Skip to main content

How to Hack Your Friends Camera

 Camera Phishing:

    Hello, Friends, today have tried to tell you an interesting hack about the camera of your friends and impress them with the help of an Amazing tool here no pc or computer is required so we are starting some simple steps which help you to do cam-phishing .


  1. First , open your play store on your android mobile phone and then search TERMUX and you have to download it.
  2. then it need approx 1 min for installation in your android phone and then you have to write some keywords which help to execute  you have to on your network connection.
  3. Write pkg update then it starts executing and after if it gives you the option to check yes or no then type Y else it will automatically execute.
  4. Write pkg upgrade then it will execute some functions.
  5. Then you have to write https://github.com/techchipnet/CamPhish.git and after that press enter.
  6. then exit you will come out of termux then again open termux and then again write all steps from 3 to 5 press enter.
  7. then write ls press enter for showing what is inside in the current directory.
  8. You can see a folder name CamPhish was created so let's go inside the folder type cd CamPhish in your termux and press enter.
  9. write ls press enter.
  10. write chmod +x camphish.sh press enter  for making this file executable.
  11. Now you can see the camphish.sh named file is showing green color now you can execute this program.
  12. then type ./camphish.sh press enter .
  13. If you have never used termux before then type pkg install php press enter then it will start downloading PHP, because this program need PHP for executing this program even lot of programs requires PHP for executing them.
  14. then type ./camphish.sh press enter.
  15. then type 01 press enter.
  16. then type 01 or 02 as your wish.
  17. If you have not installed wget on your system then type pkg install wget and it will start downloading wget because ngrok is required for this tool we need to start a server and ngrok is one of the best service providers for servers. After installing wget it will be downloading nrgok automatically.
  18. then open hotspot and again follow all the steps written in 14 to 16.
  19. after that it will start executing after few minutes it will show you a direct link you have to copy that link and don't close the app only hide it and send this link to your victim and you can see in the application that it is showing IP of that victim .
  20. when your victim opens the link and allows the access you will start getting packages.
  21. to open these photos swipe right to left in the termux and open another new session.
  22. type ls then copy the name of the image you want to see.
  23. then open chrome and type 127.0.0.1:3333/filename.png it will show the file.
Warning: this trick will work until the victim's data connection is on after that it will automatically off.
 
Warning: Please use if for educational purposes don't try to do any illegal thing then we are not responsible.

 
if you like this blog please comment on your experience and also if you have any query or if any problem then also comment it we will try our best to solve your problem ...........

Comments

Popular Posts

Solution | Secure Workloads in Google Kubernetes Engine: Challenge Lab | 2022

  Task 0: Download the necessary files :   gsutil cp gs://spls/gsp335/gsp335.zip . unzip gsp335.zip Task - 1: Setup cluster gcloud container clusters create <cluster-name> \    --zone us-central1-c \    --machine-type n1-standard-4 \    --num-nodes 2 \    --enable-network-policy gcloud sql instances create <your-sql-instance-name> --region us-central1 Task - 2: Setup wordpress: Create database - wordpress Go to the SQL -> open the  created instance (wordpress-db-387) -> then database -> Create database  Database name :wordpress Create -> users-> add user Account User name: wordpress Add Add user - wordpress (no password) Service account gcloud iam service-accounts create <your-service-account- credentials> gcloud projects add-iam-policy-binding $DEVSHELL_PROJECT_ID \    --member="serviceAccount:< your-service-account- credentials>@$ DEVSHELL_ PROJECT_ID.i...

why visiting darkweb is not too easy?

DARK WEB :       Today we will talk about Dark-Web ,   the Dark-Web is a WWW(World wide web) content that exists on the internet but we need specific software, system configurations or authorized access to see or make changes in this content. Dark-web is just a part of the internet where 90% of internet data is available right now. The Dark-Web contents are not shown by normal search engines like Google , Bing or other search engines.          The dark-web include small peer to peer and friend to friend networks, as well as large, popular networks such as Tor, Freenet etc. operated by public organizations and individuals.  Users of the dark web refer to the regular web as clean net due to its unencrypted nature. The Tor dark web or onion browsing uses the traffic anonymization technique of onion-routing in the network's top-level-domain suffix .onion REAL WORLD:  If we talk about real world scenarios ...

Some useful shortcuts of Libre Office Writer

Ctrl+A   Select All Ctrl+J    Justify Ctrl+D Double Underline Ctrl+E Centered Ctrl+F Find and Replace Ctrl+Shift+P Superscript Ctrl+L Align Left Ctrl+R Align Right Ctrl+Shift+B Subscript Ctrl+Y Redo last action Ctrl+0 (zero) Apply Default   paragraph style Ctrl+1 Apply Heading 1 paragraph style Ctrl+2 Apply Heading 2 paragraph style Ctrl+3 Apply Heading 3 paragraph style Ctrl+5 1.5 Line Spacing Ctrl+ Plus Key(+) Calculates the selected text and copies the result to the clipboard. Ctrl+Hyphen(-) Custom hyphens; hyphenation set by you. Ctrl+Shift+minus sign (-) Non-breaking dash (is not used for hyphenation) Ctrl+multiplication sign * (only on number pad) Run macro field Ctrl+Shift+Space Non-breaking spaces. Non-breaking spaces are not used for hyphenation and are not expanded if the text is justified. Shift+Enter Line break without paragraph change Ctrl+Enter Manual page break Ctrl+Shift+Enter Column break in multicolumnar texts Alt+Enter I...

A Digital Computer

 A digital computer is a digital system that performs various computational tasks. The word "Digital" implies that the information in the computer is represented by variables that take a limited number of discrete values. These values are processed internally by components that can maintain a limited number of discrete states. These discrete values are taken by the decimal digits 0 to 9.  The first electronic digital systems was developed at 1940s late, it was primarily only used for some numerical computations.  As we all know a digital computer uses binary number system & it can only understand a binary number. And a binary number has only 2 digits 0 & 1 . Let me tell you one more interesting thing is that a binary digit is called "bit" here. That means if we use 0 it means its a bit, and vise versa.  In a digital computer all information is only represented in group of bits. After using various programming techniques & some algorithms, these grou...

Types of Softwares

Software generally categorized into two types, which are as follows : System Softwares Application Softwares.        System Softwares:      A system software is a set of programs which is designed to control different-different operations and more extend processing capabilities of a computer system. It can perform these functions one or more depending on program requirements on a given task. Supports the development of other application software. Supports the execution of other application software. Handles the effective & efficient use of various hardware resources, such as CPU, memory peripherals etc.  Controls and communicate with the operation of peripheral devices such as printer disk, tape etc.     And system software makes the operation of a computer system more effective and efficient as we can see in its functions. It help the hardware components work together. These programme which are included in a system software p...