Skip to main content

Posts

Showing posts from 2016

Pakistani Hackers Hacked Bangladesh Google Domain

Earlier today, Pakistani hackers from Pak Cyber Attackers have targeted Google Bangladesh domain and shown the deface page on www.google.co.bd domain . A hacker called Faisal Leet have hacked into the domain registry of Bangladesh Telecommunications Company Ltd (BTCL), from where Google country domain was also registered. Hackers have modified the DNS records of Google Bangladesh and redirects all users to deface page. This technique is also know as DNS poisoning. HackRead reports  that the hacking group behind this takeover is generally known for breaching high profile Indian government and law enforcement websites. This is the first time the group has targeted a Bangladesh domain. The Internet users in Bangladesh were shocked when they witnessed their search engine giant’s domain displaying “Pakistan Zindabad” (Long live Pakistan) slogan. Confused with the situation, users  took it to Twitter  to get the clear picture of what’s going on. OMG! https://t.co/E8g

How to recover deleted files from Android

If you have deleted any files on your computer then you can use Recuva software to recover data from hard drive. But when it comes to Android then we have no idea, but, don’t worry; Dr.Fone an effective app that helps you to recover deleted photos on Android. Dr.Fone is available on Android, iOS, Microsoft Windows and Macintosh. The app is compatible with more than 6,000 devices on Android platform. Dr.Fone is priced at $49.95, for the lifetime license. If not you can use the 30-day free trial version too. List of features included in Dr.Fone: Android SD Card Data Recovery Android Data Extraction Android Lock Screen Removal Android Sim Unlock  How to: Step 1: Download and install Wondershare Dr.Fone software on your computer and on your device. Step 2: Connect the device to your computer and enable USB Debugging to start the process. ( your phone will be rooted via a one-click root utility, after the installation, it will be unrooted automatically)

Hack the WhatsApp Conversation of Your Friend

Do  you know how to hack  whatsappp  conversation of your friend? Have you ever believed that it is possible to perform top hacks in whatsapp? Whatsapp is very vunerable still. Although they are upadating their service frequently. If you  want to know how to hack whatsapp then follow these secret whatsapp tricks. It will certainly boost your knowledge about whatsapp. Steps for hacking your freind’s whatsapp conversation 1.Navigate to the your smartphone MICROSD card \Click on the Whatsapp and then on the Database choice. 2.If you have completely performed above two steps. then you will get two files 3.-msgstore-yyyy.. dd .. db.crypt -msgstore.db.crypt Note : please make a backup of these two files. 4. Go to your friends phone and copy these two files from their whatsapp database. Just paste these files in your whatsapp data files. 5. Restart whatsapp. You will see all conversation of your friend in y

How to Use whatsapp without number?

Seems weird right!! but believe me or not it is possible by this trick. You can use whatsapp without any number. I found this whatsapp tricks hottest in the market. However there is a trick in this. It means you don’t need your number for using whatsapp but it will use whatsapp through other’s number. But here is the most tricky part. How you are going to get verification by that phone? I mean if it is not your number. It is possible through Fake whatsapp Number. We are bringing best in all whatsapp tricks for you. Steps  for using  whatsapp  without number:  whatsapp   tricks If you are already using whatsapp on your phone then uninstall whatsapp from your phone. You need to download whatsapp from the play store and do install it on your device.You need to follow this step as this is necessary if you want to use whatsapp without number. Now to bypass phone verification you need to enable flight mode in your device. Haha!! you will love the tricky

How to Edit Android Game and Application on Android Device

Hey guys, If you are android application developer or learning android application developement, you might probably looking for editing or modifying android apps. You might also looking for How to Edit an APK files & also when you first learnt how to decompile, modify then recompile .apks, it seems little tough that it’s looking. Here in this post we would going to discuss about editing APK files from android using APK Editing Tool, that will help you to edit apk files or even modify APK files directly from your android smartphones. How to Edit  Apk  Files using  APK  Editor in your Android   device. There is an app on Google Play Store and its name is APK Editor. You can search for APK editors on Google play Store and download and install it. After installing apps editor, you will be given options like select an APK file and another option would be select APK from app. If you select an APK filer(first option) it would display you apps folder fr

Latest Android Hacking Apps(2016)

#1 Hackode Download Link -  Hackode Hackode : The hacker’s Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cyber security professional to perform different tasks like reconnaissance, scanning performing exploits etc. #2 Androrat Download Link -  Androrat Remote Administration Tool for Android. Androrat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server. #3 APKInspector Download Link -  APKInspector APKinspector is a powerful GUI tool for analysts to analyse the Android applications. The goal of this project is to aide analysts and reverse engineers to visualize compiled Android packages and their corresponding DEX code. #4 DroidBox Download Link -  DroidBox DroidBox is developed to offer dynamic analysis of Android applications. #5 Burp Suite Download Link -  Burp Suite Burp Suite is an integrated platform for perform

Do You Know About doxing?

It’s essentially gathering a bunch of information on a target they generally wouldn’t want you to know. Everything from name, e-mail, zip code, and even address. What you need: ◆ Basic social engineering ◆ Notepad ➡steps to do doxing . 1. Obtain their IP address. Do this by going to  http:// whatstheirip.com  and enter your e-mail address. This will then give you a set of links. 2. Take one of these links and trick them into clicking it by saying something like omg check this out or any method you choose. 3. If your target has e-mailed you, you can get the IP from looking at the e-mail source. To look at the e-mail source for Windows Live users, right click on the message, and click ‘View Message Source’. When you’re looking at the source, look for this: ‘Received: by’ It will show you an IP address. This is the IP address of your slave. 4. Once you have their IP address, goto  http:// ipaddress.com  and enter it in. You

Top 10 Countries with Most Hackers- Cyber Criminals

Here below we are listing the top ten countries with most cyber criminals that have expertise in hacking.   1. CHINA: Topping the list as told is china.41% of world’s attack traffic is from China according to the estimate making it the hub of cyber assaults. Investigations have revealed an organized hacker network in China and it is said that many members of the hacker’s group are associated with China’s military. But the Chinese government and the media deny any China’s involvement in the hacking throughout the world.   2.UNITED STATES: The us accounts for 10% of the world’s attack traffic making it a second country with the most number of hackers.Us is also the home to many organized and well efficient hacker groups who are much notorious.They are involved in attacking and hacking many important Russian sites.The US hacking group master of deception is very famous. 3. TURKEY: Turkey stands at the third place in world’s attack traffic.

What is Keylogger ???

What Is Keylogger And How To Be Safe From Keyloggers? In this tutorial i am going to talk about the most use piece of software besides from  RAT( remote access Trojan)  by hackers to observe your activities on your computer and that is keyloggers.  A  keylogger   is a software or hardware device which monitors each and every key typed by you on your keyboard. I am going to talk about different types of keylogger and how to be safe from keyloggers. So lets learn somthing about keyloggers.  1. What is keylogger ? You might have heard about keyloggers but really dont know what they are reading this article will clear your mind. A  keylogger  also know as   keystroke logger  is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye

Email Hacking can be possible

Do U Think If Your Email Can Not Been Hackable, Then You Are Wrong... Ur Email-ID Can Be Hack... But Its Can Be Hack Only Fault by User.. Most Of The Peoples Think That Their Has A Software to Hack A Email- ID's But Truth Is Their Is No Software Present For Hacking Ur Mail ID's.. Email Hacking can be possible to many ways like:- 1. Social Engineering 2.Phishing Attacks 3. Cookie Hijacking 4. Keyloggers 1.Social Engineering: This Process is defined as Hack the human mind without any tools... This has become one of the hottest topics today and it seems to work out most of the times. Social Engineering doesn’t deal with the network security issues, vulnerabilities, exploits, etc. It just deals with simple Psychological tricks that help to get the information we want.  This really works!! But it requires a lot of patience. We are all talking about network security and fixing the vulnerabilities in networks. But what happens if some intern