Wednesday, June 15, 2016

How To Hack Facebook Account Just With a Phone Number (SS7)

How To Hack Someones Facebook Account Just By Knowing their Phone Numbers:

hack any facebook account with a phone number ss7 kali linux 2.0 tutorials k4linux

Every one ask about How to Hack Facebook Account and normal People ask How to Secure Facebook Account, between Hacking and Security they are a long way to go!

Read Also : Kali Linux 2.0 Tutorials : Setoolkit Ettercap Dnsspoof (Hack Facebook)

On 2016 the methodes of Hacking are developed and secutity too, and Hacking Facebook account is one of the major queries on the Internet today. It's hard to find, but researchers have just proven by taking control of any Facebook account with only the target's phone number and some hacking skills.
Yes, your Facebook account can be hacked, no matter how strong your password is or how much extra security measures you have taken. No joke!

Even where users have chosen strong passwords and taken extra security measures, their Facebook FB -0.29% accounts are not safe from hackers. Hackers with skills to exploit the SS7 network can hack your Facebook account. All they need is your phone number.

The researchers from Positive Technologies, who recently showed how they could hijack WhatsApp and Telegram accounts, now gave the demonstration of the Facebook hack using similar tricks, Forbes reported.

What is SS7?

Signalling System No. 7 (SS7) is a set of telephony signaling protocols developed in 1975, which is used to set up and tear down most of the world's public switched telephone network (PSTN) telephone calls. It also performs number translation, local number portability, prepaid billing, Short Message Service (SMS), and other mass market services.

What does SS7 normally do?

SS7 is a set of protocols allowing phone networks to exchange the information needed for passing calls and text messages between each other and to ensure correct billing. It also allows users on one network to roam on another, such as when travelling in a foreign country.

How To Hack Any Facebook Account with ss7 ?

The Facebook hack takes the exploits a step further, only requiring a phone number. The attacker clicks on the “Forgot account?” link on the Facebook.com homepage. When asked for an email address or phone number linked to the target account, the hacker provides the legitimate number. By diverting the text message containing a one-time passcode to their own PC or phone, they can login to the account, as shown in the video below.



If you have encountered a problem or you have any questions or remarks please feel free to set a comment.

If this article helped you to solve your problem please feel free to share it with your friends ... with love and prosperity K4LINUX-TEAM.

Sunday, June 12, 2016

Why Penetration Testing ?

Why Penetration Testing ?

kali linux 2.0 hack penetration testing and security k4linux
Today on k4linux we gonna talk about Penetration Testing! In our series of penetration testing cours with Kali Linux 2.0, you must know all terms and definitions and types of hackers to introduce this domains... many articles about penetration testing and hacking will be shared soon, keep connected with k4linux and support us by sharing with your friends.
Learn the basics of Ethical Hacking and Penetration Testing course to make you a better ethical hacker and penetration tester.

What Is Penetration Testing?

Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.

Penetration Testing goals and objectives :

As is apparent, there are many reasons penetration testing is conducted. Defining the scope and nature of a penetration test is largely dependent on what the drivers are for an organization, which will determine the stated goals going into an engagement. Those drivers may also influence other aspects of the engagement such as target selection scope, assumptions, and even funding ceilings that limit the amount of time a test team has to explore and compromise the organization’s assets. For example, if the goal is merely to ‘check off the box’ that says an organization has conducted penetration testing in order to meet compliance, then the scope and allocated funding may be much more constrained. Contrast that with an organization that is genuinely worried about its intellectual property and cares about the real-world risk to that IP from a motivated, skilled attacker’s perspective, and you might want to allocate a budget amount that will allow for a more thorough test.
If you have encountered a problem or you have any questions or remarks please feel free to set a comment.

If this article helped you to solve your problem please feel free to Share it with your friends ... with love and prosperity K4LINUX-TEAM.

Thursday, May 26, 2016

Mr.Robot : Season 2 - Date and Official Trailer

MR. ROBOT follows Elliot Alderson (Rami Malek), a young cyber-security engineer who becomes involved in the underground hacker group fsociety, after being recruited by their mysterious leader (Christian Slater). Following the events of fsociety’s hack on multi-national company Evil Corp, the second season will explore the consequences of that attack as well as the illusion of control. The series also stars Portia Doubleday, Carly Chaikin, Grace Gummer, Michael Cristofer and Stephanie Corneliussen.


USA Network has officially set the premiere date for its criticaly acclaimed drama Mr. Robot. Returning for a second season on Wednesday, Jul. 13 at 10/9c, Sam Esmail's groundbreaking series stars Rami Malek as Elliot Alderson, a brilliant-but-troubled computer hacker, and Christian Slater as Mr. Robot, a mysterious agitator who enlists Elliot's help.

[Warning: season one spoilers ahead.] Season two picks up after fsociety’s 5/9 hack on Evil Corp and will explore the consequences of the attack, as well as the illusion of control. In addition to Malek and Slater, Portia Doubleday (Angela), Carly Chaikin (Darlene), Martin Wallström (Tyrell), Michael Cristofer (Phillip Price), and Stephanie Corneliussen (Joanna) are onboard for season two, which is currently shooting in New York City.
Esmail, who is directing all 10 episodes of the new season, is introducing the character Dominique “Dom” DiPierro into the story this year. Grace Gummer will play Dom, a young federal agent investigating the hack.
“Elliot committed a crime and we’re going to see the ramifications of that this season,” Esmail said during the Mr. Robot panel at SXSW last month. “That’s why you see that introduction of law enforcement, which you deliberately didn’t see the first season.”

Also joining the cast this year: Craig Robinson as Ray, a neighborhood local who reaches out to Elliot in his time of need; rapper Joey Bada$$ as Leon, a new friend of Elliot’s who philosophizes on the meaning of life; and Chris Conroy as Derek, the young and attractive new man in Joanna Wellick’s life.

 Source : usanetwork

What is Hacktivism ?

mr.robot hacktivism k4linux wallpaper
Today on k4linux we gonna talk about Hacktivism! In our series of penetration testing cours, you must know all terms and definitions and types of hackers to introduce this domains... many articles about penetration testing and hacking will be shared soon, keep connected with k4linux and support us.

What is Hacktivism ?

Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist.

Form Of Hacktivism :

Wikipedia is always a good source of definitions for technology-related issues. Its categorizes Hacktivism to differences categories:

Website Mirroring: It is a technique that copies the content of a censored website and posts it to other domains and subdomains that are not censored.
Anonymous blogging: a method of speaking out to a wide audience about human rights issues, government oppression, etc. that utilizes various web tools such as IP masking, and blogging software to preserve a high level of anonymity.
 Political hacking: Many targets of hacktivist groups are of a more overtly political nature. During the 2013 Zimbabwean election, hacktivist group Anonymous Africa attacked and closed down 50 websites, including those associated with the ruling Zanu PF party. 

 Most Famous Group of Hacktivism:

Two of the most widely known groups are Anonymous and LulzSec.


Anonymous : has participated in a great number of online projects such as Operation: Pay Back Is a Bitch and Operation: Safe Winter. A great number of their projects have been for a charitable cause.

LulzSec : The group has (allegedly) disbanded and some of its members arrested. Nevertheless, given the disparate structure of these organisations and the transient nature of their members, it is unlikely that all the members have been caught. group that claimed responsibility for several high profile attacks, including the compromise of user accounts from Sony Pictures in 2011. The group also claimed responsibility for taking the CIA website offline.


Mr.Robot :

mr.robot hacktivism penetration testing k4linux

Mr. Robot is an American drama–thriller television series which tells the story of a cybersecurity engineer and hacker his name is Elliot Alderson, he joined a group of hacktivists. The group aims to cancel all debts by attacking the large corporation E Corp.

Elliot Alderson, its a young man living in New York City, who works at the cyber security company Allsafe as a security engineer. Constantly struggling with social anxiety disorder and clinical depression, Elliot's thought process seems heavily influenced by paranoia and delusion. He connects to people by hacking them, which often leads him to act as a cyber-vigilante.



"hacktivism promotes anti-crime , anti-war , and anti-terrorism"

If you have encountered a problem or you have any questions or remarks please feel free to set a comment.

If this article helped you to solve your problem please feel free to share it with your friends ... with love and prosperity K4LINUX-TEAM.

Wednesday, May 11, 2016

9 Different Types of Hackers

Different types of Hackers and their differences ?

9 types of different hackers and the differences between them

There are many different types of hacker today, on k4linux we will explain to you what means and how work all type of Hackers.

1. Black Hat Hacker

A black hat hacker is a hacker who violates computer security for little reason beyond maliciousness or for personal gain. The black hat hacker takes advantage of the break-in, perhaps destroying files or stealing data for some future purpose. The black hat hacker may also make the exploit known to other hackers and/or the public without notifying the victim. This gives others the opportunity to exploit the vulnerability before the organization is able to secure it.

Their primary motivation is usually for personal or financial gain, but they can also be involved in cyber espionage, protest or perhaps are just addicted to the thrill of cyber crime. Black hat hackers can range from amateurs getting their feet wet by spreading malware, to experienced hackers that aim to steal data, specifically financial information, personal information and login credentials. Not only do black hat hackers seek to steal data, they also seek to modify or destroy data as well.

2. Grey Hat Hacker

Grey hat hackers are a blend of both black hat and white hat activities. Often, grey hat hackers will look for vulnerabilities in a system without the owner’s permission or knowledge. If issues are found, they will report them to the owner, sometimes requesting a small fee to fix the issue. If the owner does not respond or comply, then sometimes the hackers will post the newly found exploit online for the world to see.

The term "grey hat" refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.

3. White Hat Hacker

White Hat Hacker is a ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.

White hat hackers choose to use their powers for good rather than evil. Also known as “ethical hackers,” white hat hackers can sometimes be paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking.

White hat hackers employ the same methods of hacking as black hats, with one exception- they do it with permission from the owner of the system first, which makes the process completely legal. White hat hackers perform penetration testing, test in-place security systems and perform vulnerability assessments for companies. There are even courses, training, conferences and certifications for ethical hacking.

4.  Suicide Hacker

Suicide hackers are those who hack for some purpose and even don’t bother to suffer long term jail due to their activities. Suicide hacker can be bad as well as good. Suicide Hacker will stop at nothing and will ignore consequences.

5.Script Kiddie

A Script Kiddie is basically a hacker amateur who doesn’t has much knowledge to program tools to breaks into computer networks. He often use downloaded hacking tools from internet written by other hackers/security experts.Script kiddies usually focus on the quantity of attacks rather than the quality of the attacks that they initiate.
A Script Kiddie is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks and deface websites. It is generally assumed that script kiddies are juveniles who lack the ability to write sophisticated programs or exploits on their own and that their objective is to try to impress their friends or gain credit in computer-enthusiast communities.

6. Spy Hacker

Spy hackers are individuals who are employed by an organization to penetrate and gain trade secrets of the competitor. These insiders can take advantage of the privileges they have to hack a system or network.

7. Cyber Terrorist

A Cyber Terrorist is a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.
Cyberterrorism is the act of Internet terrorism in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.

8. State Sponsored Hacker

State sponsored hackers are individuals employed by the government to penetrate and gain top-secret information and to damage information systems of the governments.

9. Hacktivist

A hacktivist is kinda hacker who thinks hacking can bring out some social changes and hacks government and organizations to show his discomfort over some trivial issues.
Hacktivism  is the subversive use of computers and computer networks to promote a political agenda. With roots in hacker culture and hacker ethics, its ends are often related to the free speech, human rights, or freedom of information movements.

If you have encountered a problem or you have any questions or remarks please feel free to set a comment.

If this article helped you to solve your problem please feel free to share it with your friends ... with love and prosperity K4LINUX-TEAM.

Who is a Hacker ?

Who is a Hacker?

k4linux kali linux 2.0 tutorials hacker
A hacker is someone who seeks and exploits weaknesses in a computer system or computer network.
Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge.
Another definition of Hacker:
A computer hacker is someone who lives and breathes computers, who knows all about computers, who can get a computer to do anything.

Equally important, though, is the hacker's attitude. Computer programming must be a hobby, something done for fun, not out of a sense of duty or for the money.
(It's Okay to make money, but that can't be the reason for hacking.)

If you have encountered a problem or you have any questions or remarks please feel free to set a comment.

If this article helped you to solve your problem please feel free to share it with your friends ... with love and prosperity K4LINUX-TEAM.

The Basics of Ethical Hacking and Penetration Testing

Introduction to Ethical Hacking and Penetration Testing:

ethical hacking penetration testing kali linux 2.0 k4linux

Learn the basics of Ethical Hacking and Penetration Testing course to make you a better ethical hacker and penetration tester.

We understand the appeal of hacking and attacking systems is what draws most people to this profession but, a solid understanding of the theory will differentiate you from hackers and eventually turn you into an infosec professional. Which makes more money in the grand scheme of things.

Hacking vs Ethical Hacking

There is a difference between hacking and Ethical Hacking ?
The difference is: permission.
Seriously, Hacking without permission can land you in prison. Never do any testing without written consent from a client. In the case of things like bug bounties, where you don't have a contractual agreement, save the sites bug bounty text and any conversations you have with them.

Why Penetration Testing ?




If you have encountered a problem or you have any questions or remarks please feel free to set a comment.

If this article helped you to solve your problem please feel free to share it with your friends ... with love and prosperity K4LINUX-TEAM.