Skip to main content

Posts

Showing posts with the label hackers

How to Hack Your Friends Camera

  Camera Phishing:      Hello, Friends, today have tried to tell you an interesting hack about the camera of your friends and impress them with the help of an Amazing tool here no pc or computer is required so we are starting some simple steps which help you to do cam-phishing . First , open your play store on your android mobile phone and then search TERMUX and you have to download it. then it need approx 1 min for installation in your android phone and then you have to write some keywords which help to execute  you have to on your network connection. Write pkg update then it starts executing and after if it gives you the option to check yes or no then type Y else it will automatically execute. Write pkg upgrade then it will execute some functions. Then you have to write  https://github.com/techchipnet/CamPhish.git and after that press enter. then exit you will come out of termux then again open termux and then again write all steps from 3 to 5  press enter . then write

Man in the middle attack types

Types Of Man-In-The-Middle Attacks : Today internet is one of the most essential thing in our normal life and it plays a vital role in every industries. Our demand of internet is growing day by day and it is not going to stop until now.  Man in the middle attack is one of the most common cyber-attack. In this attack an attacker act as a medium between the user and the server when a user send a request to a website for a particular data it can be in any form like login credentials, bank details etc. then server send data to user but when a person is interacting between user & server he/she can see all data. So today i will tell you how an attacker can perform a man in the middle attack ,so just read this blog careful................... 1⃣ IP spoofing:   Every device capable of connecting to the web has an online protocol (IP) address, which is analogous to the road address for your home.  By spoofing an IP address, an attacker can trick you into thinking you’re interacting with an