Thursday, 31 May 2018

What is Carding? A Complete Carding Tutorial for Beginners


This Article is Only for Educational purpose.If you do any Illegal work Tech Gyan mantra is Not Responsibile for That.


Carding is a Method of Stealing the Information of Someone’s Credit Card and Using it to Buy Things from Online Stores, Using with the Access of that Credit Card. Thieves or Hackers, Who Steals these details Usually Calls Carders. They Buy Goods with these Credit Cards or Sell’s it Online. Below I have Included the Methods, That they Use in Carding. This is A Complete Guide to What is Carding? And How to Do Carding. This Guide Consists a Complete Carding Tutorial, So you can Learn All About Carding. I also Include List of Some Credit Card Dump Sites and Carding Forums so you can Clear your All Thoughts.

Download App:- Tech Gyan Mantra


Carding is not Easy, As Simply Going to Site and Buy Some Stuff. If you want to Learn Carding, you have to Give it time and Practice and Have to use your Mind Yourself. I will just provide some Great Carding Techniques, A Complete Carding Tutorial, List of Some Dump Sites and Links of Carding Forums But you have to Learn it own. The Success Rate in Carding is very low Because Nowadays, Many Sites get you and Cancel your Order, So It needs very Patience and Time to learn it. This is a Guide for Especially a Noobie If he Wants to learn Carding. So Read Full Post, And If you will have any Doubt, Just Hit the comment Section, Below the Post. ????



Note: Carding is an Illegal Process, I don’t Recommend anyone to try this. This Carding Tutorial is only for Educational Purpose. If you try to do Carding, Then I will not Responsible for Any Damage.



What is Carding?

Carding is a Process, Where a User or Carder purchase Goods from a Hacked or Stolen Credit Card Details. Hackers Steal the Details of Credit Cards And then Buy Stuff from these details. Carding is an Art of Technique, If you want to learn Carding, You have to give it your time. If you are Noob, Then it is expected that you’ll fail some times, But the Key of Success is, Not to Stop and Keep Practicing.


The Success Rate for Carding is very Low, As their if the Site gets any Unknown Transaction from a Hacked or Stolen Credit Card info, They Usually Reversed the Transaction or Cancel the Order Placement.


However, Carding can Only be Done using US Cards, As these Cards does not require any Pin Verification or OTP’s. So If you are Using an Indian Credit Card, Then It is Highly Secured as they Won’t Work Without OTP Verification or 3D Secure Verification Unless International Transaction Mode is Enabled.



How to do Carding? Complete Carding Tutorial

Basic Things You Need for Carding: Carding Tutorial

There may be So many Things, But I have Added the Most Important and Basic Ones in this List, Below I also Explained What these things are, And How it will help you in Learning and Understanding this Carding Tutorial. ????


  • A Computer
  • CC Cleaner or All in One Cleaner
  • MAC Address Changer
  • SOCKS
  • CC
  • RDP (Optional)
  • Drop( Optional)


Computer

Well, This is an Essential part, If you are going to do Carding. For Carding, I will Always prefer you to Use Computer because it has so many things and It is the Safest Way to Card. Many of Carders Use Mobile for Carding But It is not Safe, So I Prefer having a Computer First. But If you don’t have a Computer, then I have included the Safest way to Card with Smartphone. You can Check that Below. ????


CC Cleaner

It is a very Useful tool that mainly uses for Cleaning all the Browsing History, Clearing Cookies, Caches and Temp Files. This is a very handy tool, But not so many people know about it. Flash cookies are different from Regular Cookies, As they don’t Ask for permission to Install Cookies on your PC, and Saves All the info in your Browser, This Tool Even Clear all the Flash Cookies As Well. ????


MAC Address Changer

It is a Unique Identifier, That Assigned in an Network Interface Card. It is Unique of Every Computer. MAC Address Changer Allows you to spoof MAC Address of your Computer.


Socks

It is a Network Internet Protocol, Which Mainly Routes Network Packets between Server and Client using a Proxy Server. So, We’ll use it for Hiding Our Main Location and Proving a Fake Location to the location of Credit Card’s Holder for Making the Transaction Successful. Generally, It is more Secure than the VPN, as It won’t leak your DNS Details.




RDP

RDP Also knows as Remote Desktop Protocol, Which Allows you to graphically connect with a Computer Over a Network. It will connect you with any Computer Connected as an RDP on Any Country and Make yourself Anon. This is not Required but you can Use it for Safety Purposes.


Drop

Well, It is a Service, Which usage for getting Shipping Address for Carding. Suppose If you are from Pakistan And Carding with a US Credit Card. If you’ll add Delivery Address as Pakistan then There are so many chances to Cancel the Order, But If you will use a US Address, then there will be 95% Chances of Order Success. If you have any Relatives their than It is OK, But If you don’t have anyone than This service will help you. It will provide you an Address of that country, And Take Delivery and then Send that Parcel to you. it charges some money for it, But It will be worth in Investing in it. ????



Credit Card

This is the Essential Part of Carding, If you Understand what is it, Half of your Work will End Up Here. Whenever you’ll buy a Credit Card from any Online Shop, you will receive it in a Virtual Notepad File or Something with the Below format.



Types of Credit Cards

Below I Have Added some types of CC, You’ll Get while Buy it from Any Shop. ????
Regular Credit Card

NAME:
ADDRESS:
CITY:
STATE:
ZIP CODE:
TEL. BILLING NUMBER:
CARD NUMBER:
CARD EXP DATE:
CVV CODE:

Well, This is the Minimum Information you’ll get from a CC whenever you’ll Buy it. If you’ll not Get any of these Details, Then you can’t do anything with that CC. You are Out of Luck this Time. With this CC you can Card Simple Sites.


Partial Full-Info CC


In these Card, You will get some Additional Information with the Details Mention Above. This Information are
Social Security Number (SSN):

Date Of Birth (DOB):

******’s Maiden Name (MMN):
with the Help of this Info, You can Even Card C2IT and Even Paypal. So this is Great if you’ll get these Details too. ????



Full-Info Credit Card

This Card Provides you full Details in it. 

These Details are Below

  • BANK ACCOUNT NUMBER:
  • ROUTING NUMBER:
  • BANK NAME:
  • BANK NUMBER:
  • DRIVERS LICENSE NUMBER:
  • PIN NUMBER (For CC or ATM card)

If you’ll have this info, You can Card Anything. Yes, I said Anything.




Types of Credit Cards

Below are some of the Companies, Which Provides Credit Cards. I must Suggest you Use AMEX Premium, As It has mainly Usage by Many of the Carders. These Companies are

AMEX
VISA
DISCOVER
MasterCard


BIN- What is It?

BIN Stands for Bank Identification Number, It is the First 6 Digits of your Credit Card, Suppose if your Credit card number is 4305873969346315
this, Then your BIN will be 430587. I will suggest you Collect some Information Related to BIN, This may help you in Learning Carding Easily. For BIN’s Bins.Pro And BinLists are Best. This will help you in Learning Almost Everything about Bins. Must Do a check at these sites.


How to Card? Carding Tutorial

Well, Before Starting makes Sure you have gathered all the Required Things I Earlier Mentioned in the Post. For the Links of Download and Purchase See the End of Post. ????

Set Up Socks in Mozilla

Just Open Firefox, Than Go to Options and Click on Advanced Settings. After that go to Network and then A Pop-Up will appear. Select the fourth option of Manual Proxy Configuration. Now type the Proxy and Port Below, That’s it.

After Adding the Proxy there, Just Hit OK and Restart the Firefox and Now you’ll be Connected with Secure Socks.


Note: Make Sure to Buy Socks with the Matching Location of the Address in Credit Card. Suppose If Credit Card holder is From South Africa, Your Socks are also of South Africa.




How to Carding? Step By Step Tutorial of Carding

1. Create a New Email Account with the Matching Name of CC Holder, If CC Holder Name is Smith Parker then Make Something Like rdxanon78@***.com

Note: Never Use Disposable Emails for Carding.

2. Run RDP and Connect with your Host, In case if you are not Using RDP Follow the Steps Below-

3. Change All the MAC Addresses Using MAC Address Changer.


4. Clear All the History of Your PC Including Cache, Temp Files using CC Cleaner.


5. Set Up Sock5 in Mozilla Firefox, Check Above I Have Explained How to Setup Socks in Mozilla.


6. Now, Restart your Browser and Visit This link to Check is your IP Changed with the Location of CC holder or Not.


7. Open Any Local Online Market Store, I will suggest you Use anyone which is from your own country.


8. Register Account with the Name of CC Holder and Email you made for Carding.


9. Try to Add an Item to your Cart, The item should Below USD $500, Never use Big Orders for the First Transaction.

10. In Shipping Address, Add the Address where you want to Deliver the Product.


11. Now, Go for the Payment Option, Choose Credit Card for Payment. ????

12. Enter All the Credit Card Details you Received when you bought the Credit Card.

13. For Billing Address, Use the Address of CC Holder.

If you follow all the Steps Above, your Order will be Successfully Placed. Now wait for Order to Arrive, When the Order will arrive, the Courier boy will make a Call to you, And When you’ll go for taking the Product, he will ask you for Any ID Proof, Try to Provide them any Fake ID, or If you’ll not able to make Fake ID, Comment, we’ll make one for You. ????



Note: Never try to Give real ID Proof while getting the Delivery.

How to Card with Android Smartphone

Well, I won’t suggest to do it with Mobile or Android Smartphone, Either You can Try. I personally Suggest using a PC for it. ????


1. A Rooted Android Device with Some Apps Installed, Apps Like- IMEI Changer, CCleaner, Android ID Changer, Proxy Droid, and Phone ID Changer.

2. Change IMEI, Android ID and Phone ID Using Apps.

3. Connect SOCKS Proxy Using Proxy Droid App.

4. Now Follow All the Steps of Carding Mentioned Above. ????


List Of Sites for Carding?

Well, There is no one Site which can’t be Carded, Its All Depends on the Credit Card you have. It all depends on your methods and Active mind.


How to Check Balance on Credit Card?

Follow the Steps Mention Below, the Steps will only work with US and UK Based CC’s.


  • Check your BIN in www.binspro.com and get your bank name. For example of the BIN (430587), the bank is Capital One, USA.

  • Now search phone number bank in google. For this bank, it’s +1-800-935-9935

  • Call the number on Skype, it’s free since it’s toll-free number.

  • Now the automatic robot will ask you some info. Ex. CCN, CVV etc.

  • Now put your info by using your keyboard.

  • It will automatically tell you the CC balance.




Useful Links

Buy CC- www.validcc.su

Buy Socks- www.vip72.com

Download MAC Address Changer-Click

Download CCleaner- Click

Download Socks Checker- Click

Or 

Click










FOR HACKING COURSE

WHATSAPP:-  +16366780163

Monday, 28 May 2018

How to Change Windows Password without Knowing Old Password


Can't remember your Windows user password? As you all know without knowing the current password we are unable to change Windows password. Today I am going to tell you two easy tricks to change Windows password without knowing the old password. These tricks work on Windows 10, 8, 7, Vista and XP.



Option 1: Change Windows Password from Command Prompt


This is an especially handy trick if you want to change a password on an account but you've forgotten the old password (going through the Control Panel can require confirmation of the old password). You need to have admin access to perform this change from the command line.



1. Open an elevated Command Prompt. Click on Start button, go to All Programs -> Accessories and right click on Command Prompt and select "Run as Administrator" from context menu. In Windows 8, you can do this by simply pressing Windows Key + X + A.


2. You can use the net user command to change Windows password easily, without supplying the old password:

net user username  new_password

Replace username with your Windows account name, and new_password with your desired new password.




If you're totally locked out of Windows, you're unable to run any program such as command line tool to change your password. In this situation, you need to use a bootable media to change Windows password.





Option 2: Change Windows Password with PCUnlocker


PCUnlocker is a bootable utility that can reset the password of any Windows user account. It works with all versions of Windows, including Windows 10 and Windows Server 2012. Follow these steps and you can change Windows password without knowing the original password:


1. First of all, you need to use another PC to download the PCUnlocker program, which comes as a bootable CD image. Burn the ISO image to a blank CD or USB drive using the ISO2Disc utility.


2. Insert the newly burned CD or USB drive into your target computer, and set it to boot from CD/USB.


3. Once you've booted into the CD/USB drive, you'll be presented with the screen of PCUnlocker. This program automatically locates the SAM database file for your installed Windows operating system, and shows you a list of local user accounts.





4. Select a user account and click on
Reset Password button. It will remove your old password immediately. Restart the computer and you can then log into your Windows account without typing a password!





FOR HACKING COURSE:-

WHATSAPP :- +16366780163

Friday, 25 May 2018

Pumpkin Pi — The Rogue AP & MITM Framework That Fits in Your Pocket (Wi-Fi Hacking part 4)


WiFi-Pumpkin is a very complete framework for auditing Wi-Fi security. The main feature is the ability to create a fake AP and make Man In The Middle attack, but the list of features is quite broad.


A man-in-the-middle attack places you between your target and the internet, pretending to be a Wi-Fi network while secretly inspecting every packet that flows through the connection. The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwarding legitimate traffic to and from the unsuspecting target. Today, we'll learn to set up this framework on a low-cost Raspberry Pi running Kali Linux .


Download App :-  Tech Gyan Mantra


Man - in -the -Middle Pumpkin Pie

On the Raspberry Pi 3 running Kali Rolling, some Kali Linux tools can be broken out into standalone, almost disposable devices. One perfect example is the WiFi-Pumpkin , an attack framework for creating rogue access points to stage man-in-the-middle (MITM) attacks. This allows an attacker to lure victims to their evil access point and begin monitoring internet traffic, effectively seizing control over the flow of data to any connected victims.



A rouge device for creating fake Wi-Fi hotspots from a Raspberry Pi.


When to Use the WiFi Pumpkin


The WiFi-Pumpkin is a great tool to use when you have the ability to bridge an existing Ethernet or Wi-Fi connection, serving internet access to anyone willing to connect to an open network without asking too many questions. It comes stuffed with features, including rogue Wi-Fi access points, deauth attacks on client APs, a probe request and credentials monitor, transparent proxy, Windows update attack, phishing manager, ARP Poisoning, DNS Spoofing, Pumpkin-Proxy, and image capture on the fly.




Following up from a previous tutorial, wireless probe frames can reveal networks a phone or laptop is probing for. One way we can use the WiFi-Pumpkin is to monitor probe frames and create a network in response. We can use the WiFi-Pumpkin to conduct a "Karma" attack and create a network with the same SSID that the target device is expecting, or has connected to before.


The name of your network will have a huge effect on how people interact with it. If you are in a crowd, creating a network with names like "Starbucks" can cause a startling number of devices to connect to you in under a minute. Be creative in how you trick users into connecting to your evil AP. When you want fine control over the various elements of a man-in-the-middle attack, the WiFi-Pumpkin's easy GUI is straightforward enough for most beginners to grasp.


What You ' ll Need to Get Started


The setup to create a WiFi-Pumpkin is minimal and requires only a few components. To put this together, you'll need the following.

  • wireless network adapter
  • Ethernet cable
  • Raspberry Pi
  • microSD card
  • power source
  • USB keyboard/mouse interface
  • SD card adapter
  • laptop to load files on the SD card


This great kit from Canakit also has most of what you need.

A simple setup for a portable rouge AP, easy to hide or leave behind.



Installing & Running WiFi -Pumpkin ( Kali Linux )


As before any new install, ensure that your system is fully updated. WiFi-Pumpkin will require that you have an up-to-date Python installed on your machine.

sudo apt-get update

WiFi-Pumpkin has a number of dependencies you will need to have installed before it can run smoothly. Install the following if you don't already have them on your Kali-Pi.


STEP 1 : Install Dependencies

Python's package manager, Pip, will help us manage the rest of the installation. To install it on Kali Linux, run the following commands.

sudo apt-get install -y python-pip




The next three dependencies will allow WiFi-Pumpkin to verify certificates, add HTTP layer support, and intercept and inspect traffic flows. Install each as shown below.

pip install service_identity




pip install scapy_http



sudo apt-get install mitmproxy






STEP 2 : Install WiFi -Pumpkin


Download WiFi-Pumpkin by cloning the GitHub repository:





Then go inside the folder:

cd WiFi-Pumpkin

And change the permission of the installer file:

chmod +x installer.sh


And then run the installer by entering the following.

./installer.sh --install




STEP:- 3 Run WiFi - Pumpkin

When it's complete, run WiFi-Pumpkin by simply entering the following.


Sudo wifi-pumpkin



You're ready to get started creating fake APs!





Some Considerations with the WiFi - Pumpkin



Keep in mind, in order for WiFi-Pumpkin to work, you will need to have access to at least one Kali Linux compatible wireless adapter with AP/Monitor mode support. You will need your Pi to be connected to the internet while also capable of monitoring wireless traffic around you.


You can achieve this by using one wireless network adapter and your Pi's internal Wi-Fi card in tandem or a wired Ethernet connection and one wireless network adapter. In the case your particular Pi isn't Wi-Fi capable, you'll need two wireless network adapters. If you are unsure if the wireless adapter you have supports AP/Monitor mode, you can check in terminal with iw list . If there is an "AP" in the list of "Supported interface modes," then your device supports it.
If you're in need of a Kali Linux compatible wireless adapter with the appropriate functionality, check out link And, of course, happy hacking!






For Hacking course :-

Whatsapp :- +16366780163

Thursday, 17 May 2018

How to Install kali linux on Window 10


Kali Linux is known as being the de facto penetration-testing Linux distribution but can be a pain to use as an everyday OS — even more of a pain if that means carOrying around a second laptop or the constant frustration of using the finicky Wi-Fi on virtual machines. But there's another option: installing a Kali subsystem on your Windows computer as a convenient compromise.


Download App :-  Tech Gyan Mantra

Microsoft has introduced Windows Subsystem for Linux , or WSL, which lets users run their favorite Linux distributions directly from Windows 10 without dual-booting or using a virtual machine. Thanks to the efforts of Offensive Security and the WSL team at Microsoft, Kali Linux is now the most recent addition to the Microsoft Store.


Those familiar with running Kali virtual machines understand the frustration of attempting to use Wi-Fi and Wi-Fi adapters, which is what makes the Windows subsystem so nice — you have no such problems. Additionally, you have the full performance capability of your PC without having to partition it as you would with a virtual system. And, unlike a dual-boot setup, you don't have to restart the system and boot into a new OS anytime you want to use it. It's as simple as opening a shell.



Limitations of Kali as a Windows Subsystem for Linux


While this is definitely a step in the right direction for Microsoft, it's not quite there yet in terms of full functionality. Specifically, WSL does not support AF_PACKET, and that's because Windows itself does not support it because of security restrictions. This means that you won't be able to put a Wi-Fi adapter in promiscuous mode (or monitor mode), and tools that require raw sockets to function properly won't work, such as Nmap . To make this possible, head over to the reported issue on GitHub to let them know how many people want this.



Enough talk, let's install the Kali Linux subsystem and see what it can do!



STEP :- 1

Install the Windows Subsystem for Linux


First, run PowerShell as the administrator by pressing Windows + X and clicking on "Windows PowerShell (Admin)." Then enable this optional Windows feature by running the following command.


"Enable-WindowsOptionalFeature -Online -FeatureName Microsoft-Windows-Subsystem-Linux"


Once you press Enter, a loading bar will appear for a few seconds, then you will be prompted to restart the computer. Press Y and Enter to reboot. The system will immediately begin to restart.





STEP :-2


Download the ' Kali Linux ' Application


Once your system has rebooted and you've logged back into your account, navigate to the Microsoft Store by searching for it in the
Cortana search bar in the bottom-left corner of your screen. Once there, search for "Kali Linux" or simply follow the link below to open the Kali page in the Microsoft Store. From there, click "Get" to begin installing.


Install Kali Linux from the Microsoft Store for Windows 10





Other ubiquitous Linux distributions, such as
Ubuntu , are also available so you may want to spend a few minutes looking around the Microsoft Store before you leave.






STEP:- 3

Launch Kali for the First Time


Before you launch the "Kali Linux" app for the first time, I recommend clicking " Pin to Start " or, better yet, click the ellipsis (...) just to the right of it and then "Pin to Taskbar" to make it quick and simple to launch Kali in the future.





Once you've done that, click "Launch," and a shell will open and begin the final installation which can take a few minutes.




With that done, you'll be prompted to create a Unix username and password. Congratulations, you're all set up and running a Kali Linux subsystem on your Windows machine! Don't forget to update it regularly just like any Linux system:


sudo apt-get update
sudo apt-get dist-upgrade


If hard drive space is a concern, then don't forget to clean up the apt directory.

sudo apt-get clean



STEP:- 4


Add Windows Defender Exclusion


Unfortunately, Windows Defender doesn't always like to play nice with the tools in the Kali repository. Sometimes, it detects them as viruses and/or malware and blocks some portion of the program. To prevent these errors, it's a good idea to go ahead and add a Windows Defender exclusion for the Kali Linux folder.


First, find that folder by opening File Explorer and entering the following location in the address bar. Don't forget to replace "yourusername" with your actual username!

C:\Users\yourusername\AppData\Local\Packages\





Now, open the Kali Linux folder which should look something like "KaliLinux.54290C8133FEE_," and copy the folder location.



With that in hand, search for "Windows Defender Security Center" in the Cortana search bar the bottom left of the screen. Within the Security Center, click on "Virus & threat protection" represented by a shield on the menu to the left side of the screen.




Next, click on the cog in the bottom, then "Virus & threat protection settings," then scroll down to the bottom under Exclusions and click "Add or remove exclusions." Then press the plus icon beside "Add an exclusion," select "Folder," and then paste the Kali folder address in the top bar. Click "Select folder," and a popup will appear — click "Yes" to add the exclusion.



If you ever want to remove this exclusion, simply click on the down arrow beside the folder location, and click "Remove."


STEP: 5

Install Penetration Testing Tools


With the Windows Defender exclusion in place, you're ready to get started with your ethical hacking. Not much comes preinstalled in this version, so install tools you wish to use from the Kali repository as you normally would with the apt-get command. For example, to install
Metasploit :


sudo apt-get update

sudo apt-get install metasploit-framework




WATCH VIDEO:-







For Hacking Course:-

Whatsapp :-  +16366780163

Monday, 14 May 2018

Hacker Kevin Mitnick shows how to bypass 2FA


A new exploit allows hackers to spoof two-factor authentication requests by sending a user to a fake login page and then stealing the username, password, and session cookie.

Download App :- Tech Gyan Mantra

KnowBe4 Chief Hacking Officer Kevin Mitnick showed the hack in a public video. By convincing a victim to visit a typo-squatting domain liked “LunkedIn.com” and capturing the login, password, and authentication code, the hacker can pass the credentials to the actual site and capture the session cookie. Once this is done the hacker can login indefinitely. This essentially uses the one time 2FA code as a way to spoof a login and grab data.





“A white hat hacker friend of Kevin’s developed a tool to bypass two-factor authentication using social engineering tactics – and it can be weaponized for any site,” said Stu Sjouwerman, KnowBe4 CEO. “Two-factor authentication is intended to be an extra layer of security, but in this instance, we clearly see that you can’t rely on it alone to protect your organization.”
White hat hacker Kuba Gretzky created the system, called evilginx , and describes its implementation in a wonderfully thorough post on his site .


Sjouwerman notes that anti-phishing education is deeply important and that a hack like this is impossible to complete if the victim is savvy about security and the dangers of clicking links that come into your email box. To demonstrate this, Sjouwerman sent me an email seemingly addressed to me from Matt Burns
(matt@techcrunch.com) talking about a typo in a post. When I clicked on it I was transferred to a SendGrid redirect site and dumped into TechCrunch – but the payload could have been more nefarious.


“This highlights the need for new-school security awareness training and simulated phishing because people are truly your last line of defense,” said Sjouwerman. He estimates that hackers will begin trying this technique in the next few weeks and urges users and IT managers to harden their security protocols.



WATCH VIDEO :-




For Hacking course :-

Whatsapp :- +16366780163

Friday, 11 May 2018

Create Your Own Search Engine for More Privacy & Zero Trust Issues


While there are a variety of privacy-focused search engines available like StartPage and
DuckDuckGo , nothing can offer the complete trust offered by creating one's own search engine. For complete trust and security, Searx can be used as free metasearch engine which can be hosted locally and index results from over 70 different search engines.


Search engines inevitably carry some traces of metadata about anyone who uses them, even if just temporarily. If you don't want to trust this data to a third-party search engine, the only solution is to host your own. One could choose to host this on an external server or even use it on a local network.


Download App:-  Tech Gyan Mantra


Many search engines also create user profiles even for website viewers who do not register accounts. While it is possible to see the customization of search results according to mined data as a convenience, it can also be seen as an invasion of privacy or even a form of censorship. A metasearch engine instance facilitates the same valuable search results while limiting the type and amount of data which can be gathered about individual users, especially if multiple users are using a given instance.



The Searx "About" page summarizes the tool using the three following points.



  • searx may not offer you as personalized results as Google, but it doesn't generate a profile about you

  • searx doesn't care about what you search for, never shares anything with a third party, and it can't be used to compromise you

  • searx is free software, the code is 100% open and you can help to make it better



For the privacy-minded or even those who wish to customize their search engine experience to the greatest extent, Searx can be an ideal choice.


Step 1 : Choose a Local or Web -Based Instance


Before installing Searx, it's best to first decide on what sort of access you would like to have to the Searx instance. Searx, when installed, is accessible through a web browser, similar to any other search engine. This instance could be accessed on a remote web server or simply through a local install of the metasearch tool.


In this tutorial, Searx is installed locally and accessed on the same device on which it is installed, but the software could also be used on an internet-connected server to create a web-based search engine, such as the public instances listed on GitHub.



Step 2 : Update Your Linux System


Once you've chosen a device to install a Searx instance on, the next step is to ensure that the system is updated and secure. On Debian-based Linux distributions like Ubuntu, this updating process can be completed using apt-get . The command below will update the system software repositories and upgrade any out-of-date software.


sudo apt-get update && sudo apt-get upgrade




Also Read :-  Android P Latest Version 9 Security Features Explained

Step 3 : Install Searx

Installation of Searx creates a server-like stack of services which can be accessed locally or used to create a real live instance of the metasearch engine on an internet-connected server.


Option 1 : Using Docker

Docker can be used to install Searx in a container, assuming Docker is installed and configured on the system one wishes to install Searx on. We have a guide on setting up and using Docker, and Docker also has some instructions on its site . If you do not wish to use Docker, you can skip to the installation instructions in Option 2 for the classic installation method.

First, make a copy of the Searx repository on GitHub. Unlike in the classic installation method, the dependencies will be handled by Docker, so they do not need to be manually installed. To clone the Git repository, run the command below in a terminal window.


git clone github.com/asciimoo/searx.git

After the source code is finished downloading, move into the directory with cd .


cd searx/



Now, we can use Docker to build Searx in its own container.




docker build -t searx .




Once the build process is complete, Searx can be launched on port 8888 locally by running the command below.

docker run -d --name searx -p 8888:8888 searx



If Docker launches without any errors and returns a hash, it's now ready to use!



Option 2 : The Classic Installation


Searx can also be installed conventionally, rather than using Docker containers. To begin the manual installation process, first install the required dependencies by running the command shown below in a terminal. This command will install Git , which assists in copying the Searx source code, as well as a number of other libraries required by the software to compile and run.



sudo apt-get install git build-essential libxslt-dev python-dev python-virtualenv python-babel zlib1g-dev libffi-dev libssl-dev




Once the dependencies are installed, we can move to the directory where Searx should be installed using cd, then use Git to download a copy of Searx. First, we'll move directories by running the command below.


cd /usr/local/


Now, we can download a copy of the Searx source code by running the following command.

sudo git clone github.com/asciimoo/searx.git


Next, we can create a new user account for Searx to use and add directory privileges using
chown . First, create a new user by running the command below.


sudo useradd searx -d /usr/local/searx


Next, assign the same user account to the Searx directory with chown.



sudo chown searx:searx -R /usr/local/searx




Once the system accounts and privileges have been established, we can begin the process of building Searx. First, move into the directory created by Git by running cd searx/ on the command line. Next, we'll switch to the newly created Searx user account by running the command below.


sudo -u searx -i


Once this user account is in use, we can activate the Searx virtual environment by running the command below. This allows the tool to run within its own operating environment to ensure proper usage of dependencies or libraries. To activate the virtual environment:


virtualenv searx-ve


We can use an included shell script to update the tool by running the command below.


./manage.sh update_packages





Finally, we can launch Searx with a Python script by entering the string below into the terminal window.


python searx/webapp.py

As long as this script is being run in this terminal window, Searx will continue to run. To stop Searx, press Ctrl + C in this terminal window to stop the script.



Step 4 : Access & Use Your Searx Search Engine


Once Searx is running, it can be accessed locally by going to http://localhost:8888/ in a web browser. It will look like and function very similar to any other search engine.


A search can be entered and results will be returned as a list of links or other related content. While this is relatively normal, the fact that these results are actually being retrieved from an immense amount of different search engines in a way which limits the possibility of creating special user profiles is very unique.


At the right of the URL for any given result shown in Searx, the originating search engines will be listed, such as Google and Bing in the results seen in the image below. Searx also directly integrates other forms of searches, including ones to look for files, images, maps, and even social media.



Step 5 : Make Your IP Address Anonymous

Searx can simply be run in the background or on its own server and used as your own instance of the search engine, or one could place Searx on an internet-connected server in order to provide the service to other users.


It should be noted that the IP address that Searx passes to other search engines is the same as the outgoing IP address of your device. For additional privacy, one could link the search engine to a proxy server so that the requests made to other search engines are made via the proxy server, rather than wherever the Searx instance is running. It's also possible to just use services like Tor or a VPN to obfuscate your outgoing IP address from the search engines that Searx uses.



WATCH VIDEO:-










FOR HACKING COURSE:-

WHATSAPP :- +16366780163

Tuesday, 8 May 2018

Android P Latest Version 9 Security Features Explained


Android P Will Block Background Apps from Accessing Your Camera, Microphone

Yes, your smartphone is spying on you. But, the real question is, should you care?

We have published thousands of articles on The Hacker News, warning how any mobile app can turn your smartphone into a bugging device—' Facebook is listening to your conversations', ' Stealing Passwords Using SmartPhone Sensors', 'Your Headphones Can Spy On You' and 'Android Malware Found Spying Military Personnel' to name a few.

All these stories have different objectives and targets but have one thing in common, i.e., apps running in the background covertly abuse ‘permissions ’ without notifying users.

Installing a single malicious app unknowingly could allow remote attackers to covertly record audio, video, and taking photos in the background.
But, not anymore!

In a boost to user privacy, the next version of Google's mobile operating system, Android P, will apparently block apps idling in the background from accessing your smartphone's camera and microphone.

According to the Android Open Source Project (AOSP) commit, Google is working on two built-in features in Android P to protect its users from malicious apps spying on them using smartphones’ camera or microphone.


Download App :-  Tech Gyan Mantra


According to the Android Open Source Project (AOSP) commit, Google is working on two built-in features in Android P to protect its users from malicious apps spying on them using smartphones’ camera or microphone.

First spotted by XDA developers, the source code commit for both the camera and
microphone changes notes that apps that are "idle" (aka running in the background) "for more than a certain amount of time" without specifying themselves will not be able to use the microphone or camera.

To do so, the Android P mobile operating system would target something known as an app's User ID (UID)—a unique ID assigned to an app when a user downloads it on his/her Android device that cannot be altered and are permanent until the app is uninstalled.

Android P would keep an eye on the app’s UID and block it from accessing the camera and microphone in any way whenever that UID is idle. Repeated attempts of requesting access to the camera would generate errors.

Also Read :-  How to Find Bugs In Any Android App

However, microphone-using apps will not be cut off from the microphone, but will "report empty data (all zeros in the byte array), and once the process goes in an active state, we report the real mic data."


It should also be noted that users talking on the smartphone while using other apps will not have to worry about these new features because the dialer application went into the background while active.


Imposing such limitations on apps would surely alleviate spying fears for Android users as of today when advertisers misuse such features to listen in on app users and Android malware capable of capturing audio, video, and images in the background are out there, for example, Skygofree and Lipizzan.


Android P is still in development and is not yet named. The company seems to release the next major version of Android in this year's Google I/O developer conference that will take place from May 8 to May 10 at the Shoreline Amphitheatre in Mountain View, California.



For Ethical Hacking Course

Whatsapp : +16366780163

Sunday, 6 May 2018

How to Find Bugs In Any Android App



AndroBugs Framework

AndroBugs Framework is an efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications. No need to install on Windows.

AndroBugs Framework is an Android vulnerability analysis system that helps developers or hackers find potential security vulnerabilities in Android applications. No splendid GUI interface, but the most efficient (less than 2 minutes per scan in average) and more accurate.


Download App :-  Tech Gyan Mantra


####Features:####


  • Find security vulnerabilities in an Android app
  • Check if the code is missing best practices
  • Check dangerous shell commands (e.g. “su”)
  • Collect Information from millions of apps
  • Check the app’s security protection (marked as
  • <Hacker> , designed for app repackaging hacking)


“Don’t touch here” Whatsapp Hang Problem Explained, Why whatsapp is getting Hanged ?


Steup Steps and Usage for Windows
Easy to use for Android developers or hackers on Microsoft Windows:

 (a) No need to install Python 2.7 (b) No need to install any 3rd-party library (c) No need to install AndroBugs Framework

1. mkdir C:\AndroBugs_Framework

2. cd C:\AndroBugs_Framework

3. Unzip the latest Windows version of AndroBugs Framework from Windows releases

4. Go to Computer->System Properties->Advanced->Environment Variables. Add "C:\AndroBugs_Framework" to the "Path" variable

5. androbugs.exe -h

6. androbugs.exe -f [APK file]



Massive Analysis Tool Steup Steps and Usage for Windows


1. Complete the Steup Steps and Usage for Windows first


2. Install the Windows version of MongoDB (  https://www.mongodb.org/downloads )

3. Install PyMongo library

4. Config your own MongoDB settings: C:\AndroBugs_Framework\androbugs-db.cfg

5. Choose your preferred MongoDB management tool ( http://mongodb-tools.com/ )

6. AndroBugs_MassiveAnalysis.exe -h

Example: AndroBugs_MassiveAnalysis.exe -b 20151112 -t BlackHat -d .\All_Your_Apps\ -o .\Massive_Analysis_Reports

7. AndroBugs_ReportByVectorKey.exe -h

Example:

AndroBugs_ReportByVectorKey.exe -v WEBVIEW_RCE -l Critical -b 20151112 -t BlackHat




Usage for Unix/Linux

####To run the AndroBugs Framework:####

python androbugs.py -f [APK file]


####To check the usage:####


python androbugs.py -h
Usage of Massive Analysis Tools for Unix/Linux
Prerequisite: Setup MongoDB and config your own MongoDB settings in "androbugs-db.cfg"


####To run the massive analysis for AndroBugs Framework:####


python AndroBugs_MassiveAnalysis.py -b [Your_Analysis_Number] -t [Your_Analysis_Tag] -d [APKs input





Example:

python AndroBugs_MassiveAnalysis.py -b 20151112 -t BlackHat -d ~/All_Your_Apps/ -o ~/Massive_Analys

####To get the summary report and all the vectors of massive analysis:####

python AndroBugs_ReportSummary.py -m massive -b [Your_Analysis_Number] -t [Your_Analysis_Tag]

Example:

python AndroBugs_ReportSummary.py -m massive -b 20151112 -t BlackHat

####To list the potentially vulnerable apps by Vector ID and Severity Level (Log Level):####

python AndroBugs_ReportByVectorKey.py -v [Vector ID] -l [Log Level] -b [Your_Analysis_Number] -t [Y python AndroBugs_ReportByVectorKey.py -v [Vector ID] -l [Log Level] -b [Your_Analysis_Number] -t [Y


Example:

python AndroBugs_ReportByVectorKey.py -v WEBVIEW_RCE -l Critical -b 20151112 -t BlackHat python AndroBugs_ReportByVectorKey.py -v WEBVIEW_RCE -l Critical -b 20151112 -t BlackHat -a






##Requirements

Python 2.7.x (DO NOT USE Python 3.X)
PyMongo library (If you want to use the massive analysis tool)

##Licenses
AndroBugs Framework is under the license of
GNU GPL v3.0


WATCH VIDEO:-








For Hacking Course :-


Whatsapp Me :- +16366780163

【PART 2】Get Netflix Premium Account For Free With Android With Username & Password [Unlimited Account] 

I will let you know a simple trick with My Airtel App from Google Play store to get Netflix premium account for free without use of r...