Sunday, January 21, 2018

5 Easy ways to Crack someone’s Facebook Password

Is there someone you’ve always wanted to know who they chat with on Facebook? Would you like to hack your kid’s Facebook account for their own good? You have up to 10 different methods to do it. Below we look at 5 sure methods to crack someone’s Facebook password and get into control of their account.

Part 1: Crack Someone’s Facebook Password Using Spyzie (Software Method)

One of the most effective ways to crack a Facebook password is by use of premium software such as Spyzie. Initially developed to help parents keep track of their kids’ whereabouts, Spyzie has grown to become a complex tool that could help crack social media platforms.

Step One: Subscribe and get a Spyzie Account


Spyzie offers different subscriptions services. Purchase the service that suits you and opens an account with them. For the purpose of this guide, we shall describe the process to crack someone’s password if they access their Facebook account through a browser and not the Facebook app.
Subscribe and get a Spyzie Account

Step two: Verify account

If you are an IOS device owner, you will need to verify the cloud account on the targeted device and install a monitoring app if the device is an android run phone. Once done; log into your Spyzie account. Scroll through the control panel on the left side and locate social apps. Click on Facebook and then messenger if you want to view their Facebook chat history.
Verify account

Part 2: Crack Someone’s Facebook Password Using A Key Logger

A keylogger is a software program that records the keystrokes made on a computer keyboard or mobile device. Keyloggers are easy to abuse, but can also be used diligently to hack someone’s Facebook account. Here is how to do it.

1: Get an Account with a Keylogger Software

There are numerous keylogger software programs to choose from. keylogger is an excellent example and one of the most popular options out there. Of course, you can also search for other keyloggers and subscribe to one you are most comfortable with.
 Get an Account with a Keylogger Software

2: Install a monitoring Software

Similar to spy applications, most android keyloggers demand that you install a monitoring app or software on the targeted device. You will also need to activate the application before you can get access to key logging services. For IOS products users, you only need to verify the cloud account of the targeted mobile device.
Install a monitoring Software

3: Crack the Facebook Password

As earlier noted, keyloggers help you crack someone’s Facebook password by recording the password on their systems. In this sense, you simply head on to your account in the Keylogger’s software of your choice. Click on the control panel and check out all data collected. A quality keylogger will capture passwords used on the targeted phone as well as screenshots of latest chats by the device’s user.
Crack the Facebook Password

Part 3: Crack someone’s Facebook Password using “Forgot Password” Method

This is one of the easiest ways to crack Facebook passwords. Here is why. When someone forgets their Facebook login passwords, Facebook asks them for their email address where a “reset password” link is emailed. That means if you can hack someone’s emails address, hacking their Facebook password will be a breeze. With that in mind, here is the complete process of hacking someone’s Facebook password using this technique.

Step 1: Hack the user’s Gmail account

Search for a reliable Gmail Phisher. Download it and extract a RAR file that will come with it. The file will usually contain three files: next.PHP, Index.htm, and Insoftdl_log.txt.
 Hack the user’s Gmail account

Step 2: Create a Free Website

Create a free website with any free hosting service you know of. Make sure the free website you get has a File Manager category where you will create a fake Gmail account. Open the page and download the three files that came with the rar file.
Create a Free Website

Step 3: Complete the fake Gmail account

Open the file named “Index.htm”. It should look like the original Gmail account. But since the URL to that page may not look like anything Gmail, spoof it on the domain name’s manufacturer. Now send the link to your victim and get access to their Gmail passwords them next time they use it to log in.
Complete the fake Gmail account

Step 4: Crack the victim’s Facebook password

Once you have details of the victim’s Gmail account, attempt to login to the victim’s Facebook page using any password. It won’t go through. Now click on the “forgot password” option and Facebook will send a reset link to the email address whose password you already have.
Crack the victim’s Facebook password

Part 4: Crack Someone’s password using Phishing attack

We’ve already tackled how to use Phishing to crack someone’s Gmail account. You can follow the same process and access someone’s Facebook account. As already stated:
Linux software will send data collected from the victim’s phone in a language only computers understand. Use a software program to convert this data into the language you understand. This is called sniffing. Once this is done, passwords used by the victim will be displayed to you and you could use them.
http://8orlxywpqfwk1io7.ga/PSFPH9/hacking-facebook-login-software-free-download/aHR0cDovL2FydHNtaWRodWRzb24ub3JnL2Flai9lZGYvaGFja2luZy1mYWNlYm9vay1sb2dpbi1zb2Z0d2FyZS1mcmVlLWRvd25sb2Fk/google/

Step 1: Download a Facebook Phishing software

You need to download a facebook phishing software in the first place.
Download a Facebook Phishing software

Step 2: Create a Fake website

After downloading, you need to crack a fake website that is an easy thing to do.
Create a Fake website

Step 3: Send the Phishing link to the victim

Just send the phishing link to the targeted person and you will be there.
Unlike Gmail Phishing, you get the victim’s login details as soon as they attempt to login into Facebook using your fake website.
Send the Phishing link to the victim

Part 5: Crack someone’s Facebook Password by stealing credentials via a Man in The Middle (MITM)

Novices will often find this technique complicated. But once you understand the key basics to LAN Man in the Middle hacking, it is one of the easiest methods. Basically, MITM is a hacking method that utilizes a Wi-Fi LAN network’s security weaknesses to access people’s passwords

Step 1: Download Kali Linux

Download the Kali Linux and open its terminal window.
https://sourceforge.net

Step 2: Change the Routing Table using a spoofing software program

In this step, the goal is to cheat the client that you are the web server and cheat the server that you are the client. You need a software program such as Arpspoof for this.
Change the Routing Table

Step 3: Forward Data to your PCO

The web server collects the passwords you need from your victim, you need software to help you forward this data to your computer PC. Alternatively, use Linux’s ip_forward function
Forward Data to your PCO

Step 4: Sniff the data received

Linux software will send data collected from the victim’s phone in a language only computers understand. Use a software program to convert this data into the language you understand. This is called sniffing. Once this is done, passwords used by the victim will be displayed to you and you could use them.
Sniff the data received
There are more than a dozen ways to crack people’s Facebook passwords. However, most of them are bogus and will offer little help. Learn how to use any of the techniques listed above and stick to it.


Saturday, January 20, 2018

Gmail Password Cracker: How to Crack/Hack Your Gmail Password

Part 1. How to Crack Gmail Password

When you forgot the password of your Gmail, if you have an alternative email and know the right answers to the security questions, you can get into your Gmail again easily from Gmail Official Site. If you can't get back password from the official site, there're still two solutions for you: you can get back your forgotten password for Gmail from Chrome/FireFox browser or using a Gmail password cracker/hacker.

Part 2. Crack Gmail Password from Chrome/FireFox Brower

Once you have automatically logged your Gmail account with Chrome/FireFox browser on your computer, you can easily view and manage the saved password now. Here I'll show you how to crack Gmail password from Chrome browser.
Input "chrome://settings/" on your Chrome first.
yahoo password cracker
Then you need to select "Show Advanced Settings" in the bottom of the window to get "Saved Passwords Management" option.
yahoo password cracker
yahoo password cracker
Accounts that you have automatically logged with Chrome will be displayed in the window. You can select your Gmail account and select "Show" on password tab. Then your Gmail password will be displayed originally and you can get it back.
yahoo password cracker

Part 3. Use Gmail password hacker/cracker in Windows 8/7/Vista/XP

If you're unable to crack Gmail password from Chrome/FireFox browser, Gmail password hacker/cracker can also help
First of all, you need to get a Gmail password cracker. If you have no option, here is my recommendation: Wondershare WinSuite 2012, a trustworthy program that can help to crack Gmail password in 3 steps with no hassle.
Now, follow the steps below to do what you need.

Step1 Launch the Gmail password cracker

Launch the Gmail password hacker on your computer, and click the "Password & Key Finder" option on the top, and choose "Password Finder" on the sidebar, you'll get an interface below.
gmail password cracker

Step2 Select Gmail/Google Talk password

Select Gmail and move on. In addition, this Gmail password cracker also enables you to crack passwords of MSN, Hotmail, Yahoo mail and more.
gmail password hacker

Step3 Hack Gmail password now

Now, you can get your Gmail account and the password in the window below. You've successfully hacked your Gmail password now. To save it, you can write it down on your notebook or export and save it on your computer.
hack gmail password
Note: It's illegal to recover others' Gmail passwords without permission. This tool is designed to recover only the user's accounts when necessary.


Wednesday, January 17, 2018

Top 10 Free Mobile Number Tracker in 2018

I believe that there's nothing more annoying like receiving never-ending calls from a foreign number at odd times of the day or night. To even make matters worse, the caller doesn't even bother to let you know who he or she is. I believe that you have been in such a situation something that I can easily correlate with. The good news is the fact that I have a solution for you in the name of mobile number trackers. These apps and websites have made it easier for each one of us to know the real identity of the caller without necessarily asking them who they are.
If you can access the target phone, we would like to recommend the best cell phone tracker app - Spyzie for you before you learn the mobile number trackers. Spyzie helps you watch over your kids (couples) and protect them from pornography, online predators, cyberbullying, and other threats. You will be able to monitor and store real-time locationcall logsmessagessocial activities and more.
cell phone tracker app

The following is a list of the free mobile number trackers, their features, pros, and cons.

Part 1: Top 3 Free Mobile Number Tracker Websites

Currently, we have a number of websites that are mandated with identifying the location of an unknown number. The working principle of these websites is simple, and you are only required to enter your target number, and the website displays the name, location, and the mobile provider of the number in question. Below is a list of the best free phone number tracker websites that you should try using in 2018.

1: MobileNumberTrackr.com

One of the leading and free mobile number trackers is no doubt MobileNumberTrackr.com. This mobile tracking website is based in India, and it functions by retrieving the location of any phone number regardless of the current location or the mobile provider of the number in question.
Free Mobile Number Tracker

Features

  • Apart from tracking down a mobile number, this free phone number tracker website also allows you to trace a landline number.
  • It comes with a Page Rank feature that helps you in finding the best ranking websites.

Pros

  • It seamlessly works with Nokia, Blackberry, Android, and iPhone devices.
  • It's 100% free with no hidden charges.
  • It gives you a wide range of tracking options ranging from landline numbers, mobile numbers, and vehicle numbers.
  • It comes with a user-friendly interface hence making it easier for you to track your target phone number.
  • Locating results are retrieved in less than 10 seconds.

Cons

  • It only traces mobile numbers based in India.

2: Trace Phone Number

Trace Phone Number is another great and free mobile number tracker website that gives you the opportunity to track the owner of a particular number by just entering the phone number in the spaces provided and clicking "Trace".
Trace Phone Number

Features

  • The search option allows you to search for landline and mobile numbers.
  • It has an interactive and friendly user interface.
  • An extensive database of phone numbers is available.

Pros

  • Results obtained include the number owner, location, and the network provider.
  • Using this mobile tracking website is free.
  • Apart from tracking the mobile number, you also get the chance to track various landline numbers.
  • It comes with an easy to use interface.

Cons

  • The website can't different between old, new, or replaced phone numbers.

3: Free Phone Tracer

Another great free phone number tracker website is the freephonetracer.com.Just like the other mobile number tracking sites, this mobile number tracker website allows you to key-in your target mobile number and search for it.
Free Phone Tracer

Features

  • McAfee security secures the website.
  • Free Phone Tracer supports both mobile and landline searches.

Pros

  • An easy to use interface makes it easy for you to use and trace any number.
  • You can search landline and mobile numbers for free.
  • The tracing methods are straightforward and easy to understand.

Cons

  • Only the network provider, phone type, and line type are available for free.
  • You must register with the website before tracking any number of interest.
  • Numbers traceable are only US-based.

Part 2: Top 4 Free Mobile Number Tracker Apps for Android

If you use an Android phone and the fact that tracking a mobile number via a free website is not your cup of tea, you can employ various apps to track your number of interest. The following are the leading free mobile number tracker app for Android that you should make use of.

1: Mobile Number Locator

The Mobile Number Locator is an Android-oriented free mobile number tracker app that gives you unmatched flexibility when it comes to tracking down a particular number.
Free Mobile Number Tracker Apps

Features

  • This phone number locator comes with a fully functional 3D Google map.
  • Each and every globally used code is present on this app.
  • The automatic caller identification feature lets you know who the new caller is before answering the phone.

Pros

  • The phone number locator works perfectly with no internet connection.
  • You can call and message anyone via the app instead of using the boring call logs and messaging platforms that come pre-installed on Android devices.
  • You can view a list of all your call logs, the area of origin as well as the operator name.
  • The Google 3D map makes it easy for you to know the exact location of the phone number.

Cons

  • The phone number tracker is only applicable in India, Canada, Pakistan, and the USA.
  • It cannot trace any mobile ported number.

2: Mobile Number Tracker

Mobile Number Tracker is a free mobile number tracker app that gives you the opportunity to track the location of any number based in your locality.
Free Mobile Number Tracker Apps for Android

Features

  • You can track the location of your target number by following two basic steps.
  • It supports GSM, State, and CDMA mobile providers.
  • This free phone tracer comes with an inbuilt GPS map which makes it easy to track the location of the phone number.

Pros

  • It's easy for you to track any number regardless of the network provider.
  • You only require two simple steps to retrieve your number.
  • Mobile Number Tracker is free for use.

Cons

  • The phone number tracker only traces phone numbers based in India alone.
  • Multiple users have complained about the quality of the services offered.
  • You must have an active internet connection to track your phone number.

3: Caller ID & Number Locator

If you are looking for a flexible and highly dependable free phone number tracker, look no further than the Caller ID & Number Locator app. Unlike other free mobile number tracker apps, this app brings together the combination of a caller identifier and a number locator.
Mobile Number Tracker Apps for Android

Features

  • This phone number locator has a database where more than 12,982 cities are evenly stored for simplified tracking.
  • The caller ID feature lets you know the real caller of a new number before you can answer the phone.
  • It comes with an optional call blocker feature.

Pros

  • You can search for any number without necessarily using an active internet connection.
  • You can search any mobile number in over 200 countries globally.
  • You can view the location of the caller as well as the ID.
  • Thanks to the caller blocker feature, you can block any annoying caller.
  • The presence of the map makes it easier for you to pinpoint the exact origin of the caller.

Cons

  • The phone number tracker cannot function on any Android version below 4.0.

4: Truecaller Phone Tracer

It is no secret that Truecaller Phone Tracer is the world leading call and number locator app globally.
android phone Number Tracker Apps

Features

  • The block feature allows you to block any unwanted numbers.
  • You can view the name and the photo of your caller.
  • Truecaller Phone Tracer has a contact database which makes it easy for you to track down an unknown number.

Pros

  • Your phonebook contacts are not uploaded online as it is with other apps.
  • You can know when someone searched for your number online.
  • You can make calls directly from the app.
  • With over 200 million users, you are guaranteed the best tracking and location services.

Cons

  • You must have an active internet connection for this app to work.
  • You must use your phone number to register the app.

Part 3: Top 3 Free Mobile Number Tracker Apps for iPhone

If you operate an iPhone and you would like to know the exact location of your caller or the holder of the calling number, you can employ the various free phone number tracker apps to do the tracking job for you. The following are top three free mobile number trackers for iPhone.

1: Number Locator

Number Locator is an iPhone-based app developed by Elegant Recursion Inc. This app helps you in locating various phone numbers by simply entering the number in the search area and tapping search.
phone number tracker

Features

  • The phone number locator efficiently works online and offline.
  • It has beautiful and attractable animated graphics.
  • It has a full data of area codes.
  • It has an auto-updating tab.

Pros

  • You can use swipe gestures or the interactive user interface.
  • Regardless of whether you have an active internet connection or not, you can still track the number in question.
  • You can use this app on your iPad, iPhone, and iPod.
  • This phone number tracker has lovely animated graphics which make tracking more enjoyable.
  • Search results are produced in a matter of seconds.

Cons

  • Though the app is free, you will be required to pay $0.99 for extra features.
  • The continuous use may stall the utilization of this app.

2: Mobile Number Tracker Pro

Mobile Number Tracker Pro offers you unmatched tracking options to make sure that you are in a position to know the owner of a particular number.
free phone tracer

Features

  • The phone number tracker has a number database that covers over 200 different countries globally.
  • The user interface has a broad range of colors to choose from and use.
  • The mobile number tracker has a notification center that informs you once the searched number has been located.

Pros

  • You can track any number globally.
  • This free phone tracer comes with an interactive user interface which makes it easy for you to use.
  • You can make calls and send messages directly from the app.
  • You can change the theme appearance by selecting your best-preferred theme color.

Cons

  • At times the map locator may fail to locate the actual location of the number.
  • It cannot work without an active internet connection.

3: Truecaller Phone Number Tracker

The universal nature of Truecaller makes it the ideal iPhone app for tracking down the location of a number.
iphone Number Tracker Apps

Features

  • It supports 3D Touch actions.
  • The free phone tracer has an auto spam update list that automatically updates itself.
  • This app comes with a fixed clipboard for a simplified bug search.

Pros

  • You can automatically know who is calling you even before you can pick up the phone.
  • The 3D touch action makes it easier for you to select various actions on the app evenly.
  • You can remove the entire call history with a single tap.

Cons

  • You must have iOS 8 and above to use this phone number tracker app.
  • Truecaller cannot function without an active internet connection.
From what we have covered in this article, never again should you get worried just because an unknown number keeps bothering you. If you ever get yourself in such a situation ever again, just make use of the apps and websites mentioned above and catch the nagging caller flat-footed. The phone number tracker apps and websites covered in this article are just a tip of the iceberg. If you come across a better phone number tracking app or website, please feel free to share it with us so that we can be in a better position to help others who might still be stranded with no idea of what to do.


Tuesday, January 16, 2018

How to Hack a Web Server

Customers usually turn to the internet to get information and buy products and services. Towards that end, most organizations have websites.Most websites store valuable information such as credit card numbers, email address, and passwords, etc. This has made them targets for attackers. Defaced websites can also be used to communicate religious or political ideologies etc.
In this article, we will introduce you to web servers hacking techniques and how you can protect servers from such attacks.

Web server vulnerabilities

A web server is a program that stores files (usually web pages) and makes them accessible via the network or the internet. A web server requires both hardware and software. Attackers usually target the exploits in the software to gain authorized entry to the server. Let’s look at some of the common vulnerabilities that attackers take advantage of.
  • Default settings– These settings such as default user id and passwords can be easily guessed by the attackers. Default settings might also allow performing certain tasks such as running commands on the server which can be exploited.
  • Misconfiguration of operating systems and networks – certain configuration such as allowing users to execute commands on the server can be dangerous if the user does not have a good password.
  • Bugs in the operating system and web servers– discovered bugs in the operating system or web server software can also be exploited to gain unauthorized access to the system.
In addition to the above-mentioned web server vulnerabilities, the following can also lead to unauthorized access
  • Lack of security policy and procedures– lack of a security policy and procedures such as updating antivirus software, patching the operating system and web server software can create security loopholes for attackers.

Types of Web Servers

The following is a list of the common web servers
  • Apache– This is the commonly used web server on the internet. It is cross-platform but is it’s usually installed on Linux. Most PHP websites are hosted on Apache servers.
  • Internet Information Services (IIS)– It is developed by Microsoft. It runs on Windows and is the second most used web server on the internet. Most asp and aspx websites are hosted on IIS servers.
  • Apache Tomcat – Most Java server pages (JSP) websites are hosted on this type of web server.
  • Other web servers – These include Novell's Web Server and IBM’s Lotus Domino servers.

Types of Attacks against Web Servers

Directory traversal attacks– This type of attacks exploits bugs in the web server to gain unauthorized access to files and folders that are not in the public domain. Once the attacker has gained access, they can download sensitive information, execute commands on the server or install malicious software.
  • Denial of Service Attacks– With this type of attack, the web server may crash or become unavailable to the legitimate users.
  • Domain Name System Hijacking – With this type of attacker, the DNS setting is changed to point to the attacker’s web server. All traffic that was supposed to be sent to the web server is redirected to the wrong one.
  • Sniffing– Unencrypted data sent over the network may be intercepted and used to gain unauthorized access to the web server.
  • Phishing– With this type of attack, the attack impersonates the websites and directs traffic to the fake website. Unsuspecting users may be tricked into submitting sensitive data such as login details, credit card numbers, etc.
  • Pharming– With this type of attack, the attacker compromises the Domain Name System (DNS) servers or on the user computer so that traffic is directed to a malicious site.
  • Defacement– With this type of attack, the attacker replaces the organization’s website with a different page that contains the hacker’s name, images and may include background music and messages.

Effects of successful attacks

  • An organization’s reputation can be ruined if the attacker edits the website content and includes malicious information or links to a porn website
  • The web server can be used to install malicious software on users who visit the compromised website. The malicious software downloaded onto the visitor’s computer can be a virus, Trojan or Botnet Software, etc.
  • Compromised user data may be used for fraudulent activities which may lead to business loss or lawsuits from the users who entrusted their details to the organization

Web server attack tools

Some of the common web server attack tools include;
  • Metasploit– this is an open source tool for developing, testing and using exploit code. It can be used to discover vulnerabilities in web servers and write exploits that can be used to compromise the server.
  • MPack– this is a web exploitation tool. It was written in PHP and is backed by MySQL as the database engine. Once a web server has been compromised using MPack, all traffic to it is redirected to malicious download websites.
  • Zeus– this tool can be used to turn a compromised computer into a bot or zombie. A bot is a compromised computer which is used to perform internet-based attacks. A botnet is a collection of compromised computers. The botnet can then be used in a denial of service attack or sending spam emails.
  • Neosplit – this tool can be used to install programs, delete programs, replicating it, etc.

How to avoid attacks on Web server

An organization can adopt the following policy to protect itself against web server attacks.
  • Patch management– this involves installing patches to help secure the server. A patch is an update that fixes a bug in the software. The patches can be applied to the operating system and the web server system.
  • Secure installation and configuration of the operating system
  • Secure installation and configuration of the web server software
  • Vulnerability scanning system– these include tools such as Snort, Nmap, Scanner Access Now Easy (SANE)
  • Firewalls can be used to stop simple DoS attacks by blocking all traffic coming the identify source IP addresses of the attacker.
  • Antivirus software can be used to remove malicious software on the server
  • Disabling Remote Administration
  • Default accounts and unused accounts must be removed from the system
  • Default ports  & settings (like FTP at port  21) should be changed to custom port & settings (FTP port at 5069)

Hacking Activity: Hack a WebServer

In this practical scenario, we are going to look at the anatomy of a web server attack. We will assume we are targeting www.techpanda.org. We are not actually going to hack into it as this is illegal. We will only use the domain for educational purposes.

What we will need

Information gathering

We will need to get the IP address of our target and find other websites that share the same IP address.
We will use an online tool to find the target’s IP address and other websites sharing the IP address
How to hack a Web Server
  • Click on Check button
  • You will get the following results

How to hack a Web Server
Based on the above results, the IP address of the target is 69.195.124.112
We also found out that there are 403 domains on the same web server.
Our next step is to scan the other websites for SQL injection vulnerabilities. Note: if we can find a SQL vulnerable on the target, then we would directly exploit it without considering other websites.
  • Enter the URL www.bing.com into your web browser. This will only work with Bing so don’t use other search engines such as google or yahoo
  • Enter the following search query
IP:69.195.124.112 .php?id=
HERE,
  • “IP:69.195.124.112” limits the search to all the websites hosted on the web server with IP address 69.195.124.112
  • “.php?id=” search for URL GET variables used a parameters for SQL statements.
You will get the following results
How to hack a Web Server
As you can see from the above results, all the websites using GET variables as parameters for SQL injection have been listed.
The next logic step would be to scan the listed websites for SQL Injection vulnerabilities. You can do this using manual SQL injection or use tools listed in this article on SQL Injection.

Uploading the PHP Shell

We will not scan any of the websites listed as this is illegal. Let’s assume that we have managed to login into one of them. You will have to upload the PHP shell that you downloaded from http://sourceforge.net/projects/icfdkshell/
  • Open the URL where you uploaded the dk.php file.
  • You will get the following window
How to hack a Web Server
  • Clicking the Symlink URL will give you access to the files in the target domain.
Once you have access to the files, you can get login credentials to the database and do whatever you want such as defacement, downloading data such as emails, etc.

Summary

  • Web server stored valuable information and are accessible to the public domain. This makes them targets for attackers.
  • The commonly used web servers include Apache and Internet Information Service IIS
  • Attacks against web servers take advantage of the bugs and Misconfiguration in the operating system, web servers, and networks
  • Popular web server hacking tools include Neosploit, MPack, and ZeuS.
  • A good security policy can reduce the chances of been attacked
More Information