Skip to main content

Posts

Showing posts from December, 2017

Mobile Hack Tricks

Encrypt your Internet. Use  Top Secure VPN  For Online Privacy Call Forging: To call someone from their own number or any number. 1. Go to  http://www.mobivox.com  and register there for free account. 2. During registration, remember to insert Victim mobile number in “Phone number” field as shown below. 3. Complete registration and confirm your email id and then login to your account. click on “Direct WebCall”. 4. You will arrive at page shown below. In “Enter a number” box, select your country and also any mobile number(you can enter yours). Now, simply hit on “Call Now” button to call your friend with his own number. 5. That’s it. Your friend will be shocked to see his own number calling him. I have spent last two days simply playing this cool mobile hack prank. Note: This trick will only knowledge purpose… Just try this trick only known person. Trace Mobile Location: Click On Below Link To Trace Unknown Number -> Trace Mobile Location

Getting Started with Metasploit

This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available. My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing professionals. There are hundreds of tools out there, but I will focus and those that meet four key criteria: Open source Free High quality Widely used and trusted in the IT security/pen-testing community As such, no hacker/penetration tool box is complete without the addition of the versatile and powerful  Metasploit . What Is Metasploit? Metasploit is among the most widely used exploitation tools in the hacking/security field. It's used by both novices and advanced professionals.  Insecure.Org , run by  Fyodor , the founder of  Nmap , annually surveys security professionals for their opinion on the top security software. Metasploit has consistently ranked among the top ten since its incept