Posts

Hacking Facebook Latest Method

Image
Requirements for hacking an account  2 Fake Facebook Accounts One E-mail ID Before We Start : Send Friend Request to the victim from all three accounts(Your account and 2 Fake Accounts). The victim must befriend to all three accounts Procedure 1) Get the victim's Facebook user name. /Easy way to get someone's user name is that search victims account in FB then click on it and in the URL field, u will see something like this "http://www. Facebook. com/Xyz?blablabla" in this case "Xyz" is the user name of the victim/ 2) Open Facebook login page and enter the victim's username (we got in procedure 1) as email id, then click on login. 3) Now Facebook will tell you this Please re-enter your password The password you entered is incorrect. Please try again (make sure your caps lock is off). Forgot your password? Request a new one. Click on the 'request a new one' link. 4) Now you will asked to search your ID using Your Mo...

Unauthenticated meeting Join Vulnerability in Cisco Webex

Image
Unauthenticated meeting Join Vulnerability  Cisco Webex Meetings Suite Software Affected • Cisco Webex Meetings Suite sites and Cisco Webex Meetings Online site releases prior to 39.11.5 and 40.1.3. Overview The vulnerability has been reported in Cisco Webex Meetings Suite sites and Cisco Webex Meetings Online sites which could allow an unauthenticated remote attacker to join a password-protected meeting without providing the meeting password. Description Cisco Webex Meetings Suite and Cisco Webex Meetings Online Unauthenticated Meeting Join Vulnerability ( CVE- 2020-3142 ) A vulnerability exists in Cisco Webex Meetings Suite and Cisco Webex Meetings Online sites due to unintended meeting information exposure in a specific meeting joins flow for mobile applications that could allow the attacker to join a password-protected  meeting without providing the meeting password. An attacker could exploit this vulnerability by accessing a known meeting ID or meeting URL...

Ardamax Keylogger lifetime licence Key

Image
What is ARDAMAX  KEYLOGGER? Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. ... Logs can be automatically sent to your e-mail address, access to the keylogger is password protected Here is the download link for the Ardamax Keylogger... https://drive.google.com/file/d/165eKYL9Hr1GpgicMLCC9NKqW2xrkME3b/view?usp=sharing

How to Clear Data Facebook Collects About You

Image
In today's cyber world we all are using social media apps in our day-to-day life. Such as Facebook, Instagram, Whatsapp, Snapchat, etc. but we don't know the fact that this apps tracking us and know very much about us.  It's not their fault we only give permissions to them to do so. Indirectly we allow them to track us as we don't read which permission we are allowing them is it necessary or not. Facebook is one the biggest advertising platform and that's because it knows a lot about you, me and everyone else. Facebook uses many tools to track people across the Internet, whether they have an account with the social networking site or not, and most of them rely on the online activity data other apps and websites share with Facebook. However, after facing worldwide criticism over privacy and data breach controversies, Facebook last summer announced a privacy tool, called Off-Facebook Activity, which gives users more control of their data collected by Faceb...

Cross-site scripting Vulnerability in WhatsApp

Image
Cross-site scripting Vulnerability in WhatsApp Software Affected: WhatsApp for Desktop prior to 0.3.9309 paired with WhatsApp for iOS prior to 2.20.10 Overview A vulnerability has been reported in WhatsApp which could be exploited by a remote attacker to read local files on the target  system and cross-site scripting attack. Description A Cross-site scripting vulnerability exists in WhatsApp Desktop when paired with WhatsApp for iPhone. A remote attacker could exploit this vulnerability by sending a specially crafted message to the target system and requires the victim to click on this preview link of this message. Successful exploitation of this vulnerability could allow the remote attacker to read local files on the target system and cross-site scripting attack.

What is Formjacking?

Image
What is Formjacking? Formjacking is when cybercriminals inject malicious JavaScript code to hack a website and take over the functionality of the site's forum page to collect sensitive user information. Formjacking is designed to steal credit card details and other information from payment forms that can be captured on the checkout pages of websites. How does form jacking work? Once a website user enters their payment card data on an e-commerce payment page and clicks “submit,” the malicious JavaScript code is what collects the entered information. The malicious JavaScript code that has been installed by the cyber thieves can collect information such as payment card details, home, and business addresses, phone numbers and more. Once the information has been collected, it is then transferred to the attacker’s servers. The cyber thieves can then use this information for financial gain themselves, or they can sell the information on the dark web. With this information, cyberc...

Some Dark web Links

Image
Here are some of the Forum/Website to visit on dark web related to cybersecurity and hacking. Before visiting this website please follow the steps to be safe on the dark web/ Deepweb. Security Steps to be taken before opening the links: First of All, To browse these dark web forums, first close all active programs and applications in your computer then start Your NordVPN or any Paid and HQ VPN that have TOR service and select Onion Over VPN Server.  Now start Tor Browser and disable Javascript. In this way, you have created a completely secure and untraceable environment for you. If you think Tor Browser gives you full anonymity then you are wrong.  Only premium VPN services can provide you fully secure and untraceable environment. I have tried my hands on many premium VPN services, and I found NordVPN beats its competitor in all features. Disclaimer ⚠ : This info are shared for educational purpose only, neither the website nor creator hold any info or liabl...