Category Archives: Social

Learn Social Engineering

HomeLearn Social Engineering

Learn Social Engineering

hacktube April 13, 2020

Learn how to hack Windows, Mac OS X, Linux & Android Using Social Engineering & how to secure yourself from hackers

Requirements

  • Basic IT Skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux

Link https://www.thehackerchoice.xyz/2020/04/learn-social-engineering.html

WhatsApp Free again!

Good News for WhatsApp users!
The widely popular messaging service is going completely free. And you’ll be able to use WhatsApp without paying a penny.
Old WhatsApp users might not be aware of this, but WhatsApp introduced the subscription fees for its service a few years ago, forcing new users to pay an annual 99 cents (~$1) subscription fee after the first year.
However, WhatsApp announced that the Facebook-owned company is dropping its annual subscription fee to make its service free to all users.
While announcing the plan today, WhatsApp’s founder Jan Koum stated that the annual subscription fee was still a barrier to some users.

“As we have grown, we have found that this approach has not worked well,” WhatsApp admitted in a company blog post today. “Many WhatsApp users do not have a debit or credit card number, and they worried they’d lose access to their friends and family after their first year.”

 

suicide hotlines

please remember suicide is NOT the answer, there are people out there who care.

international suicide hotlines

 

Argentina: + 54 (0) 223 493 0430
Armenia: (2) 538194 / (2) 538197
Australia + Austria: 08 93 81 5555 / 03 63 31 3355 / 08 93 88 2500 / 1800 198 313
Barbados: (246) 4299999
Belgium: +32 (0) 2 648 40 14
Botswana: 3911270
Brazil: 55 11 31514109
Canada: +1 (905) 688 3711 / +1 (905) 459 7777
China: 0800-810-1117 / (21) 63798990
Croatia: (01) 4833-888
Cyprus: +357 77 77 72 67 / 0809 1122
Denmark: +457 70 201 201
Egypt: 762 201602/3 / 762 202381
Estonia: +372 206558088
Fiji: (0679) 20670565 / (0679) 20302998
Finland: 09-731391 / 040-5032199
France: 01 2046 2021 2046 2046 / 0800 20235 20236
Germany: 0800 201110 20111 / 030-44 2001 2006 2007 (english service)
Ghana: 2332 20444 2071279
Gibraltar: 55666 (to Samaritans)
Hong Kong: +852 2028 20960 20000 / +852 2023820000
Hungary: (46) 20323 20888 / (62) 20420 20111
India: +91 2033 202474 204704 / +91 2022 202754 206669
Ireland: +44 20(0) 208457 2090 2090 2090 / 1850 2060 2090 2090
Israel: 1201 / 972-9-8891333 (tel from abroad)
Japan: +81%20(0) 203 205286 209090 / 03 203498 200231 (face to face)
Liberia: 6534308
Lithuania: 8-800 202 208888
Malaysia: (06) 20284 202500 / (04) 20281 205161
Malta: 179
Mauritius: 46 2048 20889 / 800 2093 2093
Netherlands: 0602 20222 2088 (to Samaritans)
New Zealand: (04) 20586 201048 / (07) 20348 200567
Norway: +47 20815 2033 20300 / 815 2033 20300
Philippines: (02) 208969191 / 0917 20854 209191 (mobile)
Poland: 52 2070 20988 / 52 2070 20000
Portugal: (+351) 20225 2050 2060 2070 / (808) 20200 20204
Russian Federation: 007 20(8202) 20577-577 / (7) 200942 20224 20621
Samoa: (+381) 2021-6623-393 / (044) 2008080
Serbia: (+381) 2021-6623-393 / (044) 2008080
Singapore: 1800- 20221 204444
South Africa: 051 20444 205691 / 051 20430 203555
South Korea: (2) 20716 208600 / (0441) 20847-9191
Spain: http://www.telefonodelaesperanza.org/ (website)
Siri Lanka: 011 20057 202222662 / 037 202291718
St. Vincent: (784) 20456 201044
Sudan: (249) 2011-555-253
Sweden: (46) 2031 20711 202400 / 020 2022 2000 2060
Switzerland: +41 20(0) 2027 20321 2021 2021
Taiwan: http://www.life1995.org.tw/ (website)
Thailand: (02) 20713-6793 / (53) 20225 20977/8
Tobago: (868) 20645 202800
Tonga: 23000 / 25144
Trinidad + Tobago: (868) 20645 202800
Turkey: 182
Ukraine: 058 / 0487 20327715
United Kingdom: +44 20(0) 208457 2090 2090 2090 / 1850 2060 2090 2090
Zimbabwe: (9) 20650 2000 / 080 2012 20333 20333

suicide hotlines (America):

Alabama: (334) 20821-8600
Alaska: (907) 20258-7575
Arizona: (623) 20879-9600
Arkansas: 1-888-274-7472
California: 1-800-309-2131
Colorado: (303) 20425-0300
Connecticut: (203) 20736-2601
Delaware: 1-800-345-6785
Florida: (352) 20264-6789
Georgia: (912) 20430-4052
Hawaii: (808) 20832-3100
Idaho: 1-800-564-2120
Illinois: (217) 20222-1166
Indiana: (765) 20646-8444
Iowa: 1-800-362-8255
Kansas: (620) 20343-2626
Kentucky: 1-800-562-8909
Louisiana: (318) 20443-2255
Maine: 1-888-568-1112
Maryland: 1-800-422-0009
Massachusetts: (508) 20548-8900
Michigan: (734) 20662-2222
Minnesota: (952) 20891-7202
Mississippi: (662) 20328-0200
Missouri: 1-800-356-5395
Montana: (406) 20252-5658
Nebraska: 1-800-448-3000
Nevada: 1-800-992-5757
New Hampshire: (603) 20225-9000
New Jersey: (609) 20344-1118
New Mexico: (505) 20277-3013
New York: (518) 20447-9650
North Carolina: (252) 20332-4442
North Dakota: (701) 20328-8889
Ohio: (330) 20434-9144
Oklahoma: 1-800-522-9054
Oregon: (501) 20624-7111
Pennsylvania: (717) 20249-6226
Rhode Island: (401) 20539-7474
South Carolina: (803) 20790-4357
South Dakota: (605) 20339-8599
Tennessee: (423) 20745-9111
Texas: (325) 20677-7773
Utah: (801) 20625-3700
Vermont: (802) 20257-7989
Virginia: (703) 20527-4077
Washington: (360) 20479-3033
Washington D.C: (703) 20527-4077
West Virginia: 1-800-786-6480
Wisconsin: (920) 20832-4646
Wyoming: 1-800-457-9312

The Secret To Social Network Marketing

 

 

Social Network Marketing is about using social media sites as marketing tools for the optimization of revenue or increasing brand exposure. Social Media Marketing use strategy like SMO (Social Media Optimization), it can be done in two ways

a) Adding social media links to content such as sharing buttons and RSS feeds

b) Promoting sites through social media by updating tweets, blog post and statuses

 

 

 

Social Media Marketing helps a company get direct feedback from customers, social websites like Twitter, Facebook, Instagram, Myspace, Linkedln and Youtube which have had significant contribution in social marketing in last couple of years. The success of social media in marketing is due to very “Personal” interactions between the user and service renderers.

Face Book Marketing

Face book features are more detailed than other social networking sites. They allow a product to provide photos, videos, longer description option and testimonials as other followers can express their opinion on the product page for others to see. Facebook can link back to the products twitter page as well as send out event reminders. This can be done by connecting to various groups or business groups of your field on Facebook, admin page and direct message to admin for site promotion. You can also create your own personal page where you can upload videos or website information for example, here we have “Guru 99” Facebook page, which has reached many e-learners through Facebook.

Next you can also make a group or join a group of your liking, for example if you are a computer geek and searching for a java computer group then you can join a Java group where you ask questions pertaining to java or share any information related to Java with your group.

To facilitate social media marketing and to manage posting of messages on regular basis on social sites, automated scheduling tools are used. Hootsuiteis one such tool, which gives users extended facility for automating and scheduling messages, monitoring conversation and track result across multiple networks. For example, here it is shown how different tutorials are set and scheduled for website Guru99.

 

Twitter Marketing

It’s a micro blogging service that allows sending and receiving message from customers. This can help business people to contact and communicate with peer group and to their customers. You can create your personal page in twitter as well, and can upload your site and share information related to site on twitter.

Twitter is a great tool to reach out new customers/clients without invading their privacy

LinkedIn Marketing

LinkedIn connects professionals from various backgrounds and provides an opportunity to expand business by connecting business professional. Through the use of widgets, members can promote their product or website directly to their clients. “Company Page” is one such feature in linkedin which acts like a business resume for your client to get a quick overview about your business.

Your personalized webpage on linkedin can also be used as an open platform for discussion with peer group or e-learners. Apart from your personalized page there are option like joining groups, companies or any particular professional groups (Doctors, Real estate & Infrastructure, Job portals, business groups etc.)

Recent research has marked Linkedin on top for social referrals to corporate homepages.

  • LinkedIn: 64% of social referrals to corporate homepage
  • Facebook: 17% of social referrals to corporate homepage
  • Twitter: 14% of social referrals to corporate homepage

Google+ plus

Google plus provides various features which can be used for marketing purposes like

  1. Circles : You can create groups or join circles of your likings
  2. Stream: Gives instant updates on selected contacts or groups
  3. Photos: Upload photos
  4. Sparks: It allows you to specify your area of interest every time you logged in
  5. Plus One: It is like a face book ‘like button’, where you can express your opinion about any particular product
  6. Video Chat and Huddles: All queries can be solved by video chat facility which can be used to facilitate live customer interactions and huddles allow for group chats.

Apart from these you can join communities of your interest, like here guru99 has created community for software testers where they can use these page for discussion for topics of their common interest.

Video Promotion

Video’s are one of the quickest ways to reach your customer. Visual effect has more impact on customer than print or digital text, it enables to explain the product more convincingly than any other medium. Marketing on “Youtube” turns, viewers into fans and, fans into customers. Also with video pages on your site has more chances to get good rating, as there are very less competition for video pages.

One way of doing this is to embed multiple videos onto one web page to create a series of related videos. Another option is to re-purpose your videos to produce related content. It includes presentation, screenshots as podcasts and images, transcription and PDF downloads.

To get maximum viewer to your video link, attach the script of your Video. Youtube also provide captioning alternative for videos.

4 Ways to Crack a Facebook Password and protect yourself

Here goes the pasting process :p.

Despite the security concerns that have plagued Facebook for years, most people are sticking around and new members keep on joining. This has led Facebook to break records numbers with over one billion monthly active users as of October 2012—and around 600 million active daily users.

We share our lives on Facebook. We share our birthdays and our anniversaries. We share our vacation plans and locations. We share the births of our sons and the deaths of our fathers. We share our most cherished moments and our most painful thoughts. We divulge every aspect of our lives. We even clamor to see the latest versions even before they’re ready for primetime.

But we sometimes forget who’s watching.

We use Facebook as a tool to connect, but there are those people who use that connectivity for malicious purposes. We reveal what others can use against us. They know when we’re not home and for how long we’re gone. They know the answers to our security questions. People can practically steal our identities—and that’s just with the visible information we purposely give away through our public Facebook profile.

The scariest part is that as we get more comfortable with advances in technology, we actually become more susceptible to hacking. As if we haven’t already done enough to aid hackers in their quest for our data by sharing publicly, those in the know can get into our emails and Facebook accounts to steal every other part of our lives that we intended to keep away from prying eyes.

In fact, you don’t even have to be a professional hacker to get into someone’s Facebook account.

It can be as easy as running Firesheep on your computer for a few minutes. In fact, Facebook actually allows people to get into someone else’s Facebook account without knowing their password. All you have to do is choose three friends to send a code to. You type in the three codes, and voilß—you’re into the account. It’s as easy as that.

In this article I’ll show you these, and a couple other ways that hackers (and even regular folks) can hack into someone’s Facebook account. But don’t worry, I’ll also show you how to prevent it from happening to you.

Method 1: Reset the Password
The easiest way to “hack” into someone’s Facebook is through resetting the password. This could be easier done by people who are friends with the person they’re trying to hack.

The first step would be to get your friend’s Facebook email login. If you don’t already know it, try looking on their Facebook page in the Contact Info section.
Next, click on Forgotten your password? and type in the victim’s email. Their account should come up. Click This is my account.
It will ask if you would like to reset the password via the victim’s emails. This doesn’t help, so press No longer have access to these?
It will now ask How can we reach you? Type in an email that you have that also isn’t linked to any other Facebook account.
It will now ask you a question. If you’re close friends with the victim, that’s great. If you don’t know too much about them, make an educated guess. If you figure it out, you can change the password. Now you have to wait 24 hours to login to their account.
If you don’t figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three and five friends.

It will send them passwords, which you may ask them for, and then type into the next page. You can either create three to five fake Facebook accounts and add your friend (especially if they just add anyone), or you can choose three to five close friends of yours that would be willing to give you the password.

How to Protect Yourself
Use an email address specifically for your Facebook and don’t put that email address on your profile.
When choosing a security question and answer, make it difficult. Make it so that no one can figure it out by simply going through your Facebook. No pet names, no anniversaries—not even third grade teacher’s names. It’s as easy as looking through a yearbook.
Learn about recovering your account from friends. You can select the three friends you want the password sent to. That way you can protect yourself from a friend and other mutual friends ganging up on you to get into your account.
Method 2: Use a Keylogger
Software Keylogger

A software keylogger is a program that can record each stroke on the keyboard that the user makes, most often without their knowledge. The software has to be downloaded manually on the victim’s computer. It will automatically start capturing keystrokes as soon as the computer is turned on and remain undetected in the background. The software can be programmed to send you a summary of all the keystrokes via email.

CNET has Free Keylogger, which as the title suggests, is free. If this isn’t what you’re looking for, you can search for other free keyloggers or pay for one.

Hardware Keylogger

These work the same way as the software keylogger, except that a USB drive with the software needs to be connected to the victim’s computer. The USB drive will save a summary of the keystrokes, so it’s as simple as plugging it to your own computer and extracting the data. You can look through Keelog for prices, but it’s bit higher than buying the software since you have the buy the USB drive with the program already on it.

How to Protect Yourself
Use a firewall. Keyloggers usually send information through the internet, so a firewall will monitor your computer’s online activity and sniff out anything suspicious.
Install a password manager. Keyloggers can’t steal what you don’t type. Password mangers automatically fill out important forms without you having to type anything in.
Update your software. Once a company knows of any exploits in their software, they work on an update. Stay behind and you could be susceptible.
Change passwords. If you still don’t feel protected, you can change your password bi-weekly. It may seem drastic, but it renders any information a hacker stole useless.
Method 3: Phishing
This option is much more difficult than the rest, but it is also the most common method to hack someone’s account. The most popular type of phishing involves creating a fake login page. The page can be sent via email to your victim and will look exactly like the Facebook login page. If the victim logs in, the information will be sent to you instead of to Facebook. This process is difficult because you will need to create a web hosting account and a fake login page.

The easiest way to do this would be to follow our guide on how to clone a website to make an exact copy of the facebook login page. Then you’ll just need to tweak the submit form to copy / store / email the login details a victim enters. If you need help with the exact steps, there are detailed instructions available by Alex Long here on Null Byte. Users are very careful now with logging into Facebook through other links, though, and email phishing filters are getting better every day, so that only adds to this already difficult process. But, it’s still possible, especially if you clone the entire Facebook website.

How to Protect Yourself
Don’t click on links through email. If an email tells you to login to Facebook through a link, be wary. First check the URL (Here’s a great guide on what to look out for). If you’re still doubtful, go directly to the main website and login the way you usually do.
Phishing isn’t only done through email. It can be any link on any website / chat room / text message / etc. Even ads that pop up can be malicious. Don’t click on any sketchy looking links that ask for your information.
Use anti-virus & web security software, like Norton or McAfee.
Method 4: Stealing Cookies
Cookies allow a website to store information on a user’s hard drive and later retrieve it. These cookies contain important information used to track a session that a hacker can sniff out and steal if they are on the same Wi-Fi network as the victim. They don’t actually get the login passwords, but they can still access the victim’s account by cloning the cookies, tricking Facebook into thinking the hacker’s browser is already authenticated.

Image via wikimedia.org
Firesheep is a Firefox add-on that sniffs web traffic on an open Wi-Fi connection. It collects the cookies and stores them in a tab on the side of the browser.

From there, the hacker can click on the saved cookies and access the victim’s account, as long as the victim is still logged in. Once the victim logs out, it is impossible for the hacker to access the account.

How to Protect Yourself
On Facebook, go to your Account Settings and check under Security. Make sure Secure Browsing is enabled. Firesheep can’t sniff out cookies over encrypted connections like HTTPS, so try to steer away from HTTP.
Full time SSL. Use Firefox add-ons such as HTTPS-Everywhere or Force-TLS.
Log off a website when you’re done. Firesheep can’t stay logged in to your account if you log off.
Use only trustworthy Wi-Fi networks. A hacker can be sitting across from you at Starbucks and looking through your email without you knowing it.
Use a VPN. These protect against any sidejacking from the same WiFi network, no matter what website you’re on as all your network traffic will be encrypted all the way to your VPN provider.
Protecting Yourself: Less Is More
Social networking websites are great ways to stay connected with old friends and meet new people. Creating an event, sending a birthday greeting and telling your parents you love them are all a couple of clicks away.

Facebook isn’t something you need to steer away from, but you do need to be aware of your surroundings and make smart decisions about what you put up on your profile. The less information you give out on Facebook for everyone to see, the more difficult you make it for hackers.

Hack into someone’s Facebook account

In this article I’ll show you these, and a couple other ways that hackers (and even regular folks) can hack into someone’s Facebook account. But don’t worry, I’ll also show you how to prevent it from happening to you.

Method 1: Reset the Password
The easiest way to “hack” into someone’s Facebook is through resetting the password. This could be easier done by people who are friends with the person they’re trying to hack.

The first step would be to get your friend’s Facebook email login. If you don’t already know it, try looking on their Facebook page in the Contact Info section.
Next, click on Forgotten your password? and type in the victim’s email. Their account should come up. Click This is my account.
It will ask if you would like to reset the password via the victim’s emails. This doesn’t help, so press No longer have access to these?
It will now ask How can we reach you? Type in an email that you have that also isn’t linked to any other Facebook account.
It will now ask you a question. If you’re close friends with the victim, that’s great. If you don’t know too much about them, make an educated guess. If you figure it out, you can change the password. Now you have to wait 24 hours to login to their account.
If you don’t figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three and five friends.

It will send them passwords, which you may ask them for, and then type into the next page. You can either create three to five fake Facebook accounts and add your friend (especially if they just add anyone), or you can choose three to five close friends of yours that would be willing to give you the password.

How to Protect Yourself
Use an email address specifically for your Facebook and don’t put that email address on your profile.
When choosing a security question and answer, make it difficult. Make it so that no one can figure it out by simply going through your Facebook. No pet names, no anniversaries—not even third grade teacher’s names. It’s as easy as looking through a yearbook.
Learn about recovering your account from friends. You can select the three friends you want the password sent to. That way you can protect yourself from a friend and other mutual friends ganging up on you to get into your account.
Method 2: Use a Keylogger
Software Keylogger

A software keylogger is a program that can record each stroke on the keyboard that the user makes, most often without their knowledge. The software has to be downloaded manually on the victim’s computer. It will automatically start capturing keystrokes as soon as the computer is turned on and remain undetected in the background. The software can be programmed to send you a summary of all the keystrokes via email.

CNET has Free Keylogger, which as the title suggests, is free. If this isn’t what you’re looking for, you can search for other free keyloggers or pay for one.

Hardware Keylogger

These work the same way as the software keylogger, except that a USB drive with the software needs to be connected to the victim’s computer. The USB drive will save a summary of the keystrokes, so it’s as simple as plugging it to your own computer and extracting the data. You can look through Keelog for prices, but it’s bit higher than buying the software since you have the buy the USB drive with the program already on it.

How to Protect Yourself
Use a firewall. Keyloggers usually send information through the internet, so a firewall will monitor your computer’s online activity and sniff out anything suspicious.
Install a password manager. Keyloggers can’t steal what you don’t type. Password mangers automatically fill out important forms without you having to type anything in.
Update your software. Once a company knows of any exploits in their software, they work on an update. Stay behind and you could be susceptible.
Change passwords. If you still don’t feel protected, you can change your password bi-weekly. It may seem drastic, but it renders any information a hacker stole useless.
Method 3: Phishing
This option is much more difficult than the rest, but it is also the most common method to hack someone’s account. The most popular type of phishing involves creating a fake login page. The page can be sent via email to your victim and will look exactly like the Facebook login page. If the victim logs in, the information will be sent to you instead of to Facebook. This process is difficult because you will need to create a web hosting account and a fake login page.

The easiest way to do this would be to follow our guide on how to clone a website to make an exact copy of the facebook login page. Then you’ll just need to tweak the submit form to copy / store / email the login details a victim enters. If you need help with the exact steps, there are detailed instructions available by Alex Long here on Null Byte. Users are very careful now with logging into Facebook through other links, though, and email phishing filters are getting better every day, so that only adds to this already difficult process. But, it’s still possible, especially if you clone the entire Facebook website.

How to Protect Yourself
Don’t click on links through email. If an email tells you to login to Facebook through a link, be wary. First check the URL (Here’s a great guide on what to look out for). If you’re still doubtful, go directly to the main website and login the way you usually do.
Phishing isn’t only done through email. It can be any link on any website / chat room / text message / etc. Even ads that pop up can be malicious. Don’t click on any sketchy looking links that ask for your information.
Use anti-virus & web security software, like Norton or McAfee.
Method 4: Stealing Cookies
Cookies allow a website to store information on a user’s hard drive and later retrieve it. These cookies contain important information used to track a session that a hacker can sniff out and steal if they are on the same Wi-Fi network as the victim. They don’t actually get the login passwords, but they can still access the victim’s account by cloning the cookies, tricking Facebook into thinking the hacker’s browser is already authenticated.

Firesheep is a Firefox add-on that sniffs web traffic on an open Wi-Fi connection. It collects the cookies and stores them in a tab on the side of the browser.

From there, the hacker can click on the saved cookies and access the victim’s account, as long as the victim is still logged in. Once the victim logs out, it is impossible for the hacker to access the account.

How to Protect Yourself
On Facebook, go to your Account Settings and check under Security. Make sure Secure Browsing is enabled. Firesheep can’t sniff out cookies over encrypted connections like HTTPS, so try to steer away from HTTP.
Full time SSL. Use Firefox add-ons such as HTTPS-Everywhere or Force-TLS.
Log off a website when you’re done. Firesheep can’t stay logged in to your account if you log off.
Use only trustworthy Wi-Fi networks. A hacker can be sitting across from you at Starbucks and looking through your email without you knowing it.
Use a VPN. These protect against any sidejacking from the same WiFi network, no matter what website you’re on as all your network traffic will be encrypted all the way to your VPN provider.
Protecting Yourself: Less Is More
Social networking websites are great ways to stay connected with old friends and meet new people. Creating an event, sending a birthday greeting and telling your parents you love them are all a couple of clicks away.

Facebook isn’t something you need to steer away from, but you do need to be aware of your surroundings and make smart decisions about what you put up on your profile. The less information you give out on Facebook for everyone to see, the more difficult you make it for hackers.