Thursday, 30 April 2020

TOP 5 BROWSER EXTENSION USED BY THE HACKERS

TOP 5 BROWSER EXTENSION USED BY THE HACKERS

 

HELLO GUYS TODAY TODAY I GONNA TELL YOU SOME TOP 5 BROWSER EXTENSION USED BY THE HACKERS  , AND THEIR IS A REWARD WAITING FOR YOU AT THE END OF THE BLOG  , SO LETS START

TOPICS TO DISCUSS :

 1 . WHAT ARE BROWSER EXTENSIONS ?

2. HOW TO ADD AN EXTENSION TO A BROWSER   .

3. TOP 5 BROWSER EXTENSION USED BY THE HACKERS .

4. GIVING AWAY THE REWARD .

------------------------------------------------------------------------------------------------------------------------------
  

WHAT ARE BROWSER EXTENSION ?

BROWSER EXTENSION IS BASICALLY A SMALL SOFTWARE FOR CUSTOMIZING THE WEB BROWSER . BROWSER TYPICALLY ALLOWS A VARIETY OF EXTENSIONS, INCLUDING USER INTERFACE MODIFICATION  , AD BLOCKING AND COOKIES MANAGEMENT

---------------------------------------------------------------------------------------------------------------------------

HOW TO ADD AN EXTENSION TO A BROWSER .

 TO ADD AN EXTENSION TO THE BROWSER YOU CAN USE A SHORT CUT KEY i.e. CTRL+SHIFT+A OR YOU CAN CLICK ON THE MENU BUTTON ON THE TOP RIGHT SIDE OF THE BROWSER AND CLICK ON ADD ON OPTIONS , YOU WILL SEE A SEARCH BAR ON THE RIGHT SIDE OF THE PAGE SEARCH THE EXTENSION FOR EXAMPLE : VPN ( VIRTUAL PRIVATE NETWORK ) CLICK ON ANY OF THE VPN SHOWN IN THE RESULT , AFTER CLICKING YOU SEE A OPTION ADD TO BROWSER , THEN A POP WILL COME ON THE TOP ,  YOU JUST HAVE TO CLICK ON ADD AN D YOUR RXTENSION WILL BE ADDED TO THE CHROME.

---------------------------------------------------------------------------------------------------------------------------

TOP 5 BROWSER EXTENSION USED BY THE HACKERS

SO GUYS NOW I TELL YOU THE TOP 5 EXTENSIONS USED BY THE HACKERS  , SO LET'S START FROM THE START : 

5. WAYBACK MACHINE


 THIS EXTENSION IS USED TO SEE HOW A WEBSITE LOOK LIKE 3-4 YEARS BACK OR MANY , WHICH HELP A HACKER TO SEE THE RECENT VERSION OF THE WEBSITE , OR IT DETECT DEAD PAGES , DNS FAILURE ( 404 PAGE NOT FOUND ) .

4. HACKBAR QUANTUM

  
THIS EXTENSION IS USED TO DO ENCODING OR FOR ENCRYPTION . IT IS USED TO INSERT PAYLOAD WITHOUT USING THE BURPSUITE ( BURPSUITE IS A TOOL WHICH IS USED TO INTERPRET THE PATH OR IN LAYMAN LANGUAGE  WE CAN SAY THAT IT IS USED TO CAPTURE THE PATH OF THE DOMAIN SO THAT WE CAN MAKE CHANGES IN THE CODE OF THE SITE ).

3. FOXYPROXY




THIS EXTENSION IS USED TO CHANGE THE PROXY SETTING . WHILE DURING CONFIGURING THE PROXY SETTING WITH APP , PROBLEM MAY BE OCCURS WHILE SURFING THE WEBSITE SO THIS EXTENSION IS USED TO SET THE PROXY WITHOUT CHANGING SETTING FROM THE BROWSER .

2. NETCRAFT EXTENSION


THIS EXTENSION IS USED TO CHECK THAT HOW MUCH THE SITE IS SECURED OR IS THERE ANY VULNERABILITY  OR NOT , IT ALSO PROVIDE PROTECTION FROM THE PHISHING ATTACKS , MALWARES AND THE NEW CORONA VIRUS CYBER CRIME.

1. WAPPALYZER 

 THIS EXTENSION IS THE MOST IMPORTANT AND  IS USED TO CHECK IN WHICH LANGUAGE THE WEBSITE IS MADE FOR EXAMPLE PHP , JAVA , HTML , PYTHON ETC . IT ALSO TELL THE VERSION OF THE HTTP/HTTPS ( HTTP v1.0 IS AFFECTED FROM A VULNERABILITY i.e. HOST HEADER ATTACK . IT ALSO DETECTS THE WEB SERVERS , JAVASCRIPT FRAMEWORK , eCOMMERCE PLATFORM AND ANALYTICS TOOLS AND MANY MORE . 

---------------------------------------------------------------------------------------------------------------------------

NOW GUYS GET READY FOR YOUR REWARD

OUR TEAM HAS DECIDED TO GIVEAWAY THE NETFLIX  FOR FREE . TO GET THIS FREE GO TO OUR YOUTUBE CHANNEL SEE OUR LATEST VIDEO , CHECK THE DESCRIPTION , SEE THE TERMS AND CONDITION TO GET THIS FOR FREE .
 ------------------------------------------------------------------------------------------------------------------------

IF YOU LIKE THE CONTENT PLEASE COMMENT BELOW AND SUBSCRIBE OUR YOUTUBE CHANNEL , LIKE ALL THE VIDEOS AND DON'T FORGET TO COMMENT AS WELL.


THANK YOU.
 

Sunday, 26 April 2020

HOW TO HACK ALL SOCIAL MEDIA ACCOUNT AND BYPASS THE VERIFICATION OTP

HOW TO HACK ALL THE SOCIAL MEDIA ACCOUNT AND   BYPASS THE OTP 

 

ANNOUNCEMENT : HI GUYS , I CAN'T ABLE TO SHARE THE LINK OF THE VIDEO AS THE VIDEO HAS BEEN REMOVED BY THE YOUTUBE . I DON'T KNOW WHY THEY DO THIS , ACCORDING TO THEM I HAVE VIOLATES THE COMMUNITY GUIDELINES BUT ACCORDING TO ME THERE IS NO PROBLEM IN SHARING THE KNOWLEDGE. SO DO ALL THE STEPS GIVEN BELOW , IF ANY STEP DON'T WORK PLEASE COMMENT ME DOWN , PROBLEM WILL BE SOLVED ASAP. KINDLY SUPPORT............ 

 

WELCOME TO MY BLOG GUYS TODAY WE GONNA HACK THE SOCIAL MEDIA ACCOUNT WITH THE KALI AND WE WILL BYPASS THEIR OTP ( ONE TIME PASSWORD ) WHICH COMES FOR VERIFICATION OF THE USER  ( THIS IS ONLY APPLICABLE IF THE USER HAS DONE THE 2 STEP VERIFICATION ) OTHERWISE WE WILL DIRECTLY LOGIN INTO THEIR ACCOUNT WITHOUT ANY DIFFICULTY .

SO LETS START :
STEP : 1  SEARCHING AND COPYING THE DOWNLOADING LINK

LOGIN INTO YOUR KALI MACHINE , OPEN THE BROWSER SEARCH FOR AdvPhishing 

github OR CLICK ON THE GIVEN LINK https://github.com/Ignitetch/AdvPhishing 

CLICK ON CLONE OR DOWNLOAD OPTION TO COPY THE DOWNLOADING OR 

CLONING OR COPY FROM HERE LINK  : https://github.com/Ignitetch/AdvPhishing.git



STEP : 2 CLONING & INSTALLING THE TOOL

TO INSTALL THE TOOL OPEN THE TERMINAL  AND WRITE THE FOLLOWING COMMANDS :

cd Desktop

git clone https://github.com/Ignitetch/AdvPhishing.git  AND PRESS ENTER IT WILL TAKE SOME TIME AND IT WILL BE CLONED .


AFTER CLONING THE TOOL EXECUTE THE FOLLOWING COMMANDS TO 

cd AdvPhishing

chmod +x * 

HERE 

chmod  : IS USED TO GIVE THE PERMISSION

+x       : REPRESENTS THAT WE HAVE GIVE THE USER TO USE THIS FILE

*       : REPRESENTS THAT ALL ITEMS IN THAT FOLDER




NOW RUN THE SETUP BY USING ./setup.sh
AFTER RUNNING ./setup.sh SETUP WILL START DOWNLOAD AND INSTALLING NGROK AUTOMATICALLY (AS SHOWN BELOW)

 AFTER INSTALLING IT ASK FOR NGROK AUTHENTICATION TOKEN , SO TO GET THE TOKEN GO TO THE NGROK SITE AND SIGN UP OR USE THIS LINK https://dashboard.ngrok.com/login

AFTER SIGNING UP SCROLL DOWN AND SEE THE 2nd OPTION i.e. CONNECT YOUR ACCOUNT , UNDET THIS THERE IS A COMMAND GIVEN WHICH IS THE AUTHENTICATION TOKEN ( AS SHIWN BELOW )  , COPY THAT AND PASTE IT INTO THE TERMINAL AND PRESS ENTER .




NOW THE REAL GAME BEGINS

 STEP : 3 RUNNING THE TOOL AND RETERIVING THE ID AND PASSWORD

NOW WRITE THE FOLLOWING COMMANDS TO RUN THE TOOL 

ls

./An-AdvPhishing.sh 

PRESS y AND CLICK ENTER

NOW YOU WILL SEE A LIST , SELECT ANYONE OPTION OUT OF THE LIST
FOR EXAMPLE I AM SELECTING 2 FOR FACEBOOK HACKING , SO I WRITE 2 AND PRESS ENTER .


THEN IT WILL GIVE YOU A LINK ( AS SHOWN BELOW )



SEND THIS LINK TO ANYBODY  , WHEN THE VICTIM OPEN THIS LINK HE SAW A FAKE FACEBOOK PAGE  ( AS SHOWN BELOW )  , IF HE HAS 2 STEP VERIFICATION THEN THE OTP WILL SEND TO HIS EMAIL ( NOW IF THE VICTIM RECIEVE THE OTP OR NOT WE WILL GET THE ID AND PASSWORD)( AS SHOWN BELOW )



 SO GUYS YOU HAVE SEEN THAT WE HAVE RETERIVE THE ID AND PASSWORD OF THE VICTIMS ACCOUNT.

NOTE  : GUYS I HAVE TRIED ON FACEBOOK BUT THE STEPS WILL REMAIN SAME FOR ALL THE OPTIONS.

GUYS IF YOU LIKE MY BLOG PLEASE SHARE AND COMMENT AND PLEASE SUBSCRIBE TO MY YOUTUBE CHANNEL. LINK BELOW 


THANK YOU.