Quantcast
Channel: Hack 2 World ®
Viewing all 421 articles
Browse latest View live

New And Famous Ripper - Phantom.Vendor

0
0
Hello World

Its me Joe Root Hack 2 World Admin, Today i post about Seller name Phantom Vendor, he is very famous kid on hack2wwworld blog and many other blogs on google, but truth is thats this man is ripper and scammer , scam like wu selling and cc cvv fullz selling, i talk with phantom vendor i deal with him but i dont pay him 1 month and he cant send me money to my wu info its mean its real ripper


This is Shamius Sunny my hack2wwworld blog member, he post some comments read this


i search on google about phantom vendor look what i found, site link http://scamskiller.blogspot.com/ this man post report about phantom vemdor


here an other report on google site :- http://scam-information-scam.blogspot.com/


DONT PAY MONEY TO PHANTOM VENDOR OR ANY OTHER WU SELLER OR CC CVV SELLERS

THANKS HACK 2 WORLD LONG LIVE 

BYE
































Inbox Spamming Service By Joe Root

0
0

Hello World 

These Day Inbox SMTP have Problems, now i start my Spamming Service for CARDERS - HACKERS - SPAMMERS - CODERS PROGRAMMERS - SEO

ALL TOOLS YOUR - I JUST USE MY SENDERS Smile

50k Leads Mail Spamming :- 100$

100K Leads Mail Spamming :- 150$

INBOX :- GMAIL - HOTMAIL - YAHOO - MAIL.COM - AOL ===>> OTHERS
  • Jabber :- z3r0@exploit.im
  • Yahoo :- internet.zer0@yahoo.com
  • ICQ :- 691768633
  • Skype :- internet.zero


Safe 3 Web Vulnerability Scanner V8.1

Office Exploit - For Sell 2015

0
0



1., it never fud no matter how much u bypass detection it still falls down to 1

2., https://viruscheckmate.com/id/xX5nQ02KveV7 <<== VIRUS SCAN LINK

3., yes it is working for unpatched ms office


Jabber :- z3r0@exploit.im
Yahoo :- internet.zer0@yahoo.com
ICQ :- 691768633
Skype :- internet.zero

Private Root Servers - Allow Cracking Scanning Brutforce And Other Crime

0
0
Hello All

I Sell Private Root Servers For Cracking Scanning Brutforce

Allow :- SMTP SCANNERS - RDPS SCANNERS - SSH SCANNERS - ROOTS SCANNERS - VNC SCANNERS - AND OTHER CRIME ALLOW 



Normal Roots Prices

Celeron, G1620 / 847, 2.7 GHz x 2, 2 MB / 2GB Ram / 500HDD / 1 IP :- 250$ Month

Core i3, 4350, 3.6 GHz x 2, 4 MB / 4GB RAM / 500GB / 1 IP :- 350$ Month

Core i5, 4440, 3.1 GHz x 4, 6 MB / 8GB RAM / 1000 GB Unmetered / 2 IP :- 470$ Month

High Root Prices

2xXeon L5420 / HDD 750GB + 2TB / 16GB RAM / 2 IPv4 / PORT 100Mb/s / KVM Permanent :- 550$ Month

2xXeon L5335 / HDD 750GB + 2TB / 20GB RAM / 2 IPv4 /PORT 100Mb/s / KVM Permanent :- 650$ Month


SMTP Bruter v1.2.3 By Ar3s - 2015 Smtp Scanner And Cracker

Linset Hack Wifi Full - Tuto + Pictures

Top 5 Password Cracking Tools

0
0
Password cracking tools are often refereed to as password recovery tools used to guess or restore a password from a data transmission system. Security researchers and penetration testers also use these tools to check the security of an application.

It is an undeniable fact that in cyber security passwords are the most vulnerable security links. But if the password is too complicated the user might not remember it. These tools are useful when user forgets their passwords but hackers also use them to crack passwords of systems and stole data.


There are many type of password cracking tools. Some uses dictionaries of their own to crack a password, those tools have a combination of words but it will take hours or even days if the users password is complicated one. Plus the success rate of these tools are also not very high.

 Programmers in past few years has introduced different password cracking tools in the market, some of them are highly successful in terms of results. Here we shortlisted the top 5 most successful password cracking tools available in the market.

1. Medusa

Medusa is a highly rated password cracking tool which runs on Linux OS. It is highly rated among network administrators who keep checking their firms passwords time by time to ensure they cannot be cracked easily. This tools can provide you a result about how strong your organizations passwords are. It supports  NNTP, FTP, CVS, HTTP, IMAP,  MYSQL, NCP,AFP,  POP3, MS SQL, PostgreSQL, pcAnywhere, rlogin, SMB, rsh, SMTP, SNMP, SSH, SVN, VNC, VmAuthd and Telnet. While cracking the password, host, username and password can be flexible input while performing the attack.

2. Wfuzz

Wfuzz cracks passwords with brute forcing another famous password cracking tool. Wfuzz can be used to find unlinked resources like servelts,scripts and directories.Wfuzz is based on dictionaries and ranges, user just had to choose where he want to bruteforce just by changing the part of URL or the post by keyword Fuzz. Some top features of Wfuzz are; Recursion, Multiple Injection points capability with multiple dictionaries, Output to HTML and many more.

3. Brutus

Brutus is a popular password cracking tool which can be used remotely. Brutus is available in the market since 2000, but it only works in Windows OS. It supports HTTP (Basic Authentication), HTTP (HTML Form/CGI), POP3, FTP, SMB, Telnet and other types such as IMAP, NNTP, NetBus, etc. The latest version of Brutus contains features like; HTTP (Basic Authentication), HTTP (HTML Form/CGI), POP3, FTP, Telnet, SMB. Another feature in this tool is that user can create their own authentication types. The tool is old but still it is providing desired results. 

4. John the Ripper

John the Ripper is another widely used open source password cracking tool, works on Linux, Windows, Unix, and Mac OS X. Its basic purpose is to detect weak passwords in Unix. A pro version of this tool is also available in the market right now with additional features, and its pretty cheap.

5. Cain and Abel

This tool operates on Microsoft OS only but the sucess rate is very high. The tool operates as a sniffer in the network, it cracks the encrypted passwords through the dictionary attacks, recording VoIP conversations, brute force attacks, cryptanalysis attacks,  revealing password boxes, uncovering cached passwords, decoding scrambled passwords, and analyzing routing protocols.


Windows Genuine Keys XP To W10

0
0

Operating System: Microsoft Windows 8.1 Pro with Media Center 64-bit
Serial Key: 4FY98-BKG77-HX482-HPJRV-6XWKG

------------------

Operating System: Microsoft Windows 8.1 Professionnel 64 bits
Serial Key: VKTXG-GXXY3-W97QP-GP4PV-PWD3K

------------------

Operating System: Microsoft Windows Server 2012 R2 Foundation 64 bits
Serial Key: P6R77-F9TV6-WFDJW-8WPBV-KHHKB

------------------

Operating System: Microsoft Windows? Small Business Server 2011 Standard  64-bit
Serial Key: 2QWT9-FMJ8G-99KPY-4MRQJ-XXX3W

------------------

Operating System: Microsoft Windows?7 ?dition Int?grale  64 bits
Serial Key: 2Y4WT-DHTBF-Q6MMK-KYK6X-VKM6G

------------------

Operating System: Microsoft Windows 7 Professional  64-Bit
Serial Key: 32KD2-K9CTF-M3DJT-4J3WC-733WD

------------------

Operating System: Microsoft Windows 7 Ultimate  64-bit
Serial Key: JC7BV-94FD2-D86PH-XRMHR-BXKDG

------------------

Operating System: Microsoft Windows 7 Ultimate  32-Bit
Serial Key: 342DG-6YJR8-X92GV-V7DCV-P4K27

------------------

Operating System: Microsoft Windows 7 Professional  64-bit
Serial Key: PXJFM-RBJTT-GT836-M8RG6-3XG9T

------------------

Operating System: Microsoft Windows Server 2012 Essentials 64-bit
Serial Key: RTDPD-JGKF3-4GQ7K-R7C7H-DRPQ6

------------------

Operating System: Microsoft Windows 8.1 64 bits
Serial Key: PVJ4F-3YY92-G9DVF-TYHMF-YTB8Q

------------------

Operating System: Microsoft Windows 7 Ultimate  64-bit
Serial Key: V2D7V-PWVKX-GTM93-YRYQ4-FWFKW

------------------

Operating System: Microsoft Windows 7 Ultimate  64-bit
Serial Key: MHFPT-8C8M2-V9488-FGM44-2C9T3

------------------

Operating System: Microsoft Windows 7 Ultimate  64-bit
Serial Key: 2Y4WT-DHTBF-Q6MMK-KYK6X-VKM6G

------------------

Operating System: Microsoft Windows 7 Ultimate  64 bits
Serial Key: 2Y4WT-DHTBF-Q6MMK-KYK6X-VKM6G

------------------

Operating System: Microsoft Windows 8 64 bits
Serial Key: T9VPB-W8YRP-PFJXR-VQJ4H-B7RD7

------------------

Operating System: Microsoft Windows 8.1 64-bit
Serial Key: W46KQ-7J98D-J8RV6-8MJJ2-KWXVT

------------------

Operating System: Microsoft Windows 8.1 Pro 64-bit
Serial Key: PHC9R-HDCVX-JC336-VQ7TD-M7RFC

------------------

Operating System: Microsoft Windows 7 Enterprise  32 bits
Serial Key: FJGCP-4DFJD-GJY49-VJBQ7-HYRR2

------------------

Operating System: Microsoft Windows XP Professional
Serial Key: RQJVG-49THF-HM36P-7PP33-98H68

------------------

Operating System: Microsoft Windows?7 ?dition Int?grale  64-bit
Serial Key: 2Y4WT-DHTBF-Q6MMK-KYK6X-VKM6G

------------------

Operating System: Microsoft Windows 7 Home Premium  64-bit
Serial Key: 2P2P9-CM3F8-FTV6P-PC7CX-8TFF7

------------------

Operating System: Microsoft Windows 7 Home Premium  32-bit
Serial Key: 6B88K-KCCWY-4F8HK-M4P73-W8DQG

------------------

Operating System: Microsoft Windows?7 ?dition Int?grale  64 bits
Serial Key: D4F6K-QK3RD-TMVMJ-BBMRX-3MBMV

------------------

Operating System: Microsoft Windows XP Home Edition
Serial Key: XHBXR-4TM46-23TT7-TD2BR-YHW6T

------------------

Operating System: Microsoft Windows 8.1 64-bit
Serial Key: TYWH4-4639B-CDPXV-283XV-RGB8Q

------------------

Operating System: Microsoft Windows 7 Home Premium  64-bit
Serial Key: 4G3GR-J6JDJ-D96PV-T9B9D-M8X2Q

------------------

Operating System: Microsoft Windows 7 Home Premium  64-bit
Serial Key: 4FG99-BC3HD-73CQT-WMF7J-3Q6C9

------------------

Operating System: Microsoft Windows 8.1 64-bit
Serial Key: PW6VG-FJ6M6-MCVMM-DFGQV-XD4D6

------------------

Operating System: Microsoft Windows 8.1 64-bit
Serial Key: M3KC2-C8WGY-M34D7-YKTPD-974WQ

------------------

Operating System: Microsoft Windows 8 64 bit
Serial Key: QQR9K-QMYWP-2V9R8-72M49-MG67T

------------------

Operating System: Microsoft Windows 7 Professional  64-bit
Serial Key: Q27KV-FF7FK-TT9HJ-PMHJX-JXG69

------------------

Operating System: Microsoft® Windows Vista™ Édition Familiale Premium  32 bits
Serial Key: 2TYBW-XKCQM-XY9X3-JDXYP-6CJ97

------------------

Operating System: Microsoft Windows 7 Ultimate  64-bit
Serial Key: D4F6K-QK3RD-TMVMJ-BBMRX-3MBMV

------------------

Operating System: Microsoft Windows 7 Home Premium  64-bits
Serial Key: 2P2P9-CM3F8-FTV6P-PC7CX-8TFF7

------------------

Operating System: Microsoft Windows 7 Professional  64-Bit
Serial Key: 2WCJK-R8B4Y-CWRF2-TRJKB-PV9HW

------------------

Operating System: Microsoft Windows 8.1 Enterprise 64-bit
Serial Key: RRYK7-2P7MW-C6RX4-F6TT8-33VQH

------------------

Operating System: Microsoft Windows 7 Ultimate  32 bits
Serial Key: 2Y4WT-DHTBF-Q6MMK-KYK6X-VKM6G

------------------

Operating System: Microsoft Windows 7 Ultimate  32-bit
Serial Key: FJGCP-4DFJD-GJY49-VJBQ7-HYRR2

------------------

Operating System: Microsoft Windows 8.1 64 bits
Serial Key: WDH6G-VHK8M-4KDD2-4W8HM-X4Q2D

------------------

Operating System: Microsoft Windows 10 Professionnel 64 bits
Serial Key: TY4CG-JDJH7-VJ2WF-DY4X9-HCFC6

------------------

Operating System: Microsoft Windows 7 Professional K  32-bit
Serial Key: 2WCJK-R8B4Y-CWRF2-TRJKB-PV9HW

------------------

Operating System: Microsoft Windows 8.1 Pro 64-bit
Serial Key: VKTXG-GXXY3-W97QP-GP4PV-PWD3K

------------------

Operating System: Microsoft Windows 10 Pro 64-bit
Serial Key: TY4CG-JDJH7-VJ2WF-DY4X9-HCFC6

------------------

Operating System: Microsoft Windows XP Professional
Serial Key: KKP4W-6PDBP-PYMFM-9TRY6-YXFG4

------------------

Operating System: Microsoft Windows 7 Ultimate  64-bit
Serial Key: FJGCP-4DFJD-GJY49-VJBQ7-HYRR2

------------------

Operating System: Microsoft Windows 7 Professional  32-bit
Serial Key: W6GXX-X99RB-G68VM-WCF84-HXD6V

------------------

Operating System: Microsoft Windows 8.1 Pro 64-bit
Serial Key: YP37Y-GPR9M-FHF36-33YV7-B7RDH

------------------

Operating System: Microsoft Windows 10 Home 64-Bit
Serial Key: T49TD-6VFBW-VV7HY-B2PXY-MY47H

------------------

Operating System: Microsoft Windows 10 Famille 64 bits
Serial Key: T49TD-6VFBW-VV7HY-B2PXY-MY47H

------------------

Operating System: Microsoft Windows 8.1 64-Bit
Serial Key: V34JD-4VTFQ-27FK4-JDBYD-7T8JQ

------------------

Operating System: Microsoft Windows 7 Ultimate  64-Bit
Serial Key: FJGCP-4DFJD-GJY49-VJBQ7-HYRR2

------------------

Operating System: Microsoft Windows 10 Pro 64-Bit
Serial Key: TY4CG-JDJH7-VJ2WF-DY4X9-HCFC6

------------------

Operating System: Microsoft Windows 8.1 64-Bit
Serial Key: RHJQQ-QMJWK-YHHWF-KJK7K-WTXF3

------------------

Operating System: Microsoft Windows 10 Pro 64-bit
Serial Key: R3HB7-X6HMH-F48J3-8XJVP-9QBP9

------------------

Operating System: Microsoft Windows 7 Professional  64-Bit
Serial Key: 237XB-GDJ7B-MV8MH-98QJM-24367

------------------

Operating System: Microsoft Windows 10 Home 32-bit
Serial Key: T49TD-6VFBW-VV7HY-B2PXY-MY47H

------------------
Operating System: Microsoft Windows 10 Pro 64 bits
Serial Key: TY4CG-JDJH7-VJ2WF-DY4X9-HCFC6

------------------

Operating System: Microsoft Windows 7 Home Premium  32-bits
Serial Key: 4FG99-BC3HD-73CQT-WMF7J-3Q6C9

------------------

Operating System: Microsoft Windows 7 Ultimate  32-Bit
Serial Key: D4F6K-QK3RD-TMVMJ-BBMRX-3MBMV

------------------

Operating System: Microsoft Windows XP Professional
Serial Key: CB9YB-Q73J8-RKPMH-M2WFT-P4WQJ

------------------

Operating System: Microsoft Windows 7 Home Premium  64-Bit
Serial Key: GM9QB-9VD6B-8X38Q-QDQPX-7CGC8

------------------

Operating System: Microsoft Windows 8.1 64-bit
Serial Key: VBXM6-9DBBV-4WH8D-DKBQR-X2C43

------------------

Operating System: Microsoft Windows 7 Home Premium  64-bits
Serial Key: HP92V-G3JTR-JKYF9-DWVX2-C44P2

------------------

Operating System: Microsoft Windows XP Professional
Serial Key: XJM6Q-BQ8HW-T6DFB-Y934T-YD4YT

------------------

Operating System: Microsoft Windows 7 Home Premium  64-bit
Serial Key: 6B88K-KCCWY-4F8HK-M4P73-W8DQG

------------------

Operating System: Microsoft Windows 10 Enterprise 64-bit
Serial Key: KT6X7-HKD4G-V98JB-PKMG3-GF4CD

------------------

Operating System: Microsoft Windows 10 Home 64-bit
Serial Key: T49TD-6VFBW-VV7HY-B2PXY-MY47H

------------------

Operating System: Microsoft Windows 7 Professional  64-bit
Serial Key: 4QRYW-2W4G2-69C88-8GVCJ-3XQKV

------------------

Operating System: Microsoft Windows 7 Professional  64-bit
Serial Key: 2WCJK-R8B4Y-CWRF2-TRJKB-PV9HW

------------------

Operating System: Microsoft Windows 7 Ultimate  64-bit
Serial Key: 342DG-6YJR8-X92GV-V7DCV-P4K27

------------------

Operating System: Microsoft Windows 7 Professional  64-bit
Serial Key: HXPT7-2K3T2-MXC4W-J9DHP-MYBWY

------------------

Operating System: Microsoft Windows 7 Professional  64-bit
Serial Key: 237XB-GDJ7B-MV8MH-98QJM-24367

------------------

Operating System: Microsoft Windows 8.1 64-bit
Serial Key: V76XT-8BDXK-F73FR-H6FBP-HH4WQ

------------------

Operating System: Microsoft Windows 8.1 64-Bit
Serial Key: RM6QR-7JQGM-BCR62-FGMF3-973HT

------------------

Operating System: Microsoft Windows 10 Pro 64-bit
Serial Key: PV24P-26BW9-4GQVV-XCB8P-J44DB

------------------

Operating System: Microsoft Windows 8.1 64 bits
Serial Key: T2QMM-BPHQD-HTHRV-D8CJW-J8CMG

------------------

Operating System: Microsoft Windows 8.1 Pro 64-Bit
Serial Key: VKTXG-GXXY3-W97QP-GP4PV-PWD3K

------------------

Operating System: Microsoft Windows 8.1 Pro 64 bit
Serial Key: VKTXG-GXXY3-W97QP-GP4PV-PWD3K

------------------

Operating System: Microsoft Windows 7 Ultimate  64-bits
Serial Key: J33KX-HT939-6BWR9-PG2MM-F2V8G

------------------

Operating System: Microsoft Windows 7 Professional  64-bits
Serial Key: 2WCJK-R8B4Y-CWRF2-TRJKB-PV9HW

------------------

Operating System: Microsoft Windows 10 Pro 64-Bit
Serial Key: R3HB7-X6HMH-F48J3-8XJVP-9QBP9

------------------

Operating System: Microsoft Windows 7 Professional  64-bit
Serial Key: 9HJXX-8KHG2-JB428-JQWDP-GV7MH

------------------

Operating System: Microsoft Windows 10 Pro 64-Bit
Serial Key: QT4BX-TGK66-C73YD-W9WHB-MY49G

------------------

Operating System: Microsoft Windows 7 Home Premium  64-bits
Serial Key: 4FG99-BC3HD-73CQT-WMF7J-3Q6C9

------------------

Operating System: Microsoft Windows 7 Home Premium  64-bits
Serial Key: X9DYV-C6R9G-D9Y22-BRF24-2R39P

------------------

Operating System: Microsoft Windows 7 Édition Intégrale  32 bits
Serial Key: MHFPT-8C8M2-V9488-FGM44-2C9T3

------------------

Operating System: Microsoft Windows 7 Professional  64-Bit
Serial Key: 262H3-863JQ-YYYBK-9TJY6-DJT6H

------------------

Operating System: Microsoft Windows 7 Professional  64-Bit
Serial Key: PVCDV-9DW33-PDCB4-MM89R-H32JT

------------------

Operating System: Microsoft Windows 7 Professional  64-Bit
Serial Key: YTW9F-V2DM7-GTD3W-CY989-X4CFQ

------------------

Operating System: Microsoft Windows 8.1 Pro 64-Bit
Serial Key: P67YV-H2P76-W8YJT-RH7YJ-CPM9B

------------------

Operating System: Microsoft Windows 7 Ultimate  64-Bit
Serial Key: D4F6K-QK3RD-TMVMJ-BBMRX-3MBMV

------------------

Operating System: Microsoft Windows 10 Home 64-bit
Serial Key: R6CBH-7FX6F-CDM7F-2GTFH-YY47F

------------------

Operating System: Microsoft Windows 7 Édition Intégrale  64 bits
Serial Key: FJGCP-4DFJD-GJY49-VJBQ7-HYRR2

------------------

Operating System: Microsoft Windows XP Professional
Serial Key: V2C47-MK7JD-3R89F-D2KXW-VPK3J

------------------

Operating System: Microsoft Windows 10 Pro Insider Preview 64-bit
Serial Key: TY4CG-JDJH7-VJ2WF-DY4X9-HCFC6

------------------

Operating System: Microsoft Windows 7 Home Premium  64-bit
Serial Key: 7YMFQ-4YP2H-MDMFD-VGRPK-VXX6X

------------------

Operating System: Microsoft Windows 7 Ultimate  32-bit
Serial Key: 2Y4WT-DHTBF-Q6MMK-KYK6X-VKM6G

------------------

Operating System: Microsoft Windows 7 Ultimate  64-bits
Serial Key: MHFPT-8C8M2-V9488-FGM44-2C9T3

------------------

Operating System: Microsoft Windows XP Professional
Serial Key: MJPMD-69P47-4JK37-DGQF2-XMWPQ

------------------

Operating System: Microsoft Windows 8.1 64 bits
Serial Key: TMQDJ-YWFKX-GKWM4-PK8XF-K4Q2D

------------------

Operating System: Microsoft Windows 8.1 64-bit
Serial Key: QR6P9-T7WMW-P4YW6-B8QQD-Y4FWQ

------------------

Operating System: Microsoft Windows 10 Pro 64 bits
Serial Key: R3HB7-X6HMH-F48J3-8XJVP-9QBP9

------------------

Operating System: Microsoft Windows 7 Édition Familiale Premium  64 bits
Serial Key: 4FG99-BC3HD-73CQT-WMF7J-3Q6C9

------------------

Operating System: Microsoft Windows 7 Ultimate  64-bit
Serial Key: 22TKD-F8XX6-YG69F-9M66D-PMJBM

------------------

Operating System: Microsoft Windows 7 Home Premium  64-Bit
Serial Key: CQBVJ-9J697-PWB9R-4K7W4-2BT4J

------------------

Operating System: Microsoft Windows 8.1 Pro 64-Bit
Serial Key: KHDMH-3WR87-3HW4R-77RRP-76B83

------------------

Operating System: Microsoft Windows 7 Home Premium  64-bit
Serial Key: TJM3P-VKWMB-BTKDD-HTRBK-HGHJQ

------------------

Operating System: Microsoft Windows 7 Home Premium  64-Bit
Serial Key: 2QDBX-9T8HR-2QWT6-HCQXJ-9YQTR

------------------

Operating System: Microsoft Windows 8.1 64-Bit
Serial Key: R44JV-KBP4H-HJ9DT-72G79-4JP43

------------------

Operating System: Microsoft Windows 10 Education 64-bit
Serial Key: MXBJD-Y8VVJ-KPY4K-QXKDV-M4G4M

------------------

Operating System: Microsoft Windows 7 Home Basic  64-bit
Serial Key: 9H4FH-VD69Y-TGBD2-4PM4K-DRMMH

------------------

Operating System: Microsoft Windows 7 Home Premium  64-Bit
Serial Key: CQBFX-GKGBH-27M6B-PQ97H-HKJRM

------------------

Operating System: Microsoft Windows 7 Starter  32 bits
Serial Key: RDJXR-3M32B-FJT32-QMPGB-GCFF6

------------------

Operating System: Microsoft Windows 7 Édition Intégrale  32 bits
Serial Key: FJGCP-4DFJD-GJY49-VJBQ7-HYRR2

------------------

Operating System: Microsoft Windows 10 Home 64-bit
Serial Key: P4YDP-V7F7Q-D736Q-636TD-M7VX6

------------------

Operating System: Microsoft® Windows Vista™ Home Premium  32-Bit
Serial Key: 2TYBW-XKCQM-XY9X3-JDXYP-6CJ97

------------------

Operating System: Microsoft Windows 8.1 64-Bit
Serial Key: Q6RBP-HPYWD-HC3QQ-967F4-8B2MG

------------------

Operating System: Microsoft Windows 7 Home Premium  64-Bit
Serial Key: 27GBM-Y4QQC-JKHXW-D9W83-FJQKD

------------------

Operating System: Microsoft Windows Embedded 8.1 Industry Enterprise 64-bit
Serial Key: MJWRC-RKVKD-Q28H9-8CXTF-YTCB9

------------------

Operating System: Microsoft Windows 8.1 64-bit
Serial Key: Q2674-XK978-JG9TH-CJDKD-JTXF3

------------------

Operating System: Win32NT
Serial Key: TY4CG-JDJH7-VJ2WF-DY4X9-HCFC6

------------------

Operating System: Microsoft Windows 7 Home Premium  64-bit
Serial Key: F8WQ2-FJWKX-P6GJR-6GJ4H-493XH

------------------

Operating System: Microsoft Windows 8.1 Pro 64-bit
Serial Key: 3BJVR-HVYQ9-84VKB-QF2R4-PPKT7

------------------

Operating System: Microsoft Windows 7 Ultimate  32-bit
Serial Key: RBHB4-2HYBQ-XH42V-GYP3M-M8VGD

------------------

Operating System: Microsoft Windows 8.1 64 bitar
Serial Key: TVRYW-CCKJD-FTHPK-F3248-J8CMG

------------------

Operating System: Microsoft Windows 8.1 64-bit
Serial Key: PYFFG-VDQ64-XBM8G-BW83B-92BQ7

------------------

Operating System: Microsoft Windows 7 Ultimate  64-bit
Serial Key: 2XQ63-J3P67-9G3JC-FHQ68-8Q2F3

------------------

Operating System: Microsoft Windows 7 Home Premium  64-bit
Serial Key: H4JWX-WHKWT-VGV87-C7XPK-CGKHQ

------------------

Operating System: Microsoft Windows 7 Ultimate  64-bits
Serial Key: W2J7H-YJ9HQ-PCHT4-6F3K6-WT88D

------------------

Operating System: Microsoft Windows 10 Pro 32-Bit
Serial Key: TY4CG-JDJH7-VJ2WF-DY4X9-HCFC6

------------------

Operating System: Microsoft Windows 8.1 64-Bit
Serial Key: WCYGG-YTHT2-46Y4C-G9HYK-TF243

------------------

Operating System: Microsoft Windows 7 Ultimate  64-Bit
Serial Key: 2Y4WT-DHTBF-Q6MMK-KYK6X-VKM6G

------------------

Operating System: Microsoft Windows 7 Ultimate  64-bits
Serial Key: FJGCP-4DFJD-GJY49-VJBQ7-HYRR2

------------------

Operating System: Microsoft Windows 7 Home Premium  64-bits
Serial Key: 9BQ3G-B4V3B-W8392-YH7HM-6YJJD

------------------

Operating System: Microsoft Windows 7 Ultimate  32-bit
Serial Key: MHFPT-8C8M2-V9488-FGM44-2C9T3

------------------

Operating System: Microsoft Windows 7 Ultimate  64-bit
Serial Key: BTVK6-Y8QCP-Y4437-WJ49F-G7BXV

------------------

Operating System: Microsoft Windows 7 Home Premium  32-bit
Serial Key: J499P-HF2C3-MP7TX-MMQT6-RHFQY

------------------

Operating System: Microsoft Windows 10 Pro 32 bits
Serial Key: R3HB7-X6HMH-F48J3-8XJVP-9QBP9

------------------

Operating System: Microsoft Windows 7 Extreme Edition R1 - x64  64-bit
Serial Key: 342DG-6YJR8-X92GV-V7DCV-P4K27

------------------

Operating System: Microsoft Windows 7 Home Premium  64-bit
Serial Key: 27GBM-Y4QQC-JKHXW-D9W83-FJQKD

------------------

Operating System: Microsoft Windows 8.1 64-bit
Serial Key: MJ4DR-8PCMY-88G8D-G8MXC-MPWYG

------------------

Operating System: Microsoft Windows 10 Pro 32-bit
Serial Key: R3HB7-X6HMH-F48J3-8XJVP-9QBP9

------------------

Operating System: Microsoft Windows 10 Pro 64 bits
Serial Key: PV24P-26BW9-4GQVV-XCB8P-J44DB

------------------

Operating System: Microsoft Windows 10 Home 64-bit
Serial Key: MR62T-RFKJT-QB7GQ-9K7C3-BG9QR

------------------

Operating System: Microsoft Windows 7 Enterprise  64-bit
Serial Key: 33PXH-7Y6KF-2VJC9-XBBR8-HVTHH

------------------

Operating System: Microsoft Windows 8.1 64 bits
Serial Key: M928J-P9VBG-B4HT7-Q9WXF-CRYQ6

------------------

Operating System: Microsoft Windows 8.1 64-bit
Serial Key: KVJYV-JRKCB-8J264-P8PBX-YDTBG

------------------

Operating System: Microsoft Windows 7 Ultimate  64-Bit
Serial Key: 9CW99-79BBF-D4M3X-9BK9M-4RPH9

------------------

Operating System: Microsoft Windows 10 Enterprise N 64-bit
Serial Key: WH6PX-XHVJW-J843T-XW8JX-2YT6F

------------------

Operating System: Microsoft Windows 7 Home Premium  64-bits
Serial Key: P6MRV-3BTBR-D6PMM-93TH4-VRPVJ

------------------

Operating System: Microsoft Windows 8.1 Professionnel 32 bits
Serial Key: VKTXG-GXXY3-W97QP-GP4PV-PWD3K

------------------

Operating System: Microsoft Windows 10 Home 64 bits
Serial Key: T49TD-6VFBW-VV7HY-B2PXY-MY47H

------------------

Operating System: Microsoft Windows 7 Home Premium  32 bit
Serial Key: 4FG99-BC3HD-73CQT-WMF7J-3Q6C9

------------------

Operating System: Microsoft Windows 8.1 Pro 64-bit
Serial Key: X7TXD-GWKTK-HJ9JG-X9CVD-2WCKV

------------------

Operating System: Microsoft Windows 8.1 64-bit
Serial Key: R9WYK-XWK3R-7DRGW-KH9QF-W8D2D

------------------

Operating System: Microsoft Windows 8.1 64 bits
Serial Key: K3B2M-F9WVJ-KBQTX-TK2KH-46V36

------------------

Operating System: Microsoft Windows XP Professional
Serial Key: D2VY9-RMHY3-2KQ8P-MRKPD-Q7CPW

------------------

Operating System: Microsoft Windows 10 Pro 32 bit
Serial Key: TY4CG-JDJH7-VJ2WF-DY4X9-HCFC6

------------------

Operating System: Microsoft Windows 10 Pro 64-bit
Serial Key: MR9M3-R3XJT-29Y34-YTDG8-JFG6T

------------------

Operating System: Microsoft Windows 7 Home Basic  64-bit
Serial Key: 36T88-RT7C6-R38TQ-RV8M9-WWTCY

------------------

Operating System: Microsoft Windows 10 Pro 32-bit
Serial Key: TY4CG-JDJH7-VJ2WF-DY4X9-HCFC6

------------------

Operating System: Microsoft Windows 10 Pro 64 bites
Serial Key: R3HB7-X6HMH-F48J3-8XJVP-9QBP9

------------------

Operating System: Microsoft Windows 8.1 Enterprise 64-biters
Serial Key: RRYK7-2P7MW-C6RX4-F6TT8-33VQH

------------------

Operating System: Microsoft® Windows Vista™ Home Premium  64-bit
Serial Key: BWH66-4MJXW-9JK72-HV92V-PVCYY

------------------

Operating System: Microsoft Windows 8 64-Bit
Serial Key: MCFWW-H2JC6-D4Y8D-VB4GY-CWCMG

------------------

Operating System: Microsoft Windows 7 Home Premium  64-bit
Serial Key: 3GKRG-6M2QP-GM4RH-HTBVK-JRHCK

------------------

Operating System: Microsoft Windows 8.1 64-bit
Serial Key: VHBF2-QD6P9-DCPHV-Q4X6D-DV3HT

------------------

Operating System: Microsoft Windows 10 Enterprise 2015 LTSB 64-Bit
Serial Key: M24YP-639XW-2W4BK-M4MBG-MKMPK

------------------

Operating System: Microsoft Windows 8.1 64-bit
Serial Key: VY4HW-6PPFW-B7HRK-GD3TQ-JTV36

------------------

Operating System: Microsoft Windows 8.1 Pro 64-Bit
Serial Key: RGQQY-M6QVC-M64MB-P8Q97-DRQ2Y

------------------



How To Open TCP/UDP Sockets

0
0

How to open TCP/UDP sockets using a built-in feature in Bash ?

Bash shell has a built-in feature that allows to open TCP/UDP sockets using a simple syntax. This is very useful when tools like netcat are not installed or we don’t have the permission to use it.
The syntax is
$ exec {file-descriptor}<>/dev/{protocol}/{host}/{port}

  • {file-descriptor} – 0, 1 and 2 are seserved for stdin, stout and stderr respectively. At least 3 must be used. The Bash manual suggest to be careful in using descriptors above 9 since there could be conflict with descriptors used internally by the shell.
  • <> – the file is open for both reading and writing
  • {protocol} – TCP or UDP
  • {host} – ip address or domain name of the host
  • {port} – logic port

Sockets can be closed using
$ exec {file-descriptor}<>&-
To send a message through the socket
echo -e -n "$MSG_OUT">&3
or
printf "$MSG_OUT">&3
To read a message from the socket
read -r -u -n $MSG_IN <&3
Output can be printed recursively
while read LINE <&3
do
    echo $LINE >&1
done
Or read entirely in one variable
OUTPUT=$(dd bs=$BYTES count=1 <&3 2> /dev/null)

Example:

$ exec 3<>/dev/tcp/127.0.0.1/1234
We are opening a socket for reading and writing to the 1234 port in the loopback interface.
The /dev/tcp and /dev/udp files aren’t real devices but are keywords interpreted by the Bash shell. Being a “bashism” this solution is not portable even if seems that ksh and zsh shells have the same feature enabled.
In this example we fetch the Google main page:
$ exec 3<>/dev/tcp/www.google.com/80
$ echo -e "GET / HTTP/1.1\n\n">&3
$ cat <&3
It’s good practice to always close file descriptors
$ exec 3<&-
$ exec 3>&-

Finally,  IRC server example:
#!/bin/bash

##########################################################
# Config

NICK="CyberPunk"
SERVER="irc.n0where.net"
PORT=6667
CHANNEL="#CyberPunk"

##########################################################
# Main

exec 3<>/dev/tcp/${SERVER}/${PORT}
echo "NICK ${NICK}">&3
echo "USER ${NICK} 8 * : ${NICK}">&3
echo "JOIN ${CHANNEL}">&3
cat <&3

exit $?

Enable/disable net redirections

More the feature must be enabled in Bash at compile time. To enable it if you want to compile the Bash yourself include the flag
--enable-net-redirections
while to disable it explicitly use
--disable-net-redirections
Each distribution may or not have the feature enabled in their precompiled Bash.
This is a built-in feature that needs to be enabled in Bash at compile time but also ksh and zsh seem to have it. System administrators might want to disable this feature since could represent a security concern. In general the use of specific tools to create sockets like netcat and socat are preferable if possible.


How to VNC Through SSH Tunnel

0
0



VNC, or “Virtual Network Computing”, is a connection system that allows you to use your keyboard and mouse to interact with a graphical desktop environment on a remote server. VNC makes managing files, software, and settings on a remote server easier for users who are not yet comfortable with working with the command line.
In this guide, we will be setting up VNC on an Ubuntu server and connecting to it securely through an SSH tunnel. The VNC server we will be using is TightVNC, a fast and lightweight remote control package. This choice will ensure that our VNC connection will be smooth and stable even on slower Internet connections.

How to VNC Through SSH Tunnel: Prerequisites

Before you begin with this guide, there are a few steps that need to be completed first.
You will need an Ubuntu server installed and configured with a non-root user that has sudo privileges.
Once you have your non-root user, you can use it to SSH into your Ubuntu server and continue with the installation of your VNC server.

Install Desktop Environment and VNC Server

By default, most Linux server installations will not come with a graphical desktop environment. If this is the case, we’ll need to begin by installing one that we can work with. In this example, we will install XFCE4, which is very lightweight while still being familiar to most users.
We can get the XFCE packages, along with the package for TightVNC, directly from Ubuntu’s software repositories using apt:
sudo apt-get update
sudo apt-get install xfce4 xfce4-goodies tightvncserver
To complete the VNC server’s initial configuration, use the vncserver command to set up a secure password:
vncserver
(After you set up your access password, you will be asked if you would like to enter a view-only password. Users who log in with the view-only password will not be able to control the VNC instance with their mouse or keyboard. This is a helpful option if you want to demonstrate something to other people using your VNC server.)
vncserver completes the installation of VNC by creating default configuration files and connection information for our server to use. With these packages installed, you are ready to configure your VNC server and graphical desktop.

Configure VNC Server

First, we need to tell our VNC server what commands to perform when it starts up. These commands are located in a configuration file called xstartup. Our VNC server has an xstartup file preloaded already, but we need to use some different commands for our XFCE desktop.
When VNC is first set up, it launches a default server instance on port 5901. This port is called a display port, and is referred to by VNC as :1. VNC can launch multiple instances on other display ports, like:2:3, etc. When working with VNC servers, remember that :X is a display port that refers to5900+X.
Since we are going to be changing how our VNC servers are configured, we’ll need to first stop the VNC server instance that is running on port 5901:
vncserver -kill :1
Before we begin configuring our new xstartup file, let’s back up the original in case we need it later:
mv ~/.vnc/xstartup ~/.vnc/xstartup.bak
Now we can open a new xstartup file with nano:
nano ~/.vnc/xstartup
Insert these commands into the file so that they are performed automatically whenever you start or restart your VNC server:
#!/bin/bash
xrdb $HOME/.Xresources
startxfce4 &
The first command in the file, xrdb $HOME/.Xresources, tells VNC’s GUI framework to read the server user’s.Xresources file. .Xresources is where a user can make changes to certain settings of the graphical desktop, like terminal colors, cursor themes, and font rendering.
The second command simply tells the server to launch XFCE, which is where you will find all of the graphical software that you need to comfortably manage your server.
To ensure that the VNC server will be able to use this new startup file properly, we’ll need to grant executable privileges to it:
sudo chmod +x ~/.vnc/xstartup

Create a VNC Service File

To easily control our new VNC server, we should set it up as an Ubuntu service. This will allow us to start, stop, and restart our VNC server as needed.
First, open a new service file in /etc/init.d with nano:
sudo nano /etc/init.d/vncserver
The first block of data will be where we declare some common settings that VNC will be referring to a lot, like our username and the display resolution.
#!/bin/bash
PATH="$PATH:/usr/bin/"
export USER="user"
DISPLAY="1"
DEPTH="16"
GEOMETRY="1024x768"
OPTIONS="-depth ${DEPTH} -geometry ${GEOMETRY} :${DISPLAY} -localhost"
. /lib/lsb/init-functions
Be sure to replace user with the non-root user that you have set up, and change 1024x768 if you want to use another screen resolution for your virtual display.
Next, we can start inserting the command instructions that will allow us to manage the new service. The following block binds the command needed to start a VNC server, and feedback that it is being started, to the command keyword start.
case "$1" in
start)
log_action_begin_msg "Starting vncserver for user '${USER}' on localhost:${DISPLAY}"
su ${USER} -c "/usr/bin/vncserver ${OPTIONS}"
;;
The next block creates the command keyword stop, which will immediately kill an existing VNC server instance.
stop)
log_action_begin_msg "Stopping vncserver for user '${USER}' on localhost:${DISPLAY}"
su ${USER} -c "/usr/bin/vncserver -kill :${DISPLAY}"
;;
The final block is for the command keyword restart, which is simply the two previous commands (stopand start) combined into one command.
restart)
$0 stop
$0 start
;;
esac
exit 0
Once all of those blocks are in your service script, you can save and close that file. Make this service script executable, so that you can use the commands that you just set up:
sudo chmod +x /etc/init.d/vncserver
Now try using the service and command to start a new VNC server instance:
sudo service vncserver start

Connect to Your VNC Desktop

To test your VNC server, you’ll need to use a client that supports VNC connections over SSH tunnels. If you are using Windows, you could use TightVNC, RealVNC, or UltraVNC. Mac OS X users can use the built-in Screen Sharing, or can use a cross-platform app like RealVNC.
First, we need to create an SSH connection on your local computer that securely forwards to thelocalhostconnection for VNC. You can do this via the terminal on Linux or OS X via the following command:
(Remember to replace user and server_ip_address with the username and IP you used to connect to your server via SSH.)
ssh -L 5901:127.0.0.1:5901 -N -f -l userserver_ip_address
If you are using a graphical SSH client, like PuTTY, use server_ip_address as the connection IP, and setlocalhost:5901 as a new forwarded port in the program’s SSH tunnel settings.
Next, you can use your VNC viewer to connect to the VNC server at localhost:5901. Make sure you don’t forget that :5901 at the end, as that is the only port that the VNC instance is accessible from.
Once you are connected, you should see the default XFCE desktop ready for configuration and use! It should look something like this:

vnc_connection

Once you have verified that the VNC connection is working, add your VNC service to the default services, so that it will automatically start whenever you boot your server:
sudo update-rc.d vncserver defaults

How To Install and Secure phpMyAdmin

0
0

How To Install and Secure phpMyAdmin

Relational database management systems like MySQL are needed for a significant portion of web sites and applications. However, not all users feel comfortable administering their data from the command line.
To solve this problem, a project called phpMyAdmin was created in order to offer an alternative in the form of a web-based management interface. In this guide, we will demonstrate how to install and secure a phpMyAdmin configuration on an Ubuntu 14.04 server. We will build this setup on top of the Nginx web server, which has a good performance profile and can handle heavy loads better than some other web servers.
Before we begin, there are a few requirements that need to be settled.
  • Ubuntu Server
  • LEMP (Linux, Nginx, MySQL, and PHP) stack on your Ubuntu server.

Install phpMyAdmin

With our LEMP platform already in place, we can begin right away with installing the phpMyAdmin software.
sudo apt-get update
sudo apt-get install phpmyadmin
During the installation, you will be prompted for following information.
  • Which web server you would like the software to automatically configure.
  • The next prompt will ask if you would like dbconfig-common to configure a database for phpmyadmin to use. Select “Yes” to continue.
  • You will also need to enter the database administrative password that you configured during the MySQL installation to allow these changes.
When the installation is complete. you will need to create a symbolic link from the installation files to our Nginx document root directory:
sudo ln -s /usr/share/phpmyadmin /usr/share/nginx/html
A final item that we need to address is enabling the mcrypt PHP module, which phpMyAdmin relies on.
sudo php5enmod mcrypt
sudo service php5-fpm restart
With that, our phpMyAdmin installation is now operational. To access the interface, go to your server’s domain name or public IP address followed by /phpmyadmin, in your web browser:
http://domain/phpmyadmin
phpmyadmin
To sign in, use a username/password pair of a valid MySQL user.

Secure your phpMyAdmin Instance

The phpMyAdmin instance installed on our server should be completely usable at this point. However, by installing a web interface, we have exposed our MySQL system to the outside world. Even with the included authentication screen, this is quite a problem.
We will implement two simple strategies to lessen the chances of our installation being targeted and compromised. We will change the location of the interface from /phpmyadmin and also create an additional, web server-level authentication gateway that must be passed before even getting to the phpMyAdmin login screen.

Changing the Application’s Access Location

In order for our Nginx web server to find and serve our phpMyAdmin files, we created a symbolic link from the phpMyAdmin directory to our document root. To change the URL where our phpMyAdmin interface can be accessed, we simply need to rename the symbolic link.
cd /usr/share/nginx/html
ls -l
total 8
-rw-r--r-- 1 root root 537 Nov 17 18:46 50x.html
-rw-r--r-- 1 root root 612 Nov 17 18:46 index.html
lrwxrwxrwx 1 root root 21 Nov 17 19:50 phpmyadmin -> /usr/share/phpmyadmin
As you can see, we have a symbolic link called phpmyadmin in this directory. We can change this link name to whatever we would like. This will change the location where phpMyAdmin can be accessed from a browser, which can help obscure the access point from hard-coded bots.
Choose a name that does not indicate the purpose of the location. In this guide, we will name our access location /hiddenadmin. To accomplish this, we will just rename the link:
sudo mv phpmyadmin hiddenadmin
ls -l
total 8
-rw-r--r-- 1 root root 537 Nov 17 18:46 50x.html
-rw-r--r-- 1 root root 612 Nov 17 18:46 index.html
lrwxrwxrwx 1 root root 21 Nov 17 20:25 hiddenadmin -> /usr/share/phpmyadmin
Now, if you go to the previous location of your phpMyAdmin installation, you will get a 404 error
http://domain/phpmyadmin
However, your phpMyAdmin interface will be available at the new location we selected:
http://domain/hiddenadmin

Setting up a Web Server Authentication Gate

The next feature we wanted for our installation was an authentication prompt that a user would be required to pass before ever seeing the phpMyAdmin login screen.
Fortunately, most web servers, including Nginx, provide this capability natively. We will just need to modify our Nginx configuration file with the details.
Before we do this, we will create a password file that will store our the authentication credentials. Nginx requires that passwords be encrypted using the crypt() function. The OpenSSL suite, which should already be installed on your server, includes this functionality.
To create an encrypted password, type:
openssl passwd
You will be prompted to enter and confirm the password that you wish to use. The utility will then display an encrypted version of the password that will look something like this:
O5az.RSPzd.HE
Copy this value, as you will need to paste it into the authentication file we will be creating.
Now, create an authentication file. We will call this file pma_pass and place it in the Nginx configuration directory:
sudo nano /etc/nginx/pma_pass
Within this file, you simply need to specify the username you would like to use, followed by a colon (:), followed by the encrypted version of your password you received from the openssl passwd utility.
We are going to name our user demo, but you should choose a different username. The file for this guide looks like this:
demo:O5az.RSPzd.HE
Save and close the file when you are finished.
Now, we are ready to modify our Nginx configuration file. Open this file in your text editor to get started:
sudo nano /etc/nginx/sites-available/default
Within this file, we need to add a new location section. This will target the location we chose for our phpMyAdmin interface (we selected /hiddenadmin in this guide).
Create this section within the server block, but outside of any other blocks. We will put our new location block below the location / block in our example:
server {
. . .

location / {
try_files $uri $uri/ =404;
}

location /hiddenadmin {
}

. . .
}
Within this block, we need to set the value of a directive called auth_basic to an authentication message that our prompt will display to users. We do not want to indicate to unauthenticated users what we are protecting, so do not give specific details. We will just use “Admin Login” in our example.
We then need to use a directive called auth_basic_user_file to point our web server to the authentication file that we created. Nginx will prompt the user for authentication details and check that the inputted values match what it finds in the specified file.
After we are finished, the file should look like this:
server {
. . .

location / {
try_files $uri $uri/ =404;
}

location /hiddenadmin {
auth_basic "Admin Login";
auth_basic_user_file /etc/nginx/pma_pass;
}

. . .
}
Save and close the file when you are finished.
To implement our new authentication gate, we must restart the web server:
sudo service nginx restart
Now, if we visit our phpMyAdmin location in our web browser (you may have to clear your cache or use a different browser session if you have already been using phpMyAdmin), you should be prompted for the username and password you added to the pma_pass file:
http://domain/hiddenadmin
Once you enter your credentials, you will be taken to the normal phpMyAdmin login page. This added layer of protection will help keep your MySQL logs clean of authentication attempts in addition to the added security benefit.
You can now manage your MySQL databases from a reasonably secure web interface. This UI exposes most of the functionality that is available from the MySQL command prompt. You can view databases and schema, execute queries, and create new data sets and structures.

Learn Java Full Simplistically

How To Clone SIM Card VULNERABILITIES

0
0

NOTE: Following information is for educational purposes only!
The following guide enables us to make clones of SIM used in India that means you can use one number with two SIM cards at the same time.
Before i start off with this guide ,i would like to make one thing clear SIM CLONING is illegal. So please use this guide for personal purpose only,do not use this guide for cheating.
First off a little introduction about SIM CARD:
Our sim cards contain two secret codes or keys called (imsi value and ki value) which enables the operator to know the mobile number and authenticate the customer ,these codes are related to our mobile numbers which the operators store in their vast data base,it is based on these secret keys that enables the billing to be made to that customer. now what we do in sim cloning is extract these two secret codes from the sim and programme it into a new blank smart card often known as wafer, since the operator
authentication on sims is based on these values,it enables us to fool the operators in thinking that its the
original sim,this authentication is a big flaw concerning GSM technology
Now which sim cards can be cloned:
Sim cards are manufactured on the basis of 3 algorithms COMP128v1,COMP128v2 and COMP128v3
now an important note currently only COMP128v1 version sim cards can be
cloned ,since this is the only algorithm which has been cracked by users, bear in mind that 70% of all the sim cards we use are COMP128v1 .
OK thats it about the background….. now lets get to the Main Part
1. Buy a Sim card Reader
2.Need a Blank sim card or super sim card
5. Install programs.
6. go in phone tools, select sim card, then select unlock sim, it will promt for a code.
7 call network provider, they will ask for your phone number, your account info, name and security code,
then they will ask why you want to unlock your simcard, just tell them you need to unlock your sim to get it
to work with your overseas phone or something.
8. Once they give you the sim unlock code, enter it, and it will say sim unlocked.
9. remove the sim from your phone, place it in the cardreader, click read from card in magic sim program.
10. once it says connected, select crack sim in the toolbar. click strong ki and clink all of the other find options and then click start.
11. Once your ki is found and the crack is finished, click file, save as and save your cracked sim info to a that file.
12. IMPORTANT!!! you must click disconnect from the file menu or you will ruin your simcard. once it says
disconnected, remove the sim. put it in your phone and see if it still works, it should. if not, you either did not unlock your sim, or you tried to copy it instead of crack and save.
13. insert black 3g card Use other program, not magic sim at this point.
14. click connect
15. it will say no info found if it is truly blank.
16. select write to sim, it will promt you to select a dat file, select the one you saved before, now click start, it will take about 10 minutes to write it, once it is complete, it will ask for a security code, enter the security code network provider gave you, then click finish.
17. your card is cloned. if you try to make 2 calls at the same time, one will go through, the other will say call failed, and both phones will get the same messages, text and voice, and both will recieve the same calls, but only one can talk at a time.


NWHT – NEW TOOL FOR HACKING WIRELESS

0
0

Network Wireless Hacking Tools, new version and support your kali linux






The Top 10 Wifi Hacking Tools in Kali Linux

0
0
In this top 10 Wifi Hacking Tools we will be talking about a very popular subject: hacking wireless networks and how to prevent it from being hacked. Wifi is often a vulnerable side of the network when it comes to hacking since signals can be picked up everywhere and by anyone. Router manufacturers and ISPs turning on WPS by default makes wireless security and penetration testing even more important. With the following top 10 Wifi hacking tools we are able to test our own wireless networks for potential security issues. Let’s start off the top 10 Wifi Hacking Tools with the first tool:

1 Aircrack-ng

Aircrack is one of the most popular tools for WEP/WPA/WPA2 cracking. The Aircrack-ng suite contains tools to capture packets and handshakes, de-authenticate connected clients and generate traffic and tools to perform brute force and dictionary attacks. Aicrack-ng is an all-in-one suite containing the following tools (among others):
– Aircrack-ng for wireless password cracking
– Aireplay-ng to generate traffic and client de-authentication
– Airodump-ng for packet capturing
– Airbase-ng to configure fake access points
The Aicrack-ng suite is available for Linux and comes standard with Kali Linux. If you plan to use this tool you have to make sure your Wifi card is capable of packet injection.
Aircrack-ng aireplay-ng WPA Handshake

2 Reaver

Number 2 in the top 10 Wifi hacking tools is Reaver. Reaver is another popular tool for hacking wireless networks and targets specifically WPS vulnerabilities. Reaver performs brute force attacks against Wifi Protected Setup (WPS) registrar PINs to recover the WPA/WPA2 passphrase. Since many router manufacturers and ISPs turn on WPS by default a lot of routers are vulnerable to this attack out of the box.
In order to use Reaver you need a good signal strength to the wireless router together with the right configuration. On average Reaver can recover the passphrase from vulnerable routers in 4-10 hours, depending on the access point, signal strength and the PIN itself off course. Statistically you have a 50% chance of cracking the WPS PIN in half of the time.
Pixie Dust attack

3 Pixiewps

PixieWPS is a relatively new tool included with Kali Linux and also targets a WPS vulnerability. PixieWPS is written in C and is used to brute force the WPS PIN offline exploiting the low or non-existing entropy of vulnerable access points. This is called a pixie dust attack. PixieWPS requires a modified version of Reaver or Wifite to work with. Since this tools has become quite popular in little time, it earns the number 3 in our top 10 Wifi hacking tools list.
Pixie Dust attack

4 Wifite

Wifite is an automated tool to attack multiple wireless networks encrypted with WEP/WPA/WPA2 and WPS. On start-up Wifite requires a few parameters to work with and Wifite will do all the hard work. It will capture WPA handshakes, automatically de-authenticate connected clients, spoof your MAC address and safe the cracked passwords.

5 Wireshark

Wireshark is one of the best network protocal analyzer tools available, if not the best. With Wireshark you can analyse a network to the greatest detail to see what’s happening. Wireshark can be used for live packet capturing, deep inspection of hundreds of protocols, browse and filter packets and is multiplatform.
Wireshark is included with Kali Linux but also available for Windows and Mac. For certain features you do need a Wifi adapter which is supports promiscuous and monitoring mode.

6 oclHashcat

Number 6 in our top 10 Wifi hacking tools is oclHashcat. oclHashcat is not a dedicated Wifi hacking tool and is not included with Kali Linux, but it can do brute force and dictionary attacks on captured handshakes very fast when using a GPU. After using the Aircrack-ng suite, or any other tool, to capture the WPA handshake you can crack it with oclHashcat using your GPU. Using a GPU with oclHashcat, instead of a CPU with Aicrack-ng, will speed up the cracking process a lot. An average GPU can try about 50.000 combinations per second with oclHashcat.
oclHashcat is available for Windows and Linux and has a version for AMD and Nvidia video cards. AMD video cards require Catalyst 14.9 exactly and Nvidia video cards require ForceWare 346.x or later to work.
oclhashcat

7 Fern Wifi Cracker

Fern Wifi Cracker is a wireless security auditing and attack tool written in Python. Fern Wifi Cracker is the first dedicated Wifi hacking tool in this list which has an graphical user interface. Fern is able to crack and recover WEP, WPA and WPS keys and contains tools to perfom MiTM attacks.
Fern Wifi Cracker runs on any Linux distribution which contains the prerequisites. Fern Wifi Cracker is included with Kali Linux.

8 Wash

Wash is a tool to determine whether an access point has WPS enabled or not. You can also use Wash to check if an access point locked up WPS after a number of Reaver attempts. A lot of access points locks itself up as a security measure when brute forcing the WPS PIN. Wash is included with the Reaver package and comes as a standard tool with Kali Linux.
Wash-WPS-locks wifi hacking tools Top 10 Wifi Hacking Tools

9 Crunch

Crunch is a great and easy to use tool for generating custom wordlists which can be used for dictionary attacks. Since the success rate of every dictionary attack depends on the quality of the used wordlist, you cannot avoid creating your own wordlist. Especially when you want to create wordlists based on default router passwords. Crunch can also be piped directly to other tools like Aircrack-ng. This feature can save a lot of time since you won’t have to wait until large password lists have been generated by Crunch before you can use them.
Crunch Password List generation Top 10 Wifi Hacking Tools

10 Macchanger

Last but not least in this top 10 Wifi Hacking Tools is Macchanger. Macchanger is a little utility which can be used to spoof your MAC address to a random MAC address or you can make up your own. Spoofing your MAC address for wifi hacking might be necessary to avoid MAC filters or to mask your identity on a wireless network.
MAC Address spoofing with macchanger

Crack Any WPA/WPA2 With Wifite

0
0

Step 1: Get Ready Your Dictionary File

First, we’re gonna need a dictionary, to perform the dictionary attack. If the network you’re attacking has WPS enabled, you may attempt to get the password that way first.
In Kali, you have a nice wordlist that comes bundled within your installation/live usb. It’s located in /usr/share/wordlists, but it comes compressed in .gz format (at least in the live version).
To get it ready for the attack, we need to type:
gzip -d /usr/share/wordlists/rockyou.txt.gz
And within seconds it’ll be extracted and ready to use.
Backtrack has them located in /pentest/passwords/wordlists. It has one that’s called darkc0de.lst along with the rockyou.txt one.
You can use them simply copying one of this after the ‘-dict’ option.
/pentest/passwords/wordlists/rockyou.txt
/pentest/passwords/wordlists/darkc0de.lst
For any other distros, search for “download wordlist rockyou” or “download wordlist darkc0de”, or just “download wordlist” in DuckDuckGo. It gives more precise results than Google for this kind of stuff.
For the rest of this, I’ll assume that you’re using Kali.

Step 2: Launch Wifite

To launch Wifite, you must be running with root permissions.
In a live Kali boot, you are logged on by default with the root user. If you let it running for a while (while cracking with the dictionary, pressumably) and it asks for a password to return to the session, it’s ‘toor’ (root backwards).
Same for BackTrack (confirmation needed), and for other distros you can gain root access by typing “su” or “sudo su” and entering the password. The first command requires you to know root’s password, and the second your current account’s and it must have root privileges.
TL;DR? Okay, you just want the command? Here it is!
wifite -mac -aircrack -dict /usr/share/wordlists/rockyou.txt
-mac | Anonymizes your MAC Address by randomizing it (it mustn’t be set to monitor mode, or this command won’t work).
-aircrack | Tells Wifite we’ll be doing an Aircrack only attack.
-dict | Select a dictionary to use for cracking the password after capturing the handshake, otherwise you’ll get the ‘.cap’ file and Wifite will terminate.
I have it located in a different folder because I’m not running Kali, but it’s pretty much the same.

Step 3: Select Your Wireless Adapter and Your Target

If you have a laptop, you’ll probably have to choose which adapter to use, if you have an external USB adapter. Please note that you’ll need a compatible adapter that’s able to inject packets and enter into promiscuous mode (monitor mode), or this won’t work.
If prompted, we select our adapter choosing the number Wifite has assigned it. In my case, I’ll type ‘1’, because that’s mine. One good indicator for knowing which one it is, is reading that name to the left of phy. For example, I have one that says ‘usb’ in it, and one that doesn’t. And yep, I have it plugged to USB, so that one’s it.
Now we’ll see a list of wireless networks, and if we let it run, it will eventually display ‘client’ or ‘clients’ at the top right of the network info, showing that it has a client (or more) connected to it.
To stop the scan, press Ctrl+C. I’ll choose “Casa” (spanish for House).

Step 4: Sit and Wait

If the network you’re attempting to crack has WPS enabled, it’ll start cracking it like that first. To stop it, just press Ctrl+C
Now it will attempt to capture the handshake for a few minutes.
If no clients are connected, it’ll send a general deauth to the wireless adapter, so that clients may show up.
If it detects a client connected to the network, it’ll tell you it’s MAC Address, and proceed to send targeted deauths to that client.
When it succeeds deauthenticating a client (who has re-connect enabled by default), or a new client connects to the network, hopefully it will capture the handshake, and it’ll start attempting to crack it with aircrack-ng and the dictionary file you gave it.
If the passphrase is any of the words contained in that dictionary, it’ll stop and show it on screen. Otherwise, it’ll run through the whole dictionary, and say it couldn’t find the key. But it has a nice success rate.
I used my country in lowercase letters as the passphrase (argentina), and as it’s along the first words in this dictionary, it took only one second to crack it. For you it may take over an hour or two, depending on your processing power and if the passphrase is near the beginning or the end of the list.

Wifite Succeded but Failed!

If it failed, you still get the ‘.cap’ file (hopefully not empty).
You can use that file with the same dictionary (or others) with aircrack-ng, using this command:
aircrack-ng -w <location of dictionary> <location of your .cap file>
In Kali live, ‘.cap’ files get saved into a folder named ‘hs’ of the folder you’re standing.
After Wifite has ended, type:
ls ./hs
To see you ‘.cap’ files and other files for cracking.

Increase Wifi Signal Strength on Kali Linux

0
0

Requirements:
1. Wireless card (some wireless card cannot configure tx-power)
2. Wavemon (apt-get install wavemon)

Step by step Increase Wifi Signal Strength(TxPower) on Kali Linux:

1. Open up our terminal (see tutorial here how to create the shortcut) and type
IFCONFIG
and make sure your wireless network already detected and up.
Increase Wifi Signal Strength(Tx-Power) on Kali Linux
2. Now let’s check our wireless card default tx-power by running this command
IWCONFIG WLAN0
Increase Wifi Signal Strength(Tx-Power) on Kali Linux
the default tx-power of my wireless card is 20 dBm.
3. When we check the default signal quality through wavemon,
Increase Wifi Signal Strength(Tx-Power) on Kali Linux
4. To change the tx-power we must turn off our wireless interface by running
IFCONFIG WLAN0 DOWN
and then change the regional to BO (Bolivia) which in that country they allow the use of 1000 mW tx-power
IW REG SET BO
turn on the wireless interface again
IFCONFIG WLAN0 UP
5. Now we can check again our wireless card status by running
IWCONFIG WLAN0
if the tx-power already changed, let’s check our wavemon, and see the difference.
Increase Wifi Signal Strength(Tx-Power) on Kali Linux
6. We can set up our wireless card into specific channel by running
IWCONFIG WLAN0 CHANNEL 8
or we can also directly change the tx-power using this command
IWCONFIG WLAN0 TXPOWER 30
Conclusions:
1. Some problems may occur when we set higher than default tx-rate; such as:
  • overheating of the power amplifier chip and the card which will cause lower efficiency and more data errors;
  • overdriving the amplifier which will cause more data errors;
  • excessive power usage for the card and this may overload the default power supply of the board that the card is located on resulting in voltage drop and reboot or excessive temperatures for the board.
Hope it’s useful

Is Your Son a Computer Hacker?

0
0

Just by surfing the web we found one interesting Article about Hackers from 2001. This post is written by a parent about his son Peter (“computer hacker”). Lets see what he think about his son. It’s funny for me 😀 . Ok, here it is:
As an enlightened, modern parent, I try to be as involved as possible in the lives of my six children. I encourage them to join team sports. I attend their teen parties with them to ensure no drinking or alcohol is on the premises. I keep a fatherly eye on the CDs they listen to and the shows they watch, the company they keep and the books they read.
You could say I’m a model parent. My children have never failed to make me proud, and I can say without the slightest embellishment that I have the finest family in the USA.Two years ago, my wife Carol and I decided that our children’s education would not be complete without some grounding in modern computers. To this end, we bought our children a brand new Compaq to learn with. The kids had a lot of fun using the handful of application programs we’d bought, such as Adobe’s Photoshop and Microsoft’s Word, and my wife and I were pleased that our gift was received so well.
Our son Peter was most entranced by the device, and became quite a pro at surfing the net. When Peter began to spend whole days on the machine, I became concerned, but Carol advised me to calm down, and that it was only a passing phase. I was content to bow to her experience as a mother, until our youngest daughter, Cindy, charged into the living room one night to blurt out: “Peter is a computer hacker!”
As you can imagine, I was amazed. A computer hacker in my own house! I began to monitor my son’s habits, to make certain that Cindy wasn’t just telling stories, as she is prone to doing at times.
After a few days of investigation, and some research into computer hacking, I confronted Peter with the evidence. I’m afraid to say, this was the only time I have ever been truly disappointed in one of my children. We raised them to be honest and to have integrity, and Peter betrayed the principles we tried to encourage in him, when he refused point blank to admit to his activities. His denials continued for hours, and in the end, I was left with no choice but to ban him from using the computer until he is old enough to be responsible for his actions.
After going through this ordeal with my own family, I was left pondering how I could best help others in similar situations. I’d gained a lot of knowledge over those few days regarding hackers. It’s only right that I provide that information to other parents, in the hope that they will be able to tell if their children are being drawn into the world of hacking. Perhaps other parents will be able to steer their sons back onto the straight and narrow before extreme measures need to be employed.
To this end, I have decided to publish the top ten signs that your son is a hacker. I advise any parents to read this list carefully and if their son matches the profile, they should take action. A smart parent will first try to reason with their son, before resorting to groundings, or even spanking. I pride myself that I have never had to spank a child, and I hope this guide will help other parents to put a halt to their son’s misbehaviour before a spanking becomes necessary.
1. Has your son asked you to change ISPs?
Most American families use trusted and responsible Internet Service Providers, such as AOL. These providers have a strict “No Hacking” policy, and take careful measures to ensure that your internet experience is enjoyable, educational and above all legal. If your child is becoming a hacker, one of his first steps will be to request a change to a more hacker friendly provider.
I would advise all parents to refuse this request. One of the reasons your son is interested in switching providers is to get away from AOL’s child safety filter. This filter is vital to any parent who wants his son to enjoy the internet without the endangering him through exposure to “adult” content. It is best to stick with the protection AOL provides, rather than using a home-based solution. If your son is becoming a hacker, he will be able to circumvent any home-based measures with surprising ease, using information gleaned from various hacker sites.
2. Are you finding programs on your computer that you don’t remember installing?
Your son will probably try to install some hacker software. He may attempt to conceal the presence of the software in some way, but you can usually find any new programs by reading through the programs listed under “Install/Remove Programs” in your control panel. Popular hacker software includes “Comet Cursor”, “Bonzi Buddy” and “Flash”.
The best option is to confront your son with the evidence, and force him to remove the offending programs. He will probably try to install the software again, but you will be able to tell that this is happening, if your machine offers to “download” one of the hacker applications. If this happens, it is time to give your son a stern talking to, and possibly consider punishing him with a grounding.
3. Has your child asked for new hardware?
Computer hackers are often limited by conventional computer hardware. They may request “faster” video cards, and larger hard drives, or even more memory. If your son starts requesting these devices, it is possible that he has a legitimate need. You can best ensure that you are buying legal, trustworthy hardware by only buying replacement parts from your computer’s manufacturer.
If your son has requested a new “processor” from a company called “AMD”, this is genuine cause for alarm. AMD is a third-world based company who make inferior, “knock-off” copies of American processor chips. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking. AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well.
4. Does your child read hacking manuals?
If you pay close attention to your son’s reading habits, as I do, you will be able to determine a great deal about his opinions and hobbies. Children are at their most impressionable in the teenage years. Any father who has had a seventeen year old daughter attempt to sneak out on a date wearing make up and perfume is well aware of the effect that improper influences can have on inexperienced minds.
There are, unfortunately, many hacking manuals available in bookshops today. A few titles to be on the lookout for are: “Snow Crash” and “Cryptonomicon” by Neal Stephenson; “Neuromancer” by William Gibson; “Programming with Perl” by Timothy O’Reilly; “Geeks” by Jon Katz; “The Hacker Crackdown” by Bruce Sterling; “Microserfs” by Douglas Coupland; “Hackers” by Steven Levy; and “The Cathedral and the Bazaar” by Eric S. Raymond.
If you find any of these hacking manuals in your child’s possession, confiscate them immediately. You should also petition local booksellers to remove these titles from their shelves. You may meet with some resistance at first, but even booksellers have to bow to community pressure.
5. How much time does your child spend using the computer each day?
If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites. DOSing involves gaining access to the “command prompt” on other people’s machines, and using it to tie up vital internet services. This can take up to eight hours.
If your son is doing this, he is breaking the law, and you should stop him immediately. The safest policy is to limit your children’s access to the computer to a maximum of forty-five minutes each day.
6. Does your son use Quake?
Quake is an online virtual reality used by hackers. It is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school.
If your son is using Quake, you should make hime understand that this is not acceptable to you. You should ensure all the firearms in your house are carefully locked away, and have trigger locks installed. You should also bring your concerns to the attention of his school.
7. Is your son becoming argumentative and surly in his social behaviour?
As a child enters the electronic world of hacking, he may become disaffected with the real world. He may lose the ability to control his actions, or judge the rightness or wrongness of a course of behaviour. This will manifest itself soonest in the way he treats others. Those whom he disagrees with will be met with scorn, bitterness, and even foul language. He may utter threats of violence of a real or electronic nature.
Even when confronted, your son will probably find it difficult to talk about this problem to you. He will probably claim that there is no problem, and that you are imagining things. He may tell you that it is you who has the problem, and you should “back off” and “stop smothering him.” Do not allow yourself to be deceived. You are the only chance your son has, even if he doesn’t understand the situation he is in. Keep trying to get through to him, no matter how much he retreats into himself.
8. Is your son obsessed with “Lunix”?
BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called ” xenix”, which was written by Microsoft for the US government.
These programs are used by hackers to break into other people’s computer systems to steal credit card numbers. They may also be used to break into people’s stereos to steal their music, using the “mp3” program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as “telnet”, which is used by hackers to connect to machines on the internet without using a telephone.
Your son may try to install ” lunix” on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional.
If you see the word “LILO” during your windows startup (just after you turn the machine on), your son has installed lunix. In order to get rid of it, you will have to send your computer back to the manufacturer, and have them fit a new hard drive. Lunix is extremely dangerous software, and cannot be removed without destroying part of your hard disk surface.
9. Has your son radically changed his appearance?
If your son has undergone a sudden change in his style of dress, you may have a hacker on your hands. Hackers tend to dress in bright, day-glo colors. They may wear baggy pants, bright colored shirts and spiky hair dyed in bright colors to match their clothes. They may take to carrying ” glow-sticks” and some wear pacifiers around their necks.
(I have no idea why they do this) There are many such hackers in schools today, and your son may have started to associate with them. If you notice that your son’s group of friends includes people dressed like this, it is time to think about a severe curfew, to protect him from dangerous influences.
10. Is your son struggling academically?
If your son is failing courses in school, or performing poorly on sports teams, he may be involved in a hacking group, such as the infamous ” Otaku” hacker association. Excessive time spent on the computer, communicating with his fellow hackers may cause temporary damage to the eyes and brain, from the electromagnetic radiation.
This will cause his marks to slip dramatically, particularly in difficult subjects such as Math, and Chemistry. In extreme cases, over-exposure to computer radiation can cause schizophrenia, meningitis and other psychological diseases. Also, the reduction in exercise may cause him to lose muscle mass, and even to start gaining weight. For the sake of your child’s mental and physical health, you must put a stop to his hacking, and limit his computer time drastically.
I encourage all parents to read through this guide carefully. Your child’s future may depend upon it. Hacking is an illegal and dangerous activity, that may land your child in prison, and tear your family apart. It cannot be taken too seriously.

50 Websites To Learn How To Code For Free

0
0

Searching for where to learn how to code for free,then stop.You are in perfect place,here we are listing Top 50 websites that will help you to learn how to code.Below listed website will help you to find a good coding platform for beginners.From here you will learn HTML, CSS, Javascript, SQL, XHTML, Bootstrap, C, C++, Python, Ruby, Android Development, Java and lots more.So check out each of this website and start to learn how to code.
The most heard name how to code.Codeacademy is the place to go if you aren’t quite sure where to start.The main plus point of Codecademy is that they have a advanced interface to type code and render it without using external notepad or browser.Codeacademy works on a reward system and it rewards you with badges for your achievements.Codecademy will help you to learn HTML & CSS, JavaScript, jQuery, PHP, Python, SQL, Ruby, Rails and AngularJS.
Udacity is the next best on the web to learn to code.Udacity offers video tutorials inserted with quizzes at each intervals. The video tutorials offered at Udacity are broken down into minutes of 2-3 that simply do what they were meant to.Udacity also offers a final test on your course and provides you with a downloadable certificate as shown below, for your achievement.Udacity will help you to learn Computer Science, Web Application Engineering, Software Testing, Web Development, HTML5, Python, Java, Computer Science, Algorithm.
If you like to learn Android development,then this is the best place.Learn it from the creators.Google offers an advanced android development tutorials for its users.They will teach you from how to make an app to how to submit it in Playstore.
Google’s Python Class — this is a free class for people with a little bit of programming experience who want to learn Python. The class includes written materials, lecture videos, and lots of code exercises to practice Python coding. These materials are used within Google to introduce Python to people who have just a little programming experience.
Coursera offers a wide range of courses in Computer science alone, and you cannot start off instantly. Although it is free, the classes are conducted once in every few months and you have to enrol in advance to the class, or add it in your wishlist for the next class.Coursera will guide you to learn Languages – Computer architecture, Programming languages, C++ for C programming, Algorithms, Artificial Intelligence, Cryptography…etc
Courses offered by Code.org are basic concepts of Computer Science with drag and drop programming, basics of JavaScript programming , Python, Hopscotch etc
W3Schools is optimized for learning, testing, and training.They will guide you to learn HTML, CSS, Javascript, jQuery, Bootstrap
The New Boston offers an incredible collection of video tutorials for all types of programming, including iPhone and computer game development.Thenewboston provides video tutorials for HTML5, CSS, Javascript, Java, Python, PHP, App Development, Android Development, C Programming.
Find more than a hundred online course materials for electrical engineering and computer science in MIT’s OpenCourseWare collection
One of the original free online coding resources, Khan Academy has come a long way. With easy-to-follow course sections with step-by-step video tutorials, Khan Academy is a great place to get started with your coding career.It does not offer a set of programming languages, but it deals with programming basics and approach to coding that could be applied to a vast array of languages.
On Webmonkey, you’ll find tutorials for everything from building your first website to developing with HTML5.Tutorial section includes HTML5, Ajax, CSS, APIs, Javascript etc.
Codeavengers will teach you how to develop your own games, websites and apps.Tutorials includes HTML, CSS, Javascript, Python etc.
Am not making you bored here is the quick list of remaining 38 websites:
WebsitesWhat You Will Learn
 13. CodeschoolHTML/CSS, JavaScript, Ruby, iOS
 14. TeamTreeHouseHTML/CSS, JavaScript, Ruby, iOS, Android, Python…
 15. Html5RocksHTML5/CSS
16. SqlzooSQL
17. EDXComputer Science, Java
18. TheCodePlayerHTML5, CSS3, Javascript, Jquery
 19. LearnPythonTheHardWayPython
 20. SkillCrushHTML/CSS, Javascript, Python …more
21. TutsPlusWordPress Plugin Development, Webdesigning, Other Coding tutorials
22. CodeCombatPlay to learn code
 23. DontFearTheInternetHTML/CSS
 24. LearnLayoutAdvanced CSS
25. AtozcssCSS Screencasts
26. DashHTML5, CSS3, Javascript
 27. Web AccessibilityTools and techniques for web developers
 28. TheHelloWorldProgramWeb Development, Linux, Python
29. PythonTutorPython
 30. CodeLearnWeb Development
31. RubymonkRuby
 32. Stanford UniversitySoftware Algorithms
33. NodeTutsNode JS video tutorials
 34. NodeSchoolWeb software skills
 35. EggheadVideo training for AngularJS, React, D3, and many other essential modern web technologies
36. Learn-AngularAngularJS
37. IOS DevelopmentIOS
38. LearnJavaOnlineJava
 39. CodingBatJava, Python
40. Techotopia IOS, Android
41. EssentialSQL SQL
42. SqlBolt SQL
 43. CoderdojoHTML5, CSS3, Javascript
44. HackDesignDesign course
45. Mozilla Developer NetworkMozilla Development
 46. Programming Video TutorialsC++
47. National Programme on Technology Enhanced LearningPrinciples of Programming Languages
48. LandofcodeJava, CSS, HTML, PHP and VBScript
49. SitePoint ReferenceHTML5, CSS3, Javascript
50. Wikiversity PHP, C++, Python, Java… etc

Viewing all 421 articles
Browse latest View live




Latest Images