• Home
  • YouTube
  • GitHub
  • Telegarm
  • FaceBook
  • Termux
  • Linux
  • Android
  • Windows
  • More..
    • Group
    • Contact Me
    • Privacy Policy
    • Terms and Conditions
    • About Me
Online-HacKing

Top 15 Best WiFi Hacking Android Apps for 2020

October 29, 2020 By SUMAN MONDAL Android, Wi-Fi 0 Comments


Wifi Hacking Apps for Android Smartphones, anyone can hack Wifi network around them. WiFi is the best source of high-speed internet and gives better reliability than a mobile network.

Hacking WiFi networks is an important part of learning the subtleties of ethical hacking and penetration testing.

Read more

0 Comments:

Post a Comment

FreeFire ID Hack use Termux || Phishing || without Root

October 28, 2020 By SUMAN MONDAL Android, Attack, Termux 2 Comments
Free Fire ID Hack - Online Hacking





Created by SUMAN MONDAL


♒️  GitHub Link :-


Install Ngrok Termux :-  Ngrok Download


✳️ Video Tutorials :- 

Read more

2 Comments:

Post a Comment

PUBG ID Hack use Termux || Phishing || without Root

October 23, 2020 By SUMAN MONDAL Android, Attack, Termux 2 Comments
PUBG Mobile ID Hack - Online Hacking





Created by SUMAN MONDAL



♒️  GitHub Link :-

Install Ngrok Termux :-  Ngrok Download


Read more

2 Comments:

Post a Comment

World Best Powerfull DDos Attack Tool LOIC || Live Video || How to Install LOIC Tool any Linux, Windows, Android

October 19, 2020 By SUMAN MONDAL Android, Attack, Linux, Webside, Windows 0 Comments

 A LOIC (Low Orbit Ion Cannon) is one of the most powerful DOS attacking tools freely available. If you follow news related to hacking and security issues, you doubtless have been hearing about this tool for the past several months. It has become widely used, including in some highly-publicized attacks against the PayPal, Mastercard and Visa servers a few months back. This tool was also the weapon of choice implemented by the (in)famous hacker group, Anonymous, who have claimed responsibility for many high profile hacking attacks, among them, hacks against Sony, the FBI and other US security agencies. The group not only used this tool, but also requested that others download it and join Anonymous attacks via IRC.





In this brief article, I will give an overview and operational model of the tool. There are 2 versions of the tool: the first is the binary version, which is the original LOIC tool. The other is web-based LOIC or JS LOIC.

Read more

0 Comments:

Post a Comment

HACK Android Device with Termux on Android | Over the Internet

October 18, 2020 By SUMAN MONDAL Android, Termux 2 Comments


  • Note:- This thread is now CLOSED by Online Hacking (The Admin) due to violation of our Terms. I was informed that many attacks on several persons` Mobile Phones are done by using my information as a base guide. We never invade people`s privacies and we don't want it to be done by other people, specially using our Information & Techniques. That's Y , I've decided to close THIS guide PERMANENTLY! (Screenshots, Requirements, Headings, Commands & Problems_Section R not gonna Remove)

  • If U want further Guides & Techniques, Join Telegram Telegram  and  Telegaram Group. Our Groups are open for all people.

  • All the groups are now Strictly watched by our Responsible & Genius Administrators!
Read more

2 Comments:

Post a Comment

Top 3 World Live Cyber Attack Maps for Digital Threat

October 15, 2020 By SUMAN MONDAL Server, Windows 0 Comments


 

What is a DDoS Attack?


First, we must define the meaning of a DDoS attack. DDoS attacks are a main concern in internet security, and many people misunderstand what exactly they are.

Read more

0 Comments:

Post a Comment

How to easily Track Someones IP Address Location & Internet

October 11, 2020 By SUMAN MONDAL Android, Server, Webside, Windows 1 Comments


What Can You Learn from a Tracking Link?

The kind of information you can learn from a tracking link depends on the type of link you're using. There are two types of tracking links that Grabify can create, the default being a lightweight and nearly undetectable redirect to a decoy URL. This default option looks and acts like a URL shortener, and the average person wouldn't notice it.

From this kind of link, you can expect to get the IP address, country, browser, operating system, hostname, and internet service provider. For someone that's harassed online, that alone may be enough to file a police report or press charges.

If you want to use the advanced tracking link that Grabify offers, the target will see a brief redirect page that looks like this:

How to Catch an Internet Catfish with Grabify Tracking Links

Because the average user wouldn't recognize this as something to be suspicious of, it's generally safe to use when you need more information. Because we're rendering a page this time, we can learn a lot more information about the user.

With the advanced tracking, we can see the battery level and whether or not the device is plugged in. We can see the make and model of the device, the internal network IP address, the time zone, screen size, and even which way the user is holding their device. This level of detail can get downright creepy and can give you the upper hand in proving someone isn't really who they say they are.


✳️ Video Tutorials :-  






.



FEATURES


Date/Time
IP Address
Country
City
Battery
Charging
Orientation
Connection Type
Timezone
Language
Incognito/Private Window
Ad Blocker
Screen Size
Local IP
Browser
Operating System
Device
GPU
Bot Name
Bot URL
User Agent
Referring URL
Host Name
ISP
VPN/Proxy Detection
Tor Detection
Virtual Machine Detection


Step 1: Find a Plausible Link to Send

For this attack to work, we need to create a scenario where it makes sense for the target to click or tap a link. There are two different kinds of links we can send, one loads a fake referral page that grabs more information, and the other is a simple pass-through link that is less visible but also records less information.


Step 2: Create a Tracking URL

The first step in tracking a target with a Grabify link is to find a link you think your target would expect to receive. It should be something unsuspicious when the target ends up at the URL, and it will serve as a cover for the tracking link you create. You want to pretend like you're sending them a regular innocent URL shortened version of whatever decoy link you pick.

In my example, I'll be shortening slowhotcomputer.com.


How to Catch an Internet Catfish with Grabify Tracking Links


Grabify will generate a tracking page, complete with a tracking link and interface with information about each time someone has clicked or tapped on the link. When you first start, it should be empty, although some URL shorteners will use bots to preview the link you're shortening, and that data might show up.


How to Catch an Internet Catfish with Grabify Tracking Links

Now that we have a functional tracking link, it's time to start making it look more like something our target would click or tap.

Step 3: Shorten & Hide Your Tracking Link

Grabify isn't exactly a subtle URL name, so part of successfully getting your target to click or tap on a link is providing a link that doesn't look too out of place. You can obscure the link with any number of URL shorteners, some of which are available right in Grabify.

Below, you can see the list of URL shorteners Grabify supports. Click on "View Other link Shorteners" next to Other Links on the log page.

How to Catch an Internet Catfish with Grabify Tracking Links

If the included shortener options don't suit your situation, you can always create a custom link that looks like an image file, GIF, CSV, HTML, Torrent, or ISO file.

Click on either "Click here" beside Select Domain Name or "Change domain/Make a custom link" in the New URL box, then check out the "Extension" drop-down. You can make it look like you're sharing a file rather than a referral link, which may work better to trick the target into clicking or tapping on your link.

How to Catch an Internet Catfish with Grabify Tracking Links

In this custom link menu, there are also options to a different domain from one of the ones provided by Grabify, provide a custom path, and give a custom parameter.

Once you generate a shortened link or a custom URL disguise, you're ready to present it to the target. Once the target clicks or taps the link, an entry will appear under the "Results" section of your log page.

Step 4: Interpret the Tracking Information

Now, open your target link and see what you get. In the default configuration, you don't use a fake referral page, so you don't get the most information possible.

You should see a detection on your management portal (you may need to refresh the page), and you can select it to view more details. As you can see in my example below, I have the essentials, like the location, IP address, and information such as the internet service provider and operating system.

How to Catch an Internet Catfish with Grabify Tracking Links

To kick things up a notch, you can enable the "Smart Logger" feature by clicking the toggle switch on the web interface. The toggle enables a fake tracking page that will be able to extract a lot more information.

How to Catch an Internet Catfish with Grabify Tracking Links

Once "Smart Logger" is enabled, open the link again and take a look at the recorded information. This time, you should see a lot more information.

How to Catch an Internet Catfish with Grabify Tracking Links

This extra information can tell us a lot. For one, in my example, the internal IP address tells us that this person is likely connected to a VPN, as a standard local IP address would probably look like "192.168.0.2" or something similar. We can also see more information about the specific device that made the request, as well as the screen size and browser extensions installed.

You'll also notice that you can learn if the battery is charging and what battery level is. It could allow you to track a person over a short period, with their battery level either increasing if charging or decreasing if not charging, which could identify the device uniquely. Another overlooked value is the language and time zone, which are often set by the system.

In some cases, we can see the make and model of the device making the request, allowing us to pinpoint the hardware used by the target. Any of these details may be enough to bust a catfish, either by revealing them to be in the wrong state or country, showing a device different from the one the person uses in their (probably fake) photos, or by showing a time zone that makes no sense for where they claim to be.


. .
.

1 Comments:

Post a Comment

41 Best Hacking Apps For Android Rooted & Non Rooted 2020

October 09, 2020 By SUMAN MONDAL Android 0 Comments

 


Best hacking apps for Android - One of the most talked about topic. Let's dig right in to find out more about it.


I don't need to tell you that Android is the most popular operating system for smartphones. And due to its ever-growing popularity, we have certainly seen a great rise in hacking apps for Android.

Read more

0 Comments:

Post a Comment

How to Hack a Website : Online Example

October 08, 2020 By SUMAN MONDAL Webside 1 Comments



More people have access to the internet than ever before. This has prompted many organizations to develop web-based applications that users can use online to interact with the organization. Poorly written code for web applications can be exploited to gain unauthorized access to sensitive data and web servers.

In this article, we will introduce you to web applications hacking techniques and the counter measures you can put in place to protect against such attacks.

Read more

1 Comments:

Post a Comment

How To Hack Android Smartphone Using Kali Linux and Metasploit

October 02, 2020 By SUMAN MONDAL Android, Linux, Termux 0 Comments


This time I will share a tutorial how to hack or look at Android-based mobile phones activity belongs to someone else using operating system Kali Linux 2.0 and Metasploit that already exists on Kali Linux when you finish the install

Read more

0 Comments:

Post a Comment

How to Use Free Ubuntu Linux Full Version Cloud Server || any Android Phone, and Windows

October 01, 2020 By SUMAN MONDAL Server 0 Comments
Cloud Online Server Ubuntu Open and Use 


Free Hosting Online for OnlineHacking to WorkStations






Online HacKing Ubuntu GNOME online, version 16, is a complete desktop Linux operating system, freely available with both community and professional support. The Ubuntu community is built on the ideas enshrined in the Ubuntu Manifesto: that software should be available free of charge, that software tools should be usable by people in their local language and despite any disabilities, and that people should have the freedom to customise and alter their software in whatever way they see fit. "Ubuntu" is an ancient African word, meaning "humanity to others". The Ubuntu distribution brings the spirit of Ubuntu to the software world.

Read more

0 Comments:

Post a Comment

Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

surfe

Categories

  • Android
  • Attack
  • Linux
  • Server
  • Termux
  • Webside
  • Webside/server
  • Wi-Fi
  • Windows

Social Media

Facebook Page

a-Ads

Popular Posts

  • 41 Best Hacking Apps For Android Rooted & Non Rooted 2020
  • Top 15 Best WiFi Hacking Android Apps for 2020
  • Hack Gmail ID Password with Hydra Brute Force Attack use Termux & Linux
  • 7 Best Kali Linux Tools for Hacking and Penetration Testing
  • How To Hack Android Smartphone Using Kali Linux and Metasploit

Search This Webside

Blog Archive

  • August (2)
  • November (3)
  • October (11)
  • September (5)
  • August (1)
  • July (1)
  • June (2)
  • May (7)
  • April (1)
  • January (1)

Hacker

Search This Hacking

Total Pageviews

Share

Translate


Online Hacking

Online Hacking
Copyright © 2020 Online-HacKing