Search This Blog

Powered by Blogger.

How to get an admin password on a work PC in an Active Directory domain?

  ⚙How to get an admin password on a work PC in an Active Directory domain? A) First, find the location of the shortcut for the installed Po...

Thursday, October 29, 2020

HOW TO HACK WHATSAPP ACCOUNT


       HOW TO HACK WHATSAPP ACCOUNT 



Hello everybody I am Anonymous Black Sec come again with hacking tutorial .It's for those who think hacking is easy and I have enough time to do for you. 


In this tutorial we will show you how to hack whatsapp account through mac spoofing attack. 


First of all the requirements of this procedure are:

 

1. Mobile Phone Rooted


2. Target's Phone for 5 minutes


3. Busybox and Terminal App installed on your android device


4. Wifi Scanner ( if you can't reach the target's phone for getting his / her mac address through setting





1. Uninstall WhatsApp from your phone or device. You'll install it again at the end of the method, but you'll need to configure it differently, and the easiest way to make sure you'll be able to do that correctly is to completely uninstall it now.


2. Obtain your target's phone. You'll need it for two different steps throughout the process, but this shouldn't take too long - you should be able to return it before your target starts to miss it.


3. Find your target's phone's Media Access Control (MAC) address. A MAC address is a unique identifier assigned to your phone or other device that essentially serves as its online identity. Find and write down your target's MAC address. It takes the form of six pairs of letters or numbers, separated by colons (01:23:45:67:89:ab).


On an Android, find this in Settings → About phone → Status → Wi-Fi MAC address.


On an iPhone, go to Settings → General → About → Wi-Fi Address.


On a Windows phone, look in Settings → About → More info → MAC address.

On a BlackBerry, go to Options → Device → Device and Status info → WLAN MAC.

 

4. Find your MAC address using the instructions above. Make sure to save it somewhere secure, as you'll want to change your device back to that address once you're done.


5. Change ("spoof") your phone's MAC address to that of your target. This will allow your phone to pass as your target's, letting you convince WhatsApp that you are your target when you log in.


On an iPhone or other device, install a MAC spoofing app like MacDaddy X or WifiSpoof. Use that to change your MAC address.


On Android, install BusyBox and the Terminal Emulator (apps available for free on Google Play). In the terminal, type "ip link show" to see a list of interfaces. Identify the one that has your MAC address -- for this example, we'll use the eth0 interface. In the terminal emulator, enter "ip link set eth0 address XX:XX:XX:XX:XX:XX" and "ip link set eth0 broadcast XX:XX:XX:XX:XX:XX", where eth0 is the interface you identified and XX:XX:XX:XX:XX:XX is your target's MAC address. To check that you've successfully changed your MAC address, enter "ip link show eth0."


6. Install and configure WhatsApp on your phone. Enter your target's phone number to set up WhatsApp rather than your own. This will allow you to receive their messages and send messages from their account.


7. Get the confirmation code from your target's phone. This code will be sent to their phone number as part of the WhatsApp configuration process. Access their phone one last time to get that verification code. Enter it into WhatsApp on your phone when prompted, and you're all ready to go.


If you don't want your target to find out about your spoofing, make sure to delete the confirmation code from their phone before they can see it.


8. When you no longer need to access your target's WhatsApp account, change your MAC address back to what it was. Repeat the instructions to change it, but this time change it to your original address rather than your target's. This will restore your phone to how it was originally, which will ensure that there are no future problems with Internet usage or connectivity.


If you can't reach the target's .phone to get mac address you can use a WIFI SCANNER. If you can't get the code because you don't have physical access into the victim's phone you can use social engineering.

HACKING ANDROID COURSES LEAKED


 HACKING ANDROID COURSES

1)  Penetration Testing 
> watch 

https://mega.nz/folder/CY0zUACT#OVODsvO2PkC5Biv43i__NQ

2) Setup Your Lab 

>  https://mega.nz/folder/TM1jyABL#40eUd_dpLEchdUAxbXPEiQ

3) Finding Your way around Kali 

>  https://mega.nz/folder/fVl3hI7J#tKsrQ4rjzd97b7sah6gwYw

4)  IMPORTANT TOOL  

> https://mega.nz/folder/fB9T0CAD#6jdad6-5XW-fSFhuhYO7Uw

5)  Exploitations 

> https://mega.nz/folder/fElDXIwA#y6qSr6jMk5dTkXUaDeEe_w

6) Hacking Android Devices :

> https://mega.nz/folder/HJ8BwQrI#JiQhByO7NvsuU_nRslRhZw

7) Social Engeneering 

> https://mega.nz/folder/vUshmAgD#lJpAwyKwLss9ogVZzrnFvw

8) Hacking Using Android Devices
  
> https://mega.nz/folder/aVsFzQ4S#MYrQ9rc3pjDjq2pjVHCtoA


Leaked By Anonymous Black Sec

Fully Carding Course


 🔰‍ Fully Carding Course 🔰

👉🏿PDF Carding

https://mega.nz/#F!ZtEW2Z7b!M9aT20eGZsTfzQKqn8mI7Q

👉🏿Full Carding

https://mega.nz/#F!bc1UCZ6J!wUIZ6sg488FfcCX_tlfTEQ

👉🏿Pack Carder

https://mega.nz/...

👉🏿Carding Cracking

https://mega.nz/...

👉🏿Code

https://mega.nz/...

👉🏿Carding from Zero expert

https://mega.nz/...

👉🏿Books Carding

https://mega.nz/#F!bc1UCZ6J!wUIZ6sg488FfcCX_tlfTEQ

👉🏿Carding Introduction

https://mega.nz/...

👉🏿Know all about Carding

https://mega.nz/#F!zioiBIwB!SKuWCtpw9cZnhdpfZZtl3w

👉🏿Courses Carding

https://mega.nz/#F!fuY2HQiC!5tdvOTvs9ND76wEtShQ1TQ

👉🏿Carding and Financial Engineering

https://mega.nz/#F!GmI2WQwD!xZN6VJuWrw1q1e3EDOi-Hw

👉🏿Carding Edocsite

https://mega.nz/#F!eiR2VAbA!MdgzoXM0IsOaHLfkk1b8zA

👉🏿Total Carding

https://mega.nz/#F!C7YiAY6Y!T6zENw9oq3Guxn929dd7aQ


By Anonymous Black Sec

Wednesday, October 28, 2020

ADVANCED SOCIAL MEDIA HACKING COURSE

 
                             🔰ADVANCED SOCIAL MEDIA HACKING COURSE🔰

 

                                                   [EDUCATIONAL PURPOSE]



Course Contents


1. About Course

2. Explain Required Things

3. Required Things Installations

4. Required Things Installations Part-2

5. Infomations Gathering About Victim

6. How To Create Wordlist

7. How To Create Wordlist Part-2

8. How To Create Wordlist Part-3

9. Advanced Framework Installations For Attacking

10. Advanced Framework Installations part-2

11. How To Attack on social networks

12. How To Attack on social networks part-2

13. Social engineering part-1

14. Social engineering part-2

15. Social engineering  Private Things That used Blackhats.

16. How To Hide My Information

17.  How To search anonymously 

Link:

                                                    Click Here


Warning:

  This Blog Will Not Responsible For any Illegal Activity.

We don,t promote any illegal things.


 

Blogger news

Blogroll

About