Wednesday, 30 January 2019

How To Read Deleted Messages On WhatsApp


You can easily read deleted WhatsApp messages from your phone without having to do any external activity or backing up and renewing data after the topic of the message has been forgotten.

WhatsApp is one of the mostly widely used messaging app and ever since they rolled out the “Delete for everyone” feature, there has been some changes.

Do you know that WhatsApp messages that were deleted can still be accessed on your phone easily?

Deleted WhatsApp messages are still present in the notification log but you must know your way in order to get them back.

The recipient can still access the deleted messages from the notification log of the device after the message has been deleted.

How to read deleted WhatsApp messages

1. Head on to google play store and download “Notification history” android app. This is a third-party app that will help you access any deleted WhatsApp messages.

2. After you download the app, use it to search for the messages in your notification log.
Note that you will not be able to find messages that were deleted before the app was installed.

So it is better to install the app now so that you can easily read the deleted WhatsApp messages from your notification history. The earlier, the better.
\
3. You can access the notification log without any additional app. This is how to do it: go to the widgets>>phone>>activities>>settings>>notification log.

But there are some things you should know. Only the messages that have been interacted with can be recovered. The message must have been displayed as a notification before it was deleted.




What Others Are Reading



If the message was deleted before your data was on, you can’t find it in the notification panel. The notification log can only save the message for some time. Once the device is restarted, the messages will be cleared.

Also, you should know that only the first 100 characters of the message will be displayed to you. This is only available for people.using android 7.0 and above. Others can only read texts without viewing any media file.

If you also notice, whenever you are chatting with someone and the person suddenly deletes the message, there will be a certain drop in trust you will have for that person. This post on how to read deleted WhatsApp messages will help you know if they are truly lying or not.

Please it is advised that this feature should not be used all the time no matter how tempting it may be. Some people make mistakes of sending confidential or dangerous messages to another contact then delete them right away. Use it responsibly.

We are wavyearners.blogspot.com

Installing team win recovery project (twrp) using leptop or computer

Installing team win recovery project

twrp mean "team win recovery project" is open source software> twrp official 

website here twrp download 1 click >>




TeamWin



First go to your browser and type google.com and search ( twrp your model here d ownload  ) anSearch











And download it any where

2  step>  download another soft ...  odin  for computer or leptop

3 step>  pickup your samsung divice and turn it off then goto download mode . how to go download mode 

4 step> Connect your phone in to pc or leptop

5 step> open odin and see screenshoot











6 step>  select AP and open your first downloaded twrp file and click start button 

7 step>  After clicking start odin automatic Start her work

And you see the result is passed .... 

>>> then see your phone fully installed twrp <<<

how to go in twrp mode any android divice

1>   power off your phone 

2>   and click power button + home button + and volume up button Together

3> Then see your phone in twrp mode.


If  you like our post > day-to-day follow us  to our facebook  page

EvilTwinFramework - A Framework for Pentesters to Perform Evil Twin attacks

About EvilTwinFramework
   EvilTwinFramework is a framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities.

   It uses hostapd-wpe to create the access point, so it is highly configurable.
   It uses dnsmasq to run the dhcp and dns services.
   It uses apache with help of dnsmasq to launch spoofed webpages as well as captive portals!
   Packet sending and receiving is all done via Scapy!

Install EvilTwinFramework
   You can watch full tutorials in here: Evil Twin Framework Tutorials

Motivation
   The EvilTwinFramework is meant to replace all existing Wi-Fi hacking tools by integrating all features necessary for Wi-Fi penetration testing in one framework. The 3 core features needed are:
    * Packet Sniffing
    * Packet Injection
    * Access Point Creation

   All Wi-Fi attacks can be implemented with one or a combination of these core features. By having this platform it will always be possible to contribute with new Wi-Fi attacks that depend on these features.

Features of EvilTwinFramework
   All Forms of Evil Twin AP:
      The Evil Twin Framework, with the help of hostapd can mimick any type of Wi-Fi Network. And by using the hostapd-wpe patch it is easy to get WPA-EAP credentials.
      One can configure it as a catch-all honeypot to find out the encryption type of a network that was probed for.
      One can even create a karma attack and mimick many networks with different ssids on the same Wi-Fi card (as long as it supports ap-mesh mode). This can be done manually, if you want different encryption types for different networks, or automatically. The automation works by sniffing for popular probe requests and then creating the most popular one according to how many virtual access points you Wi-Fi card supports.

   Handshake and Credential Logging:
      As said before, with the help of hostapd-wpe WPA-EAP credential sniffing is easy!
      You can also spoof DNS with dnsmasq and even create captive-portals to force browsers to your webpage!
      You can sniff for WPA-Handshakes and even Half-WPA-Handshakes for ap-less password cracking!

   Integrated Man-In-The-Middle:
      An Evil-Twin is nothing without a proper MITM arsenal!
      The framework uses the mitmproxy library to create a local proxy capable of custom Level3 packet manipulation! Some fun ones have already been implemented such as beef hook injection into someones webpage, download content replacement with other files (idea stolen from the Wi-Fi Pumpkin Project). And my favorite: .exe file infection with PEInjector. PEInjector does a great job by seemlessly injecting a payload into an exe file without changing its size while at the same time obfuscating the payload to pass AV software.
      You can easily contribute and/or make your own custom MITM packet manipulation and add it to the framework. More information will be in the wiki.

   Wi-Fi Reconossaince: The framework is able to sniff for access points, probe requests and responses and associating them to Wi-Fi clients. You can also log all of this information.

   Packet Injection:
      Packet Sniffing and Injection is all done via Scapy. This makes it possible to contribute with any feature that involves packet sniffing and custom packet assembly and injection.
      For now the only packet injection feature is deauthentication packets since it is a nice thing to have when trying to catch WPA-Handshakes.

   Spawners:
      Spawners are a great and easy way to use your custom tools in conjunction with the framework. Some tools have already been added since they make a lot of sense: Ettercap, Beef, MITMFramework and SSLStrip.

Using EvilTwinFramework
   First enter the ETF Console interface as root: sudo ./etfconsole.py

   For now there only is a console interface that is very easy to use and has tab completion! The whole thing will work according to the etf.conf file. You can view and change all configurations via de console, just type:
      config <press double tab>

   to list the modules available for configuration. While working on the console type: listargs

   to view the available parameters (here you can check if configurations are OK), then type: set <parameter> <value> to change it.

   If a parameter is (dict) it means it is another configurable module within.

   To start an access point make sure you have it configured correctly, type: config airhost

      check if everything is OK (use listargs)
      config aplauncher

      check if everything is OK (use listargs)
      config dnsmasqhandler

      check if everything is OK and start the access point
      start airhost

   You can also configure an access point by copying one that is nearby. Start scanning:
      config airscanner

      check if everything is OK (use listargs)
      start airscanner

      ... wait ...
      show sniffed_aps

   This lists the sniffed access points with their ids: copy ap <id>

   OR:
      show sniffed_probes
      copy probe <id>

   Then start the fake access point: start airhost

   You can deauthenticate others from their network while running the acces point. To add access points or clients to be deauthenticated type:
      show sniffed_aps
      add aps <filter_string>

   The filter_string follows an easy syntax, it goes:   
      <filter_keyword> <filter_args>

   The args can be any of the column names listed in the table. The filter keywords are 'where' for inclusive filtering or 'only' for exclusive filtering, examples:

   This will add the access point whose id is 5 to the deauthentication list (this is adding a single and specific AP): add aps where id = 5

   This will add the access point whose ssid is 'StarbucksWifi' to the deauthentication list: 
    add aps where ssid = StarbucksWifi

   This will add the access point whose encryption type has 'wpa' OR 'opn' to the deauthentication list: add aps where crypto = wpa, crypto = opn

   This will add the access point whose ssid id 'freewifi' AND is on channel 6 to the deauthentication list: add aps only ssid = freewifi, channel = 6

   You can use the same interface for injecting packets while running the fake access point. You can check and set configurations with:
      config airinjector
      listargs

   After all that run the Injector (which by default performs Deauthentication attack):
     start airinjector

   Same can be done when deleting from the deauth list with the del command. The show command can also be followed by a filter string.

   Contributors can program Plugins in python either for the airscanner or airhost or airdeauthor. Contributors can also code MITM scripts for mitmproxy.

WiFi-Pumpkin - A Framework for Rogue WiFi Access Point Attack

About WiFi-Pumpkin
   The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwarding legitimate traffic to and from the unsuspecting target. It comes stuffed with features, including rogue Wi-Fi access points, deauth attacks on client APs, a probe request and credentials monitor, transparent proxy, Windows update attack, phishing manager, ARP Poisoning, DNS Spoofing, Pumpkin-Proxy, and image capture on the fly. moreover, the WiFi-Pumpkin is a very complete framework for auditing Wi-Fi security check the list of features is quite broad.

Install WiFi-Pumpkin


   Or you can install WiFi-Pumpkin easily from .DEB file here.

Features of WiFi-Pumpkin:
 * Rogue Wi-Fi Access Point
 * Deauth Attack Clients AP
 * Probe Request Monitor
 * DHCP Starvation Attack
 * Credentials Monitor
 * Transparent Proxy
 * Windows Update Attack
 * Phishing Manager
 * Partial Bypass HSTS protocol
 * Support beef hook
 * ARP Poison
 * DNS Spoof
 * Patch Binaries via MITM (BDF-Proxy)
 * LLMNR, NBT-NS and MDNS poisoner (Responder)
 * Pumpkin-Proxy (ProxyServer (mitmproxy API))
 * Capture images on the fly
 * TCP-Proxy (with scapy)
 * Moduled plugins and proxys
 * Wireless Mode support hostapd-mana/hostapd-karma attacks

Plugins on WiFi-Pumpkin:
 * Dns2proxy: This tools offer a different features for post-explotation once you change the DNS server to a Victim.
 * Sstrip2: Sslstrip is a MITM tool that implements Moxie Marlinspike's SSL stripping attacks based version fork @LeonardoNve/@xtr4nge.
 * Sergio_proxy: Sergio Proxy (a Super Effective Recorder of Gathered Inputs and Outputs) is an HTTP proxy that was written in Python for the Twisted framework.
 * BDFProxy: Patch Binaries via MITM: BackdoorFactory + mitmProxy, bdfproxy-ng is a fork and review of the original BDFProxy @secretsquirrel.
 * Responder: Responder an LLMNR, NBT-NS and MDNS poisoner. Author: Laurent Gaffie.

Transparent Proxy
   Transparent proxies(mitmproxy) that you can use to intercept and manipulate HTTP traffic modifying requests and responses, that allow to inject javascripts into the targets visited. You can easily implement a module to inject data into pages creating a python file in directory "plugins/extension/" automatically will be listed on Pumpkin-Proxy tab.

   Plugins Dev Example


   About plugins: plugins on the wiki.

TCP-Proxy Server
   A proxy that you can place between in a TCP stream. It filters the request and response streams with (scapy module) and actively modify packets of a TCP protocol that gets intercepted by WiFi-Pumpkin. this plugin uses modules to view or modify the intercepted data that possibly easiest implementation of a module, just add your custom module on "plugins/analyzers/" automatically will be listed on TCP-Proxy tab.

   About TCP-Proxy: TCP-Proxy on the wiki

WiFi-Pumpkin's Screenshots: On the wiki

FAQ: On the wiki

Contact Us: Whether you want to report a bug, send a patch or give some suggestions on this project, drop us or open pull requests.

Tuesday, 29 January 2019

Root your samsung smart phone without computer using just a software

 How to root your phone without a computer


"using just a software"

Assalamulaiqum warahmatullah
Root your samsung smart phone without computer using just a software
Surf Apk

Today I will show you how to root your Android phone without PC

1 > Search google.com and type kingroot.apk and download the software it's easy.       

2 >Install king root on your phone and open it.

> When king root open Then you will down and see there is a text Have written <tryit> click it.

Seen in next step large text writing ROOT click here and the king root is working start 

5> After complete 100% your phone will be restart

5 > download root checker and check your phone has been rooted.      

how to download kingroot.apk


Root your samsung smart phone without computer using just a software


Root your samsung smart phone without computer using just a software