Hacking

1. DNS Enumeration with Kali Linux Tutorial

By Parth Makadiya












..........For More click on above name of Post

2. List of Other Hacking Tools


By Parth Makadiya


Other Hacking Tools: There are also other miscellaneous hacking tools that are often used by hackers. They can’t be put into a particular category, but they are still quite useful.

......For More click on above name of Post.......




















3. How to Hack Gmail , Facebook with Backtrack 5 or Kali linux










By Parth Makadiya

First open your backtrack terminal and type ifconfig to check your IP

........For More click on above name of Post...........

4. How to hack Wifi with Windows













.......For More click on above name of Post.........





5.HACK WEBSITE USING SQLMAP | KALI LINUX - BACKTRACK
BY Parth Makadiya

In this tutorial I am going to show you how to hack a website with slqmap on Kali Linux.

Introduction
[*]Sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections. This is all about sqlmap. 
Now follow my steps to hack a website using sqlmap........
For More click on above name of Post.....






6.Teen Patti Hack Unlimited Chips and coins 100% working [Android and ios]


Teen Patti Hack

.........






7.4 Ways to Crack a Facebook Password and How to Protect Yourself from Them

     




We share our lives on Facebook. We share our birthdays and our anniversaries. We share our vacation plans and locations. We share the births of our sons and the deaths of our fathers. We share our most cherished moments and our most painful thoughts. We divulge every aspect of our lives. We even clamor to see the latest versions even before they're ready for primetime.
But we sometimes forget who's watching........For More click on above name of Post...


For More click on above name of Post


9.How to use Aircrack-ng Suite in Kali Linux Tutorial

By Parth Makadiya
In this article, we will learn about the various wireless attacks. These days, wireless networks are everywhere. With users being on the go like never before, having to remain stationary because of having to plug into an Ethernet cable to gain Internet access is not feasible. For this convenience, there is a price to be paid; wireless connections are not as secure as Ethernet connections. In this article, we will explore various methods for manipulating radio network traffic including mobile phones and wireless networks..............For More click on above name of Post





Work in only few Country
Last it works in US and UK Facebook Hack............For More click on above name of Post..






11.Phishing for Yahoo

This is our third tutorial to phishing in which we will cover how to hack yahoo password. In this following tutorial to phishing I’ll demonstrate how to phish mail.yahoo.com to hack yahoo account of victim. So as every other tutorial on phishing we start it by creating fake login page. To create fake login page open mail.yahoo.com from your web browser and save it on your desktop as “Web Page, Complete” with name Yahoomail. After above process you’ll have a file named Yahoomail.htm and a folder named Yahoomail_files in folder in which you’ll save web page. Now open Yahoomail.htm in notepad, find for action word and locate following string,...................
For More click on above name of Post......
.

12.How to hack anything on internet with ARDAMAX KEYLOGGER


Step 1:





For More click on above name of Post......






13.How to use Aircrack-ng Suite in Kali Linux Tutorial

By Parth Makadiya
0
In this article, we will learn about the various wireless attacks. These days, wireless networks are everywhere. With users being on the go like never before, having to remain stationary because of having to plug into an Ethernet cable to gain Internet access is not feasible. For this convenience, there is a price to be paid; wireless connections are not as secure as Ethernet connections. In this article, we will explore various methods for manipulating radio network traffic including mobile phones and wireless networks.           

For More click on above name of Post......





14.Complete Phishing Tutorial In Very Easy Way For PC

Complete Phishing Tutorial
What is phising?
Phishing is the act of attempting to acquire information such as usernames and passwords. phishing directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users,and exploits the poor usability of current web security technologies.             

       For More click on above name of Post......




























For More click on above name of Post......


16.See Someone's Hidden Facebook Profile Picture in full size


An Easy way to view Private Facebook Profile Picture in Full size:















18.Facebook Phishing site for PC

steps to create a phishing page:

 By Parth Makadiya

1.Go to the Facebook page ,and then right click on the page, u will see the option view source page,click on that.

For More click on the name of post to see full post.....


For More @  Click Here


Comments

Popular posts from this blog

A Ten Year Journey: How SEO PowerSuite Has Kept Its SEO Tools Current

Create Separate Contact Page in Blogger

4 Ways to Crack a Facebook Password and How to Protect Yourself from Them