👍4😁4
🧵 BEST CHROME EXTENSIONS FOR PENTESTING 🧵
🧵 Tamper Data
The Tamper Data extension provides such functionalities. It is an essential tool that supports ethical hacking processes through the Chrome web browser.
🧵 Hackbar
The HackBar extension assists in hash generation, XSS queries, decoding, encoding, and SQL functions other than an interface. The extension helps users easily copy, read, and request URLs,
🧵 Open Port Check Tool
the Open Port Check Tool extension helps h4ckers detect if a computer has any open ports. The extension alerts users to turn off all unused ports to reduce the possibility of an intrusion.
🧵 Request Maker
H4ckers find the Request Maker extension useful when conducting fuzz tests to detect security vulnerabilities and coding errors. The Request Maker tool simplifies the process since it is designed as a core pen-testing tool.
🧵 Penetration Testing Kit
The Chrome-based Penetration Testing Kit contains a bundle of useful pen testing exercises for professional, ethical hackers. The extension provides an interface through which users can view and send responses and request information.
🧵 Tamper Data
The Tamper Data extension provides such functionalities. It is an essential tool that supports ethical hacking processes through the Chrome web browser.
🧵 Hackbar
The HackBar extension assists in hash generation, XSS queries, decoding, encoding, and SQL functions other than an interface. The extension helps users easily copy, read, and request URLs,
🧵 Open Port Check Tool
the Open Port Check Tool extension helps h4ckers detect if a computer has any open ports. The extension alerts users to turn off all unused ports to reduce the possibility of an intrusion.
🧵 Request Maker
H4ckers find the Request Maker extension useful when conducting fuzz tests to detect security vulnerabilities and coding errors. The Request Maker tool simplifies the process since it is designed as a core pen-testing tool.
🧵 Penetration Testing Kit
The Chrome-based Penetration Testing Kit contains a bundle of useful pen testing exercises for professional, ethical hackers. The extension provides an interface through which users can view and send responses and request information.
👍2
🔰Create Unlimited Gmail Without SMS Verification🔰
✉️Create Unlimited Gmail Accounts Bypassing Phone Verification
Download the Gmail app on your phone or on an emulator such as blue stacks
Sign into an existing Gmail account
Click on your profile pic and
click manage accounts
Add account
Select google
Create new –> for business use
Enter info you want
Select skip on the phone verification
✉️Create Unlimited Gmail Accounts Bypassing Phone Verification
Download the Gmail app on your phone or on an emulator such as blue stacks
Sign into an existing Gmail account
Click on your profile pic and
click manage accounts
Add account
Select google
Create new –> for business use
Enter info you want
Select skip on the phone verification
👍4❤2
🔴 Password cracking techniques
➖➖➖➖➖➖➖➖➖➖➖
💠There are a number of techniques that can be used to crack passwords. We will learn about the most commonly used ones below;
🔹 Dictionary attack – This method involves the use of a wordlist to compare against user passwords.
🔹 Brute force attack – This method is similar to the dictionary attack. Brute force attacks use algorithms that combine alpha-numeric characters and symbols to come up with passwords for the attack. For example, a password of the value “password” can also be tried as p@$$word using the brute force attack.
🔹 Rainbow table attack – This method uses pre-computed hashes. Let’s assume that we have a database which stores passwords as md5 hashes. We can create another database that has md5 hashes of commonly used passwords. We can then compare the password hash we have against the stored hashes in the database. If a match is found, then we have the password.
🔹 Guess – As the name suggests, this method involves guessing. Passwords such as qwerty, password, admin, etc. are commonly used or set as default passwords. If they have not been changed or if the user is careless when selecting passwords, then they can be easily compromised.
🔹 Spidering – Most organizations use passwords that contain company information. This information can be found on company websites, social media such as facebook, twitter, etc. Spidering gathers information from these sources to come up with word lists. The word list is then used to perform dictionary and brute force attacks.
➖➖➖➖➖➖➖➖➖➖➖
💠There are a number of techniques that can be used to crack passwords. We will learn about the most commonly used ones below;
🔹 Dictionary attack – This method involves the use of a wordlist to compare against user passwords.
🔹 Brute force attack – This method is similar to the dictionary attack. Brute force attacks use algorithms that combine alpha-numeric characters and symbols to come up with passwords for the attack. For example, a password of the value “password” can also be tried as p@$$word using the brute force attack.
🔹 Rainbow table attack – This method uses pre-computed hashes. Let’s assume that we have a database which stores passwords as md5 hashes. We can create another database that has md5 hashes of commonly used passwords. We can then compare the password hash we have against the stored hashes in the database. If a match is found, then we have the password.
🔹 Guess – As the name suggests, this method involves guessing. Passwords such as qwerty, password, admin, etc. are commonly used or set as default passwords. If they have not been changed or if the user is careless when selecting passwords, then they can be easily compromised.
🔹 Spidering – Most organizations use passwords that contain company information. This information can be found on company websites, social media such as facebook, twitter, etc. Spidering gathers information from these sources to come up with word lists. The word list is then used to perform dictionary and brute force attacks.
👍5❤1