act as the third person attacker will manipulate the switch routing table so the victim will think that attacker is a Web server and vice versa, because the attacker has changed the routing table. For this totorial we need to prepare the tools to do Proof of Concept about this Tutorial. Below you can download it. 1.  XAMPP – APACHE+PHP+MySQL (We use XAMPP for our fake  facebook   web  server) 2.  Cain & Abel  (We use it for Man in the  Middle Attack ) 3. Facebook Offline Page (I have nulled the code, so this script will not contacting Facebook when victim accessed fake Facebook page —  only use this for learning ) Download Facebook Offline Page (mediafire.com): Download Update : replace your index.php and login.php using following files  Download Here . Step by step Hacking Facebook Using Man in the Middle Attack: Attacker  IP  Address : 192.168.160.148 Victim  IP  Address : 192.168.160.82 Fake Web Server : 192.168.160

Hackers face off this November at HITB event in Dubai.

Image
UAE’s local security talents can show off their hacking skills alongside and against some of the world’s top-ranked players, as Hack in the Box (HITB) returns to Dubai after an eight-year hiatus. Free-to-the-public hacking games and challenges will see over 20 international teams battle it out in Dubai as part of the HITB Security Conference from the 27th to the 28th of November. The contests include the popular HITB Capture the Flag (CTF) competition. The Dubai event is the kick off leg for the 2019 HITB CTF competition series which will continue at HITB’s 10th year anniversary event in Amsterdam next year, and then at HITB GSEC in Singapore and beyond. Winning teams from each HITB CTF competition are flown to compete in the next leg of the game. For this November’s kick off CTF in Dubai, winners from both HITB’s 2018 Amsterdam and Beijing 2018 XCTF-Finals will be flown in to participate In addition to the professional-level CTF game, HITB will also be hosting an edu-lev

Hackers Hit Adult Furry Website, Exposing Hundreds of Thousands of Users.

Image
The website for an adult furry game was hacked, with 411,000 unique email addresses and other personal information leaked, according to Have I Been Pwned’s Troy Hunt. The website hosted High Tail Hall, an interactive puzzle game “where you can have erotic encounters with the surrounding characters.” The data breach reportedly happened in August of this year, and aside from emails, also included IP addresses, names, orders, and passwords cryptographically altered (salted SHA-1 and salted MD5 hashes) to make them harder for hackers to crack. According to the security and web team at HTH Studios, the company behind the website and game, no financial data was leaked in the breach. HTH Studios noted on its website and in a Twitter screenshot that Hunt reached out to the team on Tuesday to inform them of the data breach that happened over the summer, and that the information from the breach showed up on “a popular hacking forum.”

WhatsApp Stickers: This is the ultimate trick for making your own sticker packs.

Image
WhatsApp Stickers are a fairly new feature  to the messaging service, but they’re already catching on. You’ve probably started seeing them pop up in your chats already. The really cool thing about WhatsApp’s newest feature is that you can create your own sets of stickers to start pinging at your mates. If you fancy giving it a try, you’ll be interested to learn about a new app called Sticker Studio. The app will turn any photo into a WhatsApp sticker The guys over at The Next Web have highlighted an app Sticker Studio, which allows you to take any photo and then turn parts of it into a sticker for WhatsApp. The Sticker Studio app is very simple to use and easy to get the hang of, but it leaves a little to be desired if you want to make stickers to that look professionally made. All you have to do is  download the app from the Google Play Store  and open it up. At the bottom of the page, you’ll find a  +  button. Tapping this will give you the option to either load a photo from

This is how to use WhatsApp stickers.

Image
It doesn’t quite work the same when you type it out in classic numbers, but that was the first ever text message I sent. I typed it out on my Casio calculator, turned the calculator upside down and then asked the boy sitting next to me in math class to pass it across to my friend sitting two desks over. All it said was hello. It was amazingly simple yet I was immensely proud of myself. You might argue that it wasn’t a text message but it felt oddly familiar to the thousands of text messages I’ve sent throughout the years that followed as it didn’t get a response. Text messages used to be just that: text. They came into being when some innovative mobile users discovered they could push through 160 characters across cellular networks to communicate with each other. The networks realized what was going on, monetized the idea, and the rest is history. A lot has changed since then. The dawn of internet messaging apps like WhatsApp, Messenger, Viber, and a whole host of others has ope

Facebook deletes over 200 accounts and pages linked to Russian troll farm.

Image
Facebook has taken  further action to remove accounts and pages linked to the Russian-based Internet Research Agency  (IRA). In total, Facebook has removed  138 Facebook pages, 70 Facebook, and 65 Instagram accounts . All ads relating to the removed pages, totaling over $167,000 in ad revenue, have also been deleted by the social network. Although 95 percent of the pages run by the Internet Research Agency were in Russian,  the organization gained notoriety during the 2016 Presidential election. At the time, the IRA was running fake pages designed to look like grassroots organizations in the U.S. were behind them. These pages would  spread fake news  and information designed to polarize political opinion in the run-up to the election. Explaining why Facebook had taken action against the IRA Facebook’s Chief Security Officer, Alex Stamos  said : “The IRA has repeatedly used complex networks of inauthentic accounts to deceive and manipulate people who use Facebook, includi

4 Gmail hacks you probably don’t know about.

Image
Gmail offers a ton of features for its users, and Google is continually improving them or adding new ones. Plenty of Gmail features are simply functions you’d expect — like having the option to customize your tabs or create multiple inboxes. However, there are some other things you can do in Gmail that aren’t so widely known. 4 Gmail hacks you probably don’t know about 1. Boomerang for Gmail If you haven’t used Gmail with  Boomerang , you haven’t really used Gmail. Seriously, this is a really cool add-on that can save you a ton of time and hassle — especially if you have any kind of business or side hustle going on. Boomerang is Chrome extension for Gmail. Install it and you’ll be able to  schedule your emails to be sent out at any time.  You can also  have an email re-sent to you.  This second feature is great for those important emails you just don’t have time to deal with right now. Simply tell Gmail to send it again later, and you can go about your business without