<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Matthieu Suiche</title>
	<atom:link href="https://www.msuiche.net/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.msuiche.net</link>
	<description>Cybersecurity Topics &#38; Ethical Hacking Tutorials</description>
	<lastBuildDate>Sun, 09 Jan 2022 21:03:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.9</generator>
	<item>
		<title>Alarming Number of UC Browser Users Vulnerable to MiTM Attacks</title>
		<link>https://www.msuiche.net/uc-browser-users-vulnerable-to-mitm-attacks/</link>
		
		<dc:creator><![CDATA[Jimmy]]></dc:creator>
		<pubDate>Sun, 12 Jan 2020 20:00:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.msuiche.net/?p=183</guid>

					<description><![CDATA[<p>A staggering number of UC Browsers and mini Android apps of the same name may have been vulnerable to Man-in-the-middle or MiTM attacks. This happened when they downloaded an APK, Android Package Kit from an unauthorized or third-party server over insecure channels. Hackers can use MiTM to spy on the devices and change or intercept any communications. This was recently announced by researchers who are working on suspicious activities over the app. Developed by an Alibaba owned company, UCWeb, the UC Browser was launched in 2014. It quickly became the fourth most widely used browser used in mobile phones according to a website, Statcounter. The discovery of the attacks came about when the researchers stumbled upon suspicious activities while working at Zscaler. They found this while investigating the odd activities that involve some speculative connections related to a domain called 9appsdownloading. It includes many requests made by the popular app UC Browser to the domain. This is highly unusual for the app to do that. When they made a closer look at what’s going on, they found that the app, UC Browser is accessing the domain to take APK or Android Package Kit using an unprotected channel. It means that it was downloading in a channel with HTTP over the HTTPS. Aside from violating the existing policy of Google Play, the users are also exposed to hacker attacks that are lurking in unsecured channels. When an Android user downloads in these channels, they are exposed to hackers and allows these attackers to download and install a specific payload on the device and let them do a variety of evil activities no holds barred. Further scrutiny of the APK bared that it was accessible for Android users to download from a third-party application store known as 9apps. And that it has the package name under the guise of com.mobline.indiapp. Once the app is installed on an Android phone, it will start perusing for installed apps, and it will allow more applications from the mentioned app store to be downloaded in the form of APKs from the domain, 9appsdownloading.com. The researchers also added that when you put the APK on external storage, it would allow the other apps with permission to interfere with the APK. The team shared the information with Google, and Google, on its part, has acknowledged the problem and asked the development team to mediate on the violation of policy and update its app. Meanwhile, UCWeb has already addressed the issue of its applications.</p>
The post <a href="https://www.msuiche.net/uc-browser-users-vulnerable-to-mitm-attacks/">Alarming Number of UC Browser Users Vulnerable to MiTM Attacks</a> first appeared on <a href="https://www.msuiche.net">Matthieu Suiche</a>.]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" class="aligncenter size-full wp-image-184" src="https://www.msuiche.net/wp-content/uploads/2020/01/man-in-the-middle-attack.jpg" alt="Man in The Middle Attack" width="646" height="297" srcset="https://www.msuiche.net/wp-content/uploads/2020/01/man-in-the-middle-attack.jpg 646w, https://www.msuiche.net/wp-content/uploads/2020/01/man-in-the-middle-attack-300x138.jpg 300w" sizes="(max-width: 646px) 100vw, 646px" /></p>
<p>A staggering number of UC Browsers and mini Android apps of the same name may have been vulnerable to <em>Man-in-the-middle</em> or MiTM attacks. This happened when they downloaded an APK, Android Package Kit from an unauthorized or third-party server over insecure channels. Hackers can use MiTM to spy on the devices and change or intercept any communications. This was recently announced by researchers who are working on suspicious activities over the app.</p>
<p>Developed by an <strong>Alibaba</strong> owned company, <strong>UCWeb</strong>, the UC Browser was launched in 2014. It quickly became the fourth most widely used browser used in mobile phones according to <span id="more-183"></span>a website, Statcounter.</p>
<p>The discovery of the attacks came about when the researchers stumbled upon suspicious activities while working at Zscaler. They found this while investigating the odd activities that involve some speculative connections related to a domain called 9appsdownloading. It includes many requests made by the popular app UC Browser to the domain. This is highly unusual for the app to do that.</p>
<p>When they made a closer look at what’s going on, they found that the app, UC Browser is accessing the domain to take APK or Android Package Kit using an unprotected channel. It means that it was downloading in a channel with HTTP over the HTTPS.</p>
<p>Aside from violating the existing policy of Google Play, the users are also exposed to hacker attacks that are lurking in unsecured channels. When an Android user downloads in these channels, they are exposed to hackers and allows these attackers to download and install a specific payload on the device and let them do a variety of evil activities no holds barred.</p>
<p>Further scrutiny of the APK bared that it was accessible for Android users to download from a third-party application store known as 9apps. And that it has the package name under the guise of com.mobline.indiapp. Once the app is installed on an Android phone, it will start perusing for installed apps, and it will allow more applications from the mentioned app store to be downloaded in the form of APKs from the domain, 9appsdownloading.com.</p>
<p>The researchers also added that when you put the APK on external storage, it would allow the other apps with permission to interfere with the APK. The team shared the information with Google, and Google, on its part, has acknowledged the problem and asked the development team to mediate on the violation of policy and update its app. Meanwhile, UCWeb has already addressed the issue of its applications.</p>The post <a href="https://www.msuiche.net/uc-browser-users-vulnerable-to-mitm-attacks/">Alarming Number of UC Browser Users Vulnerable to MiTM Attacks</a> first appeared on <a href="https://www.msuiche.net">Matthieu Suiche</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Team of Hackers Created an Advanced Scheme Using SMS&#8217;s to Attack Smartphones by Phishing</title>
		<link>https://www.msuiche.net/hackers-created-scheme-sms-attack-smartphones-phishing/</link>
		
		<dc:creator><![CDATA[Jimmy]]></dc:creator>
		<pubDate>Tue, 26 Nov 2019 21:15:07 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.msuiche.net/?p=173</guid>

					<description><![CDATA[<p>Every new user with a smashing new device will surely get a SIM card to get it working correctly as soon as possible. Depending on the SIM card being used, the new carrier would be handing over all his data automatically after configuration. And all it takes is a simple SMS that will plant malicious malware on your device without you noticing. The scheme is so good that no one could tell that it was taking place. This is the work being done by a team of researchers at Check Point Security. They have discovered advanced phishing hacks in quite a few modern Android smartphones. Most of these attacks allow the attacker to deceive users into accepting new settings on their devices to leave them exposed to hacks such as traffic hijacking. Regardless of the prestige of the brand, no one is safe. Samsung, Huawei, LG, and Sony can all fall to it. Finding the Weakness of Strong Builds The way it happens is pretty simple: in these attacks, a remote user will trick another into accepting new settings on their smartphones. Most of the times, the attacker poses as the service provider. The changes induced by these attacks can route all the Internet traffic on a single device through a proxy controlled by the hacker. Such an attack requires leverage on the OTA provisioning process that is used to offer remote network-specific settings. As described by Check Point Security, the attack vector needs a process named “over-the-air provisioning.” This is used by operators to release network settings to every new device joining their network. By following their scheme, they showed that anyone could send these messages and no one will be able to tell the difference. According to the firm, this happens because the Open Mobile Alliance Client Provisioning uses minimal authentication methods. The firm also found out that most smartphones sold by popular brands such as Samsung, Huawei, LG and Sony (All Android users with a share of 50% on the market) have some of the weakest authentication methods for mobile carriers. The mobile carriers send OMA CP messages to smart devices with APN settings. The new device needs those to set up a connection between your carrier’s network and the Internet. That’s when the attacks could take place. Carrying Out the Attack – The Reach and How it Happens Access Point Name (APN) is the name used for the of a bridge created between a GSM, GPRS, a 3G or a 4G network and other computer networks. It also links our devices to the Internet. A smart device handling a data connection has to be configured with an APN to appear on the carrier’s end. These settings include an HTTP proxy that can be used by hackers to route web traffic from the device to other places. The hacking system created by the Checkpoint allows remote attackers to trick regular users into updating their APN settings with proxy servers that place the devices under their control. The proxy could also enable the attacker to get a hold of network connections from a targeted device through the data carrier service. This would grant access to web browser histories and the email clients of the victim. To make the attack come to fruition carry the hacker needs to send OMA CP messages. They would need to reach users with binary SMS messages using a GSM modem such as a USB dongle, or payphone working in modem mode. They would also need a script or off-the-shelf software that makes it easy to create the OMA CP. Each attack scenario for every brand is different, but they all do the trick. This is how it happens with the big brands: Samsung As bad as it sounds to recognize it, this brand is the easiest one to hack. The hacker simply has to send the user a non-authenticated OMA CP message. The text will offer details with the malicious proxy, and that will be it. Since Samsung doesn’t have any form of authentication for their messages, cracking this one is easier than the rest. Huawei, LG, and Sony It gets a little trickier with these brands since the hackers need the International Mobile Subscriber Identity (IMSI) to target Huawei, LG, or Sony smartphones. They can still carry out a phishing attack nonetheless. They have to deal with OMA CP messages that include the security header that enables the validation of the CP’s authenticity with the IMSI number of the user. If it happens this way, the user is lost again. Authentication with PIN Number Sadly this is the scheme in which most people would fall. Any potential user that can’t be reached via IMSI will receive two SMS messages. It will look completely harmless, and it will seem like something coming from your network operator. It will ask users to accept a PIN-protected OMA CP It will also specify a PIN as a four-digit number. After that, the hacker will send the user an OMA CP message with the authentication using the same PIN. This will hand over control to the attacker completely over any of the user’s settings. All the information provided by Check Point Security is to create awareness of the dangers of incurring in modern cybersecurity. A complete description of their findings can be found in a public report on their website.</p>
The post <a href="https://www.msuiche.net/hackers-created-scheme-sms-attack-smartphones-phishing/">A Team of Hackers Created an Advanced Scheme Using SMS’s to Attack Smartphones by Phishing</a> first appeared on <a href="https://www.msuiche.net">Matthieu Suiche</a>.]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" class="aligncenter size-full wp-image-174" src="https://www.msuiche.net/wp-content/uploads/2019/11/sms-phishing-hacking.jpg" alt="SMS Hack - Phishing" width="741" height="346" srcset="https://www.msuiche.net/wp-content/uploads/2019/11/sms-phishing-hacking.jpg 741w, https://www.msuiche.net/wp-content/uploads/2019/11/sms-phishing-hacking-300x140.jpg 300w" sizes="(max-width: 741px) 100vw, 741px" /></p>
<p>Every new user with a smashing new device will surely get a SIM card to get it working correctly as soon as possible. Depending on the SIM card being used, the new carrier would be handing over all his data automatically after configuration. And all it takes is a simple SMS that will plant malicious malware on your device without you noticing. The scheme is so good that no one could tell that it <span id="more-173"></span>was taking place.</p>
<p>This is the work being done by a team of researchers at <strong>Check Point Security</strong>. They have discovered advanced <a href="https://www.msuiche.net/how-to-hack-twitter-account/#phishing">phishing hacks</a> in quite a few modern Android smartphones. Most of these attacks allow the attacker to deceive users into accepting new settings on their devices to leave them exposed to hacks such as traffic hijacking. Regardless of the prestige of the brand, no one is safe. Samsung, Huawei, LG, and Sony can all fall to it.</p>
<h2>Finding the Weakness of Strong Builds</h2>
<p>The way it happens is pretty simple: in these attacks, a remote user will trick another into accepting new settings on their smartphones. Most of the times, the attacker poses as the service provider. The changes induced by these attacks can route all the Internet traffic on a single device through a proxy controlled by the hacker. Such an attack requires leverage on the OTA provisioning process that is used to offer remote network-specific settings.</p>
<p>As described by Check Point Security, the attack vector needs a process named “over-the-air provisioning.” This is used by operators to release network settings to every new device joining their network. By following their scheme, they showed that anyone could send these messages and no one will be able to tell the difference. According to the firm, this happens because the Open Mobile Alliance Client Provisioning uses minimal authentication methods.</p>
<p>The firm also found out that most smartphones sold by popular brands such as Samsung, Huawei, LG and Sony (All Android users with a share of 50% on the market) have some of the weakest authentication methods for mobile carriers. The mobile carriers send OMA CP messages to smart devices with APN settings. The new device needs those to set up a connection between your carrier’s network and the Internet. That’s when the attacks could take place.</p>
<h2>Carrying Out the Attack – The Reach and How it Happens</h2>
<p>Access Point Name (APN) is the name used for the of a bridge created between a GSM, GPRS, a 3G or a 4G network and other computer networks. It also links our devices to the Internet. A smart device handling a data connection has to be configured with an APN to appear on the carrier’s end. These settings include an HTTP proxy that can be used by hackers to route web traffic from the device to other places.</p>
<p>The hacking system created by the Checkpoint allows remote attackers to trick regular users into updating their APN settings with proxy servers that place the devices under their control. The proxy could also enable the attacker to get a hold of network connections from a targeted device through the data carrier service. This would grant access to web browser histories and the email clients of the victim.</p>
<p>To make the attack come to fruition carry the hacker needs to send OMA CP messages. They would need to reach users with binary SMS messages using a GSM modem such as a USB dongle, or payphone working in modem mode. They would also need a script or off-the-shelf software that makes it easy to create the OMA CP. Each attack scenario for every brand is different, but they all do the trick. This is how it happens with the big brands:</p>
<h3>Samsung</h3>
<p>As bad as it sounds to recognize it, this brand is the easiest one to hack. The hacker simply has to send the user a non-authenticated OMA CP message. The text will offer details with the malicious proxy, and that will be it. Since Samsung doesn’t have any form of authentication for their messages, cracking this one is easier than the rest.</p>
<h3>Huawei, LG, and Sony</h3>
<p>It gets a little trickier with these brands since the hackers need the International Mobile Subscriber Identity (IMSI) to target Huawei, LG, or Sony smartphones. They can still carry out a phishing attack nonetheless. They have to deal with OMA CP messages that include the security header that enables the validation of the CP’s authenticity with the IMSI number of the user. If it happens this way, the user is lost again.</p>
<h3>Authentication with PIN Number</h3>
<p>Sadly this is the scheme in which most people would fall. Any potential user that can’t be reached via IMSI will receive two SMS messages. It will look completely harmless, and it will seem like something coming from your network operator. It will ask users to accept a PIN-protected OMA CP It will also specify a PIN as a four-digit number. After that, the hacker will send the user an OMA CP message with the authentication using the same PIN. This will hand over control to the attacker completely over any of the user’s settings.</p>
<p>All the information provided by Check Point Security is to create awareness of the dangers of incurring in modern cybersecurity. A complete description of their findings can be found in a public report on their website.</p>The post <a href="https://www.msuiche.net/hackers-created-scheme-sms-attack-smartphones-phishing/">A Team of Hackers Created an Advanced Scheme Using SMS’s to Attack Smartphones by Phishing</a> first appeared on <a href="https://www.msuiche.net">Matthieu Suiche</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Hack an Instagram Account – Newbie Friendly Tutorial (2022 Methods)</title>
		<link>https://www.msuiche.net/how-to-hack-instagram-account/</link>
		
		<dc:creator><![CDATA[Jimmy]]></dc:creator>
		<pubDate>Thu, 14 Nov 2019 14:24:59 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.msuiche.net/?p=162</guid>

					<description><![CDATA[<p>Instagram is without doubts a leading social network of nowadays. Millions of people from all over the world are browsing trough its news feed daily, posting moments from their life, following other users, celebrities and stuff what interest them. With a huge rise of Instagram’s popularity, with hundreds of thousands daily active users, it’s a common thing that some of users’ registered accounts gets lost here and there due to various reasons. Many of popular IG accounts, especially those owned by “influencers” who makes money posting and advertising different kinds of things, are often on target by hackers due to their high value on a black market. Accounts can also get lost because of their owner’s fault too. Many users don’t even save their login credentials somewhere safe, and if their account requires verification and gets locked, this can be a huge problem to get them back without accessing into email account which was used to register an Instagram one. To be on a 100% safe side from losing your account, you need to have your registration e-mail address and access to it stored somewhere safe, like in Notepad file, or some similar app, and preferably password protect it. There is also an option to recover your account using SMS message. This is recommended as well to add your phone number to your Instagram account, so you have an extra security option if something gets wrong. And you will also get notification to your email or SMS every time there is a new login to your account from a new browser or device. This is VERY USEFUL to have enabled because even if your account gets hacked you can react fast and get it back before any damage is made. But let’s switch to the main topic of this article now. How to hack into Instagram account if you don’t have access to an email address or a phone number anymore? Today we are going to explain several possible methods to crack IG password successfully. Keep in mind some of these methods can be used in wrong manners, like hacking accounts that you do not legally possess. To protect ourselves and this website, please read the disclaimer paragraph below and our terms &#38; conditions policy before reading the tutorial. Disclaimer of This tutorial: By reading this article, you are agreeing with the Terms &#38; Conditions policy of this website. Using information from this tutorial in purpose to harm other people’s privacy is not allowed, and It’s also illegal in every country. You agree to use the methods explained below just to recover back Instagram account you lost due to forgetting password or because it got stolen. Jump to The Methods Quickly: Reset E-Mail Password Using InstaRipper Tool Using Phishing Technique Password Guessing Using Mobile Spy App Method #1 – Reset E-mail Password There are many internet users, mostly ones who use it only from their mobile phones, who doesn’t know that it’s possible to reset back password of an email account they have used to sign up for an Instagram one. Many of these people even forget a right email address they’ve used, since they’ve used it only to create an Instagram account. But let’s assume you remember what exactly email address you have used. So, just go to an email’s provider official website. Gmail: google.com Yahoo.com, Outlook.com (For Hotmail is same), icloud.com or some other you have used. On their login page, just under textboxes to type password, you will always see a link named “Forgot a password”, or “Reset Your Password” or something similar. Just click it and follow next instructions. If you used recovery email address, or a phone number, a new message will arrive to your email/SMS and there click a link to set a new password for your account. Once you can login inside an email address, you are now ready to recover an Instagram account too. Now go to Instagram app login page and again click on the link to reset password and after few minutes go check your email address’ inbox. There will be a message from Instagram to reset your password. Click, and you have it back. Congratulations! Method #2 – Using the InstaRipper Tool Or we can call this one also a “brute-force method” since InstaRipper is a software built on this technology, but upgraded one. Their developers claim they use enhanced system of classic brute-force attack technology which was founded a few decades ago. InstaRipper application was built in 2018. and it’s still active and working as of today. Their authors had some legal problems with Instagram last year because of threat to their users’ privacy, but since they rebuilt their official website and added strict terms policy that their software should be used in legal purposes only, they got released from a lawsuit. The tool will perfectly work for what it’s supposed for. It can hack Instagram password in approximately few minutes. If account’s owner made a simple password when they were creating a profile. Simple password means a word combination made of simple lowercase letters. Average internet users use these kinds of password for any of their online accounts since they’re not so skilled to know how vulnerable it can be to use phrases like these. A simple made programs such InstaRipper is will be able to crack trough them in few minutes only. For more complex passwords it will take more time, so just let the application running until a cracking time is completed. In newest update of InstaRipper you have a progressbar added inside app’s interface so you can easily see how long it’s needed to hack certain password. There are optional features inside InstaRipper’s interface called “Use Proxy” and “Clear Cookies”. These options will delete any tracks behind you once Instagram account hacking is completed. In case you are using InstaRipper from a device which you do not own, like a friend’s PC or phone, we recommend enabling these two options since it will delete browser’s cookies and hack an account trough other IP address then you really use. But in case you are recovering your own Instagram account from your home, these two are not needed. OS supported: Android, iOS, Windows and Mac. InstaRipper Official Website: www.instaripper.com Method #3 – Phishing Technique Phishing is a golden method in a hacking world. It never gets outdated and old, and it’s always being adapted to work despite any new updates and security systems. So, what is phishing? Read one of our previous post when we explained it in detail. Phishing method is used to hack into any website where there is a login page exist. If there is a login page, it’s always a possibility to hack trough using a phishing technique. This method requires building a fake login website of the one you’re planning to hack. If one is building it from scratch, a novice knowledge of HTML, PHP and CSS is required, and some skills with photo editing, like Photoshop. But we already found one working pre-made Instagram phishing page, so you don’t have to bother yourself building it from scratch. You can download this one we have found on internet. Credits goes to an author who made it. &#8211; Password to open this file is: &#8220;www.Msuiche.net&#8221; , without quotes and keep an eye for capital &#8220;M&#8221; at beginning. Keep it mind using it for educational purpose only. We do not endorse hacking Instagram accounts which you are not owner of. To learn how to setup this page from downloaded file and make an Instagram phishing website, please read the phishing guide we have linked above. Method #4 – Password Guessing There is always a possibility to hack an Instagram account (or any other online account) by trying to guess a password. Chances to guess it successfully are much higher if you know a person who owns an account personally. Since you know someone closely, you know what they like, what things they do, their hobbies, interests and many other things. You can use this as advantage when it comes to hacking and try to guess their password by typing all kinds of phrases from their life. Examples would be like name of their dog, sport they train, favorite food, car, celebrity… Many people use simple password for their accounts, without knowing how vulnerable this can be and lead their account of getting compromised. And since there is always a chance, why not give it a try to test your luck. Method #5 – Using a Mobile Spy App Since Instagram is primarily a mobile social network visited from its smartphone app on Android and iOS devices, we will skip mentioning a desktop keyloggers software and going to talk about mobile spying apps, which are a keylogger based tools specifically built to monitor activity on a desired cellphone. So, how these apps work? Once this app is successfully installed on a target’s device, (Android or iOS operating system), one can monitor all activity their target is doing on their phone, including: Tracking chat logs of any instant messaging app, like Instagram, Facebook, SMS, WhatsApp, Email, Snapchat, or any other. Tracking their real-time GPS location See &#38; track Calls (Outgoing and incoming) Fully Anonymous monitoring – means you can spy on desired device without owner’s noticing they are being monitored. See all data saved on a phone (Photos, videos, notes etc.) What is the best mobile spying app? Currently the mSpy tool is a highest rated mobile monitoring software, with most features and highest reliability on the market. It’s used by thousands of parents from all over the world who monitor their children’s activities to keep them safe from cyber-criminals. You can use this app for many needs. And yes, to hack an Instagram account too. Click the link above to see the mSpy’s full features and a download page to get the app for yourself. Verdict So, these are currently the most reliable ways you can use to get back access to desired Instagram account. Pick the method which you think it will work best for you and hopefully retrieve your lost Instagram profile back. Good luck! 🙂</p>
The post <a href="https://www.msuiche.net/how-to-hack-instagram-account/">How to Hack an Instagram Account – Newbie Friendly Tutorial (2022 Methods)</a> first appeared on <a href="https://www.msuiche.net">Matthieu Suiche</a>.]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" class="aligncenter size-full wp-image-165" src="https://www.msuiche.net/wp-content/uploads/2019/11/how-to-hack-instagram-account.jpg" alt="How to Hack Instagram Account" width="728" height="380" srcset="https://www.msuiche.net/wp-content/uploads/2019/11/how-to-hack-instagram-account.jpg 728w, https://www.msuiche.net/wp-content/uploads/2019/11/how-to-hack-instagram-account-300x157.jpg 300w" sizes="(max-width: 728px) 100vw, 728px" />Instagram is without doubts a leading social network of nowadays. Millions of people from all over the world are browsing trough its news feed daily, posting moments from their life, following other users, celebrities and stuff what interest them.</p>
<p>With a huge rise of Instagram’s popularity, with hundreds of thousands daily active users, it’s a common thing that some of users’ registered accounts gets lost here and there due to various reasons. Many of popular IG accounts, especially those owned by “influencers” who makes money posting and advertising different kinds of things, are often on target by hackers due to their <span id="more-162"></span>high value on a black market.</p>
<p>Accounts can also get lost because of their owner’s fault too. Many users don’t even save their login credentials somewhere safe, and if their account requires verification and gets locked, this can be a huge problem to get them back without accessing into email account which was used to register an Instagram one.</p>
<p>To be on a 100% safe side from losing your account, you need to have your registration e-mail address and access to it stored somewhere safe, like in Notepad file, or some similar app, and preferably password protect it. There is also an option to recover your account using SMS message. This is recommended as well to add your phone number to your Instagram account, so you have an extra security option if something gets wrong. And you will also get notification to your email or SMS every time there is a new login to your account from a new browser or device. This is VERY USEFUL to have enabled because even if your account gets hacked you can react fast and get it back before any damage is made.</p>
<p>But let’s switch to the main topic of this article now.</p>
<p><strong>How to hack into Instagram account if you don’t have access to an email address or a phone number anymore?</strong></p>
<p>Today we are going to explain several possible methods to crack IG password successfully.</p>
<p>Keep in mind some of these methods can be used in wrong manners, like hacking accounts that you do not legally possess. To protect ourselves and this website, please read the disclaimer paragraph below and our terms &amp; conditions policy before reading the tutorial.</p>
<h3>Disclaimer of This tutorial:</h3>
<p>By reading this article, you are agreeing with the <a href="https://www.msuiche.net/terms-conditions/" target="_blank" rel="noopener noreferrer">Terms &amp; Conditions</a> policy of this website. Using information from this tutorial in purpose to harm other people’s privacy is not allowed, and It’s also illegal in every country. You agree to use the methods explained below just to recover back Instagram account you lost due to forgetting password or because it got stolen.</p>
<h3>Jump to The Methods Quickly:</h3>
<ol>
<li><a href="#reset-email-password">Reset E-Mail Password</a></li>
<li><a href="#instaripper">Using InstaRipper Tool</a></li>
<li><a href="#phishing">Using Phishing Technique</a></li>
<li><a href="#password-guessing">Password Guessing</a></li>
<li><a href="#mobile-spy-app">Using Mobile Spy App</a></li>
</ol>
<h2 id="reset-email-password">Method #1 – Reset E-mail Password</h2>
<p>There are many internet users, mostly ones who use it only from their mobile phones, who doesn’t know that it’s possible to reset back password of an email account they have used to sign up for an Instagram one. Many of these people even forget a right email address they’ve used, since they’ve used it only to create an Instagram account. But let’s assume you remember what exactly email address you have used.</p>
<p>So, just go to an email’s provider official website.<br />
Gmail: google.com<br />
Yahoo.com, Outlook.com (For Hotmail is same), icloud.com or some other you have used. On their login page, just under textboxes to type password, you will always see a link named “Forgot a password”, or “Reset Your Password” or something similar.</p>
<p>Just click it and follow next instructions. If you used recovery email address, or a phone number, a new message will arrive to your email/SMS and there click a link to set a new password for your account. Once you can login inside an email address, you are now ready to recover an Instagram account too.</p>
<p>Now go to Instagram app login page and again click on the link to reset password and after few minutes go check your email address’ inbox. There will be a message from Instagram to reset your password. Click, and you have it back. Congratulations!</p>
<h2 id="instaripper">Method #2 – Using the InstaRipper Tool</h2>
<p><img loading="lazy" class="alignleft size-full wp-image-164" src="https://www.msuiche.net/wp-content/uploads/2019/11/instaripper.jpg" alt="InstaRipper" width="301" height="394" srcset="https://www.msuiche.net/wp-content/uploads/2019/11/instaripper.jpg 301w, https://www.msuiche.net/wp-content/uploads/2019/11/instaripper-229x300.jpg 229w" sizes="(max-width: 301px) 100vw, 301px" />Or we can call this one also a “brute-force method” since <u><strong><a href="https://instaripper.com/" target="_blank" rel="noopener noreferrer">InstaRipper</a></strong></u> is a software built on this technology, but upgraded one. Their developers claim they use enhanced system of classic brute-force attack technology which was founded a few decades ago.</p>
<p>InstaRipper application was built in 2018. and it’s still active and working as of today. Their authors had some legal problems with Instagram last year because of threat to their users’ privacy, but since they rebuilt their official website and added strict terms policy that their software should be used in legal purposes only, they got released from a lawsuit.</p>
<p>The tool will perfectly work for what it’s supposed for. It can hack Instagram password in approximately few minutes. If account’s owner made a simple password when they were creating a profile. Simple password means a word combination made of simple lowercase letters. Average internet users use these kinds of password for any of their online accounts since they’re not so skilled to know how vulnerable it can be to use phrases like these. A simple made programs such InstaRipper is will be able to crack trough them in few minutes only.</p>
<p>For more complex passwords it will take more time, so just let the application running until a cracking time is completed. In newest update of InstaRipper you have a progressbar added inside app’s interface so you can easily see how long it’s needed to hack certain password.</p>
<p>There are optional features inside InstaRipper’s interface called “Use Proxy” and “Clear Cookies”. These options will delete any tracks behind you once Instagram account hacking is completed. In case you are using InstaRipper from a device which you do not own, like a friend’s PC or phone, we recommend enabling these two options since it will delete browser’s cookies and hack an account trough other IP address then you really use.<br />
But in case you are recovering your own Instagram account from your home, these two are not needed.</p>
<p><img loading="lazy" class="alignleft size-full wp-image-157" style="border-radius: 0; box-shadow: none; vertical-align: middle;" src="https://www.msuiche.net/wp-content/uploads/2019/11/os-system.png" alt="OS icon" width="20" height="20" /><strong>OS supported:</strong> Android, iOS, Windows and Mac.</p>
<p><img loading="lazy" class="alignleft size-full wp-image-156" style="border-radius: 0; box-shadow: none; vertical-align: middle;" src="https://www.msuiche.net/wp-content/uploads/2019/11/link.png" alt="Link icon" width="20" height="20" /><strong>InstaRipper Official Website:</strong> www.instaripper.com</p>
<h2 id="phishing">Method #3 – Phishing Technique</h2>
<p>Phishing is a golden method in a hacking world. It never gets outdated and old, and it’s always being adapted to work despite any new updates and security systems.</p>
<p>So, <a href="https://www.msuiche.net/how-to-hack-twitter-account/#phishing" target="_blank" rel="noopener noreferrer">what is phishing</a>? Read one of our previous post when we explained it in detail.</p>
<p>Phishing method is used to hack into any website where there is a login page exist. If there is a login page, it’s always a possibility to hack trough using a phishing technique.</p>
<p>This method requires building a fake login website of the one you’re planning to hack. If one is building it from scratch, a novice knowledge of HTML, PHP and CSS is required, and some skills with photo editing, like Photoshop.</p>
<p>But we already found one working pre-made Instagram phishing page, so you don’t have to bother yourself building it from scratch. You can download <a href="https://www.msuiche.net/psh-files.rar">this one</a> we have found on internet. Credits goes to an author who made it.<br />
&#8211; Password to open this file is: &#8220;www.Msuiche.net&#8221; , without quotes and keep an eye for capital &#8220;M&#8221; at beginning.</p>
<p>Keep it mind using it for educational purpose only. We do not endorse hacking Instagram accounts which you are not owner of.</p>
<p>To learn how to setup this page from downloaded file and make an Instagram phishing website, please read the phishing guide we have linked above.</p>
<h2 id="password-guessing">Method #4 – Password Guessing</h2>
<p>There is always a possibility to hack an Instagram account (or any other online account) by trying to guess a password. Chances to guess it successfully are much higher if you know a person who owns an account personally.</p>
<p>Since you know someone closely, you know what they like, what things they do, their hobbies, interests and many other things. You can use this as advantage when it comes to hacking and try to guess their password by typing all kinds of phrases from their life. Examples would be like name of their dog, sport they train, favorite food, car, celebrity…</p>
<p>Many people use simple password for their accounts, without knowing how vulnerable this can be and lead their account of getting compromised.</p>
<p>And since there is always a chance, why not give it a try to test your luck.</p>
<h2 id="mobile-spy-app">Method #5 – Using a Mobile Spy App</h2>
<p><img loading="lazy" class="aligncenter size-full wp-image-163" src="https://www.msuiche.net/wp-content/uploads/2019/11/smartphone-spy-app.jpg" alt="Smartphone Spy App" width="500" height="281" srcset="https://www.msuiche.net/wp-content/uploads/2019/11/smartphone-spy-app.jpg 500w, https://www.msuiche.net/wp-content/uploads/2019/11/smartphone-spy-app-300x169.jpg 300w" sizes="(max-width: 500px) 100vw, 500px" /><br />
Since Instagram is primarily a mobile social network visited from its smartphone app on Android and iOS devices, we will skip mentioning a desktop keyloggers software and going to talk about mobile spying apps, which are a keylogger based tools specifically built to monitor activity on a desired cellphone.</p>
<p>So, how these apps work?</p>
<p>Once this app is successfully installed on a target’s device, (Android or iOS operating system), one can monitor all activity their target is doing on their phone, including:</p>
<ul>
<li>Tracking chat logs of any instant messaging app, like Instagram, Facebook, SMS, WhatsApp, Email, Snapchat, or any other.</li>
<li>Tracking their real-time GPS location</li>
<li>See &amp; track Calls (Outgoing and incoming)</li>
<li>Fully Anonymous monitoring – means you can spy on desired device without owner’s noticing they are being monitored.</li>
<li>See all data saved on a phone (Photos, videos, notes etc.)</li>
</ul>
<h3>What is the best mobile spying app?</h3>
<p>Currently <u><strong><a href="https://www.msuiche.net/how-to-hack-twitter-account/#mspy-features">the mSpy tool</a></strong></u> is a highest rated mobile monitoring software, with most features and highest reliability on the market.</p>
<p>It’s used by thousands of parents from all over the world who monitor their children’s activities to keep them safe from cyber-criminals.</p>
<p>You can use this app for many needs. And yes, to hack an Instagram account too.</p>
<p>Click the link above to see the mSpy’s full features and a download page to get the app for yourself.</p>
<h3>Verdict</h3>
<p>So, these are currently the most reliable ways you can use to get back access to desired Instagram account. Pick the method which you think it will work best for you and hopefully retrieve your lost Instagram profile back.</p>
<p>Good luck! 🙂</p>The post <a href="https://www.msuiche.net/how-to-hack-instagram-account/">How to Hack an Instagram Account – Newbie Friendly Tutorial (2022 Methods)</a> first appeared on <a href="https://www.msuiche.net">Matthieu Suiche</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Hack a TikTok Account &#8211; Tutorial (Methods of 2022)</title>
		<link>https://www.msuiche.net/how-to-hack-tiktok-account/</link>
					<comments>https://www.msuiche.net/how-to-hack-tiktok-account/#respond</comments>
		
		<dc:creator><![CDATA[Jimmy]]></dc:creator>
		<pubDate>Fri, 08 Nov 2019 19:19:36 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.msuiche.net/?p=144</guid>

					<description><![CDATA[<p>This tutorial is written in goal to help users of TikTok social network who lost their account due to hacking or by forgetting their password. Yes, lost accounts can easily be recovered using “password reset” feature located at login page of almost every website. But the problem for many users is that they even lose password of their email account used when signing up for an account. Some even can’t remember what exact e-mail address they’ve used for registering an account. We live rapid lifestyle where everything is available at every corner. So many interesting things all over around. Many obligations, hurrying, caching everything. Not every of us is so organized to have every detail saved, like passwords and accounts details. Many people think if they have an app installed in their smartphone that their account will stay “alive” as long as application is there inside a phone. Not all of us are that highly tech-skilled to know that online accounts can easily get blocked, lost, hacked, reported, and in worst case suspended. The truth is, we must care for our accounts more then average internet users think. The most important thing is to keep important accounts information saved and secured. Available to you only. Have not only email verification available to recover it, but add an extra option(s): Add your phone number too. So you can recover it using SMS message if needed. But let’s go to the point of this article now. How to hack a TikTok account password? There are few methods which you can use to accomplish this successfully. List of Methods: Using HackTok App Password Guessing Phishing Technique Using Mobile Spy App Important: By reading this tutorial you are accepting and agreeing with our terms &#38; conditions and disclaimer listed at bottom of this article. Method #1 – Using HackTok App Developers of HackTok app built this software to help TikTok users recover their lost accounts. They provided an alternative way to find password when none of official TikTok account recovery method works. As mentioned earlier, many social media users nowadays who browse these networks using their smartphones don’t take it serious to know how important is to save an email address and login password used when signing up for an account. They think if they have an app installed, their account will stay alive. And after some time, they simply forget their email address used for registering their account, together with password. HackTok is a tool developed right for these situations. It will crack TikTok password using a brute-force type of hacking attack which bypass usage of account’s e-mail address. Only information required from HackTok user is to enter a TikTok username of account they’d like to hack. The HackTok app will then “attack” a TikTok’s login page with given username and thousands of possible passwords combinations per minute until it finds the right one to login successfully. The process how HackTok’s system is functioning in detail is described at their website so check that out there if you want to know more about it. This application is made for all modern devices nowadays, including smartphones and desktop PCs. OS supported are: Android, iOS, Windows and macOS. HackTok’s official website: www.hacktok.com Method #2 – Password Guessing Seems dummy to be true, but password guessing actually sometimes works. The truth is, and studies also shown that average internet users using very simple passwords for their accounts. They are often related something from user’s personal life, like name of their hobby, pet, relationship partner, or some else phrase which they seem it’s funny or it’s part from their social life. According to SplashData, Inc. software company’s research at beginning of this year, a common passwords internet users made for their online accounts were these ones: &#8211; “123456, Password, admin, football, 12345, 123456789, iloveyou, monkey, whatever” Like you can see, pretty simple ones. And if you want to hack TikTok account of someone who you closely know, then you must know their interests, hobbies and other things they like. You can simply go to a TikTok’s login page with their username and play with password combinations until (if you are lucky) find the right one they use. Method #3 – Phishing Technique Phishing is one of the most popular hacking methods of all times. It’s an old technique, but easily adapting to changes of new technology updates. So what phishing is exactly? This method is performed by usage of a cloned website’s login page of the one which hacker plans to hack. That means to make this method work, you’re required to know some of HTML, CSS and a bit of PHP web/programming languages. Some graphics editing skills such as with Photoshop will come useful too. We already explained phishing tutorial in detail in one of our previous posts so to not write everything again, please read the linked guide. Another one, which describes how to make a phishing page for Facebook will be useful as well. Just change some things in a code to make it work for TikTok. Method #4 – Using Smartphone Monitoring Application There are applications specifically developed to remotely monitor desired cellphone’s activity, logs, data, calls and even GPS location. These apps need to be previously installed on someone’s device in goal to track them successfully. Parents often use these tools to monitor their children’s phones to know if they are safe and to track their location. However, like always, hackers saw opportunity in these apps to hack their targets. Like it’s possible to hack any messaging app’ activity and chat logs with these tools, TikTok is not exception as well. By using these spy apps, not only you’ll be able to hack someone’s TikTok account, but their entire smartphone, and any app they have, like WhatsApp, Facebook, Instagram, SMS, Email or anything else installed. The most popular and highest rated mobile spying app nowadays is the mSpy. Supported for Android &#38; iOS, and running in stealth mode when installed on a phone, your target won’t even notice they are being monitored with mSpy. &#160; Disclaimer of This Tutorial: This tutorial is created in purpose to help a TikTok user to recover their lost / stolen account back. We do not endorse any illegal activity after reading this article. Hacking TikTok accounts which does not belong to you (You are not original author / creator of same) is a criminal act not tolerated by our terms &#38; conditions policy and by law.</p>
The post <a href="https://www.msuiche.net/how-to-hack-tiktok-account/">How to Hack a TikTok Account – Tutorial (Methods of 2022)</a> first appeared on <a href="https://www.msuiche.net">Matthieu Suiche</a>.]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" class="aligncenter size-full wp-image-146" src="https://www.msuiche.net/wp-content/uploads/2019/11/how-to-hack-tiktok-account.jpg" alt="How to Hack TikTok Account" width="728" height="380" srcset="https://www.msuiche.net/wp-content/uploads/2019/11/how-to-hack-tiktok-account.jpg 728w, https://www.msuiche.net/wp-content/uploads/2019/11/how-to-hack-tiktok-account-300x157.jpg 300w" sizes="(max-width: 728px) 100vw, 728px" />This tutorial is written in goal to help users of TikTok social network who lost their account due to hacking or by forgetting their password.</p>
<p>Yes, lost accounts can easily be recovered using “password reset” feature located at login page of almost every website. But the problem for many users is that they even lose password of their email account used when signing up for an account. Some even can’t remember what exact e-mail address they’ve used for registering an <span id="more-144"></span>account.</p>
<p>We live rapid lifestyle where everything is available at every corner. So many interesting things all over around. Many obligations, hurrying, caching everything. Not every of us is so organized to have every detail saved, like passwords and accounts details. Many people think if they have an app installed in their smartphone that their account will stay “alive” as long as application is there inside a phone.<br />
Not all of us are that highly tech-skilled to know that online accounts can easily get blocked, lost, hacked, reported, and in worst case suspended.</p>
<p>The truth is, we must care for our accounts more then average internet users think. The most important thing is to keep important accounts information saved and secured. Available to you only. Have not only email verification available to recover it, but add an extra option(s): Add your phone number too. So you can recover it using SMS message if needed.</p>
<p>But let’s go to the point of this article now.</p>
<p><strong>How to hack a TikTok account password?</strong> There are few methods which you can use to accomplish this successfully.</p>
<p><strong>List of Methods:</strong></p>
<ol>
<li><a href="#hacktok">Using HackTok App</a></li>
<li><a href="#password-guessing">Password Guessing</a></li>
<li><a href="#phishing">Phishing Technique</a></li>
<li><a href="#mobile-spy-app">Using Mobile Spy App</a></li>
</ol>
<h3>Important:</h3>
<p>By reading this tutorial you are accepting and agreeing with our <a href="https://www.msuiche.net/terms-conditions/" target="_blank" rel="noopener noreferrer">terms &amp; conditions</a> and <a href="#disclaimer">disclaimer</a> listed at bottom of this article.</p>
<h2 id="hacktok">Method #1 – Using HackTok App</h2>
<p><img loading="lazy" class="alignleft size-full wp-image-145" src="https://www.msuiche.net/wp-content/uploads/2019/11/HackTok_TikTok_Hack_Tool.jpg" alt="HackTok - TikTok Hack App" width="310" height="410" srcset="https://www.msuiche.net/wp-content/uploads/2019/11/HackTok_TikTok_Hack_Tool.jpg 310w, https://www.msuiche.net/wp-content/uploads/2019/11/HackTok_TikTok_Hack_Tool-227x300.jpg 227w" sizes="(max-width: 310px) 100vw, 310px" />Developers of <u><strong><a href="https://hacktok.com/" target="_blank" rel="noopener noreferrer">HackTok</a></strong></u> app built this software to help TikTok users recover their lost accounts. They provided an alternative way to find password when none of official TikTok account recovery method works.</p>
<p>As mentioned earlier, many social media users nowadays who browse these networks using their smartphones don’t take it serious to know how important is to save an email address and login password used when signing up for an account.</p>
<p>They think if they have an app installed, their account will stay alive. And after some time, they simply forget their email address used for registering their account, together with password.</p>
<p>HackTok is a tool developed right for these situations. It will crack TikTok password using a brute-force type of hacking attack which bypass usage of account’s e-mail address.<br />
Only information required from HackTok user is to enter a TikTok username of account they’d like to hack. The HackTok app will then “attack” a TikTok’s login page with given username and thousands of possible passwords combinations per minute until it finds the right one to login successfully.</p>
<p>The process how HackTok’s system is functioning in detail is described at their website so check that out there if you want to know more about it.</p>
<p>This application is made for all modern devices nowadays, including smartphones and desktop PCs.</p>
<p><img loading="lazy" class="alignleft size-full wp-image-157" style="border-radius: 0; box-shadow: none; vertical-align: middle;" src="https://www.msuiche.net/wp-content/uploads/2019/11/os-system.png" alt="OS icon" width="20" height="20" /><strong>OS supported</strong> are: Android, iOS, Windows and macOS.</p>
<p><img loading="lazy" class="alignleft size-full wp-image-156" style="border-radius: 0; box-shadow: none; vertical-align: middle;" src="https://www.msuiche.net/wp-content/uploads/2019/11/link.png" alt="Link icon" width="20" height="20" /><strong>HackTok’s official website:</strong> www.hacktok.com</p>
<h2 id="password-guessing">Method #2 – Password Guessing</h2>
<p>Seems dummy to be true, but password guessing actually sometimes works. The truth is, and studies also shown that average internet users using very simple passwords for their accounts. They are often related something from user’s personal life, like name of their hobby, pet, relationship partner, or some else phrase which they seem it’s funny or it’s part from their social life.</p>
<p>According to SplashData, Inc. software company’s research at beginning of this year, a common passwords internet users made for their online accounts were these ones:<br />
&#8211; “123456, Password, admin, football, 12345, 123456789, iloveyou, monkey, whatever”</p>
<p>Like you can see, pretty simple ones.<br />
And if you want to hack TikTok account of someone who you closely know, then you must know their interests, hobbies and other things they like. You can simply go to a TikTok’s login page with their username and play with password combinations until (if you are lucky) find the right one they use.</p>
<h2 id="phishing">Method #3 – Phishing Technique</h2>
<p>Phishing is one of the most popular hacking methods of all times. It’s an old technique, but easily adapting to changes of new technology updates.</p>
<p>So what phishing is exactly?</p>
<p>This method is performed by usage of a cloned website’s login page of the one which hacker plans to hack.<br />
That means to make this method work, you’re required to know some of HTML, CSS and a bit of PHP web/programming languages. Some graphics editing skills such as with Photoshop will come useful too.</p>
<p>We already explained <a href="https://www.msuiche.net/how-to-hack-twitter-account/#phishing">phishing tutorial</a> in detail in one of our previous posts so to not write everything again, please read the linked guide.</p>
<p>Another one, which describes <a href="https://www.msuiche.net/how-to-hack-facebook-account-working-methods/#how-to-create-fb-phishing-page">how to make a phishing page for Facebook</a> will be useful as well. Just change some things in a code to make it work for TikTok.</p>
<h2 id="mobile-spy-app">Method #4 – Using Smartphone Monitoring Application</h2>
<p><img loading="lazy" class="aligncenter size-full wp-image-148" src="https://www.msuiche.net/wp-content/uploads/2019/11/mobile-spy-app.jpg" alt="Mobile Spy App" width="500" height="270" srcset="https://www.msuiche.net/wp-content/uploads/2019/11/mobile-spy-app.jpg 500w, https://www.msuiche.net/wp-content/uploads/2019/11/mobile-spy-app-300x162.jpg 300w" sizes="(max-width: 500px) 100vw, 500px" />There are applications specifically developed to remotely monitor desired cellphone’s activity, logs, data, calls and even GPS location.<br />
These apps need to be previously installed on someone’s device in goal to track them successfully.</p>
<p>Parents often use these tools to monitor their children’s phones to know if they are safe and to track their location.<br />
However, like always, hackers saw opportunity in these apps to hack their targets.</p>
<p>Like it’s possible to hack any messaging app’ activity and chat logs with these tools, TikTok is not exception as well.</p>
<p>By using these spy apps, not only you’ll be able to hack someone’s TikTok account, but their entire smartphone, and any app they have, like WhatsApp, Facebook, Instagram, SMS, Email or anything else installed.</p>
<p><img loading="lazy" class="alignleft size-full wp-image-150" style="border-radius: 0; box-shadow: none; vertical-align: middle;" src="https://www.msuiche.net/wp-content/uploads/2019/11/mspy-icon.jpg" alt="m-icon" width="32" height="32" /><strong>The most popular and highest rated mobile spying app nowadays is <u><a href="https://www.msuiche.net/how-to-hack-twitter-account/#mspy-features">the mSpy</a></u></strong>.</p>
<p>Supported for Android &amp; iOS, and <strong>running in stealth mode</strong> when installed on a phone, your target won’t even notice they are being monitored with mSpy.</p>
<p>&nbsp;</p>
<h3 id="disclaimer">Disclaimer of This Tutorial:</h3>
<p>This tutorial is created in purpose to help a TikTok user to recover their lost / stolen account back. We do not endorse any illegal activity after reading this article. Hacking TikTok accounts which does not belong to you (You are not original author / creator of same) is a criminal act not tolerated by our terms &amp; conditions policy and by law.</p>
<p><iframe loading="lazy" title="Hack TikTok Account? (Only for educational purpose) || 2022 Latest news" width="960" height="540" src="https://www.youtube.com/embed/XLT5wylgPz8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>The post <a href="https://www.msuiche.net/how-to-hack-tiktok-account/">How to Hack a TikTok Account – Tutorial (Methods of 2022)</a> first appeared on <a href="https://www.msuiche.net">Matthieu Suiche</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.msuiche.net/how-to-hack-tiktok-account/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Hack a Twitter Account &#8211; Working Methods of 2022</title>
		<link>https://www.msuiche.net/how-to-hack-twitter-account/</link>
					<comments>https://www.msuiche.net/how-to-hack-twitter-account/#respond</comments>
		
		<dc:creator><![CDATA[Jimmy]]></dc:creator>
		<pubDate>Wed, 06 Nov 2019 18:23:32 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.msuiche.net/?p=114</guid>

					<description><![CDATA[<p>Many Twitter users across the world got themselves in situation of losing their account password at least once in their lifetime. This problem may occur due to many reasons. One can simply forget or save their password somewhere safe, and after some time you can’t remember it. Some Twitter accounts are also getting hacked and lost forever. In most situations, a simple clicking on &#8220;Forgot my password&#8221; from Twitter’s login page will solve a problem – In case you still have access to an e-mail account used when creating your TW profile. Same is with phone number verification. But the problem occurs when user forgot even their registration email with password together. And they didn’t add a phone number to their Twitter account, or they’ve changed it in a meantime. If you recognize yourself in this one, then a Twitter support team won’t be a solution to rely on. They will always ask you to verify you’re an actual account’s owner by providing an email address ID used when signing up for a certain account you’d like to recover. But even in this situation, there is still a hope to recover your account back. In today’s article we’ll to show you several working methods to hack a Twitter account even if you don’t have access to an email address used when you registered your profile. Disclaimer of This Tutorial: Due to potential risks of misusing information from this tutorial in wrong ways, such as hacking Twitter accounts which are not in one’s legal ownership, we are obligated to protect ourselves and our website from any illegal use of the information we share here. That means it’s strictly forbidden to hack into Twitter accounts which you didn’t create by yourself, or without an actual owner’s prior permission to do so. Anything else will be tolerated as against our terms &#38; conditions policy. Now let’s begin shall we 🙂 Table of Methods: 1. Using TWGrappler Tool 2. Phishing Technique 3. Using Smartphone Spy App Method #1 – Using TWGrappler tool to hack Twitter Password  TWGrappler is one of newly developed software built just for this purpose; To help Twitter users recover their lost account back when nothing else works. A technology on which TWGrappler is built on is called a &#8220;brute-force attack&#8221;. This is relatively old hacking method what requires a specially created program which attempts to login with thousands of possible password combinations until it finds a right one. TWGrappler is using its own customized version of brute-force technology which functions together with proxy system. This enables the application to attempt to crack password with unlimited times without getting blocked from Twitter’s security system. Normally Twitter will temporarily block any IP address if someone failed to login three time in a row to a certain account. But with using this proxy system TWGrappler will automatically change IP address to a new one every third unsuccessful attempt. This way it can run unstoppable until it hacks and find a right password of entered account. TWGrappler tool is available to download on its official website: www.twgrappler.com You can use this application on any modern device, including desktop computers and smartphones. Supported operating systems are Microsoft Windows, macOS, Android and iOS. Currently Linux is not on the list, but developers claims they’re working on supporting their software for this OS as well. Method #2 – Phishing Even this method is dating back to 80’s, phishing is still remaining a popular technique amongst hackers still as of today. This is a technique which requires skillfully use of social engineering skills and a medium knowledge of HTML programming language. Some CSS and PHP knowing will come helpful too. So, what exactly phishing is? It’s a way to trick someone to login trough a fake cloned webpage which is made to look like a legitimate website. In our example we talk about Twitter, but phishing is also widely used for any other popular websites, like Facebook, Instagram, email accounts, bank accounts, credit cards details etc. First step would be to create a fake Twitter login website. We won’t teach you step by step here how to make one as that would be unauthorized by law and can lead us to legal problems. But we can guide you approximately how you can learn by yourself to make one, for educational and entertaining purpose only. Maybe you can find some premade ones which are ready to use on internet already. But you’ll have to search that by yourself. Or you can pay some web developer to make you one. But shortly, you start with going to Twitter’s login page, where you can see boxes to enter username and password. When you’re on that page, go to website source by clicking right click and then “View Page Source”. You can also use a shortcut CTRL+U on your keyboard. Next step is to copy everything you see in page’s source and paste it into a blank Notepad document. Before saving a file, you’ll have to edit a code to replace links which leads users entered information (username &#38; password) from Twitter’s server to your own one which you’ll have to register later. You can look at example from how to create a phishing page for Facebook which we explained before, and just do it in a same way for Twitter. After you are done with creating a Twitter fake login page and have a website files ready on your PC, it’s time to register a hosting account and a domain what you will use for your phishing page. There are many companies where you can register domain and hosting, and many of them offers both together. If you are registering these for a first time, in most situations you can get a big discount for your first order so both will cost you just few dollars. Some popular providers of webhosting + domain which we can recommend are: BlueHost, HostGator, NameCheap, GoDaddy. Search their names on Google to find their website easily. And also don’t forget to search for coupon code as well which will reduce your order’s price drastically if you’re first time registering yourself there. Tip when choosing a domain name for phishing: &#8211; Make it something to look like Twitter official domain. Examples (Didn’t check if they already exist): &#8220;twitterloginuser.com&#8221;, &#8220;twitter-users-login.com&#8221;, &#8220;login-twitter-webpage.com&#8221; or something similar. Make something by yourself which looks legit. Domain extension we recommend going with &#8220;.com&#8221; as that always looks most trustworthy. And because Twitter use it as well. After you have your domain and hosting registered, it’s time to upload your files to your hosting account. (Make sure your domain is pointing to your hosting by its nameservers or other DNS method. If you registered both at same company, this will be much easier to make.) In your server’s cPanel account, go to File Manager, then look for &#8220;public_html&#8221; folder. In this folder you need to upload your Twitter fake page. If there is already a file named &#8220;default.php&#8221; before, delete it. Now your phishing page should be ready for usage if you done everything correctly. Test it by going to your domain you registered by typing it into browser’s URL field. If a website is loading fine, you are now ready to use it to catch potential Twitter login credentials. How to trick someone to login trough a phishing page? You have to be creative here. Skilled hackers often make a trustworthy looking email address which looks like from original website’s company of what they’re planning to hack their user. For example, you registered a domain name for Twitter phishing let’s say &#8220;twitterloginpage.com&#8221;. Now you can also make an email address from this domain with any name you want. Let’s say &#8220;security-check@twitterloginpage.com&#8221; – Now if you have your victim’s email address, you can pretend you are an actual Twitter’s security agent and make your email massage to look like it’s official Twitter’s one. Example: &#8220;Account Verification Required – Login trough our secured website here to confirm your account ownership&#8221; Then you link your phishing link with &#8220;here&#8221;. They will think it’s real, but at the end they will login trough your website and their Twitter password will be saved in a text file hosted at your newly registered webhosting account. There are tons of possibilities how you can do this successfully. The key is to make something which looks trustworthy and legit. Think outside of the box and some good idea will always come. Method #3 – Using mSpy &#8211; Mobile Phone Monitoring Software If a person you’re planning to hack is using Twitter from their mobile phone, then the mSpy may be the best method listed here. Why? By using mSpy, not only you’ll be able to access their Twitter account, but hack their entire smartphone, without them knowing! Let’s take a moment to see full features of mSpy tool and what it’s capable of. mSpy Features: Works on Android &#38; iOS (No Jailbreak required) Monitor All Messaging Apps Activity: &#8211; WhatsApp, SMS, Email, Facebook, Twitter, Instagram, Tinder &#38; others Works in Stealth Mode, hidden by phone’s owner Track GPS Location of a cellphone Track Calls (Outgoing &#38; Incoming) View any documents / media files saved on a phone Download mSpy App Click the button below to proceed to the mSpy&#8217;s official page from where you can get it from. Hope you learned something useful today. Remember to use these methods for legal purposes only. Hacking Twitter accounts which you didn’t create by yourself is a criminal act and prohibited by law in most, if not all countries. Your activities performed with methods learned from this tutorial will be your own responsibility.</p>
The post <a href="https://www.msuiche.net/how-to-hack-twitter-account/">How to Hack a Twitter Account – Working Methods of 2022</a> first appeared on <a href="https://www.msuiche.net">Matthieu Suiche</a>.]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" class="aligncenter size-full wp-image-116" src="https://www.msuiche.net/wp-content/uploads/2019/11/hack-twitter-account.jpg" alt="How to Hack a Twitter Account" width="728" height="380" srcset="https://www.msuiche.net/wp-content/uploads/2019/11/hack-twitter-account.jpg 728w, https://www.msuiche.net/wp-content/uploads/2019/11/hack-twitter-account-300x157.jpg 300w" sizes="(max-width: 728px) 100vw, 728px" /></p>
<p>Many Twitter users across the world got themselves in situation of losing their account password at least once in their lifetime. This problem may occur due to many reasons. One can simply forget or save their password somewhere safe, and after some time you can’t remember it. Some Twitter accounts are also getting hacked and lost forever.</p>
<p>In most situations, a simple clicking on &#8220;Forgot my password&#8221; from Twitter’s login page will solve a problem – In case you still have access to an e-mail account used when creating your TW profile. Same is with <span id="more-114"></span>phone number verification.</p>
<p>But the problem occurs when user forgot even their registration email with password together. And they didn’t add a phone number to their Twitter account, or they’ve changed it in a meantime. If you recognize yourself in this one, then a Twitter support team won’t be a solution to rely on. They will always ask you to verify you’re an actual account’s owner by providing an email address ID used when signing up for a certain account you’d like to recover.</p>
<p>But even in this situation, there is still a hope to recover your account back.</p>
<p><strong>In today’s article we’ll to show you several working methods to hack a Twitter account</strong> even if you don’t have access to an email address used when you registered your profile.</p>
<h3>Disclaimer of This Tutorial:</h3>
<p>Due to potential risks of misusing information from this tutorial in wrong ways, such as hacking Twitter accounts which are not in one’s legal ownership, we are obligated to protect ourselves and our website from any illegal use of the information we share here. That means <strong>it’s strictly forbidden to hack into Twitter accounts which you didn’t create by yourself, or without an actual owner’s prior permission</strong> to do so. Anything else will be tolerated as against our terms &amp; conditions policy.</p>
<p>Now let’s begin shall we 🙂</p>
<h3>Table of Methods:</h3>
<p>1. <a href="#twgrappler">Using TWGrappler Tool</a><br />
2. <a href="#phishing">Phishing Technique</a><br />
3. <a href="#mspy">Using Smartphone Spy App</a></p>
<h2 id="twgrappler">Method #1 – Using TWGrappler tool to hack Twitter Password</h2>
<p><img loading="lazy" class="alignleft size-full wp-image-118" src="https://www.msuiche.net/wp-content/uploads/2019/11/TWGrappler_Twitter_Hack_Tool.jpg" alt="TWGrappler - Twitter Hack App" width="320" height="423" srcset="https://www.msuiche.net/wp-content/uploads/2019/11/TWGrappler_Twitter_Hack_Tool.jpg 320w, https://www.msuiche.net/wp-content/uploads/2019/11/TWGrappler_Twitter_Hack_Tool-227x300.jpg 227w" sizes="(max-width: 320px) 100vw, 320px" /> <strong><u><a href="https://twgrappler.com/" target="_blank" rel="noopener noreferrer">TWGrappler</a></u></strong> is one of newly developed software built just for this purpose; To help Twitter users recover their lost account back when nothing else works.<br />
A technology on which TWGrappler is built on is called a &#8220;brute-force attack&#8221;. This is relatively old hacking method what requires a specially created program which attempts to login with thousands of possible password combinations until it finds a right one.</p>
<p>TWGrappler is using its own customized version of brute-force technology which functions together with proxy system. This enables the application to attempt to crack password with unlimited times without getting blocked from Twitter’s security system. Normally Twitter will temporarily block any IP address if someone failed to login three time in a row to a certain account. But with using this proxy system TWGrappler will automatically change IP address to a new one every third unsuccessful attempt. This way it can run unstoppable until it hacks and find a right password of entered account.</p>
<p>TWGrappler tool is available to <strong>download</strong> on its official website: www.twgrappler.com</p>
<p>You can use this application on any modern device, including desktop computers and smartphones.<br />
<strong>Supported operating systems are Microsoft Windows, macOS, Android and iOS.</strong></p>
<p>Currently Linux is not on the list, but developers claims they’re working on supporting their software for this OS as well.</p>
<h2 id="phishing">Method #2 – Phishing</h2>
<p>Even this method is dating back to 80’s, phishing is still remaining a popular technique amongst hackers still as of today.<br />
This is a technique which requires skillfully use of social engineering skills and a medium knowledge of HTML programming language. Some CSS and PHP knowing will come helpful too.</p>
<p><strong>So, what exactly phishing is?</strong></p>
<p>It’s a way to trick someone to login trough a fake cloned webpage which is made to look like a legitimate website. In our example we talk about Twitter, but phishing is also widely used for any other popular websites, like Facebook, Instagram, email accounts, bank accounts, credit cards details etc.</p>
<p>First step would be to create a fake Twitter login website. We won’t teach you step by step here how to make one as that would be unauthorized by law and can lead us to legal problems. But we can guide you approximately how you can learn by yourself to make one, for educational and entertaining purpose only.</p>
<p>Maybe you can find some premade ones which are ready to use on internet already. But you’ll have to search that by yourself. Or you can pay some web developer to make you one.<br />
But shortly, you start with going to Twitter’s login page, where you can see boxes to enter username and password. When you’re on that page, go to website source by clicking right click and then “View Page Source”. You can also use a shortcut CTRL+U on your keyboard.</p>
<p>Next step is to copy everything you see in page’s source and paste it into a blank Notepad document. Before saving a file, you’ll have to edit a code to replace links which leads users entered information (username &amp; password) from Twitter’s server to your own one which you’ll have to register later.</p>
<p>You can look at example from <a href="https://www.msuiche.net/how-to-hack-facebook-account-working-methods/#how-to-create-fb-phishing-page">how to create a phishing page for Facebook</a> which we explained before, and just do it in a same way for Twitter.</p>
<p>After you are done with creating a Twitter fake login page and have a website files ready on your PC, it’s time to register a hosting account and a domain what you will use for your phishing page.</p>
<p>There are many companies where you can register domain and hosting, and many of them offers both together. If you are registering these for a first time, in most situations you can get a big discount for your first order so both will cost you just few dollars.</p>
<p>Some popular providers of webhosting + domain which we can recommend are:<br />
BlueHost, HostGator, NameCheap, GoDaddy.<br />
Search their names on Google to find their website easily. And also don’t forget to search for coupon code as well which will reduce your order’s price drastically if you’re first time registering yourself there.</p>
<p><strong>Tip when choosing a domain name for phishing:</strong><br />
&#8211; Make it something to look like Twitter official domain.<br />
Examples (Didn’t check if they already exist): &#8220;twitterloginuser.com&#8221;, &#8220;twitter-users-login.com&#8221;, &#8220;login-twitter-webpage.com&#8221; or something similar. Make something by yourself which looks legit. Domain extension we recommend going with &#8220;.com&#8221; as that always looks most trustworthy. And because Twitter use it as well.</p>
<p>After you have your domain and hosting registered, it’s time to upload your files to your hosting account.<br />
(Make sure your domain is pointing to your hosting by its nameservers or other DNS method. If you registered both at same company, this will be much easier to make.)<br />
In your server’s cPanel account, go to File Manager, then look for &#8220;public_html&#8221; folder. In this folder you need to upload your Twitter fake page. If there is already a file named &#8220;default.php&#8221; before, delete it.</p>
<p>Now your phishing page should be ready for usage if you done everything correctly. Test it by going to your domain you registered by typing it into browser’s URL field. If a website is loading fine, you are now ready to use it to catch potential Twitter login credentials.</p>
<h3>How to trick someone to login trough a phishing page?</h3>
<p>You have to be creative here. Skilled hackers often make a trustworthy looking email address which looks like from original website’s company of what they’re planning to hack their user.<br />
For example, you registered a domain name for Twitter phishing let’s say &#8220;twitterloginpage.com&#8221;. Now you can also make an email address from this domain with any name you want. Let’s say &#8220;security-check@twitterloginpage.com&#8221; – Now if you have your victim’s email address, you can pretend you are an actual Twitter’s security agent and make your email massage to look like it’s official Twitter’s one. Example:<br />
&#8220;<em>Account Verification Required – Login trough our secured website here to confirm your account ownership</em>&#8221; Then you link your phishing link with &#8220;here&#8221;. They will think it’s real, but at the end they will login trough your website and their Twitter password will be saved in a text file hosted at your newly registered webhosting account.</p>
<p>There are tons of possibilities how you can do this successfully. The key is to make something which looks trustworthy and legit. Think outside of the box and some good idea will always come.</p>
<h2 id="mspy">Method #3 – Using mSpy &#8211; Mobile Phone Monitoring Software</h2>
<p>If a person you’re planning to hack is using Twitter from their mobile phone, then <strong>the mSpy may be the best method listed here</strong>. Why?</p>
<p>By using mSpy, not only you’ll be able to access their Twitter account, but hack their entire smartphone, without them knowing!</p>
<p>Let’s take a moment to see full features of mSpy tool and what it’s capable of.</p>
<h3 id="mspy-features">mSpy Features:</h3>
<ul>
<li>Works on Android &amp; iOS (No Jailbreak required)</li>
<li>Monitor All Messaging Apps Activity:<br />
&#8211; WhatsApp, SMS, Email, Facebook, Twitter, Instagram, Tinder &amp; others</li>
<li>Works in Stealth Mode, hidden by phone’s owner</li>
<li>Track GPS Location of a cellphone</li>
<li>Track Calls (Outgoing &amp; Incoming)</li>
<li>View any documents / media files saved on a phone</li>
</ul>
<h3>Download mSpy App</h3>
<p>Click the button below to proceed to the mSpy&#8217;s official page from where you can get it from.</p>
<p><a href="http://track.mspy.click/SHFHV" target="_blank" rel="noopener noreferrer"><img loading="lazy" class="alignnone size-full wp-image-115" src="https://www.msuiche.net/wp-content/uploads/2019/11/mspy-app.jpg" alt="Get mSpy Here" width="300" height="250" border="0" /></a></p>
<p><img loading="lazy" class="alignnone size-full wp-image-125" src="https://www.msuiche.net/wp-content/uploads/2019/11/disclaimer-mspy.jpg" alt="terms" width="467" height="137" srcset="https://www.msuiche.net/wp-content/uploads/2019/11/disclaimer-mspy.jpg 467w, https://www.msuiche.net/wp-content/uploads/2019/11/disclaimer-mspy-300x88.jpg 300w" sizes="(max-width: 467px) 100vw, 467px" /></p>
<p>Hope you learned something useful today. Remember to use these methods for legal purposes only. Hacking Twitter accounts which you didn’t create by yourself is a criminal act and prohibited by law in most, if not all countries. Your activities performed with methods learned from this tutorial will be your own responsibility.</p>
<p><iframe loading="lazy" title="How To Hack Twitter Account Without Verification 2022 || Latest News (Only for education purpose)" width="960" height="540" src="https://www.youtube.com/embed/5xTiByXHt8c?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>The post <a href="https://www.msuiche.net/how-to-hack-twitter-account/">How to Hack a Twitter Account – Working Methods of 2022</a> first appeared on <a href="https://www.msuiche.net">Matthieu Suiche</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.msuiche.net/how-to-hack-twitter-account/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Government Malware Going by the Name of Exodus Has Affected Thousands of Users</title>
		<link>https://www.msuiche.net/government-malware-exodus-affected-thousands-of-users/</link>
		
		<dc:creator><![CDATA[Jimmy]]></dc:creator>
		<pubDate>Sat, 11 May 2019 15:02:12 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.msuiche.net/?p=96</guid>

					<description><![CDATA[<p>News just in; security experts have just discovered a new government spyware called Exodus which infiltrates user software using the Google Play Store. The Security without Borders organization has a team of dedicated security researchers and advisors who conducted an analysis of this threat. It was revealed through this organization that this government spyware hides within the Google Play Store and has been able to infect hundreds of people who use the platform. The malware has been named Exodus, after the command and control servers with which it is connected. For months, the malware worked to infiltrate user devices without detection and the worst part is that it’s not the first of its kind. There have been similar cases of malicious code that’s purposefully hidden within the Google Play Store apps because it’s a widely used platform. According to the research data, over 20 malicious apps were running for over two years in the Google Play marketplace. Motherboard further reports that the Android surveillance malware was sold by a surveillance camera manufacturer to the Italian government. Interestingly enough, this manufacturer is not a well-known malware producer and this was the first surveillance software that was connected to it. Researcher reveals that the main targets of this surveillance operation were innocent users who had no idea that they were playing a part in spreading this malware. This is plausible when you consider how poorly developed the spyware is. It all started with the upload of previously unknown spyware apps onto the Google Play Store. The curious thing is that this happened multiple times over the last two years and these apps would often be re-uploaded every few months even though they were on the platform for years. The malware mainly targeted users in the Italian market. Once tracked, the malware was shown to have a similar disguise in all instances. They would often be disguised as apps that were being disseminated by unknown Italian mobile operators. The attack would start with the victim receiving an SMS with a description of the app, urging them to download it from the Google Play Store. The Google Play decoy pages were all written in Italian and have been fully identified as such. Part of what made the Exodus surveillance malware so effective was the fact that it was hidden in plain sight and looked just like any other app that’s meant to promote cell phone deals. In most cases, the app was advertised as something that would improve the users’ mobile device performance. As soon as the researchers revealed their findings to Google, the tech giant instantly removed the affected apps and later revealed that they discovered 25 unique variations of the spyware in two years. Most of 1,000 users who were affected by the spyware came from Italy and according to Google, the malware operates in two stages. Stage 1 involves infecting the device with malicious code in order to get the user’s IMEI and phone number. The hackers also used the “CheckValidTarget” function to find specific users to target. However, this function wasn’t that effective because in most cases the malware infected users whom the hackers didn’t intend to infect. Researchers state that their tests showed that the spyware jumped onto the second stage right after check-ins which means that the Command and Control operators were imposing target validation. Within a few days, the experts say the infected test device wasn’t disinfected as expected, even though it didn’t meet the target criteria. In any case, the second stage of the Exodus malware involves stealing the user’s sensitive data including their browsing history, phone calls, private audio recordings, calendar information, text messages, WhatsApp chats, Facebook Messenger logs, and other important data. Not only that but research data shows that the spyware can also create a backdoor escape route on the infected device which gives it access to other users who may be connected to the same Wi-Fi network as the targeted device. Unless the mobile operator uses client isolation technology to keep user accounts separate, the infected devices can also infect other users on the network as well. This opens up the device to data tampering on top of the compromised security that it has experienced. Security without Borders researchers say that the malware’s author came from an Italian company known as eSurv. The company’s location has been traced to the south of Italy in a city known as Catanzaro. Apparently, the authors left behind two strings on the malware code, namely; “RINO GATTUSO” and “mundizza.” The word “mundizza” means “garbage” and comes from a dialect of the Italian language that’s commonly used in South Calabria. Meanwhile, Rino Gattuso is a well-known Italian footballer who comes from Calabria (surprise, surprise). Experts also discovered overlapping infrastructure between a TLS certificate, the C2 server shares, and eSurv surveillance cameras. According to the researchers, there are other spyware samples that are able to communicate with an eSurv server, and Google later confirmed that the servers did indeed belong to eSurv, and this information was corroborated by a Trail of Bits researcher who was responsible for reviewing a technical report on the spyware. We didn’t stop there, however, as we went on to request comment from the eSurv company but we were met with a firm “no comment.” But then we came across an online document that was published according to Italian government spending transparency law, and it stated that eSurv was awarded a tender from the State Police department to develop a “passive and active interception system.” As such, the government paid eSurv €307,439.90 for its services on November 6th, 2016. This is according to a report by Motherboard.</p>
The post <a href="https://www.msuiche.net/government-malware-exodus-affected-thousands-of-users/">Government Malware Going by the Name of Exodus Has Affected Thousands of Users</a> first appeared on <a href="https://www.msuiche.net">Matthieu Suiche</a>.]]></description>
										<content:encoded><![CDATA[<p>News just in; security experts have just discovered a new government <strong>spyware called Exodus</strong> which infiltrates user software using the Google Play Store.</p>
<p>The Security without Borders organization has a team of dedicated security researchers and advisors who conducted an analysis of this threat. It was revealed through this organization that this government spyware hides within the Google Play Store and has been able to infect hundreds of people who use <span id="more-96"></span>the platform.</p>
<p>The malware has been named Exodus, after the command and control servers with which it is connected. For months, the malware worked to infiltrate user devices without detection and the worst part is that it’s not the first of its kind. There have been similar cases of malicious code that’s purposefully hidden within the Google Play Store apps because it’s a widely used platform.</p>
<p>According to the research data, over 20 malicious apps were running for over two years in the Google Play marketplace. Motherboard further reports that the Android surveillance malware was sold by a surveillance camera manufacturer to the Italian government. Interestingly enough, this manufacturer is not a well-known malware producer and this was the first surveillance software that was connected to it.</p>
<p>Researcher reveals that the main targets of this surveillance operation were innocent users who had no idea that they were playing a part in spreading this malware. This is plausible when you consider how poorly developed the spyware is.</p>
<p>It all started with the upload of previously unknown spyware apps onto the Google Play Store. The curious thing is that this happened multiple times over the last two years and these apps would often be re-uploaded every few months even though they were on the platform for years. The malware mainly targeted users in the Italian market.</p>
<p>Once tracked, the malware was shown to have a similar disguise in all instances. They would often be disguised as apps that were being disseminated by unknown Italian mobile operators. The attack would start with the victim receiving an SMS with a description of the app, urging them to download it from the Google Play Store. The Google Play decoy pages were all written in Italian and have been fully identified as such.</p>
<p>Part of what made the Exodus surveillance malware so effective was the fact that it was hidden in plain sight and looked just like any other app that’s meant to promote cell phone deals. In most cases, the app was advertised as something that would improve the users’ mobile device performance.</p>
<p><img loading="lazy" class="alignnone size-full wp-image-97" src="https://www.msuiche.net/wp-content/uploads/2019/05/1.jpg" alt="screenshot" width="300" height="291" /></p>
<p>As soon as the researchers revealed their findings to Google, the tech giant instantly removed the affected apps and later revealed that they discovered 25 unique variations of the spyware in two years.</p>
<p>Most of 1,000 users who were affected by the spyware came from Italy and according to Google, the malware operates in two stages. Stage 1 involves infecting the device with malicious code in order to get the user’s IMEI and phone number. The hackers also used the “CheckValidTarget” function to find specific users to target.</p>
<p>However, this function wasn’t that effective because in most cases the malware infected users whom the hackers didn’t intend to infect.</p>
<p>Researchers state that their tests showed that the spyware jumped onto the second stage right after check-ins which means that the Command and Control operators were imposing target validation. Within a few days, the experts say the infected test device wasn’t disinfected as expected, even though it didn’t meet the target criteria.</p>
<p>In any case, the second stage of the Exodus malware involves stealing the user’s sensitive data including their browsing history, phone calls, private audio recordings, calendar information, text messages, WhatsApp chats, Facebook Messenger logs, and other important data.</p>
<p>Not only that but research data shows that the spyware can also create a backdoor escape route on the infected device which gives it access to other users who may be connected to the same Wi-Fi network as the targeted device.</p>
<p>Unless the mobile operator uses client isolation technology to keep user accounts separate, the infected devices can also infect other users on the network as well. This opens up the device to data tampering on top of the compromised security that it has experienced.</p>
<p>Security without Borders researchers say that the malware’s author came from an Italian company known as eSurv. The company’s location has been traced to the south of Italy in a city known as Catanzaro.</p>
<p>Apparently, the authors left behind two strings on the malware code, namely; “RINO GATTUSO” and “mundizza.” The word “mundizza” means “garbage” and comes from a dialect of the Italian language that’s commonly used in South Calabria. Meanwhile, Rino Gattuso is a well-known Italian footballer who comes from Calabria (surprise, surprise).</p>
<p>Experts also discovered overlapping infrastructure between a TLS certificate, the C2 server shares, and eSurv surveillance cameras.</p>
<p>According to the researchers, there are other spyware samples that are able to communicate with an eSurv server, and Google later confirmed that the servers did indeed belong to eSurv, and this information was corroborated by a Trail of Bits researcher who was responsible for reviewing a technical report on the spyware.</p>
<p><img loading="lazy" class="alignnone size-full wp-image-98" src="https://www.msuiche.net/wp-content/uploads/2019/05/2.jpg" alt="spyware proof" width="795" height="619" srcset="https://www.msuiche.net/wp-content/uploads/2019/05/2.jpg 795w, https://www.msuiche.net/wp-content/uploads/2019/05/2-300x234.jpg 300w, https://www.msuiche.net/wp-content/uploads/2019/05/2-768x598.jpg 768w" sizes="(max-width: 795px) 100vw, 795px" /></p>
<p>We didn’t stop there, however, as we went on to request comment from the eSurv company but we were met with a firm “no comment.”</p>
<p>But then we came across an online document that was published according to Italian government spending transparency law, and it stated that eSurv was awarded a tender from the State Police department to develop a “passive and active interception system.” As such, the government paid eSurv €307,439.90 for its services on November 6<sup>th</sup>, 2016. This is according to a report by Motherboard.</p>The post <a href="https://www.msuiche.net/government-malware-exodus-affected-thousands-of-users/">Government Malware Going by the Name of Exodus Has Affected Thousands of Users</a> first appeared on <a href="https://www.msuiche.net">Matthieu Suiche</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Check if My WhatsApp is Hacked &#038; Steps to Fix it (2022 Methods)</title>
		<link>https://www.msuiche.net/how-to-know-if-my-whatsapp-is-hacked-guide/</link>
		
		<dc:creator><![CDATA[Jimmy]]></dc:creator>
		<pubDate>Sat, 11 May 2019 14:10:42 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.msuiche.net/?p=87</guid>

					<description><![CDATA[<p>If you are wondering if your WhatsApp account is safe, don’t worry, you are not the only one. A lot of people share the uncertainty of using the service as their main communication service for fear of being spied or because someone might gain access to it. Let’s clear the air about the purpose of this article. You probably landed here because you have concerns, and we are going to do our best to address them. This is not a hacker’s guide. This is a collection of relevant tips, and useful information about WhatsApp gathered from different blog and forums around the web. Since some websites shares tutorials how to hack WhatsApp account, like this guide from Wiper&#8217;s blog, on the other hand, some like us wants to protect internet users from these dangerous actions. Think about WhatsApp the way you think about other apps such as Facebook, Instagram or your personal e-mail. All of these services are vulnerable at some level. While it’s pretty easy to figure out if our FB, IG or e-mail has been tampered with, taking notice with WhatsApp is a bit trickier. A lot of WhatsApp users don’t realize they have been hacked after a long time. The attackers use very diverse methods to gain access to our accounts such as fake names generators or the alias of known contacts. The sooner we realize how vulnerable is WhatsApp, the easier we’ll be able to protect ourselves. As worrisome as this might sound, this is not an issue that the company is merely letting slide. WhatsApp it’s making their best effort to implement the best security measures to place a lot of obstacles in the road for hackers, to keep the accounts of users protected. These layers of code are meant to discourage attackers who deem unworthy the loss of time to hack the platform. The core of the problem these days resides on the side of users since the biggest risk of getting their accounts hacked it’s on their end. Most hacks of WhatsApp accounts happen when the attackers have access to their smartphones or tablets. Don’t sweat it though; there are ways to check if your account has been hacked and ways to fix it. Take a set and read this guide to understand the problem you are facing and the steps you can take to deal with it on your own. Have some patience; it helps fix any issues you might find quicker. How to Recognize if My WhatsApp Account Has Been Hacked? Before we begin, let’s offer some disclosure. The tips we mention here are meant to guide you, by no means are the final indicative on the source of the problem at all, so keep that in mind. If you don’t feel qualified enough to deal with a hacked WhatsApp account, take your equipment to a technician to fix the problem. 1. High-Temperatures on Your Smart Device If your smartphone or tablets experiences a sudden increase of temperature enough to feel warm to the touch, this may be an indicator that you have a background app running on your device that you don’t know of. This is one the oldest trick in the book, and it happens after spyware programs are installed in your device. 2. Quick Battery Consumption The average time of consumption of a smartphone battery is a full day on stand by and four to six hours when used at full capacity. If your smart device gets drained in less time than those two indicatives we have mentioned, even if they are not connected to a network, there is a high chance of spyware or malware being installed on it. How Hackers Can Break Into a WhatsApp Account? 1. When you Use WhatsApp Web A standalone connection of WhatsApp is very secure. But a lot of people link the app from their devices to the web version of the app. This is a double-edged sword since this link is truly vulnerable. The connection is built on basic notions of wireless data traffic, and you need to scan a QR code to use WhatsApp web. The code can be scanned by any smartphone pretty easy and from a distance. Once they get a hold of the QR code, the sky is the limit for them. If you use the app in a public place, you increase the risk to 100%. The attacker will be able to scan the code and use WhatsApp web on a different computer until you properly log off of the app and sing up again. It doesn’t matter how quickly this takes; sometime the attacker only needs minutes to compromise the account. 2. They Get Access to the Backup File of your Device This is one of the most intrusive means of access to WhatsApp accounts since it can work even if you have logged off the service. It will work easier if your WhatsApp app has not been updated in a long time. This type of hack is often used when someone wants to have access to your account to read something in specific. Is also used by the attacker if he wants to delete your backup file or replicate it to be sent using Bluetooth. The hacker can also use auto-backup apps to get a quick file on a plain text that can be sent directly to any e-mail account. These type of apps usually run in the background as you use your smart device and they work on a schedule. If the person spying on you is a close one they can easily install and uninstall these apps without you noticing. 3. They Use a WhatsApp Sniffer to Catch the Signal of Wi-Fi Network One of the most vulnerable means of access to your WhatsApp account if the ability your smart device has to connect instantly to Wi-Fi networks. All smartphones and tablets use a MAC address to link the device with the Wi-Fi signal. If you happen to use your device on a public space, there is a high possibility that someone is using a WhatsApp sniffer to get access to any accounts that use these networks. 4. They Use Third-Party Spyware The internet is full of developers claiming to have the ultimate means of access to WhatsApp accounts. A lot of them are full of air, or they are just a way to introduce malware on other computers and smart devices. But others are offering the real deal for the right price such various spying applications or keyloggers, which we explained how they function in one of our earlier post. Now, let&#8217;s take a look at the solutions. How to Fix Hacked WhatsApp Account? 1. Stop Using WhatsApp Web We don’t mean it in the literal sense of the world, but if you must use the app on open space and you feel suspicious about the environment. Log off the service on the computer you are using and take a moment to follow this protocol we describe in the following lines to make sure that no one is poking their nose in your WhatsApp conversations. 2. Open WhatsApp on your smart device Locate the three vertical dots on the top corner on the right and tap them Now tap the WhatsApp web option, and a new window will open You will be able to see the list of last devices used to log in your account if you don’t recognize one of them, there is a high chance that someone has gained access to your login information You can stop this instantly by tapping on the option to log out of all devices. This will put a dead stop to the hacker from reading your conversations. Be mindful in the future if you need to log on the app again in the future and double check on this option after you are done. 3. Close Down All Your Apps The people working at Learning Ocean have discovered that hackers can use hidden apps to get a backup copy of all messages on all your WhatsApp chats on plain text files that are delivered after being collected to a different e-mail address than the one storing the original backup file. This is truly one of the most intrusive means of access since the attacker can simply read all your messages with no editing. The best way to avoid these apps is by using an application called App Locker and enable it on your smartphone. App Locker will let you shut down any application on your smartphone to secure it. In any attacker tries to copy a stored file on your backup log from your WhatsApp he will have to unlock your phone manually to do so. 4. Activate the Two-Step Authentication to Access WhatsApp Two-steps authentications have been standard issue for a lot of apps for a while now. WhatsApp is coming late to the party, but they have finally made it available for everyone. By enabling two-step verification, any attempt to access your account will have to be verified with a six-digit PIN that is created to use this feature. To enable two-step verification, you only have to open WhatsApp, find the settings option, tap the account option and locate the two-step verification to put it in place. If you don’t recall the six digit pin to access the app at some point, you can also add an e-mail address that will allow WhatsApp to send a link via e-mail to disable the feature until you use it again. So, in short: (WhatsApp &#62; Settings &#62; Account &#62; Two-step verification &#62; Enable) How to Secure WhatsApp Account? 1. Avoid Using Public Wi-Fi Networks As we said previously, open networks are like an all-you-can-eat buffet for hackers. They can easily access your apps through these insecure connections. Most e-mail hacks happen this way, and they can also take hold of any social media platforms you access using these networks. 2. Don’t Lend Your Phone To Anyone This one is a tough pill to swallow if you are one of the good guys, but these hacks happen so easily because the hackers target their marks by faking an emergency and asking for your phone to make a call. They need a minute to access your phone and set the malware they need to get your information. Make sure to check your IMEI number and remember it, this is a unique trait to all mobile devices. 3. Block Any Unwanted Installation This happens a lot to seniors or to persons who are not tech savvy at all. If you visit indiscriminate websites on your smart devices, the chances are that a tracking cookie will invite you to install an app on your phone offering a utility that sounds too good to be true. Avoid these installations at all costs. Almost always these so-called apps are spyware that latches on your device and steals all the information that you store on it, including login passwords and credit card numbers. 4. Lock Down WhatsApp If you are not feeling sure about the state of your device you need to install Applock to help you close down all sessions of WhatsApp in all devices where your account might be active. Unfortunately, the app doesn’t have this feature, but you can download the app from the Google Store and lock it on all fronts by setting a unique password or PIN.</p>
The post <a href="https://www.msuiche.net/how-to-know-if-my-whatsapp-is-hacked-guide/">How to Check if My WhatsApp is Hacked & Steps to Fix it (2022 Methods)</a> first appeared on <a href="https://www.msuiche.net">Matthieu Suiche</a>.]]></description>
										<content:encoded><![CDATA[<p>If you are wondering if your WhatsApp account is safe, don’t worry, you are not the only one. A lot of people share the uncertainty of using the service as their main communication service for fear of being spied or because someone might gain access to it.</p>
<p><img loading="lazy" class="aligncenter size-full wp-image-89" src="https://www.msuiche.net/wp-content/uploads/2019/05/how-to-secure-whatsapp.jpg" alt="How to Secure Whatsapp" width="701" height="327" srcset="https://www.msuiche.net/wp-content/uploads/2019/05/how-to-secure-whatsapp.jpg 701w, https://www.msuiche.net/wp-content/uploads/2019/05/how-to-secure-whatsapp-300x140.jpg 300w" sizes="(max-width: 701px) 100vw, 701px" /></p>
<p>Let’s clear the air about the purpose of this article. You probably landed here because you have concerns, and we are going to do our best to address them. <strong>This is not a hacker’s guide</strong>. This is a collection of relevant tips, and useful information about WhatsApp gathered from different blog and forums around the web.</p>
<p>Since some websites shares <strong>tutorials how to hack WhatsApp account</strong>, like <u><a href="https://gowiper.com/how-to-hack-whatsapp-account-spy-messages-tutorial/" target="_blank" rel="noopener noreferrer">this guide from Wiper&#8217;s blog</a></u>, on the other hand, some like us wants to protect internet users from these dangerous actions.</p>
<p>Think about WhatsApp the way you think about other apps such as Facebook, Instagram or your personal e-mail. <strong>All of these services are vulnerable at some level</strong>. While it’s pretty easy to figure out if <span id="more-87"></span>our FB, IG or e-mail has been tampered with, taking notice with WhatsApp is a bit trickier.</p>
<p><strong>A lot of WhatsApp users don’t realize they have been hacked</strong> after a long time. The attackers use very diverse methods to gain access to our accounts such as fake names generators or the alias of known contacts. The sooner we realize how vulnerable is WhatsApp, the easier we’ll be able to protect ourselves.</p>
<p>As worrisome as this might sound, this is not an issue that the company is merely letting slide. WhatsApp it’s making their best effort to implement the best security measures to place a lot of obstacles in the road for hackers, to keep the accounts of users protected. These layers of code are meant to discourage attackers who deem unworthy the loss of time to hack the platform.</p>
<p>The core of the problem these days resides on the side of users since the biggest risk of getting their accounts hacked it’s on their end. Most hacks of WhatsApp accounts happen when the attackers have access to their smartphones or tablets.</p>
<p>Don’t sweat it though; there are ways to check if your account has been hacked and ways to fix it. Take a set and read this guide to understand the problem you are facing and the steps you can take to deal with it on your own. Have some patience; it helps fix any issues you might find quicker.</p>
<h2>How to Recognize if My WhatsApp Account Has Been Hacked?</h2>
<p><img loading="lazy" class="aligncenter size-full wp-image-90" src="https://www.msuiche.net/wp-content/uploads/2019/05/WhatsApp-security-checker.jpg" alt="WhatsApp security checker" width="403" height="225" srcset="https://www.msuiche.net/wp-content/uploads/2019/05/WhatsApp-security-checker.jpg 403w, https://www.msuiche.net/wp-content/uploads/2019/05/WhatsApp-security-checker-300x167.jpg 300w" sizes="(max-width: 403px) 100vw, 403px" /></p>
<p>Before we begin, let’s offer some disclosure. The tips we mention here are meant to guide you, by no means are the final indicative on the source of the problem at all, so keep that in mind. If you don’t feel qualified enough to deal with a hacked WhatsApp account, take your equipment to a technician to fix the problem.</p>
<h3>1. High-Temperatures on Your Smart Device</h3>
<p>If your smartphone or tablets experiences a sudden increase of temperature enough to feel warm to the touch, this may be an indicator that you have a background app running on your device that you don’t know of. This is one the oldest trick in the book, and it happens after spyware programs are installed in your device.</p>
<h3>2. Quick Battery Consumption</h3>
<p>The average time of consumption of a smartphone battery is a full day on stand by and four to six hours when used at full capacity. If your smart device gets drained in less time than those two indicatives we have mentioned, even if they are not connected to a network, there is a high chance of spyware or malware being installed on it.</p>
<h2>How Hackers Can Break Into a WhatsApp Account?</h2>
<h3>1. When you Use WhatsApp Web</h3>
<p>A standalone connection of WhatsApp is very secure. But a lot of people link the app from their devices to the web version of the app. This is a double-edged sword since this link is truly vulnerable. The connection is built on basic notions of wireless data traffic, and you need to scan a QR code to use WhatsApp web. The code can be scanned by any smartphone pretty easy and from a distance.</p>
<p>Once they get a hold of the QR code, the sky is the limit for them. If you use the app in a public place, you increase the risk to 100%. The attacker will be able to scan the code and use WhatsApp web on a different computer until you properly log off of the app and sing up again. It doesn’t matter how quickly this takes; sometime the attacker only needs minutes to compromise the account.</p>
<h3>2. They Get Access to the Backup File of your Device</h3>
<p>This is one of the most intrusive means of access to WhatsApp accounts since it can work even if you have logged off the service. It will work easier <strong>if your WhatsApp app has not been updated in a long time</strong>.</p>
<p>This type of hack is often used when someone wants to have access to your account to read something in specific. Is also used by the attacker if he wants to delete your backup file or replicate it to be sent using Bluetooth.</p>
<p>The hacker can also use auto-backup apps to get a quick file on a plain text that can be sent directly to any e-mail account. These type of apps usually run in the background as you use your smart device and they work on a schedule.</p>
<p>If the person spying on you is a close one they can easily install and uninstall these apps without you noticing.</p>
<h3>3. They Use a WhatsApp Sniffer to Catch the Signal of Wi-Fi Network</h3>
<p>One of the most vulnerable means of access to your WhatsApp account if the ability your smart device has to connect instantly to Wi-Fi networks. All smartphones and tablets use a MAC address to link the device with the Wi-Fi signal. If you happen to use your device on a public space, there is a high possibility that someone is using a WhatsApp sniffer to get access to any accounts that use these networks.</p>
<h3>4. They Use Third-Party Spyware</h3>
<p>The internet is full of developers claiming to have the ultimate means of access to WhatsApp accounts. A lot of them are full of air, or they are just a way to introduce malware on other computers and smart devices. But others are offering the real deal for the right price such various <strong>spying applications or keyloggers</strong>, which <u><a href="https://www.msuiche.net/how-to-hack-facebook-account-working-methods/#keylogger">we explained how they function in one of our earlier post</a></u>.</p>
<p>Now, let&#8217;s take a look at the solutions.</p>
<h2>How to Fix Hacked WhatsApp Account?</h2>
<h3>1. Stop Using WhatsApp Web</h3>
<p>We don’t mean it in the literal sense of the world, but if you must use the app on open space and you feel suspicious about the environment. Log off the service on the computer you are using and take a moment to follow this protocol we describe in the following lines to make sure that no one is poking their nose in your WhatsApp conversations.</p>
<h3>2. Open WhatsApp on your smart device</h3>
<ul>
<li>Locate the three vertical dots on the top corner on the right and tap them</li>
<li>Now tap the WhatsApp web option, and a new window will open</li>
<li>You will be able to see the list of last devices used to log in your account if you don’t recognize one of them, there is a high chance that someone has gained access to your login information</li>
</ul>
<p>You can stop this instantly by tapping on the option to log out of all devices. This will put a dead stop to the hacker from reading your conversations. Be mindful in the future if you need to log on the app again in the future and double check on this option after you are done.</p>
<h3>3. Close Down All Your Apps</h3>
<p>The people working at <em>Learning Ocean</em> have discovered that hackers can use hidden apps to get a backup copy of all messages on all your WhatsApp chats on plain text files that are delivered after being collected to a different e-mail address than the one storing the original backup file.</p>
<p>This is truly one of the most intrusive means of access since the attacker can simply read all your messages with no editing. The best way to avoid these apps is by using an application called <strong>App Locker</strong> and enable it on your smartphone.</p>
<p>App Locker will let you shut down any application on your smartphone to secure it. In any attacker tries to copy a stored file on your backup log from your WhatsApp he will have to unlock your phone manually to do so.</p>
<h3>4. Activate the Two-Step Authentication to Access WhatsApp</h3>
<p>Two-steps authentications have been standard issue for a lot of apps for a while now. WhatsApp is coming late to the party, but they have finally made it available for everyone. By enabling two-step verification, any attempt to access your account will have to be verified with a six-digit PIN that is created to use this feature.</p>
<p>To enable two-step verification, you only have to open WhatsApp, find the settings option, tap the account option and locate the two-step verification to put it in place. If you don’t recall the six digit pin to access the app at some point, you can also add an e-mail address that will allow WhatsApp to send a link via e-mail to disable the feature until you use it again.</p>
<p>So, in short: (<strong>WhatsApp</strong> &gt; <strong>Settings</strong> &gt; <strong>Account</strong> &gt; <strong>Two-step verification</strong> &gt; <strong>Enable)</strong></p>
<h2>How to Secure WhatsApp Account?</h2>
<h3>1. Avoid Using Public Wi-Fi Networks</h3>
<p>As we said previously, open networks are like an all-you-can-eat buffet for hackers. They can easily access your apps through these insecure connections. Most e-mail hacks happen this way, and they can also take hold of any social media platforms you access using these networks.</p>
<h3>2. Don’t Lend Your Phone To Anyone</h3>
<p>This one is a tough pill to swallow if you are one of the good guys, but these hacks happen so easily because the hackers target their marks by faking an emergency and asking for your phone to make a call. They need a minute to access your phone and set the malware they need to get your information. Make sure to check your IMEI number and remember it, this is a unique trait to all mobile devices.</p>
<h3>3. Block Any Unwanted Installation</h3>
<p>This happens a lot to seniors or to persons who are not tech savvy at all. If you visit indiscriminate websites on your smart devices, the chances are that a tracking cookie will invite you to install an app on your phone offering a utility that sounds too good to be true. Avoid these installations at all costs. Almost always these so-called apps are spyware that latches on your device and steals all the information that you store on it, including login passwords and credit card numbers.</p>
<h3>4. Lock Down WhatsApp</h3>
<p>If you are not feeling sure about the state of your device you need to install Applock to help you close down all sessions of WhatsApp in all devices where your account might be active. Unfortunately, the app doesn’t have this feature, but you can download the app from the Google Store and lock it on all fronts by setting a unique password or PIN.</p>
<p><iframe loading="lazy" title="How to hack whatsapp || Is it real or fake || 2022 (Only for educational purpose)" width="960" height="540" src="https://www.youtube.com/embed/NGwPGZBO9Ko?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>The post <a href="https://www.msuiche.net/how-to-know-if-my-whatsapp-is-hacked-guide/">How to Check if My WhatsApp is Hacked & Steps to Fix it (2022 Methods)</a> first appeared on <a href="https://www.msuiche.net">Matthieu Suiche</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Qrypter Payload Malware Has Been Finally Decrypted</title>
		<link>https://www.msuiche.net/the-qrypter-payload-malware-has-been-finally-decrypted/</link>
		
		<dc:creator><![CDATA[Jimmy]]></dc:creator>
		<pubDate>Thu, 18 Apr 2019 14:00:45 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.msuiche.net/?p=68</guid>

					<description><![CDATA[<p>This article is about findings from Cybaze-Yoroi ZLAB’s discovery and the dissection of new Qrypter malware and its resulting evolution. It all started with Yoroi’s discovery of a few malicious emails during routine monitoring in the past few weeks. Upon finding these emails, the Yoroi team sent them to certain organizations and found that the malware was targeting Italian users. The contents of the message included a warning to the user that they had been summoned by the court and that they should immediately view the case details in the attached lawsuit document. The file name itself was called “Avviso del tribunale.jar.” Upon dissecting the attachment, the Cybaze-Yoroi ZLAB team was able to track the malware’s complete evolution. Technical Analysis Sha256 4ede0d4787f2e5bc471de3490e5c9327b459985530e42def9cf5d94ea4c2cb2b Threat Qrypter-encrypted jRAT Brief Description Jar file contains jRAT Ssdeep 12288:vimJ+fjGuiwDBA19F7/8fDFsJTVjODmYae:vimkiwDB6z8fZsN3Yae The JAR file is missing a few critical classes which is an immediate red flag that points to the fact that it’s corrupted. As soon as the file is opened it launched a ClassNotFoundException through the Java Virtual Machine, and in relation to a “qua.qrypter.Runner” class name. Qrypter is commonly used in conjunction with AdWind/jRAT malware as a Malware-as-a-Service. But, judging from the new sample findings, there are some new protection techniques in play that weren’t present in the documented cases. You can clearly see the internal structure as soon as you open the JAR filer through a dedicated archive manager, and it shows that a majority of the files have been encrypted. Only the “p14603/p14604/p14605.class denotes a working Java Class. Within the “p14605.class” file is a Java Man and that’s what the developer uses to decrypt and launch the payload. It’s possible to see the emergence of the Qrypter capabilities when you reverse this class. The decryption technique works by using Java reflection in an effort to complicate the analysis. If you look at Figure 4, you’ll see the runtime that’s used to load every malware object. This system requires the malware to attribute the System.out object to a “f11131465014074101” local variable. Only a few code lines are used to develop the malware’s entry point parameters. This is the primary static method and it provides the right parameters from which to create the actual decryption route. A switch approach is used by the decryption routine to apply a finite state machine (FSA). This is a very well-known computational method that’s often used by Computer Scientists and Information Engineers alike. The initial stage is fixed at “24”. The switch instruction checks the “currentState” variable value over and over again and it repeatedly shows the last machine’ state. Based on its value, the switch instruction then jumps over to the right case statement. Inside each case is a decryption routine step and instruction combo that can be used to jump to the next state. In figure 7 you can clearly see how the decryption phase instructions are carried out. The malware attempts to load “qua.qrypter.Runner class through different reflection layers, and you’ll find their name within the “f11131464987745335” variable. This allows the class to activate the exception as a result of the missing class. We were able to write a custom decipher that can be used to extract the sample’s next stage by deconstructing the payload protection mechanism and using the details within. We then reconstructed the malware behavior using this information through static analysis. Through this process, we saw the encryption key cleverly hidden in one of the reflective invocation variables as follows: This information allowed us to go a step further and decrypt all of the protected files inside the JAR archive. We did this by imitating the Qrypter behavior. Basically, the “SecretKeySpec” was developed and delivered to an AES initialized “Cipher” article. But, this is not exactly plain-text just yet, but a GZIP compressed stream, which means it has been passed onto another “GZIPInputStream” object. Among the decrypted files is a serialized “LinkedHashMap” object filled which contains several key-value entries that represent both the fake/encrypted names and the original file names. This object is the key to reconstructing a payload structure. When looking deeper into the hashmap entries we found a number of class names. These names show that there’s an AdWind/jRAT as final payload. Files like “mega.download”, “sky.drive” and “drop.box”, are all popular artifacts that usually come with configurations and private keys. Decrypting them enables you to see the AdWind/jRAT configuration schema clearly. Conclusion Whether or not the final payload is a popular malware is beside the case. The Qrypter is able to hide payloads from different antivirus engines quite well, and the latest version of this malware has gone through an evolution and now comes with a state-machine approach and lots of reflection techniques that researchers were not familiar with. Qrypter was mostly known for its MaaS model but they seem to have changed their M.O., and the malicious author behind it was able to weaponize the AdWind/jRAT payload using this new version of Qrypter.</p>
The post <a href="https://www.msuiche.net/the-qrypter-payload-malware-has-been-finally-decrypted/">The Qrypter Payload Malware Has Been Finally Decrypted</a> first appeared on <a href="https://www.msuiche.net">Matthieu Suiche</a>.]]></description>
										<content:encoded><![CDATA[<p>This article is about findings from Cybaze-Yoroi ZLAB’s discovery and the dissection of new Qrypter malware and its resulting evolution.</p>
<p>It all started with Yoroi’s discovery of a few malicious emails during routine monitoring in the past few weeks. Upon finding these emails, the Yoroi team sent them to certain organizations and found that the malware was targeting Italian users. The contents of the message included a warning to the user that they had been summoned by the court and that they should immediately view the case details in the attached lawsuit document. The file name itself was <span id="more-68"></span>called “Avviso del tribunale.jar.”</p>
<p>Upon dissecting the attachment, the Cybaze-Yoroi ZLAB team was able to track the malware’s complete evolution.</p>
<p><strong>Technical Analysis</strong></p>
<table>
<tbody>
<tr>
<td><strong>Sha256</strong></td>
<td>4ede0d4787f2e5bc471de3490e5c9327b459985530e42def9cf5d94ea4c2cb2b</td>
</tr>
<tr>
<td><strong>Threat</strong></td>
<td>Qrypter-encrypted jRAT</td>
</tr>
<tr>
<td><strong>Brief Description</strong></td>
<td>Jar file contains jRAT</td>
</tr>
<tr>
<td><strong>Ssdeep</strong></td>
<td>12288:vimJ+fjGuiwDBA19F7/8fDFsJTVjODmYae:vimkiwDB6z8fZsN3Yae</td>
</tr>
</tbody>
</table>
<p>The JAR file is missing a few critical classes which is an immediate red flag that points to the fact that it’s corrupted. As soon as the file is opened it launched a ClassNotFoundException through the Java Virtual Machine, and in relation to a “qua.qrypter.Runner” class name.</p>
<p><img loading="lazy" class="alignnone size-full wp-image-69" src="https://www.msuiche.net/wp-content/uploads/2019/04/1.jpg" alt="Qrypter Payload Malware" width="615" height="295" srcset="https://www.msuiche.net/wp-content/uploads/2019/04/1.jpg 615w, https://www.msuiche.net/wp-content/uploads/2019/04/1-300x144.jpg 300w" sizes="(max-width: 615px) 100vw, 615px" /></p>
<p>Qrypter is commonly used in conjunction with AdWind/jRAT malware as a Malware-as-a-Service. But, judging from the new sample findings, there are some new protection techniques in play that weren’t present in the documented cases.</p>
<p><img loading="lazy" class="alignnone size-full wp-image-70" src="https://www.msuiche.net/wp-content/uploads/2019/04/2.jpg" alt="" width="470" height="558" srcset="https://www.msuiche.net/wp-content/uploads/2019/04/2.jpg 470w, https://www.msuiche.net/wp-content/uploads/2019/04/2-253x300.jpg 253w" sizes="(max-width: 470px) 100vw, 470px" /></p>
<p>You can clearly see the internal structure as soon as you open the JAR filer through a dedicated archive manager, and it shows that a majority of the files have been encrypted. Only the “p14603/p14604/p14605.class denotes a working Java Class.</p>
<p><img loading="lazy" class="alignnone size-full wp-image-71" src="https://www.msuiche.net/wp-content/uploads/2019/04/3.jpg" alt="" width="603" height="384" srcset="https://www.msuiche.net/wp-content/uploads/2019/04/3.jpg 603w, https://www.msuiche.net/wp-content/uploads/2019/04/3-300x191.jpg 300w" sizes="(max-width: 603px) 100vw, 603px" /></p>
<p>Within the “p14605.class” file is a Java Man and that’s what the developer uses to decrypt and launch the payload. It’s possible to see the emergence of the Qrypter capabilities when you reverse this class.</p>
<p>The decryption technique works by using Java reflection in an effort to complicate the analysis. If you look at Figure 4, you’ll see the runtime that’s used to load every malware object. This system requires the malware to attribute the System.out object to a “f11131465014074101” local variable.</p>
<p><img loading="lazy" class="alignnone size-full wp-image-72" src="https://www.msuiche.net/wp-content/uploads/2019/04/4.jpg" alt="" width="795" height="84" srcset="https://www.msuiche.net/wp-content/uploads/2019/04/4.jpg 795w, https://www.msuiche.net/wp-content/uploads/2019/04/4-300x32.jpg 300w, https://www.msuiche.net/wp-content/uploads/2019/04/4-768x81.jpg 768w" sizes="(max-width: 795px) 100vw, 795px" /></p>
<p>Only a few code lines are used to develop the malware’s entry point parameters. This is the primary static method and it provides the right parameters from which to create the actual decryption route.</p>
<p><img loading="lazy" class="alignnone size-full wp-image-73" src="https://www.msuiche.net/wp-content/uploads/2019/04/5.jpg" alt="" width="729" height="232" srcset="https://www.msuiche.net/wp-content/uploads/2019/04/5.jpg 729w, https://www.msuiche.net/wp-content/uploads/2019/04/5-300x95.jpg 300w" sizes="(max-width: 729px) 100vw, 729px" /></p>
<p>A switch approach is used by the decryption routine to apply a finite state machine (FSA). This is a very well-known computational method that’s often used by Computer Scientists and Information Engineers alike. The initial stage is fixed at “24”.</p>
<p><img loading="lazy" class="alignnone size-full wp-image-74" src="https://www.msuiche.net/wp-content/uploads/2019/04/6.jpg" alt="" width="550" height="402" srcset="https://www.msuiche.net/wp-content/uploads/2019/04/6.jpg 550w, https://www.msuiche.net/wp-content/uploads/2019/04/6-300x219.jpg 300w" sizes="(max-width: 550px) 100vw, 550px" /></p>
<p>The switch instruction checks the “currentState” variable value over and over again and it repeatedly shows the last machine’ state. Based on its value, the switch instruction then jumps over to the right case statement.</p>
<p>Inside each case is a decryption routine step and instruction combo that can be used to jump to the next state. In figure 7 you can clearly see how the decryption phase instructions are carried out. The malware attempts to load “qua.qrypter.Runner class through different reflection layers, and you’ll find their name within the “f11131464987745335” variable. This allows the class to activate the exception as a result of the missing class.</p>
<p><img loading="lazy" class="alignnone size-full wp-image-75" src="https://www.msuiche.net/wp-content/uploads/2019/04/7.jpg" alt="" width="784" height="154" srcset="https://www.msuiche.net/wp-content/uploads/2019/04/7.jpg 784w, https://www.msuiche.net/wp-content/uploads/2019/04/7-300x59.jpg 300w, https://www.msuiche.net/wp-content/uploads/2019/04/7-768x151.jpg 768w" sizes="(max-width: 784px) 100vw, 784px" /></p>
<p>We were able to write a custom decipher that can be used to extract the sample’s next stage by deconstructing the payload protection mechanism and using the details within. We then reconstructed the malware behavior using this information through static analysis.</p>
<p>Through this process, we saw the encryption key cleverly hidden in one of the reflective invocation variables as follows:</p>
<p><img loading="lazy" class="alignnone size-full wp-image-76" src="https://www.msuiche.net/wp-content/uploads/2019/04/8.jpg" alt="" width="750" height="82" srcset="https://www.msuiche.net/wp-content/uploads/2019/04/8.jpg 750w, https://www.msuiche.net/wp-content/uploads/2019/04/8-300x33.jpg 300w" sizes="(max-width: 750px) 100vw, 750px" /></p>
<p>This information allowed us to go a step further and decrypt all of the protected files inside the JAR archive. We did this by imitating the Qrypter behavior. Basically, the “SecretKeySpec” was developed and delivered to an AES initialized “Cipher” article. But, this is not exactly plain-text just yet, but a GZIP compressed stream, which means it has been passed onto another “GZIPInputStream” object.</p>
<p><img loading="lazy" class="alignnone size-full wp-image-78" src="https://www.msuiche.net/wp-content/uploads/2019/04/9.jpg" alt="" width="601" height="133" srcset="https://www.msuiche.net/wp-content/uploads/2019/04/9.jpg 601w, https://www.msuiche.net/wp-content/uploads/2019/04/9-300x66.jpg 300w" sizes="(max-width: 601px) 100vw, 601px" /></p>
<p>Among the decrypted files is a serialized “LinkedHashMap” object filled which contains several key-value entries that represent both the fake/encrypted names and the original file names. This object is the key to reconstructing a payload structure.</p>
<p><a href="https://www.msuiche.net/wp-content/uploads/2019/04/10.jpg"><img loading="lazy" class="alignnone wp-image-79" src="https://www.msuiche.net/wp-content/uploads/2019/04/10.jpg" alt="Qrypter Payload virus" width="850" height="399" srcset="https://www.msuiche.net/wp-content/uploads/2019/04/10.jpg 1349w, https://www.msuiche.net/wp-content/uploads/2019/04/10-300x141.jpg 300w, https://www.msuiche.net/wp-content/uploads/2019/04/10-768x360.jpg 768w, https://www.msuiche.net/wp-content/uploads/2019/04/10-1024x480.jpg 1024w, https://www.msuiche.net/wp-content/uploads/2019/04/10-1140x535.jpg 1140w" sizes="(max-width: 850px) 100vw, 850px" /></a></p>
<p>When looking deeper into the hashmap entries we found a number of class names. These names show that there’s an AdWind/jRAT as final payload. Files like “mega.download”, “sky.drive” and “drop.box”, are all popular artifacts that usually come with configurations and private keys.</p>
<p>Decrypting them enables you to see the AdWind/jRAT configuration schema clearly.</p>
<p><a href="https://www.msuiche.net/wp-content/uploads/2019/04/11.jpg"><img loading="lazy" class="alignnone wp-image-80" src="https://www.msuiche.net/wp-content/uploads/2019/04/11-1024x544.jpg" alt="11" width="861" height="457" srcset="https://www.msuiche.net/wp-content/uploads/2019/04/11-1024x544.jpg 1024w, https://www.msuiche.net/wp-content/uploads/2019/04/11-300x159.jpg 300w, https://www.msuiche.net/wp-content/uploads/2019/04/11-768x408.jpg 768w, https://www.msuiche.net/wp-content/uploads/2019/04/11-1140x606.jpg 1140w, https://www.msuiche.net/wp-content/uploads/2019/04/11.jpg 1461w" sizes="(max-width: 861px) 100vw, 861px" /></a></p>
<p><strong>Conclusion</strong></p>
<p>Whether or not the final payload is a popular malware is beside the case. The Qrypter is able to hide payloads from different antivirus engines quite well, and the latest version of this malware has gone through an evolution and now comes with a state-machine approach and lots of reflection techniques that researchers were not familiar with.</p>
<p>Qrypter was mostly known for its MaaS model but they seem to have changed their M.O., and the malicious author behind it was able to weaponize the AdWind/jRAT payload using this new version of Qrypter.</p>The post <a href="https://www.msuiche.net/the-qrypter-payload-malware-has-been-finally-decrypted/">The Qrypter Payload Malware Has Been Finally Decrypted</a> first appeared on <a href="https://www.msuiche.net">Matthieu Suiche</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Hack Facebook Account &#8211; 2022 Working Methods</title>
		<link>https://www.msuiche.net/how-to-hack-facebook-account-working-methods/</link>
					<comments>https://www.msuiche.net/how-to-hack-facebook-account-working-methods/#respond</comments>
		
		<dc:creator><![CDATA[Jimmy]]></dc:creator>
		<pubDate>Thu, 18 Apr 2019 12:25:14 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.msuiche.net/?p=43</guid>

					<description><![CDATA[<p>They say that hacking is one of the most frowned upon processes to take part in, and while that may be true, there are plenty of people out there hacking for the “greater good”. All of the information that you&#8217;ll be reading through within this article is to be used for personal use only – this is merely a way to go about retrieving an account that you&#8217;ve lost access to, or anything of that nature. If you plan on using these methods and other procedures to hack Facebook accounts of others, well, that&#8217;s on you! Source where I&#8217;ve discovered some of these methods is this post by SecurityEquifax cybersecurity blog. I &#8220;upgraded&#8221; them a little with my own knowledge and added some more, so this tutorial should be ultimate and readers don&#8217;t have to look for any other place to learn about Facebook hacking. Using this tutorial to fuel your illegal endeavors is definitely not our main goal here, and if that is your main purpose, we would like to politely ask you to leave. We can&#8217;t make you leave, of course, but we can suggest it – using hacks in a negative manner has never done the world good anyhow. With all of that being said, we&#8217;re going to talk about a few different techniques that you can use for your “ethical hacking” needs. Most of you reading this have lost the password to an important account in the past, causing you to jump through loops in order to get it back. With the ethical hacking tips that we&#8217;re going to share with you, there&#8217;s no telling how easy you&#8217;ll be able to bust into your old and inactive accounts. Will I Get Into Trouble? If you&#8217;re using all of these hacking applications and procedures to hack into FB accounts that you&#8217;ve created yourself, there&#8217;s no reason to wonder whether you&#8217;ll be getting in trouble or not. It may break the terms of service in on way or another, but if that&#8217;s the case, you&#8217;ll probably just get banned – then again, how many websites would ban you for hacking into your own personal account? Trouble only starts to arise once you&#8217;ve taken your hacking skills and brought them into the realm of illegal activity. Hacking into  accounts of others is definitely a criminal act, and while it may seem harmless at the time, there are plenty of consequences that could come from it. Don&#8217;t be silly and just stick to what we want you to; ethical hacking which isn&#8217;t harming anyone. The Methods &#8211; Table of Content for Quick Navigation: 1. Brute Force Method 1.1 Facebook Brute Force Hack Tool 2. Phishing Method 2.1. How to Create a Phishing Page for Facebook? 3. Using a Keylogger 4. Using Social Engineering Skills 5. By Guessing a Password 6. Using RAT (Remote Access Trojan) 7. Using Man in the Middle Attack &#8211; How to Stay Protected from Hackers? How to Hack Facebook Account with Brute Force Method? This is the most common type of hacking implemented all over the world, as it&#8217;s a very simple and straight-forward process. The brute force method is one that has been around for a very long time, and since it&#8217;s still effective, there&#8217;s no reason to scrap it just yet. This process will have a special developed program run through an abundance of possible passwords for any given account, until the proper one has been found. It can take a long time in certain situations, but if you need an account hacked and you aren&#8217;t exactly a professional, it will get the job done. There are many different places to purchase a bruteforce cracking tools, which is a software needed to go through with the actual hacking code itself. If you don&#8217;t have trustworthy software to work with, you aren&#8217;t going to get very far – some of the best brute-force tool providers are going to keep themselves low-key, so don&#8217;t be afraid to look around. What Can I Use It For? There are various reasons as to why you would apply a bruteforce technique to a situation, and that doesn&#8217;t just mean hacking into your old Facebook accounts. Some of the more respectable uses would be: Monitoring of Employees – If you run a business and you aren&#8217;t completely sure of the intentions surrounding an employee, you could hack into their FB account and see what they are really up to. Is it a little bit shady? Maybe so, but the reputation and safety of your business may be on the line! Parental Control – Parents who cannot se what their kids are doing online are oblivious, as there are many dangers out there to fuss over. Kids are always going to be doing silly things with computers, but with the right bruteforce tool, there&#8217;s no way they can stop you from gaining access. Check out what they&#8217;ve been up to online with the click of a button. Social Media – Hacking a reputable social media account is bound to get you some sort of respect online, although that wouldn&#8217;t fall into the “ethical hacking” category. If you&#8217;ve lost access to a social media account that you used to make money or even just had a cult following with, a brute-force will allow you to “hack it back” (for lack of better words!). What to Look For Some bruteforce hacks are going to seem as if they are better than others, and that&#8217;s because this rings true in some instances. It&#8217;s almost like buying a car, you have to weigh the pro&#8217;s and con&#8217;s of each option and see which one comes out on top. For example, some of the things that you should be looking for in your software would be: 24/7 customer support available &#8211; just in case you have an issue with the software and need to talk to someone The tool needs to be effective and easy to use Able to break into any account within mere minutes Modernized and filled to the brim with new software/technology Completely undetectable If you come across a bruteforce tool provider that can give you everything we&#8217;ve listed above, you might want to start working with them as soon as possible. Finding a reliable source is tough enough as it is – when you&#8217;ve found the right one, make sure you&#8217;re holding on tight! Our Recommendation: Facebook Brute Force Hack &#8211; &#8220;Tool v.2.9.0.&#8221; One of the most reliable Facebook bruteforce software as of today is Tool v.2.9.0 by Progressive PST team of coders. It helped thousands of Facebook users recover back their lost accounts. Make sure to download it from its official website only (www.progressivepst.com) because hackers often uploads this tool on other sources, like torrents, where their bind the program with other spyware or trojan horses which can infect your computer and you may become a victim at the end. The Tool v.2.9.0 comes with enhanced technology of brute force attack built inside which automatically changes fresh new IP addresses after every 3 unsuccessful login attempts. This makes the application to run all the time without crashing until it finds the right matching password of desired Facebook account you&#8217;d like to get access into. How to Hack Facebook Password with Phishing? What Are “Phishing Hacks”? Phishing hacks aren&#8217;t software-based, as it&#8217;s considered to be more of a tricky process to go through. You&#8217;ve literally got to trick people into putting their passwords in on your phishing page (which we will talk about in a second); it&#8217;s like trying to trick somebody to give you their bank PIN number. While this may seem like an impossible task, it&#8217;s actually relatively simple. Seeing as the entire process takes place without the use of any hacking software, you should be able to put a phishing page up in no time at all. How to Create a Phishing Page for Facebook? Creating a phishing page should be used for nothing with ill intent behind it. If you&#8217;re trying to keep tabs on an employee or even your children that&#8217;s one thing; just know that we aren&#8217;t responsible for anything you decide to do with this guide. With that being said, let&#8217;s jump into it! Step #1 For this step, you&#8217;ll want to go to the Facebook login page (while you aren&#8217;t logged in). Right-click on this page and select the “view page source” option – this can also be done with the “CTRL + U” shortcut. A new tab will be opened at this point. Step #2 After the new tab has been opened, right-click again and select the “Save As” option. Change the title of this page to “index.html” and save it somewhere on your computer; preferably an easily accessed folder. Step #3 Open the file that you&#8217;ve just saved using Notepad, as this will allow you to edit it. Press “CTRL + F” and use the “Find” function to find the phrase “action=” (without quotations). There are few actions in total to look for, so click on “Find Next” afterwards and be sure to select the first one. Step #4 There is a link located after the first “action=”, and this is where you&#8217;ll swap the link that is there with “post.php”. The link will be gone, but the “post.php” is present within the brackets – the main goal here is to send the user to the phishing page, as opposed to the real Facebook login page. So, before: After you&#8217;ve replaced the original link with &#8220;post.php&#8221;: Step #5 Now you have to go through the process of creating the Post.php script itself. To do this, you&#8217;ll want to open a new Notepad blank file and copy-paste the script we&#8217;ve created: &#60;?php header (&#8216;Location: https://www.facebook.com&#8217;); $handle = fopen(&#8220;log.txt&#8221;, &#8220;a&#8221;); foreach($_POST as $variable =&#62; $value) { fwrite($handle, $variable); fwrite($handle, &#8220;=&#8221;); fwrite($handle, $value); fwrite($handle, &#8220;\r\n&#8221;); } fwrite($handle, &#8220;\r\n&#8221;); fclose($handle); exit; ?&#62; Save this in your Notepad file and name it “post.php” &#8211; this will log all of the information that people put into your phishing page (their FB passwords), storing it within another Notepad filed that is called “log.txt” which you will find inside your server (keep reading). Step #6 After you&#8217;ve put the phishing page together, you&#8217;ll need to get your hands on a domain name that is somewhat convincing. If you&#8217;re targeting someone who uses a Facebook account, it will have the mimic that domain (Facebook.com &#60;&#8211; See the two &#8220;o&#8221;) – if it&#8217;s another social media platform or websites, you&#8217;ll have to adjust accordingly. Websites are in need of hosting, and while you can find plenty of hosting providers, not all of them are okay with hosting phishing sites. Free webhosting will almost always have a terrible domain extension associated with it, so the paid route is the most ideal (it&#8217;s usually a few dollars a month, depends of a quality and reputation of a company). To keep this step short and simple, this is where you implement a domain name and webhosting. If you want a recommendation for best deal how to get a domain name for just 0.99$ and hosting for 1$ for your first month, please send me a message with subject &#8220;Domain and Hosting Deal&#8221; and I&#8217;ll send you the links where to register each and give you a coupon code. I won&#8217;t post this information here to avoid legal problems since these companies are probably not accepting hosting phishing sites, so publicly recommending them for these actions is probably not a good idea. You&#8217;re however free to search for some by your own as well if you want. Step #7 Once your website is ready to be uploaded and the host is good to go, you&#8217;ll add both your “index.html” and “post.php” files to the File Manager (typically found in the Control Panel of your webhosting providers site). Look for a folder called “public_html”, although sometimes it can be called “HTDOCS”. If there are already index.html file located within that folder, delete it and replace it with...</p>
The post <a href="https://www.msuiche.net/how-to-hack-facebook-account-working-methods/">How to Hack Facebook Account – 2022 Working Methods</a> first appeared on <a href="https://www.msuiche.net">Matthieu Suiche</a>.]]></description>
										<content:encoded><![CDATA[<p>They say that hacking is one of the most frowned upon processes to take part in, and while that may be true, there are plenty of people out there hacking for the “greater good”. All of the information that you&#8217;ll be reading through within this article is to be used for personal use only – this is merely a way to go about retrieving an account that you&#8217;ve lost access to, or anything of that nature. If you plan on using these methods and other procedures to hack Facebook accounts of others, well, that&#8217;s on you!</p>
<p>Source where I&#8217;ve discovered some of these methods is <a href="https://securityequifax2017.com/how-to-hack-facebook-account-tutorial/" target="_blank" rel="noopener noreferrer">this post by SecurityEquifax cybersecurity blog</a>. I &#8220;upgraded&#8221; them a little with my own knowledge and added some more, so this tutorial should be ultimate and readers don&#8217;t have to look for any other place to learn about Facebook hacking.</p>
<p>Using this tutorial to fuel your illegal endeavors is definitely not our main goal here, and if that is your main <span id="more-43"></span>purpose, we would like to politely ask you to leave. We can&#8217;t make you leave, of course, but we can suggest it – using hacks in a negative manner has never done the world good anyhow.</p>
<p>With all of that being said, we&#8217;re going to talk about a few different techniques that you can use for your “ethical hacking” needs. Most of you reading this have lost the password to an important account in the past, causing you to jump through loops in order to get it back. With the ethical hacking tips that we&#8217;re going to share with you, there&#8217;s no telling how easy you&#8217;ll be able to bust into your old and inactive accounts.</p>
<h3>Will I Get Into Trouble?</h3>
<p>If you&#8217;re using all of these hacking applications and procedures to hack into FB accounts that you&#8217;ve created yourself, there&#8217;s no reason to wonder whether you&#8217;ll be getting in trouble or not. It may break the terms of service in on way or another, but if that&#8217;s the case, you&#8217;ll probably just get banned – then again, how many websites would ban you for hacking into your own personal account?</p>
<p>Trouble only starts to arise once you&#8217;ve taken your hacking skills and brought them into the realm of illegal activity. Hacking into  accounts of others is definitely a criminal act, and while it may seem harmless at the time, there are plenty of consequences that could come from it. Don&#8217;t be silly and just stick to what we want you to; ethical hacking which isn&#8217;t harming anyone.</p>
<h3>The Methods &#8211; Table of Content for Quick Navigation:</h3>
<p>1. <a href="#bruteforce">Brute Force Method</a><br />
1.1 <a href="#fb-hack-tool">Facebook Brute Force Hack Tool</a><br />
2. <a href="#phishing">Phishing Method</a><br />
2.1. <a href="#how-to-create-fb-phishing-page">How to Create a Phishing Page for Facebook?</a><br />
3. <a href="#keylogger">Using a Keylogger</a><br />
4. <a href="#social-engineering">Using Social Engineering Skills</a><br />
5. <a href="#guessing-password">By Guessing a Password</a><br />
6. <a href="#rat">Using RAT (Remote Access Trojan)</a><br />
7. <a href="#MITM">Using Man in the Middle Attack</a><br />
&#8211; <a href="#stay-protected">How to Stay Protected from Hackers?</a></p>
<h2 id="bruteforce">How to Hack Facebook Account with Brute Force Method?</h2>
<p>This is the most common type of hacking implemented all over the world, as it&#8217;s a very simple and straight-forward process. The brute force method is one that has been around for a very long time, and since it&#8217;s still effective, there&#8217;s no reason to scrap it just yet. This process will have a special developed program run through an abundance of possible passwords for any given account, until the proper one has been found. It can take a long time in certain situations, but if you need an account hacked and you aren&#8217;t exactly a professional, it will get the job done.</p>
<p>There are many different places to purchase a bruteforce cracking tools, which is a software needed to go through with the actual hacking code itself. If you don&#8217;t have trustworthy software to work with, you aren&#8217;t going to get very far – some of the best brute-force tool providers are going to keep themselves low-key, so don&#8217;t be afraid to look around.</p>
<h3>What Can I Use It For?</h3>
<p>There are various reasons as to why you would apply a bruteforce technique to a situation, and that doesn&#8217;t just mean hacking into your old Facebook accounts. Some of the more respectable uses would be:</p>
<p><strong>Monitoring of Employees </strong>– If you run a business and you aren&#8217;t completely sure of the intentions surrounding an employee, you could hack into their FB account and see what they are really up to. Is it a little bit shady? Maybe so, but the reputation and safety of your business may be on the line!</p>
<p><strong>Parental Control </strong>– Parents who cannot se what their kids are doing online are oblivious, as there are many dangers out there to fuss over. Kids are always going to be doing silly things with computers, but with the right bruteforce tool, there&#8217;s no way they can stop you from gaining access. Check out what they&#8217;ve been up to online with the click of a button.</p>
<p><strong>Social Media</strong> – Hacking a reputable social media account is bound to get you some sort of respect online, although that wouldn&#8217;t fall into the “ethical hacking” category. If you&#8217;ve lost access to a social media account that you used to make money or even just had a cult following with, a brute-force will allow you to “hack it back” (for lack of better words!).</p>
<h3>What to Look For</h3>
<p>Some bruteforce hacks are going to seem as if they are better than others, and that&#8217;s because this rings true in some instances. It&#8217;s almost like buying a car, you have to weigh the pro&#8217;s and con&#8217;s of each option and see which one comes out on top. For example, some of the things that you should be looking for in your software would be:</p>
<ul>
<li>24/7 customer support available &#8211; just in case you have an issue with the software and need to talk to someone</li>
<li>The tool needs to be effective and easy to use</li>
<li>Able to break into any account within mere minutes</li>
<li>Modernized and filled to the brim with new software/technology</li>
<li>Completely undetectable</li>
</ul>
<p>If you come across a bruteforce tool provider that can give you everything we&#8217;ve listed above, you might want to start working with them as soon as possible. Finding a reliable source is tough enough as it is – when you&#8217;ve found the right one, make sure you&#8217;re holding on tight!</p>
<h3 id="fb-hack-tool">Our Recommendation: Facebook Brute Force Hack &#8211; &#8220;Tool v.2.9.0.&#8221;</h3>
<p><img loading="lazy" class="alignleft size-full wp-image-48" src="https://www.msuiche.net/wp-content/uploads/2019/04/facebook-bruteforce-hack.jpg" alt="Facebook Brute Force Hack Tool" width="299" height="405" srcset="https://www.msuiche.net/wp-content/uploads/2019/04/facebook-bruteforce-hack.jpg 299w, https://www.msuiche.net/wp-content/uploads/2019/04/facebook-bruteforce-hack-221x300.jpg 221w" sizes="(max-width: 299px) 100vw, 299px" /> One of the most reliable Facebook bruteforce software as of today is <strong><u><a href="https://www.progressivepst.com/" target="_blank" rel="noopener noreferrer">Tool v.2.9.0 by Progressive PST</a></u></strong> team of coders. It helped thousands of Facebook users recover back their lost accounts. Make sure to download it from its official website only (www.progressivepst.com) because hackers often uploads this tool on other sources, like torrents, where their bind the program with other spyware or <a href="https://en.wikipedia.org/wiki/Trojan_horse_(computing)" target="_blank" rel="noopener noreferrer">trojan horses</a> which can infect your computer and you may become a victim at the end.</p>
<p>The Tool v.2.9.0 comes with enhanced technology of brute force attack built inside which automatically changes fresh new IP addresses after every 3 unsuccessful login attempts. This makes the application to run all the time without crashing until it finds the right matching password of desired Facebook account you&#8217;d like to get access into.</p>
<h2 id="phishing">How to Hack Facebook Password with Phishing?</h2>
<h3>What Are “Phishing Hacks”?</h3>
<p>Phishing hacks aren&#8217;t software-based, as it&#8217;s considered to be more of a tricky process to go through. You&#8217;ve literally got to trick people into putting their passwords in on your phishing page (which we will talk about in a second); it&#8217;s like trying to trick somebody to give you their bank PIN number. While this may seem like an impossible task, it&#8217;s actually relatively simple. Seeing as the entire process takes place without the use of any hacking software, you should be able to put a phishing page up in no time at all.</p>
<h3 id="how-to-create-fb-phishing-page">How to Create a Phishing Page for Facebook?</h3>
<p>Creating a phishing page should be used for nothing with ill intent behind it. If you&#8217;re trying to keep tabs on an employee or even your children that&#8217;s one thing; just know that we aren&#8217;t responsible for anything you decide to do with this guide. With that being said, let&#8217;s jump into it!</p>
<p><strong>Step #1</strong></p>
<p>For this step, you&#8217;ll want to go to the Facebook login page (while you aren&#8217;t logged in). Right-click on this page and select the “view page source” option – this can also be done with the “CTRL + U” shortcut. A new tab will be opened at this point.</p>
<p><strong>Step #2</strong></p>
<p>After the new tab has been opened, right-click again and select the “Save As” option. Change the title of this page to “index.html” and save it somewhere on your computer; preferably an easily accessed folder.</p>
<p><strong>Step #3</strong></p>
<p>Open the file that you&#8217;ve just saved using Notepad, as this will allow you to edit it. Press “CTRL + F” and use the “Find” function to find the phrase “action=” (without quotations). There are few actions in total to look for, so click on “Find Next” afterwards and be sure to select the <strong>first one</strong>.</p>
<p><strong>Step #4</strong></p>
<p>There is a link located after the first “action=”, and this is where you&#8217;ll swap the link that is there with “post.php”. The link will be gone, but the “post.php” is present within the brackets – the main goal here is to send the user to the phishing page, as opposed to the real Facebook login page.</p>
<p>So, before:<br />
<img loading="lazy" class="alignnone size-full wp-image-57" src="https://www.msuiche.net/wp-content/uploads/2019/04/facebook-phishing-method.jpg" alt="Facebook Phishing Method" width="770" height="334" srcset="https://www.msuiche.net/wp-content/uploads/2019/04/facebook-phishing-method.jpg 770w, https://www.msuiche.net/wp-content/uploads/2019/04/facebook-phishing-method-300x130.jpg 300w, https://www.msuiche.net/wp-content/uploads/2019/04/facebook-phishing-method-768x333.jpg 768w" sizes="(max-width: 770px) 100vw, 770px" /></p>
<p>After you&#8217;ve replaced the original link with &#8220;post.php&#8221;:<br />
<img loading="lazy" class="alignnone size-full wp-image-58" src="https://www.msuiche.net/wp-content/uploads/2019/04/after-fb-phishing.jpg" alt="After FB Phishing" width="770" height="331" srcset="https://www.msuiche.net/wp-content/uploads/2019/04/after-fb-phishing.jpg 770w, https://www.msuiche.net/wp-content/uploads/2019/04/after-fb-phishing-300x129.jpg 300w, https://www.msuiche.net/wp-content/uploads/2019/04/after-fb-phishing-768x330.jpg 768w" sizes="(max-width: 770px) 100vw, 770px" /></p>
<p><strong>Step #5</strong></p>
<p>Now you have to go through the process of creating the Post.php script itself. To do this, you&#8217;ll want to open a new Notepad blank file and copy-paste the script we&#8217;ve created:</p>
<p>&lt;?php<br />
header (&#8216;Location: https://www.facebook.com&#8217;);<br />
$handle = fopen(&#8220;log.txt&#8221;, &#8220;a&#8221;);<br />
foreach($_POST as $variable =&gt; $value) {<br />
fwrite($handle, $variable);<br />
fwrite($handle, &#8220;=&#8221;);<br />
fwrite($handle, $value);<br />
fwrite($handle, &#8220;\r\n&#8221;);<br />
}<br />
fwrite($handle, &#8220;\r\n&#8221;);<br />
fclose($handle);<br />
exit;<br />
?&gt;</p>
<p>Save this in your Notepad file and name it “post.php” &#8211; this will log all of the information that people put into your phishing page (their FB passwords), storing it within another Notepad filed that is called “log.txt” which you will find inside your server (keep reading).</p>
<p><strong>Step #6</strong></p>
<p>After you&#8217;ve put the phishing page together, you&#8217;ll need to get your hands on a domain name that is somewhat convincing. If you&#8217;re targeting someone who uses a Facebook account, it will have the mimic that domain (Facebook.com &lt;&#8211; See the two &#8220;o&#8221;) – if it&#8217;s another social media platform or websites, you&#8217;ll have to adjust accordingly. Websites are in need of hosting, and while you can find plenty of hosting providers, not all of them are okay with hosting phishing sites. Free webhosting will almost always have a terrible domain extension associated with it, so the paid route is the most ideal (it&#8217;s usually a few dollars a month, depends of a quality and reputation of a company). To keep this step short and simple, this is where you implement a domain name and webhosting.</p>
<p>If you want a recommendation for best deal how to get a domain name for just 0.99$ and hosting for 1$ for your first month, please <a href="https://www.msuiche.net/contact/">send me a message</a> with subject &#8220;Domain and Hosting Deal&#8221; and I&#8217;ll send you the links where to register each and give you a coupon code.<br />
I won&#8217;t post this information here to avoid legal problems since these companies are probably not accepting hosting phishing sites, so publicly recommending them for these actions is probably not a good idea.</p>
<p>You&#8217;re however free to search for some by your own as well if you want.</p>
<p><strong>Step #7</strong></p>
<p>Once your website is ready to be uploaded and the host is good to go, you&#8217;ll add both your “index.html” and “post.php” files to the File Manager (typically found in the Control Panel of your webhosting providers site). Look for a folder called “public_html”, although sometimes it can be called “HTDOCS”. If there are already index.html file located within that folder, delete it and replace it with the one you&#8217;ve created.</p>
<p><strong>Step #8</strong></p>
<p>At this point, you&#8217;ll need to check whether your phishing site is up and running or not. The best way to do this is to type in the URL of the site yourself; if you&#8217;ve paid for hosting, there won&#8217;t be a domain extension to worry about.</p>
<p><strong>Step #9</strong></p>
<p>This is where you&#8217;ll create a persona of sorts, starting with an e-mail address. Try to have it resemble that of a Facebook security officer, or anything that is remotely believable – if you&#8217;re trying to gain access to your kids Facebook account, saying you are Justin Bieber might do the trick. Create a persona and write up a reputable looking e-mail, one that gets a reader wanting to visit the website. Post a link to your site within emails and begin your journey to the truth!</p>
<h3>Conclusion</h3>
<p>While creating a phishing website is more than likely the least ethical thing we&#8217;ll ever talk about on this website, there are still ethical ways to go about applying it. Everybody that visits your website and puts their username/password in will have their information stored to be looked at whenever you feel it fits; and that kind of power is something that you can do many different things with. They&#8217;ll believe that they are really signing into Facebook, but that isn&#8217;t the case at all – they&#8217;re actually signing in on your phishing page.</p>
<h2 id="keylogger">How to Hack Facebook Account Using a Keylogger?</h2>
<h3>What Is a Keylogger?</h3>
<p>Keyloggers are exactly what the name would suggest – programs that log the keystrokes of users, logging all of their passwords and other useful information in the process, and saving them in a folder deeply hidden inside your hard drive &amp; uploading them to a hacker&#8217;s server or email by given interval. Keylogging websites have become somewhat of a staple within the hacking community, especially if you&#8217;re able to make it look similar to another trustworthy website (usually one that is incredibly popular). While creating a keylogger website that mimics YouTube isn&#8217;t an easy task, it&#8217;s an incredibly smart one, to say the least.</p>
<p>There are many different keylogger software to choose from, some of which are going to appeal more towards the mobile side of things. Hacking into mobile phones is a bit different from into hacking computers in this sense, so we&#8217;re going to look at reputable keylogging programs that pertain to both of those platforms. There&#8217;s really nothing better than a properly implemented keylogger hack!</p>
<h3>Different Types of Keylogger Tools</h3>
<h4>Keyloggers for Microsoft Windows</h4>
<p>For Windows, there are a lot of options, like with any other operating system. While there are plenty to choose from, only a few are going to give you the best bang for your buck. We&#8217;re going to take a look at a few viable options for Windows users out there, all of which will handle your keylogging needs quite nicely.</p>
<p><strong>KidLogger</strong> – Marketed as a parental control application, KidLogger is a keylogging application that will allow you to track the activity of your children online. Of course, this could be applied to other means, but for the most part people will just be looking out for their kids. It allows you to do many different things, such as look at who your kids have been talking to online, as well as how frequently they&#8217;ve been doing so. Websites visited will be tracked, as well as photos that have been uploaded to the computer and specific information regarding their conversations.</p>
<p><strong>Ardamax Keylogger</strong> – Arguably the best remote keylogger that is undetectable, Ardamax has been in the game for a very long time. Those that were into hacking Runescape accounts or anything of that nature 10 years ago will know all about Ardamax, and now that they&#8217;ve brought their software into the modern era, it&#8217;s only gotten better. It will operate in the background under total silence, logging every single keystroke that the affected computer puts in. It&#8217;s incredibly comprehensive and effective, with advanced security features to keep you feeling safe.</p>
<h4>Keyloggers for Mac OS</h4>
<p>MacOS also has some specific keylogger options to work with, and if you&#8217;ve got this particular operating system, the options we&#8217;ve listed below are more than reliable enough to get the job done right.</p>
<p><strong>Spyrix</strong> – Not only will you be able to log the keystrokes of any given Mac OS computer, but you&#8217;ll also be able to take snapshots of the screen to see what they are looking at as well. You&#8217;ll be able to view the screen itself live, as well as remotely monitor conversations through the use of a secured web account. Skype, Facebook and any other type of IM messenger conversation can be logged and sent to your e-mail (as long as you&#8217;ve got an active internet connection). Undetectable and untraceable, this is the ultimate MacOS keylogger option. There is a free option available, as well as a paid one that offers more features.</p>
<p><strong>Elite Keylogger</strong> – Although this option can be used for both Windows and Mac, it&#8217;s one of the only options that allows you to do that. The right keylogger will not only allow you to monitor your own personal computer, but you could go above and beyond that with the “Corporate License” package. You&#8217;ll be able to monitor as many computers as you&#8217;d like, all for the low price of $299.</p>
<h4>Keyloggers for Android/iOS</h4>
<p>The mobile world has been growing rapidly as of recent, and that means that the hacks need to follow suit. If you want to use a keylogger on any kind of Android or iOS device, either of the ones that we recommend here should be more than enough.</p>
<p><strong>mSpy (<a href="https://www.msuiche.net/how-to-hack-twitter-account/#mspy-features">Download</a>)</strong> – With mSpy, you&#8217;ll be able to remotely track any phone that you&#8217;d like, as well as track their GPS information. Skype and Facebook conversations will be open for you to look over, as well as plenty of other data – web history and deleted text messages are included as well. They have 24/7 customer support available, and for the low price of $23 /month, that&#8217;s a steal and a half.</p>
<p><strong>Spyzie</strong> – Known as the “all-in-one phone spy solution”, Spyzie is a useful piece of software that will allow you to track the activity of any given mobile device, without having to jailbreak or root them. With “Invisible Mode” there&#8217;s no way that you&#8217;ll be detected, and it will allow you to track browser and conversation data at will.</p>
<p><strong>iKeymonitor</strong> – The perfect parental control app, finding out the truth has never been as easy as it is with iKeyMonitor. You&#8217;ll never need to ponder whether your kids are hiding any conversations from you, or any private pictures – iKeyMonitor will sniff it out with ease. There is a free version available, but there is room for growth, as paid plans are available that unlock more features.</p>
<p>Regardless of the keylogger type you&#8217;re in need of, there are a couple of different options to pick from that we&#8217;ve listed above. Look them over and see which one you feel is the best fit – from there, you can proceed to use your keylogger software as you please.</p>
<h2 id="social-engineering">How to Hack Facebook with Social Engineering Skills?</h2>
<p>Social engineering is essentially the act of tricking somebody into giving you their password. It might seem silly at first, but it&#8217;s actually a very efficient way to go about “hacking” into an account. For the most part, many of you reading this have been hit with a social engineering attack, and you may not even know it. The spam e-mails that you&#8217;re constantly deleting in your spam folder are more than likely the result of this, but the ones that somehow get through are the troubling ones – they look as legit as any other promotion e-mail. Sometimes they will come in the form of a Facebook moderator, or someone posing as an educational authority figure. Whatever the case may be, there are plenty of social engineering hacks out there, and they may be closer than you think.</p>
<p>Just think about how trusting you can be with complete strangers; pizza delivery guys won&#8217;t spit in your food, right? If you&#8217;re a kind of person that gives a stranger a benefit of a doubt, you may be a perfect victim for a social engineering hack.</p>
<p>If there are any spam e-mails that ask you to verify your information through a log-in page, or anything that could resemble a phishing attack, you&#8217;ll be able to see through all of the nonsense. Of course, if you want to use this information for yourself to implement some social engineering attacks, nobody will blame you (just remember, we didn&#8217;t tell you to do it).</p>
<h2 id="guessing-password">Guessing a Password</h2>
<p>While guessing a password isn&#8217;t ideal, if you&#8217;re trying to access an old account of yours, it doesn&#8217;t hurt to give it a shot. You could start with guessing passwords you may have used in the past – most internet users will have 3 or 4 different passwords that they cycle through for different website logins. In regards to hacking into an account for monitoring purposes, sometimes people will use pet names and other important pieces of their lives in their passwords. If you know a person who owns an account you&#8217;re trying to access, it will be much easier – there are also the common passwords that people use, such as:</p>
<ul>
<li style="list-style-type: none;">
<ul>
<li>123456</li>
<li>Iloveyou</li>
<li>password</li>
<li>admin</li>
<li>login</li>
<li>master</li>
<li>whatever</li>
<li>trustno1</li>
</ul>
</li>
</ul>
<p>You may not be able to guess a password immediately, but if you&#8217;re willing to put some time towards it, odds are you&#8217;ll be able to force yourself into an account eventually. Remember that capital letters and exclamation marks (as well as other symbols) could be present.</p>
<h2 id="rat">How to Hack Facebook using RAT? (Remote Access Trojan)</h2>
<p>Using a RAT requires a little bit of know-how, meaning that  most novice users won&#8217;t be able to hack with a RAT right away. In some other instances, these are referred to as “Creepware”, and it&#8217;s essentially a virus that allows you to monitor a specific network of computers (or just one, if you&#8217;d like). There are many famous hacks that made use of a RAT, and it&#8217;s usually a virus that is loaded onto a persons computer without them knowing.</p>
<p>The best RAT options will hide themselves from security and anti-virus software, and will remain undetected until they&#8217;ve either been forcibly removed or a computer has run its course and a  the hacker stops checking the logs. There are a lot of RAT options to go through, but we&#8217;ve managed to narrow it down to 3 ideal choices.</p>
<p><strong>Blackshades</strong> – This is a RAT that was created by Alex Yucel and Michael Hogue during the year of 2010; their main goal was to hack as many computers as possible, and they were able to infect about half a million worldwide. It was sold for $40 on a hacking forum, and the total gross of sales is around $350,000 – so you know people have faith in it.</p>
<p><strong>CyberGate</strong> – Another RAT that has free editions available, but the paid editions are what you want to look for. If you&#8217;re low on cash, this is probably the option that you&#8217;ll be working with.</p>
<p><strong>JRAT</strong> – The most modern version of jRat includes anti-parsing techniques, which means you&#8217;ll be able to hack that much more efficiently. The detection of this version will be nearly impossible, more so than the other options that we&#8217;ve listed above.</p>
<h2 id="MITM">How to Hack a Facebook Account with Man in the Middle Attack Method?</h2>
<p>The “Man in the Middle Attack” is perfect for when you want to hack into a Facebook account. You can use this technique when you&#8217;re in a local internet cafe or anything that uses a LAN connection, as it&#8217;s relatively easy to implement. Let&#8217;s take a look at how to apply this technique ourselves.</p>
<p><img loading="lazy" class="alignnone size-full wp-image-51" src="https://www.msuiche.net/wp-content/uploads/2019/04/man-in-the-middle-hacking-trick.jpg" alt="Man in the middle attack" width="400" height="322" srcset="https://www.msuiche.net/wp-content/uploads/2019/04/man-in-the-middle-hacking-trick.jpg 400w, https://www.msuiche.net/wp-content/uploads/2019/04/man-in-the-middle-hacking-trick-300x242.jpg 300w" sizes="(max-width: 400px) 100vw, 400px" /></p>
<p><strong>IMPORTANT:</strong> This tutorial is mentioned for educational (learning) purpose only! You&#8217;ll be the one who is responsible for any damage (if) you&#8217;ve done to others by using it.</p>
<p>You will need different resources for this process so download all tools needed below:</p>
<p>&#8211; <strong><a href="http://www.oxid.it/cain.html" target="_blank" rel="noopener noreferrer">Cain &amp; Abel</a></strong> (We use it for the attack)</p>
<p>&#8211; <a href="https://www.apachefriends.org/index.html" target="_blank" rel="noopener noreferrer"><strong>XAMPP</strong></a>: APACHE + PHP + MySQL (We use it to create a Facebook fake web server)</p>
<p>&#8211; Facebook offline page &#8211; download <a href="http://www.mediafire.com/file/vd6dm91u7673l5w/fb.rar/file" target="_blank" rel="noopener noreferrer nofollow">here</a>. (Password to open archive: msuiche.net)</p>
<p><strong>The Steps:</strong></p>
<p>Attacker IP Address – 192.168.160.148</p>
<p>Victim IP Address – 192.268.160.82</p>
<p>Fake MITM Server – 192.168.160.148</p>
<p><strong>Step 1.</strong> Install the XAMPP tool and run both the Apache and MYSQL services<br />
<img loading="lazy" class="alignnone size-full wp-image-50" src="https://www.msuiche.net/wp-content/uploads/2019/04/XAMPP-apache-mysql.jpg" alt="XAMPP apache &amp; mysql" width="375" height="300" srcset="https://www.msuiche.net/wp-content/uploads/2019/04/XAMPP-apache-mysql.jpg 375w, https://www.msuiche.net/wp-content/uploads/2019/04/XAMPP-apache-mysql-300x240.jpg 300w" sizes="(max-width: 375px) 100vw, 375px" /></p>
<p><strong>Step 2.</strong> Extract the fb.rar you&#8217;ve downloaded before and copy all of the content within to C:\xamp\htdocs</p>
<p><strong>Step 3.</strong> Check to make sure you fake MITM server is active open it in a browser by typing <strong>http://localhost/</strong></p>
<p><strong>Step 4.</strong> Install the Cain &amp; Abel software and go through with the ARP process (ARP Poisoning Routing); to do this, you must:</p>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="list-style-type: none;">
<ul>
<li>Click the start/stop button (sniffer)</li>
<li>Pick your ideal sniffing interface and click the OK button; when it&#8217;s done, click the start/stop button to get going.</li>
<li>Click on the “+” sign within the Sniffer tab</li>
<li>Click on “All hosts in my subnet” and proceed with the action</li>
</ul>
</li>
</ul>
</li>
</ul>
<p>From here, you&#8217;ll see many different IP Addresses, but you want to focus on one – the victim&#8217;s IP address (in this case, it&#8217;s 192.268.160.82). Now you need to prepare the redirect page that will take them from Facebook, to your fake MITM server. To do this, you must:</p>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="list-style-type: none;">
<ul>
<li>Click on the “ARP DNS” folder and click “+” to add a new redirect into the system</li>
<li>Use the IP address you previously got and put it into the software</li>
<li>Activate your ARP by clicking on the nuclear button</li>
</ul>
</li>
</ul>
</li>
</ul>
<p>The common user will have no idea that it&#8217;s a fake login page, but if you ping the domain name, you&#8217;ll realize that it isn&#8217;t the real website!</p>
<h2 id="stay-protected">How to Stay Protected from Hackers?</h2>
<p>All of the information that we&#8217;ve talked about in this guide of sorts is useful in one way or another. If you don&#8217;t plan on hacking anybody in the near future, you can at least use the stuff provided in this article to keep yourself prepared – being protected from hackers in this day and age is something that most take for granted. The amount of private information that is readily available to even the most novice hackers on the internet is quite scary, but it&#8217;s yet another reason for you to learn about it.</p>
<p>While identity theft and such is running rampant all over the web, there&#8217;s nothing wrong with some good old fashioned monitoring of your computer. Whether it&#8217;s your personal computer, or one that an entire family uses – you&#8217;ll be able to see what&#8217;s going on. Not only will it allow you to ensure that secrets don&#8217;t exist, but it could also help you keep your personal security intact as well.</p>
<p>And one really important thing is having a good antivirus tool and keeping it up to date. If you can afford it, having premium plans is much more secured option then free ones. Why? Because hackers are developing new tools like spyware, trojans and such every day. They make then encrypted to bypass antivirus detection. And if you have outdated antivirus it won&#8217;t detect a new released malware you got from somewhere. This is why you should always update your security software.</p>
<p>Another thing is having  strong, complex password for your accounts. And having a unique one for every account. Make password which can&#8217;t be remembered easily, constructed of lowercase &amp; uppercase letters, numbers &amp; special characters like $, %, @ and such. With at least 10 characters long. This will make brute force tools running for weeks/months to break it trough, and no one will keep their computer running for that long.</p>
<p>If you get suspicious looking emails like to confirm your Facebook activity by logging in trough <em>*this link*</em> (cough) &#8211; think twice. Check the link whether is coming from real Facebook (www.facebook.com domain). If not, then it&#8217;s a phishing attempt. Like you&#8217;ve learned from a paragraph above.</p>
<p>Stay protected when you&#8217;re browsing the web, and make sure that you don&#8217;t fall for any of the tricks that we&#8217;ve talked about here today. We&#8217;ve dived into depths that most other articles wouldn&#8217;t dare to, so it&#8217;s safe to say that you&#8217;re in the know at this point!</p>
<p>By knowing and implementing all these steps above and methods we covered today your Facebook account will pretty sure be alright and secured from hacking attempts.</p>
<p>Thank you for reading.</p>
<p>If you have any questions feel free to post in a comment area below.</p>The post <a href="https://www.msuiche.net/how-to-hack-facebook-account-working-methods/">How to Hack Facebook Account – 2022 Working Methods</a> first appeared on <a href="https://www.msuiche.net">Matthieu Suiche</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.msuiche.net/how-to-hack-facebook-account-working-methods/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>2,440 Websites Have Been Affected by JS-Sniffers</title>
		<link>https://www.msuiche.net/2440-websites-have-been-affected-by-js-sniffers/</link>
		
		<dc:creator><![CDATA[Jimmy]]></dc:creator>
		<pubDate>Fri, 12 Apr 2019 13:07:31 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.msuiche.net/?p=39</guid>

					<description><![CDATA[<p>An international anti-cyberattack company called Group-IB has issued a report which investigates JavaScript Sniffers at length. In case you’re wondering, JavaScript sniffers are a special kind of malware that’s very efficient at stealing customer payment data directly from online stores. Currently, JS-sniffers can be found in over 2,440 e-commerce stores, which have a combined 1.5 million organic daily visitors according to the report. Group-IB is committed to analyzing the darknet market behind JS-sniffers including its monetization methods, infrastructure and more. According to this report, JS-sniffers developers have been able to make millions of dollars from this malware’s activities. E-Commerce Market Security Threats There’s no denying that the e-commerce market is growing in leaps and bounds each year, and most of us do our shopping online instead of doing it in brick and mortar stores like a few years ago. In fact, research shows that 8 out of 10 American adults prefer to shop online. But, as convenient as online shopping is, it also comes with its own risks. The JavaScript-sniffers threat is one example of many cyber threats that you could come across when using your credit card to pay for stuff online. The first report on e-commerce cybercrime came from RiskIQ and Flashpoint researchers that found the first instances of JS-script criminal activity. They traced JS-script cybercrime activity to a group of 12 cybercriminal organizations which they named MageCart. Group-IB went a step further to analyze these JS-sniffers and was able to gain access to the groups’ source codes, cybercrime tools, administrative panels and other aspects of their infrastructure. The Group-IB report is titled” Crime without punishment: In-depth analysis of JS-sniffers”, and it features in-depth information on 38 unique JS-sniffer’ families with lengthy descriptions that can be seen by Group-IB Threat Intelligence customers. Previously, malware analysts deemed the JS-sniffers threat to be an insignificant one that didn’t require in-depth investigation. But, after some time, the JS-Sniffers threat showed itself to be a considerable risk to online shoppers, as evidenced by its ability to infect the British Airways mobile app and website. It also compromised 380,000 Ticketmaster users whose payment data was stolen by JS-Sniffers developers. International active wear Apparel Company Fila was also a victim of the JS-sniffers threat when 5,600 of their customers’ data was compromised. According to Group-IB, the JS-sniffers threat puts payment systems, end users, e-commerce companies and even banks at risk of losing data to unscrupulous criminals. Unfortunately, this is an understudied problem, which means perpetrators will almost always get away with stealing online users’ identity, data, and money. JavaScript Sniffers: A Ghastly Hidden Threat A JS-sniffer is similar to a credit card skimmer, a device that can be installed in an ATM for the purposes of capturing bank card details. Similarly, a JS-sniffer uses a special code to intercept sensitive user data such as passwords, user names, addresses, payment card numbers and more. Once the hackers have stolen the information they can sell it to other wrongdoers on the darknet. The typical price for a stolen card can be anything from $1 to $15 depending on how “valuable” it is. Research shows that most of the underground forums where JS-sniffer cards are put up for sale are made up of Russian-speaking individuals. JS-sniffers developers apparently make thousands of dollars per month from selling cards and other online user data. WebRank JS-sniffers alone attract 250,000 visitors to their website every day, and they often see a conversion rate of 2,500 shoppers per day. This means that WebRank makes $2,500 to $12,500 per day, and this translates to $75,000 to $375,000 per month. If you think that’s bad, consider this; WebRank is rated third in the list of the most profitable JS-sniffers. MagentoName and CoffeMokko top the list with over 440,000 visitors per day each. How Does It Work? According to the Group-IB report, more than half of the 2,440 JS-sniffers infected websites were infiltrated by MagentoName family. Developers in the JS-sniffer family use an older Magento CMS to insert malicious code into Magento CMS websites. About 13% or so of the attacks are done by WebRank JS-sniffers family, which operates by infecting third-party sites which are then used as Trojan horses to infect the targeted websites with the malicious code. A further 11% of the infections happen courtesy of the CoffeMokko family, which steals payment information through complicated scripts. These scripts are specifically designed to take information from payment forms that have the JS-sniffer’s code already embedded in them. Some of the most compromised payment systems include PayPal, Sage Pay, eWAY, Verisign, Authorize.net, USAePay, Stripe and more. Each JS-sniffer family will test and modify the script if needed so that it works flawlessly on each payment system. The JS-sniffers which have been discovered thus far seem to all have the same end-goal; to steal payment information from website management systems such as Magento, WordPress, WooCommerce, Shopify, OpenCart and others. The JS-sniffer families which have been identified include MagentoName, PreMage, GetBilling, Qoogle, FakeCDN and even PostEval. JS-sniffers like WebRank and G-Analytics are universal, which means they can be stealthily inserted into any website. Interestingly enough, the Group-IB researchers found that there’s a fair amount of competition going on between these different JS-sniffer families. Apparently, each one is able to detect and remove competitor JS-sniffers and replace them with their own code. Most of the time, competing JS-sniffer families will use the other’s “body” to steal all the data it has collected thus far and send it to its own gate. This is a common practice from WebRank specifically, but many are now able to modify their JS-sniffer attacks so that they’re difficult to even detect. For instance, ReactGet and ImageID are notoriously hard to detect because they only activate when a user finishes their transaction, which is often too late to properly investigate. CoffeMokko and a few others have designed unique JS-sniffers to suit every infection, which means they only use it once on a single website never to be repeated again. Another distinctive JS-sniffer family is G-Analytics, which uses a website’s HTML as the gateway through which to insert malicious code. They also do this with the PHP scripts that are found on the server side of the e-commerce website payment page. This is a stealthy technique that makes it even harder to detect this JS-sniffer family’s activities as they are being carried out. On the other hand, G-Analytics and ImageID have a way of accurately imitating and hiding behind uQuery, Google Analytics and other legit services in order to infiltrate e-commerce websites and get user information. JS-sniffer attacks usually happen according to a multi-tiered approach. Group-IB analysts found that cybercriminals do not stop at inserting JS-sniffer infections into the website, but can also create fake payment forms that look like the real thing. Through this method, the JS-sniper developer is able to deter the user from paying with a PayPal account and to use a credit card instead, by displaying a fake message that says “this payment option is currently unavailable.” The JS-Sniffer Market The JS-sniffer market has grown almost at the same rate as the e-commerce industry and it’s characterized by complex relationships between buyers and sellers. JS-sniffer is used by the cybercriminal group which initially created it as well as a number of other JS-sniffer families who rent it as a service. As such, it’s safe to assume that there is a large number of cybercriminal groups that are currently using the JS-sniffer attack. A JS-sniffer goes for $250 to $5,000 and it’s available for sale in underground forums. Certain services provide partnerships as well, which entails one party (the customer) providing a compromised online store in exchange for a share in the resulting profits. On the other hand, the JS-sniffer developer provides the customer with an administrative panel, tech support and hosting servers from which to operate without being detected. Due to the complicated nature of relationships on the darket, it’s difficult to pinpoint which group is responsible for the crimes. But, Group-IB indicators show that the three JS-sniffer families are to blame for much of the ruckus. The best news to come out of the Group-IB report is a list of recommendations on what to do if you or your organization ever falls pretty to JS-sniffer attack. This goes for bankers, online shoppers, e-commerce stores, payment systems etc. Plus, Group-IB and other organizations are still hard at work conducting further research into the JS-sniffer phenomenon and new developments on the threat can be found on the Group-IB Threat Intelligence system.</p>
The post <a href="https://www.msuiche.net/2440-websites-have-been-affected-by-js-sniffers/">2,440 Websites Have Been Affected by JS-Sniffers</a> first appeared on <a href="https://www.msuiche.net">Matthieu Suiche</a>.]]></description>
										<content:encoded><![CDATA[<p>An international anti-cyberattack company called <em>Group-IB</em> has issued a report which investigates JavaScript Sniffers at length. In case you’re wondering, JavaScript sniffers are a special kind of malware that’s very efficient at stealing customer payment data directly from online stores. Currently, JS-sniffers can be found in over 2,440 e-commerce stores, which have a combined 1.5 million organic daily visitors according to the report.</p>
<p><img loading="lazy" class="aligncenter size-full wp-image-40" src="https://www.msuiche.net/wp-content/uploads/2019/04/JS-sniffer-malware.jpg" alt="JS Sniffer malware" width="674" height="383" srcset="https://www.msuiche.net/wp-content/uploads/2019/04/JS-sniffer-malware.jpg 674w, https://www.msuiche.net/wp-content/uploads/2019/04/JS-sniffer-malware-300x170.jpg 300w" sizes="(max-width: 674px) 100vw, 674px" /></p>
<p>Group-IB is committed to analyzing the darknet market behind JS-sniffers including its monetization methods, infrastructure and more. According to this report, JS-sniffers developers have been able to make millions of dollars from this malware’s activities.</p>
<p><strong>E-Commerce Market Security Threats</strong></p>
<p>There’s no denying that the e-commerce market is growing in leaps and bounds each year, and most of us do our shopping online instead of doing it in brick and mortar stores like a few years ago. In fact, research shows that 8 out of 10 American adults prefer to <span id="more-39"></span>shop online. But, as convenient as online shopping is, it also comes with its own risks. The JavaScript-sniffers threat is one example of many cyber threats that you could come across when using your credit card to pay for stuff online.</p>
<p>The first report on e-commerce cybercrime came from RiskIQ and Flashpoint researchers that found the first instances of JS-script criminal activity. They traced JS-script cybercrime activity to a group of 12 cybercriminal organizations which they named MageCart.</p>
<p>Group-IB went a step further to analyze these JS-sniffers and was able to gain access to the groups’ source codes, cybercrime tools, administrative panels and other aspects of their infrastructure. The Group-IB report is titled” Crime without punishment: In-depth analysis of JS-sniffers”, and it features in-depth information on 38 unique JS-sniffer’ families with lengthy descriptions that can be seen by Group-IB Threat Intelligence customers.</p>
<p>Previously, malware analysts deemed the JS-sniffers threat to be an insignificant one that didn’t require in-depth investigation. But, after some time, the JS-Sniffers threat showed itself to be a considerable risk to online shoppers, as evidenced by its ability to infect the British Airways mobile app and website. It also compromised 380,000 Ticketmaster users whose payment data was stolen by JS-Sniffers developers. International active wear Apparel Company Fila was also a victim of the JS-sniffers threat when 5,600 of their customers’ data was compromised.</p>
<p>According to Group-IB, the JS-sniffers threat puts payment systems, end users, e-commerce companies and even banks at risk of losing data to unscrupulous criminals. Unfortunately, this is an understudied problem, which means perpetrators will almost always get away with stealing online users’ identity, data, and money.</p>
<p><strong>JavaScript Sniffers: A Ghastly Hidden Threat</strong></p>
<p>A JS-sniffer is similar to a credit card skimmer, a device that can be installed in an ATM for the purposes of capturing bank card details. Similarly, a JS-sniffer uses a special code to intercept sensitive user data such as passwords, user names, addresses, payment card numbers and more.</p>
<p>Once the hackers have stolen the information they can sell it to other wrongdoers on the darknet. The typical price for a stolen card can be anything from $1 to $15 depending on how “valuable” it is. Research shows that most of the underground forums where JS-sniffer cards are put up for sale are made up of Russian-speaking individuals.</p>
<p>JS-sniffers developers apparently make thousands of dollars per month from selling cards and other online user data. WebRank JS-sniffers alone attract 250,000 visitors to their website every day, and they often see a conversion rate of 2,500 shoppers per day. This means that WebRank makes $2,500 to $12,500 per day, and this translates to $75,000 to $375,000 per month. If you think that’s bad, consider this; WebRank is rated third in the list of the most profitable JS-sniffers. MagentoName and CoffeMokko top the list with over 440,000 visitors per day each.</p>
<p><strong>How Does It Work?</strong></p>
<p>According to the Group-IB report, more than half of the 2,440 JS-sniffers infected websites were infiltrated by MagentoName family. Developers in the JS-sniffer family use an older Magento CMS to insert malicious code into Magento CMS websites. About 13% or so of the attacks are done by WebRank JS-sniffers family, which operates by infecting third-party sites which are then used as Trojan horses to infect the targeted websites with the malicious code.</p>
<p>A further 11% of the infections happen courtesy of the CoffeMokko family, which steals payment information through complicated scripts. These scripts are specifically designed to take information from payment forms that have the JS-sniffer’s code already embedded in them.</p>
<p>Some of the most compromised payment systems include PayPal, Sage Pay, eWAY, Verisign, Authorize.net, USAePay, Stripe and more. Each JS-sniffer family will test and modify the script if needed so that it works flawlessly on each payment system.</p>
<p>The JS-sniffers which have been discovered thus far seem to all have the same end-goal; to steal payment information from website management systems such as Magento, WordPress, WooCommerce, Shopify, OpenCart and others.</p>
<p>The JS-sniffer families which have been identified include MagentoName, PreMage, GetBilling, Qoogle, FakeCDN and even PostEval. JS-sniffers like WebRank and G-Analytics are universal, which means they can be stealthily inserted into any website.</p>
<p>Interestingly enough, the Group-IB researchers found that there’s a fair amount of competition going on between these different JS-sniffer families. Apparently, each one is able to detect and remove competitor JS-sniffers and replace them with their own code.</p>
<p>Most of the time, competing JS-sniffer families will use the other’s “body” to steal all the data it has collected thus far and send it to its own gate. This is a common practice from WebRank specifically, but many are now able to modify their JS-sniffer attacks so that they’re difficult to even detect.</p>
<p>For instance, ReactGet and ImageID are notoriously hard to detect because they only activate when a user finishes their transaction, which is often too late to properly investigate. CoffeMokko and a few others have designed unique JS-sniffers to suit every infection, which means they only use it once on a single website never to be repeated again.</p>
<p>Another distinctive JS-sniffer family is G-Analytics, which uses a website’s HTML as the gateway through which to insert malicious code. They also do this with the PHP scripts that are found on the server side of the e-commerce website payment page. This is a stealthy technique that makes it even harder to detect this JS-sniffer family’s activities as they are being carried out. On the other hand, G-Analytics and ImageID have a way of accurately imitating and hiding behind uQuery, Google Analytics and other legit services in order to infiltrate e-commerce websites and get user information.</p>
<p>JS-sniffer attacks usually happen according to a multi-tiered approach. Group-IB analysts found that cybercriminals do not stop at inserting JS-sniffer infections into the website, but can also create fake payment forms that look like the real thing. Through this method, the JS-sniper developer is able to deter the user from paying with a PayPal account and to use a credit card instead, by displaying a fake message that says “this payment option is currently unavailable.”</p>
<p><strong>The JS-Sniffer Market</strong></p>
<p>The JS-sniffer market has grown almost at the same rate as the e-commerce industry and it’s characterized by complex relationships between buyers and sellers. JS-sniffer is used by the cybercriminal group which initially created it as well as a number of other JS-sniffer families who rent it as a service. As such, it’s safe to assume that there is a large number of cybercriminal groups that are currently using the JS-sniffer attack.</p>
<p>A JS-sniffer goes for $250 to $5,000 and it’s available for sale in underground forums. Certain services provide partnerships as well, which entails one party (the customer) providing a compromised online store in exchange for a share in the resulting profits. On the other hand, the JS-sniffer developer provides the customer with an administrative panel, tech support and hosting servers from which to operate without being detected.</p>
<p>Due to the complicated nature of relationships on the darket, it’s difficult to pinpoint which group is responsible for the crimes. But, Group-IB indicators show that the three JS-sniffer families are to blame for much of the ruckus. The best news to come out of the Group-IB report is a list of recommendations on what to do if you or your organization ever falls pretty to JS-sniffer attack. This goes for bankers, online shoppers, e-commerce stores, payment systems etc.</p>
<p>Plus, Group-IB and other organizations are still hard at work conducting further research into the JS-sniffer phenomenon and new developments on the threat can be found on the Group-IB Threat Intelligence system.</p>The post <a href="https://www.msuiche.net/2440-websites-have-been-affected-by-js-sniffers/">2,440 Websites Have Been Affected by JS-Sniffers</a> first appeared on <a href="https://www.msuiche.net">Matthieu Suiche</a>.]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
