Most Frequently Used Unix-Linux Command Reference

مرسلة بواسطة بنجــــاح يوم dimanche 31 mars 2013 0 commentaires




n this article I would like to share a 'Unix/Linux Command Reference' guide with all Linux users. This document is a collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users. In this cheat sheet yo will find a bunch of the most common Linux commands that you’re likely to use on a regular basis. You will need to be root user in order to use some of these commands. Be extremely careful as root if you’re not 100% sure about what you’re doing. You can make your system unusable. You can download 'Guide' Here.
تابع القراءة ..

#OpFacebook - @OcsinoDeJuliFox ! .

مرسلة بواسطة بنجــــاح يوم 0 commentaires
#OpFacebook - @OcsinoDeJuliFox ! .

Deja esta web abierta para obtener la victoria


كود بلغة HTML:
http://static.anonhtml.com/3e83d5ba83.html

    
 
 
تابع القراءة ..

DDoS Tools

مرسلة بواسطة بنجــــاح يوم 0 commentaires
-Anonymous DoSer http://www.mediafire.com/?rrbmmms8c62jymr

-Anonymous External Attack http://www.mediafire.com/?49imnv3wh5fa4b5

-ByteDOS v3.2 http://www.mediafire.com/?ecbjw425kl4xtoj

-Hoic Vercion v2.1 http://www.mediafire.com/?q7jzd7z991z7k82

-LOIC http://www.mediafire.com/?79b5xqa10ddcnro

-PoWeRFuL DoSeR http://www.mediafire.com/?04q00er3z54kmzr

-Jays Booter http://www.mediafire.com/?q5ba9kb0cwuu5c5

-Site_Hog_v1_Release http://www.mediafire.com/?m9627jc0v2i12vd

-SYN-Flood-DOS http://www.mediafire.com/?jzax9kg4dhn1y6v

-Turbinas VolkSv1 http://www.mediafire.com/?af5f3fezzcxaabn

-rDos + Port Scanner http://www.mediafire.com/?juvcot3l11llt1x

-GoodBye v3.0 http://www.mediafire.com/?zyam8r9i05qb3kc

-Unicorn Booter (Download Link Available Soon)

-Joker IP Reserve Tool http://www.mediafire.com/?48vkvi3cgns5pa8
================================
big hackpack:
http://www.mediafire.com/?l5qds5n8bd1l5ma

================================
DEFACE TOOLS / Programme SQL

-RootKit http://www.mediafire.com/?iqrx57822ja4cbu

-Horny Monkey (Deface Maker) http://www.mediafire.com/?w0h8009g85zruaw

-xcvDefaceMaker http://www.mediafire.com/?u16ocimrui33aad

-xMid Deface Creator http://www.mediafire.com/?kmylctplymhl1g1

-Havij(SQL) http://www.mediafire.com/?637zfm7uwhfoobc


-Advanced Deface Page Maker http://www.mediafire.com/?it2dcbbulwkjoxh

PROTECT IP TOOLS

SumRando: https://www.sumrando.com/
Real Hide IP: http://www.mediafire.com/?o454kp9q44d9h0w
Hotspot Shield: http://hotspotshield.com/
Expat Shield: http://expatshield.com/
SecurityKISS: http://www.securitykiss.com/
CyberGhost: http://cyberghostvpn.com/

ONLINE DDOS TOOLS (Aucune installation requise)

http://tlran.4rumer.com/h3-pa-dosser (from Bill Asas)

http://www.anonymous-russia.ru/loic.php

http://localleaks.me/plf/loic/Anonymous.html

http://m.loshackers.webnode.es/loic-online/

http://www.anonymous-russia.ru/loic.php
تابع القراءة ..

The Social-Engineer Toolkit (SET) v4.7 released

مرسلة بواسطة بنجــــاح يوم 0 commentaires


The Social-Engineer Toolkit (SET) version 4.7 codename “Headshot” has been released. This version of SET introduces the ability to specify multi-powershell injection which allows you to specify as many ports as you want and SET will automatically inject PowerShell onto the system on all of the reverse ports outbound. What’s nice with this technique is it never touches disk and also uses already white listed processes. So it should never trigger anything like anti-virus or whitelisting/blacklisting tools. In addition to multi-powershell injector, there are a total of 30 new features and a large rewrite of how SET handles passing information within different modules

http://vimeo.com/61896197">http://vimeo.com/61896197" type="application/x-shockwave-flash" width="425" height="350">


Change log for version 4.7

removed a prompt that would come up when using the powershell injection technique, port.options is now written in prep.py versus a second prompt with information that was already provided
began an extremely large project of centralizing the SET config file by moving all of the options to the set.options file under src/program_junk
moved all port.options to the central routine file set.options
moved all ipaddr.file to the central routine file set.options
changed spacing on when launching the SET web server
changed the wording to reflect what operating systems this was tested on versus browsers
removed an un-needed print option1 within smtp_web that was reflecting a message back to user
added the updated java bean jmx exploit that was updated in Metasploit
added ability to specify a username list for the SQL brute forcing, can either specify sa, other usernames, or a filename with usernames in it
added new feature called multi-powershell-injection – configurable in the set config options, allows you to use powershell to do multiple injection points and ports. Useful in egress situations where you don’t know which port will be allowed outbound.
enabled multi-pyinjection through java applet attack vector, it is configured through set config
removed check for static powershell commands, will load regardless – if not installed user will not know regardless – better if path variables aren’t the same
fixed a bug that would cause linux and osx payloads to be selected even when disabled
fixed a bug that would cause the meta_config file to be empty if selecting powershell injection

added automatic check for Kali Linux to detect the default moved Metasploit path
removed a tail comma from the new multi injector which was causing it to error out
added new core routine check_ports(filename, ports) which will do a compare to see if a file already contains a metasploit LPORT (removes duplicates)
added new check to remove duplicates into multi powershell injection
made the new powershell injection technique compliant with the multi pyinjector – both payloads work together now
added encrypted and obfsucated jar files to SET, will automatically push new repos to git everyday.
rewrote the java jar file to handle multiple powershell alphanumeric shellcode points injected into applet.
added signed and unsigned jar files to the java applet attack vector
removed create_payload.py from saving files in src/html and instead in the proper folders src/program_junk
fixed a payload duplication issue in create_payload.py, will now check to see if port is there
removed a pefile check unless backdoored executable is in use
turned digital signature stealing from a pefile to off in the set_config file
converted all src/html/msf.exe to src/program_junk/ and fixed an issue where the applet would not load properly


It can also be downloaded through github using the following command:
git clone https://github.com/trustedsec/social-engineer-toolkit/ set
تابع القراءة ..

Script Execution flaw in Google drive poses security threat

مرسلة بواسطة بنجــــاح يوم 0 commentaires

Once again Google Security Team Shoot itself in the foot. Ansuman Samantaray, an Indian penetration tester discovered a small, but creative Security flaw in Google drive that poses phishing threat to million of Google users was ignored by Google Security team by replying that,"It is just a mare phishing attempt,not a bug in Google
According to Ansuman, he reported a JavaScript Script Execution vulnerability in Google Drive Files on 20th December 2012 to Google Security Team and but Google rejected the report on 21st December.


Ability to execute malicious script through Google drive files poses security threats, not just phishing attack, but an attacker able to extends the attack to malware spreading, etc.


The flaw exist in the way Google Drive preview the documents in the browser. Online preview of the files executing code written in doc files as HTML/JavaScript just by changing the value of a parameter called "export" in the URL.


ie. https://docs.google.com/uc?authuser=...xport=download .


When a Google user upload or create a file on Google Drive/Docs, then URL to that file having 'export' equals to "download" by default. So that user can download it.


But Ansuman found that if an attacker change this "export" parameter to "view", the malicious code written in the document file created by attacker will execute the code on browser.


ie. https://docs.google.com/uc?authuser=...Tg&export=view


"Any internet user can enter malicious scripts in the application which when sent as an email to a victim user can steal user’s information. Such attacks can be used to launch devastating XSS based attacks." he said to 'The Hacker News'



For Demonstration purpose we have uploaded a file on Google Drive @ Here (with download value) and Here (with view). A simple JavaScript code is written to Prompt Fake password login option to Re-authenticated user to view the Document, as shown above:
If successful, a remote file will log victim's password (here) and redirect to Google Drive homepage.


This is now the First time, Google security team failed to analyse the possible threat level. Last week, another Google Drive Clickjacking Flaw was refused by Google, that later extends to phishing attack.

تابع القراءة ..

How to Hack Facebook Passwords by adding into friend list

مرسلة بواسطة بنجــــاح يوم 0 commentaires
How to Hack Facebook Password: Facebook Password Hacker

Hacking Facebook Passwords
How to Hack Facebook Passwords by adding into friend list
These days many Facebook users have hundreds and possibly thousands of friends. More friends increase the chance that your Facebook account will be hacked – especially if you accept friend requests from people you do not know.

Critical vulnerability found on FACEBOOK



It isn’t entirely unusual that Facebook users receive friend requests from people they do not know. Often, those friend requests are blindly accepted in an effort to grow the friendship base. It seems that especially people with Facebook accounts that are primarily used for marketing purposes are more likely to accept friend requests from people they do not know than the typical Facebook user does.

Such accounts could be hacked easily, and there is no ingenious hacking talent required to do so: You simply need to walk through Facebook’s passwork recovery process with two other Facebook friends of a targeted account.

You can easily gain access to a your friends Facebook account through a collusion approach. You have to use Facebook’s password recovery feature, which is accessible through the “Forgot your password?” link on the Facebook login page.

Once identified the Friend, Facebook suggested to recover the password via the existing email address. However, you can bypass this hurdle by clicking the “No longer have access to these?” link. In that case, Facebook asks for a new email address. In the following step, Facebook presents the security question tied to the account. However, you can also to bypass the question by typing wrong answers three times in a row. After that, Facebook provides a rather surprising way to get your account back – via the support of three friends.
1. First, you select three friends “you trust”. These three friends then receive a code, which is required to change the account password.


2. Select yourself and immediately received a code from Facebook. With those three codes, you can easily change the password for the targeted account.


3. The problem clearly is that three friends you do not really know and cannot trust could potentially gain access to the victim Facebook account – through the standard password recovery feature.



4. To bypass problem mentioned in step 3 SOCIAL ENGINEERING. Create your own 2 more fake profiles and add the victim as a friend on facebook. Now get all the 3 codes and you are done.

NOTE: The targeted account will be locked for 24 hours after this password change and the user’s old email address receives a notification of the password change as well as the names of the three friends who were given the codes. However, if these are friends with fake names, it doesn’t quite matter that you now know their names.


Now if a Facebook user could in fact be in a situation when a Facebook account is not checked within a 24-hour period, particularly since we enjoy to flaunt our activities through Facebook status messages. And if the account is checked frequently, the account depends on Facebook’s response time, which can easily stretch to a number of days.

Bottom line is You don’t expose yourself to people you don’t know.

تعديل / حذف المشاركة
تابع القراءة ..

How To Delete Your Friend,s Facebook Account

مرسلة بواسطة بنجــــاح يوم 0 commentaires
How To Delete Your Friend,s Facebook Account

This tutorial is education purpose only, once deleted profile can never be recovered.
This is an extreme example of Social Engineering technique, we need following things to do so.

  • Victim’s profile link ( you can get it easily )
  • His/Her Email which he/she uses to sign in
  • His/Her birth date which he/she has used in the profile
  • Make an Email ID on gmail or yahoo with the first name and last name same as on victim’s facebook profile.
Ckeck Out Here

Now you will get this screen


  • Enter details. In the place of ‘ email address where you can be contacted ‘ enter the fake email u created.
  • You will get a email on that ID in which facebook people will ask your problem. Reply to them that you are XYZ( victim’s name ) and you cant access your facebook account. Also you have lost access to your Email Address associated with the account. You dont know what to do now. The hacker is coming online regularly and using your account. If the victim is a girl also write ‘ I am a girl and it poses threat to my social life ‘ and write anything you want that could make them take action.
  • After 2-3 days youu will get a reply. They will again ask you that you have access to your associated Email or not? Reply them that you still don’t have access to it. And repeat what all you wrote in first mail.
  • Next Day or Same Day you will get an Email that your account is disabled
تابع القراءة ..

Facebook Hacking Course

مرسلة بواسطة بنجــــاح يوم 0 commentaires
Facebook is termed as one of the biggest country in the world, as it is biggest social network today with millions of daily users. No doubt that it is one of the best target for hacking profiles & passwords for tampering. The very biggest mistake users do is “Lack of Awareness”
The only thing you can prevent hackers from attacking your account is to get to know how exactly hackers hack the Facebook. Rafay baloch, my good friend & best in class ethical hacking blogger has just launched his new online product which is “Facebook Hacking course” . He has already written and sold hundreds of copies of his book Beginners Guide to Ethical Hacking.
The Facebook Hacking Course contains series of videos which will tell you exactly how hackers hack facebook accounts, What methods they use and how you can prevent yourself from these attacks.
What Exactly is Included in Facebook Hacking Course
This hacking course is presenting very cool Video Modules with step by step guide to hack Facebook passwords. These modules are very nicely compiled for beginners as well as advanced users. I have personally gone through its modules and Rafay is a great teacher in Hacking – I Must say. He have also included one of my favorite Sandboxie module fro checking & executing infected applications in sandbox.
Not Just this Amazing Course, ”You Also Get these Goodies For Free

1.Secret Anonymizing Techniques
This section will contain 2 bonus videos which will tell you the exact methods used by hackers to hide their identity while doing malicious things online. Another awesome tutorial !!!
2.Direct Email Access and support
If you get stuck any where, or have some problem executing the tutorial – You can send an email to rafay baloch and he will help you no matter how much time it takes him. What else you need – a great product &personal help from expert.
So Do Not Wait at All & get access to the amazing Facebook Hacking Course with two great bonuses from Rafay Baloch.
تابع القراءة ..

Google war against account hijackers

مرسلة بواسطة بنجــــاح يوم 0 commentaires



Every day, cyber criminals break into websites to steal databases of usernames and passwords and with stolen passwords in hand, attackers attempt to break into accounts across the web and across many different services. In a recent post, Google said that it has put security measures in place that have greatly reduced the number of successful hijack attempts. "protect your account by making sure you’re using a strong, unique password for your Google Account, upgrading your account to use 2-step verification, and updating the recovery options" In the last few years, the company has added a number of security systems to Gmail and its other services to help protect users' accounts. "Our security systems have dramatically reduced the number of Google Accounts used to send spam over the past few years" Google said.
تابع القراءة ..

Facebook hacking accounts using another OAuth vulnerability

مرسلة بواسطة بنجــــاح يوم 0 commentaires

Remember the last OAuth Flaw in Facebook, that allow an attacker to hijack any account without victim's interaction with any Facebook Application, was reported by white hat Hacker 'Nir Goldshlager'. After that Facebook security team fixed that issue using some minor changes

Yesterday Goldshlager once again pwn Facebook OAuth mechanism by bypassing all those minor changes done by Facebook Team. He explains the complete Saga of hunting Facebook bug in a blog post.


As explained in last report on The hacker News, OAuth URL contains two parameters i.e. redirect_uri &next, and using Regex Protection (%23xxx!,%23/xxx,/) Facebook team tried to secure that after last patch.



In recent discovered technique hacker found that next parameter allow facebook.facebook.com domain as a valid option and multiple hash signs is now enough to bypass Regex Protection.


He use facebook.com/l.php file (used by Facebook to redirect users to external links) to redirect victims to his malicious Facebook application and then to his own server for storing token values, where tokens are the alternate access to any Facebook account without password.

But a warning message while redirecting ruin the show ! No worries, he found that 5 bytes of data in redirection URL is able to bypass this warning message.

Example: https://www.facebook.com/l/goldy;tou...pps/sdfsdsdsgs (where 'goldy' is the 5 byte of data used).

Now at the last step, He Redirect the victim to external websites located in files.nirgoldshlager.com (attacker server) via malicious Facebook app created by him and victim's access_token will be logged there. So here we have the final POC that can hack any Facebook account by exploiting another Facebook OAuth bug.

For all browsers:
https://www.facebook.com/connect/uis...nse_type=token

For Firefox browser:
https://www.facebook.com/dialog/perm...il&fbconnect=1

This bug was also reported to Facebook Security Team last week by Nir Goldshlager and patched now, if you are a hacker, we expect YOU to hack it again !

Note: To report your hacks or finding to 'The Hacker News' technical team, you can mail us at admin@coeuracoeur.ch
تابع القراءة ..

How To Hack Facebook/Myspace/Orkut Or Any Email

مرسلة بواسطة بنجــــاح يوم samedi 30 mars 2013 0 commentaires
How To Hack Facebook/Myspace/Orkut Or Any Email By Keylogging
Fud Long Time


Rapzo Logger v 1.5 ( Public Edition )By Rapid





" Virus Results By Scan4you.net 0/32 "(Paid Host )







Options

Stealers [6] All Stealers Pure Code - No Drops + Runtime FUD

[#] Firefox 3.5.0-3.6.X
[#] DynDns
[#] FileZilla
[#] Pidgin
[#] Imvu
[#] No-Ip

Features [25]

* Full UAC Bypass & Faster Execution
* Coded in Vb.NET
* Min Req Is .net 2.0 Now A days every pc Have it
* Cool & user friendly GUI
* Easily Understandble
* Encrypt Information
* Encrypt E-mail information
* 100% FUD from all AV's
* 4 Extentions [ . exe | .scr | .pif | .com ]
* Keylogger support - Smtp[Gmail,Hotmail,live,aol,]
* Test E-mail - is it vaild or not.
* Customize the "To" e-mail address.
* Screen Logger
* Cure.exe to remove server from your Compute
* Usb Spreade
* File pumper - Built-in
* Icon Changer - Preview
* Logs are nice and clear
* Log Letters - ABCD etc.
* Log Symbols - !@#$% etc.
* Log Numbers - 12345 etc.
* Log specific key's - [F4][F5][TAB][HOME][Pg Dn][Pause Break][Prtsc SysRq].. Etc.
* Hidden really good & invisible
* Send new logs over and over again
* ReadMe.txt - How To Use
* Vedio Tutorial - How To Use
Working on all Windows Operating System's - [Winxp\vista\W7] --- [32 + 64 ] Bit Computers


Steler Logs :





Who Wanna Change Assembly See This



Download LinkS


http://www.mediafire.com/?belchwxdl6z2xl9

http://akenload.com/download/141/RapZo_L..._.rar.html


http://www.megaupload.com/?d=IFRRHPBX

http://rapidshare.com/files/418946168/Ra...tion__.rar
تابع القراءة ..

برايفت تحكم في اي حساب فايسبوك 2013

مرسلة بواسطة بنجــــاح يوم 0 commentaires
السلام عليكم ورحمة الله تعالى و بركاته


اخواتي في الله الي لكم اليوم كتاب من اروع ما قرات
لكيفية التحكم في اي حساب فايسبوك عن طريق برنامج Cain الكل يعرفه
كل ماعليك قراءة الكتاب و الله روعة
من هنا للتوجيهك لصفحة التحميل

كود بلغة HTML:
     http://up4.hulkload.com/files/3/jgze7k1mrjsqnd/Compromising Facebook Account .7z

password : fouade
تابع القراءة ..

How I Hacked Facebook OAuth To Get Full Permission On Any Facebook Account (Without A

مرسلة بواسطة بنجــــاح يوم 0 commentaires
How I Hacked Facebook OAuth To Get Full Permission On Any Facebook Account (Without App "Allow" Interaction)


Posted by Nir Goldshlager at 7:18 AM
Hi,

I decided to share one of my favorite flaws i discovered in facebook.com,


This flaw allowed me to take a full control over any Facebook account,

By exploiting this flaw I could steal unique access tokens that provides me full control over any Facebook account,

just to clarify there is no need for any installed apps on the victim's account,Even if the victim never allowed any application in his Facebook account, I could still be getting full permissions (This bug works on any browser)

To make this exploit work, The victim only need to visit a webpage,
So OAuth is used by Facebook to communicate between Applications and Facebook users,Usally users must allow/accept the application request to access their account before the communication can start.

Any Facebook application might ask for different permissions,

For example:


Diamond Dash,Texas Holdem Poker only have permission to basic information and post on user's wall,







I found a way in to get a full permissions (read inbox, outbox, manage pages, manage ads, read private photos, videos,etc..) over the victim account even without any installed apps on the victim's account,
Another advantage in the flaw I found is that there is no "Expired date" of the Token like there would be on any other application usage, In my attack the token never expires unless the victim change his password ,

So, The URL of the OAuth dialog look like this:

https://www.facebook.com/dialog/oaut...RMISSION_NAMES

Every application in Facebook have different app_id, For example 'Diamond Dash' will be app_id=2, And 'Texas Holdem Poker' will be app_id=3

The next,redirect_uri parameter (next=,redirect_uri=), only accepts the owner app domain,

For example app_id=2389801228 belongs to 'Texas Holdem Poker' app, So the 'next' parameter will allow only zynga.com domain (i.e next=http://zynga.com),

If the domain is different (nirgoldshlager.com) in the 'next', 'redirect_uri' parameter, Facebook will block this action,







Facebook perform match between your app_id and your next parameter,Facebook also sends the access token via GET request to the owner application after the user allowed it,
Now that we know how Facebook OAuth works, Lets talk about my finding,

I started to think of my options, what if i can redirect the application OAuth Request to a different 'NEXT' URL?? First i tried to change the 'next' parameter to a different domain and they block my action,

Then i tried to change the next parameter to facebook.com domain, and got blocked again with general error message,








I found that if you use a sub-domain for example: xxx.facebook.com, Facebook will allow this action,


But if you try to access folders / files in x.facebook.com (x.facebook.com/xx/x.php), Facebook block you,


So i notice that facebook.com use a Hash sign and ! in there URL (x.facebook.com/#!/xxxx),
I tried to perform this action in the next parameter (next=x.facebook.com/%23!/), And Facebook blocked me again!,

Then i tried to put "something" between the hash sign and the ! (%23x!), And Facebook didn't block this action,
Seems that there is a Reg-ex protection, Cool!,


But wait!,



If we put something like this (https://beta.facebook.com/#xxx!/messages/), the action will not treat at is the same as #! in our client, and will not redirect us to the message screen,



I figured I had to find a way around it, so I started to fuzz characters between ! and # so I can make any browsers (IE,CHROME,Safari, Firefox..) treat it like #!,


Now it's time for fuzzing!,

Result:

%23~! (Works on all browsers)
%23%09! (Works on all browsers)

Cool!, this trick works on touch.facebook.com/#%09!/,m.facebook.com/#~!/, or any other Facebook mobile, touch domain),



So Now I'm able to redirect the victim to any Files / Directories in any Facebook Sub-domain,



Then i created a Facebook application that will redirect the victim to external website for sending the access_token of the victim to my "malicious" external website,


For Example: (Zynga Texas Holdem OAuth Bypass):


https://www.facebook.com/connect/uiserver.php?app_id=2389801228&next=https%3A%2F%2F touch.facebook.com%2F%23~!%2Fapps%2Ftestestestte%2 F&display=page&fbconnect=1&method=permissions.requ est&response_type=token

The next parameter will redirect to my Facebook application (touch.facebook.com/apps/testestestte),

And my Facebook application will redirect to files.nirgoldshlager.com domain and save the victim access_token in a log file (files.nirgoldshlager.com/log.txt),

Amazing!, Now I'm able to steal access tokens of any Facebook application,

But wait!!!,




HERE COMES THE REAL DEAL:

To make a successful attack, the victim need to use a Facebook application (Texas Holdem Poker, Diamond Dash, etc..),
And these applications only have a basic permissions, We can always change the scope of the application permission and set a new permission but this method not powerful, Because the victim need to accept the new permissions of the app (https://www.facebook.com/connect/uiserver.php?app_id=2389801228&next=http://zynga.com&display=page&fbconnect=1&method=permissi ons.request&response_type=token&perms=ads_manageme nt%20create_event%20create_note%20email%20export_s tream%20manage_friendlists%20manage_groups%20manag e_notifications%20manage_pages%20offline_access%20 photo_upload%20publish_actions%20publish_checkins% 20publish_stream%20read_friendlists%20read_insight s%20read_mailbox%20read_page_mailboxes%20read_requ ests),













I wanted something more powerful!,



Something that will give me full permissions (read inbox, outbox, manage pages, manage ads,access to private photos, videos, etc.) on the victim's account without any installed application on the victim and make Facebook do the Goldshake ,

So i started thinking
How this can be done?,


What if i will use a different app_id?? app_id of Facebook Messenger for Example,
Does the user need to accept Facebook Messenger app in his Facebook account?,

The answer is no,
There are built-in Applications in Facebook that users never need to accept , And this application have a full control on your account,
Also i found that this access_token never expired in Facebook messenger,



Only after the victim change his password, Then the access_token will be expired, But why the hell the user would change his password?,

PoC (Works on all browsers, No need for installed application on the victim account) :

https://www.facebook.com/connect/uiserver.php?app_id=220764691281998&next=https%3A% 2F%2Ftouch.facebook.com%2F%23~!%2Fapps%2Ftestestes tte%2F&display=page&fbconnect=1&method=permissions .request&response_type=token

Facebook Security Fixed this bug

Full description of permission for Facebook messenger app:

ads_management create_event create_note email export_stream manage_friendlists manage_groups manage_notifications manage_pages offline_access photo_upload publish_actions publish_checkins publish_stream read_friendlists read_insights read_mailbox read_page_mailboxes read_requests read_stream rsvp_event share_item sms status_update video_upload xmpp_login

Works also on 2 step verification accounts, When it came to access_token , 2 Step verification will fail.

And???,

تابع القراءة ..

اختراق الفيس بووك هل وهم ام حقيقه

مرسلة بواسطة بنجــــاح يوم 0 commentaires
شبااب هدا فديوو
اخترراق فيس بووك
2013 هل
هي صحيحه او لعب في الفديوو
اخوااناااي
كيف عملهاا فهمووني

انتظرر رردودك على احرر من الجمرر ياا نااس ماا تبخلووش اي ثغرره المفرروط الكل يعررفهاا من شان ندمر
الفيس بووك الانه اسررئيلي
مع خااص احتررامي

https://www.youtube.com/watch?v=pt9bVbnF6Pg

جميع حقوق محفوظة لدى منتديات '' القلب الى القلب ''
تابع القراءة ..

حصريآ وقف أي حساب فيسبوك و الله حتى الشغالة

مرسلة بواسطة بنجــــاح يوم 0 commentaires
السلام عليكم و رحمة الله تعالى و بركاته

اليوم سنشرح لكم كيفية توقيف حساب الفيسبوك

هنا الرابط الموقع تفضل بدخول :




http://www.coeuracoeur.ch/vb/fb



أرجوكم لا تضحي بأخوك المسلم فحارب معنا الياهود... و لك أجــر كبير " أخوكم ستار القنيطري دائما معكم " و شكرآ



Step 1. Selecciona Target:

URL:www.Facebook.com/.....Victim

Step 2. Listo?

Dejar de Disprar





و لآن سوف يبدأ العداد بضغط على الفيسبوك إذ لم يعمل لك أنت فقط أعمله أنت و صديقك بجهازين..


و أي مشكل و أي استفسار فأنا معكم


أخوكم : ستار القنيطري

تابع القراءة ..

جديد اختراقات حسابات الفيس بوك 100%

مرسلة بواسطة بنجــــاح يوم 0 commentaires
جديد اختراقات حسابات الفيس بوك 100%



بسم الله الرحمن الرحيم

شرح اختراق حسابات فيس بوك طريقة 3

الدرس عن طريقة التحايل على موقع فيس بوك

ندخل فيس بوك ونضغط على كلمة استعادة باسوورد (Mot De passe oublié )



تفتح النة صفحة اول مربع نخلي بي ايميل الضحية



راح تفتح الصفحة و نضغط على (
Vous n’avez plus accès aux éléments suivants ? )



هسة هنانة راح تفتحة صفحة يكلك خلي ايميل جديد تستعيد علية



هسة يطلب سؤال سري جوابة اذا متعرفة مال الهدف دخل 3 خطأ وراح يكلك اعرف 3 من الاصدقاء وهاي سهلة نكدر ندخل لحساب الضحية من غير حساب ونشوف اصدقائه ونختار





ومبروك عليك اختراق الحساب


أخوكم : HACKED HB
تابع القراءة ..

طريقة بسيطه لاختراق الفايس بوك

مرسلة بواسطة بنجــــاح يوم 0 commentaires
لمهم الموضوع واضح من العنـوان مـآرح أطول عليكم شرح بسيط للمبتدئين طبعاً

نَـبدأ عـلى بركة الله :

أول ندخل على بريد الهوتميل => www.hotmail.fr
ونقوم بتغيير الإسم إلـى => facebook. مثل الصورة .



ثـآنيا نـَأخذ أي رسالة وصلتنا من الفايس بوك و ننسخها و نعمل رسالة جديدة مثل الصورة



و في الأخير أتمنــآ أنكم استفدتوو و أي استفسار أنــآ موجود ^^

فِـي أمــآن الله .
تابع القراءة ..

اسهل طريقة لعمل صفحة مزورة

مرسلة بواسطة بنجــــاح يوم 0 commentaires


السلام عليكم و رحمة الله و بركاته


اليوم راح اشرحلكم اسهل طريقة لعمل الصفحات المزورة

لتحميل الشرح اضغط

هنا

طبعا هذا اول شرح لي بالصوت فاذا كان صوت مزعج انشاء الله في المواضيع الجاية اكتب بس

على عموم


have fun
شباب ابي منكم كلمتين حلوين عشان اواصل المشوار و التقيم
مع تحياتي

hack4sniper
تابع القراءة ..