1 . Are Android App Lockers really Secure ?
Android has been a common target for Exploit Community . This Post describes how a few simple steps can be taken to bypass the App Locker .
App Lockers are used by most of us to protect our Androids from unwanted or unauthorized access of our personal information. If you do a quick search of the phrase “app lock” in Google Play Store you will find lots of application provide facility to protect individual and multiple application. But with few steps anyone can bypass the same:
Here is the steps :
Step 1. Install any App locker from play store.
Step 2. Provide password to the similar App locker.
Now the application protected with app locker require password of app locker. Now perform the following steps to bypass the app locker password.
Step 3. Now go to setting
Step 4. Then Application
Step 5 :Select your App Locker.
Step 6. Now click on Clear data button.
Step 7. Now click on Force stop button.
Step 8. Finish
Now open any application which is protected with app locker without credential.
This technique has been sitting right under your nose for so long . This is not a vulnerability in Android or the App locker . This is just a trick to show you that you must not completely rely on App Lockers and set a strong Password for your Android Screen Lock as well.
Android has been a common target for Exploit Community . This Post describes how a few simple steps can be taken to bypass the App Locker .
App Lockers are used by most of us to protect our Androids from unwanted or unauthorized access of our personal information. If you do a quick search of the phrase “app lock” in Google Play Store you will find lots of application provide facility to protect individual and multiple application. But with few steps anyone can bypass the same:
Here is the steps :
Step 1. Install any App locker from play store.
Step 2. Provide password to the similar App locker.
Now the application protected with app locker require password of app locker. Now perform the following steps to bypass the app locker password.
Step 3. Now go to setting
Step 4. Then Application
Step 5 :Select your App Locker.
Step 6. Now click on Clear data button.
Step 7. Now click on Force stop button.
Step 8. Finish
Now open any application which is protected with app locker without credential.
This technique has been sitting right under your nose for so long . This is not a vulnerability in Android or the App locker . This is just a trick to show you that you must not completely rely on App Lockers and set a strong Password for your Android Screen Lock as well.
2. GoPhish : Open Source Phishing Toolkit
Everyone needs to conduct phishing attacks to see the organisation’s defence against Phishing during a penetration test . Here is an Open source Solution : GoPhish.
Gophish is an open source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily set-up and execute phishing engagements and security awareness training.
Everyone needs to conduct phishing attacks to see the organisation’s defence against Phishing during a penetration test . Here is an Open source Solution : GoPhish.
Gophish is an open source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily set-up and execute phishing engagements and security awareness training.
What is Gophish?
Gophish is a phishing framework that makes the simulation of real-world phishing attacks dead-simple. The idea behind gophish is simple – make industry-grade phishing training available to everyone.
“Available” in this case means two things –
- Affordable – Gophish is currently open-source software that is completely free for anyone to use.
- Accessible – Gophish is written in the Go programming language. This has the benefit that gophish releases are compiled binaries with no dependencies. In a nutshell, this makes installation as simple as “download and run”!
The idea of a phishing simulation platform isn’t new. Let’s take a look at some of the features that really set gophish apart and make it awesome.
Gophish is a phishing framework that makes the simulation of real-world phishing attacks dead-simple. The idea behind gophish is simple – make industry-grade phishing training available to everyone.
“Available” in this case means two things –
- Affordable – Gophish is currently open-source software that is completely free for anyone to use.
- Accessible – Gophish is written in the Go programming language. This has the benefit that gophish releases are compiled binaries with no dependencies. In a nutshell, this makes installation as simple as “download and run”!
The idea of a phishing simulation platform isn’t new. Let’s take a look at some of the features that really set gophish apart and make it awesome.
Hosted On-Prem
There are many commercial offerings that provide phishing simulation/training. Unfortunately, these are SaaS solutions that require you to hand over your data to someone else.
Gophish, an Open Source Phishing Toolkit is different in that it is meant to be hosted in-house. This keeps you data where it belongs – with you.
There are many commercial offerings that provide phishing simulation/training. Unfortunately, these are SaaS solutions that require you to hand over your data to someone else.
Gophish, an Open Source Phishing Toolkit is different in that it is meant to be hosted in-house. This keeps you data where it belongs – with you.
Installing Gophish Using Pre-Built Binaries
Gophish is provided as a pre-built binary for most operating systems. With this being the case, installation is as simple as downloading the ZIP file containing the binary that is built for your OS and extracting the contents.
To install gophish, simply run
This downloads gophish into your
Next, navigate to
and run the command
This builds a gophish binary in the current directory.
Gophish is provided as a pre-built binary for most operating systems. With this being the case, installation is as simple as downloading the ZIP file containing the binary that is built for your OS and extracting the contents.
To install gophish, simply run
This downloads gophish into your
Next, navigate to
and run the command
This builds a gophish binary in the current directory.
Running Gophish
Now that you have gophish installed, you’re ready to run the software. To launch gophish, simply open a command shell and navigate to the directory the gophish binary is located. Then, execute the gophish binary. You will see some informational output showing both the admin and phishing web servers starting up, as well as the database being created. This output will tell you the port numbers you can use toconnect to the web interfaces.
Enjoy !!
#To be used only for Authorized Penetration Testing .
How to Watch Security Cameras on the Internet : Camera hacking is not very new for hacker community . Due to mis-configuration in the Camera security , the cameras that can be accessed over the internet can be viewed by anyone without any Authentication . Though there is no real hacking in this but its somewhat nice to explore .
I would use this to explain the necessity of security configuration for IP cams . The Cams that have been used to provide the security , are now accessible to anyone without any authentication , and have become the biggest security Loophole.
The hacking tutorial section is now full of useless threads,The worst of all most of them are questions and other shits.
So yeah here i am writing a new tutorial trying to make this section back to what it used to be.
====================
Pro Tip :
Secure yourself before doing this.
This is Purely for Educational Purposes and Dangerous . Don’t Access Password Protected Cameras
====================
Now that you have gophish installed, you’re ready to run the software. To launch gophish, simply open a command shell and navigate to the directory the gophish binary is located. Then, execute the gophish binary. You will see some informational output showing both the admin and phishing web servers starting up, as well as the database being created. This output will tell you the port numbers you can use toconnect to the web interfaces.
Enjoy !!
#To be used only for Authorized Penetration Testing .
How to Watch Security Cameras on the Internet : Camera hacking is not very new for hacker community . Due to mis-configuration in the Camera security , the cameras that can be accessed over the internet can be viewed by anyone without any Authentication . Though there is no real hacking in this but its somewhat nice to explore .
I would use this to explain the necessity of security configuration for IP cams . The Cams that have been used to provide the security , are now accessible to anyone without any authentication , and have become the biggest security Loophole.
The hacking tutorial section is now full of useless threads,The worst of all most of them are questions and other shits.
So yeah here i am writing a new tutorial trying to make this section back to what it used to be.
So yeah here i am writing a new tutorial trying to make this section back to what it used to be.
====================
Pro Tip :Secure yourself before doing this.This is Purely for Educational Purposes and Dangerous . Don’t Access Password Protected Cameras
====================
3. How to Watch Security Cameras on the Internet :
1-Open your browser.
2-Go to http://www.google.com
3-Copy paste a code and put it in google click enter and bam you will get some cameras by clicking on the search links .
Here I have accumulated a list of Google Dorks that can be used to explore some of the IP cams that can be accessed Online without any Authentication .
Here is a Screenshot :
You can modify these dorks as per your needs during a penetration test on an organisation . Consider when you might be doing Penetration testing for a Bank or a multinational that has lots of IP cameras with remote access over internet enabled , this might be the First Loophole to report .
So friends you enjoyed our tutorial “How to Watch Security Cameras on the Internet” .. If yes don’t forget to say thanks.
1-Open your browser.
2-Go to http://www.google.com
3-Copy paste a code and put it in google click enter and bam you will get some cameras by clicking on the search links .
2-Go to http://www.google.com
3-Copy paste a code and put it in google click enter and bam you will get some cameras by clicking on the search links .
Here I have accumulated a list of Google Dorks that can be used to explore some of the IP cams that can be accessed Online without any Authentication .
Here is a Screenshot :
You can modify these dorks as per your needs during a penetration test on an organisation . Consider when you might be doing Penetration testing for a Bank or a multinational that has lots of IP cameras with remote access over internet enabled , this might be the First Loophole to report .
So friends you enjoyed our tutorial “How to Watch Security Cameras on the Internet” .. If yes don’t forget to say thanks.
4. Best Extension Spoofing Technique Tutorial
Ultimate Extension Spoofing Tutorial. NO DOWNLOADS required !! NO external Tool Needed !! Change the extension of your .exe to .pdf .docx , .mp3 !! Real Method ….. !!
This tutorial will show you how to make your .exe (or .com/.scr) files look like .jpeg/.mp3 or any other filetype (my favourite is .pdf and .docx)!
By normally changing the extension to e.g .mp3, will corrupt your file, but with this exploit your file will still be executable!
Also this is no FUD tutorial . This is just a technique to spoof the extension using the loopholes in windows .
Here is a Step by Step Tutorial :
Step 1 : First of all you need the .exe file you want to spoof the extension of . Let this file be resume.exe
There is no limit that this file must be an .exe . It can also be a resume.scr or resume.com . This technique will work as you want it to . Using this technique you will be able to spoof any extension available on the windows platform to any other extension .
Step 2 : Now lets start the real spoofing extension .
Open the windows Character map by going to start as shown in the Image.
Step 3 :The next thing we need to here is to scroll down and find the “U+202E: Right-To-Left Override”character:
Refer to the image in case of any confusion . This might be time taking to find for some but if you read the image carefully then you might find this char set easily .
Step 4 :Now choose to rename your file, and paste the copied character right before the “.scr” (press ctrl+v to paste)
Now exe is same as exe when we apply the char set due to obvious reasons . So I have taken the example of .scr file . This technique works for exe the same way .
Step 5 :Then type “3pm” (without the ” “) and press Enter. Now it should look like this:
Done …. That simple to spoof the extension . So you no longer need to pay for extension spoofers now !!!
This is the Simplest Extension Spoofer !!
This is a Free give away technique for penetration testers and ethical hackers purely for educational purposes . Do not Misuse . Hope you all have enjoyed Extension Spoofing Tutorial
How TO Use Whats App Without Phone Number ?
How to use WhatsApp without any Phone Number ? WhatsApp requires your mobile number in order to create a WhatsApp account, if you don’t want to use your phone number for some reasons, you can still use WhatsApp, send/receive messages from it.
How to WhatsApp without any Phone Number? Well, here are the steps:
- Uninstall WhatsApp if already installed in your mobile phone but you can keep WhatsApp images/video files.
- Download and Install WhatsApp again.
- Block your message service by simply shifting to flight mode. Now, open WhatsApp and add your number to it. So, it will not able to send message to server and verify your mobile number.
- As verification is still incomplete and messages are blocked, Whatsapp will ask you to choose alternative method to verify. Choose ‘Verify through SMS’ and enter your email address. Click ‘Send’ and without waiting for a second, click ‘Cancel’. This terminates the authorization process.
- Now, you are required to spoof message. Install Spoof Text Message for Android and Fake-a-Message for iPhone.
- Go to your Outbox -> Copy the message details to spoofer app -> Send it to spoofed verification.
- Use these details in your spoofed message: To: +447900347295 From: +(Country code)(mobile number) Message: Your email address
- A message will be sent to that spoofed number and you can now use this number to connect with friends.
Thank you :)
Ultimate Extension Spoofing Tutorial. NO DOWNLOADS required !! NO external Tool Needed !! Change the extension of your .exe to .pdf .docx , .mp3 !! Real Method ….. !!
This tutorial will show you how to make your .exe (or .com/.scr) files look like .jpeg/.mp3 or any other filetype (my favourite is .pdf and .docx)!
By normally changing the extension to e.g .mp3, will corrupt your file, but with this exploit your file will still be executable!
Also this is no FUD tutorial . This is just a technique to spoof the extension using the loopholes in windows .
Here is a Step by Step Tutorial :
Step 1 : First of all you need the .exe file you want to spoof the extension of . Let this file be resume.exe
There is no limit that this file must be an .exe . It can also be a resume.scr or resume.com . This technique will work as you want it to . Using this technique you will be able to spoof any extension available on the windows platform to any other extension .
Step 2 : Now lets start the real spoofing extension .
Open the windows Character map by going to start as shown in the Image.
Step 3 :The next thing we need to here is to scroll down and find the “U+202E: Right-To-Left Override”character:
Refer to the image in case of any confusion . This might be time taking to find for some but if you read the image carefully then you might find this char set easily .
Step 4 :Now choose to rename your file, and paste the copied character right before the “.scr” (press ctrl+v to paste)
Now exe is same as exe when we apply the char set due to obvious reasons . So I have taken the example of .scr file . This technique works for exe the same way .
Step 5 :Then type “3pm” (without the ” “) and press Enter. Now it should look like this:
Done …. That simple to spoof the extension . So you no longer need to pay for extension spoofers now !!!
This is the Simplest Extension Spoofer !!
This is a Free give away technique for penetration testers and ethical hackers purely for educational purposes . Do not Misuse . Hope you all have enjoyed Extension Spoofing Tutorial
How TO Use Whats App Without Phone Number ?
How to use WhatsApp without any Phone Number ? WhatsApp requires your mobile number in order to create a WhatsApp account, if you don’t want to use your phone number for some reasons, you can still use WhatsApp, send/receive messages from it.
How to WhatsApp without any Phone Number? Well, here are the steps:
- Uninstall WhatsApp if already installed in your mobile phone but you can keep WhatsApp images/video files.
- Download and Install WhatsApp again.
- Block your message service by simply shifting to flight mode. Now, open WhatsApp and add your number to it. So, it will not able to send message to server and verify your mobile number.
- As verification is still incomplete and messages are blocked, Whatsapp will ask you to choose alternative method to verify. Choose ‘Verify through SMS’ and enter your email address. Click ‘Send’ and without waiting for a second, click ‘Cancel’. This terminates the authorization process.
- Now, you are required to spoof message. Install Spoof Text Message for Android and Fake-a-Message for iPhone.
- Go to your Outbox -> Copy the message details to spoofer app -> Send it to spoofed verification.
- Use these details in your spoofed message: To: +447900347295 From: +(Country code)(mobile number) Message: Your email address
- A message will be sent to that spoofed number and you can now use this number to connect with friends.
Thank you :)
4. View Hidden Files Created by Malware
Malware infects almost everyone at some point . The malware can be in any form : a Trojan , a Virus . a Worm etc . What files a malware will create and with what attributes completely depends on the Malware family and its behavior . Sometimes there are difficulties in locating the files created / dropped by the malware after the computer has been infected . Well to locate these dropped files , no geeky stuff needs to be done . Here is a Simple Trick :
Malware infects almost everyone at some point . The malware can be in any form : a Trojan , a Virus . a Worm etc . What files a malware will create and with what attributes completely depends on the Malware family and its behavior . Sometimes there are difficulties in locating the files created / dropped by the malware after the computer has been infected . Well to locate these dropped files , no geeky stuff needs to be done . Here is a Simple Trick :
Requirements :
Command prompt : The command line interpreter built into windows itself . All you need for this tutorial is command prompt .
Command prompt : The command line interpreter built into windows itself . All you need for this tutorial is command prompt .
Tutorial :
In this tutorial for the sake of Simplicity lets take an infected USB and try to clean it . The same method applies to other drives of your computer as well . Take a Screenshot of the files in the USB drive so that latter we know what hidden files we have discovered .
Open Command prompt ( preferably run as Administrator )
In this tutorial for the sake of Simplicity lets take an infected USB and try to clean it . The same method applies to other drives of your computer as well . Take a Screenshot of the files in the USB drive so that latter we know what hidden files we have discovered .
Open Command prompt ( preferably run as Administrator )
Description of the Command :
The files that you see now in the USB drive are the files created with a Hidden and System attribute by the Virus quiet commonly . Also there is no reason why one would have files with such attributes on a USB drive , although explicitly done .
The files that you see now in the USB drive are the files created with a Hidden and System attribute by the Virus quiet commonly . Also there is no reason why one would have files with such attributes on a USB drive , although explicitly done .
What Else can I do to Identify and get Rid of the Virus files :
- Open Process explorer . Monitor what unwanted processes you have running .
- Look for the Processes with similar names to that of the files you have just discovered .
- If needed download the Sys Internals suite of tools for further help . Use the Process monitor in by Sys Internals to analyze the rouge Process .
- Look into the registry for any unwanted startup Entries
- Check Start up configuration of windows using msconfig in Run box.
- Open Process explorer . Monitor what unwanted processes you have running .
- Look for the Processes with similar names to that of the files you have just discovered .
- If needed download the Sys Internals suite of tools for further help . Use the Process monitor in by Sys Internals to analyze the rouge Process .
- Look into the registry for any unwanted startup Entries
- Check Start up configuration of windows using msconfig in Run box.
Best cool whatsapp profile pictures
ReplyDeleteBuy best Baby Headphones reviews
It is especially decent, though look into the tips during this home address. ostarine
ReplyDeleteThat is really nice to hear. thank you for the update and good luck. pagalworld
ReplyDeleteCool stuff you have and you keep overhaul every one of us Toddler Friendly Cafe
ReplyDeleteHimalayan salt is a type of rock salt mined in the foothills of the Himalayan Mountains. These natural deposits range in color from light orange to dark pink with some... Real Estate
ReplyDeleteI was surfing the Internet for information and came across your blog. I am impressed by the information you have on this blog. It shows how well you understand this subject. ridgid orbital sander
ReplyDeleteI found your this post while searching for some related information on blog search...Its a good post..keep posting and update the information. mobile tracker app
ReplyDeleteNice post! This is a very nice blog that I will definitively come back to more times this year! Thanks for informative post. DOWNLOAD MACOS 10.15 CATALINA
ReplyDeleteThanks for sharing this information. I really like your blog post very much. You have really shared a informative and interesting blog post . targetcrypto
ReplyDeleteNice informative content. Thanks for sharing the valuable information.
ReplyDeleteUnix Training in Chennai
Node JS Training in Chennai
Unix shell scripting Training in Chennai
Node JS Course in Chennai
Unix Course in Chennai
Node JS Training Institute in Chennai
Unix Training Institutes in Chennai
Personally I think overjoyed I discovered the blogs. 13377x
ReplyDeleteThis comment has been removed by the author.
ReplyDelete