• image01

    Creative

  • image02

    Friendly

    Motivated

  • image03

    Tranquilent

    Tips

  • image04

    Tech

    Secured

  • image05

    Update

    News

Saturday, 7 September 2019

How to get free Money from Paytm(Paytm Bug)


Go to your browser Visit Paytm  and Click on cashback section,go to UPI and click on  active sasta Sundar offer.

Now open another tap and visit  sasta Sundar website.

Buy any product over 6.96 dollars & pay with Paytm UPI.

After you have successfully place the order, you will recieve cashback between 0.028 Dollars to 1.12dollars and it will be credit your account within 48 hours.

After that make sure that you recieve the cashback .Visit sasta Sundar website,go to my order and cancel your order .

You will be refunded within 24 hours.

You will get 100% refund of your order value + extra cashback between 1.12 dollars.


Tuesday, 23 July 2019

How to Make Fake Login Page to Hack Someone [PHP)


1. Open up the site that you want to make the fake page from it, after the load right click and save the page as "web page complete"

2. open that page with notepad, and press control+F to access search bar, and then search "login".

3. before the word "login" it's written action, we don't need those so clear everything behind the login (this tutorial is for PHP, may you see login.aspx)

4. Change method="post" change it to method="GET" ,but if it's like that leave it.   

5. Now save it as .html

6. Open a new notepad, and type this commands on it

7. instead of Location: target.com, write your login page address! 

8. Save this as Login.PHP

9. Go to website's that offer free hosts

10. Create an account, get your host and upload both of files!

11. After that you only need to give your HTML link to your victim!

12.  If he opened and input his Login information you can access it!

13.  If you look at PHP source, you can see log.txt that's your victim info's saved.

Friday, 5 July 2019

How to perform Evil Twin Attack

Steps:

️1: first scan the air for a target access point. Then create an access point using airbase-ng with the same name and channel of the target access point, hence Evil TWIN attack.

️2:The victim is now disconnected repeatedly from the  original access point and as most modern system’s setting says… “Connect back to same ESSID (AP name) if disconnects”.

This also happens because when the victim disconnects from any access point it starts sending probe requests in the air with the name of the access point it connected to earlier. Hence BSSID isn’t a barrier, you just need ESSID to spoof the AP

3: Clients will now be connected to the Evil Twin access point and now client may start browsing Internet.

️4: Client will Receive a web administrator warning saying “Enter WPA password to download and upgrade the router firmware”

️5: The moment he/she enters the password, he/she will be redirected to a loading page and the password will be stored in the MySQL database of the attacker machine

Thursday, 4 July 2019

Tutorial on how to do wire transfer with WellsFargo

Requirement:

1) You have to first get a wellsfargo log with good balance from a good(trusted) source

2. Login the wellsfargo log

3. Click on wire transfer

4. An access code will be sent to phone number attached

5. If the log you bought , comes with an advanced access code , click on “I already have a code” and input the code there , it will be verified and wire will be sent to the receiving information you have provided .

If the log you bought doesn’t come with advanced access code , unless you change the phone number on file to yours

6.  An alert will be sent to the email attached so you get inside email and delete alert

7. Wired money will reflect in receiving account in 30 minutes time

Monday, 1 July 2019

How to create a google voice number

You need to have a real U.S Phone Number which will be used in verification of your google voice account .
After that Turn on your VPN and a US number' you can get a free USA number(textnow,2nd line etc.)
Visit the www.google.com/voice
Sign in to your google account Or create a new gmail account And log into www.google.com/voice.
You will be asked to choose a free number of your choice,You can search a free number for any of your desired location you want By entering with the city zip code or area code, After choosing a number of your choice.
Enter a real US Number,you can only enter a real U.S number for this verification process Verification code will be sent to the real U.S number Input the code immediately if you delay the code will expire And you will have to request for another one,After that you have successfully created a google voice number.
Go to the setting for calls,messages and voicemail Untick the US number you used to get verification code ,So that he/she doesnt see your chat via google voice.
You can use the number for whatsapp by following the same method.

Saturday, 29 June 2019

How to Get Phone Number Which Works On Google

Step 1 - Register to Twillo

Step 2 - Create a project

Step 3 - Look for a "buy number" option

Step 4 -  Pick the country and remember to tick the SMS option

Important - Now you should have a number. To see SMSes, go to the  (Phone Numbers) option -> Active numbers.

Click on the number and proceed to "Messages log in.
Remember to change "Outcoming to "Incoming
If you need to verify Google, use a UK number!

Wednesday, 26 June 2019

Single  Sign-on  (SSO)

What  is  Single  Sign-on  (SSO)  ?

Single  Sign-on  is  a  method  of  authentication  process  that  helps  to  log  in  multiple application  using  single  login  credentials.  Security  is  enhanced  through  Single Sign-on  (SSO)  in  light  of  the  fact  that  users  are  diminished  of  the  various  secret password  trouble.  Let  be  honest,  users  detest  complex  passwords;  SSO  Single Sign-on  makes  that  agony  more  acceptable  by  diminishing  the  number  of complicated  passwords  they  have  to  remember.
There  are  two  major  challenges  that  these  businesses  are  facing:

➡How to manage  the  permission  and  roles  of  diverse  users  and  applications. ➡How to address  the  many challenging  and  ever-changing  compliance  and  security risks  that  come  with  the  digital  expansion  of  access. These  challenges  are  a  constant  worry  for  those  who  manage  the informatics systems  and  data  or  deal  with  compliance  in  any  company. 

     There  are  four important  factors  that  need  to  be  considered  when  a  strategy  for  access management  and identity  is  being  developed  by  a  company’s  IT  team  and security.

➡The  Expansion  of  Third-party  Access

More  entities  are  gaining  access  to  the  apps,  data,  and  networks  of  a  company. With  different  partners  working  in  different  locations,  it  can  make  things  even more  complicated  when  it  comes  to  security  and  ensures  only  the  right  people are  gaining  access. In  the  study  completed  by  Aberdeen, 

it  showed  that  about  1/3  of  the  enterprises studied  allowed  at  least  25  third-party  organizations  to  have  access  while  a shocking  10%  had  upwards  of  200  external  partners.  in  this  case,  Single  Sign-on (SSO)  will  be  a  very  useful  solution  to  protect  your  company  asset.

➡The  Balancing  of  Security  and  Usability

When handling  the  growing  userbase  of  a  manufacturer,  security  and  cost  are  of utmost  importance.  If  an  enterprise  is  not  prepared  for  the  expansion,  the  risk  of security  problems  is  higher.  The  theft  of  this  type  of  data  can  be  devastating  to  a company.
While  making  sure  the  system  is  accessible  by  the  people  who  need  to  use  it  is important,  the  security  is  just  as  if  not  more  important.

➡The  Frequency  and  Cost  of  Cyber  Attacks

Manufacturers  deal  with  a  lot  of  sensitive  information  and  are  the  victims  of more  phishing  attacks  than  any  other  industry  in  the  United  States.  One  data breach  costs  around  an  average  of  $450k  but  can  cost  considerably  more  than that.  A  little  bit  of  preparation  can  save  a  lot  of  money  and  trust.

➡Traditional  System  Costs

Operating a traditional  system  can  be  expensive,  about  $3.5  million  for  manufacturers.  In  some  cases,  they  can  costs  tens  of  millions  though.  By  using  a  single platform  to  manage  access  can  save  a  lot  of  money in  the  end  and  save  time.

It  streamlines  the  whole  process  and  provides  support  for  all  organizations  that are  accessing  it  no  matter  how  far  in  the  cloud  they  happen  to  be.

Reduce  the  headache  of  assisting  users  with  password  recovery  using  Single Sign-on  (SSO)

Envision  an  organization  running  ten  distinct  administrations.A  single  sign on  (  SSO)  arrangement  can  incredibly  decrease  the  measure  of  helpdesk manpower  required  as  clients  just  need  to  recover  a  solitary  Account.

While  not a  security  concern,  this  is  an  extremely  unmistakable  advantage  to  organizations by  using  Single  Sign-on  Solution.

Single  Sign-on  (SSO)  Helps  to  Reduce  the  Amount  of  Passwords  users  have  to remember.

Clients  are  urged  to  utilize  endlessly  unique  passwords  for  different  sites.  single sign-on  Dealing  with  that  a  Different  of  passwords  can  be  tricky.

Clearly,  this  isn’t  an  issue  if  the  client  utilizes  a  password  manager  tool  yet  how about  we  are  reasonable,  what  number  of  users  would  you  be  able  to  hope? 

An Single  Sign-on  (SSO)  arrangement  can  extraordinarily  decrease  the  quantity of  passwords  users  need  to  remember,  which  may urge  the  user  to  pick  a significantly  choose  a  much  stronger  password.

Tuesday, 25 June 2019

How to steal password saved in browsers installed to windows


Requirement:

1. IE passview - This a small program that help us view passwords saved in Internet explorer.download here

2. Password fox -This a program that allow us to view passwords saved in  mozilla firefox download here

3. Mail passview - This is a small password recovery tool that reveals passwords and other account details of outlook,epress and window mail download here

4. MessenPass- This password recovery tool reveals pasword for instant messenger applications download here

5. PSPV - Utility program that also reveals passwords in our computer download here

Sunday, 23 June 2019

Xfinity Carding Method 2019 (working)


Requirement:

Same city/state socks as your drop
Drop zip cc
Comcast.net account with internet connected

You need to create an account with Comcast.com
After you create/buy the account, log into cocmast.net and go to users to make sure the account is a primary user.
Go to settings and put down the name of account holder, service address and phone number.
Then go to security to see the security question and answer. If there is no  security question set yours. It's a precaution that give you access to the account in case you're locked out of it/forgot the password.

Open another tab & go to ssndob.cc and search for the SSN and DOB of the account holder. Go to  whitepages websites,instantcheckmate or spokeo account to cross check  addresses and DOB.make sure you have the correct SSN and DOB.

After you have checked the SSN and DOB of account holder, log unto xfinitymobile.com with the same login details you used for Comcast.net and select the mobile device you’ll like to order.

Choose mobile device ie. iPhone max, Select installment payment and protection plan and Continue. You will be needed to enter SSN and DOB of account holder. After you've entered SSN and DOB. Don't check out yet. Continue shopping and add another device example add 2 items in cart.

 After putting the two devices in cart, checkout. Enter the address you want it to be shipped and enter the account holder mobile number you wrote down before as the mobile number. Also you need to create an email in account holder name and enter that as the email to be used in receiving shipping updates.

Now Proceed to payment. Don't make any changes in the settings as displayed on payment screen. Enter the card number, expiry and cvv(which is usually located at back of the card) and click review order.

 Accept the terms and conditions and proceed to place order.

If it's successful, you will receive an order acknowledgement email immediately. And another email within 2-4 hours with a message saying "we are preparing your order " Order would be shipped the following day after receiving the second emails, If something went wrong or you Misplace SSN/ DOB of account holder, they’ll hold your order for fraud review and will send you an email asking you to answer verification questions. 

So make sure you got the correct SSN and DOB of account holder by crosschecking.

Once the first order is successful, you can log back into the account and place another order for more phones. You can use the same drop zip CC you used for first order if it is still live or you can Update the CC. 
Follow the steps to place another order.

NOTE: Always use Cc with same Zip code as drop for payment. It doesn't matter the address of Account Holder, you can ship to any location of your choice. When you have invalid address on payment screen, use a different Cc. it's  advisable to use Comcast/ Verizon socks. 

That is the ISP of your socks should be Comcast or Verizon,it Works better.

Blog Archive

Popular Posts

Powered by Blogger.

Contact Form

Name

Email *

Message *

Labels

Carding (16) Cracking (2) Education (40) Hacking (35) News (39) technology (23) Tips & Tricks (11) Tips N Tricks (85)

Recent Post

Pages

Comments

Popular Posts

Tags

Carding (16) Cracking (2) Education (40) Hacking (35) News (39) technology (23) Tips & Tricks (11) Tips N Tricks (85)