Monday, 23 February 2015

Fake Sms Sender Webbased


Imacros Link Unlock IT







Saturday, 21 February 2015

FREE VPN SETTING










IFTTT TUT



IFTTT REDIRECT

IFTTT REDIRECT 

Thursday, 19 February 2015

AUTO Coin Generator For AMF With Imacros





GOTO MANGE THEN EDIT THEN PASTE THIS CODE AND HIT
SAVE AND CLOSE

VERSION BUILD=8240212 RECORDER=FX
set !ERRORIGNORE YES
SET !TIMEOUT_TAG 1
SET !TIMEOUT_STEP 1
SET !TIMEOUT_PAGE 30
TAB T=1
URL GOTO=http://addmefast.com/free_points/facebook_share
TAG POS=1 TYPE=DIV ATTR=TXT:Share
TAB T=2 FRAME F=0
TAG POS=1 TYPE=BUTTON ATTR=NAME:share
TAB T=2
TAB T=1
wait seconds=15
TAG POS=1 TYPE=DIV ATTR=TXT:Share
TAB T=2
FRAME F=0
TAG POS=1 TYPE=BUTTON ATTR=NAME:share
TAB T=2
TAB T=1
wait seconds=15
TAG POS=1 TYPE=DIV ATTR=TXT:Share
TAB T=2
FRAME F=0
TAG POS=1 TYPE=BUTTON ATTR=NAME:share
TAB T=2

TAB T=1
wait seconds=15




redirection2

redirection

redirection

redirection

Saturday, 14 February 2015

Facebook Signal Name ID ....


  • Facebook Signal Name ID ....



For Best Results View In Full Screen :)




Friday, 13 February 2015

HOW TO BYPASS WI FI HOTSPOT ACCESS CONTROL BY SESSION STEALING

Let us see how to do that using backtrack linux and bypass the WiFi Hotspot access control.
Step 1: 
Boot into your Backtrack Linux.  Start Wireless Assistant in Backtrack & confirm you have some wireless network around. Then you can click “Connect” to that network. It won’t let you connect because you are not the paid user. It will open up browser and will ask you to pay for usage.
Close it.
Step 2: Connectin up With Wi Fi Network (rausb0)
There are multiple ways you can do this & very simple would be to use Ping Scan from backtrack. I am demonstrating here by using AiroDump which will be an add on method for you to learn.
Open up your Shell or Konsole form Backtrack & now we have to put network in Monitor mode.
Type in ifconfig -a (Hit Enter)
You ll see list of network interfaces. I see “rausb0” in my list which I want to connect so type in following and hit enter again.
ifconfig rausb0 up
Now your network is up & we have to put network in monitor mode so type in following.
iwconfig rausb0 mode monitor (Hit Enter)
iwconfig (Enter again)
So now we are up in monitor mode. We have to start Airodump Next.
Step 3: Start Airodump
In the same shell type in
airo (Enter)
Then, type next
airodump –ng rausb0 ( Enter again)
Now we will see the SSID of the whole network. We have to find the user’s MAC address that is already on a network.
Step 4: Capturing MAC Address For Spoofing (of Connected User)
You ll see a list of SSID’s around there. But at the end of all lines you have to find out the name of Wi Fi access point.
E.g – You’ll Find attwifi if you are on the AT&T wifi network. As shown in following image.
MAC Address Session Stealing
You have to copy the MAC address corresponding to that wifi network. And use it in following command.
airodump –ng –bssid xx:xx:xx:xx:xx:xx rausb0 (Replace copied MAC Address at XX & Hit Enter)
It will now open up the rausb0 interface & will take some time to find out network traffic. Then you’ll see some stations with its packet data flow information. For security pick up the station that have more data packets flowing. (Like more than 30-40)
Copy the MAC ADDRESS of this station.
Now you have finalized the address to replace as our MAC address, you have to put back the network to Manage mode from monitor Mode.
If you have USB dongle plugged in simply unplug it, change MAC adrdress and plug it back again. If you are not USB dongle type in following and it enter again.
Ifconfig rausb0 down
Step 5 : Changing MAC Address
In your shell type in mac and hit enter to change MAC Address.
macchange –m xx:xx:xx:xx:xx:xx rausb0 (replace xx with copied MAC address & Enter)
Now you’ll see current MAC address & Fake MAC address .
Now you have to plug back in your USB you took out few minutes ago. Or if you have used command to put your interface down use following command to put it back up.
Ifconfig rausb0 up
Now your MAC address successfully changed you can check by typing ifconfig in console.
Step 6: Connecting to Hacked Wi Fi Network
Now you are done at Bypassing Wi Fi HotSpot’s Access Control Using Session Stealing & you can connect to hotspot as follows.
1. Open Wireless Assistant.
2. Select Network
3. Hit Connect
And you’re done !!!
 Disclaimer: This is For Educational Purpose Only.

For more Visit Askkilari.com

Thursday, 12 February 2015

Ghost Sms Bomber 2015





Requirements 
Internet speed Min (1.00 Mbps )
Net Farm Work 4.0 
Internet Explorer 9.0 
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<







How to hack Facebook with phishing page 2015 new methed

How to hack Facebook with phishing page
                                                                             By: Mr Kilari

                                                    hacking facebook account
As we all want to hack our friend facebook account,and want to read all his personal things.
Today i m gonna teach you how to hack a facebook account with a phishing page.

Phishing:


Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging,and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents includelegislation, user training, public awareness, and technical security measures.

today we create a facebook phishing page which look similar to a facebook page but it's not actually a facebook page,when victim enter his username and password you will be able to see that.Interesting.....

Hacking eBooks

For Download CLICK HERE


In This eBook you will learn: ( eBook include Pictures)
A. Introduction..............................................................................................5
1. How can I use this eBook?
2. What is a hacker
3. Hacker Hierarchy
4. What does it take to become a hacker?
5. Disclaimer
B. Programming............................................................................................9
1. Do I really need it?
2. Where should I start?
3. Best way to learn
C. Linux.......................................................................................................12
1. What is it?
2. Choosing a distribution
3. Running Linux
4. Learning Linux
D. Passwords...............................................................................................33
1. Password Cracking
2. Phishing
3. Countermeasures
4. More Programs
E. Network Hacking.....................................................................................48
1. Foot printing
2. Port Scanning
3. Banner Grabbing
4. Searching for Vulnerabilities
5. Penetrating
6. Countermeasures
F. Wireless Hacking.....................................................................................70
1. Scanning for Wireless Networks
2. Cracking WEP
3. Packet Sniffing
4
4. Countermeasures
G. Windows Hacking...................................................................................79
1. NetBIOS
2. Cracking Windows Passwords
3. Countermeasures
H. Malware.................................................................................................93
1. Definitions
2. ProRat
3. Countermeasures
I. Web Hacking.........................................................................................104
1. Cross Site Scripting
2. Remote File Inclusion
3. Local File Inclusion
J. Conclusion............................................................................................114
1. Congratulations
2. Keep Learning





                                                 For More Visit AskKilari.com

Wednesday, 4 February 2015

BlogHaider Call Bomber 2015



Requirements 
Internet speed Min (1.00 Mbps )
Net Farm Work 4.0 
Internet Explorer 9.0 
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<




Multi Sms BomBer 2015 Latest


Multi Sms BomBer 2015 Latest







<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Requirements 
Internet speed Min (1.00 Mbps )
Net Farm Work 4.0 
Internet Explorer 9.0 
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<


File Size = 6.00 MB
Download Now!

Welcome To BlogHaider.If You Found Any Mistake ,Error or BUG Contact Us:- 00923356105927 , 00971525461918 (Ali Hassan) Or Fb.com/bloghiader2