Monday, 4 January 2016

CREDIT CARDS ONLINE SHOPPING [PRIVET SOCKS PROXY SERVER] FREE CREDIT CARD

Privet Socks proxy server (Socks introduction)

Socket Secure (SOCKS) is an Internet protocol that routes network packets between a client and server through a proxy server. SOCKS5 additionally provides authentication so only authorized users may access a server.

Free leaked  socks username password

76.167.193.115 | pi | raspberry
76.120.243.9 | pi | raspberry
96.3.161.39 | user | user
76.8.234.205 | admin | admin
96.46.31.44 | admin | admin
96.254.141.134 | support | support
96.3.149.202 | user | user
96.3.149.73 | user | user
96.3.161.177 | user | user
96.58.80.25 | ubnt | ubnt
96.3.57.26 | user | user
96.60.142.141 | support | support
96.59.215.238 | ubnt | ubnt
96.60.219.29 | support | support
96.60.218.234 | support | support
96.60.246.248 | support | support
96.60.214.160 | support | support
76.0.231.59 | support | support

96.61.171.229 | support | support

  
Credit card cash out amazon.

1 . A CC with full billing information Free Credit card

Name :: Richard b Cuming
ph :: (250) 679-3532
add :: 421 MacPherson  Chase BC V0E1M0
---------------------------------------------------------
dob :: 5-10-1937
exp :: 09-16
cc :: 4510-5740-0396-57401405
cvc :: 308

I.r :: 19.9%
owe :: 0
ava :: 10100
lp :: 667.20 on feb 07

Savings :: $1500
Charge :: $495
-----------------------------
name :: Brian Washington
ph :: (250) 832-9544
add :: 131 Deep  Salmon Arm BC V0E1V0
--------------------------------------------------------
dob :: march-19-1968

Card :: Master-PC
int :: 19.9%
exp :: 05-16
cc :: 5181-5704-5707-57042710
cvc :: 210
owe :: 1104.02
ava :: 396.

lp ::
---------------------------------------------------

Make sure its a nice bin (BIZ,CORP,GOLD,PLAT)


2 . Socks5 Proxy matching CC City + State 
[If you don't know what Socks5 Proxy do then Google for it

3 . A freshly made Email with CC Owner name in it.
[Example if CC owner name is Richard b Cuming - choose smth like Richard_Cuming@hotmail.com]


Step 1 :


Go To The Amazon Website Create An Account Using The "CC" Billing Information And The Fresh E-mail You Created. Make Sure You Create The Account Thru The Socks5 Proxy.


Step 2 :


Once You Have Created Your Amazon Account It's Time To Make The Account Look Like If It Was Made By A Legit Buyer. Over The Last Few Years Amazon Has Been Getting Harder & Harder To Card They Review Each Account When They Place Their 1ST Order Therefore Add Something To Your Cart
(Anything Below $100.00USD) Once You Have A Item Under $100.00USD In Cart Sign Out Don't Card It Yet. Wait 5 Hours Before Signing Back In! When You Sign Back In Make Sure Your On Socks5 Matching CC BILLING CITY+STATE. Once Your Logged In Check Out. If The CC You Used Is Good It Will Ship Once It Ships Your Ready To Move To Step 3.


Step 3 :


Once You Get A Tracking Number For You Item You Carded Under 100.00USD. Your Account Has Been Reviewed Now You Can Card Anything From 500-800 Without Any Problem. Enjoy

OPEN SOCKETS TCP/UPD KALI LINUX BASH SCRIPT

This tutorial was kali linux private projects hack you want 

for possible condition 

research on more articles to help. 

Bash shell has a assembled in characteristic that enable to open port

TCP/UDP 

socket operate a easy syntax. This is very handy when tools like 

netcat are not installed or we don’t have the authorization to use it.

The syntax is



$ exec {file-descriptor}<>/dev/{protocol}/{host}/{port}

{file-descriptor} – 0, 1 and 2 are reserved for stdin, stdout and stderr accordingly. At most3 necessary be used. The Bash physical propose to be careful in using label above 9 since there be able disagreement with heading used privately by the shell.
<> – the file is open for both reading and writing
{protocol} – TCP or UDP
{host} – ip address or domain name of the host
{port} – logical port


Socket can will close using.

$ exec {file-descriptor}<>&-


To send a message through the socket

echo -e -n "$MSG_OUT" >&3

or

printf "$MSG_OUT" >&3

To read a message from the socket

read -r -u -n $MSG_IN <&3

Output can be printed recursively

while read LINE <&3

do
    echo $LINE >&1
done

Or read entirely in one variable

OUTPUT=$(dd bs=$BYTES count=1 <&3 2> /dev/null)

Example:

$ exec 3<>/dev/tcp/127.0.0.1/1234


We are opening a socket for reading and writing to the 1234 port in the loopback interface.
The /dev/tcp and /dev/udp files aren’t real devices but are keywords interpreted by the Bash shell. Being a “bashism” this solution is not portable even if seems that ksh and zsh shells have the same feature enabled.
In this example we fetch the Google main page:

$ exec 3<>/dev/tcp/www.google.com/80

$ echo -e "GET / HTTP/1.1\n\n" >&3

$ cat <&3

It’s good practice to always close file descriptors

$ exec 3<&-

$ exec 3>&-

Finally,  IRC server example:

#!/bin/bash

##########################################################
# Config

NICK="CyberPunk"
SERVER="irc.n0where.net"
PORT=6667
CHANNEL="#CyberPunk"

##########################################################
# Main

exec 3<>/dev/tcp/${SERVER}/${PORT}
echo "NICK ${NICK}" >&3
echo "USER ${NICK} 8 * : ${NICK}" >&3
echo "JOIN ${CHANNEL}" >&3
cat <&3

exit $?

Enable/disable net redirections

More the feature must be enabled in Bash at compile time. To enable it if you want to compile the Bash yourself include the flag

--enable-net-redirections

while to disable it explicitly use

--disable-net-redirections

Each distribution may or not have the feature enabled in their precompiled Bash.


This is a built-in feature that needs to be enabled in Bash at compile time but also ksh and zsh seem to have it. System administrators might want to disable this feature since could represent a security concern. In general the use of specific tools to create sockets like netcat and socat are preferable if possible.



Botnet web cam spy latest version Download Link (CAMMY 2.0.0.6 - RAT)

Hello  viewers  today i will give you  the link of rat virus it's free leaked .to use this this virus you will able to infected some one .i hope you will enjoy i am waiting for your comment after using botnet wise you best of luck.















DOWNLOAD LINK

Friday, 1 January 2016

HACK via Whatsapp tutorial 2016 [Using Spy Software( SPOOFING THE MAC ADDRESS.){Catch Whatsapp Notification on Android:}]

Using Spy Software
SPOOFING THE MAC ADDRESS.
Catch Whatsapp Notification on Android:


This tutorial will crack some of the variable Methods put and that you can spy on WhatsApp messages of your victims.The variable method are as details below.


Using Spy Software


operate a spy software order of accessible Methods to spy on WhatsApp messages. still there are a few of companies marketing
inferior WhatsApp spy programs on the market today, there exists a few authentic result as well that are value statement.
One of my special software to spy on WhatsApp is The Truth Spy.
The Truth Spy  lets you view all the WhatsApp conversations that take place through the victim's phone. With TheTruthSpy .



View all WhatsApp chat conference.

Find out the names and numbers of people they have been chatting with.

Get time and date fingerprint to know when each chat capture location.

Get Root to any photos, videos or audio files sent through WhatsApp and saved on the victim phone.

All WhatsApp conversations are uploaded to your online 

TheTruthSpy control panel which you can Root from anywhere with an internet connection.




The result are some of the inspiring features of TheTruthSpy which makes it a perfect choice for How to hack whatsapp, hack whatsapp,
 hack whatsapp messages:
TheTruthSpy software works by follow all activity in the backdoor of the scan phone More GPS location, web history, images, videos, email, SMS, Skype, WhatsApp, keystrokes and much more

– Tracks GPS location
– Call Recordings
– Call Logs
– Incoming calls restriction
– Read SMS
– Keylogger
– Control Panel
– Monitor calendar
– Read emails
– Monitor Internet Usage
– Intercept Instant Messages: Whatsapp Spy, Viber Spy, Facebook    Spy, Skype Spy, Hangouts Spy
– Ambient Recording: Live listen and record voice surrounding          phones
– Remote control
– Undetectable
– SMS Commands
– Money Back 5 days


SPOOFING THE MAC ADDRESS.



hello guys i hope you are fine so we will take about the new methods to hack via whatsapp to use some technical default ip SPOOFING THE MAC ADDRESS.ok here many types of methods to spy via whatsapp you  is to hoax  the MAC address victim phone from your phone let me define you how we moderate amount of technical skills to perform.  whatsapp has small weakness which enable you to run the same whatsapp account on two phone. the including they both have the same MAC address
first we want to gain access to the victim phone to record its MAC address and hoax the same on your device  we can find the MAC address of victim phone.



For Android – Head over to settings —> About phone —> Status—> Wi-Fi MAC address

For iPhone – Head over to Settings—> General —> About —> Wi-Fi address

For Windows Phone – Head over to Settings —> About —> More info —> MAC address

For BlackBerry – Head over to options —> Device —> Device and Status info —> WLAN MAC


Guide: hoax WIFI Mac address in Android

Catch Whatsapp Notification on Android:


The other Methods to spy on someone’s WhatsApp messages is to write an app, to catch Whatsapp Notification(only incoming Whatsapp messages).

You can get code from GitHub

IV/Hack Database Whatsapp messages: For ROOT device

The other Method to spy on someone’s WhatsApp messages is to get database Whatsapp app of the victim phone. This method is somewhat examine difficult and require a moderate amount of technical skills to perform. Let me explain.

Using Root Explorer to get database Whatsapp app.

Database Name: msgstore.db

Path: /data/data/com.whatsapp/databases

If you successfully command to put away all the overhead noticed steps, you will have a replica of the victim user’s WhatsApp account going on your phone. That means you will collect information on your phone for each and every movement of the victim WhatsApp user. For spying on WhatsApp, I still mention the usage of TheTruthSpy as this method is lot easy than that of spoofing MAC address or catch Whatsapp Notification





Wednesday, 23 December 2015

upload shell by via data tampering

upload shell  by via data tampering


Hello guys.today we will take about data tampering we use this this mathod when we got admin panal access. after access we are ready to try upload our shell but it doesn't allow it to upload the shell extension .php. we are not ready to attack it in the case we use data tampering to upload our shell and make it  perfectly executable files or computer virus and dynamic link  its depend on plan what we do , by data tampering we can change the file extension by the add on of the firefox called '' data tamper.  

we won't the tools for execut all attack 

1 . firefox 
2 . tamper data add on  firefox
3 . site ( in which you want to upload ) 

we are ready for execut attack 
“.
First step of all install the Data Tamper add on in FireFox. Then login to the site where you want to upload shell.

Go to the place where you can upload the image. In my case it is in the product category>edit product.

Now click on Browse>select your shell location ( Must be in .jpg , ,png , .gif ) like anything.jpg before clicking the upload button open the Data Tamper and click on start tamper then click on upload the image. You will get the pop up click on Tamper.

After that You will get the Post Data in the right column copy that all and paste that in the Note-Pad. now look for the extension of your file name in my case that is ” .gif ” and it is on the last line change that with .php and copy that all and paste that in the Post Data and click on Now copy the location of your shell and you will see that the extension has been changed to php.

Now open your shell and deface the site.

i hope you well enjoy all tutorial ..

Tuesday, 22 December 2015

HACK WHM PANEL SCRIPT "LFI EXPLOITS""


"LFI EXPLOITS""

HELLO GUYS TODAY I WILL TEACH YOU HOW TO HACK WHM SERVER. BASICALLY WHM IS HOSTING WEB SERVER ITS MOST POWERFUL PANEL FOR HACKERS AND SPAMMERS OR OTHER SCAMMERS.
AND MOST THINK IS LFI EXPLOIT IS SCRIPT TO USE FOR HACK. MY OVER NEXT TUTORIAL I WILL EXPLAIN YOU EXPLOITS.

FIRST WE NEED WHM (WEB HOST MANAGER) RESELLER ACCOUNT IN WHICH THE SITE ARE HOSTED. FOR ATTACKER WE NEED ACCESS TO THE WHM PANEL AFTER THE GET ACCESS WHM PANEL THERE ARE LFI EXPLOIT. LOCAL FILE INCLUSION IN THE CART.PHP FILE OF THE SITE 

THINGS ARE REQUIRED.

A lfi vulnerable whm site ( cart.php )

A lfi exploit.( cart.php?a=projectx&templatefile=../../../configuration.php )

FIRST STEP.
FIRST OF ALL WE WILL FIND  THE CART. PHP HOSTED IN THE SITE IN MY CASE IT IS
( http://www.netxidh.com/support/cart.php ).

NOW WE WILL PUT OUR LFI EXPLOIT AFTER CART.PHP AND IT WILL LOOK LIKE THIS.
http://www.netxidh.com/support/cart.php?a=projectx&templatefile=../../../configuration.php

NOW YOU SEE THERE IS ON DATA PRESENTED IN THE SITE LIKE (ONLY THE TEMPLATE AND OTHERS FEATURES ) 
NOE YOU HAVE GOT THE WHM CONFIGURATION FILE JUST PRESS CTRL+U OR RIGHT  CLICK >VIEW SOURCE. SCROLL DOWN A BIT YOU WILL SEE THE WHM CONFIGURATION FILE. 

YEAH! WE GOT THE WHM CONFIG FILE NOW TO COMMAND PROMPT. TYPE FTP  www.netxidh.com (YOUR WHM SITE) THEN HIT ENTER IT WILL ASK FOR THE USERNAME AND PASSWORD . TYPE THE USERNAME AND PASSWORD  YOU GOT FROM THE WHM CONFIG FILE. THEN YOU WILL BE IN THE FTP OF THE SITES.  

  





Windows 8 forgot your password empty password password cracking methods




WINDOWS 8 FORGOT YOUR PASSWORD PASSWORD CRACKING METHODS.



HELLO GUYS TO I WILL TEACH YOU HOW TO CRACK YOUR WINDOWS PASSWORD I HOPE YOU WILL ENJOY AUTHENTICATIONS.

LET'S START OVER HERE.


WINDOWS 2008 INSTALLATION DISK INTO THE DRIVE,  RESTART YOUR COMPUTER, BE SET UP TO START THE DRIVE IN CMOS. 1. WHEN THE INSTALLATION SCREEN HAPPEN , CLICK '' REPAIR YOUR  COMPUTER ''(REPAIR SYSTEM), SELECT '' COMMAND PROMPT '' IN THE SUBSEQUENT DIALOG BOX . ENTER COMMAND (COMMAND PROMPT)   SYSTEM PROMPT WINDOWS  , ENTER ''MMC.EXE'' COMMAND AND PRESS ENTER KEY, THE SYSTEM 
WILL CALL THE CONSOLE  3.THEN SELECT THE FILE ''-''ADD/REMOVE SNAP-IN '',THE SYSTEM WILL AGAIN POP UP A DIALOG BOX IN THE DIALOG BOX TO SELECT THE LEFT WINDOW ,'' LOCAL USER AND GROUP '', THEN CLICK THE ''ADD '' BUTTON AT THIS TIME , SYSTEM