Monday, April 10, 2017

hacking facebook account in kali linux using brute force attack method

Hacking is not for all. So be careful to do it at home. you can get help from www.hackerslist.co/
I have written lots of facebook hacking article like hack facebook using android smartphone,open source tools,python and perl script etc.. But Toady I'will tell you about hacking in Facebook Using Brute force attack. In brute force attack method,tool try all combination of password to provide access of victim account.Brute force attack is the only successful method to hack facebook account. 


The method I am going to use here will be brute forcing, Using World’s Best Passwords Dictionary, CrackStation.

So, First lets know something about Brute force attacks, “A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN). 
In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data.” 

But, In our case I’ll be using a Python script and a Long Dictionary Of passwords. I have personally tried it on myself and it really works . 

Requirement


·         A Kali Machine / Or Any Python Engine Will work! 
·         Facebook.py ( v1 or v2 
·         A FaceBook id Of course 
·         CrackStation Word List!
Now, Lets Start The Work

step 1. Install Python-mechanize using command mention below 

[*] root@root:~#apt-get install python-mechanize 

step 2. Add facebook.py using the command below 

[*] root@root~# chmod +x facebook.py [*] root@root:~# python facebook.py 

step 3. Now enter |Email| or |Phone number| or |Profile ID number| or |Username| of the victim,                                                              


step 4 . Now Give The "Path" Of Your CrackStation Word list 

step 5. Now it will try all passwords present in the word list, So relax and have a cup of coffee because it will take time depending on speed of your processor and password strength of your victim!   

Hope this article was helpful Any feedback or Questions? Leave a Comment And I’ll be Happy To Help 




Live Hacking Facebook using Beelogger ¦ on Kali linux 2017

Awesome Keylogging Script - BeeLogger


Sup, my fellow white hat hackers!
In this tutorial, I will show you an AWESOME script for key logging.
It can be hidden in lots of different formats, even .docx(Microsoft word), and .pptx(Microsoft Powerpoint).
Oh yes, what you need is a Kali Linux and that is it.
This is actually illegal to use on other peoples, so, promise me you will not use it for the bad.
Now, put your hats on,( I hope it is a white one) and get ready.
It will take long, but IT IS WORTH IT.
(Facebook Hacker)

Step 1Clone It!

My every tutorial starts with this one, cloning it. To clone it, type :
this will install it, now type : " cd BeeLogger " to go to the directory, and type " ls " to see what is in there.

Step 2Execute It!

Now we cloned the script to our Kali Linux, we need to execute the script.
But before that, we need to install what we need. Type :
./install.sh
IMPORTANT This command will install things. It will install wine,python,all kind of that stuff. It is a long boring step, it takes like ages to do that, but it is easy, just keep pressing next. So I will not show this step. But, in the wine configuration, select Windows 7 instead of the windows XP, Then press OK.
Finally, It is done!
Now we can execute the script! To do that, type in :
python bee.py
After that, there will be a image of a bee, then press enter.
Now, there will be this page.
We are going to generate a keylogger, so press K.
And, Ta-da. There are lots of options like :
You can choose any, 1 to 6. But, you will need to make a gmail account and type the email inside to get what the victim is typing. So quickly make a gmail account, and select one.
And select Turn On(Make sure you are logged in). Other wise it will not work. The reason that it needs the email address is because it is a way to communicate with you without port forwarding.
Now, I am pretty sure you can do the rest. Send the file to the victim, the victim opens it, the keylogging begins and sends the text that the victim typed to your gmail account.



Wednesday, March 8, 2017

Hack WhatsApp Account : Two Easy Working Methods and their Fix

Whatsapp is the most mainstream Messaging stage that is utilized by billions of individuals over the world. Whatsapp has turned out to be extremely prevalent in view of its appealing and striking components like cross-stage informing administration, Online media sharing, Free Messaging administration, voice calling and so forth. A large portion of the advanced mobile phone clients like for iPhone, BlackBerry, Android, Windows Phone and Nokia are captivated towards whatsapp ambassador as it give imaginative and astonishing components.

Individuals can share their perspectives, pictures and numerous all the more utilizing their own Whatsapp account. It would be more enjoyable by hacking your companion's record. Getting to the record of some other individuals like companions, relatives and dearest ones dependably sounds intriguing. It may not be for terrible reason, but rather now and again you get a kick out of the chance to view other's record. Individuals have many questions with respect to How to Hack Whatsapp account? Here, you can discover straightforward strides for hacking some other's record. Take after these simple strides and HACK WhatsApp account. Appreciate!!!

Procedures to Hack Whatsapp Account

Whatsapp record of your companions or some others can be hacked by taking after couple of techniques. There are basically two strategies for getting to other's whatsapp account. We are giving you point by point data with respect to the procedures for hacking or getting to one's whatsapp account. Take after these basic strides and appreciate hacking your companions' whatsapp account.

Strategy 1: MAC Spoofing

A Media Access Control address (MAC address) is a 12-character one of a kind identifier alloted to the system connector of your WiFi gadget. A MAC deliver can be utilized to exceptionally distinguish the advanced mobile phone of your companion whom you need to hack the Whatsapp account on the Internet or the neighborhood arrange.

On the off chance that you need to get to the whatsapp record of your companion, you have to discover the MAC address of their record. Take after the beneath ventures keeping in mind the end goal to hack your companion's record.

Step 1: Uninstall Whatsapp Account from your gadget

•             Initially, you should uninstall your Whatsapp account from your gadget.

•             Don't stress! Your record can be reinstalled and designed toward the finish of your Hacking procedure.

•             Be Careful! Ensure that your Whatsapp account on your cell phone is totally uninstalled effectively.

Step 2: Acquire the advanced mobile phone of the objective (casualty) that you wish to Hack

•             Get the cell phone of the casualty that you craving to get to. In spite of the fact that it is tad bit tough, attempt to get the cell phone of the casualty.

•             The casualty's cell phone will be fundamental at two variation ventures all through the hacking procedure.

•             Be mindful while utilizing the casualty's telephone. Try not to take much time and attempt to place it back before the casualty begins to find the gadget.

Step 3: Locate the MAC (Media Access Control) Address from the Target's Phone

•             A MAC address is a 12-character one of a kind identifier relegated to the cell phone which can be filled in as its online personality.

•             A MAC address shifts from one gadget to other. In this way, discover the stage of the advanced cell that is utilized by the casualty.

•             A MAC address comprises of six sets of digits that are isolated by colons. For Example, it would appear that (01:53:35:47:78: cb).

Cell phone Platform: How to discover MAC Address?

Android : Settings >> About Phone >> Status >> Wi-Fi MAC address

iPhone : Settings >> General >> About >> Wi-Fi Address.

Windows Phone : Settings >> About >> More data >> MAC Address.

BlackBerry : Options >> Device >> Device and Status Info >> WLAN MAC

Step 4: Find the MAC address of your own Mobile Phone

•             Get the MAC address of your Mobile gadget and spare and guarantee that you store it in a safe way.

•             Again, you'll require your MAC deliver to utilize your cell phone after fulfillment of your hacking procedure.

Step 5: Alter [Spoof] your MAC deliver like the casualty's MAC address

•             Spoofing the MAC address permits your cell phone seem to be comparable as casualty's gadget.

•             By parodying there is leeway of letting you to induce Whatsapp that you are signing into your own particular record.

•             But, genuinely you are attempting to sign in into the casualty's Whatsapp account.

Step 6: Install variation satirizing applications relying upon the casualty's cell phone.

Gadget : Spoofing App

iPhone (or) other gadget : MacDaddy X or WifiSpoof.

–>Use this application to change your MAC address.

Android : BusyBox, Terminal Emulator

–>Both these applications are accessible for nothing on Google Play.

•             In the terminal, sort "ip connect show" and you can see a rundown of interfaces.

•             Identify the one that has your MAC address.

Case:

Accept we'll utilize the eth0 interface. In the terminal emulator, enter "ip connect set eth0 address XX:XX:XX:XX:XX:XX" and "ip interface set eth0 communicate XX:XX:XX:XX:XX:XX", where eth0 is the interface you recognized and XX:XX:XX:XX:XX:XX is your objective's MAC address. Keeping in mind the end goal to confirm that you've changed your MAC address effectively, enter "ip interface demonstrate eth0."

Step 7: Re-Install and design whatsapp account on your Device

•             After introducing and designing Whatsapp account on your gadget, you get to the casualty's whatsapp account.

•             Enter the casualty's telephone number in order to set up WhatsApp as opposed to your own.

•             This permits you to get and send messages from the casualty's record.

Step 8: Attain Confirmation Code from the casualty's cell phone

•             During the WhatsApp setup handle, affirmation code will be sent to the casualty's telephone number.

•             Access the casualty's telephone for the last time to secure that confirmation code.

•             Enter it into WhatsApp that is on your telephone.

•             Finally, you have effectively hacked the Whatsapp record of your objective.

•             If you don't wish the casualty to recognize about your parodying, try to erase the affirmation code from their gadget.

Step 9: Change your MAC address as prior after effectively getting to the casualty's portable.

•             Similarly, rehash the directions to change the MAC address, however you have to change it to your unique address as opposed to the casualty's MAC address.

•             Now, your versatile will be reestablished to its unique position and guarantees that there are no future issues with Internet use or availability issues.

You should likewise check more traps identified with WhatsApp:

•             Download WhatsApp for PC

•             Best WhatsApp Tips Tricks Collection

•             Best WhatsApp DP Collection

If you think you cannot do this step but you really need to hack a whatsapp then you have to hire a whatsapp hacker.

Method 2: Spy Software

The simplest method for spying WhatsApp messages is to utilize a spy programming program. In the present advertising pattern, there are bounteous organizations that are advancing WhatsApp spy programs. Despite many organizations, we should pick bona fide spy applications that are dependable. One of the best programming to keep an eye on WhatsApp is mySpy which is notable for its quality and it is one of the first class includes. You should download and introduce the mySpy application onto the casualty's telephone on which you need to get to and screen the WhatsApp messages. Ensure that you can keep the casualty's telephone with you for couple of minutes.

1. Motivate authorization to screen casualty's telephone

The spy applications that you utilize are particularly basic and planned for the representatives, guardians, government authorities keeping in mind the end goal to get to or screen the exercises of subordinates, youngsters and other . Before continuing, ensure that the casualty offers consent to get to and screen their versatile.

2. Select adept SPY program or application

Different spy applications or projects are offered by different application suppliers. Think about and dissect to locate a best spy program that best suits your cell phone. You have to consider the accompanying variables to choose a bona fide application.

•             Purpose of the application

•             Efficiency of the application

•             Whether it conceals spy action undetected from the casualty

mySpy and Spymaster Pro are great applications or projects that can be utilized to get to other's whatsapp account.

Step 3: Purchase and introduce best spy program

•             Buy a certified application and introduce the application by taking after the on-screen guidelines.

•             This application must be introduced on your telephone and in addition the casualty's telephone.

Step 4: Configure the application and start following

•             Follow the directions to introduce the application and ensure that you finish every one of the settings appropriately to begin the hacking procedure.

•             Now, you can get all the discussion on the casualty's record. Effectively, you've gotten to the whatsapp record of your companion or darling ones.

I think it is a complex process. So it is better to hack a whatsapp hire a hacker


Tuesday, February 28, 2017

How Can I Hack A Facebook ID by Using Account’s Phone Number?

How to hack Facebook account? that is an answer everybody needs to know. Despite the fact that there are numerous approaches to get into somebody's Facebook however these specialists have exhibited how to hack anybody's account with just their phone number!

There are around a billion users of Facebook these days which constitutes to about a 6th of the total population. So when somebody is hacking a account, they are assaulting one in each six individuals on the planet. Furthermore, it has turned out to be really simple for programmers to hack into Facebook accounts. Researchers figured out how to demonstrate that the length of somebody has a telephone number of the objective, then they can absolutely take control of the individual's Facebook account. Obviously, the hacker would require nearly few hacking abilities.

It's entirely frightening when you consider it on the grounds that by the day's end you will feel that you have put every one of the measures conceivable to secure your record just to understand that it may be purposeless. Through the SS7 network, hackers can enter your Facebook account with no issues. For whatever length of time that they know how to abuse the SS7 defect and recollect this imperfection has nothing to do with Facebook except for an issue with the supposed Signaling System Number 7.

The SS7 flaw has been found to be a pathway for some hacking endeavors, extending from tuning in on phone calls to sending and accepting instant messages. In any case, the most recent disclosure is that it can hijacking be utilized for commandeering online networking accounts which have a telephone number gave on them. The Signaling System Number 7, SS7 to put it plainly, is a flagging convention being utilized by 800 telecom operators worldwide as their instrument of trading data among themselves. Data, for example, cross-bearer charging, meandering enablement and different components all work through SS7.

The one issue with SS7, however, is that it believes all messages sent to it without checking the inception. Along these lines, programmers can just redirect any messages or calls from the SS7 network to their own particular gadgets by basically deceiving it. All that is required for this strategy to work is the casualty's telephone number, and they can begin their snooping.

As of late, it has been uncovered that messenger apps, for example, WhatsApp and Telegram which elevate the end-to-end encryption can in any case be hacked in light of the fact that they utilize phone numbers to enlist individuals. Furthermore, now it is Facebook which can be hacked.

Hackers essentially need to go to the " Forgot Account?" link on the Facebook page. When they are gotten some information about any telephone number or email to recover their lost secret word from, the hackers would need to put an authentic telephone number. After this, the SS7 defect becomes possibly the most important factor, and the hackers can redirect the message containing the one-time secret key got to their own gadgets, and from that point onward, they can sign into the victim’s Facebook account.

For whatever length of time that a client has enrolled on Facebook with a phone number, then they may experience issues.

The analysts additionally noticed that a similar procedure can conceivably hack any administration now which utilizes SMS to check the user accounts.

If not possible to do this system go to hire a hacker. If you need you can also find Whatsapp Hacker.

Saturday, February 25, 2017

2 Ways to Crack a Facebook Password

Strategy 1

Reset the Password

The most straightforward approach to "hack" into someone's Facebook is through resetting the password. This could be simpler done by individuals who are companions with the individual they're attempting to hack.

•   The initial step is to get your friend's Facebook email login. In the event that you don't definitely know it, take a stab at looking on their Facebook page in the Contact Info area.

•   Next, tap on Forgotten your secret key? also, sort in the casualty's email. Their record ought to come up. Click This is my record.

•   It will inquire as to whether you might want to reset the secret key through the casualty's messages. This doesn't help, so press No longer have entry to these?

•   It will now ask How would we be able to contact you? Sort in an email that you have that additionally isn't connected to whatever other Facebook account.

•   It will now make an inquiry. In case you're dear companions with the casualty, that is incredible. On the off chance that you don't know a lot about them, make an informed figure. On the off chance that you make sense of it, you can change the secret key. Presently you need to hold up 24 hours to login to their record.

•   If you don't make sense of the question, you can tap on Recover your record with assistance from companions. This permits you to pick in the vicinity of three and five companions.


•   It will send them passwords, which you may approach them for, and then sort into the next page. You can either make three to five fake Facebook records and include your companion (particularly on the off chance that they simply include anybody), or you can pick three to five dear companions of yours that would give you the secret key.

If this strategy is difficult for you then hire a hacker. We can hack facebook for you. I think we are able to give you a complete hacking solution.

Strategy 2

Utilize a Keylogger

Programming Keylogger

A product keylogger is a program that can record each stroke on the console that the client makes, frequently without their insight. The product must be downloaded physically on the casualty's PC. It will consequently begin catching keystrokes when the PC is turned on and stay undetected out of sight. The product can be modified to send you a rundown of the considerable number of keystrokes through email.

CNET has Free Keylogger, which as the title recommends, is free. In the event that this isn't what you're searching for, you can look for other free keyloggers or pay for one.

Equipment Keylogger

These work an indistinguishable route from the product keylogger, aside from that a USB drive with the product should be associated with the casualty's PC. The USB drive will spare a synopsis of the keystrokes, so it's as straightforward as stopping it to your own particular PC and separating the information. You can look through Keelog at costs, however, it's a bit higher than purchasing the product since you have the purchase the USB drive with the program as of now on it.
If you don't have any interest in IT but you must have to Hack others account then call us


If you need to hire a hacker go to the most effective site https://www.hackerslist.co/

The Impact Team: Infidelity Hackers

Ashley Madison hack is undoubtedly one of the top hacks of the century. This was mastered by The Impact Team who exposed the infidel ...