Top 3 World Live Cyber Attack Maps for Digital Threat


 

What is a DDoS Attack?


First, we must define the meaning of a DDoS attack. DDoS attacks are a main concern in internet security, and many people misunderstand what exactly they are.

Read more

How to easily Track Someones IP Address Location & Internet


What Can You Learn from a Tracking Link?

The kind of information you can learn from a tracking link depends on the type of link you're using. There are two types of tracking links that Grabify can create, the default being a lightweight and nearly undetectable redirect to a decoy URL. This default option looks and acts like a URL shortener, and the average person wouldn't notice it.

From this kind of link, you can expect to get the IP address, country, browser, operating system, hostname, and internet service provider. For someone that's harassed online, that alone may be enough to file a police report or press charges.

If you want to use the advanced tracking link that Grabify offers, the target will see a brief redirect page that looks like this:

Because the average user wouldn't recognize this as something to be suspicious of, it's generally safe to use when you need more information. Because we're rendering a page this time, we can learn a lot more information about the user.

With the advanced tracking, we can see the battery level and whether or not the device is plugged in. We can see the make and model of the device, the internal network IP address, the time zone, screen size, and even which way the user is holding their device. This level of detail can get downright creepy and can give you the upper hand in proving someone isn't really who they say they are.

.



FEATURES


Date/Time
IP Address
Country
City
Battery
Charging
Orientation
Connection Type
Timezone
Language
Incognito/Private Window
Ad Blocker
Screen Size
Local IP
Browser
Operating System
Device
GPU
Bot Name
Bot URL
User Agent
Referring URL
Host Name
ISP
VPN/Proxy Detection
Tor Detection
Virtual Machine Detection


Step 1: Find a Plausible Link to Send

For this attack to work, we need to create a scenario where it makes sense for the target to click or tap a link. There are two different kinds of links we can send, one loads a fake referral page that grabs more information, and the other is a simple pass-through link that is less visible but also records less information.


Step 2: Create a Tracking URL

The first step in tracking a target with a Grabify link is to find a link you think your target would expect to receive. It should be something unsuspicious when the target ends up at the URL, and it will serve as a cover for the tracking link you create. You want to pretend like you're sending them a regular innocent URL shortened version of whatever decoy link you pick.

In my example, I'll be shortening slowhotcomputer.com.



Grabify will generate a tracking page, complete with a tracking link and interface with information about each time someone has clicked or tapped on the link. When you first start, it should be empty, although some URL shorteners will use bots to preview the link you're shortening, and that data might show up.


Now that we have a functional tracking link, it's time to start making it look more like something our target would click or tap.

Step 3: Shorten & Hide Your Tracking Link

Grabify isn't exactly a subtle URL name, so part of successfully getting your target to click or tap on a link is providing a link that doesn't look too out of place. You can obscure the link with any number of URL shorteners, some of which are available right in Grabify.

Below, you can see the list of URL shorteners Grabify supports. Click on "View Other link Shorteners" next to Other Links on the log page.

If the included shortener options don't suit your situation, you can always create a custom link that looks like an image file, GIF, CSV, HTML, Torrent, or ISO file.

Click on either "Click here" beside Select Domain Name or "Change domain/Make a custom link" in the New URL box, then check out the "Extension" drop-down. You can make it look like you're sharing a file rather than a referral link, which may work better to trick the target into clicking or tapping on your link.

In this custom link menu, there are also options to a different domain from one of the ones provided by Grabify, provide a custom path, and give a custom parameter.

Once you generate a shortened link or a custom URL disguise, you're ready to present it to the target. Once the target clicks or taps the link, an entry will appear under the "Results" section of your log page.

Step 4: Interpret the Tracking Information

Now, open your target link and see what you get. In the default configuration, you don't use a fake referral page, so you don't get the most information possible.

You should see a detection on your management portal (you may need to refresh the page), and you can select it to view more details. As you can see in my example below, I have the essentials, like the location, IP address, and information such as the internet service provider and operating system.

To kick things up a notch, you can enable the "Smart Logger" feature by clicking the toggle switch on the web interface. The toggle enables a fake tracking page that will be able to extract a lot more information.

Once "Smart Logger" is enabled, open the link again and take a look at the recorded information. This time, you should see a lot more information.

This extra information can tell us a lot. For one, in my example, the internal IP address tells us that this person is likely connected to a VPN, as a standard local IP address would probably look like "192.168.0.2" or something similar. We can also see more information about the specific device that made the request, as well as the screen size and browser extensions installed.

You'll also notice that you can learn if the battery is charging and what battery level is. It could allow you to track a person over a short period, with their battery level either increasing if charging or decreasing if not charging, which could identify the device uniquely. Another overlooked value is the language and time zone, which are often set by the system.

In some cases, we can see the make and model of the device making the request, allowing us to pinpoint the hardware used by the target. Any of these details may be enough to bust a catfish, either by revealing them to be in the wrong state or country, showing a device different from the one the person uses in their (probably fake) photos, or by showing a time zone that makes no sense for where they claim to be.

. .
.
Read more

41 Best Hacking Apps For Android Rooted & Non Rooted 2020

 


Best hacking apps for Android - One of the most talked about topic. Let's dig right in to find out more about it.


I don't need to tell you that Android is the most popular operating system for smartphones. And due to its ever-growing popularity, we have certainly seen a great rise in hacking apps for Android.

Read more

How to Hack a Website : Online Example

More people have access to the internet than ever before. This has prompted many organizations to develop web-based applications that users can use online to interact with the organization. Poorly written code for web applications can be exploited to gain unauthorized access to sensitive data and web servers.

In this article, we will introduce you to web applications hacking techniques and the counter measures you can put in place to protect against such attacks.

Read more

How To Hack Android Smartphone Using Kali Linux and Metasploit


This time I will share a tutorial how to hack or look at Android-based mobile phones activity belongs to someone else using operating system Kali Linux 2.0 and Metasploit that already exists on Kali Linux when you finish the install

Read more

How to Use Free Ubuntu Linux Full Version Cloud Server || any Android Phone, and Windows

Cloud Online Server Ubuntu Open and Use 


Free Hosting Online for OnlineHacking to WorkStations






Online HacKing Ubuntu GNOME online, version 16, is a complete desktop Linux operating system, freely available with both community and professional support. The Ubuntu community is built on the ideas enshrined in the Ubuntu Manifesto: that software should be available free of charge, that software tools should be usable by people in their local language and despite any disabilities, and that people should have the freedom to customise and alter their software in whatever way they see fit. "Ubuntu" is an ancient African word, meaning "humanity to others". The Ubuntu distribution brings the spirit of Ubuntu to the software world.

Read more

How to Termux Fingerprint Lock

unnamed (2)


Created by SUMAN MONDAL


Add Fingerprint Lock to your Termux.

Note: It's not an app lock. It's only for Termux. If you don't know what Termux is, You don't need this.

Read more

How to Hack Web Server

Server Hacking - How to Hack Web Server ?




What is a Web server ?
1. A web server is a storage area, which in-turn a program,

2. That stores files ( web pages, CSS Scripts, images, java script files ) relevant to the websites in a secure folder.

3. Control website and file access located in the server by the website users via the internet.

4. Control sessions and maintain file access details

5. Web server indicates both Hardware and software.
Read more

HOW TO RUN WINDOWS 10 IN TERMUX ON ANDROID

 Hey, What's up, OnlineHacking  !! I had already shown you several ways to run Windows 10 on Android Phone whether using Limbo Emulator or Bosch or Cloud Computer but I had never shown you how to run it using a simple terminal app i.e Termux by using Qemu in it. Although I had already made several videos on running different operating system on Termux like Kali Linux or Ubuntu this time we are going to see how easily we can run Windows Operating System on Android Phone just by running few commands on Termux and if you will like this post I will also show you how to run the Windows 8.1 on Android using Termux only in an upcoming post so just comment down below if you are interested. This method is quite interesting as this will make you understand how powerful a Linux terminal can be so without wasting any more time let’s start this tutorial.





Read more

How to Hack WhatsApp using Meterpreter in Kali Linux


Today I will tell you how you can hack WhatsApp of any of your friend and see all the data of his WhatsApp.

We will do all this process on our Linux system, for which we have to first copy some commands and

create a payload that you will put in your friend’s mobile and then you can hack all the data of your

friend’s mobile from it. Can.

Read more

Hacking Wi-Fi Password Using Kali Linux 2020




What is Wi-Fi hacking?
Essentially, Wi-Fi hacking is cracking the security protocols in a wireless network, granting complete access for the hacker to view, store, download, or abuse the wireless network. With all the information gathered from your compromised Wi-Fi, hackers can use your information for their own personal requirements.
Read more

Top 5 Best Programming Languages To Learn

Top 5 Best Programming Languages To Learn




Hi folks we are back with another Useful Blog


In this we will tell you some Top Best Programming Language to learn that will also help you to getting Job


So lets get started
Read more

How to Install Hacking System Your Andriod Kali Linux, Windows, Any Linux, macOS | any Operating System install || Online Hacking

eDEX-UI is a fullscreen, cross-platform terminal emulator and system monitor that looks and feels like a sci-fi computer interface.

Heavily inspired from the TRON Legacy movie effects (especially the Board Room sequence), the eDEX-UI project was originally meant to be "DEX-UI with less « art » and more « distributable software »". While keeping a futuristic look and feel, it strives to maintain a certain level of functionality and to be usable in real-life scenarios, with the larger goal of bringing science-fiction UXs to the mainstream.

It might or might not be a joke taken too seriously.


Read more

HOW TO RUN WINDOWS 7 ON TERMUX ON ANDROID

Hey, What's up, Geeks !! I had already shown you several ways to run Windows 7 on Android Phone whether using Limbo Emulator or Bosch or Cloud Computer but I had never shown you how to run it using a simple terminal app i.e Termux by using Qemu in it. Although I had already made several videos on running different operating system on Termux like Kali Linux or Ubuntu this time we are going to see how easily we can run Windows Operating System on Android Phone just by running few commands on Termux and if you will like this post I will also show you how to run the Windows 8.1 and Windows 10 on Android using Termux only in an upcoming post so just comment down below if you are interested. This method is quite interesting as this will make you understand how powerful a Linux terminal can be so without wasting any more time let’s start this tutorial.


Read more

How to Install Metasploit Framework in Termux Without Root | Installing MSFconsole In Android 2020

Helo Guys, Today I will tell you about "How to Install Metasploit Framework in Termux Without Root" Like I said that I am going to start the series on Android Hacking, for which we had previously set up our Android Hacking Lab. Today we will be moving the same lab to know how to install Metasploit, the most powerful full tool of Hacking in your Android Phone. 
I request you to see the previous post because this post is maintaining a series in which every post is connected to each other. So you first see this post and then see this post

Metasploit
Read more