Shop On Jumia

Learn How To Hack Computers With Metasploit Using Their I.P


HACK ANY COMPUTER WITH AN IP WITH MetaSploit


I am here to show you this magical tool called Metasploit that allows you to hack ANYunpatched computer with only it's IP. Lets begin...

1.) First you need to download Metasploit. The most up-to-date version is FREE at metasploit.com.

2.) You need PostgrSQL for your database. Download here: http://www.postgresql.org/.
Make sure you use all the defaults or Metasploit won't work!




3.) Now lets get down to buisness... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III). Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...



4.) Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit gui.


5.) Now, in the window type:

db_connect postgres:ThePassYouChose@localhost:5432

The first time you do this you will see lots of text flash buy. Don't wory, this is normal.



6.)Type db_host to make sure you are connected correctally.

7.)Now type this:

db_nmap 000.000.000.000

Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...

8.) Now we get to the fun part; the automatic exploitation. Just type db_autopwn -t -p -e -s -b , watch the auto-exploitation start, go play Halo for a while, and then come back...

9.) After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.




10.) Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:

sessions -i ExploitNumber

________________________________

The features of Metasploit are mutch like a RAT[remote admistratibe tool] Once you get into someone's computer, you can see their screen, controll their mouse, see what they type, see them, etc.

How To Recover Forgotten Memory Card Password

Unlock the Micro SD/Memory Card

1⃣ Download and Install the ES File Explorer App from HERE or Playstore.

2⃣ Enter the Password protected Memory Card/SD Card on your Android phone.

3⃣ Open ES File Explorer App and Go to System Folder.

3⃣ In System Folder you will find a MMCSTORE file.




4⃣ You have to rename the file as mmcstore.txt

5⃣ Now open file and you will find your Memory/SD card password there.

6⃣ Now you can visit the phone by which the memory card is locked.

7⃣ Go to Password Remove option and put down the password you got in a text file πŸ‘Š




SΚœα΄€Κ€α΄‡ α΄€Ι΄α΄… sα΄œα΄˜α΄˜α΄Κ€α΄› ᴜsπŸ‘‡

➖ ➖SΚœα΄€Κ€α΄‡ α΄€Ι΄α΄… sα΄œα΄˜α΄˜α΄Κ€α΄› ᴜsπŸ‘‡
 Click on the telegram banner at the top of this page to join our channel.

How To Get A Free USA Number For WhatsApp And PayPal Verification


How to get a free USA number for WhatsApp And PayPal Verification

 Required Apps
1. Strong VPN e.g Windscribe

2. 2NDLINE APP




Procedures

This method is based on 2NDLINE APP. So if you would like to create your WhatsApp account with U.S number, then you can use this app.
To proceed, you will need to download the 2NDLINE APPLICATION
The description of 2ndLine - Second Phone Number 2ndLine is a second US or Canada phone number that works on your smartphone, tablets as a full-featured business phone system, designed for mobile professionals, freelancers, and entrepreneurs. Call and message from a separate number on devices you and your team already have, via Wi-Fi or your existing cellular network, with anyone in the U.S. and Canada.

After successfully downloaded, install it on your phone, then Launch your Windscribe VPN.

Create your Account, then login. When you login choose USA country then connect it. When
it is connected successfully, you can now open your 2NDLINE APP.

Create your account, then insert any 3 digit in the place they request for Area Code. Then choose any number of your choice. Thats all you have successfully created your USA phone number.



Now lets make it work on whatsapp.

Remove your sims from your phone. The reason is that if your sim is on your phone, whatsapp will always detect you
are from Nigeria, so the USA number wont work.

So remove your 2 sim from your phone, then tell your friend to on his hotspot for you. Then connect your VPN on your phone, make sure it is connected to USA.

Then continue with the whatsapp registration. When your whatsapp verification code is sent, just check your 2NDLINE App for the code. When all is done, you can now put your sim back on your phone, then continue enjoying your USA number for Life.




Benefits For Create What’s App Account With U.s Number

✅More Privacy

✅Shock Your friend’s that you are master in tricks

✅International Number

✅Keep Your Number Secure Features Of What’s App U.s Number Trick

✅Hide Your Number

✅Totally Free (No Hidden Cost)

✅Create A/c With International Number (+1) Series

✅Working With any Android Device without any issues.



Remember we didn't charge you a dime for this tutorial, just take ur time to share this Post to Appreciate us, so we can do more

Download PES 2019 APK + OBB Game File

PES 2019 is now available for free download. The download include Apk and OBB files of the game.
You need to be on telegram before your can access the game files.






Download Telegram app from playstore, register just like whatsapp, then come back here to click on the download link below
πŸ‘‡ πŸ‘‡

DOWNLOAD HERE

Top Ways How Hackers Can Hack Your Facebook Accounts

Top Ways How Hackers Hack Facebook Accounts.


πŸ”—Note :- This post is only for security purpose don't try any illegal activity and i'm sharing these methods so you can protect your Facebook account from these types of hacking attacks.

1. Hack Facebook Account Password By Phishing

Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake log in page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim log in through the fake page the, the victims "Email Address" and "Password" is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.





2. Hack Facebook Account Password By Keylogging

Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Keylogger is basically a small program which, once is installed on victim's computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.

3. Stealer's

Almost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealer's are software's specially designed to capture the saved passwords stored in the victims Internet browser.

4. Session Hijacking

Session Hijacking can be often very dangerous if you are accessing Facebook on a http (non secure) connection. In Session Hijacking attack, a hacker steals the victims browser cookie which is used to authenticate the user on a website, and use it to access the victims account. Session hijacking is widely used on LAN, and WiFi connections.

5. Sidejacking With Firesheep

Sidejacking attack went common in late 2010, however it's still popular now a days. Firesheep is widely used to carry out sidejacking attacks. Firesheep only works when the attacker and victim is on the same WiFi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards WiFi users.




6. Mobile Phone Hacking

Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are a lots of Mobile Spying software's used to monitor a Cellphone. The most popular Mobile Phone Spying software's are: Mobile Spy, and Spy Phone Gold.

7. DNS Spoofing

If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.



8. USB Hacking

If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser. And your passwords are saved in the flash

9. Man In the Middle Attacks

If the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.

10. Botnets

Botnets are not commonly used for hacking Facebook accounts, because of it's high setup costs. They are used to carry more advanced attacks. A Botnet is basically a collection of compromised computer. The infection process is same as the key logging, however a Botnet gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Botnets include Spyeye and Zeus.





If you didn't understand any of the above method, just comment below with your questions and I will gladly answer.

SHARE THIS POST

Download Latest 2019 Movies

Download the Latest 2019 Action movies. 


Ξ¦ The Secret (2019)
Ξ¦ Kim Possible (2019)
Ξ¦ Darkness Visible (2019)
Ξ¦ Manbiki Kazoku (2019)
Ξ¦ Shoplifters (2019)
Ξ¦ Journal 64 (2018)




The above movies and more are available in Bluray and Mkv formats

Download HERE πŸ‘ˆ 



How To Unlock Forgotten Smartphone Lock Pattern

πŸ” HOW TO UNLOCK PHONE PATTERN LOCK USING COMMAND PROMPT πŸ’»

Incase you forgot the pattern you used in locking your smartphone and you want to open your phone with having to flash the phone, follow the steps below carefully .



STEPS
1. Connect your android phone to you computer.

2. Open Command prompt administrator.

3. Now in command prompt window type following code carefully without the quotes (")
  [ adb shell cd/data/data/com.android.providers.settings/databases sqlites settings.db ] update system set value=0 where name=’lock_pattern_autolock’; update system set value=0 where name=’lockscreen.lockedoutpermanently’; .quit"




4.  Now you will see some screen as shown below and then you can reboot your phone and now when your android starts again, then try unlocking it using any random pattern and it will unlock and work pretty fine.

5.  If you face any problem repeat same steps but instead of the above code tru using [ adb shell rm/data/system/gesture.key] and the press enter and now reboot your device to see if it works


SΚœα΄€Κ€α΄‡ α΄€Ι΄α΄… sα΄œα΄˜α΄˜α΄Κ€α΄› ᴜsπŸ‘‡
 πŸ’»  Get more stuffs like this on our TELEGRAM CHANNEL 


Ads

Receive The Latest Tech News To Your Email