Powered By Blogger

Monday, 10 March 2014

hacking FB 100 percent working

Hello friends ! Previously I've posted different ways to hack the user account of Email Server or Social Networking site. Today I'll illustrate the SESSION HIJACKING technique to hack FB Account.

In this scope I will be using BACKTRACK, a Penetration Testing Distribution integrated with the below tools for Network Scan, MIMA and Packet Analysis.


1. NMAP

2. ARPSPOOF

3. WIRESHARK

And two below scripts which are compatible with Mozilla Firefox will be used for Cookie Injection:


1. GREASEMONKEY

2. COOKIE INJECTOR


Techniques:

1. First Scan your network and find the target usingNMAP, a Network Scanner. In this case i got 192.168.1.3 as the Target.

2. Next I need to start the IP Forwarding which enables my machine to forward any network traffic it receives from the target to the router.
3.  Next Man-In-The-Middle-Attack (MIMA) is begun by exploiting ARP Cache Poisoning to intercept network traffic between the target and the router.


First  a malicious ARP reply is sent to the target, associating my MAC address with the router's IP (192.168.1.1).

Secondly  another malicious ARP reply is sent to the router, associating my MAC address with the target's IP (192.168.1.3).
 4. Next I start packet capturing using WIRESHARK at mywlan0 interface and

applied a filter with http.cookie contains datr. The cookie string printable text with GET label is then copied
5. GREASEMONKEY and COOKIE INJECTOR scripts are then installed in my Firefox browser. After restarting the browser Facebook login page is opened and Alt+C is pressed to inject cookie strings captured in Wireshark

Then reload the Web page .. done! !!!

Thursday, 27 February 2014

Want to make own operating system!!!

Today we are writing a post for people who want to have their own build operating system .In this post I will let you know how you can build your own Linux based operating system in a very short time. Now may be you are thinking that I will say you to code some lines and all… don’t worry, you won’t need any kind of programming skills in it. So here we go follow the below steps and you are ready to go.

Step 1: Go to this website http://susestudio.com and register yourself. 

Step 2: After Completing step one there will be a pop up window like below image, where you have to login with your credentials. 

Step 3: Now it will ask for accessing information of your account click allow and proceed.

Step 4: Now select your operating system’s template, if image not clear then right click on image and open it in new tab.

Step 5: When you select the operating system then it will ask you about your operating system name, you can name it according to your wish and click on software tab.

Step 6: Now you can select the software which you want in your own operating system.

Step 7: After this now shift to configuration and Select General, Here you have to put your Username as “Root” and choose Password according to you. I select “toor” as default Linux Password like backtrack  .

Step 8: After step seven click on
Create to create your own os.

Saturday, 22 February 2014

How to hack Facebook via Sniffing ?

How to hack Facebook via sniffing


Hi all users, after receiving your mails that most of facebook hacks doesn't work anymore we have searched and tested and posted some of most popular facebook hacking techniques but still  I think doesn't work for you so finally we've found this technique working 100% for hacking facebook and today we're here to let you know how to do it. So you want to hack Facebook, eh? Before we begin learning how to sniff and start ARP poisoning, let's first begin with this: this tutorial was designed for educational purposes--only! I take no responsibility in whatever damage this may cause to those who wish to participate in this act of hacking! That being said, if you still wish to continue in learning how to get into someone's Facebook without them knowing, proceed along.


There are a couple of terms you will have to know before we begin. This is so that you don't find yourself scratching your head midway through this post wondering what the @$%# I'm talking about. Please understand the following terms and they're respective definitions before proceeding.


Cookie:  A cookie is just one or more pieces of information stored as text strings on your machine. A Web server sends you a cookie and the browser stores it. The browser then returns the cookie to the server the next time the page is referenced. Cookies are essentially utilized so that the website can remember certain aspects of that particular website so that when you return it loads the page faster.ARP Spoofing/Poisoning:  ARP stands for Address Resolution Protocol and is a telecommunications protocol used for resolution of network layer addresses into link layer addresses, a critical function in multiple-access networks. It's the "guy" behind the scenes that stands in the middle of all the network traffic, takes in the requests of other computers on the LAN, and returns valuable information/answers. How do you think you get your IP address when you look up ipconfig in CMD? Your computer sends out a request to extract its IP address and the ARP essentially gives you the IP address for your computer. The act of "spoofing" or "poisoning" the ARP, as you probably can already tell, is a very dangerous protocol. By doing so, you are enacting what's called a "man-in-the-middle-attack", MITM for short. When you poison the ARP of a computer within a LAN, you are making yourself the ARP. In other words, all the requests the computers in the network make come directly to you and the answers go directly from you. More on this later.Packet(s): Packet, or packets, are a formatted unit of data carried by a packet mode computer network. They contain literally a million variety of information and provide useful methods in transmitting/receiving requested information. For example, let's take a look at sending an email. On the Internet, the network breaks an e-mail message into parts of a certain size in bytes. These are the packets. Each packet carries the information that will help it get to its destination -- the sender's IP address, the intended receiver's IP address, something that tells the network how many packets this e-mail message has been broken into and the number of this particular packet. The packets carry the data in the protocols that the Internet uses: Transmission Control Protocol/Internet Protocol (TCP/IP). Each packet contains part of the body of your message. Hopefully this gives you a general idea of how packets work and what they provide for both your computer and the internet.Sniffing: Sniffing is usually implied to sniffing network packets. Packet sniffing is the act of eavesdropping on another computer's packet transfer and capturing (saving) those packet transfers for analysis. Though this sounds malicious and wrong, packet sniffing is used widely around the world today for a number of beneficial reasons. But yes, you are correct, just like everything else there are both good and bad intentions for sniffing. An analysis of "sniffed" packets can often times to be used to pick out abusive/malicious acts within a network. An analysis can also provide the "sniffer" to pick out what the slave has been doing and what kind of information the slave's computer has been sending/receiving. Again, just a general definition but you get the picture.

Please read through the definitions and familiarize yourself with the terms before asking what certain things mean here. You can't expect to know every and anything without doing some homework. Trust me, knowing these terms will not only save you time but also give you the benefit of becoming more knowledgeable about basic network definitions Victoire


Software


The following is a comprehensive list of the software you will be needing for this practice. I've given the links to their home pages where you can download the software for free.


Mozilla Firefox:http://www.mozilla.org/
Web developer add-on for Firefox:https://addons.mozilla.org/en-US/firefox/addon/web-developer/
Cain and Abel:http://www.oxid.it/cain.html
Wireshark:http://www.wireshark.org/download.html


Sniffing Your Way In


Now that you're generally familiar with some basic network definitions and have downloaded the required tools to effectively sniff packets, let us begin. Go ahead and open up Firefox and log into your Facebook account. You should be able to see the "cookies" option in the upper-left corner of the toolbar. Click on that and select "View Cookie Information".

You should now see a collective group of information all in regards to the cookies saved on your computer for Facebook. The main cookies are the c_user cookie (which identifies a person uniquely) and datr cookie (which contains important information for the specified c_user). Our goal in sniffing into someone else's Facebook is to trick the browser and the computer into thinking that we are someone else. How do we do this? By manipulating cookies to disguise ourselves. Essentially we are swapping our actual Facebook cookies to that of the slave's so that when we log back into Facebook, it will think we are the slave rather than ourselves. Not too hard to understand, right? Blink


Go ahead and close out of Firefox for now. Next, go and install Cain and Abel. Throughout the installation process, the setup wizard will ask if you want to install the packet driver WinPCap--go ahead and install this. Once you have successfully installed Cain and Abel, open the program. Now follow these steps exactly:

Click on configure on top and select your Network card. Mostly its the one with an IP address Tongue.Next click on the start/stop sniffer on top as shown below in green square.Once you start the sniffer, goto the sniffer tab in Cain, right-click and click scan MAC address as shown below!


Depending on your computer and your network population this process can take a couple of minutes. Once it's complete, however, you should be able to pull up a list of computers on your LAN. One cool thing you can do here is right-click one of the computers and find out the computer name. Now it's time for the attack! What was the name of the attack again? Anyone? Did you forget already? Ah, yes, the MITM attack!


Again, follow these steps accurately to effectively spoof the ARP :


First Click the APR tab below in cain.Click the white screen in the top frameClick the blue plus on top.


You should get a list of all the devices on the left and a blank screen on the right. In the left screen you should select the router IP. And in the right box, select the computers you want to target. To be safe its better to target one computer. But if you want some real fun then select all the computers on the right frame Hehe. Press "Ok". A caveat in selecting a large amount of computers, however, is that your computer may not be able to handle all the network transmissions and therefore lose some packet captures. Also keep in mind, however, that if someone is working in the router or is monitoring/analyzing the router and actually knows what he/she is doing, they could immediately detect that you are ARP poisoning the router. So be careful! You can get caught.


All the computers should have populated the top-frame. Now select the whole list and click on the nuclear button (top left of Cain, bolded box in the picture below).
And you're done! You've successfully poisoned the ARP of the computers you've selected and you are now the "middle-man" between your slave's computer and the router to the internet. But wait just a second--we can't get into the slave's Facebook just yet! All we've done so far is established ourselves to be the "middle-man". We have to now capture some packets, swap cookies, and voila! We're in.


Now we will open up Wireshark. Follow the steps below :


Open up wiresharkGo to "Capture –> Interfaces" in the top menu and select your interface. It’s usually the one which has an IP address and a certain number of packets flowing through it.Next go to "Capture" and click on "Start".  

It should look something like this.
This window has all the packets sent from the slave’s/victims’ computer to the router and all the packets sent from the router to the slave.


Next in the filter type “http.cookie contains datr”. You ask why? Because, when a user logs in to facebook, he is given some cookies which is unique to him. If we replace our cookies with the slave’s cookies, we can login to his account as then facebook wont know the difference.
After filtering the cookies out, right-click on any one of them and click on "Follow TCP Stream". 
In the TCP stream look for the line "Cookie: ( and all cookie names)". If it doesn't show up, select some other packet in Wireshark and click on "Follow TCP Stream" for that particular cookie. You can see the source IP and destination IP in Wireshark. So if you have more than one source IP, then you know you have the cookies of more than one account on your LAN. This is what I got when I did it.
You now have the slave's cookies for his/her Facebook. The main ones we need to focus on are the datr cookie, c_user cookie, lu cookie, sct cookie, w cookie and xs cookie. Now open up Firefox and go to Facebook. If you're logged in, log out so that you're at Facebook's home page. Click on the "Cookie" option in the toolbar (as like before) and do the following in this exact order. 

Clear session cookies.Delete domain cookies.Delete patch cookies.

Note :-
If you don't do the steps in that same order, this will not work!
Note :- Once you do this, reload the Facebook page (http://www.facebook.com). This is to ensure that you are loading the Facebook page clean without any pre-existing cookies.


Now login to your account with your username and password. After logging in, click on cookies in web developer add-on just like before and click on “View Cookie Information”. You should see all of your Facebook cookies now. Any ideas what we do next? I suspect you know by nowOui.


Click on “Edit Cookie” for each cookies there and replace the cookie value with the value you got through Wireshark. If you didn't get all the cookies in Wireshark, it's OK! But mainly, you should look to replace the datr cookie, c_user cookie, lu cookie, sct cookie, w cookie and xs cookie.

After you have swapped cookies, go ahead and refresh the page. Voila! You should now be logged in as your slave rather than yourself. Congratulations, you have successfully "hacked" your way into someone else's Facebook! Again, please keep in mind that this only works for computers within your LAN. So if you're at home, you can only get into the Facebook of people who are connected at home. No, you cannot hack into the Facebook of someone across the worldNon.


I hope you guys have enjoyed this tutorial! Please feel free to leave me any questions below or PM me with any issues you have. I'll try to respond and reply at my soonest convenience.

Friday, 21 February 2014

Hack Gmail Account Password for Free

When you forgot the password of your Gmail, and there's no access to an alternative email, no right answers to the security questions, how can you get into your Gmail again? This is what Gmail password cracker/hacker will do for you. Gmail password cracker/hacker can help you find back your forgotten password for Gmail. You don't need to have an alternative email or remember the answer to the security question.
Learn How To Hack Gmail Account Password 

If you need to gain access to a Gmail account but have forgotten your password, 
I’d recommend using the Hack Gmail Password program to recover the password. It’s a fairly simple tool that will help you gain access to an account that you can’t seem to get into anymore. This tool was created to help you change the password to old accounts of yours that you can’t access anymore, a friends account who has given you permission to access their account, or possibly a child who you feel may need to be watched a bit more closely. If this tool is used for any other purpose I am not to be held responsible for your actions, so use this responsibly.

While it may seem self-explanatory, many people struggle to get this program to work so I’ll just go over it briefly for you.

Hack Gmail Password is a powerful tool that will contact Gmail and attempt to change the password of the account you have entered. Simply fill in the email box with the email address of the account you’d like to change the password of, then fill in the new password you would like in the next two boxes.

After all this information has been filled out accurately, hit the button to change the password. It will then begin to contact Gmail and go through the process of setting your new password. It can take anywhere from thirty seconds to a minute so be patient. Updates on what the program is doing will become visible once the process has started. If you have any questions getting this to work correctly feel free to leave a comment on this post and I’ll try and help you as best I can.

Download it here:crack gmail software

how to hack wifi


Using software how we can share WI-FI

Connectify

Connectify 2400 Market St #411 Philadelphia, PA 19103 T 215-854-8432 F 215-854-8450 E agizis@connectify.me www.connectify.me

About Connectify

Your Personal Area Network

Connectify is an easy to use software router for laptops and smart phones. With Connectify, users can wirelessly share any Internet connection: a cable modem, a cellular card, or even another Wi-Fi network. Other Wi-Fi enabled devices can see and join your Connectify hotspot just like any other Wi-Fi access point and are kept safe and secure by passwordprotected
WPA2 Encryption.



                              Left: Connectify for Windows 7. Right: Connectify for Android.


Benefits

• Take any Internet connection and share it wirelessly with no additional hardware, wires, plugs, or chargers
• Easily connect any number of Wi-Fi enabled devices to your network including desktop computers, laptops, phones, gaming systems, and more
• Don't break the bank paying for multiple Wi-Fi connections on the road, Connectify is free and can actually save you money

                                                                 Popular Use Cases



Connectify 2400 Market St #411 Philadelphia, PA 19103 T 215-854-8432 F 215-854-8450 E agizis@connectify.me www.connectify.me
Popular Use Cases


At Home

Connectify can easily act as a repeater for your home router, extending its range and providing Internet access wherever you need it. Connect to your home network, enter the same Wi-Fi name and password, and hit "Start Hotspot." Devices will automatically connect to the Internet through either your Connectify hotspot or home router depending on proximity. Before you know it you can finally have Internet access in that impossible back room or basement. In addition, if you run Connectify away from home with these settings, any devices that need to be bound to a specific network (such as Eye-Fi cards or wireless printers) will work flawlessly with no additional configuration no matter where you are!


On the Road

Connectify placed second in Lifehacker.com's Top 10 Downloads for a Road Warrior Laptop and it's not hard to see why. For the Road Warrior, Internet connectivity is a lifeline. Airports, Hotels, and Coffee Shops know this and charge accordingly, often as much as $10-$15 per day, per connection! These fees can quickly add up when traveling with friends or co-workers. The handful of hotels that do provide free Internet access occasionally only supply you with an ethernet jack, which leaves Wi-Fi only devices and smart phones in the dark. Even the lucky few that have mobile 3G cards or adapters are limited to a single connection. Because Connectify is free to download and use, users can save money on multiple Wi-Fi connections while on the road and still get all their devices online simultaneously.


At College

Many Schools and private institutions have restrictive limits on the amount of devices an individual can have registered to their wireless networks. In this day and age, these quotas are quickly exceeded by the wide variety of Wi-Fi enabled devices we use on a regular basis. With Connectify running on a laptop or desktop PC, you can circumvent these limits and securely connect any number of devices to your personal Wi-Fi network.


Offline Networking

Even without an active Internet connection, you can still run a Connectify hotspot. This provides wireless access to
shared folders or drives on your network as well as the ability to play LAN games with others.
Connectify 2400 Market St #411 Philadelphia, PA 19103 T 215-854-8432 F 215-854-8450 E agizis@connectify.me www.connectify.me

                                               Connectify in the Press

Articles and Reviews
Read Write Web - Turn Your Windows 7 Computer Into a WiFi Router In 5 Minutes, Free & No Hardware "Windows 7 users have got to try this app. You never know when you'll get to save the day by letting other users share your Internet connection."

Lifehacker - Connectify Restores Wi-Fi Hotspot Powers to Windows 7 "Your friends don't see an "ad-hoc" network with limited powers - they see a real access point, served up from a virtual, cloned version of your Wi-Fi adapter."

Engadget - Unfinished Windows 7 feature exploited for virtual WiFi hotspots "Connectify is a free application that effectively turns any Windows 7 computer into a virtual WiFi hotspot letting you, for instance, wirelessly tether a number of devices to your laptop at location where only an Ethernet jack is available, or even tether a number of laptops together at a coffee shop that charges for WiFi."

Gigaom - Connectify Is Early Evidence of Why Win7's "Virtual Wi-Fi" Matters "Connectify takes direct advantage of the virtual Wi-Fi features in Windows 7 to create a software-based wireless router for Wi-Fi sharing. Just imagine the range and coverage possibilities that can come of turning your laptop into a router."

PCWorld - Unfinished Windows 7 Feature Turns Laptops Into Wi-Fi Hotspots "Windows 7 is required on the notebook acting as a wireless hotspot, but any wireless-equipped device, including PCs running Windows XP or Vista, or even Mac laptops, can reach the Web through Connectify without any additional
software. Connectify also encrypts the traffic to and from the software "hot spot" using WPA2-Personal (AES) encryption."

Gizmodo - Connectify: Turn Your Windows 7 Laptop into a Virtual Wi-Fi Hotspot "The result is a shared connection that differs to the usual "ad hoc" network connection, because it shows up as a real access point, reverts to default settings each time you restart, and you can join a Wi-Fi network and run the Connectify
hotspot on the same Wi-Fi card."


Accolades

• Over 3,000,000 Downloads in 18 months
• Ranked #1 in CNET/Download.com’s Wireless Networking Software Category


How to download torrents using IDM

Hello friends, today i will show you the way to download torrents with Internet Download Manager. Torrent is tiny file with .torrentextension which allows you to download huge amount of data. We use torrents to download various stuffs like movies, games, software package and plenty of different things. you'll transfer torrents from several website.  The transfer speed for torrents depends on seeds it has. It will make difficult for you to download files with very low or no seed counts. However with the assistance of this trick you'll be able to download torrent file with IDM. This tool can be really helpfull when you want to download file that has very low seeds. IDM is the quickest file transfer manager on the internet market. So lets begin!


How To Transfer Torrent With IDM1. First download the torrent file with .torrent extension which you wish to download from the internet directly without any torrent client like utorrent.


2. Now open zbigz.com and you will land on its homepage.

3. Then Click on upload Torrent and browse your torrent to transfer and click on Go.
4. Then it will ask you for Free or Premium service, choose Free to proceed further.
5. It will take some time to cache your file. Once the caching is done, click on transfer button to download your file as shown below.
6. You should have internet download manager installed on your computer so that download start inside IDM. If you don't have IDM don't worry it will download directly.


Note: If you decide on to use Free transfer then you wont be able to transfer file of more then 1 GB 


How to Configure WiFi Hotspot in Windows 7, 8 Using Command Prompt

How to Configure WiFi Hotspot in Windows 7, 8 Using Command Prompt

Procedure for creating a WiFi Hotspot on Windows 7 using Command Prompt. It will be useful for sharing network over multiple devices.

What is a WiFi Hotspot?

WiFi Hotspot is a Wireless hub which offers a network access to various devices over a wireless medium using routers. It requires a particular software which gives the ability to host a Hotspot in our computer. In order to reduce the difficulty, it’s better to establish a WiFi Hotspot using Command Prompt.
In the 21st century, the utilization of the internet is increasing day by day. At the same time, sharing of resources on the Internet has been triggered between Wireless Routers or Mobile WiFi Hotspots. If you are away from your home network and do not access to your internet connection, you will probably require some of your friends or colleagues internet to share their network access and connect through a common gateway. And that’s what we call a “WiFi Hotspot“.
Read the below steps clearly and start your own WiFi Hotspot.

Step 1:

  • Select Command Prompt(Admin) in your computer.
  • Command: Windows key(X

Step 2:

  • Check whether your computer is supported for Hosted network or not. Type the following command in Command Prompt.
  • Command : netsh wlan show drivers
If the result is “YES” then proceed to Step 3 or else download the required drivers from your vendor website.

Configuring the Hosted network connection:

Step 1:

  • Type “netsh wlan set hostednetwork mode=allow ssid=yourname key=yourpassword” (enter the command without the quotations).
  • Note: In this example, I have used my own user Name and Password. You can use your own parameters for SSID and KEY and Password must be greater than 8 digits.
You have successfully established the Network Connection.

Step 2:

  • Start your hosted network.
  • Command : netsh wlan start hostednetwork
If your Command Prompt says ” your hosted network couldn’t be started ” then make sure to turn on the “WiFi” and also enable the Wireless Adapter :)
When there is no error:

Sharing your Wireless Network Adapter

Step 1:

  • Go to control Panel -> Network and Internet and select Network and Sharing Center.

Step 2:

  • There you can see your newly created network under the original network connection.

Step 3:

  • Select “Change adapter settings” in the left side column of Network and Sharing Center.

Step 4:

  • Right click on your Wireless Network Adapter and select properties. Select the tab “Sharing“. Check the option “Allow other network users to connect through this internet’s connection” option. Mention your newly created hosted network name.

Step 5:

  • Check whether your hosted network has shared the network access or not from theNetwork Sharing and Center.
  • Wahoooo!! You have successfully turned on your WiFi Hotspot. Now you can surf internet from any device using the Hotspot.
  • Here i’m going to connect my Mobile using the configured WiFi Hotspot.
  • To stop the hosted network, type the command ” netsh wlan stop hostednetwork” in command prompt.
Do you think typing a command for starting/Stopping the WiFi Hotspot is a time dependent?
OK, 

Thursday, 20 February 2014

How to watch live cams through Google

In this tutorial i will teach you to hack or view unprotected cam using a simple google trick. Using this trick you can see live view of streets in china or america. Inner view of some office and lot more. Lets dive into it.

How To View Unprotected Cam ?       

     1. Go to Google and search for "inurl:view/view.shtml" (without quote).
       2. Now open any of the link from the search result and enjoy.
       3. Below is the list of google dork you can use to see more cams.

List Of Google Dork

inurl:/view.shtmlintitle:”Live View / - AXIS” | inurl:view/view.shtml^inurl:ViewerFrame?Mode=inurl:ViewerFrame?Mode=Refreshinurl:axis-cgi/jpginurl:axis-cgi/mjpg (motion-JPEG)inurl:view/indexFrame.shtmlinurl:view/index.shtmlinurl:view/view.shtmlintitle:start inurl:cgistartintitle:”live view” intitle:axisliveappletintitle:snc-z20 inurl:home/intitle:liveappletintitle:”i-Catcher Console - Web Monitor”intitle:axis intitle:”video server”intitle:liveapplet inurl:LvApplintitle:”EvoCam” inurl:”webcam.html”intitle:”Live NetSnap Cam-Server feed”intitle:”Live View / - AXIS”intitle:”Live View / - AXIS 206W”intitle:”Live View / - AXIS 210″inurl:indexFrame.shtml Axisintitle:”Live View / - AXIS 206M”inurl:”MultiCameraFrame?Mode=Motion”allintitle:”Network Camera NetworkCamera”intitle:”WJ-NT104 Main Page”intext:”MOBOTIX M1″ intext:”Open Menu”intext:”MOBOTIX M10″ intext:”Open Menu”intext:”MOBOTIX D10″ intext:”Open Menu”intitle:”netcam live image”intitle:snc-cs3 inurl:home/intitle:snc-rz30 inurl:home/intitle:”sony network camera snc-p1″intitle:”sony network camera snc-m1″site:.viewnetcam.com -www.viewnetcam.comintitle:”Toshiba Network Camera” user login

How to chage profile pic of your friend in whatsapp

Whatsapp Hack to Change Friends Profile Picture.(to troll them ) Ya its possible!!.but only on your own phone so you can troll them by using it. This is how you do it

Step 1. Choose a picture for your friend which you want to replace with your friend profile pic and download it.

Step2. Now Rename the Image with your Friends Mobile Number. For example , i will change it to 9785****** of my friend.

Step3.Resize the image to 561 * 561 using paint by following these steps:

Right Click the image and "Open With">PaintPress Ctrl + W and check "by Pixels"Set the values to 561 Height and 561 WidthCtrl + S to Save it.

Step 4. now just save the image into your device on the path “/sdcard/WhatsApp/Profile Pictures”.

Step 5. Turn of Wifi or Deactivate data network for a while.(till you prank your friend). as his real profile picture will not Download then

Monday, 17 February 2014

II method for hacking whatsapp

2nd method for hacking WhatsApp


 1.Whatsapp Hack to spy on some other  account 


So if you people have observed you can not have your whatsapp account logged in in two devices. Means session is given to only 1 mac address. If the MAC [ Media Access Control ] address of the device requesting access changes then whatsapp asks you to re-verify your account!

And common, “whatsapp people” you think Mac address cant be spoofed. But yeah Nice try whatsapp developer’s :p


Here is how to do it-


You need to get access to victim phone to get the victims phone “MAC address + the verifying massage” which is received to verify your device.
Get mac address on your android phone.


Finding MAC address on a Android Phones

On your HOME screen, click on MENU, goto SETTINGS.Click on  About Phone.Click on Status. 

And VIEW your Wi-Fi MAC address!

As soon the message s received Push the “MAC address” + “Verifying code” to your server or mail it your ID. That depends on your convince.
Spoof your phone’s MAC address to your Victims address using this tutorial
and install whatsapp and type the “verify code”.
And done guys. You get complete access to the victims whatsapp ID.. where as you can keep spying/watching your victims movements :D
i.e 2 people – U + ur victim are using the same ID from different devices.

How to hack whatsapp

Learn how to hack whatsapp
  • Most people think that hacking is difficult but there are a few methods which it can be easily done
  • There are 4 methods for hacking
If you have victims phone then there is an easy methods
 1 
Gain access to the user's mobile phone. Whoever your target is, if you want to access their account, you'll need their phone to set the process up. After setup, you'll be able to read their messages in future.

Get WhatsApp yourself. Download WhatsApp on your mobile, or if you want to do the hacking on computer, download Bluestack and through it, download WhatsApp for your computer.

Start WhatsApp. It will ask you to enter your mobile number; enter your target's mobile number here.At this time you should have the victims mobile with you.

Wait for the confirmation. WhatsApp will send confirmation message to target's mobile with a confirmation code.

Enter that code into your computers's WhatsApp.

Delete the confirmation message from the target's phone.

Congo! Now you have access to all the chats of the target. You can read all chats and also reply to them without the target knowing it.

To know further information,
Mail to:revanthshallun95@gmail.com