Wednesday, 26 July 2017

Hack And Trace Any Mobile Phone

lets Start The trick…

STEP 1:First of all go to android market from your Girlfriend,spouse,friends or anyone’s phone which you want to spy or download the app mentioned below.

STEP 2:Search for a android application named “Touch My life

STEP 3:download and install that application on that phone.


STEP 4:Trick is Over

Now you can able to spy that phone anytime by just sending sms to that phone.
Now give back that phone to your girlfriend..
and whenever you want to spy your girlfriend just send sms from your phone to your Girlfriend phone Which  are mentioned in Touch My Life manage book.
i am mentioning some handy rules below…

1) Write “CALLMEBACK” without Quotes and Send it to your girlfriend’s mobile number for a Automatic call back from your girlfriend’s phone to your phone.

2)Write “VIBRATENSEC 30” without Quotes and send it to your girlfriend’s mobile number to Vibrate your Girlfriend’s Phone for 30 seconds..You can also change Values from 30 to anything for the desired Vibrate time.

3)Write “DEFRINGTONE” without Quotes and Send it to your girlfriend’s mobile number..this will play the default ringtone on your girlfriend’s phone.

4)Write “SENDPHOTO youremail@gmail.com” without Quotes and Send it to your girlfriend’s mobile number.it will take the photo of current location of your girlfriend and send it to the email address specified in the SMS as a attachment.it will also send a confirmation message to your number.

5)Write “SENDCALLLOG youremail@gmail.com” without Quotes and Send it to your girlfriend’s mobile number ..it will send all the call details like incoming calls,outgoing calls,missed calls to the email address specified in the SMS.

6)Write “SENDCONTACTLIST youremail@gmail.com” without Quotes and Send it to your girlfriend’s mobile number ..it will send all the Contact list to the email address specified in the SMS.
So Guys Above all are only some Handy features of touch my life…You can also view more by going to touch my life application and then its manage rules..

Enjoy..:)

Tuesday, 25 July 2017

Turn of any android phone remotly by sending SMS

Android phone is having lots of abilities and most important is you can add more features or your own built one. Rooting android phone increases its features beyond the limit. There are many after rooting tricks available for almost any android device. People are often interested in hacking or spying tricks and android is not an exceptional platform for them. Such an amazing trick XDA-Developers Member RavinduSha has come up using his app. He built an app which can be used to turn off your android device remotely.Got any evil idea!!!?


How to Install and Use Remote turn Off App
Now lets talk about the process to install and use remote turn off app to switch off android phone remotely.
  • Requirement: You need a rooted device to use this app. If you face any difficulty while rooting , contact us or comment below, we will help immediately. Also , detailed complete guide on rooting android device is coming soon.
  • Now Download Remote Turn Off app zip file in your computer and extract it. You will find the apk file in the folder > System>App> Remoteturnoff.apk. Transfer it in your mobile using USB cable and install it by opening in your mobile.
  • If you have SuperSU installed in your device after rooting, it will ask for app permissions. Give all permissions to Remote Turn Off app to let it work efficiently.
  •  Now Launch and open the app. You will see the interface asking security code. Default code is null so change it to any password or digits. Make sure that it is case sensitive.
  • Now using other mobile , send the security code in sms to your mobile. This app will read sms and as soon as it matches with your saved security code, it will turn off or switch off android phone. Thus your task will be accomplished remotely without touching mobile, without being near to your android device and also without the use of internet.
You successfully configured your device for remote turn off. You can easily install this app in your friend’s rooted device and surprise them.
Share your experience and views.

 We are interested about your experience with your friends with this prank. Do comment

How To Hack Mobile Network And Listen To Calls / Read SMS Using SS7

All you need to hack someone’s phone and listen to the call is his phone number, this seemed to be impossible in the past, something that you would only see in movies? well not anymore, I will teach you how to do it, and how to do it quick, but I don’t promise you that it will be easy as you might think, you will need to study and follow the steps accordingly.

Signalling System No 7 was first developed in 1975 Most networks use protocols defined by the American National Standards Institute and the European Telecommunications Standards Institute.
SS7 is the protocol that allow mobile phones to communicate and exchange information needed to place calls or send sms.

Thanks to a vulnerability in SS7 you can now tape in, the method is called SS7 poisoning and it’s not really hard if you have basic understanding of how to exploit things, but since you are reading this I would assume you are at least a hacker within, if you don’t understand what I am going to explain or can’t do it, don’t give up, keep on trying.

This is the system fault until they fix it, it’s always good to learn how things works, but if you are going to use this for the purpose of spying on other people or doing illegal stuff it’s your own responsibility, I am sharing this for knowledge purposes and for educational purposes only.
This post might be the only ss7 hack tutorial you will ever find anywhere on the web, you can leave a comment if you find it useful and please share with your friends to make this a common knowledge and teach people how to prevent it or at least detect it.

You can also use SS7 mobile hack to hack and hijack whatsapp, instagram, facebook etc.

First download the SS7 hacking tools

You will need a program called SS7 analyzer from here.
this program will help you simulate the roaming network that your victim is going to join.

What do you need to know about SS7

You need to read the information on this PDF file and understand it carefully, especially signalling system 7 section, if you have no idea about how cellular network works you better go read more about it and come back here.


Plz Follows My Blog

Monday, 24 July 2017

3 Easy ways to bypass Android lock pattren without using hardreset

If you’ve somehow forgotten your Gmail info, it’s a bit trickier to bypass the lock screen. As a last resort, there’s always resetting your phone to factory settings, but no one wants that hassle. So, here are a couple of ways to avoid starting from scratch, if you can.


1.By using Google account verification:
If you know your Google username and password, you can have your phone up and running again in no time. First, press the power button to bring up the lock screen. Then draw five incorrect patterns, which shouldn’t be too hard since you’ve already forgotten the correct one.
After the wrong fifth attempt, you should see a screen similar to the first one below. You now have 30 seconds before it will allow you to try again, but before your time is up, hit Forgot pattern? and it will ask you for your Google login information.
Once you’ve entered it correctly, you’ll be asked to draw a new pattern for your lock screen. It’s as simple as that.
2.By using some lock pattern bypass Apps:
If you can’t remember your Google credentials, there are a few other ways you can get back into your phone. One is with a free app called Screen Lock Bypass, which lets you access all of your data so that you can back it up before resetting. You can also try the Pro version that resets the PIN or pattern so you don’t have to wipe your device.
Just download the app on your computer, install it onto your device via the Web Market and reboot your device. You should see a screen asking you to activate the app. You should know, however, that once you activate it, the app will run every time you reboot, so make sure to uninstall if you’re worried about it falling into the wrong hands.

3.By using windows command prompt:
This one requires you to have Android Debug Bridge (ADB) installed on your computer. ADB is part of the Android SDK, which you can download here. You’ll also need to have USB debugging enabled on your device, which can be found under Settings >> Applications >> Development.
There are two different pieces of code that XDA Developers user m.sabra came up with that you can try. First, connect your phone to your computer via USB. Open Command Prompt and input the following:
Now reboot your phone. If that one alone doesn’t work, try this code:
You’ll still see the pattern lock when you reboot, but it should accept any pattern you try. There’s no guarantee it will work with all devices, but it’s definitely worth trying before you have to reset your phone.
Unfortunately, these methods won’t work for everyone. If your device isn’t compatible with any of the above, you may have to wipe all your data and settings and restore your phone to its default settings (hard Reset Method). If you’re going to use the pattern lock screen, it’s important to choose a secure pattern, but also to make sure it’s one you can remember so that you don’t have to go through all of this.



If u like this just follow my blog...  And comments if any problem

15 Vulnerable Sites To (Legally) Practice Your Hacking Skills – 2017 Update

15 Vulnerable Sites To (Legally) Practice Your Hacking Skills – 2017 Update


1 bWAPP
bWAPP, which stands for Buggy Web Application, is “a free and open source deliberately insecure web application” created by Malik Messelem, @MME_IT. Vulnerabilities to keep an eye out for include over 100 common issues derived from the OWASP Top 10.bWAPP is built in PHP and uses MySQL. Download the project here. For more advanced users, bWAPP also offers what Malik calls a bee-box, a custom Linux VM that comes pre-installed with bWAPP.

2 Damn Vulnerable iOS App (DVIA)

Recently re-released as a free download by InfoSec Engineer @prateekg147, DVIA was built as an especially insecure mobile app for iOS 7 and above. For mobile app developers the platform is especially helpful, because while there are numerous sites to practice hacking web applications, mobile apps that can be legally hacked are much harder to come by!Get going with DVIA by watching this YouTube video and reading the ‘Getting Started‘ guide.

3 Game of Hacks

Alright, this one isn’t exactly a vulnerable web app – but it’s another engaging way of learning to spot application security vulnerabilities, so we thought we’d throw it in. Call it shameless self-promotion, but we’ve received amazing feedback from security pros and developers alike, so we’re happy to share it with you, too! The game is designed to test your AppSec skills and each question offers a chunk of code which may or may not have a security vulnerability – it’s up to you to figure it out before the clock runs out. A leaderboard makes Game of Hacks just that much more enticing.

4 Google Gruyere

This ‘cheesy’ vulnerable site is full of holes and aimed for those just starting to learn application security. The goal of the labs are threefold:
  • Learn how hackers find security vulnerabilities
  • Learn how hackers exploit web applications
  • Learn how hackers find security vulnerabilities
  • Learn how to stop hackers from finding and exploiting vulnerabilities
“‘Unfortunately,’ Gruyere has multiple security bugs ranging from cross-site scripting and cross-site request forgery, to information disclosure, denial of service, and remote code execution,” the website states. “The goal of this code lab is to guide you through discovering some of these bugs and learning ways to fix them both in Gruyere and in general.”
Written in Python, Gruyere offers opportunities for both black box and white box testing so “hackers” have the chance to play on both sides of the fence.
Get started here: http://google-gruyere.appspot.com/

5 HackThis!!

HackThis!! was designed to teach how hacks, dumps, and defacement are done, and how you can secure your website against hackers. HackThis!! offers over 50 levels with various difficulty levels, in addition to a lively and active online community making this a great source of hacking and security news and articles.
Get started with HackThis!! here.

6 Hack This Site

HackThisSite! is a legal and safe place for anyone to test their hacking skills. The hub offers hacking news, articles, forums, and tutorials and aims to teach users to learn and practice hacking through skills developed by completing challenges.Start your training on HackThisSite here

7 Hellbound Hackers

Hellbound Hackers, the hands-on approach to computer security, offers a wide array of challenges with the aim to teach how to identify exploits and suggest the code to patch it. And Hellbound Hackers really is the ultimate site for hacking tutorials, covering a large range of topics from encryption and application cracking, to social engineering and rooting. With a community of nearly 100k registered members, it’s also one of the biggest hacking communities out there.
Read more and get started here.

8 McAfee HacMe Sites

Foundstone, a practice within McAfee’s Professional Services, launched a series of sites in 2006 aimed for pen testers and security professionals looking to increase their InfoSec chops. Each simulated app offers a “real-world” experience, built with “real-world” vulnerabilities. From mobile bank apps to apps designed to take reservations, these projects cover a wide array of security issues to help any security-minded professional stay ahead of the hackers.
The group of sites include:
9 Mutillidae
Yet another OWASP project on our list, Mutillidae is another deliberately vulnerable web application built for Linux and Windows. This project is actually a set of PHP scripts containing all the OWASP Top Ten vulnerabilities and more and is armed with hints to help users get started.
Get started with Mutillidae here, and be sure to check out the projects dedicated YouTube channel and Twitter account, run by Mutillidae’s second-generation developer, Jeremy Druin.

10 OverTheWire

OverTheWire is great for developers and security professionals of all experience levels to learn and practice security concepts. This pracrice comes in form of fun-filled wargames – beginners should start with “Bandit”,. where the basics are taught, and will progress to higher levels and to advanced games all with more complex bugs and exploits to patch as you go.Jump in the game here

11 Peruggia

Peruggia is a safe environment for security professionals and developers to learn and test common attacks on web applications. Peruggia is set as an image gallery in which you can download projects to help you learn how to locate and limit potential issues and threats.Download Peruggia here.

12 Root Me

Root Me is a great way to challenge and improve your hacking skills and web security knowledge through over 200 hacking challenges and 50 virtual environments. Check out Root Me here.

13 Try2Hack

Created by ra.phid.ae and considered one of the oldest challenge sites still around, Try2Hack offers multiple security challenges.
The game features diverse levels which are sorted by difficulty, all created to practice hacking for your entertainment. There is an IRC channel for beginners where you can join the community and ask for help, in addition to a full walkthrough based on GitHub.Try2Hack is available here.

14 Vicnum

An OWASP project, Vicnum is a series of basic and obviously web apps based on games “commonly used to kill time.” Because of their simple frameworks, the applications can be tailored for different needs, making Vicnum a great choice for security managers looking to help teach developers AppSec in a fun way.
The goal of Vicnum is “to strengthen the security of web applications by educating different groups (students, management, users, developers, auditors) as to what might go wrong in a web app, the site says. “And of course it’s OK to have a little fun.”
Check out the site, developed by Mordecai Kraushar here to find the games and available CTFs for download.

15 WebGoat

One of the most popular OWASP projects is WebGoat. This insecure app provides a realistic teaching and learning environment with lessons designed to teach users about complex application security issues. WebGoat is aimed for developers looking to learn more about web app security. The name WebGoat is a scapegoat reference: “Even the best programmers make security errors. What they need is a scapegoat, right? Just blame it on the ‘Goat!'”
Installs are available for Windows, OSX Tiger and Linux and has separate downloads for J2EE and .NET environments. There is an “easy-run” version as well as a “source distribution” version that allows users to modify the source code.
Check out the OWASP project page here or the GitHub page to get started with WebGoat.



If u like this just follow my blog...  And comments if any problem

HOW TO HACK WIFI WPA AND WPA2 WITHOUT USING WORDLIST IN KALI LINUX OR HACKING WIFI THROUGH REAVER


Hello Friends Today I Am Going to Show You How To Hack Wifi Without Using Wordlist Or You Can Call it as Hacking Wifi Password Using Reaver Method

THIS IS FOR EDUCATIONAL PURPOSE ONLY, I AM NOT RESPONSIBLE FOR ANY ILLEGAL ACTIVITIES DONE BY VISITORS, THIS IS FOR ETHICAL PURPOSE ONLYTHIS IS FOR EDUCATIONAL PURPOSE ONLY, I AM NOT RESPONSIBLE FOR ANY ILLEGAL ACTIVITIES DONE BY VISITORS, THIS IS FOR ETHICAL PURPOSE ONLY
Requirements:
1. Kali Linux – Operation System in Your System or In Your Flash Disk (USB Pendrive)

4GB or Above Pendrive
3. Kali Live Boot

Wifi networks nearby with Excellent Signal to make hacking fasterLimitations:Can hack only WPS Enabled Routers Cannot hack WPS Turned ON Routers




What is WPS: : WPS Means Wifi Protected System, This Is a Different Type of security system which is enabled for some routers, it is the best method to hack wifi , But it does have Limitations, they are some routers with WPS enabled are secured by another security called “AP RATE LIMITING” if you see this just leave that network and go to another network.

1) Till now no one found any method to break that security system, may be in my later posts I will try to post how to break that security system

2) Wpa And Wpa2 Networks can only be hacked using wordlist, Which uses Brute Force Attack in which probability of getting password is only 35%

3) But In Reaver Method Probability is 100% (Only If AP Rate Limiting Is Not Available)

4) So it is better to go for reaver method if wps is available

5) It consumes less time than Brute Force Attack Or Dictionary Attack 6) If the network that you want to hack has an excellent signal and if your system
is in good condition, then the hack completes in 5 – 18 Hours.




Step 1: Open Terminal and type “ifconfig” (Optional)

Step 2:Here I will be selecting wlan0 as my interface And the Next Command Is “airmon-ng start wlan0”

Step 3: Now you can see the available supplicants and the interfaces

Step 4: There are two options from here on, you can either kill the supplicants or move on with the other command.

1) By Using Kill Command and Stopping the Wlan0 Supplicants 2) By Using the Command “airodump-ng mon0” instead of kill and the next command is “airodump-ng wlan0” Here i used “Kill” Command to kill the supplicants, you can follow any of these methods

Step 5: Now Type The Following Command “airodump-ng wlan0“For Kali Linux 2016 and later on versions, type “airodump-ng wlan0mon“

Step 6: Here you can see all the available wifi networks

Step 7: Press “CTRL + C” to stop the search



Step 8: Type “wash -i wlan0mon”

if that doesn’t work type “wash -i mon0”

Wash is a tool used to search for all the wps enabled networks around you.

Step 9: Here are the wps enabled networks available around me :p. Note: Reaver can hack networks for which WPS is enabled and not locked, which can be seen below. In the WPS Locked Column. If it says “Yes” – reaver can not hack such networks “NO” — Reaver can hack those networks

Step 10: Press “CTRL + C” to stop the search and select a network that you want to hack

Step 11: Copy the “BSSID” of the network

Step 12: Now time to hack the network using Reaver :p Reaver -i mon0 -b bssid -vvHere bssid = the mac address or the bssid that you copied earlier mon0= Interface (you can either use wlan0 or mon0 or wlan0mon in Kali 2016 or higher)

Step 13: Now reaver starts its program and the Hacking Starts, you need to wait till it completes it’s hack(100%)

Reaver takes at least 6-18 hours to hack the network password, so please be patient and let it do its work. WPS pin contains 99999999 combinations, so it might take a while to crack it. After reaching 100% you can see the password of that network, as it takes a lot of time I am not able to show you the password of that network. But can guarantee you that this is the best and easiest way to hack wifi wpa and wpa2 passwordReaver can hack routers which are manufactured before 2012, later on manufactured discovered the flaw and modified in such a way that, when someone try to brute force wps pin, it automatically locks the wps system which is a disadvantage to reaver. This is the AP RATE LIMITING SECURITY SYSTEM (WPS lock ON) If you face this Error, most likely you should stop using this particular method and go for Evil Twin Method, which can Hack any router but with user Interference. The Reason for getting this Error is WPS Protection is turned “ON” on the victim’s Router. We cannot hack WPS locked router’s using Reaver, you need to use evil twin attack to hack WPS locked networks, that’s the only method as of now.

If you get an error of AP Rate Limiting then try using the following commands, for very few router’s this command will work

“reaver –i mon0 –b bssid –d 30 –vv –dh-small”


AP rate limiting cannot be cracked, nowadays almost all the routers come with WPS lock turned on so this might not work on all the routers. Never Give UpHow to Secure Yourself from Reaver Attack: If You don’t want to be a victim of Rever Attack, replace your very old routers with new one or simply disable WPS from your Router’s control panel. Related posts in case you want to hack wifi using other methods too ========== Hacking Don’t Need Agreements ==========Just Remember One Thing You Don’t Need To Seek Anyone’s To Hack Anything Or Anyone As Long As It Is Ethical, This Is The Main Principle Of Hacking Dream Thank You for Reading My Post, I Hope It Will Be Useful For You


 If u like this just follow my blog...  And comments if any problem

MAKE AMAZON PRIME MEMBERSHIP IN FREE