👍4😁4
🧵 BEST CHROME EXTENSIONS FOR PENTESTING 🧵
🧵 Tamper Data
The Tamper Data extension provides such functionalities. It is an essential tool that supports ethical hacking processes through the Chrome web browser.
🧵 Hackbar
The HackBar extension assists in hash generation, XSS queries, decoding, encoding, and SQL functions other than an interface. The extension helps users easily copy, read, and request URLs,
🧵 Open Port Check Tool
the Open Port Check Tool extension helps h4ckers detect if a computer has any open ports. The extension alerts users to turn off all unused ports to reduce the possibility of an intrusion.
🧵 Request Maker
H4ckers find the Request Maker extension useful when conducting fuzz tests to detect security vulnerabilities and coding errors. The Request Maker tool simplifies the process since it is designed as a core pen-testing tool.
🧵 Penetration Testing Kit
The Chrome-based Penetration Testing Kit contains a bundle of useful pen testing exercises for professional, ethical hackers. The extension provides an interface through which users can view and send responses and request information.
🧵 Tamper Data
The Tamper Data extension provides such functionalities. It is an essential tool that supports ethical hacking processes through the Chrome web browser.
🧵 Hackbar
The HackBar extension assists in hash generation, XSS queries, decoding, encoding, and SQL functions other than an interface. The extension helps users easily copy, read, and request URLs,
🧵 Open Port Check Tool
the Open Port Check Tool extension helps h4ckers detect if a computer has any open ports. The extension alerts users to turn off all unused ports to reduce the possibility of an intrusion.
🧵 Request Maker
H4ckers find the Request Maker extension useful when conducting fuzz tests to detect security vulnerabilities and coding errors. The Request Maker tool simplifies the process since it is designed as a core pen-testing tool.
🧵 Penetration Testing Kit
The Chrome-based Penetration Testing Kit contains a bundle of useful pen testing exercises for professional, ethical hackers. The extension provides an interface through which users can view and send responses and request information.
👍2
🔰Create Unlimited Gmail Without SMS Verification🔰
✉️Create Unlimited Gmail Accounts Bypassing Phone Verification
Download the Gmail app on your phone or on an emulator such as blue stacks
Sign into an existing Gmail account
Click on your profile pic and
click manage accounts
Add account
Select google
Create new –> for business use
Enter info you want
Select skip on the phone verification
✉️Create Unlimited Gmail Accounts Bypassing Phone Verification
Download the Gmail app on your phone or on an emulator such as blue stacks
Sign into an existing Gmail account
Click on your profile pic and
click manage accounts
Add account
Select google
Create new –> for business use
Enter info you want
Select skip on the phone verification
👍4❤2
🔴 Password cracking techniques
➖➖➖➖➖➖➖➖➖➖➖
💠There are a number of techniques that can be used to crack passwords. We will learn about the most commonly used ones below;
🔹 Dictionary attack – This method involves the use of a wordlist to compare against user passwords.
🔹 Brute force attack – This method is similar to the dictionary attack. Brute force attacks use algorithms that combine alpha-numeric characters and symbols to come up with passwords for the attack. For example, a password of the value “password” can also be tried as p@$$word using the brute force attack.
🔹 Rainbow table attack – This method uses pre-computed hashes. Let’s assume that we have a database which stores passwords as md5 hashes. We can create another database that has md5 hashes of commonly used passwords. We can then compare the password hash we have against the stored hashes in the database. If a match is found, then we have the password.
🔹 Guess – As the name suggests, this method involves guessing. Passwords such as qwerty, password, admin, etc. are commonly used or set as default passwords. If they have not been changed or if the user is careless when selecting passwords, then they can be easily compromised.
🔹 Spidering – Most organizations use passwords that contain company information. This information can be found on company websites, social media such as facebook, twitter, etc. Spidering gathers information from these sources to come up with word lists. The word list is then used to perform dictionary and brute force attacks.
➖➖➖➖➖➖➖➖➖➖➖
💠There are a number of techniques that can be used to crack passwords. We will learn about the most commonly used ones below;
🔹 Dictionary attack – This method involves the use of a wordlist to compare against user passwords.
🔹 Brute force attack – This method is similar to the dictionary attack. Brute force attacks use algorithms that combine alpha-numeric characters and symbols to come up with passwords for the attack. For example, a password of the value “password” can also be tried as p@$$word using the brute force attack.
🔹 Rainbow table attack – This method uses pre-computed hashes. Let’s assume that we have a database which stores passwords as md5 hashes. We can create another database that has md5 hashes of commonly used passwords. We can then compare the password hash we have against the stored hashes in the database. If a match is found, then we have the password.
🔹 Guess – As the name suggests, this method involves guessing. Passwords such as qwerty, password, admin, etc. are commonly used or set as default passwords. If they have not been changed or if the user is careless when selecting passwords, then they can be easily compromised.
🔹 Spidering – Most organizations use passwords that contain company information. This information can be found on company websites, social media such as facebook, twitter, etc. Spidering gathers information from these sources to come up with word lists. The word list is then used to perform dictionary and brute force attacks.
👍5❤1
Finding the Wi-Fi password.
In Windows, go to the "Network and Sharing Center" menu. Right-click the Wi-Fi network connection icon → "Wireless Network Properties". Click on the "Show Characters" field to show the Wi-Fi network password.
In macOS, all passwords are stored in the Keychain app. Use Spotlight to find "Keychain Access. Open the app and find the Wi-Fi network name in the list of saved credentials. Double-click it, and then click in the field to see the password (this will require entering the OS password).
In Windows, go to the "Network and Sharing Center" menu. Right-click the Wi-Fi network connection icon → "Wireless Network Properties". Click on the "Show Characters" field to show the Wi-Fi network password.
In macOS, all passwords are stored in the Keychain app. Use Spotlight to find "Keychain Access. Open the app and find the Wi-Fi network name in the list of saved credentials. Double-click it, and then click in the field to see the password (this will require entering the OS password).
👍4
❇️ How to Block Ads on Android Using Private DNS
➖➖➖➖➖➖➖➖➖➖➖➖➖
🔹Step 1: First, open your Android app drawer and tap on Settings.
🔹Step 2: Under the Settings tab, you must select Network & Internet or Wireless & Networks.
🔹Step 3: Under the Network & Internet Settings, select Private DNS.
🔹Step 4: Now, you need to select the option Configure Private DNS.
🔹Step 5: Under the hostname, type in '
🔹Step 6: Save the settings and open the Google Chrome browser.
🔹Step 7: On the URL bar, enter "
🔹Step 8: Now search for ‘DNS’ and disable the Async DNS option.
🔹Step 9: Now enter "
🔹Step 10: Select the DNS tab and tap on the Clear Cache option.
✅ That’s it! You are done! Now restart your chrome browser to apply the changes. This won't block all ads but most of the ads will be blocked.
Keep supporting us ❤️,
➖➖➖➖➖➖➖➖➖➖➖➖➖
🔹Step 1: First, open your Android app drawer and tap on Settings.
🔹Step 2: Under the Settings tab, you must select Network & Internet or Wireless & Networks.
🔹Step 3: Under the Network & Internet Settings, select Private DNS.
🔹Step 4: Now, you need to select the option Configure Private DNS.
🔹Step 5: Under the hostname, type in '
dns.adguard.com'🔹Step 6: Save the settings and open the Google Chrome browser.
🔹Step 7: On the URL bar, enter "
Chrome://flags" and hit Enter.🔹Step 8: Now search for ‘DNS’ and disable the Async DNS option.
🔹Step 9: Now enter "
chrome://net-internals" in the URL bar and hit enter.🔹Step 10: Select the DNS tab and tap on the Clear Cache option.
✅ That’s it! You are done! Now restart your chrome browser to apply the changes. This won't block all ads but most of the ads will be blocked.
Keep supporting us ❤️,
👍5
⚡️ Best websites to test your hacking skills ⚡️
https://pwnable.kr/
https://hack.me/
https://ctflearn.com/
https://google-gruyere.appspot.com/
https://www.root-me.org/en/
https://www.hackthebox.eu/
https://www.hacking-lab.com/
http://www.gameofhacks.com/
https://overthewire.org/
https://microcorruption.com/
https://xss-game.appspot.com/?utm_source...dium=email
https://www.hackthissite.org/pages/index/index.php
https://crackmes.one/
https://pentest.training/
https://www.hellboundhackers.org/
http://hax.tor.hu/
https://thisislegal.com/
https://tryhackme.com/
https://pwnable.kr/
https://hack.me/
https://ctflearn.com/
https://google-gruyere.appspot.com/
https://www.root-me.org/en/
https://www.hackthebox.eu/
https://www.hacking-lab.com/
http://www.gameofhacks.com/
https://overthewire.org/
https://microcorruption.com/
https://xss-game.appspot.com/?utm_source...dium=email
https://www.hackthissite.org/pages/index/index.php
https://crackmes.one/
https://pentest.training/
https://www.hellboundhackers.org/
http://hax.tor.hu/
https://thisislegal.com/
https://tryhackme.com/
❤3👍2
❤4👍3