Posts

Showing posts from October, 2014

Tab Napping

Image
By P@rth Tab Napping  is a new form of phishing that is hitting the internet now. With the conventional  form of phishing, for example, you might receive an email that is supposedly from your bank,  and it might ask you to login and update or confirm your account details, of course, there  would be a link to your banks website in the email for you to click, which would take you  to a page that looks identical to your real banks login page. How does it works Tab napping is more sophisticated than the phishing scams we’ve seen so far, and it no  longer relies on persuading you to click on a dodgy link. Instead it targets internet users  who open lots of tabs on their browser at the same time (for example, by pressing CTRL + T).  if you have multiple tabs open and you are reading the page on your current active tab,  any of the other inactive browser tabs could be replaced with a fake web page that is set  up to obtain your personal data, the web

Network Hacking

Image
by P@rth Ways To Attack a Network: Ping The IP address gives the attacker’s Internet address. The numerical address like 212.214.172.81 does  not reveal much. You can use PING to convert the address into a domain name in WINDOWS: The  Do main Name Service (DNS) protocol reveals the matching domain name.  PING stands for  “Packet Internet Groper”  and is delivered with practically every Internet compatible system, including all current Windows versions. Make  sure you are logged on to the net. Open the DOS shell and enter the following PING command: Ping –a 123.123.12.1 Ping will search the domain name and reveal it. You will often have information on the provider  the attacker uses e.g.:   dialup21982.gateway123.provider.com Pinging is normally the first step involved in hacking the target. Ping uses ICMP (Internet Control Messaging Protocol) to determine whether the target host is reachable or not.  Ping sends out ICMP Echo packets to th

Hack WhatsApp Account

Image
By Parth Makadiya On Daily we have heard news about online services is suffering from a lack of security. In February WhatsApp has been down for nearly four hours, as if this were not enough, people became aware of the security flaw that allows conversations that should be read by anyone provided it learn properly perform the procedures. Steps to follow: 1 - First of all you need to have the device at hand, use the Social Engineering and be quick in getting the e-mail and backup files  msgstore-2014-05-02.1.db.crypt5 . To get the email for this follow the procedures below. Enter the Play Store and view the e-mail, or write down mentalize somewhere without the person noticing. Now Go to the device settings from  Settings  ->  Accounts & Sync , look for the email from Google and mentalize or write down somewhere without the person noticing. 2 -  Now let's take the msgstore-2014-05-08.1.db.crypt7 file To do this, use  Polaris Off

New Site

Image
About us I have created a new website http://alltricks007.vv.si/ Click Here

How Can I Extract Password Protected ZIP File?

Image
BY Parth Makadiya People often store their important files and folders on their personal computer and as a result the storage space on hard disk keeps on increasing day by day. When hard drive gets full and system speed reduces and you’ll face lot of problems while transferring bulky files through emails. However, zipping files under single archive solves such problems. ZIP is a file compression technique used to compress files and folders on computer hard disk, which saves its memory space. Additionally, it helps you send large sized files over internet. ZIP files provide a very useful feature, i.e. password protection to avoid unauthorized access of your confidential data. It is very useful when you don’t want anyone to access the contents of ZIP file. But sometimes due to logical or technical glitches your ZIP file might get corrupt and its data remains inaccessible. No need to worry if your password protected ZIP file is corrupted, because you can eliminate corruption

How To Secure Your Facebook Account

Image
By Parth Makadiya 99% Facebook Account Hack Through Email Account Hello  All tricks 007  Readers Today i will tell you how to secure your Facebook Account. If you make your Facebook account with Gmail Account then secure your gmail account in my previous post check  how to secure your gmail account .. if your Gmail account secure it means your facebook account 70% already secured.. In this post i will show you in pics how to secure your Facebook account… 1st step:- Go to Security setting BestHacking.in Then Change your login notifications setting BestHacking.In Now Set Ur Privacy Settings BestHacking.In Do not show Your Email Address to Anyone …. Do not Use Your Password In common Words.. Like LoveYou-Jaimatadi-Bf Name-Gf Name…. Use Password Like my143@my143_my143 Love@143_love@143 Vry Strong Passwords Like MY_143@#&MY(M) MY@143(143)MY_143    For Autoliker   Click Here

Hack Facebook account password 2014 without email with Android

Image
By  P arth Makadiya HI this is  Prophet ...Today I tell you how can you hack facebook account with tabnpping.. Tab Napping    Tabnapping is a new form of phishing that is hitting the internet now. With the conventional form of phishing, for example, you might receive an email that is supposedly from your bank, and it might ask you to login and update or confirm your account details, of course, there would be a link to your banks website in the email for you to click, which would take you to a page that looks identical to your real banks login page. How does it works Tab napping is more sophisticated than the phishing scams we’ve seen so far, and it no longer relies on persuading you to click on a dodgy link. Instead it targets internet users who open lots of tabs on their browser at the same time (for example, by pressing CTRL + T).  if you have multiple tabs open and you are reading the page on your current active tab, any of the other inactive browser tabs could be replac