Recent Posts

6 Websites for Making Fake Calls or Spoof Calls

Caller ID Spoofing is the process of Faking your identity while making a call. It means, you can show your desired phone number the call receiver’s screen. In this way, you will be able to hide your identity behind the identity of someone else. 
There are many websites available which offer free service to make fake calls. With these websites, you can make calls to anyone from any one. 
In this post, we are listing 6 websites for making fake calls. You can use any of these websites for caller ID spoofing. There may be a possibility that the website is blocked in your country.


Access PC to their smartphones by using Wi-Fi.




In our homes TV, Blu-Ray player, and DVR all come with remote controls, but if you use a Android as a remote to control your Computer, nothing comes in the box. Fortunately, if you have an Android phone, you can control just about everything on your PC.

Anti Adblocker Script For Blogger


Recently I visit some blogger blogs and I installed Adblcker in my web browser.The blogs detect Adblocker and show me popup to remove the adblocker.I am very inspire with this function and I decided to share this script with you.Here you just need to add some javascript in the blog widget code will automatically if you use adblock extension on the browser you use.It is best tutorial if you are using adsense or any other advertisement on your blog.Follow my steps carefully.

<style>#g207{position:fixed!important;position:absolute;top:0;top:expression
((t=document.documentElement.scrollTop?document.documentElement.scrollTop:document
.body.scrollTop)+"px");
left:0;width:100%;height:100%;background-color:#fff;opacity:0.9;filter:alpha(opacity=90);display:block}#g207 p{opacity:1;filter:none;font:bold 16px Verdana,Arial,sans-serif;text-align:center;margin:20% 0}#g207 p a,#g207 p i{font-size:12px}#g207 ~ *{display:none}</style><noscript><i id=g207><p>Please enable JavaScript!<br />Bitte aktiviere JavaScript!<br />S'il vous pla&icirc;t activer JavaScript!<br />Por favor,activa el JavaScript!<br /><a href="http://antiblock.org/">antiblock.org</a></p></i></noscript><script>(function(w,u){var d=w.document,z=typeof u;function g207(){function c(c,i){var e=d.createElement('i'),b=d.body,s=b.style,l=b.childNodes.length;if(typeof i!=z){e.setAttribute('id',i);s.margin=s.padding=0;s.height='100%';l=Math.floor(Math.random()*l)+1}e.innerHTML=c;b.insertBefore(e,b.childNodes[l-1])}function g(i,t){return !t?d.getElementById(i):d.getElementsByTagName(t)};function f(v){if(!g('g207')){c('<p>Please disable your ad blocker!<br/>This site is supported by the advertisement <br/> Please disable your ad blocker to support us!!! </p>','g207')}};(function(){var a=['Adrectangle','PageLeaderAd','ad-column','advertising2','divAdBox','mochila-column-right-ad-300x250-1','searchAdSenseBox','ad','ads','adsense'],l=a.length,i,s='',e;for(i=0;i<l;i++){if(!g(a[i])){s+='<a id="'+a[i]+'"></a>'}}c(s);l=a.length;for(i=0;i<l;i++){e=g(a[i]);if(e.offsetParent==null||(w.getComputedStyle?d.defaultView.getComputedStyle(e,null).getPropertyValue('display'):e.currentStyle.display
)=='none'){return f('#'+a[i])}}}());(function(){var t=g(0,'img'),a=['/adaffiliate_','/adops/ad','/adsales/ad','/adsby.','/adtest.','/ajax/ads/ad','/controller/ads/ad','/pageads/ad','/weather/ads/ad','-728x90-'],i;if(typeof t[0]!=z&&typeof t[0].src!=z){i=new Image();i.onload=function(){this.onload=z;this.onerror=function(){f(this.src)};this.src=t[0].src+'#'+a.join('')};i.src=t[0].src}}());(function(){var o={'http://pagead2.googlesyndication.com/pagead/show_ads.js':'google_ad_client','http://js.adscale.de/getads.js':'adscale_slot_id','http://get.mirando.de/mirando.js':'adPlaceId'},S=g(0,'script'),l=S.length-1,n,r,i,v,s;d.write=null;for(i=l;i>=0;--i){s=S[i];if(typeof o[s.src]!=z){n=d.createElement('script');n.type='text/javascript';n.src=s.src;v=o[s.src];w[v]=u;r=S[0];n.onload=n.onreadystatechange=function(){if(typeof w[v]==z&&(!this.readyState||this.readyState==="loaded"||this.readyState==="complete")){n.onload=n.onreadystatechange=null;r.parentNode.removeChild(n);w[v]=null}};r.parentNode.insertBefore(n,r);setTimeout(function(){if(w[v]!==null){f(n.src)}},2000);break}}}())}if(d.addEventListener){w.addEventListener('load',g207,false)}else{w.attachEvent('onload',g207)}})(window);</script>

Facebook Accounts Hacked By an INDIAN [2016]

Bangalore based Hacker Anand Prakash could have hacked all of Facebook posts. And could have gotten access to user’s credit cards etc etc. Facebook acknowledged his ethical hacking and has rewarded him $15,000]

This post is about a simple vulnerability found on Facebook which could have been used to hack into other user’s Facebook account easily without any user interaction. This gave me full access of another users account by setting a new password. I was able to view messages, his credit/debit cards stored under payment section, personal photos etc. Facebook acknowledged the issue promptly, fixed it and rewarded $15,000 USD considering the severity and impact of the vulnerability.

Description:

Whenever a user Forgets his password on Facebook, he has an option to reset the password by entering his phone number/ email address on https://www.facebook.com/login/identify?ctx=recover&lwv=110 ,Facebook will then send a 6 digit code on his phone number/email address which user has to enter in order to set a new password. I tried to brute the 6 digit code on www.facebook.com and was blocked after 10-12 invalid attempts.

Then i looked out for the same issue on beta.facebook.com and mbasic.beta.facebook.com and interestingly rate limiting was missing on forgot password endpoints. I tried to takeover my account ( as per Facebook’s policy you should not do any harm on any other users account) and was successful in setting new password for my account. I could then use the same password to login in the account.

As you can see in the video i was able to set a new password of the user by brute forcing the code which was sent to your email address/phone number.

Vulnerable request:
POST /recover/as/code/ HTTP/1.1 Host: beta.facebook.com
lsd=AVoywo13&n=XXXXX



Brute forcing the “n” successfully allowed me to set new password for any Facebook user.





When this happen

Feb 22nd, 2016 : Report sent to Facebook team.

Feb 23rd, 2016 : Verified the fix from my end.

March 2rd, 2016 : Bounty of $15,000 awarded. (Reproduced from Anand’s blogpost).

See Who is Connected to Your WIFI Through Your SmartPhone




There is an App Called Fing Shows You All the Devices Connected to Your Network



Android/iOS: Fing shows you all of the devices on your network, down to the device type and manufacturer for each. Best of all, it puts all of that data in the palm of your hand.

Fing has been around for a while, but it's a quick solution for anyone who wants to take a peek at network activity from their mobile device. Just launch the app to see a list of connected devices, their IP and MAC addresses, customisable device names, and manufacturers. Tap a device to add notes, as or change the name, icon, or location. In addition, Fing keeps a full history of your discovered networks for reference.

Fing is a handy app for day to day use of knowing who you're connected with. 

It's available for free for iOS and Android.

Fing - Network Tools | Google Play Store 
Fing - Network Scanner | iTunes App Store


See Who is Connected to your WIFI Through Your Computer


Wireless Network Watcher Portable


See Who is Connected to Your WIFI  Through your PC

From NirSoft Freeware: Wireless Network Watcher Portable is an utility that scans your wireless network and displays the list of all computers and devices that are currently connected to your network. For every computer or device that is connected to your network, the following information is displayed IP address, MAC address, the company that manufactured the network card, and optionally the computer name. You can also export the connected devices list into HTML, XML, CSV, or text file, or copy the list to the clipboard and then paste into Excel or other spreadsheet application.




What's new in this version:
  • Made some changes in the internal scanning mechanism of Wireless Network Watcher, in order to fix bugs and problems that occurred when a device got a different IP address.
  • Be aware that due to this mechanism change, detected devices will appear only after their MAC address is found (In previous versions, the device name was displayed even before the MAC address was found).

How to make a ram booster!!!



Every computer user (old computers) suffers from computer freezing.
I'll show you how to make a simple computer booster using notepad.
The steps are said to be simple,so lets begin:


Method 1

1)Open notepad

2)Type the following: 

MYSTRING="80000000"


3)Save it,and  name it  "ram booster.vbs"(i prefer to save it on desktop)

4)Now its done

Now every time your computer freeze you can double click it(2 or 3 times),and your computer will be boosted.

Method 2

1)Open notepad


2)Type the following code in Notepad.



FreeMem=Space(64000000)                   if your RAM is below 1GB
FreeMem=Space(51200000)                   if your RAM is 512 MB
FreeMem=Space(102400000)                 if your RAM is 1GB
FreeMem=Space(204800000)                 if your RAM is 2GB
FreeMem=Space(409600000)                 if your RAM is 4GB and so on.
3) Save the file with a VBS extension.
You can name it however you want as long as you append a .vbs extension to the file name as you save. In this case, we will name our file "Boost.vbs" and save it on the Desktop for easy navigation. The file should look like the one boxed with a red rectangular shape.

How does it work?

When you run the .vbs file in your computer, it forces the computer to clear the "idle" data stored in RAM or the data left by programs you recently used and terminated. With additional vacant RAM, you will now have more RAM to allot to programs you wish to run.

The cleared up idle data is not totally terminated. It is relegated to the "virtual memory" or swap file of the PC. A virtual memory is a portion of your PC's hard disk that is used by the operating system as if it was an extension of the RAM. Because hard disks have relatively slower access rates than the true physical RAM, it is not advisable to use excessive amounts of virtual memory for running programs as it bogs down the PC. In this case, because what we are trying to get rid of are data that are not essential for any presently running programs or processes, it is okay to utilize the virtual memory.

Tips Tricks & Warnings

  • This is very useful after you play a game or to Software that uses a lot of RAM.
  • This is like restarting your PC without restarting your PC.
  • This is particularly useful for old PCs with limited RAM resources.

Hope you like our work, do share with others too. Leave a comment below if you facing any problem at any step discussed above.