Skip to main content

Raspberry Pie | Hackers True Love

Raspberry Pi is a very good and useful device for aspiring hackers.who want  a portable and powerfull device for hacking. What is Raspberry Pi ? The Raspberry Pi is a very low cost, debit-card sized computer that can be connected to monitor or TV, with a simple keyboard and mouse. It is a capable small  gadget that enables people to learn computer s, and to learn how to program in languages like Scratch and Python and even it can be used for ethical hacking . It’s capable of doing almost all things that you usually do with your computer like browsing internet, watching vedios,gameing etc. How Is Raspberry Pi Useful For Hackers?   If you’re an aspiring hacker, you ought to be learning the maximum amount as you'll about how computers work and the way you'll exploit their built-in vulnerabilities. This learning can are available many forms. you'll read books, watch YouTube videos, enroll in dedicated hacking courses – beat an attempt to know how hacking works. But there’s ano

Social Engineering: How to become a Dark Art Artisan

Social Engineering: How to become a Dark Art Artisan

  • Therefore, his program director forced him to take a course he did not want to do. Suppose the syllabus starts with 'A' and ends with 'ED'. Okay, you think, comfort you, at least I'll make new friends ...

three months later. After spending endless hours at conferences, you realize that it has not worked as expected. You met, you got their email addresses and, sometimes, you allegedly worked together on so-called 'teams' ... but you wouldn't get to say that they were your friends.
So what you are doing is you have an idea… to make some fun and to encourage the final weeks of class.
You have heard about piracy, you know that everyone probably still uses Facebook and you stumble upon this guide…
So you are installing and working on your new and bright Kali 2019.4. If not, this is the first step… please continue and download it ‘legally’ from:
(The first appearance of Kali in Hindu mythology is like a destroyer of evil)
Plan of attack
Therefore, we want to know the usernames and passwords of all our peers in a given class. Suppose the class is very large, and having all your credentials will give you a cult status. Of course, he does not intend to do anything other than gain some fame and then asks them to use 2FA and change their passwords. So how do we do that ...
Clone to facebook login website
Rotate a web server that hosts a cloned web page in your black box
Create a path for others to return to your mailbox on the Internet
Write a phishing email that attracts students with greed / fear / sympathy and clicks on a link that connects to a fake fb login
Let's work the other way ...
Step 1: Configure Ngrok
Then, Ngrok allows you with just one command, via any NAT or firewall, to provide a quick and secure URL to your localhost server. This means that when you host your rogue clone FB login page on localhost: 80 (port 80), Narok will give you a link from which you can email your victims to click and access. So go ahead and sign up on Ngrok:
Once you are logged in ... go ahead and download ngrok as shown in step 1.
Then follow the configuration instructions as follows (remember to do step 3 with your own ngrok authentication token

Here I am doing it on my machine:

Continue the encroachment and notice the random URL that generates for you:

Remember: Ngrok provides a new random URL every time it stops / starts at its free level, so make sure you are using the correct URL for the following steps
Step 2: Facebook Login Cloning with Social Engineering Toolkit (SET)
So now let's highlight the power of Kali Linux! Kali is the aggressive hacker's dream arsenal. It has equipment ready to prank for you. First let's start the Social Engineering Toolkit by opening a new terminal with Ctrl + Alt + T.
Then type sudo setoolkit (we want to run Social Engineering Toolkit as root user) and enter your root password.
Then type 1 to select 1) Social Engineering Attacks in the opening menu.
Then type 2 to select 2) Website Attack Vectors from the second menu.
Now select type 3) Combine the credential attack method in the third menu (credential collection is a beautiful way of saying that you want to steal your partner's password ... 'Elizabeth, can you get your bank credentials back? Can? ')
Finally, type Site Selector 2 from the fourth menu to start the cloning process of the FB login page 2).
Now be sure to carefully copy the bit after http: // from your running enrock terminal, for example and paste it into the social engineering toolkit in the terminal indicator, and then press Enter.
For the next SET message, copy your target Facebook login page, for example and paste it, then press Enter.
Ignore the following message and press enter again.
Now your fake server is running in Kali, serving an FB login page and actively listening for the entered input data (username and password). Once you successfully emailed the link to your target victims / pseudo-friends and tricked them into clicking on it, they redirected to your fake FB login page Will go They will enter their username and password involuntarily


Popular posts from this blog


What is Social Engineering? Attacks, Techniques & Prevention What is social engineering? Social engineering is the art of tampering with the users of a computer system to reveal a confidential system that can be used to gain unauthorized access to a computer system. The term may also include activities such as accessing restricted access buildings to use human kindness, greed and curiosity, or having users install backdoor software. Knowing the tricks used by hackers to protect computer systems is necessary to provide users with important login information among others. In this tutorial, we will introduce you to common social engineering techniques and how you can find security measures to counter them. Topics covered in this tutorial How does social engineering work? General Social Engineering Techniques Social Engineering Countermeasures How does social engineering work? How to hack using social engineering here, Gather Information: This is the

7 Excellent Websites for Checking Google Keyword Rankings

7 Excellent Websites for Checking Google Keyword Rankings 7 accurate and modern Google status verification tools: Semrush AccuRanker Ahrefs SERPWatcher Google Rank Checker SERP Keyword Ranking Verifier SEOC within corrective range 1. Semersh Google keyword status checker SEMrush is my favorite tool on this list because it is a complete solution for keyword testing. You can enter individual URLs for the URL of your website or blog post, and it will show you the keywords you are currently ranking for. You can click on any resulting keyword to verify the competition of keywords and other details. It is compatible with Google (you can select Google search based on your geographic destination area) and Bing search as well. The ", Semrush has its cover. Simply add your domain name to the URL field, and it will show you all the keywords you are currently ranking. Sushr is a professional software that is easy to use, and you can try it for a few weeks before Decide if

What is Hacking? Introduction & Types

What is Hacking? Introduction & Types Hacking Hacking is identifying weakness in computer systems or networks to take advantage of its weaknesses to realize access. Example of Hacking: Using password cracking algorithm to realize access to a system Computers became mandatory to run a successful businesses. it's not enough to possess isolated computers systems; they have to be networked to facilitate communication with external businesses. This exposes them to the surface world and hacking. Hacking means using computers to commit fraudulent acts like fraud, privacy invasion, stealing corporate/personal data, etc. Cyber crimes cost many organizations many dollars per annum . Businesses got to protect themselves against such attacks. In this tutorial, we'll learn- Common Hacking Terminologies What is Cyber Crime? Types of Cyber Crime What is Ethical Hacking? Why Ethical Hacking? Legality of Ethical Hacking Summary Before we go any longer , let’s check