Friday, August 17, 2018

how to make money online using social media sites like facebook, twitter, pintres, instagram, flicker, and much more


hello everyone, today i will be teaching you guys how to use social media sites to make some money for yourselves
bellow are some aways in which you can use the social media for your interest

1) Affiliate marketing
this is one of the best ways to monetize your time online
all you need is a Facebook or twitter or any other account and you are good to go.
  • Many companies offer affiliate marketing options to people who are willing to advertise the companies products and services. all you need to do is create an account with the companies and you get a link to share, as soon as people use your link to accomplish a task, you get paid.
  • Beware of fake online jobs and websites who promise to pay you for no work done...
  • bellow is a tested and trusted website that offers genuine affiliate marketing options to everyone..


thats all for now.. dont forget to wshare and leave a coment

Tuesday, August 14, 2018

subscribe for free hacking lessons

hii guys...
today am ready to teach some people who are intrested and serious a litle bit of hacking...
to be eligible i want you to visit this website and subsribe on our mailing or followers list.
After doing that you will be able to get all the latest hacking tuturials that we eiill be posting...
Also you will be recieving personal tutorials from us depending on what you want to learn..
so please  after subscribing, do well to leave a comrent with your email plus what you wana learn...
just 100 ple are needed so be amongst them...

Friday, August 10, 2018

HOW TO HACK INTO YOUR FRIENDS FACEBOOK ACCOUNT USING ONLY THE ACOUNT PHONE NUMBER OR EMAIL


facebook hack
hacking a facebook acount is a complex task......but bellow i will show you guys how to do it in a simple way without any hacking skills or whatever...

requirements:
all you need is acess to the phone number or email address atached to the facebook account
step one:
go to facebook login page and input the email or phone number of the acoun u want to hack into

step two:

click on forgot password
step 3
 you will be asked to reset you password through various means


step 4

chose to reset using the phone number or email associated with the account and acode will be sent to the number

step 5
input the code and you will be given the chance to change the password
bingooooo thats all you need to get going
dont forget to leave a coment

Thursday, August 2, 2018

how to hack your ISP

 Image result for how to hack an isp
Hey, all ISP hacking lover man, Today I will share the top way of using free internet. Really nowadays I archive knowledge about how to hack ISP many kinds of trick from Google, YouTube and share with my blog. Every time I love to share my knowledge about Hack ISP for unlimited internet with Facebook friends, twitter friends, and my blog. We are looking for different promotion offer and ISP web link for finding a new host/server for unlimited internet.


What is ISP?

ISP means Internet Service Provider. They provide for the public to using internet service for some cost. If you know how to hack it then you can use free internet for at any cost. There are many kinds of ISP name (Airtel, Vodafone, Grammenphone, Robi, and Banglalink).

How many types ISP Hack:

There is various kind of way for how to cheat ISP. First of all, I am a newbie. I am still learning about ISP hacking knowledge. As much as I know 1. DroidVPN UDP port trick. 2. Your Freedom DNS port trick. 3. Reverse Host/ip trick. You can hack mobile network to get free internet.

What are Requirements for it?

   1. One PC or Mobile
   2. Any internet service provider Sim like (Gp, Airtel, Robi, Vodafone)
   3. A tunneling software. 

Discussion about 3 types ISP hack for free internet:

  1. Droid VPN UDP Port Trick: 

     Nowadays This Droid VPN Software is very popular using to hack any ISP. Its also work HTTP
     trick. If your ISP has to open any UDP port then you can easily use free internet. You must know
     about it. When you scan UDP port and get one port like(68). You can use it by some
     modifying. 

 2. Your Freedom DNS Port Trick:

    Your Freedom is an old trick. This is very easy to use free internet and as much as I know all isp 
    internet is hacking by the freedom software. Basically, any is have to open DNS Port 53. But it has
    some problem. This free internet speed is low. When you purchase a package then you will get
    120-180 kbps.

 3. Reverse Host/ip Trick:

   This is the best trick I have ever seen. Some of the man surprise to know how it works. Nowadays
   it's very popular trick. Basically, First of all, you collect free host on your ISP. Then you should
   scan the host open port. You must know HTTP request and HTTP response. If you get http 200 OK,
   you will get your best free internet.This all trick is work for Proctol IP4.

How to hack ISP server:

Understanding Phraking (my word):- Phraking is a word that define to bypass/cheat with your ISP(Internet Service Provider)’s data inspection system to access internet without any cost or low cost or bypass Fair Usage Police or bypass speed limit .
Phreaker use Provider’s different promotion , different offers , Providers different Websites/host , Providers Proxy-server , different VPN , different Tools to phreak with their Provider .
Now a days I think that 2 things is capital of a Phreaker –

  • Bug host/Providers Host
  • Proxy Server of Provider(some times squid).
  • Understanding http request , http response :- I am not a expert but as a normal user I know when I try to access something in Internet , ‘client’ (my pc/browser) sends requests to ‘web server’ for web resource , then ‘web server’ 
  • responds with response .


http request format-
GET /css/main.css?4 HTTP/1.1
Host: ping.eu
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://ping.eu/
Cookie: PHPSESSID=be905c46d9d38310b56aaf1ad01bc9ca; LG=en
DNT: 1
Connection: keep-alive

Here –
GET /css/main.css?4 HTTP/1.1========start line/request line

GET==== request method
/css/main.css?4=====web resource hosted in ping.eu
HTTP===request protocol ( there are many protocols , its HTTP . Client and server talking to each another by protocol)
1.1===protocol version


############
Host: ping.eu
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://ping.eu/
Cookie: PHPSESSID=be905c46d9d38310b56aaf1ad01bc9ca; LG=en
############### ======= these all called request header

http response format-

HTTP/1.1 200 OK
Date: Wed, 25 Mar 2015 11:42:19 GMT
Server: Apache
Last-Modified: Fri, 11 Oct 2013 07:58:54 GMT
ETag: "9c7a58-a62-4e8727d5ceb80"
Accept-Ranges: bytes
Content-Length: 2658
Cache-Control: max-age=3600
Expires: Wed, 25 Mar 2015 12:42:19 GMT
Connection: close
Content-Type: text/css

HTTP/1.1 200 OK====response line/status line
HTTP===request protocol ( there are many protocols , its HTTP . Client and server talking to each another by protocol)
1.1===protocol version (we have requested with protocol http version HTTP/1.1 , server responds with HTTP/1.1)



Hack isp for unlimited internet

Understanding http proxy server:- A proxy server acts as an intermediary between ‘Client’ and ‘Server’ . When we access internet for web resource via proxy server , at first our client/browser connects with proxy server and make a request for resource , then proxy server forward the request to server . Server responds with response and back it to proxy server , proxy server back it to client .

See the picture below




Now we have a basic knowledge how a client and server communicate each other , how a proxy server work , how look a http request and response . We exploit .....................
This is a basic discussion for newbie .
Try It with our top collection of ISP Hacking Software.

Thanks for reading our tutorial. How about your feelings? don't forget to share your mind on the comment section. Any kind of help follows me on facebook and my blogger comment section.

Monday, July 30, 2018

STEPS TO HACK CREDIT CARDS OR DEBIT CARDS


EXACT
STEPS TO HACK CREDIT CARDS OR DEBIT CARDS


His first step would be to turn on Fragrouter, so that his machine can perform IP forwarding


how credit card works,hack credit cards,hack credit cards online,how to hack credit card password



After that, he’ll want to direct your WiFi network traffic to his machine, rather than your data traffic going directly to the Internet. This enables him to be the “Man-in-the-Middle” between your machine and the internet. Using Arpspoof, a simple technique, he determines your IP address is 192.168.1.15 and the Default Gateway of the WiFi network is 192.168.1.1:


how credit card works,hack credit cards,hack credit cards online,how to hack credit card password


The next step is to enable DNS Spoofing via DNSSpoof:


how credit card works,hack credit cards,hack credit cards online,how to hack credit card password


Since he will be replacing the bank or online store’s valid certificate with his own fake one, he will need to turn on the utility to enable his system to be the Man-in-the-Middle for web sessions and to handle certificates. This is done via webmitm:


how credit card works,hack credit cards,hack credit cards online,how to hack credit card password


At this point, he is ready to go. Now he needs to begin actively sniffing your data passing through his machine, including your login and credit card information. He opts to do this with Ethereal, then saves his capture:


how credit card works,hack credit cards,hack credit cards online,how to hack credit card password


He now has the data, but it is still encrypted with 128-bit SSL. No problem, since he has the key. What he needs to do now is simply decrypt the data using the certificate that he gave you. He does this with SSL Dump:


how credit card works,hack credit cards,hack credit cards online,how to hack credit card password


He runs a Cat command to view the now decrypted SSL information. Note that the username is “Bankusername” and the password is “BankPassword.” Conveniently, this dump also reveals the banking site as National City. FYI, the better, more secure banking and online store websites will have you first connect to another, preceding page via SSL, prior to connecting to the page where you enter sensitive information such as bank login credentials or credit card numbers. The reason for this is to stop the MITM-type attack. This helps because if you were to access this preceding page first with a “fake” certificate the next page where you were to enter the sensitive information would not display. The page gathering the sensitive information would be expecting a valid certificate, which it would not receive because of the Man-in-the-Middle. While some online banks and stores do implement this extra step/page for security reasons, the real flaw in this attack is the uneducated end-user, as you’ll soon see:


how credit card works,hack credit cards,hack credit cards online,how to hack credit card password


With this information, he can now log into your online bank account with the same access and privileges as you. He could transfer money, view account data, etc.

Below is an example of a sniffed SSL credit card purchase/transaction. You can see that Elvis Presley was attempting to make a purchase with his credit card 5440123412341234 with an expiration date of 5/06 and the billing address of Graceland in Memphis, TN (He is alive!). If this was your information, the hacker could easily make online purchases with your card.


how credit card works,hack credit cards,hack credit cards online,how to hack credit card password



Bad News for SSL VPN Admins


This type of attack could be particularly bad for corporations, because Corporate SSL VPN solutions are also vulnerable to this type of attack. Corporate SSL VPN solutions will often authenticate against Active Directory, the NT Domain, LDAP, or some other centralized credentials data store. Sniffing the SSL VPN login then gives an attacker valid credentials to the corporate network and other systems.

What an End-User Needs To Know


There’s a big step an end-user can take to prevent this from taking place. When the MITM Hacker uses the “bad” certificate instead of the “good,” valid certificate, the end-user is actually alerted to this. The problem is that most end-users don’t understand what this means and will unknowingly agree to use the fake certificate. Below is an example of the Security Alert an end-user would receive. Most uneducated end-users would simply click “Yes”… and this is the fatal flaw:


how credit card works,hack credit cards,hack credit cards online,how to hack credit card password


By clicking “Yes,” they have set themselves up to be hacked. By clicking the “View Certificate” button, the end-user would easily see that there is a problem. Below are examples of the various certificate views/tabs that show a good certificate compared to the bad certificate:


how credit card works,hack credit cards,hack credit cards online,how to hack credit card password


how credit card works,hack credit cards,hack credit cards online,how to hack credit card password


how credit card works,hack credit cards,hack credit cards online,how to hack credit card password
Left One Good Certificate and right one fake certificate

How an End-User Can Prevent This


  • Again, the simple act of viewing the certificate and clicking “No” would have prevented this from happening.
  • Education is the key for an end-user. If you see this message, take the time to view the certificate. As you can see from the examples above, you can tell when something doesn’t look right. If you can’t tell, err on the side of caution and call your online bank or the online store.
  • Take the time to read and understand all security messages you receive. Don’t just randomly click yes out of convenience.



How a Corporation Can Prevent This


  • Educate the end-user on the Security Alert and how to react to it.
  • Utilize One Time Passwords, such as RSA Tokens, to prevent the reuse of sniffed credentials.
  • When using SSL VPN, utilize mature products with advanced features, such as Juniper’s Secure Application Manager or Network Connect functionality.

how to hack into a cisco 2960 switch without using a password



Bypassing (recovering) a cisco router or switch password is pretty easy to do.




















Here is how it can be done:

  • First, we need to reboot the router/switch and interrupt the boot sequence by hitting CRTL+BREAK key. After doing this, we will enter something that is called a ROM monitor mode
  • Next, we need to change the configuration register to turn on the bit 6 with the value “0x2142”. The bit 6 is turned off by default. Its default value is “0x2102”.

To turn the bit 6 on, let’s issue the following command :  confreg 0x2142

  • After turning the bit 6 on, we need to reset the device by issuing  this command : reset
  • Because no startup configuration is loaded at this point, the router will ask you if you want to use setup mode, answer no
  • Next, hit Enter to enter user mode
  • Next, type enable and hit Enter to go into privileged mode

Note: Notice here that you have not been prompted for a password when entering the privileged mode

  • Next, we need to save our new configuration by typing this command: copy startup-config running-config

Note: At this point you can feel free to set a new password.

  • Finally, we need to change the configuration register back to the default one by turning off the bit 6 . To do so, type these following commands:

config t

config-register 0x2102