Friday, 23 January 2015

How to hack Someone Else's WhatsApp Account

Want to hack someone else's WhatsApp account from your phone? Here's how to do it -- but make sure to get their permission first, as you might be infringing on their privacy.

STEP 1
Uninstall WhatsApp from your phone or device.
You'll install it again at the end of the method, but you'll need to configure it differently, and the easiest way to make sure you'll be able to do that correctly is to completely uninstall it now.

STEP2
Obtain your target's phone.
You'll need it for two different steps throughout the process, but this shouldn't take too long - you should be able to return it before your target starts to miss it.

STEP3
Find your target's phone's Media Access Control (MAC) address.
A MAC address is a unique identifier assigned to your phone or other device that essentially serves as its online identity. Find and write down your target's MAC address. It takes the form of six pairs of letters or numbers, separated by colons (01:23:45:67:89:ab).
On an Android, find this in Settings → About phone → Status → Wi-Fi MAC address.
On an iPhone, go to Settings → General → About → Wi-Fi Address.
On a Windows phone, look in Settings → About → More info → MAC address.
On a BlackBerry, go to Options → Device → Device and Status info → WLAN MAC.

STEP4
Find your MAC address using the instructions above.
Make sure to save it somewhere secure, as you'll want to change your device back to that address once you're done.

STEP5
Change  ("spoof") your phone's MAC address to that of your target.
This will allow your phone to pass as your target's, letting you convince WhatsApp that you are your target when you log in.
On an iPhone or other device, install a MAC spoofing app like MacDaddy X or WifiSpoof. Use that to change your MAC address.
On Android, install BusyBox and the Terminal Emulator (apps available for free on Google Play). In the terminal, type "ip link show" to see a list of interfaces. Identify the one that has your MAC address -- for this example, we'll use the eth0 interface. In the terminal emulator, enter "ip link set eth0 address XX:XX:XX:XX:XX:XX" and "ip link set eth0 broadcast XX:XX:XX:XX:XX:XX", where eth0 is the interface you identified and XX:XX:XX:XX:XX:XX is your target's MAC address. To check that you've successfully changed your MAC address, enter "ip link show eth0."

STEP6
Install  and configure WhatsApp on your phone.
Enter your target's phone number to set up WhatsApp rather than your own. This will allow you to receive their messages and send messages from their account.


STEP7
Get the confirmation code from your target's phone.
This code will be sent to their phone number as part of the WhatsApp configuration process. Access their phone one last time to get that verification code. Enter it into WhatsApp on your phone when prompted, and you're all ready to go.
If you don't want your target to find out about your spoofing, make sure to delete the confirmation code from their phone before they can see it.

STEP8
you no longer need to access your target's WhatsApp account, change your MAC address back to what it was. Repeat the instructions to change it, but this time change it to your original address rather than your target's. This will restore your phone to how it was originally, which will ensure that there are no future problems with Internet usage or connectivity.

Warnings
If you forget to delete the confirmation message, the target may come to know about the hack attempt.


For more information on any kind off hacking kindly contact us on this email. (Dgf090293@gmail.com)
 

Thursday, 22 January 2015

4 Ways to Crack a Facebook Password and How to Protect Yourself

In this article I'll show you these, and a couple other ways that hackers (and even regular folks) can hack into someone's Facebook account. But don't worry, I'll also show you how to prevent it from happening to you.

Method 1: Reset the Password
The easiest way to "hack" into someone's Facebook is through resetting the password. This could be easier done by people who are friends with the person they're trying to hack.

The first step would be to get your friend's Facebook email login. If you don't already know it, try looking on their Facebook page in the Contact Info section.
Next, click on Forgotten your password? and type in the victim's email. Their account should come up. Click This is my account.
It will ask if you would like to reset the password via the victim's emails. This doesn't help, so press No longer have access to these?
It will now ask How can we reach you? Type in an email that you have that also isn't linked to any other Facebook account.
It will now ask you a question. If you're close friends with the victim, that's great. If you don't know too much about them, make an educated guess. If you figure it out, you can change the password. Now you have to wait 24 hours to login to their account.
If you don't figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three and five friends.

It will send them passwords, which you may ask them for, and then type into the next page. You can either create three to five fake Facebook accounts and add your friend (especially if they just add anyone), or you can choose three to five close friends of yours that would be willing to give you the password.

How to Protect Yourself
Use an email address specifically for your Facebook and don't put that email address on your profile.
When choosing a security question and answer, make it difficult. Make it so that no one can figure it out by simply going through your Facebook. No pet names, no anniversaries—not even third grade teacher's names. It's as easy as looking through a yearbook.
Learn about recovering your account from friends. You can select the three friends you want the password sent to. That way you can protect yourself from a friend and other mutual friends ganging up on you to get into your account.


Method 2: Use a Keylogger
Software Keylogger

A software keylogger is a program that can record each stroke on the keyboard that the user makes, most often without their knowledge. The software has to be downloaded manually on the victim's computer. It will automatically start capturing keystrokes as soon as the computer is turned on and remain undetected in the background. The software can be programmed to send you a summary of all the keystrokes via email.

CNET has Free Keylogger, which as the title suggests, is free. If this isn't what you're looking for, you can search for other free keyloggers or pay for one.


Hardware Keylogger

These work the same way as the software keylogger, except that a USB drive with the software needs to be connected to the victim's computer. The USB drive will save a summary of the keystrokes, so it's as simple as plugging it to your own computer and extracting the data. You can look through Keelog for prices, but it's bit higher than buying the software since you have the buy the USB drive with the program already on it.


How to Protect Yourself
Use a firewall. Keyloggers usually send information through the internet, so a firewall will monitor your computer's online activity and sniff out anything suspicious.
Install a password manager. Keyloggers can't steal what you don't type. Password mangers automatically fill out important forms without you having to type anything in.
Update your software. Once a company knows of any exploits in their software, they work on an update. Stay behind and you could be susceptible.
Change passwords. If you still don't feel protected, you can change your password bi-weekly. It may seem drastic, but it renders any information a hacker stole useless.


Method 3: Phishing
This option is much more difficult than the rest, but it is also the most common method to hack someone's account. The most popular type of phishing involves creating a fake login page. The page can be sent via email to your victim and will look exactly like the Facebook login page. If the victim logs in, the information will be sent to you instead of to Facebook. This process is difficult because you will need to create a web hosting account and a fake login page.


The easiest way to do this would be to follow our guide on how to clone a website to make an exact copy of the facebook login page. Then you'll just need to tweak the submit form to copy / store / email the login details a victim enters. If you need help with the exact steps, there are detailed instructions available by Alex Long here on Null Byte. Users are very careful now with logging into Facebook through other links, though, and email phishing filters are getting better every day, so that only adds to this already difficult process. But, it's still possible, especially if you clone the entire Facebook website.

How to Protect Yourself
Don't click on links through email. If an email tells you to login to Facebook through a link, be wary. First check the URL (Here's a great guide on what to look out for). If you're still doubtful, go directly to the main website and login the way you usually do.
Phishing isn't only done through email. It can be any link on any website / chat room / text message / etc. Even ads that pop up can be malicious. Don't click on any sketchy looking links that ask for your information.
Use anti-virus & web security software, like Norton or McAfee.

Method 4: Stealing Cookies
Cookies allow a website to store information on a user's hard drive and later retrieve it. These cookies contain important information used to track a session that a hacker can sniff out and steal if they are on the same Wi-Fi network as the victim. They don't actually get the login passwords, but they can still access the victim's account by cloning the cookies, tricking Facebook into thinking the hacker's browser is already authenticated.


Firesheep is a Firefox add-on that sniffs web traffic on an open Wi-Fi connection. It collects the cookies and stores them in a tab on the side of the browser.

From there, the hacker can click on the saved cookies and access the victim's account, as long as the victim is still logged in. Once the victim logs out, it is impossible for the hacker to access the account.


How to Protect Yourself
On Facebook, go to your Account Settings and check under Security. Make sure Secure Browsing is enabled. Firesheep can't sniff out cookies over encrypted connections like HTTPS, so try to steer away from HTTP.
Full time SSL. Use Firefox add-ons such as HTTPS-Everywhere or Force-TLS.
Log off a website when you're done. Firesheep can't stay logged in to your account if you log off.
Use only trustworthy Wi-Fi networks. A hacker can be sitting across from you at Starbucks and looking through your email without you knowing it.
Use a VPN. These protect against any sidejacking from the same WiFi network, no matter what website you're on as all your network traffic will be encrypted all the way to your VPN provider.
Protecting Yourself: Less Is More
Social networking websites are great ways to stay connected with old friends and meet new people. Creating an event, sending a birthday greeting and telling your parents you love them are all a couple of clicks away.

Facebook isn't something you need to steer away from, but you do need to be aware of your surroundings and make smart decisions about what you put up on your profile. The less information you give out on Facebook for everyone to see, the more difficult you make it for hackers.

For more information on hacking or you need the service of a hacker kindly contact us via mail. (Dgf090293@gmail.com)

Wednesday, 21 January 2015

We are professionals interested in helping serious peoples

We are professionals interested in helping serious peoples in the below area.
Remove A Link
Mugshot Picture Removed
Blog Link Removed
Google Link Removed
Locate Missing People
Background Check
SSN Trace
Address History
7-Year National Criminal Database Search
Courthouse Verification of Criminal Database Records (up to 3)
National Sex Offender Registry Check

Online Dating Scams
Have you been scammed because all you were looking for was love? We can help you in 2 ways. Verify the person's identity before meeting the person and moving to the next step.
If you have been scammed online and would like to track the person's location so you can proceed with some type of action.
 
Cyber bully - Cyber Stalked
Have you been cyber bullied or cyber stalked? We can identity who is stalking and bullying you online. After identifying the person or group we can take appropriate actions you may like.

Computer Security Training
We can train you on all the tools computer hackers use to perform Reconnaissance, Hacks and Denial of Service Attack.

Cyber Extortion
Your ex-is threatening to post nude photos of you.
Someone have posted false information about you or your business
Someone has stolen your company information and wants money to return it.

Relationships
Find out if your boyfriend, girlfriend or spouse is cheating
Need ammo for a divorce


Tracking
Track a stolen computer
Track a stolen iPhone or Android phone
Track a person


Passwords
Did you forget your password?

Email cracking
Windows and Apple Password Cracking
Website Password Cracking
Database Password Cracking

Cyber Fraud
Have you been scammed? Did you purchase any service online and never received your product? We can help locate the person that scammed you anywhere in the world.


 If you are interested in any of the above service I will advice you contact us via email. Dgf090293@gmail.com