Twitter Updates

    follow me on Twitter

    List for 4.5% and get 1% cash back on your purchase

    Tuesday, June 30, 2020

    Ethical hacking : Top 10 best websites to learn hacking 2018

    • Metasploit: Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit. Get the worlds best penetration testing software now.
    • Hakin9: E-magazine offering in-depth looks at both attack and defense techniques and concentrates on difficult technical issues.
    • HackRead: HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance, and Hacking News with full-scale reviews on Social Media Platforms.
    • Phrack Magazine: Digital hacking magazine.
    • The Hacker News: The Hacker News — most trusted and widely-acknowledged online cyber security news magazine with in-depth technical coverage for cybersecurity.
    • Exploit DB: An archive of exploits and vulnerable software by Offensive Security. The site collects exploits from submissions and mailing lists and concentrates them in a single database.
    • SecTools.Org: List of 75 security tools based on a 2003 vote by hackers.
    • Packet Storm: Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers.
    • KitPloit: Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security.
    • Hacked Gadgets: A resource for DIY project documentation as well as general gadget and technology news.

    Thursday, June 25, 2020

    re: Additional Details

    hi there

    After checking your website SEO metrics and ranks, we determined
    that you can get a real boost in ranks and visibility by using
    aour 49 usd / Economy Plan:
    https://www.hilkom-digital.com/product/economy-seo-plan/

    cheap and effective SEO plan
    onpage SEO included

    thank you
    Mike

    Friday, June 12, 2020

    LEGALITY OF ETHICAL HACKING

    Why ethical hacking?
    Legality of Ehical Hacking
     
    Ethical hacking is legal if the hacker abides by the rules stipulated in above section on the definition of ethical hacking.

    Ethical hacking is not legal for black hat hackers.They gain unauthorized access over a computer system or networks for money extortion.
    Read more

    Thursday, June 11, 2020

    Removing Windows 8/8.1 Password With CHNTPW



    [Update] If you want to recover Windows 8/8.1 passwords instead of removing them see this tutorial

    So we are back. About a Year ago I wrote a post on how to remove Windows Password using CHNTPW but many readers complained that it was not working on Windows 8. I tried myself on many it worked but once I also got stuck. So I did a little work around. In this tutorial I'm going to show you how to remove Windows 8/8.1 passwords using CHNTPW. Well it's little bit tedious than the older one but believe me it's fun too.


    Background:

    Let's get started with a little bit background. Windows OSs have a User known as Administrator which is hidden by default. This user is there for security reasons (maybe it's the way around). Most of the users who use Windows are lame, sorry to say that but I'm not talking about you, they don't even know that such an invisible account exists so it is almost everytime without a password. But this Administrator user is a SU (Super User), that means you work wonders once you get access to this account. So our first task will be to make it visible and then we'll access it and using it's power privilages we'll remove password of other accounts (which is not really neccessary cuz you can access any user folder or file using Administrator Account).


    Requirements:

    1. Physical Access to the Victems computer.
    2. A Live Bootable Kali/Backtrack Linux Pendrive or DVD.
        (You can downoad Kali Linux here)


    Steps:

    1. Plug in the Live Bootable Pendrive/DVD into to victim's computer and then boot from it.

    2. After accessing kali linux (I'm using Kali Linux) from victim's computer open a terminal.

    3. Now we have to mount the drive on which the victim's OS is loaded. In my case it is sda2. So in order to mount that drive I'll type the command:
    mount /dev/sda2 /media/temp



    this means that I'm mounting the drive in folder /media/temp if you haven't created a temp folder in /media then you must create one by typing these command:
    cd /
    mkdir /media/temp

    4. After mounting the OS we need to access the SAM file and make visible Administrator account using chntpw. It's so simple lemme show you how.
    first we'll navigate to /media/temp/Windows/System32/config:
    cd /media/temp/Windows/System32/config

    now we display the list of users on our victim's computer:
    chntpw SAM -l



    You'll see an Administrator User there which is disabled. Now we'll enable that:
    chntpw SAM -u Administrator



    now type 4 and hit return



    press 'y' to save changes to SAM file.



    OK voila! the hard part is done.

    5. Now restart your Computer and take out your Pendrive/DVD from your computer and boot into windows 8 OS. You should be able to see Administrator User on Logon screen now. If not then look for a backward pointing Arrow besides the user Login Picture. Click on that Arrow and you should see an Administrator User. Click on the Administrator Account and wait for a while until windows 8 sets it up.

    6. After a while you get Access to the computer and you can access anything. Enjoy :)

    7. What you want to remove the password? I don't think it's a stealth mode idea, is it? OK I'll tell you how to do that but It's not a good hacker way of doing.
    Open up the command prompt, simple way to do it is:

    Press Ctrl + 'x' and then Press 'a' and if prompted click yes.
    After that Enter following commands:

    net user
    (This command will display all users on computer)

    net user "User Name" newPassword 
    (This Command will change the Password of User Name user to newPassword).
    OK you're done now logout and enter the new password. It will work for sure.

    8. If you want to disable the Administrator Account again then type in command prompt:
    net user Administrator /active:no

    I tried it on Windows 8/8.1 all versions and it works. Guess what it works on all windows OSs.

    Hope you enjoyed this tutorial. Don't forget to share it and yes always read the Disclaimer.

    More information


    Aircrack-ng: The Next Generation Of Aircrack


    "Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks." read more...

    Website: http://www.aircrack-ng.org

    More information


    1. Pentest Vs Ethical Hacking
    2. Pentest Free
    3. Hacker Lab
    4. Hacker Box
    5. Pentest Active Directory
    6. Pentest Box
    7. Pentest Tools Free
    8. Pentest+ Vs Oscp
    9. Pentesterlab
    10. Pentest Nmap
    11. Hacking Link
    12. Hacking Books
    13. Pentest Framework
    14. Basic Pentest 1 Walkthrough
    15. Pentest Checklist
    16. Hacking Health
    17. Pentestmonkey Cheat Sheet
    18. Hacking Linux
    19. Pentest Basics

    Wednesday, June 10, 2020

    12 Ways To Hack Facebook Account Passwords And Its Proeven Tion Techques 2020

            12 Ways to hack facebook accounts         

    "Hack Facebook" is one of the most searched and hot topics around the Internet, like Gmail hacker. We have prepared a detailed list of how hackers can hack someone's Facebook account easily in just a few minutes and how can we prevent the same.

    Being a FB white hat hacker, I get following questions frequently from people:

    • Can you refer any reliable Facebook hacker? (After me denying their hacking request 😛 )
    • Is there any online FB cracker tool?
    • Where can I get FB hacking software?
    • Is there any free password finder?
    • How can I hack someone's Facebook account easily?

    To the best of my knowledge, there is no hacking tool. You won't be able to find it anywhere. However, you will find many websites claiming that they are providing free hack tool (either online or offline), but you cannot download the password file without completing a survey. Even after going through a tiresome process of completing a survey, you would have got nothing in the endThese things are posted only with the intention of making money. Don't waste your precious time in searching such hack tool.


    If you want to know how hackers can hack someone's FB account, please go ahead and read the techniques listed below. The most successful method among all of these techniques is phishing. Phishing enables someone with no or little technical knowledge to hack account's password easily in just a few minutes.

    Some of the techniques listed below are not applicable only to FB but also to all daily used internet websites, such as Google, Twitter, Yahoo etc.

    You won't be vulnerable to hacking if you understand how hacking works

    This article is written with the aim of educating people about how hacking works and how should they prevent it. Please don't use these techniques for malicious purposes.

    1 Phishing

    Phishing is the most common technique used for hacking FB passwords. It is very easy for someone who is having little technical knowledge to get a phishing page done. That is why phishing is so popular. Many people have become a victim of Phishing page due to its trustworthy layout and appearance.

    How does phishing work?

    In simple words, phishing is a process of creating a duplicate copy of the reputed website's page with the intention of stealing user's password, or other sensitive information like credit card details. In our topic, it means creating a page which perfectly looks like FB login page but in a different URL like fakebook.com, or faecbook.com, or any URL that pretends to be legit. When a user lands on such a page, he/she may think that is the real Facebook login page, asking him/her to provide his/her username and password. So, the people who do not find phishing page suspicious are going to enter their username & password. The password information will be sent to the hacker who created the phishing page. At the same time, the victim gets redirected to original FB page.

     

    Example: John is a programmer. He creates an FB login page with some scripts that enable him to get the username and password information. John puts this fake login page in https://www.facebouk.com/make-money-online-tricks. Peter is a friend of John. John sends a message to Peter, "Hey Peter, I have found a free trick to make money online, you should definitely take a look at https://www.facebouk.com/make-money-online-tricks-free". Peter navigates to the link and see a FB login page. As usual, Peter enters his username and password on it.

    The hacking part

    The username and password of Peter is sent to John and Peter is redirected to a money making tips page https://www.facebouk.com/make-money-online-tricks-tips-free.htmlThat's all; Peter's Facebook account is hacked.

    Please note that phishing is done by a third person through emails; that is how it happens most of the time. So always beware of phishing emails, else you may lose your Facebook account, or credit card details, or any other sensitive data. Learn more about phishing.

    How can you protect yourself against online FB phishing?

    Hackers can reach you in many ways; email, personal messages, FB messages, website ads etc. Clicking any links from these messages will lead you to a FB login page. Whenever you find an FB login page, you should note only one thing which is URL. Because nobody can spoof/use Facebook URL except when there are some XSS zero-day vulnerabilities, but that's very rare.

    1. What is the URL you see in browser address bar? 
    2. Is that really https://www.facebook.com/ (Trailing slash is very important since it is the only separator in Google chrome to distinguish domain and subdomain. Check out the below examples to know the difference)? 
    3. Is there a green color secure symbol (HTTPS) provided in the address bar?

    Bearing these questions in mind should prevent you from the hacking of online phishing pages. Also, see the below examples of phishing pages.

    Some super perfect phishing pages

    Facebook Perfect Phishing Page
    Phishing Page – Note the misleading URL

    Most of the people won't suspect this page (snapshot given above) since there is an https prefix with a green color secure icon and also there is no mistake in www.facebook.com. But, this is a phishing page. How? Note the URL correctly. It is https://www.facebook.com.infoknown.com. So, www.facebook.com is a sub-domain of infoknown.com. Google Chrome does not differentiate the sub-domain and domain, unlike Firefox does.

    One can obtain SSL Certificates (HTTPS) from many online vendors. A few vendors give SSL Certificate for Free for 1 year. It is not a big deal for a novice to create a perfect phishing page like the one given above. So, beware of it.

    Phishing Someone's Facebook Account Password
    Phishing Page – Note the misleading URL.

    This is a normal FB Phishing page with some modification in the word Facebook.


    2 Social Engineering

    This is the second most common technique for hacking Facebook accounts. In fact, this method shouldn't come under Hacking, since much knowledge is not required for this method. I am listing this method under hacking to ensure the list of most common techniques used for FB account hacking in their respective order. Social engineering is basically a process of gathering information about someone, whose account you need to hack. The information may be his/her date of birth, mobile number, boyfriend/girlfriend's mobile number, nickname, mother's name, native place etc.

    How does Social Engineering work?

    Security Question

    Facebook-Social-Engineering-Security-Question
    FB-Social-Engineering-Security-Question

    Many websites have a common password reset option called Security Question. Most common security questions are :

    What is your nickname?

    Who is your first-grade teacher?

    What is your native place?

    or


    Any custom questions defined by the user.

    Obtaining such information from the respective people may let us hack into their account. So, if anyone comes to know the answer to it, they will be able to hack your account using forgot password option.

    Most Common and Weak Passwords

    Security Question does not let you get into others FB account easily. But, setting a weak password could easily allow any of your friends to hack your account.

    What is a weak password? 

    A password that is easily guessable by a third person is known as a weak password.

    Most common passwords
    • Mobile Number
    • Nickname / Name and Date of Birth Conjunction
    • Boy Friend's Mobile Number / Girl Friend's Mobile Number – Most of the lovers 😛
    • Girl Friend's / Boy Friend's Name – Most of the lovers 😛
    • Boy or Girl Friend Name Combination
    • Bike Number
    • Unused / Old Mobile Number
    • Pet Name
    • Closest Person Name (can be friends too)

    Now, be honest and comment here if you are one of the people who have any one of the common passwords mentioned above. Please don't forget to change your password before making a comment 😉

    How can you protect yourself from Social Engineering? 

    Security Question

    Don't have a weak or familiar security question/answer. Therefore, it should be known only to you. You can set your security question here. Fortunately, Facebook has a lockout period of 24 hours before giving access to the one who successfully answered the security question, meaning that the hacker cannot enter into your account until 24 hours. So you can prevent the hacking attempt by logging in to your account in the 24 hours lockout period.

    Additionally, FB provides an option called "Login Alerts" under Facebook Security Settings. You should add your mobile or email there to get notified whenever your account is logged in to a new or unknown device.

    Most Common and Weak Passwords

    It is very simple. Change your password now if you have any one of the weak passwords stated above.


    You might also be interested in hacking facebook fan page article

    3 Plain Password Grabbing

    insecure-plain-password-grabbing
    This is another common method used to steal Facebook user's password. Most people are unaware of this method, but traditional hackers use this method to hack user accounts.

    How does Plain Password Grabbing works? 

    In this method, the Facebook hacker targets a particularly low-quality website, where the victim is a member and hacks their database to get the stored plain username & password of victim.

    How could the hacker/attacker get access to Facebook?

    Many of us use the same password for FB and also for some poor xyz.com. So, it is easy for a hacker to get your password through the low-quality poorxyz.com.

    In another scenario, the hacker/attacker creates a website with the intention of getting victim's password, so when the victim registers his/her account using email and creates a password, those details will get stored in the database of the hacker/attacker. Thus hacker gets access to victim's account.

    Common people, who use same email and password for these kinds of low-quality websites, may end up losing their Facebook account.

    How can you protect yourself from Facebook Plain Password Grabbing? 

    You should never trust the third party low-quality websites. Even passwords of popular websites, like LinkedIn, are insecure and vulnerable to hacking. So, never and ever trust the third party low-quality websites.


    Most of the website developers are storing plain passwords in their database without even thinking about encryption or security. This makes Facebook hackers' job easy since the password is in plain text format.

    Best way to prevent this method is to have a unique password at least for websites that you really trust. Don't use your FB password for any other website/portal, so your password will be safe .


    4 Key Logger

    Facebook-Hacking-Key-Loggers
    A keylogger is a software tool used to record keystrokes on a computer or mobile device. This, in turn, records everything you type using your keyboard and store it for use. Generally, keyloggers are installed as application software in operating systems to track keystrokes, but there are hardware keyloggers as well.

    Hardware keyloggers also are known as physical keyloggers attached to a computer in a USB port records everything before it sends the keyboard data to the computer. There are various mobile keyloggers, that perform the same action on various operating systems.

    How Key Logging works?

    All keyloggers run in the background (except trial versions) and won't be viewable to users until you know the keylogger password and shortcut used to view it. It will record all the keys pressed and give you a detailed report of when and what keys are used for what application – Simply, a clean report to identify passwords.

    Anyone who is reading the keylogger logs is able to see the Facebook password or any passwords and sensitive information typed, like credit cards, bank username, password etc. Whenever you log in to a public computer, there are chances to lose your Facebook password to someone else.

    Hardware keyloggers are identifiable in case of your personal computer but are hard in case of public computers.

    In another scenario, your friend/colleague/neighbor could ask you to log in using their computer as a help. If their intention is to get your password, then you are most likely to lose your Facebook account to the hacker.

    Nowadays, many people are using mobile keyloggers. It enables to track the keypad of mobile. So, any sensitive information typed on the mobile keypad is vulnerable to hacking.

    How can you protect yourself from Key Logging?

    You need not be afraid of keyloggers when you use your personal computer since you are the only one who is going to access it. But, whenever you use any public computer or your friend's computer, you should not trust it.

    I always suggest my friends use On-Screen Keyboard whenever they are in need to type a password. Also, please make sure that nobody is checking your screen when you type your password because your screen would expose what you had typed. In windows, there is an inbuilt tool called On-Screen Keyboard that helps us to select keys using the mouse.

    You can open OSK by using the Run dialog box. Winkey + R to open Run dialog box, type OSK and then press Enter. Nowadays, many banking portals provide a screen keyboard in the browser itself. So, please make use of it whenever you are surfing on public computers. On-Screen Keyboard helps even when hardware keyloggers are installed.

    Never use third-party mobile keypad apps unless you really trust the publisher because the app may track all of your keystrokes and send it to the publisher.


    5 Browser Extension Hacker

    This method doesn't let the Facebook hacker/attacker gain complete access to your Facebook account, however, gives some power to control your account indirectly. I've seen multiple Google Chrome and Firefox add-ons, which secretly perform actions, like following a person, like a page on behalf of your Facebook profile, etc.

    How Browser extension hack works?

    When you visit some malicious websites or web pages, you will be prompted to install a browser add-on. Once you install the add-on, it will perform all the tasks described by the hacker or attacker who created it. Some primary actions are posting status updates on your wall, liking an FB page, following a person, adding you to some Facebook groups, inviting your friends to like a page, or join a Facebook group etc. You may not know these things happening on your FB account until you check your Facebook activity log periodically.

    How can you prevent browser extension Facebook hack?

    You should monitor your activities using Activity Log. You must not trust any third party websites prompting you to add a browser extension. Install add-on only from the browser store, that too only from trusted publishers. Why should you risk your account if you don't know the publisher or intention of the add-on? Therefore, always stay away from these malicious browser extensions.


    6 Malicious Application Hack

    Always remember that all the apps you use on Facebook are owned by third-party publishers and not by Facebook. Of course, there are a few exceptions like Instagram. A malicious application, which is requesting your permission, will do almost all kind of spam stuff on your Facebook profile.

    How malicious application hack works?

    Whenever you find Login using the Facebook option on any website, you should come to know that it is a third party Facebook application not owned by Facebook. When you click Login using Facebook, you will be shown a permission dialog box with the requested permission details. Once you click okay button, the requested personal details can be accessed from FB or the requested actions can be performed in your FB account on your behalf.

    What could a third party application do on your Facebook account?

    • Post photos and status update
    • Share link to your timeline or to any group you belong
    • Manage your page
    • Post on behalf of you on the Facebook pages you own
    • Access your personal information
    • Access your photos including "Only me" privacy photos; sometimes they can further access your mobile photos using a Facebook vulnerability like the one I found (Don't worry, it's completely fixed now 😉 ).

    These are just examples of what can be done. What if the application you are using is malicious? It could spam your Facebook account with a bunch of worthless contents.

    How can you prevent yourself from malicious application hack?

    You should always beware of what permissions you give to a Facebook application even though FB is reviewing application's permission requests. Don't give permission to an application if you don't trust the website or application.

    Facebook-third-party-application-dialog-box
    FB Application Permission Dialog Box

    You can edit the information that you give to an application in the permission dialog box (snapshot given above). Also, you should review the applications that have access to your Facebook account here if you think you had given access to malicious applications.


    7 Facebook Account Hacker Software 

    You might have seen or downloaded many Facebook account hacker software, but none of them could truly hack Facebook password. Hacking your Facebook password instead of the target user is what it actually does.

    How does Facebook account hacker software work?

    People who try to hack Facebook account usually download software that is available on various websites. The software will collect the victim's password (the one who downloaded this software) as soon as it is opened or installed. Some software prompt you to enter Facebook username and password. They will store your password in their database collection of passwords. Few other software gain administrative privilege from you to install background keylogger to get your keystrokes including the Facebook password.

    How can you prevent yourself from Facebook hacking software?

    Don't trust Facebook hacking software. There is no real hacking software available on the Internet as I had said earlier.


    8 Malicious Mobile Application 

    There are a lot of mobile applications that secretly steal Facebook access token from your mobile device. Facebook mobile app functions through API, where access-token stored in your mobile's internal memory is used for authentication.  It is more like your username and password. So, if someone steals your access-token, then he/she is likely to have full access to your Facebook account.

    How malicious mobile application software works?

    Facebook Application Interface do not require username or password every time to get user data. It just needs secret access-token to retrieve user's data. Facebook mobile app stores the access token in mobile's memory. The app's part of the memory is accessible only to the respective application. Mobile apps that have administrative privilege can access other app's data. For example, gaining admin privilege in a rooted android phone could allow an application to steal your access token. A hacker can do a lot of malicious things if he/she gets your access token.

    How can you prevent yourself from malicious mobile applications?

    • Install mobile apps only from trusted publishers.
    • Don't root your mobile device.
    • Logout Facebook from your mobile device frequently to get your access token expired.
    • Change your Facebook password frequently.

    9 Browser Vulnerabilities 

    browser-vulnerabilities-fb-facebook-hack
    Browser Vulnerabilities are security bugs, which exist in older versions of mobile and desktop browsers.

    How does browser vulnerabilities work on Facebook hacking?

    Most browser vulnerabilities are exploited through an older version of the browser since all the zero days are patched by browser vendor once it is reported by researchers around the world. For example, Browser Same Origin Policy Vulnerability could allow a hacker/attacker to read the response of any Page like facebook.com and could be able to perform any action on your Facebook account since they are able to read the response by accessing the Facebook origin. Android Chrome SOP bypass by Rafay Baloch is one such vulnerability that is affecting Android web-view in Android < 4.4.

    How can you prevent yourself from browser vulnerabilities?

    You should always update your browser and operating system once there is an update available. Keeping an older version always has many risk factors involved.

    Self XSS is also known as Self Cross Site Scripting. XSS is basically a web security vulnerability, which enables hackers to inject scripts into web pages used by other users. What is self XSS then? Self XSS is a kind of social engineering attack, where a victim accidentally executes a script, thus exploiting it to the hacker.

    How does self XSS scam work?

    In this method, hacker promises to help you hack somebody else's FB account. Instead of giving you access to someone else's account, the hacker tricks you into running malicious Javascript in your browser console that gives a hacker the ability to manipulate your account. Facebook hackers use this technique to add you in groups, add your friends to the group, post on your wall, add your friends in comments etc.

    How can you prevent yourself from self XSS?

    Self XSS is something that you let hackers to hack your account. So never and ever copy & paste the code given by someone in your browser, otherwise, you will get your Facebook account hacked.


    11 Trojan Horses 

    Trojan Horse is a malicious program, which is used to spy and control a computer by misleading users of its true intent. Malware Trojan can also be called as Remote Key Logger since it records keystrokes of all the applications of our computer and sends it to the hacker online.

    How do Trojan Horses work?

    software you think legit might be a trojan. A PDF you don't suspect might contain a trojan. An AVI media file given by someone might be a trojan. The Trojan horse runs in the background process, collects information and send it to the hacker. Trojan Horse can be sent in any form through any medium, like pen drive, iPod, website, or email. In our topic, Trojan records FB password that you have typed in your browser and sends it to the Facebook hacker using the Internet.

    How can you prevent yourself from Trojan?

    • Do not
      • install programs from unknown online sources
      • play media files received from an unknown source
      • open any kind of files downloaded from untrusted sources
      • insert pen drive from any suspicious people.
    • Do have an updated anti-virus software installed on your computer.

    Keeping your anti-virus software up to date does not guarantee you to stay safe from hacking. Basically, an anti-virus software is a collection of detected malware and viruses. Its job is to compare each and every file with the database of viruses. There are many numbers of software, which enable us to create undetectable Trojans. But, it is very unlikely to target a common man with undetectable Trojanware. So, keeping an antivirus program up to date is protective to large extent. Don't forget to update your anti-virus software once an update is available.


    12 FB Zero Day

    Zero Day is a security vulnerability that is unknown to the respective software vendor. In our context, undiscovered Facebook vulnerabilities are called FB Zero Day.

    How does Zero Day hacking work?

    FB Zero Day vulnerabilities are very rare since Facebook has a bug bounty program, where security researchers around the world participate and report zero-day vulnerabilities. Zero-day is basically a security loophole that is unknown to the software vendor.

    There are two types of people who find Zero Day vulnerabilities. The first case is Security Researchers and Bug hunters, who make a responsible disclosure about the vulnerability to the software vendor; FB in our context. Another case falls on the evil side. Blackhat hackers who find Zero Day vulnerabilities don't disclose it to Facebook and they will use it for their personal benefit of hacking.

    @EVERYTHING NT

    Related news


    1. Hacking With Python
    2. Hacker Lab
    3. Hacking Games
    4. Rapid7 Pentest
    5. Hacking Jailbreak
    6. Pentest Devices

    How To Automatically Translate Any Android App Into Any Language

    There is the number of applications which are not having the features of translating apps to your favorite languages. This makes it difficult for the users to translate apps into their native language. Today, I am going to tell you about an application which will help you to Automatically Translate Any Android App into Any Language.
    Nowadays there are around hundreds of application on play store which is having the feature of translate but some applications don't have this features. This is just because they don't have proper developers or sometimes translators.
    There is an application launched by Akhil Kedia from XDA Developer which made it possible for all the users to translate the application to any language you need. This is something which everyone needs it.
    Akhil Kedia built an Xposed module in which users can easily change the language of any application to whichever they like or love. Personally, we all love English language but there are peoples in many parts of the world they are suitable for other languages.
    Automatically Translate Any Android App into Any Language
    Automatically Translate Any Android App into Any Language

    Automatically Translate Any Android App into Any Language

    The best part about this Xposed Module is that it translates the application to any language whichever you like and there are around many languages which you can try it. The other best part about this application is that the user interface which is amazing.
    In an Android application, the best thing is the user interface. This is something which helps users to download the module or application to run again and again. There are about many settings which can be changed from the application.
    The setup process is a bit different from other applications but if you will look at the application you will definitely love it. Just because of too many settings and features available in the application and you can turn it to any language without any crashing issues of the application.

    Requirements:

    • Rooted Android Phone
    • Xposed Framework installed on your phone.
    • Android 5.0 or higher.
    • Unknown Source enabled (You might be knowing it)
    How to Automatically Translate Any Android App into Any Language
    • Download the module called as All Trans from here: Download
    Automatically Translate Any Android App
    • Now, after installation, it will ask you to reboot your phone to activate the module
    • Now, you need to get the API Key to get it you need to sign up with Yandex first so sign up: Yandex Sign up
    Automatically Translate Any Android App
    • Then after sign up you will get the API key just enter the API key in the All-Trans application.
    Automatically Translate Any Android App
    • Open All Trans Application and the swipe right to Global Settings.
    Automatically Translate Any Android App
    • Click on Enter Yandex Subscription key and then enter your key.
    Automatically Translate Any Android App
    • In Global Settings click on Translate from and select the Language the application is already in. (Eg: English)
    Automatically Translate Any Android App
    • Now, click on translate to and select your favorite language. This will change the language.
    Automatically Translate Any Android App
    • Swipe left and select the applications which you need to translate and done.
    Automatically Translate Any Android App
    • After selecting just open the application and the language is translated automatically.
    Automatically Translate Any Android App

    Final Words:

    This is the best and easy way to Automatically Translate Any Android App into Any Language. I hope you love this article.Share this article with your friends and keep visiting for more tips and tricks like this and I will meet you in the next one.
    Stay Updated Tune IemHacker

    Read more
    1. Pentest Checklist
    2. Pentest With Kali
    3. Hacking Health
    4. Pentest Wiki
    5. Is Hacking Illegal
    6. Pentest Vs Ethical Hacking
    7. Pentest Owasp Top 10
    8. Hacking Network
    9. Hacker On Computer
    10. Pentest Lab Setup
    11. Pentest Environment
    12. Pentest Report
    13. Hacker
    14. Pentest Vs Ceh

    Tuesday, June 9, 2020

    Linux Stack Protection By Default

    Modern gcc compiler (v9.2.0) protects the stack by default and you will notice it because instead of SIGSEGV on stack overflow you will get a SIGABRT, but it also generates coredumps.




    In this case the compiler adds the variable local_10. This variable helds a canary value that is checked at the end of the function.
    The memset overflows the four bytes stack variable and modifies the canary value.



    The 64bits canary 0x5429851ebaf95800 can't be predicted, but in specific situations is not re-generated and can be bruteforced or in other situations can be leaked from memory for example using a format string vulnerability or an arbitrary read wihout overflowing the stack.

    If the canary doesn't match, the libc function __stack_chck_fail is called and terminates the prorgam with a SIGABORT which generates a coredump, in the case of archlinux managed by systemd and are stored on "/var/lib/systemd/coredump/"


    ❯❯❯ ./test 
    *** stack smashing detected ***: terminated
    fish: './test' terminated by signal SIGABRT (Abort)

    ❯❯❯ sudo lz4 -d core.test.1000.c611b7caa58a4fa3bcf403e6eac95bb0.1121.1574354610000000.lz4
    [sudo] password for xxxx: 
    Decoding file core.test.1000.c611b7caa58a4fa3bcf403e6eac95bb0.1121.1574354610000000 
    core.test.1000.c611b : decoded 249856 bytes 

     ❯❯❯ sudo gdb /home/xxxx/test core.test.1000.c611b7caa58a4fa3bcf403e6eac95bb0.1121.1574354610000000 -q 


    We specify the binary and the core file as a gdb parameters. We can see only one LWP (light weight process) or linux thread, so in this case is quicker to check. First of all lets see the back trace, because in this case the execution don't terminate in the segfaulted return.




    We can see on frame 5 the address were it would had returned to main if it wouldn't aborted.



    Happy Idea: we can use this stack canary aborts to detect stack overflows. In Debian with prevous versions it will be exploitable depending on the compilation flags used.
    And note that the canary is located as the last variable in the stack so the previous variables can be overwritten without problems.




    Related links


    How To Insert Data Into Database | Tutorial 3


    Welcome to my another tutorial of PHP and MYSQL. In the previous tutorial I've briefly discussed How to make a PHP file and How to save the PHP file in the root directory of the server. How to run PHP script over the Web Browser etc.

    Now in this tutorial I've discussed about inserting data into database by getting the values from user with the help of HTML form. One thing should be remembered that getting a values from users by HTML form is the only way to get values from users in PHP.

    How To Insert Data into Database

    Step 1:

    Open your text editor and create HTML form. 

    Step 2:

    Make a database connection in PHP.

    Step 3:

    Write an INSERT query for the sake of insertion data into database like INSERT INTO table_Name(table_Attribute1, table_Attribute2....) VALUES('1', 'Alex'...); etc. Now watch the video to make a better understanding the concept of insertion.

    Ready Real Estate slide show

    Become a fan of my page

    Powered By Blogger

    Pandora Faves

    Back on the market, price reduced, 1% cash back rebate offered

    Sheree Dutton | Ready Real Estate | 817-975-0461
    222 Birchwood, Azle, TX
    Back on the market, price reduced and 15 cash back rebate offered!
    3BR/2BA Single Family House
    offered at $102,500
    Year Built 2006
    Sq Footage 1,142
    Bedrooms 3
    Bathrooms 2 full, 0 partial
    Floors 1
    Parking 3 Covered spaces
    Lot Size .225 acres
    HOA/Maint $0 per month

    DESCRIPTION


    Wow, talk about pride of ownership! This house has too many upgrades to count, and is so well cared for. You must see it to believe it! A lot of value in this perfect starter home.

    OPEN HOUSE SUNDAY MAY 3RD 2+5 pm

    see additional photos below
    PROPERTY FEATURES

    - Central A/C - Central heat - Fireplace
    - High/Vaulted ceiling - Walk-in closet - Tile floor
    - Living room - Breakfast nook - Dishwasher
    - Refrigerator - Stove/Oven - Microwave
    - Laundry area - inside - Balcony, Deck, or Patio - Yard

    OTHER SPECIAL FEATURES

    - 1 car garage, covered carport for 2 cars
    - covered wood deck in backyard
    - gutters
    - storage shed
    - newly stained wood fence
    - electric fireplace added, with tile hearth
    - upgraded ceiling fans and light fixtures
    - island in kitchen

    ADDITIONAL PHOTOS


    Fantastic curb appeal

    covered wood deck in back

    living room

    kitchen with island

    breakfast nook

    master bedroom
    Contact info:
    Sheree Dutton
    Ready Real Estate
    817-975-0461
    For sale by agent/broker

    powered by postlets Equal Opportunity Housing
    Posted: Sep 11, 2009, 7:31am PDT

    Blog Archive