Posts

Showing posts with the label hack

[MOD][4.1 4.2] Extend Phone Storage 1.5, 2.5GB A116 (Other MT6589 Devices on request)

Image
READ EVERYTHING CAREFULLY I Will Not Responsible For Any Brick or Any Problem So Do It At Your Own Risk. This Will Extend your Device's /data partition (Phone Storage) from 1 GB to 1.5 GB or 2.5 GB.. This will make your Internal Storage smaller.. Default -- 1GB Phone Storage -- 1.773GB Internal Card 500MB patch -- 1.5GB Phone Storage -- 1.273GB Internal Card 1.5GB patch -- 2.5GB Phone Storage -- 273MB Internal Card Before Doing Anything :- Quote: MOST IMPORTANT :- DISABLE SWAPPING IF YOU'VE SWAPPED YOUR MEMORIES, OTHERWISE EXTERNAL CARD WILL BE DESTROYED. Flash This to Disable SWAPPING.. AND CROSS CHECK IF MEMORIES ARE BACK TO NORMAL OR NOT Backup Data and System Through CWM/TWRP to EXTERNAL Card Back Up Everything From Internal SD to your system, Internal SD will be formatted In this Procedure V-COM Drivers Should Be Installed In Order To Use SPF Tools Settings should accept new values, For checking Go to Settings>app and Settings>storage, If its not Force closing then i

Android Hacking and Security, : Insecure Local Storage: Shared Preferences

Image
Background Device loss is a very common problem with mobile devices. An attacker who has physical access to the device can have access to personal as well as corporate data stored in the device. The situation could be worse if the device is rooted. Keeping this in mind, if the data storage mechanisms being used by an application are not implemented properly, it may lead to serious attacks. Android local data storage techniques Developers can store data in Android applications locally in various ways, as shown below. Shared Preferences Shared Preferences are XML files to store private primitive data in key-value pairs. Data Types include Booleans, floats, ints, longs, and strings. SQLite Databases SQLite databases are lightweight file-based databases. They usually have the extension “.db” or “.sqlite”. Android provides full support for SQLite databases. Databases we create in the application will be accessible to any class in the application. Other apps cannot access them. Internal Stor

goofle search reveal

Google search engine is best known for bringing up relevant web pages to the search terms you type in, due to its page rank algorithm. However Google has built in some other lesser-known features. The Telegraph has scoured Google's search function for some of those elements. Some of them are just quirky: try typing in "do a barrel roll" or "tilt" into the search bar for instance. Others include useful functions such a translator function which enables you to type in a word in one language to find its equivalent in another. There are also homages video games, such as from the 1980's brand Atari and the so-called 'zerg rush' feature in many titles. Atari Breakout game on Google search There are also useful functions such as a calculator and weather forecasts. Google's calculator function is far more powerful than most people realise. Watch the video to find out more about Google search's features.

fake gmail

Image
This post will explain you how to create fake or phishing web page for gmail. This Procedure can be used to make fake page for other websites like yahoo,msn,or any other sites which you want to steal the password of particular user. Steps for Creating Phishing or Fake web Page: Step 1: Go to the gmail.com.  Save the Page as "complet HTML" file Step 2: Once you save the login page completely, you will see a HTML file and a folder with the name something like Email from google files.There will be two image files namely "google_transparent.gif","mail_logo.png" Step3: Upload those image to tinypic or photobucker.com.  copy the url of each image. Step4: Open the HTML file in Wordpad. Search for "google_transparent.gif" (without quotes) and replace it with corresponding url . Search for "mail_logo.png" (without quotes) and replace it with corresponding url . Step 5: Search for the action="https://www.google.com/accounts/ServiceLoginAu

top ten command prompt codes

Image
In this tutorial i will guide you to top 10 important and famous command prompt commands with their usage.   1. ipconfig :                   This is the top most command for seeing the ip address,subnet mask and default gateway also includes display and flush DNS cache, re-register the system name in DNS..  This will most useful tool for viewing and troubleshooting TCP/IP problem. To view ip ,subnet mask address : ipconfig To view all TCP/IP information, use: ipconfig /all To view the local DNS cache, use: ipconfig /displaydns To delete the contents in the local DNS cache, use: ipconfig /flushdns 2.systeminfo Have a need to display operating system configuration information for a local or remote machine, including service pack levels? Then systeminfo is the tool to use. When I need to connect to a system that I am not familiar with, this is the first tool I run. The output of this command gives me all the info I need including: host name, OS type, version, product ID, install date, boo

hack facebook

Image
BTS' readers used to ask me how to hack Facebook accounts.  Most of the people curious to know how hackers take control of their accounts.  In this post, let me clarify those doubts. Here, i am going to explain one of the popular social engineering attack(luring user to do whatever you asked to do.), called "phishing" . Phishing is one of the popular hacking technique used by hackers to lure victims into giving their login credentials. Phishing WebPage: Phishing webpage is a fake webpage of the target website that helps hackers to lure the victim into believe that they are visiting the legitimate website. Let me explain how to create a facebook phishing page. Step 1: Go to facebook and right click on website .  Select "View source" and copy the code to notepad. Step2: Now search (Press ctrl +f) for keyword "action"  in that code. You fill find the code like this: Here, let me explain what "action" means to.  If you have some basic knowledge o