cookie

Utilizamos cookies para mejorar tu experiencia de navegación. Al hacer clic en "Aceptar todo", aceptas el uso de cookies.

avatar

Afrreen Tech

❗This is Educational Channel All Hacking Termux Linux Free Internet Phone Flashing Free Software Modded Apps Internet Tricks ❗We DoNot Support, Encourage & Promote Any illegal Activity

Mostrar más
India145 200El idioma no está especificadoLa categoría no está especificada
Publicaciones publicitarias
141
Suscriptores
Sin datos24 horas
Sin datos7 días
Sin datos30 días

Carga de datos en curso...

Tasa de crecimiento de suscriptores

Carga de datos en curso...

❗This is Educational Channel 📗 All Hacking 📗 Termux 📗 Linux 📗 Free Internet 📗 Phone Flashing 📗 Free Software 📗 Modded Apps 📗 Learn any type of phone fixing 📗 Internet Tricks ❗We DoNot Support, Encourage & Promote Any illegal Activity https://t.me/KPTECHUG
Mostrar todo...
K.P TECH UG

❗This is Educational Channel 📗 All Hacking 📗 Termux 📗 Linux 📗 Free Internet 📗 Phone Flashing 📗 Free Software 📗 Modded Apps 📗 Learn any type of phone fixing 📗 Internet Tricks ❗We DoNot Support, Encourage & Promote Any illegal Activity

🛑🛑🛑🛑🛑🛑🛑🛑🛑🛑 New valnerablitiy (KPTECHUG ) 📣📣📣📣📣📣📣📣📣📣 🔰 @KPTECHUG 🔰 🛑A new valnerablitiy found in Chrome , microsoft edge, and firefox browser. It still not patched in latest version of Chrome. 🛑 Remote code exicution valnerablitiy. This valnerablitiy allows attacker to run any malicious shell code by chromium's v8 JavaScript engine. 🛑 What is does? It can run any malicious commands made by attackers on your device via chrome browser. Attacker can install any malicious payloads, and also able get your shell connection. After bypassing sendbox, it becomes exploitable for all type of devices. 🛑 How to be safe? We hope this will be patched in some next chrome versions.😔 Until then never ever open any link in Chrome. If someone sends you link, then try to search directly that topic on Google. And get sufficient results. Don't open any link, untill this will be fixed. For more latest valnerablities join now 👇👇👇👇👇👇👇👇👇👇 🔰 @KPTECHUG 🔰
Mostrar todo...
❇️ How to Add Lock Option to the Taskbar in Windows 10. ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ 🔹Step 1: First of all, right-click anywhere on your desktop and select New > Shortcut. 🔹Step 2: On the “Type the location of the item” field, enter the path – Rundll32.exe user32.dll,LockWorkStation 🔹Step 3: Once done, click on the ‘Next‘ button. 🔹Step 4: Now in the ‘Type a name for this shortcut’ field, enter ‘Lock’ and click on the ‘Finish‘ button. 🔹Step 5: Now you will find a Lock Shortcut icon on the desktop. Right-click on it, and select ‘Properties‘ 🔹Step 6: Click on the ‘Change icon’ button and browse the icon that resembles the lock option best for you. 🔹Step 7: Once done, right-click on the shortcut file, and select ‘Pin to taskbar’ or ‘Pin to Start’ 🔹Step 8: Now, whenever you want to lock your PC, click on the Taskbar lock icon. ✅ That’s it! You are done. This is how you can add the lock option to the Start menu and Taskbar in Windows 10. 🔰 @KPTECHUG 🔰
Mostrar todo...
How to Hack WiFi passwords [Using Kali Linux] Tools need to be downloaded:- Hcxdumptool Hcxpcaptool Hashcat Steps:- 🦠1] Request PMKID from the router Unlike older techniques where you had to wait until a user connected to the access point so that you can capture the 4-way handshake that is of EAPOL.This new method for finding out the password credentials does not require that anymore. The attack works on the RSN-IE or Robust Security Network Information Element. It only uses one frame which it requests from the wireless router. 🦠2] Install Hcxdumptool & Hcxpcaptool This is a tool that will help you to capture the PMKID packet from the access point. After capturing the frame, it can also dump it into a file for you. Below are some features of Hcxdumptool: Can easily capture identities and usernames from a WLAN.Can easily capture passwords, plain master keys, handshakes and PMKIDs from traffic on WLAN. After installing this tool run the below command in the CLI. $ ./hcxdumptool -o test.pcapng -i wlp39s0f3u4u5 –enable_status The command displayed above will dump the frame to a file. 🦠3] After doing the above step now you will need to extract some contents from the frame file. This will be in the pcapng format. You can easily convert this into a hash format which the popular program ‘Hashcat‘ can accept. Use the below command to extract the pcapng file. $ ./hcxpcaptool -z test.16800 test.pcapng 🦠4] Using Hashcat to Crack the Wifi Password (WPA PSK Pre-Shared Key Recovery) Hashcat is a tool used a lot in the security and penetration testing field. It is used by both hackers and researchers for finding out passwords by cracking their hash. After finding out the hash of the password you can enter the password in hashcat and it will find it out for you. It will take some time depending on how complex the password is of the wireless network. Enter the cmd below and run hashcat. $ ./hashcat -m 16800 test.16800 -a 3 -w 3 ‘?l?l?l?l?l?lt!’ Now you need some brain, basic knowledge and patience ➖ @KPTECHUG
Mostrar todo...
Method to get Netflix Content Go to any temp mail service and get a temp mail Now go to 3388.to/giveaway And Sign In via temp mail Free trial of 7 days will be Given Just take a new mail After 7 days Enjoy❤
Mostrar todo...
😊😊😊Do you guys enjoy our quizzes 😍😍😍 The quizzes are meant to help you grow in knowledge on hacking terminologies and basic computer concepts, and internet terms too😊😊😊😊 So keep sharing and support our channel to your friends 👇👇👇👇👇👇👇👇👇👇👇 🔰 @KPTECHUG 🔰 🔰 @KPTECHUG 🔰 🔰 @KPTECHUG 🔰 🔰 @KPTECHUG 🔰 🔰 @KPTECHUG 🔰 🔰 @KPTECHUG 🔰
Mostrar todo...
Which of the following VPNS do you use and think provides high anonymity and hides ur IP address from your ISP?Anonymous voting
  • Nord VPN
  • Surf VPN
  • Ultrasurf VPN
  • Secure VPN
  • Thunder VPN
  • Express VPN
0 votes
------ is a precomputed table for reversing cryptograph hash functions.. Tables are usually used in recovering a plain text password up to certain length consisting of a limited set of numbers.Anonymous voting
  • Ophcrack
  • Dictionary attack
  • Hashcat cracking
  • Rainbow table attack
  • Iron wasp
0 votes
______refers to an inclusion attack through which an attacker can trick the web application into including files on the web server by exploiting a functionality that dynamically includes local file.Anonymous voting
  • Local file intrusion
  • Web hacking
  • External file intrusion
  • Internal file intrusion
0 votes
--------is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the service they provide .Anonymous voting
  • Computing
  • I. C. T
  • Cyber crime
  • Cyber security
  • Networking
0 votes