Posts

Showing posts from March, 2019

🔰 Disable Any Pre-Installed System App On Android Without Root 🔰

🔰 Disable Any Pre-Installed System App On Android Without Root 🔰 Follow this tutorial to get ADB up and running on your Windows, Mac, or Linux PC. ADB, or Android Debug Bridge, is a developer tool that lets you issue some powerful commands to control your device. We use it a lot in our tutorials to do things that you otherwise can’t do without a rooted device. ❗️Download an app like App Inspector from the Google Play Store. ❗️Get the package name of the app you want to disable using App Inspector. ❗️Launch a Command Prompt/PowerShell (Windows) or Terminal (Mac/Linux) in the directory where you stored the ADB binary. For Windows users, this can be done by holding shift then right-clicking in the folder. In the menu, select the “open command window here” or “open PowerShell window here” option. ❗️Opening command window on Windows 10 ❗️Once you’re in the command prompt or terminal, enter the following command depending on your OS: Windows Command Prompt: adb shell pm disabl...

BUG BOUNTY HUNTERS 💢

Image
💢 BUG BOUNTY HUNTERS 💢 Bug bounty hunters, or the morally sophisticated hackers, are those who look for vulnerabilities in software systems only to report them responsibly to the concerned organizations. Bug bounty hunters help companies find about the vulnerabilities in their applications before hackers can exploit them.

🔰How do you check if a website asking for your credentials is fake or legit to log in?

🔰How do you check if a website asking for your credentials is fake or legit to log in? »By checking if the URL is correct? »By checking if the website address is not a homograph? »By checking if the site is using HTTPS? »Or using software or browser extensions that detect phishing domains? Well, if you, like most Internet users, are also relying on above basic security practices to spot if that "Facebook.com" or "Google.com" you have been served with is fake or not, you may still fall victim to a newly discovered creative phishing attack and end up in giving away your passwords to hackers. Antoine Vincent Jebara, co-founder and CEO of password managing software Myki, told The Hacker News that his team recently spotted a new phishing attack campaign "that even the most vigilant users could fall for." Vincent found that cybercriminals are distributing links to blogs and services that prompt visitors to first "login using Facebook account"...

What is Flaming

🔰Flaming🔰 Flaming is the act of posting or sending offensive messages over the Internet.These messages,called "flames,"may be posted within online discussion forums or newsgroups,or sent via e-mail or instant messaging programs.The most common area where flaming takes place is online discussion forums,which are also called bulletin boards.

Privacy toolkits

Privacytoolkits With privacy scandals and data leaks becominga near daily occurrence, there is an increasing array of tools available for end users to take more control ofwho gets access to the browsing data. Disconnect Disconnect relies ona blacklist of tracking companies to automatically detectwhena browser tries to makea connection to anything other than the site being visited, blocking requests from alien sites and tracking companies. Ghostery Astalwart of the privacy brigade, Ghostery blocks adverts, but also blocks trackers on websites to controlwhocan collect data. Anenhanced Anti-Tracking feature also anonymises data to further protect privacy. Apple’s Safari ITP2 Intelligent Tracking Prevention is an on-by-default tracking blocker in Safari that attempts to beat snoopers. Websites can send requests to be allowed to drop a cookie, allowing them to track users with permission. PrivacyBadger The Electronic Frontier Foundation’s Privacy Badger is a browser plugin create...

HEARTBLEED BUG

💢 HEARTBLEED BUG 💢 The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library.This weakness allows stealing the information protected,under normal conditions,by the SSL/TLS encryption used to secure the Internet.SSL/TLS provides communication security and privacy over the Internet for applications such as web,email,instant messaging (IM)and some virtual private networks (VPNs).

Ⓜ️Steps To see Wifi Password Using WIFI WPS WPA TESTER App

Ⓜ️Steps To see Wifi Password Using WIFI WPS WPA TESTER App:Ⓜ️ ➡️First of all, you need to install this application WIFI WPS WPA TESTER in your android (recommended). ➡️Now simply launch the app from app drawer and you will see app will start scanning all the wifi networks around you. ➡️Now you will see the list wifi networks the application found. Now the only thing you to do here is checking the color of the right side lockif the lock is green colored that means the wifi is hackable and if red then it’s not. ➡️Now when you get the network with green lock sign at right then simply tap on that network. ➡️Now an info popup will appear and there simply click on connect option. ➡️Now on the next popup, you will have two option Root or No root. Now simply select the NO ROOT method there. ➡️Now on the next popup, you will see a list of Pinwhich will help to get into the wifi networks, choose one of them and select Connect(root) option. ➡️Now pin attack will start and it will...

How To REMOVE .Rar Password

🔰 How To REMOVE .Rar Password 🔰 ◽️ First Go To Online Zip Converter.(GIVEN BELOW) ◽️ Now Browse Your Password Protected Rar File. ◽️ Now Click On Convert File. ◽️ Now It Will First Upload This File TServer And Then Convert Into Zip Format And Remove Its Password. ◽️ Now You Can Download This Zip File Without Password.

♻️ HOW TO GET ACCESS TO BLOCKED WEBSITES

♻️ HOW TO GET ACCESS TO BLOCKED WEBSITES 1. Recast the URL This trick works for the sites which are hosted on VPN and on Dedicated server Environment and have an unverified SSL installed for that domain name. To get access to such websites you have to implement 2 simple steps. They are: 1. Go to the address bar of the browser (Any browser) 2. Instead of typing www.websiteURL.com or http://www.WebsiteURL.com , try typing https://www.WebsiteURL.com So, as the domain is unverified with SSL installation, it will show up a security notice with the options as Proceed anyway or Back to Safety. Here, you have to select the option Proceed Anyway, then you will get an entry ticket to the site. 2. DNS Server Replacement In this method you have to change or replace the DNS server to get access over the blocked websites. Say, DNS server is the container which contains all the information regarding all the sites from the entire world. So, if any country blocks any website IP from t...

Ⓜ️What is a dynamic programming ?Ⓜ️

Ⓜ️What is a dynamic programming ?Ⓜ️ 💢A DP is an algorithmic technique which is usually based on a recurrent formula and one (orsome)starting states.A sub-solution of the problem is constructed from previously found ones.DP solutions have a polynomial complexity which assures a much faster running time than other techniques like backtracking,brute-force etc.💢

💢 Cross Site History Manipulation (XSHM)

💢 Cross Site History Manipulation (XSHM) Ⓜ️Cross-Site History Manipulation (XSHM) isa SOP (SameOrigin Policy) securitybreach.SOP is the most important security concept of modern browsers.SOP means that web pages from different origins by design cannot communicate with each other. Cross-SiteHistory Manipulation breach is based on the fact that client-side browser history object is not properly partitioned on a per-site basis.Manipulating browser history may lead to SOP compromising,allow bi-directional CSRF and other exploitations such as:user privacy violation,login status detection,resources mapping,sensitive information inferring,users’ activity tracking and URL parameter stealing.Ⓜ️ 🔳 REQUEST YOUR ANY COURSE FOR FREE.

OWASP

💢OWASP💢 Ⓜ️The Open Web Application Security Project (OWASP)is a 501(c)(3) worldwidenot-for-profit charitable organization focused on improving the security of software.Our mission is to make software security visible, sothat individuals and organizations are able to make informed decisions.OWASP is in a unique position to provide impartial,practical information about AppSec to individuals,corporations,universities,government agencies,and other organizations worldwide.Operating as a community of like-minded professionals,OWASP issues software tools and knowledge-based documentation on application security.Ⓜ️

HEARTBLEED BUG

💢 HEARTBLEED BUG 💢 The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library.This weakness allows stealing the information protected,under normal conditions,by the SSL/TLS encryption used to secure the Internet.SSL/TLS provides communication security and privacy over the Internet for applications such as web,email,instant messaging (IM)and some virtual private networks (VPNs).

Some run command for windows

Some run command for windows: ---------------------------------- 1. Accessibility Controls - access.cpl 2. Accessibility Wizard - accwiz 3. Add Hardware Wizard - hdwwiz.cpl 4. Add/Remove Programs - appwiz.cpl 5. Administrative Tools - control admintools 6. Automatic Updates - wuaucpl.cpl 7. Bluetooth Transfer Wizard - fsquirt 8. Calculator - calc 9. Certificate Manager - certmgr.msc 10. Character Map - charmap 11. Check Disk Utility - chkdsk 12. Clipboard Viewer - clipbrd 13. Command Prompt - cmd 14. Component Services - dcomcnfg 15. Computer Management - compmgmt.msc 16. Control Panel - control 17. Date and Time Properties - timedate.cpl 18. DDE Shares - ddeshare 19. Device Manager - devmgmt.msc 20. Direct X Troubleshooter - dxdiag 21. Disk Cleanup Utility - cleanmgr 22. Disk Defragment - dfrg.msc 23. Disk Management - diskmgmt.msc 24. Disk Partition Manager - diskpart 25. Display Properties - control desktop 26. Display Properties - desk.cpl 27. Dr. Watso...

Clear Unwanted Items From Add And Remove

Clear Unwanted Items From Add And Remove ----------------------------------------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------------- Run the Registry Editor (REGEDIT). Open HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Uninstall, and remove any unwanted subkeys under "Uninstall."

🌀Evil Twin Attack Methodology🌀

🌀Evil Twin Attack Methodology🌀 Ⓜ️Step 1: We will first scan the air for a target access point. Then create an access point using airbase-ng with the same name and channel of the target access point, hence Evil TWIN attack. Ⓜ️Step 2:The client is now disconnected repeatedly from the  original access point and as most modern system’s setting says… “Connect back to same ESSID (AP name) if disconnects”. This also happens because when the client disconnects from any access point it starts sending probe requests in the air with the name of the access point it connected to earlier. Hence BSSID isn’t a barrier, you just need ESSID to spoof the AP Ⓜ️Step 3: Clients is now connected to the Evil Twin access point and now client may start browsing Internet. Ⓜ️Step 4: Client will see a web administrator warning saying “Enter WPA password to download and upgrade the router firmware” Ⓜ️Step 5: The moment client enters the password, s/he will be redirected to a loading page and the ...

Do you know what is password cracking..?

What is Password Cracking?🤔 Password cracking is the process of guessing or recovering a password from stored locations or from data transmission system. It is used to get a password for unauthorized access or to recover a forgotten password. In penetration testing, it is used to check the security of an application. In recent years, computer programmers have been trying to create algorithms for password cracking in less time. Most of the password cracking tools try to login with every possible combination of words. If login is successful, it means the password was found. If the password is strong enough with a combination of numbers, characters and special characters, this cracking method may take hours to weeks or months. A few password cracking tools use a dictionary that contains passwords. These tools are totally dependent on the dictionary, so success rate is lower. ➖