BLACK HAT

BLACK HAT
REMEMBER ME

Monday 13 July 2015

Facebook Phishing ( Undetectable)

Phishing is the attempt to acquire sensitive
information such as usernames, passwords,
and credit card details (and sometimes,
indirectly, money) by masquerading as a
trustworthy entity in an electronic
communication.
New post: Advanced Level Facebook Desktop
Phishing Method -

Hack Wi-Fi with CMD

Sometimes you might be frustrated especially
when your system detect a wifi network but you
are restricted from accessing it due to users
password, now i can teach you a simple trick to
hack the password.
step one
Go to command prompt,

Wednesday 8 July 2015

Hacking A Bank Account



Bank Hacking

Despite the risks involved, hacking a Bank is relatively easy. As long as you are fast, by following this guide you should have no problems. Before you start, you will need to know an Account Number at the bank you want to hack, your Uplink Bank Account number, and the IP of Uplink International Bank.

1. Connect to the bank, with Inter NIC as your first bounce, and bypass the monitor and proxy with Level 5 Bypassers.
2. Break into the account you want to steal from, using the account number as the user name, and the password breaker to get the password. You should not have a trace on you because of the monitor bypass.
3. Enter the transfer screen and transfer money to your Uplink bank account

How to change your private IP address in Windows

Step 1: Navigate to the Network and Sharing Center – Click the the Windows Start Menu, select the Control Panel from the resulting pop-up box, and click the View network status and tasks option housed within the Network and Internet section on the left-hand side of the window.

IP Address control panel

How to Remotely Install a Keylogger onto Your Girlfriend's Computer

Several of you have you have emailed me asking whether it's possible to install a keylogger on a victim's computer using Metasploit. The answer is a resounding "YES"!
So, by popular request, in this guide I'll show you how to install a keylogger on your girlfriend's, boyfriend's, wife's, or husband's computer.....
For those of you wondering what a keylogger is, the simple answer is that it's a piece of software or hardware that captures every keystroke and saves them for retrieval by you, the attacker. These types of devices have long been used by hackers to capture logins, passwords, social security numbers, etc. Here we will use it to capture the keystrokes of a cheating girlfriend.
Fire up Metasploit and let's get started.
Like in my last article on disabling antivirus software, I'm assuming that you've successfully installed Metasploit's powerful listener/rootkit on the target system. You can also check my earlier articles for a variety of ways to get it installed.

How to Hack Email Account with Cookie stealing [For Newbies]


How to hack Email accounts:

If you are a newbie and don't know about cookie, then for your information, Cookie is a piece of text stored on user computer by websites visited by the user. This stored cookie is used by web server to identify and authenticate the user. So, if you steal this cookie (which is stored in victim browser) and inject this steeled cookie in your browser, you can imitate victim identity to web server and enter his Email account easily. This is called Session Hijacking. Thus, you can easily hack Email account using such Cookie stealing hacks.

Tools needed for Cookie stealing attack:

How to Brute Force hacking Facebook in Kali Linux

Hello all, Want to learn facebook hacking?
 facebook hacking with  Brute force python scripting

We need a tool:

1. Python Script - facebook.py
2. Wordlist - e.g. pass.txt or wordlist.txt

I have already installed python or Install python after installing

step 1.

[*] root@lhackg:~#apt-get install python-mechanize



step 2.

now downloading facebook.py

Crack Online Passwords with Tamper Data & THC Hydra



Welcome back..
Its BROXKEY Again!!!

Not too long ago, I showed how to find various online devices using Shodan. As you remember, Shodan is a different type of search engine. Instead of indexing the content of websites, it pulls the banner of web servers on all types of online devices and then indexes the content of those banners.
This info can be from any type of device including web servers, routers, webcams, SCADA systems, home security systems, and basically anything that has a web interface, which in 2014, means just about everything.
I mentioned in my first Shodan tutorial that you can often access these devices by simply using the default username and password, as administrators are often lazy and neglectful. The question we want to address in this tutorial is—what do we do when the site requires credentials and the defaults don't work?
There is tool that is excellent for cracking online passwords and it is called THC-Hydra. Fortunately, it is built into our Kali distribution, so we don't need to download, install, or compile anything to use it.
 
 

Step 1: Download & Install Tamper Data