Skip to main content

Posts

Hacking Email Id Of Any Site By Backtrack{Msfconsole}

Using MSF Console As Email Hacking:- -------------------------------------------------------------------------------------------------------------------- STEP 1 : Click on Backtrack . STEP 2 : GOTO EXPLOITATION TOOLS . STEP 3 : GOTO NETWORK EXPLOITATION TOOLS . STEP 4 : GOTO METAEXPLOIT FRAMEWORK . STEP 5 : OPEN msfconsole .   When msfconsole will open now write search collector infront of  msf  > search collector And press Enter In this step write use auxiliary/gather/search_email_collector as shown above or you can copy the line from above and paste below msf > use auxiliary/gather/search_email_collector In this step write only : show options as shown above . Thenyou have to set domain . To set the domain write :   Set domain <domain name > MageNet - sell text ads. For Example: Set domain   yourexample.com Now write exploit and press Enter to start the process . Now yo...

Android 4.4 Version Will Be Named KitKat:-

Google on Tuesday September 3, 2013 has announced that the name of it’s next Android version Android 4.4 will be known as KitKat . KitKat Android  Source Where the name KitKat? Kit Kat is a chocolate-covered wafer biscuit bar confection that was created by Rowntree’s of York, England, and is now produced worldwide by Nestlé. (Source – Wikipedia) Kit Kat Chocolate type variations. Source: Wikimedia Commons You might be thinking this is a great deal for KitKat and Google, but Google told the  BBC  that it has just came with the idea and neither parties is paying anyone. Google executive Sundar Pichai shared this publicly from his official Google+ account  : Just back from a whirlwind trip to Asia visiting our Android ecosystem partners in Korea, Taiwan, and Japan. Exciting to see all the high quality Android devices available now, including Samsung Galaxy S4, HTC One, LG G2, Sony Xperia and many more. AWhere the name KitKat?lso looking for...

10+ Ways How To Earn Money From 'Porn' & How Do They Earn Money!!!

10+ Ways How To Earn Money From 'Porn' & How Do They Earn Money!!! -------------------------------------------------------------------- This post is purely for “learning” purpose, like how they trick (or partly fool) us to earn money with their sites. Never follow these methods, they are not ethical. I didn’t censor some of the images, I thought uncensored images can reach more well. 1. Premium Content Who hates “free porn”? The fact is that they don’t provide all for free, they also have a premium section which provides HD quality content and unlimited access to the videos available. Normally below every streaming video (on tube sites) you can check banners like these tempting users to register and purchase premium membership from them. They also show distracting advertisements and offering them a way to remove them, i.e., buy a premium account. These streaming sites use something called Adult Video Script (AVS) for making a clone like YouTube. A Sample Pr...

BREACH decodes HTTPS encrypted data in 30 seconds

BREACH decodes HTTPS encrypted data in 30 seconds:- ---------------------------------------------------   A new hacking technique dubbed BREACH can extract login tokens, session ID numbers and other sensitive information from SSL/TLS encrypted web traffic , in just 30 seconds . Source:-HACKERS News  The technique was demonstrated at the Black Hat security conference in Las Vegas ( Presentation PDF  & Paper ) by Gluck along with researchers Neal Harris and Angelo Prado, which allows hackers to decodes encrypted data that online banks and e-commerce sites from an HTTPS channel. Neal, Yoel and Angelo ( From left to right) at BlackHat BREACH ( Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext ) is very targeted and don’t decrypt the entire channel. BREACH manipulates data compression to pry out doses of information from HTTPS protected data, including email addresses, security tokens, and other plain text...

How to Disable SSH Root Login in GNU/Linux:-

How to Disable SSH Root Login in GNU/Linux:- -------------------------------------------- As we all know, root SSH login is enabled by default in GNU/Linux. We can easily access our remote servers and manage them if they have any issues via SSH. But it is not advisable to allow directly login as root user via SSH, because anyone can brute force root password and will try to access your servers. It’s better to have a separate user account and you can get root privileges by using su command if necessary. This handy tutorial will describe you how to disable root SSH login in GNU/Linux systems. Disable SSH Root Login Open up the SSH configuration file in any editor: # nano /etc/ssh/sshd_config Search for the line “PermitRootLogin” and change the value from yes to no: [...] PermitRootLogin no [...] Save and close the file. Restart sshd service to take effect the saved changes: # /etc/init.d/ssh restart Now try to login as root user from any client systems. You will an error message lik...

Install LEMP Server On Fedora 19:-

Install LEMP Server On Fedora 19:- -----------------------------------   Install LEMP Server On Fedora 19 LEMP is a combination of the operating system and open-source software stack. The acronym LEMP is derived from first letters of Linux, Nginx HTTP Server, MySQL database, and PHP, Perl or Python. We already have shown you how to install LAMP on many platforms. Install Nginx Nginx (pronounced engine-x) is a free, open-source, high-performance HTTP server and reverse proxy, as well as an IMAP/POP3 proxy server written by Igor Sysoev . First login as root user to perform installation: $ su To install Nginx enter the following command in your terminal: # yum install nginx -y Enable Nginx service to start automatically on every reboot: # systemctl enable nginx.service Start Nginx service using the command: # systemctl start nginx.service Test nginx Open up your web browser and navigate to http://ip-address/ or http://localhost/ . You will see a sc...