Friday 23 June 2017




"ARTICLE FACEBOOK ABOUT HACKING"‍‍

Is it possible to hack a Facebook Account? ‍‍ Let me explain it in detail. If you open Google and type the keyword 'Facebook Hacking Software' then you will get thousands of results. And, if you pick up any of them then you will come across various webpages claiming to hack facebook accounts within a minute. ‍‍ They will also claim that they found a bug or exploit in Facebook Security System which makes it possible to hack. You will also come across various happy (in reality, fabricated) customers. And, after that you will believe that "Yes, it works and I should try it". ‍‍ Well, you will be asked to input the profile id of your target. And after that it will also show you certain processes like observing target, running algorithm, decrypting MD5 hash etc. Finally, it will show you the message that your target is hacked and you just need to download the file containing password. ‍‍ "Oh, I did it, now I just need to download the file and its too easy". So, you will click on download button now. It will take you to a new page asking to complete a survey before downloading. "Oh, I am gonna complete it. I hope its easy." You will choose a survey and try to complete it. ‍‍ But, it is my gurantee that you will never be able to complete these surveys and getting the password of your target. Even I too have spent many sleepless night trying to complete survey but never got success. Reality is that all these Online Facebook Hacking Tool and Software are just fraud and nothing more than that. Tell me one thing. ‍‍ Why Facebook, Mark Zuckerberg and his team are spending millions of dollar every year on Security issues? Only to be hacked within minutes!! No, not at all. Then the question arises that Is it impossible to hack a Facebook Account? ‍‍ The answer is No, it is possible to hack it. There are several ways to do so. Each of them has their own importance as well as limitations. I have gone through tones of article on Internet and found 19 possible ways to hack a Facebook Account ‍‍ 1. Social Engineering ‍‍ 2. Phishing ‍‍ 3. Keylogging ‍‍ 4. Bypass Security Question ‍‍ 5. Password Stealers ‍‍ 6. Brute Force Attacks ‍‍ 7. Session Hijacking ‍‍ 8. Sidejacking ‍‍ 9. Clickjacking ‍‍ 10. DNS Spoofing ‍‍ 11. Mobile Phone Hacking ‍‍ 12. USB Thefting ‍‍ 13. Man in the Middle Attack ‍‍ 14. Botnet ‍‍ 15. Cookies Grabing ‍‍ 16. Likejacking ‍‍ 17. Dictionary Attack ‍‍ 18.Kali Linux ‍‍ 19. Exploiting Facebook's Three Trusted Friend feature As I have mentioned earlier, each of them has their own importance as well as limitations. It depends on conditions whether the method will work or not. I shall explain all possible ways and their countermeasures in detail. ‍‍ Thanks for reading this artical enjoy hacking

Wednesday 21 June 2017



How to Become a ethical  Hacker

1. Learn TCP/IP, Basic Information gathering, Proxies, Socks, SSL, VPN, VPS, RDP, FTP, POP3, SMTP, Telnet, SSH.
2. Learn Linux, Unix, Windows - You can do this using vmware or any virtual desktop utility.
3. Learn a programming language that's compatible with all OS - Perl, Python, C .
4. Learn HTML, PHP, Javascript, ASP, XML, SQL, XSS, SQLI, RFI, LFI
5. Learn Reverse engineering and crack some programs for serials easy ones like mirc, winzip, winrar or old games.
6. Code a fuzzer for common protocols - ftp, pop3, 80, 8080 - Pick some free software like ftp server, mail server, apache or iis webserver or a webserver all-in-one pack, or teamspeak, ventrilo, mumble.
7. Code a tool that uses grep to sort out unique code in source codes.
8. Make a custom IPtable, IPsec firewall that blocks all incoming traffic and out going traffic and add filters to accept certain ports that your software or scripts use.
9. Pick a kernel in linux or unix, also pick a Microsoft OS version lets say Winxp pro sp2 put them on the virtual desktops (vmware) and find and code a new local exploit in those versions, then install a Apache webserver on the Linux/Unix and a IIS webserver on the winxp pro and attempt to find and code a new local reverse_tcp_shell exploit.
10. Learn Cisco Router and Switch configuration and setup.
11. Learn Checkpoint Setup and Config
12. Learn Wifi scanning, cracking, sniffing.
13. Pick a person in you phonebook for the area code you live in or city then ring the person on a anonymous line like skype or a payphone or a carded sim and attempt to social engineer the person for his name, address, data of birth, city born, country born, ISP connected with, Phone company connected with, What bank he/she uses and anything else you can get. Then Attempt to ring using a spoof caller ID software with the person's phone number - call the ISP and try reset the password to his/her internet connection/ webmail, get access to bank account or ask them to send out a new *** to a new address (drop) with a new pin, reset of phone company passwords.
14. Use your information gathering skills to get all the information off a website like a shop then use the spoof callerID software or hack your phone to show a new number of the Webserver's Tech Support number then ring the shop owner and try get the shop site password.
15. Do the same thing but attempt to use a web attack against a site or shop to gain admin access.
16. Once got access upload a shell and attempt to exploit the server to gain root using a exploit you coded not someone else s exploit.
17. Make your own Linux Distro
18. Use your own Linux Distro or use a vanilla Linux gnome (not kde) keep it with not much graphics so you can learn how to depend on the terminal and start from scratch install applications that you will only need for a blackbox (Security test box), make folders for fuzzers, exploits, scanners..etc Then load them up with your own scripts and other tools ( By this stage you shouldn't need to depend on other peoples scripts).
19. Learn macosx and attempt to gain access to a Macosx box whether it be your own or someones else s.
20. Create a secure home network and secure your own systems with your own Security policies and firewall settings.
All this isn't a over night learning it will take a nice 3 - 4 years to learn a bit of this 5+ years to learn most of it and even then you may need time to keep learn as IT keeps changing everyday.

Ethical Hacking



. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, in an effort to minimize or eliminate any potential attacks. by john