Friday, 28 September 2018

Facebook Hacking Using Zshadow

How To Use z-shadow?

So this was a long of accounts which you can hack using Z-Shadow. The core or basic procedure for hacking all of these accounts is not different however, there are differences between the methods. It is not possible for me to bring all the method just in this one guide but I will surely be bringing them one-by-one in the future. I will only be covering some of the top ones in this guide which most people keep searching for so that majority of people can benefit from the guide. As for the rest of them, stay tuned.
  1. Step 1: Go to your favorite browser in my case Chrome is my favorite. Then type “Z Shadow” in the search bar OR just click here.
  2. Step 2: When you open the z-shadow.co just click the Sign Up button.


 Step 3: Now fill out the Sign-Up form and click the “Sign Up” button on the bottom of the form.

Step 4: When you successfully create an account in z shadow then a page will open before you just select any service and copy any of the links.
  1. Step 5: After copying the link send that link to your friends you can also send that link through Facebook chat.
  2. Step 6: Here I have selected the service “Add 1000 followers to your account” you can also select according to your desire when your victim will click on the link a fake page will be opened asking the victim the email and password he is already login but our link requires login to hack.

Tools For Hacking

* __0trace__    1.5    A hop enumeration tool    http://jon.oberheide.org/0trace/
* __3proxy__    0.7.1.1    Tiny free proxy server.    http://3proxy.ru/
* __3proxy-win32__    0.7.1.1    Tiny free proxy server.    http://3proxy.ru/
* __42zip    42__    Recursive Zip archive bomb.    http://blog.fefe.de/?ts=b6cea88d
* __acccheck__    0.2.1    A password dictionary attack tool that targets windows authentication via the SMB protocol.    http://labs.portcullis.co.uk/tools/acccheck/
* __ace    1.10__    Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface    http://ucsniff.sourceforge.net/ace.html
* __admid-pack 0.1__    ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful.    http://packetstormsecurity.com/files/10080/ADMid-pkg.tgz.html
* __adminpagefinder    0.1__    This python script looks for a large amount of possible administrative interfaces on a given site.    http://packetstormsecurity.com/files/112855/Admin-Page-Finder-Script.html
* __admsnmp    0.1__    ADM SNMP audit scanner.
* __aesfix    1.0.1__    A tool to find AES key in RAM    http://citp.princeton.edu/memory/code/
* __aeskeyfind    1.0__    A tool to find AES key in RAM    http://citp.princeton.edu/memory/code/
* __aespipe    2.4c__    Reads data from stdin and outputs encrypted or decrypted results to stdout.    http://loop-aes.sourceforge.net/aespipe/
* __afflib    3.7.3__    An extensible open format for the storage of disk images and related forensic information.    http://www.afflib.org
* __afpfs-ng    0.8.1__    A client for the Apple Filing Protocol (AFP)    http://alexthepuffin.googlepages.com/
* __against    0.2__    A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list.    http://nullsecurity.net/tools/cracker.html
* __aiengine    339.58dfb85__    A packet inspection engine with capabilities of learning without any human intervention.    https://bitbucket.org/camp0/aiengine/
* __aimage    3.2.5__    A program to create aff-images.    http://www.afflib.org
* __air    2.0.0__    A GUI front-end to dd/dc3dd designed for easily creating forensic images.    http://air-imager.sourceforge.net/
* __airflood    0.1__    A modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections.    http://packetstormsecurity.com/files/51127/airflood.1.tar.gz.html
* __airgraph-ng    2371__ Graphing tool for the aircrack suite    http://www.aircrack-ng.org
* __airoscript    45.0a122ee__    A script to simplify the use of aircrack-ng tools.    http://midnightresearch.com/projects/wicrawl/
* __airpwn    1.4__    A tool for generic packet injection on an 802.11 network.    http://airpwn.sourceforge.net
* __allthevhosts 1.0__    A vhost discovery tool that scrapes various web applications    http://labs.portcullis.co.uk/tools/finding-all-the-vhosts/
* __american-fuzzy-lop    0.89b__    A practical, instrumentation-driven fuzzer for binary formats.    https://code.google.com/p/american-fuzzy-lop/
* __androguard    1.9__    Reverse engineering, Malware and goodware analysis of Android applications and more.    https://code.google.com/p/androguard/
* __androick    5.35048d7__    A python tool to help in forensics analysis on android.    https://github.com/Flo354/Androick
* __android-apktool    1.5.2__    A tool for reengineering Android apk files.    http://forum.xda-developers.com/showthread.php?t=1755243
* __android-ndk    r9c__    Android C/C++ developer kit.    http://developer.android.com/sdk/ndk/index.html
* __android-sdk-platform-tools    r19__    Platform-Tools for Google Android SDK (adb and fastboot)    http://developer.android.com/sdk/index.html
* __android-sdk    r22.3__    Google Android SDK    http://developer.android.com/sdk/index.html
* __android-udev-rules    8340.db8ef4a__    Android udev rules.    https://github.com/bbqlinux/android-udev-rules
* __androidsniffer    0.1__    A perl script that lets you search for 3rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more.    http://packetstormsecurity.com/files/97464/Andr01d-Magic-Dumper.1.html
* __anontwi    1.0__    A free software python client designed to navigate anonymously on social networks. It supports Identi.ca and Twitter.com.    http://anontwi.sourceforge.net/
* __aphopper    0.3__    AP Hopper is a program that automatically hops between access points of different wireless networks.    http://aphopper.sourceforge.net/
* __apnbf    0.1__    A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device.    http://www.c0decafe.de/
* __arachni    1.0.6__    A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.    https://www.arachni-scanner.com
* __arduino    1.0.5__    Arduino SDK (includes patched avrdude and librxtx)    http://arduino.cc/en/Main/Software
* __argus    3.0.8__    Network monitoring tool with flow control.    http://qosient.com/argus/
* __argus-clients    3.0.8__    Network monitoring client for Argus.    http://qosient.com/argus/
* __armitage    141120__    A graphical cyber attack management tool for Metasploit.    http://www.fastandeasyhacking.com/
* __arp-scan    1.9__    A tool that uses ARP to discover and fingerprint IP hosts on the local network    http://www.nta-monitor.com/tools/arp-scan/
* __arpalert    2.0.12__    Monitor ARP changes in ethernet networks    http://www.arpalert.org/
* __arpantispoofer    1.0.1.32__    A utility to detect and resist BIDIRECTIONAL ARP spoofing. It can anti-spoof for not only the local host, but also other hosts in the same subnet. It is also a handy helper for gateways which don't work well with ARP.    http://arpantispoofer.sourceforge.net/
* __arpoison    0.6__    The UNIX arp cache update utility    http://www.arpoison.net
* __arpon    2.7__    A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks.    http://arpon.sourceforge.net/
* __arpwner    26.f300fdf__    GUI-based python tool for arp posioning and dns poisoning attacks.    https://github.com/ntrippar/ARPwner
* __artillery    1.0.2__    A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system    https://www.trustedsec.com/downloads/artillery/
* __asleap    2.2__    Actively recover LEAP/PPTP passwords.    http://www.willhackforsushi.com/Asleap.html
* __asp-audit    2BETA__    An ASP fingerprinting tool and vulnerability scanner.    http://seclists.org/basics/2006/Sep/128
* __athena-ssl-scanner    0.5.2__    a SSL cipher scanner that checks all cipher codes. It can identify about 150 different ciphers.    http://packetstormsecurity.com/files/93062/Athena-SSL-Cipher-Scanner.html
* __atstaketools    0.1__    This is an archive of various @Stake tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics.    http://packetstormsecurity.com/files/50718/AtStakeTools.zip.html
* __auto-xor-decryptor    3.6a1f8f7__    Automatic XOR decryptor tool.    http://www.blog.mrg-effitas.com/publishing-of-mrg-effitas-automatic-xor-decryptor-tool/
* __autopsy    2.24__    A GUI for The Sleuth Kit.    http://www.sleuthkit.org/autopsy
* __azazel    10.401e3aa__    A userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit.    https://github.com/chokepoint/azazel

Law - Cyber Crime California


While many may be familiar with "hacking" from watching their favorite television shows or reading popular crime novels, a broader variety of activities may qualify as Cyber crimes.To learn more about computer crimes in general, see FindLaw's Cyber Crimes and Online Scams sections.
California state laws include provisions intended to protect the computers, computer systems, and computer networks of individuals, businesses, and organizations across the state. California criminalizes many computer-related activities that affect the functionality, use, or confidentiality of computer data, computers, computer systems, and computer networks.
An individual who accesses a computer, computer system, or computer network and alters, disrupts, deletes, destroys, or otherwise changes any part may be charged with a computer crime. The applicable type of computer crime depends on the defendant's purpose for engaging in the unlawful access. For example, a prosecutor may need to show that the defendant wanted to execute a plan for deception, fraud, or extortion, or to take control of information, money, or property that did not belong to the defendant.
Other computer crimes focus on access made to introduce a computer virus or contaminant for harmful purposes.
In addition, California state laws criminalize the unauthorized taking or copying of data and information from a computer, computer system, or computer network. For example, this type of computer crime might apply to an individual who takes computerized business records from an organization or an employee who copies work product from an employer's computer network without permission.
Knowledge Requirement
For each computer crime, a prosecutor must prove that the defendant "knowingly" engaged in the computer-related act. If the defendant performed the act accidentally, it may be more difficult to establish the elements of the charged crime. In addition, a prosecutor must show that the defendant acted without permission or authorization.
California Computer Crimes Laws Overview
Below you will find key provisions of California’s computer crimes laws.





Statutes

California Penal Code Section 502 et. seq. (Computer Crimes)
PenaltiesIn general, computer crimes that involve unlawfully accessing, changing, or damaging a computer, computer system, or computer network may result in a fine, imprisonment, or both. The maximum fine required may range from $1,000 to $10,000. The term of imprisonment may be served in county jail or state prison and last for a term of one year, sixteen months, two years, or three years. A court might also order compensatory damages to be paid to a victim who suffered damages or losses resulting from the computer crime.
Possible Defenses
  • Activity conducted within the scope of lawful employment as duties or tasks reasonably necessary to complete a work assignment
Possibility of Community Service Sentence
  • California law permits the courts to require community service or accept other forms of alternate sentencing. In order to receive an alternate sentence, a defendant convicted of a computer crime would need to demonstrate remorse and show the court that future crimes are unlikely.

How to Become a Hacker Complete Guide

In computer security, a hacker is someone who focuses on security mechanisms of computer and network systems. There are communities and shared cultures of expert programmers and networking wizards that trace its history back through decades to the first time-sharing minicomputers and the earliest ARPA.net experiments. The members of this culture were the first "hackers." Breaking into computers and phone systems have come to symbolize hacking in popular culture, but this culture is much more complicated and moralistic than most people know. To become a hacker, learning basic hacking techniques, how to think like a hacker, and how to gain respect within the ethical hacking community.




1. Run a UNIX-like OS, such as Linux. UNIX and UNIX-like operating systems are the operating systems of the Internet. While you can learn to use the Internet without knowing UNIX, you can't be an Internet hacker without understanding UNIX. For this reason, the hacker culture today is pretty strongly UNIX-centered. There are many types of UNIX-like operating systems, the most popular being Linux, which you can run alongside Microsoft Windows on the same machine. Download Linux online or find a local Linux user group to help you with installation.
  • A good way to dip your toes in the water is to boot up a device called a live CD or USB, a distribution that runs entirely off a CD or USB without modifying your hard disk. A way to get a look at the possibilities without having to do anything drastic.
  • There are other UNIX-like operating systems besides Linux, such as the *BSD systems. The most popular *BSD systems are FreeBSD, NetBSD, OpenBSD and DragonFly BSD. All are open source just like Linux. However, it's important to remember that they are BSD and not Linux.
  • MacOS on Darwin, a UNIX operating system that's on FreeBSD. Darwin is fully free and open source and is available from http://opensource.apple.com. Because the core of the system is UNIX, and macOS is very popular, many people have ported over Linux applications to macOS. You can get those programs with a package manager like homebrew, fink or MacPorts. Alternatively, you can just run Linux on a Mac alongside macOS.
  • If you want to get super niche, you can even run an operating system like Open Indiana, which is based on the open source release of the Solaris operating system before it was acquired by Oracle and made closed source. OpenIndiana and Solaris made on UNIX System V, and, as such, are not compatible with Linux applications. That said, there are many ports of Linux applications. You're probably better off just using macOS, BSD or Linux because they are much more popular and have many more programs available for them. 

2. Write HTML. If you don't know how to program, learning basic HyperText Mark-Up Language (HTML) and gradually building proficiency is essential. What you see when you look at a website of pictures, images, and design components is all coded using HTML. For a project, set out to learn how to make a basic home page and work your way up from there.
  • In your browser, open the page source information to examine the HTML to see an example. Go to Web Developer > Page Source in Firefox and spend time looking at the code.
  • You can write HTML in a basic word processing program like Notepad or Simple text and save your files as "yourCoolFileName.HTML" so you can upload them to a browser and see your work translated.

3. Learn the language of programming. Before you start writing poems, you have to learn basic grammar. Before you break the rules, you have to learn the rules. But if your ultimate goal is to become a hacker, you're going to need more than basic English to write your masterpiece.
  • Python is a good "language" to start off with because it's cleanly designed, well documented, and relatively kind to beginners. Despite being a good first language, it is not just a toy; it is compelling, flexible, and well-suited for large projects.
  • If you get into serious programming, you will have to learn Java is an alternative, but its value as a first programming language has been currently questioned in its particular state.
  • Unlike Java, Javascript is very similar to Python as they are both a C-based language and extremely new user-friendly. Javascript is "the programming language of the web," so If you'd like to continue your learning in web development/hacking, Javascript is better to learn than Python.
  • An alternative to JavaScript would be PHP C, the core language of Unix. C++ is very closely related to C; if you know one, learning the other will not be difficult. C is very efficient with your machine's resources but will soak up huge amounts of your time on debugging and is often avoided for that reason, unless the efficiency of your computer is especially important.
It is probably a good idea to use a good starting platform such as Backtrack 5 R3, Kali or Ubuntu 12.04LTS.

Part 2
Adopting Hacking Attitudes


1. Think creatively. Now that you've got the basic skills in place, you can start thinking artistically. Hackers are like artists, philosophers, and engineers all rolled up into one. They believe in freedom and mutual responsibility. The world is full of fascinating problems waiting to be solved. Hackers take a special delight in solving problems, sharpening their skills, and exercising their intelligence.
  • Hackers have a diversity of interests culturally and intellectually, outside of hacking. Work as intensely as you play, and play as intensely as you work. For true hackers, the boundaries between "play," "work," "science," and "art" all tend to disappear or to merge into a high-level creative playfulness.
  • Read science fiction. Go to science fiction conventions, which is a great way to meet hackers and proto-hackers.
  • Consider training in a martial art. The kind of mental discipline required for martial arts seems to be similar in important ways to what hackers do. The most hacker-ly martial arts are those which emphasize mental discipline, relaxed awareness, and control, rather than raw strength, athleticism, or physical toughness. Tai Chi is a good martial art for hackers.
2. Learn to love solving problems. No problem should ever have to be solved twice. Think of it as a community in which the time of everyone is hackers is precious. Hackers believe sharing information is a moral responsibility. When you solve problems, make the information public to help everyone solve the same issue.
  • You don't have to believe that you're obligated to give all your creative product away, though the hackers that do are the ones that get the most respect from other hackers. It's consistent with hacker values to sell enough of it to keep you in food and rent and computers.
  • Read older pieces, such as the "Jargon File" or "Hacker Manifesto" by The Mentor. They may be out of date regarding technical issues, but the attitude and spirit are just as timely.
3. Learn to recognize and fight authority. The enemy of the hacker is boredom, drudgery, and authoritarian figures who use censorship and secrecy to strangle the freedom of information. Monotonous work keeps the hacker from hacking.
  • Embracing hacking as a way of life is to reject so-called "normal" concepts of work and property, choosing instead to fight for equality and common knowledge.

Be competent. So, anyone who spends time on Reddit can write up a ridiculous cyberpunk username and pose as a hacker. But the Internet is a great equalizer and values competence over ego and posture. Spend time working on your craft and not your image, and you'll more quickly gain respect than modeling yourself on the superficial things we think of "hacking" in popular culture.
Thanks All

Buy Stocks using bitcoin

What Is Bitcoin?

 Bitcoin is a digital currency that allows you to conduct business and exchange resources securely, but without going through a bank or central payment entity to perform the transaction. Bitcoin can be sold, traded for a product, or bought into like a stock (which this article will teach you how to do).
Think of Bitcoin like a bartering token, only there's a limited supply of these digital tokens worldwide. Banks and national economies don't generate Bitcoin -- software mines it using a technology called blockchain. Learn more about this concept in the video below.

With Bitcoin being a limited resource, you'd think its value would always be off the charts, but this cryptocurrency is extremely volatile. People can adopt Bitcoin as a means of exchange for many reasons, and as Bitcoin's usage evolves, so will the reasons people choose to buy into it. Just this week, Bitcoin's price increased by more than $1000, reaching $7,450 per ₿1 at the time of writing this article (yikes).

How to Buy Bitcoin Stock

Whether you're looking to invest in Bitcoin for a big sell later, or spend it on various items and assets, there's a universal process you'll have to go through to buy stock in it. Let's dive into that process.

1. Download a Wallet

By "wallet," we don't mean the leather one in your pocket, or even credit card reader apps like Google Wallet. A Bitcoin wallet is an online storage place for all your digital currency. It doesn't just hold your Bitcoin, though. Bitcoin wallets also store your personal "key" -- a unique identifier assigned to every Bitcoin owner, consisting of a long string of letters and numbers that keeps your Bitcoin secure. This is essentially your Bitcoin password.
Your first step in buying Bitcoin is to download a Bitcoin wallet and connect your credit or debit card to it. There are more than a dozen Bitcoin wallets you can download, both to your desktop and as an app on your mobile device. Here are the wallets that work with the most devices and operating systems:
Coinbase, the first wallet app on the above list, also offers a "Bitcoin exchange" where you'll register to buy your first share of Bitcoin. We'll talk more about exchanges in the second step below.

2. Register With a Bitcoin Exchange

If there are national stock exchanges like NASDAQ, does that mean there's also a Bitcoin exchange? Yep. Bitcoin trades on a variety of online exchanges around the world, and to start buying and selling Bitcoin, you'll have to register with one of them. Have your email address and credit or debit card information ready.
Don't worry, all of your exchange options recognize the same Bitcoin trading price. Each exchange just caters to a different country or continent, and therefore offers an exchange rate that corresponds with the currency you'll use to buy Bitcoin. For example, while Korean exchanges sell Bitcoin for won (Korea's main currency), U.K.-based exchanges sell Bitcoin for pounds.
Here are some international Bitcoin exchanges you can register with (these exchanges trade Bitcoin for most currencies across the globe):
Although there are Bitcoin exchanges that specialize in just one country, you might find it easiest to register with an exchange that also supplies you with a Bitcoin wallet so you're not submitting your bank information to two separate services. Coinbase is one of those options. After downloading the Coinbase wallet, you can move right over to its exchange to buy your Bitcoin stock and fill your wallet.
Now, let's talk about how to make your first crypto-purchase.

3. Select a Buy-In Amount

Once you've selected the exchange where you want to buy your Bitcoin, navigate to the exchange's "Buy" section and select your buy-in amount. You'll tether your Bitcoin wallet to this purchase a "bit" differently (pun intended) depending on the exchange you use to buy your Bitcoin.
Nervous? Don't be -- you can buy less than ₿1 if you want to. Bitcoin exchanges sell cryptocurrencies down to several decimal places, so if Bitcoin is trading at $7,450 per ₿1, you can invest $1 and receive .00013 Bitcoin. Then, as Bitcoin's trading price increases, so does the value of the Bitcoin you bought.

4. Browse a Crypto Marketplace

With your Bitcoin in hand (or rather, in wallet), you can do one of two things with your purchase:

Spend Bitcoin in a Marketplace

Bitcoin has its very own ecommerce marketplaces where you can trade Bitcoin for products. Products include those that are shippable to your door -- such as jewelry -- and those you can download to your computer, such as Microsoft Office. Remember, no banks are involved in these transactions. The market simply verifies your Bitcoin's individual blockchain and completes the purchase.
Common Bitcoin marketplaces where you can spend Bitcoin include Bitify, Glyde, and even a Reddit community called BitMarket. Keep in mind you can also sell your own products for Bitcoin, making these marketplaces an easy way to build up your Bitcoin investment.

Buy and Wait

Of course, like any good investor, the key to making money on Bitcoin is to buy in and leave it alone. Cryptocurrencies' trading prices can fluctuate hundreds of dollars in a single morning, and watching Bitcoin's value peak and dip every day can drive you nuts.
Bitcoin investors often say that the money you put into Bitcoin should be money you're willing to lose. With that in mind, the best way to enjoy your investment is to let it sit, try selling personal items that could grow your Bitcoin account, and check the Bitcoin price once in a (long) while