Monday, 30 April 2018

[WARHOX] How to install kali linux on vmware in hindi / How to install kali linux 2018.1/ easy way


DISCLAIMER: This Channel DOES NOT Promote or encourage Any illegal activities , all contents provided by This Channel is meant for EDUCATIONAL PURPOSE only .

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

-------------------------------------------------------------
download vmware & virtual machine

download hear


download kali linux image file

hear website

https://www.offensive-security.com/

how to install step by step hear video


Guest Posting

Guest blogging is a method used by bloggers to increase blog traffic where bloggers write posts to be published on other bloggers' blogs. Guest posts and guest posting is where a writer who owns his or her own blog creates a unique and original post on another blog or site with a mention of the author and usually their blog at the bottom of the article. Guest posting can help build brand awareness with a different audience and help drive new traffic to your site. 


Beware that many websites use guest blogging as a way to build links to their website. If the primary reason for having a guest post published is to insert links back to another website, this is frowned upon by search engines. In fact, Google often penalizes sites that use guest posting for SEO link building purposes and asks that sites nofollow links going back to the guest author's site.

Guest blogging is also a great way to establish yourself as an authority figure within your market and build relationships with other bloggers and experts within your field. It's an opportunity to take your expertise and share it with others, as well as an opportunity to increase traffic to both parties’ blogs. Since guest blogging should be a two-way street, when hopping on the bandwagon, you should also consider featuring posts developed by guest bloggers. Featuring guest posts will also expose your audience to a new perspective and fresh new content. 

With the right kind of content on the top blogs, you can do all three of these things. If you are trying to accomplish either Number 1 or Number 2, then you will want to find blogs that have a good sized and engaged audience. If you are just trying to accomplish Number 3, then you need to pinpoint blogs with strong root domain authority. You can check this for free using the SEOmoz toolbar. Knowing your goals in advance will help you in determining which blogs will be the best for you to submit guest posts to.

Before you get started, make sure you are clear about what you are looking to get out of the guest blogging experience. This will help you find businesses that you may be interested in blogging for and also give you an idea of some guest bloggers you would like invite to post on your business’s blog.

Research is essential to guest blogging; with that in mind, focus on finding writers within your niche and your market. Also, be sure that your writers are coming from a respected business or background. You should also agree with what they are saying and have it align with your personas interests. Guest blogging is great but it can easily turn into a domino effect when the content doesn't align with your business, personas or your tone of voice.

Blogging as a guest is a great way to increase your site rank in Google searches because of the links that exist back to your site from the blog you are appearing on. The way Google sees it; if other people are interested in your site it must be interesting. So when individuals comment, share, like or link to your blog it moves up in Google’s PageRank, which means it’s more likely to pop up when someone Google searches a relevant topic.

Here we offer a service of publishing your articles in site DA+50 with dofollow links. Please check the list of guest post links below:


Sunday, 29 April 2018

Fluxion - The number 1 WiFi Cracking Tool

Fluxion - The number 1 WiFi Cracker
Fluxion is a remake of linset by vk496 with less bugs and enhanced functionality.
See Fluxion site: https://fluxionnetwork.github.io/fluxion/


Fluxion is the future of MITM WPA attacks
   Fluxion is a security auditing and Social-Engineering research tool. It is a remake of linset by vk496 with (hopefully) less bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack. It's compatible with the latest release of Kali (rolling). Fluxion's attacks' setup is mostly manual, but experimental auto-mode handles some of the attacks' setup parameters. Read the FAQ before requesting issues.

   If you need quick help, fluxion is also avaible on gitter. You can talk with us on Gitter or on Discord.

Screenshot (On Kali Linux 2018.1)


Installation

   Read here before you do the following steps:

   
git clone https://github.com/FluxionNetwork/fluxion (Download Fluxion)
   cd fluxion
   sudo bash ./fluxion.sh (Run Fluxion)

📜 Changelog: Fluxion gets weekly updates with new features, improvements, and bugfixes. Be sure to check out the changelog here.

How to contribute
   All contributions are welcome! Code, documentation, graphics, or even design suggestions are welcome; use GitHub to its fullest. Submit pull requests, contribute tutorials or other wiki content -- whatever you have to offer, it'll be appreciated but please follow the style guide.

How it works ?
 * Scan for a target wireless network.
 * Launch the Handshake Snooper attack.
 * Capture a handshake (necessary for password verification).
 * Launch Captive Portal attack.
 * Spawns a rogue (fake) AP, imitating the original access point.
 * Spawns a DNS server, redirecting all requests to the attacker's host running the captive portal.
 * Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key.
 * Spawns a jammer, deauthenticating all clients from original AP and lureing them to the rogue AP.
 * All authentication attempts at the captive portal are checked against the handshake file captured earlier.
 * The attack will automatically terminate once a correct key has been submitted.
 * The key will be logged and clients will be allowed to reconnect to the target access point.
 * For a guide to the Captive Portal attack, read the Captive Portal attack guide

Requirements
   A Linux-based operating system. GitHackTools recommend Parrot Security OS or Kali Linux. Kali Linux & Parrot Security OS support the latest Aircrack-ng versions. An external wifi card is recommended.

Credits
 * l3op - contributor
 * dlinkproto - contributor
 * vk496 - developer of linset
 * Derv82 - @Wifite/2
 * Princeofguilty - @webpages and @buteforce
 * Photos for wiki @http://www.kalitutorials.net
 * Ons Ali @wallpaper
 * PappleTec @sites
 * MPX4132 - Fluxion V3

Disclaimer
   Authors do not own the logos under the /attacks/Captive Portal/sites/ directory. Copyright Disclaimer Under Section 107 of the
Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research.

   The usage of Fluxion for attacking infrastructures without prior mutual consent could be considered an illegal activity, and is highly discouraged by its authors/developers. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program.

Note
 * Beware of sites pretending to be related with the Fluxion Project. These may be delivering malware.
 * Fluxion DOES NOT WORK on Linux Subsystem For Windows 10, because the subsystem doesn't allow access to network interfaces. Any Issue regarding the same would be Closed Immediately

Links
 * Fluxion website: https://fluxionnetwork.github.io/fluxion/
 * Discord: https://discordapp.com/invite/G43gptk
 * Gitter: https://gitter.im/FluxionNetwork/Lobby



[WARHOX] HOW TO CRACK VMWARE 14 PRO WARKING 10,000%


DISCLAIMER: This Channel DOES NOT Promote or encourage Any illegal activities , all contents provided by This Channel is meant for EDUCATIONAL PURPOSE only .

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

________________________________
Serial:
ZF19K-02Z8H-H89ZQ-UFWZE-WQKU0
VA552-68W90-489UY-T7MEX-M3AV2
VZ302-43YEP-M8DWQ-VWZEC-YKH8D
CA3DK-62W9P-08D7Z-5EXZG-XY8CF
VF3N0-AHX8P-H8EYY-G6WNC-X7KW0

_________________________________________________________________



Saturday, 28 April 2018

Finding Packages for Kali Linux

Finding Packages for Kali Linux
Use apt-cache
   Of the various interfaces available to search for packages, apt-cache is the most basic and rudimentary of them all.

   However, it is also the interface we tend to use most often because it is fast, easy, and efficient. By default, apt-cache searches for a given term in package names as well as their descriptions.
   
   Use this command: apt-cache search PACKAGES NAME

   For example, knowing that all Kali Linux metapackages include ‘aircrack-ng’ in their names, we can easily search for all of them.
   Enter this command: apt-cache search aircrack-ng

   In many cases, apt-cache returns far too many results because it searches in package descriptions. The searches can be limited to the package names themselves by using the –names-only option.

root@kali:~# apt-cache search nmap | wc -l
37
root@kali:~# apt-cache search nmap --names-only
dnmap - Distributed nmap framework
fruitywifi-module-nmap - nmap module for fruitywifi
nmap-dbgsym - debug symbols for nmap
python-libnmap - Python 2 NMAP library
python-libnmap-doc - Python NMAP Library (common documentation)
python3-libnmap - Python 3 NMAP library
libnmap-parser-perl - parse nmap scan results with perl
nmap - The Network Mapper
nmap-common - Architecture independent files for nmap
zenmap - The Network Mapper Front End
nmapsi4 - graphical interface to nmap, the network scanner
python-nmap - Python interface to the Nmap port scanner
python3-nmap - Python3 interface to the Nmap port scanner

   Since apt-cache has such wonderfully greppable output, we can keep filtering results until they’re at a manageable number.

root@kali:~# apt-cache search nmap --names-only | egrep -v '(python|perl)'
dnmap - Distributed nmap framework
fruitywifi-module-nmap - nmap module for fruitywifi
nmap - The Network Mapper
nmap-common - Architecture independent files for nmap
nmap-dbgsym - debug symbols for nmap
nmapsi4 - graphical interface to nmap, the network scanner
zenmap - The Network Mapper Front End

   You can further filter down the search results but once you start chaining together a few commands, that’s generally a good indication that it’s time to reach for a different tool.

Use aptitude
   The aptitude application is a very close cousin of apt and apt-get except it also includes a very useful ncurses interface. It is not included in Kali by default but it can quickly be installed as follows.
   root@kali:~# apt update && apt -y install aptitude

   After installation, running aptitude without any options will launch the ncurses interface. One of the first things you will notice is that you can quickly and easily browse through packages by category, which greatly helps with sorting through the thousands of available packages.

   To search for a package, either press the / character or select ‘Find’ under the ‘Search’ menu. As you enter your query, the package results will be updated dynamically

   Once you’ve located a package of interest, you can mark it for installation with the + character or to remove/deselect it, the character.

   At this point, you can keep searching for other packages to mark for installation or removal. When you’re ready to install, press the g key to view the summary of the actions to be taken.

   If you’re satisfied with the proposed changes, press g again and aptitude will complete the package installations as usual.

Use search engines
   If you want to restrict your searches to tools that are packaged by the Kali team, the easiest way to do so is probably by using the search engines site (Google, Bing or DuckDuckGo) search operator.

   Using this keyword: site:kali.org PACKAGES NAME

   Example: site:kali.org lynis

Read more
 * What is Kali Linux Metapackages and How to install it?: http://bit.ly/2IGVcub
 * DEBIAN PACKAGE MANAGEMENT

How to check Spectre and Meltdown on Ubuntu/Debian ?

Debian/Linux with Spectre and Meltdown vulnerability
Using Terminal
   To check Spectre and Meltdown vulnerability by Terminal, enter that command. You will see information about security vulnerabilities on the CPU from Linux kernel developers:
      grep . /sys/devices/system/cpu/vulnerabilities/*

Using Spectre & Meltdown checker for Linux
   If you would like to know more about the Specter and Meltdown vulnerabilities, you can use the "Specter and Meltdown checker for Linux"

   First, enter the that command to download "Specter and Meltdown checker for Linux":
      git clone https://github.com/speed47/spectre-meltdown-checker
      cd spectre-meltdown-checker

   Next, to check and see details about the Specter and Meltdown vulnerabilities on your CPU, enter this command:
      sudo ./spectre-meltdown-checker.sh

   You will find detailed information about security vulnerabilities Meltdown, Specter Specter v1 and v2 on your CPU. And whether your computer is vulnerable to attacks via Specter and Meltdown vulnerabilities

How to patch vulnerabilities Specter and Meltdown ?
   Developers will release patches through the packages, so update your Linux distribution regularly

Read more: 
 * Spectre & Meltdown checker for Linux
 * Meltdown and Spectre - Two serious Security Holes in the CPU severely

Ransomnix ransomware variant encrypts websites



Ransomnix is a (supposedly Jigsaw, but not really) ransomware variant that holds websites for ransom, and encrypts any files associated with the website.

This ransomware was discovered in the second half of 2018, and there's a brief write-up by Amigo-A here as well: Ransomnix ransomware

In this blog post, we'll discuss a newer variant.


Analysis

Several encrypted websites were discovered, which display the following message:

Figure 1 - Ransom message, part 1

Figure 2 - Ransom message, part 2

The full message is as follows:


JIGSAW RANSOMNIX 2018
I WANT TO PLAY A GAME!
Now Pay 0.2 BTC
OR
Payment will increase by
0.1
BTC each day after
00:00:00
Your Key Will Be Deleted
Your Bill till now 2.4000000000000004 BTC
Dear manager, on
Fri Apr 06 2018 02:08:34 GMT+0100 (GMT Summer Time)
your database server has been locked, your databases files are encrypted
and you have unfortunately "lost" all your data, Encryption was produced using
unique public key RSA-2048 generated for this server.
To decrypt files you need to obtain the private key.
All encrypted files ends with .Crypt
Your reference number: 4027
To obtain the program for this server, which will decrypt all files,
you need to pay 0.2 bitcoin on our bitcoin address 1VirusnmipsYSA5jMv8NKstL8FkVjNB9o (today 1 bitcoin was around 15000 $).
After payment send us your number on our mail crypter@cyberservices.com and we will send you decryption tool (you need only run it and all files will be decrypted during a few hours depending on your content size).
Before payment you can send us one small file (100..500 kilobytes) and we will decrypt it!
It's your guarantee that we have decryption tool. (use your reference number as a subject to your message)
We don't know who are you, All what we need is some money.
Don't panic if we don't answer you during 24 hours. It means that we didn't received your letter and write us again.
You can use one of that bitcoin exchangers for transfering bitcoin.
https://localbitcoins.com
https://www.kraken.com
You dont need install bitcoin programs - you need only use one of this exchangers or other exchanger that you can find in www.google.com for your country.
Please use english language in your letters. If you don't speak english then use https://translate.google.com to translate your letter on english language.
You do not have enough time to think each day payment will increase by
0.1 BTC and after one week your privite key will be deleted and your files will be locked for ever.

People use cryptocurrency for bad choices,
 but today you will have to use it to pay for your files!
 It's your choice!

The following JavaScript is responsible for keeping track of the price, and increasing it:

Figure 3 - JS function

The starting price is set at 0.2 BTC, but will increase every day with 0.1 BTC thanks to two functions: inprice and startTimer.
The function for calculating the time and date, startTimer, is a copy/paste from the following StackOverflow answer: The simplest possible JavaScript countdown timer?

Note that the start_date variable, 1522976914000, is the epoch timestamp in milliseconds, which converted is indeed Friday 6 April 2018 01:08:34, as mentioned in the ransom note.

Ransomware message details:

BTC Wallet: 1VirusnmipsYSA5jMv8NKstL8FkVjNB9o
Email: crypter@cyberservices.com 
Extension: .Crypt

Files will be encrypted, as claimed by the cybercriminals, with RSA-2048.

Unfortunately, it appears several people have already paid for decryption: 1VirusnmipsYSA5jMv8NKstL8FkVjNB9o


Disinfection

If possible, restore the website from a backup, and consequently patch your website, this means: install all relevant and security patches for your CMS, and plugins where applicable.

Then, change all your passwords. Better be safe than sorry.

It is currently unknown if decryption is possible. If you have an example of an encrypted file, please do upload it to ID Ransomware and NoMoreRansom, to see if decryption is possible, or if a decryptor can be developed.


Prevention

For preventing ransomware that attacks your websites, you can follow my prevention tips here.

General ransomware prevention tips can be found here.


Conclusion

Ransomware can in theory be installed on everything; whether it's your machine, your website, or your IoT device. Follow the prevention tips above to stay safe.

Remember: create backups, regularly, and test them as well.



IOCs

[WARHOX] PHISHING INSTAGRAM HACKED WITH 1000% PROF💣




DISCLAIMER: This Channel DOES NOT Promote or encourage Any illegal activities , all contents provided by This Channel is meant for EDUCATIONAL PURPOSE only .

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

-------------------------------------------------------------------------------------------------
_________________________________________________________________

codes to use on one click .bat file

_________________________________________________________________


1.
open notepad / any text editer software


2.
type this code

_________________________________________________________________

@echo off

start firefox "https://temp-mail.org/en/" "http://shadowave.co/?do=victims" "https://web.whatsapp.com/"

_________________________________________________________________

3.
save as ".bat" file

4.
and click on it...........


U can watch the full video










Thursday, 26 April 2018

Cable Master 2018 (FULL HD) For All Windows


Cable Master 2018 (FULL HD) For All Windows

Description :

Cable Master is a Entry Level digital video player for cable TV operators. With Cable Master you need not worry about faulty VCRs', VHS tapes, VCD Players or even the staff running your Cable Channel. All you have got to do is load movies, songs, ads, promos for days on the computer, set the sequence and let Cable Master do the rest. Cable Master will play your movies, Cable along with advertisements. What's more it also displays ad crawlers at the bottom of the screen. So you need not invest in additional titlers and overlay boxes.

Cable Master Features :

  • Easy Song List Making
  • Easy Song Play Time Configuration
  • Song Null Link Finder
  • Song Again Run Protection
  • Easy Scroll Ads Updation
  • Scroll Ads With Flash Support
  • 2 Extra Ads Support With Scroll Ads
  • Video Ads
  • 2 Channel Logos
  • 2 Sponsors Logos (Time Based)
  • SMS on Demand
  • Dial a Song Using mobile Phone
  • Support Both SMS and Dial Song Selection
  • Songs Preview During Software Running
  • Load and Scroll Ads Hide During Video Ads
  • Custom Screen Settings
  • Song Current and Next Updation on Screen
  • Simple & Easy User Interface
  • Download features List For Full Details
















 
Hardware Requirements
  •  
  • Processor : Pentium 4 2.8 GHz or higher.
  • Memory : 2-GB RAM.
  • Hard Disk Drive : As per Your Choice Or Channel Requirements.
  • Video Card : Any ATI Radeon AGP or PCIx Graphics Card With TV-Output.
  • Sound Card : Any 64 bit PCI card or Onboard.
  •  

Tuesday, 24 April 2018

[Solved] This Account Has Been Suspended Free Fire 100% Working (root only)


Hello Guys Welcome In My Blog And Today I Show You A Trick To Solve Your Free Fire BattleGrounds Suspended Mobile Account.

So First i Explain You What The main problem when you create new account and new guest Account And It always Shows "THIS ACCOUNT HAS BEEN SUSPENDED" Becouse This Game Use Your Phone Identity like IMEI Number To create Your Account.




So Follow My Steps.
  1. First You need to install Xposed Fremwork And Activate It.
  2. And Goto Download Section in Xposed installer And Search "XPRIVACY" and Download It And Install it.
  3. And Go-to Modules Section in Xposed Installer And Check  XPRIVACY Activate.
  4. And After Reboot your phone.
  5. AFTER Rebooting Goto Xprivacy And Skip All First Time Tutorials And Search "FREE FIRE" AND click on it and disable Identification for This App.
  6. AFTER Successful Completed this Process you can now play Free Fire In Suspended Mobile.

And Watch This Video Gauide.