Monday 22 October 2018

How to perform DDOS on a site using LOIC (Low Orbit Ion Canon)


LOIC is an open source network stress testing and denial-of-service attack application, written in C#. Download LOIC here: https://sourceforge.net/projects/loic/    turn off your antivirus before Extracting LOIC it is a portable software just open it

1.Enter the URL of the Website under Select your target and choose Lock on
2.Enter the IP under the URL field and choose again choose Lock on. Use CMD to get the IP address of the website. e.g ping URL -t
3.From the Method drop-down list, select UDP option.
4.Uncheck the Wait for reply check box.
5.Click on the IIMA CHARGIN MAH LAZER button to start the DDOS.

Let It Run For 3 to 4 hours, If The Website Server Is Small It Will Go Down And No One Can Access The Website.

How to install BeEF in windows pc


BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser. BeEF is pioneering techniques that provide the experienced penetration tester with practical client side attack vectors. Unlike other security frameworks, BeEF focuses on leveraging browser vulnerabilities to assess the security posture of a target. This project is developed solely for lawful research and penetration testing.*"


First download ruby for windows search on google

Install it in C: folder and make sure you select all the options. So Ruby is installed now.


After installing Ruby, you need to download the SQLite dll search on google

Now extract the SQLite zip file on the Ruby193bin folder:


Now you need to download the ‘DevKit-tdm-32-4.5.2-20111229-1559-sfx.exe’ from

Now extract the DevKit-tdm-32-4.5.2-20111229-1559-sfx.exe’ file on the C: folder

Open cmd prompt and go to ‘Devkit’ path and we need to run “ruby dk.rb init


Now we need to run “ruby dk.rb install’

Now a few other steps: – ruby dk.rb review (checks things are ok)

gem install rdiscount –platform=ruby (you should see the message “Temporarily enhancing PATH to include DevKit…”)


Now you need to download the ‘BeEF Project from

Link:-  http://beefproject.com

Now open the BeEF file ‘beefproject-beef-beef-0.4.3.7-0-g69c59bb’ and extract the files toC:beef

Open cmd prompt go to the BeEF path and type the following:

ruby install

Now type the below commands one by one

gem install bundler

bundle install

(You will see something similar to this)


Now Type “ruby beef” to start beef.

Of course you will need your Windows Firewall to allow that application 🙂


BeEF is installed successfully. Now go to http://127.0.0.1:3000/ui/panel and check if it is available

http://192.168.1.2:3000/ui/panel(beef is the user name and password)


Send the link http://192.168.1.2:3000/demos/basic.html to the victim via chat or email or any social engineering technique to the victim.

Carding PayPal


Tools" You Need To Successfully Card Paypal :

? A Fresh CC + CVV , AVS Must Be 100% Correct!

The Bin 440066 Works, The CVV Must Have Never Been Used On Paypal


? A RDP Matching The Country & The State of The Fresh CVV

The RDP Must Be CLEAN & Have A Proxy Score of ZERO]

THE RDP MUST HAVE NEVER BEEN USED ON PAYPAL

==========================================

? Login To The You Acquired, Remember It Clean & Have A ZERO Proxy Score!

? After You Have Logged In Download & Install CC CLEANER.

? Run CCLEANER , Make Sure It's Set To Delete Temp Files/Cache/Cookies/ ect

? After CCLEANER has Finished , Close It.

? Make Sure That The Flash Plugin On The RDP Server Is Up To Date.

? Make Sure All Browsers Are Up To Date!

? Open The Browser, If Your Checking Out From A Online Store That Supports Paypal Go To It & Add Whatever It Is Your Carding To Cart & Begin The Checkout / Payment Process, When Your At The Paypal Check Out Page It Will Prompt You To Login & You Will Also Get A Option To Check Out With CREDIT / DEBIT , Click On That.

? Once Your At That Checkout As Guest With CREDIT / DEBIT Card. Enter The Fresh You Acquired , For Email Use Your Email / Drop Email , For Phone Either Change Last Digit of CC Owners Real Phone Number or If Thats No Available Use Google To Find out What The Area Code Using The Fresh CCs Billing Information e.g Google "Whats The Are Code 90210"

? Once You Filled Everything Out, Click Pay Now! , & WALLA If You Get A Bank Declined Message That Means Either CC Is Dead or Insufficient Funds! If You Get Redirected To A Error Page That Says "WE CANT PROCESS YOU PAYMENT AS THIS TIME" That Means IP Has Been Used On Paypal Before or That The CVV Has Been Used To Process A Transaction Before!


IF YOU GOT THE WE CAN'T PROCESS NOW ERROR OR THE BANK DECLINED ERROR Start Over With Another Fresh CVV & New RDP.

? ON THE GUEST CHECK OUT PAGE IT WILL GIVE YOU A OPTION TO JOIN OR JUST KEEP CHECKING OUT AS GUEST OBVIOUSLY SELECT AS GUEST.

IF IT DOES NOT GIVE YOU THE GUEST OPTION & IS FORCING YOU TO CREATE A ACCOUNT THAT MEANS THAT RDP IP IS NO GOOD.


SENDING MONEY TO PAYPAL ACCOUNTS :

If your not trying card online shops but are in fact trying to send/transfer funds to a paypal account all you have to do it go to a paypal link generator paste the email of the paypal you want to card the funds to & enter a payment/product description [e.g For Goods Already Picked Up generate the link and then go to the link and bam samething as checking out with a online store accept paypal!

RECENTLY PREFORMED MUTIPLE TRANSACTIONS CARDING FUNDS TO PAYPAL ACCOUNTS FOR THE AMOUNTS OF 1000/1700/1800 & Had A Success Rate Back to Back.

? THIRD 5TH BANK DEBIT CARDS WORK GOOD

? 440066 WORKS GOOD

? SIGNATURES FROM CAPITAL ONE / BOA Work Good

? Business Debit Bins Work Good

BUT REMEMBER CC MUST HAVE NEVER BEEN USED ON PAYPAL!

Google play refund trick


●Get refund from Google 100% working By Mad:]

Method :-

1. Go to google play store on your web browser and go to your account page

2. Go to purchase history and select report problem

3. From options I initially chose: Purchase is defective and doesn't work as advertised- got email saying "but we can’t provide a refund for this purchase because it is outside of our refund policy"

4. I repeated step 2 and this time selected: I no longer wasn't this purchase- got email saying "but we can’t provide a refund for this purchase because it is outside of our refund policy"

5. Repeated step two and this time selected: Purchase was made by friend or family member without my consent- got email saying "but we can’t provide a refund for this purchase because it is outside of our refund policy"

6. Wait 5 minutes

7. Repeated step 2 and this time selected: I don't recognize this purchase or charge- I got an email saying the refund has been approved.

8. I Got Refund From Google Playstore

NOTE :- YOU CAN BUY COC GEMS , 8BALL POOL COINS AND YOU CAN REFUND IT!

How to secure your PC


In this Tutorial, I will show you guys How to secure your PC in 10 steps, I recommend to read this article carefully and be safe.

Choose the right operating system

1- Choose an operating system based on its security and vulnerability (Linux has no known active viruses in the wild, OpenBSD is focused on security). Find out if it uses limited user accounts,all files permissions and is regularly updated. Make sure you update your operating system with security updates and update your other software too.

Choose the right web browser

2- Choose a web browser based on its security and vulnerabilities because most malware will come through via your web browser. Disable scripts too (NoScript, Privoxy and Proxomitron can do this). Look at what independent computer security analysts (such as US-CERT) and crackers (similar to hackers) say. Google Chrome[1] is more secure and has a sandbox feature[2] so it would be more difficult to compromise the system and spread the infection.

use strong passwords

3- When setting up, use strong passwords in your user account, router account etc. Hackers may use dictionary attacks and brute force attacks.

Use trusted sources

4- Use trusted sources. When downloading software (including antivirus software), get it from a trusted source (softpedia, download, snapfiles, tucows, fileplanet, betanews, sourceforge) or your repository if you are using Linux.

Install good antivirus software

5- Install good antivirus software (particularly if you use P2P). Antivirus software is designed to deal with modern malware including viruses, trojans, keyloggers, rootkits, and worms. Find out if your antivirus offers real-time scanning, on-access or on-demand. Also find out if it is heuristic. Avast[3] and AVG[4] are very good free editions. Choose one, download and install it and scan regularly. Keep your virus definitions up to date by updating regularly.

download antimalwares

6- Download and install software to deal with spyware such as Spybot Search and Destroy, HijackThis[5] or Ad-aware[6] and scan regularly. I can't state this enough - you need to run a good anti spyware and anti malware program like Spybot if you search the web at all. Many websites out there exploit weaknesses and holes in the security of Microsoft Explorer and will place malicious code on your computer without you knowing about it until its too late!

Download and install a firewall

7- Download and install a firewall. Either ZoneAlarm[7] or Comodo Firewall[8] (Kerio, WinRoute or Linux comes with iptables). If you use a router, this gives an added layer of security by acting as a hardware firewall.

Close all ports

8- Close all ports. Hackers use port scanning (Ubuntu Linux has all ports closed by default).

Perform Penetration Testing

9- Perform Penetration Testing. Start with ping, then run a simple nmap scan. Backtrack Linux will also be useful.

secure physical security

10- Don't forget to think in terms of physical security! Consider something like a Kensington lock (in case of theft/unauthorised access). Also setting a BIOS password and preventing access to your machine or its removable devices (USB, CD drive etc.). Don't use an external hard drive or USB device for important data, these represent another vulnerability, as they are easier to steal/lose.
Encryption can be effective against theft. Encrypt at least your entire user account rather than just a few files. It can affect performance but can prove worth it. Truecrypt works on Windows, OS X, Linux, FreeOTFE works on Windows and Linux. In OS X (10.3 or later) System Preferences Security, click FileVault (this can take minutes to hours). In Linux Ubuntu (9.04 or later) installation Step 5 of 6 choose "Require my password to login and decrypt my home folder". This uses "ecryptfs".

That's it Guys,
〰〰〰〰〰〰〰〰〰〰
Love you all ❤️

Tuesday 14 August 2018

How to Hack Android Phone With Androrat


In this post i am going to show you how to hack Android phones with Androrat. In our tutorials we only EVER hack our own systems as a proof of concept and never engage in any black hat activity.

Step1: Create an account on noip.com.

Step2: Create a host on noip.com and enter Hostname and click Add Host

Step3: Now do port forwarding on your network. Port forwarding settings changes on each moderm, so google your moderm and find out how to do port forwarding

Step4: Download Androrat Binder and enter the Hostname  and Port. Name the file and click Go. If you want to inject this file with another .apk file then go to Build + Bindtab name apk title and browse the location of the .apk and click Go.

Step5: Now download DUC (Dynamic DNS Update Client for Windows) and install

Step6: Open DUC and enter the host details which you have created in noip.com

Step7: Download and run Androrat Project. Open Server tab on top and enter theport which you use on noip.com

Step8: Now run the .apk which is created by Androrat Binder on a Android Mobile.

How to Detect a Hidden Camera in a Room


When you stay in a hotel, how do you know there is no room secret pinhole camera?

When you travel to an unfamiliar destination or take a business trip, you stay at a hotel, but what you do not know is that you could unknowingly be photographed or be secretly recorded.

In this age of smart recording devices and pinhole sized drones, always remember when staying in a hotel, that you can use this method to check your room :

📌 1.When you have entered into  your room, turn off the lights, and close the curtains,open your phone camera, do not turn the flash light on.

📌 2.Turn around the room with your cell phone. When a red dot is found on your screen, that means that a hidden web camera is installed.

🔴If no red dots, then the room is okay.

Please read and tell your friends who travel a lot. And those that make a lot of business trips. And those that may be sleep nude.

My dear friends and sisters kindly note and be aware.

‼️Don't be a victim of a nude picture.‼️