🔥 Burn Fat Fast. Discover How! 💪

تقنيه ومعلومات

Logo of telegram channel loginin — تقنيه ومعلومات ت
Logo of telegram channel loginin — تقنيه ومعلومات
Channel address: @loginin
Categories: Uncategorized
Language: English
Subscribers: 101
Description from channel

💠Hacking Practicals
💠Hacking Tools
💠hacking kali
💠hacking win 7.8.10
💠admin @Notbad11
💠قناه تهتم بالاختراق بمختلف الاساليب

Ratings & Reviews

2.33

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

0

3 stars

0

2 stars

0

1 stars

2


The latest Messages 2

2018-12-30 13:43:06 Step 4: . Find your MAC address using the instructions above. Make sure to save it somewhere secure, as you'll want to change your device back to that address once you're done.

Step 5:
Change ("spoof") your phone's MAC address to that of your target. This will allow your phone to pass as your target's, letting you convince WhatsApp that you are your target when you log in.
On an iPhone or other device, install a MAC spoofing app like MacDaddy X or WifiSpoof. Use that to change your MAC address.
On Android, install BusyBox and the Terminal Emulator (apps available for free on Google Play). In the terminal, type "ip link show" to see a list of interfaces. Identify the one that has your MAC address -- for this example, we'll use the eth0 interface. In the terminal emulator, enter "ip link set eth0 address XX:XX:XX:XX:XX:XX" and "ip link set eth0 broadcast XX:XX:XX:XX:XX:XX", where eth0 is the interface you identified and XX:XX:XX:XX:XX:XX is your target's MAC address. To check that you've successfully changed your MAC address, enter "ip link show eth0."
620 views10:43
Open / Comment
2018-12-30 13:43:01 Step 3:
Find your target's phone's Media Access Control (MAC) address. A MAC address is a unique identifier assigned to your phone or other device that essentially serves as its online identity. Find and write down your target's MAC address. It takes the form of six pairs of letters or numbers, separated by colons (01:23:45:67:89:ab).
On an Android, find this in Settings → About phone → Status → Wi-Fi MAC address.
On an iPhone, go to Settings → General → About → Wi-Fi Address.
On a Windows phone, look in Settings → About → More info → MAC address.
On a BlackBerry, go to Options → Device → Device and Status info → WLAN MAC.
599 views10:43
Open / Comment
2018-12-30 13:42:56 Step 1: Uninstall WhatsApp from your phone or device. You'll install it again at the end of the method, but you'll need to configure it differently, and the easiest way to make sure you'll be able to do that correctly is to completely uninstall it now.

Step 2:
Obtain your target's phone. You'll need it for two different steps throughout the process, but this shouldn't take too long - you should be able to return it before your target starts to miss it.
592 views10:42
Open / Comment
2018-12-30 13:42:50 HOW TO HACK A WHATSAPP ACCOUNT THROUGH MAC SPOOFING ATTACK

First of all the requirements of this procedure are:

1. Mobile Phone Rooted
2. Target's Phone for 5 minutes
3. Busybox and Terminal App installed on your android device
4. Wifi Scanner ( if you can't reach the target's phone for getting his / her mac address through settings )
579 views10:42
Open / Comment
2018-12-19 03:20:14 https://github.com/Matrix07ksa/HashMix

لعمل هاش
لكشف نوع الهاش
لفك الهاش
634 views00:20
Open / Comment
2018-12-19 03:19:55 هذي سكريبتات جميلة تساعدك في فك الهاش حملها وجرب

https://github.com/s0md3v/Hash-Buster
620 views00:19
Open / Comment
2018-12-19 03:19:30 اختراق ويرد بريس بواسطة الميتاسبلويت
Hacker WordPress about a tool Metasploit

https://medium.com/@mylesb/exploiting-a-wordpress-website-with-metasploit-ffa6f4e31e09
577 views00:19
Open / Comment
2018-12-11 10:27:36 #linux #security #advanced

LinuxSEC
@loginin
582 views07:27
Open / Comment
2018-12-11 10:27:06 #hardware #hacking

Hardware Hacking - Nicolas Collins

https://www.nicolascollins.com/texts/originalhackingmanual.pdf

@loginin
555 views07:27
Open / Comment
2018-12-11 10:26:48 #security #redhat #guide

Advanced Security on Linux

https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/pdf/Security_Guide/Red_Hat_Enterprise_Linux-6-Security_Guide-en-US.pdf

@loginin
531 views07:26
Open / Comment