Hacking Linkedin Passwords using Phishing
Linkedin is one of the most popular social networking site. So here is the phishing file for Linkedin to hack user passwords. DOWNLOAD
If you are not familiar with Phishing technique here is a detailed tutorial to carry out a phishing attack.
Go To Phishing Tutorial
Note:- The phishing site looks exactly the same as the original. If you any suggestion about it please feel free to comment.
If you are not familiar with Phishing technique here is a detailed tutorial to carry out a phishing attack.
Go To Phishing Tutorial
Note:- The phishing site looks exactly the same as the original. If you any suggestion about it please feel free to comment.
ADDING BACKDOOR IN HACKED FACEBOOK ACCOUNTS
Here is a way how some hackers retain the hacked facebook accounts even after the target changes the password or the hacker himself returns it to the target.
Many of the facebook users are unaware that there is a alternative way to log in the facebook account by linking a alternate email account to it. Not the default email id which you use regularly to log in by typing the email id and password but a different email id. So when you are logged in this alternate email id and open the facebook website it directly logs in your facebook account without even asking the password. If you did not get the concept here is a example. Imagine that your regular email id is "regular@gmail.com" and you add a alternate email id "alternate@gmail.com" in account setting. Now when you are logged in "alternate@gmail.com"
and open facebook website it redirects you and directly opens your facebook account. So here the is procedure how you can add this alternate email id as a backdoor.
STEP 1) Open your facebook account and go to account settings.
STEP 2) In the settings tab you will see a option "Email" click on "change" and add a new contact email which is to be the backdoor.
STEP 3) Now again in the setting tab you will see a option "Linked accounts" click on "change" and add the type of your alternate email id like google, yahoo etc.
And that's it, your done, now try it. Log of the facebook account, log in the alternate email id and open facebook website and wait, don't stop the loading, after some seconds it will redirect you to the facebook account.
Note:- The targets who got back their hacked accounts should always check if such backdoor was added to their account, if yes then it should be removed quickly.
Many of the facebook users are unaware that there is a alternative way to log in the facebook account by linking a alternate email account to it. Not the default email id which you use regularly to log in by typing the email id and password but a different email id. So when you are logged in this alternate email id and open the facebook website it directly logs in your facebook account without even asking the password. If you did not get the concept here is a example. Imagine that your regular email id is "regular@gmail.com" and you add a alternate email id "alternate@gmail.com" in account setting. Now when you are logged in "alternate@gmail.com"
and open facebook website it redirects you and directly opens your facebook account. So here the is procedure how you can add this alternate email id as a backdoor.
STEP 1) Open your facebook account and go to account settings.
STEP 2) In the settings tab you will see a option "Email" click on "change" and add a new contact email which is to be the backdoor.
STEP 3) Now again in the setting tab you will see a option "Linked accounts" click on "change" and add the type of your alternate email id like google, yahoo etc.
And that's it, your done, now try it. Log of the facebook account, log in the alternate email id and open facebook website and wait, don't stop the loading, after some seconds it will redirect you to the facebook account.
Note:- The targets who got back their hacked accounts should always check if such backdoor was added to their account, if yes then it should be removed quickly.
Concept of Hacking
lets take sometime understanding the concept of hacking
Hacking refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, administrator, or designer.
and HACKER IS WHO DOES HACKING
THERE ARE MANY CATEGORIES OF HACKERS OR HACKER ATTITUDES.
WHITE HAT
A white hat hacker breaks security for non-malicious reasons, just for testing their own security system . This type of hacker enjoys learning and working with computer systems, and consequently gains a deeper understanding of the subject.
GREY HAT
A grey hatted hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
BLUE HAT
A blue hat hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
BLACK HAT
A black hat hacker usually the malignanat one, sometimes called "cracker", is someone who breaks computer security without authorization or uses technology (usually a computer, phone system or network) for vandalism, credit card fraud, identity theft, piracy, or other types of illegal activity.
ELITE (or known as 1337 )
Elite is a term used to describe the most advanced and the greatest hackers who are always on "the cutting edge", and a step ahead of everybody else; and one who fully understands the true meaning of what it means to be a hacker. One who is elite finds new security flaws for others to follow, rather than just follow security flaws discovered by others.
Script kiddie
A script kiddie is novice, a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept.
Noob (term for newbie)
A noob is a term used to describe someone who has almost no knowledge of the workings of technology, and hacking; yet sometimes pretend to be experts on the topic or declare themselves as "Hackers" when they have no idea on the topic or the true meaning of what is actually means to be a Hacker. Noobs also lack the discipline it takes to be a true hacker. Noobs are at an even lower level than "Script Kiddies" in Hacker terms.
Hacking refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, administrator, or designer.
and HACKER IS WHO DOES HACKING
THERE ARE MANY CATEGORIES OF HACKERS OR HACKER ATTITUDES.
WHITE HAT
A white hat hacker breaks security for non-malicious reasons, just for testing their own security system . This type of hacker enjoys learning and working with computer systems, and consequently gains a deeper understanding of the subject.
GREY HAT
A grey hatted hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
BLUE HAT
A blue hat hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
BLACK HAT
A black hat hacker usually the malignanat one, sometimes called "cracker", is someone who breaks computer security without authorization or uses technology (usually a computer, phone system or network) for vandalism, credit card fraud, identity theft, piracy, or other types of illegal activity.
ELITE (or known as 1337 )
Elite is a term used to describe the most advanced and the greatest hackers who are always on "the cutting edge", and a step ahead of everybody else; and one who fully understands the true meaning of what it means to be a hacker. One who is elite finds new security flaws for others to follow, rather than just follow security flaws discovered by others.
Script kiddie
A script kiddie is novice, a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept.
Noob (term for newbie)
A noob is a term used to describe someone who has almost no knowledge of the workings of technology, and hacking; yet sometimes pretend to be experts on the topic or declare themselves as "Hackers" when they have no idea on the topic or the true meaning of what is actually means to be a Hacker. Noobs also lack the discipline it takes to be a true hacker. Noobs are at an even lower level than "Script Kiddies" in Hacker terms.
HISTORY OF HACKING (discovery channel documentary)
This is a discovery channel documentary on "history of hacking" giving a brief account of the development of Hacking and tells about the new trends and techniques evolved with time.
It is focused on three legendary hacker personalities.
1) John Draper ( also known as Captain Crunch) :- The story of evolution of Phreaking is told using John Draper's experiences, a famous figure in Phreaking.
2)Steve Wozniak :- The co-founder of APPLE also famously known as "The other Steve" . Steve Wozniak made the first apple computer in his garage, which is widely considered as the first successful personal computer.
3) Kevin Mitnick :-Last but not the least is the famous celebrity in hacking Kevin Mitnick. He represents the modern face of hacking. Famous for penetrating networks of famous companies like Nokia, Motorola etc.
its a bit old documentary but a sure watch one.
it is available on YOU TUBE here is the link go to the video
you can also download it from here
DOWNLOAD (files tube)
DOWNLOAD (torrent link)
It is focused on three legendary hacker personalities.
1) John Draper ( also known as Captain Crunch) :- The story of evolution of Phreaking is told using John Draper's experiences, a famous figure in Phreaking.
2)Steve Wozniak :- The co-founder of APPLE also famously known as "The other Steve" . Steve Wozniak made the first apple computer in his garage, which is widely considered as the first successful personal computer.
3) Kevin Mitnick :-Last but not the least is the famous celebrity in hacking Kevin Mitnick. He represents the modern face of hacking. Famous for penetrating networks of famous companies like Nokia, Motorola etc.
its a bit old documentary but a sure watch one.
it is available on YOU TUBE here is the link go to the video
you can also download it from here
DOWNLOAD (files tube)
DOWNLOAD (torrent link)
Certified Ethical Hacker Study Guide
Kimberly Graves, CEH, CWSP, CWNP, CWNA, has over 15 years of IT experience. She is founder of Techsource Network Solutions, a network and security consulting organization located in the Washington, DC area. She has served as subject matter expert for several certification programs-including the Certified Wireless Network Professional (CWNP) and Intel Certified Network Engineer programs-and has developed course materials for the Department of Veteran Affairs, USAF, and the NSA.The Certified Ethical Hacker exam is quickly becoming one of the most popular security certifications offered today. Candidates much prove their ability in not only identifying security risks from all levels, but also how to address those risks. This book provides a concise, easy to follow approach to this difficult exam.
the contents are as follow
- Chapter 1 Introduction to Ethical Hacking, Ethics, and Legality
- Chapter 2 Footprinting and Social Engineering
- Chapter 3 Scanning and Enumeration
- Chapter 4 System Hacking
- Chapter 5 Trojans, Backdoors, Viruses, and Worms
- Chapter 6 Sniffers
- Chapter 7 Denial of Service and Session Hijacking
- Chapter 8 Hacking Web Servers, Web Application Vulnerabilities,
- and Web-Based Password Cracking Techniques
- Chapter 9 SQL Injection and Buffer Overflows
- Chapter 10 Wireless Hacking
- Chapter 11 Physical Security
- Chapter 12 Linux Hacking 177
- Chapter 13 Evading IDSs, Honeypots, and Firewalls
- Chapter 14 Cryptography
- Chapter 15 Penetration Testing Methodologies
Your websiteand information on it is fantastic and Awesome
ReplyDeleteI want to learn Hacking
Can you tell me how to hack facebook account
Your friend,
Mufeez