[img]https://i.imgur.com/ezKfPGU.png[/img]
Install the Microsoft .NET 6 (desktop apps version) from Download .NET 6.0
Download Link :
https://bit.ly/3DymySV
VirusTotal:
https://www.virustotal.com/gui/file/e323d90f08c638baba3b8ffd06be2be209ec...
Password Unrar is 1
I wanna buy a wifi hacking software any anyone have this?
This channel I've found has some really good tutorials by an industry expert in Cyber Security.
Hacking With Phil On Youtube, Brought to you by the Crafty Foundation
Have a watch, lemme know what you think.
Okay I know it's been ages since I've posted anything here or practiced/learning hacking in general. I figured I'd throw this in. One of the basic things to be able to do as a hacker is to become the router to someone va ARP spoofing (aka ARP poisonng). That way you can have the ability to intercept/sniff traffic between two hosts. While the original tool that does this is great it should be fun to understand how it works; and even improve it, which is what I'll do.
So let's assume you used netdiscover to scan the network you're on for a victim's MAC address, you have it on hand and you want to fool the victim's ARP table so that the gateway becomes you instead of the actual router for the network. Then Scapy becomes your tool to the rescue. Now the issue with the way ARP spoofing is traditionally done is you open two terminals, then on one terminal you're spoofing the gateway for the victim, and on the other you're fooling the gateway to think it has the victim's MAC address. The issue with this is that due to the nature of how the packets are being sent, the timing is off and your ARP response packets used to fool the victim wont be sent through the NIC doing the poisoning in a fluid manner. What will happen is that the victim will have its connection continuously dropping because the router will reconfigure the ARP responses to match the default. This is trouble for the hacker because this gives evidence of tampering and subversion will just be at risk.
So I figured why not have the packets sent within the same program that way the packets can flow in a proper manner so that the victim will keep the poisoning consistent? So I made this after 3 hours of procrastination and much needed effort using Python3:
I should say that all the knowledge I gained from creating this is from a very good instructor named Zaid Sabih, owner of Zsecurity you can check out his website and support him by purchasing his course at some point, he goes into better detail than I do and has more then 180,000 students to date here https://zsecurity.org/ and here https://www.udemy.com/learn-python-and-ethical-hacking-from-scratch/
Often times you may want to identify hosts on a LAN and maybe you want to say for example dos a target or perform some sort of ARP spoofing to do something related to capture traffic. To understand this you obviously should know how to program in python, and should know a little bit about what the scapy module is used for, you can refer to its documentation here: https://scapy.readthedocs.io/en/latest/
To start off, everything I'm about to explain can simply be done in the three following lines:
But for the sake of understanding how things work, I've put together a script to help curb your understanding here is a simplified version to start you off:
Hi,
Is it possible to make a WeTransfer link stop working as someone who didn't create it or a shared link in general on facebook?
Thanks in advance
I purchased a used Apple Watch from a local seller. He assured me it was not locked to an icloud account. He entered a PIN which he gave me to unlock the phone and I could see the display worked and apps ran. I was unable to pair it to my iPhone right away because my iPhone doesn't have cell service and the Wi-Fi was down where I was. When I got home the watch won't activate after pairing because it is iclod locked. First, the seller was telling me he has to talk to his sister because she set up the icloud account. Now he is just ignoring me. I tried buying an activation unlock through appleiphoneunlock.uk which had good reviews (if they are legitimate reviews) but the have not been able to unlock it and I have a strong suspicion that they will never be able to unlock it.
Hi, first post, obligatory apology if I'm doing it wrong. I'm not experienced with this stuff, but I'm learning linux and I'm using Kali linux right now to practice getting good with it.
I've got a hacked SB6141 which gets download speeds of around 200 mbps. I bought it off a guy who says he's been running it for 7 years, but doesn't want to tell me how he did it. I'm trying to figure out what he did to make it work. When I look at the snmpwalk results, which only worked one time, every other time I tried to run it it timed out, I'm seeing 42 down and 30 up. However, it is always around 200. I suspect, now that I watched the Defcon 18 presentation on Docsis, that what's been done is they've changed the DNS so the modem is anonymous and flashed a custom config file so that the speed is high. However, I don't think that was done using haxorware or anything else, because the box has not been opened that I can tell.
Couple of things:
1. When I go to the modem GUI (a pathetic thing on Comcast), the IP address is the standard IP for this modem, and the MAC matches the MAC on the sticker. However, the seller told me he'd changed the MAC to something with mostly 1s and 0s in it, though he may have said the 1s and 0s just to make me think hes a l33t hacker.
2. None of the regular ports are open except for 80 for http. There are two udp ports open for snmp and snmp trap (161 and 162). Nothing else is accessible, so I can't access the modem through Putty in any way that I know of (like port 22 and ssh).
3. I also know that he's changed the community from public to private (as the snmpwalk did not work until I put private in as a guess).
4. Given that the modem itself reports on the GUI the MAC address on the box, and I can access the GUI through the default IP, I suspect that he is actually spoofing the default IP address and MAC so that it looks legit, but that on the "inside" it's using something else and has different DNS servers.
Questions:
hi i want to hack an android phone but i dont have access to the target phone. can you help me regarding this.
please contact me directly on [email protected]