This blog contains the latest hacking tricks which helps you to protect yourself from hackers.

       
   

How to Access Someone Else's WhatsApp Account

You may access another person’s WhatsApp account through your mobile device, computer, or spyware. Monitoring an individual’s conversations without permission is a violation of privacy. Before you take any steps towards access their WhatsApp account, ask the individual for permission.
If you are really ready for this, here are the steps for you :

Step 1 - Uninstall WhatsApp from your phone or device

This will clear your personal information from the app. You will reinstall it later and enter the individual’s information instead of your own.

Step 2 - Locate and write down the individual’s Media Access Control (MAC address)

Every phone is assigned a MAC address, a unique identifier that serves as its online identity. MAC addresses are a series of six pairs of letters and/or numbers separated by colons. For example: 01:23:45:67:89:ab, 00:0a:95:9d:68:16, and 00-14-22-01-23-45.
  • Android: Open “Settings”. Select “About phone” then “Status”. Write down the address to the right of “Wi-Fi MAC address”.
  • iPhone: Launch “Settings” and select “General”. Click “About”. Write down the address to the right of “Wi-Fi Address”.
  • Windows phone: Click “Settings” then “About”. Click “More info”. Write down the address to the right of “MAC address”. Record the address.
  • BlackBerry: Select “Options” then “Device”. Click “Device and Status info”. Write down the address to the right of “WLAN MAC”.
See the bellow reference.





Step 3 - Locate and record your MAC address


As we did in the previous step, now locate your own MAC address using same procedure.

Step 4 - Install apps that will let you change your phone’s MAC address


In order to log into WhatsApp as another person, you must replace your MAC address with the individual’s MAC address.
  • iPhone users, first Install Cydia from the web. Once downloaded, open the app and search for “network-cmds”. Click on “network-cmds” then “Install”. Press “Confirm”. Once downloaded, search for “Mobile Terminal”. Click “Mobile Terminal”, followed by “Install” and “Confirm”.
  • Android users, first root your phone. Then, download “BusyBox” and click the app and install it. Finally, download “Terminal Emulator”. These apps are free from the Google Play Store

Step 5 -  Change ("spoof") your phone's MAC address to that of your target  

address should not impact your phone's functionality.
  • iPhone: Open “Mobile Terminal;”. Type “su” and press Enter. Enter “Alpine” as the password. Type “nvram wifiaddr=xx:xx:xx:xx:xx:xx”, replacing “xx” with the individual’s MAC address. Press Enter. Turn off your device then turn it back on. You MAC address will have changed.
  • Android: Open “Terminal”. Type “su” and press Enter. Type “busybox iplink show wlan0” and press Enter—this will reveal your current MAC address. Type “busybox ifconfig wlan0 hw ether xx:xx:xx:xx:xx:xx”, replacing “xx” with the individual’s MAC address. Press Enter. This will change your MAC address. You can make sure this worked by entering “busybox iplink show wlan0” and press Enter—this will reveal your new MAC address.
 
Share:

hack any gmail account

Hello guys, I got millions of query from the previous surveys. Many people are looking for a tool that can hack the gmail id because if you can hack a gmail id then very wasily you can hack the facebook id associated with that gmail id.
Its just two steps:
Enter your mail id: 

Enter victim mail id:

Next step

If you have any query, feel free to comment.
Share:

How to play Windows Games on Mac

Hello all I am back on blog again after a long time. Today i will talk about playing Windows games on MAC operating system. As my company gave me  a MAC Book Pro, but the gamer inside me was not that much happy. So i decided to look around to find a solution to play some games on MAC too.

As we all know maximum gaming companies are not supporting MAC platform even companies like THQ, EA SPORTS and bla bla . Hence one thing was clear we are not gona get any .dmg file of any high end game to play directly MAC OS. But don't worry here are some methods through we can play Windows platform games .
So lets start with Windows Platform here . Below we will see how we can play Windows Platform based games on your MAC OS.

Using Wine:

The name Wine initially was an acronym for windows emulator. Wine is a free and open source software application that aims to allow applications designed for Microsoft Windows to run on Unix-like operating systems. Wine also provides a software library, known as Winelib, against which developers can compile Windows applications to help port them to Unix-like systems.

Minimum Hardware Requirements to Play Games Smoothly on MAC OS

Processor : 2.0 Ghz Intel Core i5 or above
Memory : 8 GB 1333 Mhz DD3
Graphics : 1 GB Inbuild nVIDIA or ATI Graphics Card

Installing Wine on MAC OS

Step 1: Install XCode and MAC Ports
You have to install the XCode and MAC Ports a complusry drivers support to make the stable installation and reliable gaming experience without any glitch. The size of XCODE and MAC Ports are above 1.16GB so download from WIFI hotspot instead of your Paid mobile 3G connection.
XCode Downloading Link: http://itunes.apple.com/us/app/xcode/id497799835?mt=12

Step 2: Now open your terminal and type the below command
sudo xcodebuild -license
Step 3: 
After installing the xocode now visit the below website and download the MAC Ports support http://www.macports.org/install.php . On website choose your compatible operating system version of MAC. after downloading the .dmg file now install the package.and move to step 4.
Step 4: 
 Now to configure the MAC ports open terminal again and copy paste below commands
echo export PATH=/opt/local/bin:/opt/local/sbin:\$PATH$'\n'export MANPATH=/opt/local/man:\$MANPATH | sudo tee -a /etc/profile

After that process finishes, copy and paste the next line:  if [ `sysctl -n hw.cpu64bit_capable` -eq 1 ] ; then echo "+universal" | sudo tee -a /opt/local/etc/macports/variants.conf; else echo "not 64bit capable"; fi
Step 5: 
 Here is the final step now again open terminal and install the Wine, jus copy paste the following command.
sudo port install wine

Now you are done with all complex steps. Now enjoy the games.

Share:

Free airtime for mobile (Only for android users)

Free Airtime for android users

Only for android users:



Hello friends, as we see many website that provides the free recharge tricks. But most of these tricks are fake and can’t give you recharge. Even I was also interested in such kind of sites and wasted a lot of time on such websites. As the time change and people are moving toward mobiles(android) from websites so we also need such app for android which can provide us free mobile recharge. The good news is, we find an app that can really provide you the free Airtime just for installing apps on your android device. Click on the following link and start your download of app:

Share:

How To Prevent SQL Injection

SQL injection vulnerabilities have been described as one of the most serious threats for Web applications. Web applications that are vulnerable to SQL injection may allow an attacker to gain complete access to their underlying databases.Because these databases often contain sensitive consumer or user information, the resulting security violations can include identity theft, loss of confidential information, and fraud. In some cases, attackers can even use an SQL injection vulnerability to take control of and corrupt the system that hosts the Web application.
SQL injection refers to a class of code-injection attacks in which data provided by the user is included in an SQL query in such a way that part of the user’s input is treated as SQL code. 
By lever-aging these vulnerabilities, an attacker can submit SQL commands directly to the database. These attacks are serious threat to any Web application that receives input from users & incorporates it into SQL queries to an underlying database. The cause of SQL injection vulnerabilities is relatively simple and well understood.

Types of SQL injection attacks:

  1. Union Query:

In union-query attacks, an attacker exploits a vulnerable parameter to change the data set returned for a given query. With this technique, an attacker can trick the application into returning data from a table different from the one that was intended by the developer.
Attackers do this by injecting a statement of the form: "UNION SELECT". Because the attackers completely control the second/injected query, they can use that query to retrieve information from a specified table.
The result of this attack is that the database returns a dataset that is the union of the results of the original first query and the results of the injected second query. 1: 2: 3: SELECT accounts FROM users WHERE login='' UNION SELECT cardNo from CreditCards where acctNo=10032 -- AND pass='' AND pin=
Assuming that there is no login equal to , the original first query returns the null set, whereas the second uery returns data from the CreditCards table. In this case, the database would return column cardNo for account 10032. The database takes the results of these two queries, unions them, and returns them to the application. In many applications, the effect of this operation is that the value for cardNo is displayed along with the account information.
Share:

How To Trace an Email

Email tracking
Track any Email
As we know that Email is the electronic form of a mail. Just like ordinary mail, Email also have some path. It also have destination and source.  The one from which something is coming is known as sender and the one who get that something is known as receiver.
Generally, the path taken by an email while traveling from sender to receiver can be explained by following diagram.
email path
Email path
 In the above diagram, it is clear that the message will go from sender to destination inbox. In between, there is a lot of servers and intermediates that helps mail to be transferred.

So here is the method of tracing the exact location from the email sent.I am showing the email tracing on yahoo here but gmail and other mail providing services have same concept.


Steps:




Step 1:

Open up your email account and click on your inbox.


Step 2: 
Now select any email that you want to trace.

Step 3:

After Opening scrool the mail at the end and in right corner you will see a option FULL HEADER click on it.


Step 4:

Now Closely Look at the the header you will find the whole detail that from which IP address it is sent.
Share:

4 Things About Android Lollipop 5.0 You Need To Know

After offering chocolate (Kit-Kat), now Google is ready to serve you Lollipops. Google on Wednesday finally revealed the official name of its next version Android L — Android 5.0 Lollipop.


The newly released Android 5.0 Lollipop ships with the latest Motorola-made Nexus 6 smartphone and Nexus 9 tablet built by HTC, but the company did not make the Lollipop available for download to other users immediately. The older versions of Nexus devices will receive the Lollipop update in the coming weeks.


Lollipop features some significant changes to the Android platform with a sleek new user interface, cross platform support and improved performance via the new ART runtime engine. The operating system also offers better battery life, improved notifications, OpenGL ES 3.1 and 64-bit support, among other features.


Here are some most notable features of Android 5.0 Lollipop, along with some insight as to when you might be able to get your hands on it.

1) MATERIAL DESIGN

Lollipop features a redesigned User Interface, which is referred to as Material Design, in which Google made extensive use of animations and layered elements to deliver what it promises.The material design interface runs on multiple types of devices, including everything from your smartphone and tablet to your laptop and TV. The new interface supports elevation values, real-time shadows and lighting that gives a 3D appearance overall.

2) SECURITY IMPROVEMENTS

With Lollipop, Security gets enhanced as well, since it comes with encryption turned on by default in order to protect users’ data from being accessed on lost or stolen devices.Most importantly, now you are free to share your devices with any of your friends, as Lollipop offers you guest user mode, where you can create multiple user accounts to enable your friends to log in on your device. Therefore, in both the cases, no one will be able to access your private files.

 3) ANDROID SMART LOCK

For an extra layer of security, there is an Android Smart Lock, which makes it easier to unlock your phone without having to constantly enter a pin or trace a pattern. Android smart lock secures your phone or tablet by pairing it with a trusted device like your Android smartwatch, car, or even facial expressions. For example, your Android Lollipop device will recognize your Smart watch and let you unlock your phone by simply tapping the power button. The company has also enforced the SELinux security module for all apps to give better protection against vulnerabilities and malware.

4) NOTIFICATIONS ENHANCEMENT

Notifications also get enhanced with the new OS, as of now you’ll be able to rank them based on your priorities. You can now view and respond to messages directly from your lock screen, and also could hide notifications for sensitive contents by turning on Priority mode through your device’s volume button. You can also choose to avoid calls from interrupting the game you are playing or the movie you are watching. You can also see a more complete list of features here; scroll down to the bottom and click the “See All Features” link.
This is all about the upcoming version of android. Lets start thinking how to find the block holes in this version of android. Now you know the features provided in this version so start thinking about the problems and get the benefit. In my next post, I will tell you the block holes for  Android Lollipop 5.0.

Feel free to comment your views or queries regarding hacking.


Share:

Definition List

Support