Recent Posts

Become Computer Hacker

Complete hacking Tutorials.

Connect 4 Us

Free Hacking Courses.

Problem Fixed

All Hacking tools Tutorial.

Kali Linux

Best HScking OS.

Stay Spy Hacker

Become Profissional Computer HAcker.

Friday, March 11, 2016

What kali linux is ???


Kali is a Linux based operating system developed by Offensive security.Previous version of Kali was BackTrack.
BackTrack had three versions namely BackTrack R1,BackTrack R2 and BackTrack R3. After BackTrack R3,Kali was developed.
So whats the difference between Kali Linux and other linux based operating systems.
Kali is specially designed for hackers.Not exactly for hackers but for pentesters.Penetration testing is a way of finding bugs in network or site in
authorized way.Kali is preloaded with each and every tool which a hacker needs for an attack.

A beginners guide to metasploit


Metasploit is an all round tool that comes with Kali Linux.It is used to perform penetration testing and various other attacks. Metasploit has various exploits and payloads.There is a complete documentation on metasploit on internet.You can read that documentation to know more about metasploit.
Types of Exploit
1) Active
Active exploits will exploit a specific host,run until completion,and then exit.

2)Passive Exploit
Passive exploits almost always focus on clients such as web browser,FTP client etc.It wait for incoming host and exploit them as they connect.

Types of Payloads
Payloads consist of code that runs remotely.There are three types of payloads in metasploit.
1)Singles
Singles are payloads that a self-contained and completely standalone.A single payload can be something as simple as adding a user to the target system or running calc.exe

2)Stagers
Stagers setup a network connection between attacker and victim and are designed to be small and reliable.

3)Stages
Stages are payload components that are downloaded by stagers modules.The various payload stages provide advanced features with no size limits such as meterpreter,VNC injection and the Iphone 'ipcon' shell.

In this article I am going to show how to hack windows XP service pack 2 using metasploit. I have XP installed on my virtual machine.
Consider some points below:-
>This attack will only work in Windows XP and lower versions.
>Its a network based attack.It means that both attacker and victim must be on same network.

Some unknown linux commands


In this article I am going to tell you about some unknown Linux commands related to echo.You will typing those commands on Linux terminal.A terminal is basically the CMD of any Linux.You must know how to operate any Operating System through its terminal.In this tutorial I will be using Kali Linux.
So lets begin with very first command.
1 ) Type the following command on terminal.It will show all the files beginning with D in that directory.


root@kali:~#   echo D*


2 ) The following command can be used to perform arithmetic operations with the help of echo.


root@kali:~#  echo $((2+5))


root@kali:~#  cd echo $(((5*2)*3))


3 ) This command will show all the files and folders between "usr" and "share".You can type any folder name in your command.


root@kali:~#  echo /usr/*/share


4 ) There is an another way to perform arithmetic operations.


root@kali:~#  echo "2+5" | bc


Here bc stands for bash calculator.
So that was all about echo and Linux.Stay tuned for more articles.Leave a comment for any query.

Scanning the network for open ports and services

Scanning a network is an important part of pentesting. We scan a network to find loopholes and then exploit them to gain access to computer systems that are part of that network.There are number of attacks which works on a network but we are not going to discuss them yet,we will be focusing on finding open ports and services in a network or in a system attached to that network.

What is Port?
Whenever two computers on a same network want to communicate with each other,they do so with the help of ports.A port is an extension of an address, similar to adding an apartment or room number to a street address. A letter with a street address will arrive at the correct apartment building, but without the apartment number, it will not be delivered to the correct recipient. Ports work in much the same way. A packet can be delivered to the correct IP address, but without the associated port, there is no way to determine which application should act on the packet.There are 65,535 ports available but we need only few of them.Follow are some basic ports along with their port number:-
1 ) HTTP(Hyper Text Transfer Protocol) - 80
2 ) FTP(File Transfer Protocol) - 21
3 ) SMTP(Simple Mail Transfer Protocol)- 25
4 ) TELNET - 23
5 ) SSH - 22
6 ) POP3(Post Office Protocol-Version 3)- 110
7 ) 140-159 - Unassigned
8 ) 160-223 - Reserved
You can read more about these ports on internet.

Sunday, March 6, 2016

How to identify a fake Facebook profile


"Recent statistics show that at least 10 per cent of about 1.35 billion Facebook users are not authentic. Besides, there are millions of users who create fake identities and appear as regular users," FakeOff creator Eliran Shachar told PTI.

Fake profiles are divided into several groups including criminals, commercial and psychological, that can risk reputations (identity theft), children (paedophiles and sexual abuse), property (home break-ins) and personal safety, he added.

Source : NDTV

Here are top 10 ways to identify a fake Facebook account:

1. Look for photos in the profile.If there is only one photo of the individual in the whole profile it makes it quite clear that the account is fake.


Go to his/her profile, right-click on the DP(display picture / profile picture) and click on Search Google for image option or download DP and then go to Google images Click on Camera icon which says Search by image, Click on Upload an Image, now choose the Picture you had downloaded earlier , Now once the uploading Completes, Google will show you Similar Images that already exist over internet.

2. Most of DP's would be a girl's image. A girl DP with more followers will be fake account.

3. He/She will not write more on about page in that account.

4. Check out the friends list. More friends with opposite gender will be a fake account.

5. Check for birth date. Most of the fake accounts will will be with DOB as April 1st, Jan 1st, Dec 31st, as it is quite unique and easy to type in.

6.Check the info. If person is interested in looking for dating have a more signs of being a fake account.

7. Check out the status updates from that account. Most of fake account users will not involve in updating usual kind of events or sharing links or commenting on others posts.

8. Person will add more friends continuously (mostly opposite genders), but there are no pages liked or groups joined

9. The profile is highly inactive and involved only in Facebook apps like farmville or etc.. mostly these type of accounts could be a fake one. They were created by someone for gaining more points on such games/apps.

10. Look for photos. Mostly, the photos folder will have no photos or with any sexual images or the folder having one or two or even with more photos of any random celebrity.


According to Facebook, about 14.3 crore accounts on the social networking site may be false or duplicate, with a major chunk of them coming from developing markets like India and Turkey.

Detect a fake Facebook account now from your account:

FakeOFF - application that will help you to identify your fake Facebook friends.
FakeOff Facebook app will help you to finding fake Facebook accounts from your friend list. It will help to identify whether the friend requests are fake or not. Once you have installed this app in your profile it will continuously search for fake accounts on your profile.After that it will rate and categorize your friends list in the order of One to Ten.FakeOff also checks for all suspicious activities in your profile.FakeOff app Scan the pictures of other profiles and find out whether it is stolen from some where and find out the account is real or fake. If FakeOff finds such accounts it will notify you.

What is Hacking?

In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. The term "hacking" historically referred to constructive, clever technical work that was not necessarily related to computer systems. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.
Origins of Hacking

M.I.T. engineers in the 1950s and 1960s first popularized the term and concept of hacking. Starting at the model train club and later in the mainframe computer rooms, the so-called "hacks" perpetrated by these hackers were intended to be harmless technical experiments and fun learning activities.

Later, outside of M.I.T., others began applying the term to less honorable pursuits. Before the Internet became popular, for example, several hackers in the U.S. experimented with methods to modify telephones for making free long-distance calls over the phone network illegally.

As computer networking and the Internet exploded in popularity, data networks became by far the most common target of hackers and hacking.
Well-Known Hackers

Some of the world's most famous hackers began their exploits at a very young age. Some were convicted of major crimes and served time for their offenses. To their credit, some of them also rehabilitated and turned their skills into productive careers.