Technical Mohit

Learn Blogging in Blogger-Free Blogger tutorials in English/Hindi/Urdu.

Latest Movie

Sunday, 29 October 2017

October 29, 2017

EARN MONEY APPS

DOWNLOAD EARN MONEY APP AND INJOY
100% WORKING APPLICATION DOWNLOAD AND EARN MONEY

हेलो फ्रेंड आप को ये जान कर खुसी होगी की आप को सबसे ज्यादा पैसा कामनें वाली ऐप दे रहा हु जिसके मदद से आप ज्यादा पैसा कमा सकते है |

HOW TO USE EARN PAYTM CASH VIDEO



EARN FREE PAYTM CASH LINK APK :-https://drive.google.com/open?id=0B1kUbCCQpsFnSE0ya0Y5cnV4eHc


PAYTM WORLD CASH APK LINK :- https://drive.google.com/open?id=0B1kUbCCQpsFneHBITUVUWi1SQW8

HOW TO USE WORLD PAYTM CASH VIDEO

EARN UNLIMITED PAYTM CASH FREE NO INVESTMENT

THANKS....


Saturday, 14 October 2017

October 14, 2017

FACEBOOK HACKER | HACKING FACEBOOK ACCOUNT IN MINUTES AND ITS PREVENTION

FACEBOOK HACKER | HACKING FACEBOOK ACCOUNT IN MINUTES AND ITS PREVENTION


How to hack a Facebook account online?


Hacking Facebook / Facebook Hacker is one of the most searched and hot topics around the Internet, like Gmail hacker. We have prepared a detailed list of how hackers can hack someone’s Facebook account easily in just a few minutes and how could we prevent the same. For your information, this is 4000+ words article with a lot of useful information, so it is not possible for most of you to read the complete article right now. We have created a PDF of all the techniques listed below for offline download, therefore you can store it on your mobile or computer to read whenever you get time.


Being a FB white hat hacker, I get following questions frequently from the people:

  • Is there any online Facebook cracker tool?
  • Where can I get FB hacking software from?
  • Is there any free Facebook password finder?
  • How can I hack someone’s facebook account easily?

To the best of my knowledge, there is no such tool. You won’t be able to find it anywhere. However, if you google it, you would find many websites claiming that they are providing free hack tool either online or offline, but you cannot download the password file without completing a survey. Even after going through a tiresome process ofcompleting a survey, you get nothing in the endThese things are posted only with the intention of making money. Don’t waste your precious time in searching such hack tool.

If you want to know how hackers can hack someone’s Facebook account, please go ahead and read the techniques listed below. The most successful method among all of these techniques is PHISHING. Phishing enables someone with no or little technical knowledge to hack Facebook account’s password easily in just a few minutes.

Check out this phishing guide to know more about PHISHING!
Some of the techniques listed below are not applicable only to FB, rather they are applicable to all daily used internet websites, such as Google, Twitter, Yahoo etc.
"You won’t be vulnerable to hacking if 
you understand how hacking works"

This article is written with the aim of educating people about how hacking works and how should they prevent it. Please don’t use these techniques for malicious purposes.

12 ways to hack someone’s Facebook account | Prevention and Safety Measures – 2017


Phishing is the most common technique being used for hacking FB passwords. It is very easy for someone who is having little technical knowledge to get a phishing page done. That is why phishing is so popular. Many people have become a victim of Phishing page due to its trustworthy layout and appearance.

How does phishing work?


In simple words, phishing is a process of creating a duplicate copy of the reputed website’s page with the intention of stealing user’s password, or other sensitive information like credit card details. In our topic, it means creating a page which perfectly looks like Facebook login page but in a different URL like facebookcom, or any URL which pretends to be legit. When a user lands on such a page, he/she might think that is the real Facebook login page, asking him/her to provide his/her username and password. So, the people who do not find phishing page suspicious might enter their username & password. The password information will be sent to the Facebook hacker who created the phishing page. At the same time, the victim gets redirected to original FB page.

Example: John is a programmer. He creates a FB login page with some scripts that enable him to get the username and password information. John puts this fake login page in . Peter is a friend of John. John sends a message to Peter, “Hey Peter, I have found a free trick to make money online easily, you should definitely take a look at. Peter navigates to the link and sees a Facebook login page. As usual, Peter enters his username and password of FB.

The hacking part


Immediately, the username and password of Peter was sent to John and Peter gets redirected to a money making tips page https://www.facebouk.com/make-money-online-tricks-tips-free.html. That’s all; Peter’s Facebook account is hacked.

Please note that phishing can be done by a third person through emails; that is how it happens most of the time. So always beware of phishing emails, else you may lose your Facebook account, or credit card details, or any other sensitive data. Learn more about phishing

How could you protect yourself against online FB phishing?

Hackers can reach you in many ways; email, personal messages, FB messages, website ads etc. Clicking any links from these messages would lead you to a Facebook login page. Whenever you find a FB login page, you should note only one thing which is URL. Because nobody can spoof/use Facebook URL except when there are some XSS zero day vulnerabilities, but that’s very rare.
  1. What is the URL you see in browser address bar?
  2. Is that really https://www.facebook.com/ (Trailing slash is very important, since it is the only separator in Google chrome to distinguish domain and sub domain. Check out the below examples to know the difference)?
  3. Is there a green color secure symbol (HTTPS) provided in the address bar?
Bearing these questions in mind should prevent you from getting hacked of online phishing pages. Also, see the below examples of phishing pages.
Some super perfect phishing pages are listed below.

SSL Certificates (HTTPS) can be obtained from many online vendors. A few vendors give SSL Certificate for Free for 1 year. It’s not a big deal for a novice to create a perfect phishing page like this. So, beware of it.

This is a normal FB Phishing page with some modification in the word Facebook.

2 Social Engineering

This is the second most common technique of hacking Facebook accounts. In fact, this method shouldn’t come under Hacking, since much knowledge is not required for this method. I am listing this method under hacking to ensure the list of most common techniques being used for FB account hacking in their respective order. Social engineering is basically a process of gathering information about someone, whose account you need to hack. The gathered information includes the date of birth, mobile number, boyfriend/girlfriend’s mobile number, nickname, mother’s name, native place etc.

How does Social Engineering work?

Security Question










FB-Social-Engineering-Security-Question

Many websites have a common password reset option called Security Question. Most common security questions would be:

What is your nickname?

Who is your first-grade teacher?

What is your native place?

or

Any custom questions defined by the user.

Obtaining such information from the respective people might let us hack into their account. Facebook too provides security question as a password recovery option.  So, if anyone gets to know the answer to it, they could hack account using forgot password option.

Most Common and Weak Passwords

Security Question does not let you get into others FB account easily. But, setting a weak password could easily allow any of your friends to hack your account.
What is a weak password in this scenario?
A password which can be easily guessed by a third person is called weak password.  
Below are some of the most common passwords people tend to use on Facebook.
  • Mobile Number
  • Nickname / Name and Date of Birth Conjunction
  • Boy Friend’s Mobile Number / Girl Friend’s Mobile Number – Most of the lovers 😛
  • Girl Friend’s / Boy Friend’s Name – Most of the lovers 😛
  • Boy or Girl Friend Name Combination
  • Bike Number
  • Unused / Old Mobile Number
  • Pet Name
  • Closest Person Name (can be friends too)
Now, be honest and comment here if you are one of the people who have any one of the common passwords mentioned above. Don’t forget to change your password before making a comment 😉

How can you protect yourself from Social Engineering? 

Security Question

Don’t have a weak or familiar security question/answer. Therefore it should be known only to you. You can set your Facebook security question here.  Additionally, FB provides an option called “Login Alerts” under Facebook Security Settings. You should add your mobile or email there to get notified whenever your Facebook account is logged in to a new or unknown device.

Most Common and Weak Passwords

It is very simple. Change your Facebook password now if you have any one of the weak passwords stated above.

You might also be interested in hacking facebook fan page article

3 Plain Password Grabbing

insecure-plain-password-grabbing
This is another common method being used to steal Facebook user’s password. Most people are unaware of this method, but traditional hackers use this method to hack user accounts.

How does Plain Password Grabbing works? 

In this method, the Facebook hacker/attacker targets a particularly low-quality website, where the victim is a member, and hacks their database to get the stored plain username & password of victim.
How could the hacker/attacker get access to Facebook?
Many of us use the same password for FB and some poorxyz.com. So, it’s easy for a Facebook hacker to get your password through the low-quality poorxyz.com.
In another scenario, the Facebook hacker/attacker creates a website with the intention of getting victim’s password. Whenever a user signs up or registers his account using email and creates a password, those details will get stored in their database of the hacker/attacher. So, hacker/attacker gets your email and password. Common people, who use same email and password for these kinds of low-quality websites, might end up getting their Facebook account hacked.

How could you protect yourself from Facebook Plain Password Grabbing? 

You should never trust the third party low-quality websites. Even the passwords of popular websites, like LinkedIn, are getting hacked. So, never and ever trust the third party low-quality websites.
Most of the website developers are storing plain passwords in a database without even thinking about encryption or security. This makes Facebook hackers’ job easy, since the password is stored as plain text.
Best way to prevent this method is to have a unique password at least for websites that you really trust. Don’t use your FB password for any other website/portal, so your password will never get exposed.






October 14, 2017

A step by step guide: How to hack Apple and Amazon

A step by step guide: How to hack Apple and Amazon





Those who have been to my talks on security would know that I talk allot about Social Engineering. No matter what security you have in place, the weakest point is always the human operator.
This horrific tale was recently published detailing how “in the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook.”
In summary, a hacker, used his skills to get 4 pieces of information. Using the information blocks, the hacker managed to ruin Mat Honan digital life. The hacker did not use clever software, nor did he install hidden key loggers, nor did he use brute force to guess passwords. All the hacker did was exploit the weakest link – the human call centre operator.
What was the motive ? Political ? Power ? Money ? nope – it was done  to simply take over Mat’s three-character Twitter handle. Nothing more.
I have taken information from the report that was posted at this link and broken it down as a lesson for us all.  Please read the entire article for your own leanings.
How was this hack was committed:

The hacker started by looking at the Twitter account. The Twitter account was linked to Mat’s website. There they found his Gmail address. Information point 1. 
They went to Google’s account recovery page.  The hacker entered the Gmail address, which showed him the alternate e-mail that was set up for account recovery. Whilst Google partially obscures that information, he saw: “m••••n@me.com”. Information point 2. “the .Me e-mail account as a backup meant told the hacker I had an AppleID account”
Why is the AppleID account critical ?
AppleID tech call center staff need just 3 pieces of information in order to identify a legitimate client: The e-mail address (hacker has that already), Billing address (easily looked up on the net with tool like Whois, Spokeo, WhitePages, and PeopleSmart), the last four digits of credit card.
This is where most people would be stumped. How do you get someone’s credit card number ? Turns out to be pretty simple.
Getting credit card number:
Hacker calls Amazon and tell them that he is the account holder and wants to add another credit card number to the account. Amazon call centre staff verifies clients by asking for the name (got that), an associated e-mail address (got that), and the billing address (got that). All three pieced of information are available already. Amazon then allows for the addition of a new credit card.
Hacker then calls Amazon back later and tell Amazon that he has lost access to his account. Provides a name, billing address, and the new credit card number you just gave the company on the previous call.  This authenticates him and the Amazon call centre staff grants him access.
Now hacks just logs onto the Amazon site and send a password reset to the new e-mail account. This allows him to see, amongst other things, all the credit cards on file  — not the complete numbers, just the last four digits.
Tada. Hacker now has the last piece of information that is required for Apple call centre staff to let him in.
[side note: What if you don’t have an Amazon account ? Not a problem. Remember that whenever you hand over your credit card to anyone, they can take note of your last four digits. For a couple of bux you can get that info.]

Final step:
Just call Apple, give them the info they need which you now have and you have full access to the AppleID account. Which means you can wipe everything, find the phone, tablet, MAC book etc.
You also have access to all contacts, documents and every other content stored in the Cloud.
Full access to the Amazon account and to Gmail too.
The learning points:
Lots of learning points. Its amazing how simple getting access is. With some research and social engineering skills people are vulnerable  – especially those who are not armed with the information on what to look out for. I suggest reading the entire article and see what you need to change in the way you operate so that you are not a victim full Article here


    Thursday, 12 October 2017

    October 12, 2017

    Reliance Jio offers 100% cashback, rate lock-in on Rs399 recharge by 18 October

    Reliance Jio offers 100% cashback, rate lock-in on Rs399 recharge by 18 October


    New Delhi: Reliance Jio on Thursday unveiled a ‘Diwali Dhan Dhana Dhan’ offer, promising 100% cashback and locking-in of existing tariff benefits for consumers recharging with Rs399 between 12 and 18 October.
    This pre-paid offer will work like an advance recharge, meaning subscribers opting for it can use the same after their ongoing validity expires.
    The offer — which comes right ahead of Diwali and a day after Bharti Airtel’s announcement of low-cost 4G smartphone with a bundled plan —is set to generate more competitive heat in the telecom sector that has of late become a tariff battleground, especially after the entry of the new-comer Reliance Jio.
    According to Jio sources, the recharge will lock in all the existing tariff benefits currently being offered under the Rs399 plan, including 1GB of 4G data a day for 84 days, and free unlimited outgoing voice calls and SMSes as well as domestic roaming.
    The offer, said the source, is for recharges between 12 and 18 October, and a tariff plan revision is being planned from 19 October. When contacted, the Jio spokesperson refused to comment.
    Explaining the full cashback offer, the official who did not wish to be named, said Rs400 cashback will come in the form of eight vouchers of Rs50 denomination. Those can be used one at a time, after 15 November, against future recharges of Rs309 and above plans and data add-ons of Rs91 and above.
    Bharti Airtel, India’s biggest telecom firm with over 281 million subscribers, yesterday announced a tie-up with handset maker Karbonn Mobiles to bring a 4G smartphone at the price of feature phone, a move aimed at taking on Reliance’s ‘free’ JioPhone offer.

    Tuesday, 10 October 2017

    October 10, 2017

    2017 Diwali Festival in India: Essential Guide

    2017 Diwali Festival in India: Essential Guide


    How, When and Where to Celebrate Diwali in India

    Diwali (or Deepavali in Sanskrit) literally means "a row of lights". This five day festival, which is the biggest in India, honors the victory of good over evil and brightness over darkness. It celebrates Lord Rama and his wife Sita returning to their kingdom of Ayodhya, following Rama and monkey god Hanuman's defeat the demon King Ravana and rescue of Sita from his evil clutches (on Dussehra).

    When is Diwali?

    In October or November, depending on the cycle of the moon.
    In 2017, Diwali starts with Dhanteras on October 17. It concludes on October 21. The main festivities take place on the third day (this year, on October 19)Diwali is celebrated a day early in south India, on October 18.
    Find out when is Diwali in future years.

    Where is the Festival Celebrated?

    Throughout the whole of India. However, the festival isn't widely celebrated in the state of Kerala. The question is often asked as to why this is. The answer seems to simply be that the festival has never really evolved there, as it's not part of the state's social fabric and distinctive culture. An alternative explanation that's offered is that Diwali is a festival of wealth for merchants, and the Hindus of Kerala have never freely engaged in trade as the state is a Communist ruled one. However, Diwali dates back to long before this. The main festival that's celebrated in Kerala, and which is specific to the state, is Onam.

    How is the Festival Celebrated?

    Each day of the festival has a different meaning.
    The first day, Dhanteras, marks the start of Diwali. It's dedicated to celebrating wealth. People traditionally buy gold and new kitchen utensils on this day. Homes are also cleaned and readied to welcome Goddess Lakshmi, the goddess of prosperity, inside.
    The second day is known as Naraka Chaturdasi in south India or Choti Diwali (Little Diwali) in north India. Rangoli (Hindu folk art) is created in doorways and courtyards of homes, and people start bursting crackers. Lord Krishna and Goddess Kali are believed to have destroyed the demon Narakasura and freed 16,000 captive princesses on this day. Demon effigies are widely burned in Goa in celebration. Kali Puja is also celebrated on this day in West Bengal, Odisha, and Assam.
    On the third and main day, lots of small clay lamps (called diyas) and candles are lit and placed in houses, and fireworks are let off everywhere, giving Diwali its name of “Festival of Lights”. Families gather together and perform the Lakshmi Puja, and give each other gifts and sweets.
    On the fourth day, merchants open fresh accounts for the new year, and offer prayers.
    The fifth and last day, known as Bhai Duj, is dedicated to celebrating sisters. Brothers and sisters get together and share food, to honor the bond between them.
    If you're wondering about where to best experience Diwali and what to do for the occasion, these 8 Ways and Places to Celebrate Diwali in India will give you some inspiration.
    Tripadvisor (in conjunction with Viator) offers Diwali experiences with local Indian families in Delhi and in Jaipur.

    What Rituals are Performed During Diwali?

    The rituals vary according to region. However, special blessings are given to Lakshmi, the Goddess of wealth and prosperity, and Ganesha, the remover of obstacles. The Goddess Lakshmi is believed to have been created from the churning of the ocean on the main Diwali day, and that she'll visit every home during the Diwali period, bringing with her prosperity and good fortune. It’s said that she visits the cleanest houses first, therefore people make sure their houses are spotless before lighting lamps to invite her in. Small statues of the Goddess are also worshiped in people’s homes.

    What to Expect During the Festival

    The candlelight makes Diwali a very warm and atmospheric festival, and it's observed with much joy and happiness. However, be prepared for lots of loud noise from the fireworks and firecrackers going off.
    The air also becomes filled with smoke from the firecrackers, which can add to breathing difficulties.

    Safety Information

    It's a good idea to protect your hearing with ear plugs during Diwali, especially if your ears are sensitive. Some crackers are extremely loud, and sound more like explosions. The noise is very damaging to hearing.