lunes, 22 de enero de 2024

How To Hack Facebook By Social Engineering Attack

This video is specially for educational purpose only. I'm not responsible for your any illegal activity. Thanks!

 Social Engineering Attack

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. The purpose of this video tutorial is to show you How hackers hacked any thing by Social Engineering Attack.

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. The information is then used to access important accounts and can result in identity theft and financial loss.

Kali Linux has many tools for doing social engineering attacks. Setoolkit is the most powerful tool in Kali Linux to do a social engineering attacks over the same and different networks. 

Social Engineering over the same network requires the local IP address of your system just like this one 192.168.1.2. Now how you can get your local IP address from your system. To find local IP address just open up your terminal in Linux distribution:

Type: ifconfig wlan0 (if you are using WiFi)
Type: ifconfig eth0 (if you are using eth0)
Type: ifconfig (It display all information about your network)

Now you've another thing to do is that you just have to clone a web page you wanna clone like Facebook, g-mail, twitter etc. Similarly, If you wanna clone a facebook page so for this you just have to type www.facebook.com over your system's terminal for cloning a login page for Social Engineering attack.Still If you don't know how to do that so don't be worry, I did all the process practically in the below just go down and watch it!


How hackers do Social Engineering Attacks. In this video you'll see How to hack Facebook by Phishing attack.

Read more


  1. Hacking Tools For Windows 7
  2. Pentest Tools Free
  3. Hackrf Tools
  4. Hacking Tools Kit
  5. Hackers Toolbox
  6. What Is Hacking Tools
  7. Best Hacking Tools 2020
  8. Hacker Techniques Tools And Incident Handling
  9. Hacking Tools Github
  10. Best Hacking Tools 2020
  11. Hack Tools
  12. Hack Tool Apk No Root
  13. Pentest Tools For Ubuntu
  14. Best Hacking Tools 2020
  15. Hacker Tools For Windows
  16. World No 1 Hacker Software
  17. Hacking Tools And Software
  18. Hacker Tools Online
  19. Hackrf Tools
  20. Ethical Hacker Tools
  21. Pentest Tools Free
  22. Pentest Recon Tools
  23. Hacking Tools 2020
  24. Pentest Tools Review
  25. Hacker Tools Mac
  26. Hacking Tools Name
  27. Hacker Tools For Windows
  28. Hacking Tools For Mac
  29. Best Hacking Tools 2020
  30. Pentest Tools For Mac
  31. Hacker Tools
  32. Pentest Tools Framework
  33. Termux Hacking Tools 2019
  34. Nsa Hack Tools Download
  35. Pentest Tools Framework
  36. Best Hacking Tools 2019
  37. Hack Tools Download
  38. Hack Tools Download
  39. Hack Tools
  40. Nsa Hack Tools
  41. Termux Hacking Tools 2019
  42. Hacking Tools For Kali Linux
  43. Pentest Tools Windows
  44. How To Make Hacking Tools
  45. Pentest Tools Framework
  46. Hacking Tools Pc
  47. Hacking Tools Hardware
  48. Hack Tools For Ubuntu
  49. Pentest Tools Open Source
  50. Hacking Tools Download
  51. Hacking Tools For Mac
  52. Pentest Box Tools Download
  53. Hacker Tools For Windows
  54. Hacking Tools And Software
  55. Pentest Tools For Ubuntu
  56. Hacking Tools Hardware
  57. Pentest Tools
  58. Tools For Hacker
  59. Underground Hacker Sites
  60. Hacker Search Tools
  61. Pentest Tools Apk
  62. Hacker Search Tools
  63. Hack Tools For Ubuntu
  64. Github Hacking Tools
  65. Hack App
  66. Hacker Tools Github
  67. New Hacker Tools
  68. Pentest Recon Tools
  69. Hacker Tools Windows
  70. Pentest Tools Port Scanner
  71. Hacker Tools Apk
  72. Pentest Tools Apk
  73. Nsa Hacker Tools
  74. Hack Tools For Mac
  75. Termux Hacking Tools 2019
  76. Pentest Tools For Mac
  77. Install Pentest Tools Ubuntu
  78. Hacking Tools Windows 10
  79. Hacking Tools For Pc
  80. Hacks And Tools
  81. Pentest Tools Subdomain
  82. Pentest Tools For Android
  83. Termux Hacking Tools 2019

Hacking All The Cars - Part 2


Connecting Hardware to Your Real Car: 

 I realized the other day I posted Part 2 of this series to my youtube awhile ago but not blogger so this one will be quick and mostly via video walkthrough. I often post random followup videos which may never arrive on this blog. So if you're waiting on something specific I mentioned or the next part to a series its always a good idea to subscribe to the YouTube. This is almost always true if there is video associated with the post.  

In the last blog we went over using virtual CAN devices to interact with a virtual car simulators of a CAN network This was awesome because it allowed us to learn how to interact with he underlying CAN network without fear of hacking around on an expensive automobile. But now it's time to put on your big boy pants and create a real CAN interface with hardware and plug your hardware device into your ODB2 port. 

The video I created below will show you where to plug your device in, how to configure it and how to take the information you learned while hacking around on the virtual car from part1 and apply it directly to a real car.   

Video Walk Through Using Hardware on a Real Car




As a reference here are the two device options I used in the video and the needed cable: 

Hardware Used: 

Get OBD2 Cable:
https://amzn.to/2QSmtyL

Get CANtact:
https://amzn.to/2xCqhMt

Get USB2CAN:
https://shop.8devices.com/usb2can


Creating Network Interfaces: 

As a reference here are the commands from the video for creating a CAN network interface: 

USB2Can Setup: 
The following command will bring up your can interface and you should see the device light color change: 
sudo ip link set can0 up type can bitrate 125000

Contact Setup: 
Set your jumpers on 3,5 and 7 as seen in the picture in the video
Sudo slcand -o -s6 /dev/ttyACM can0 <— whatever device you see in your DMESG output
Ifconfig can0 up

Summary: 

That should get you started connecting to physical cars and hacking around. I was also doing a bit of python coding over these interfaces to perform actions and sniff traffic. I might post that if anyone is interested. Mostly I have been hacking around on blockchain stuff and creating full course content recently so keep a look out for that in the future. 

Continue reading


  1. Hacking Tools
  2. Blackhat Hacker Tools
  3. Hack Tools For Windows
  4. Hack Tools For Windows
  5. Pentest Tools Github
  6. Pentest Tools Website Vulnerability
  7. Hack Tools
  8. Pentest Tools Review
  9. Hacker Tools 2019
  10. Pentest Tools
  11. Hacking Tools Hardware
  12. Game Hacking
  13. Hacker Security Tools
  14. Easy Hack Tools
  15. Pentest Tools Windows
  16. Pentest Tools Framework
  17. Hacking Tools For Beginners
  18. Hack Tools For Pc
  19. Pentest Tools Url Fuzzer
  20. Kik Hack Tools
  21. Hacking Tools 2019
  22. Pentest Tools Free
  23. Hacking Tools Name
  24. Hack Tool Apk No Root
  25. Hack Tools For Ubuntu
  26. Pentest Tools List
  27. Hacker Tools 2019
  28. Pentest Tools Online
  29. Termux Hacking Tools 2019
  30. Pentest Tools Android
  31. Tools Used For Hacking
  32. What Is Hacking Tools
  33. Pentest Tools Open Source
  34. Hacking Tools For Windows Free Download
  35. Pentest Tools Kali Linux
  36. Pentest Tools Website
  37. Hack App
  38. Hacking Apps
  39. Game Hacking
  40. Github Hacking Tools
  41. Pentest Tools Kali Linux
  42. Hack Tools
  43. Hacker Tools 2019
  44. Physical Pentest Tools
  45. Pentest Recon Tools
  46. Hacking App
  47. Github Hacking Tools
  48. Pentest Reporting Tools
  49. Pentest Tools Apk
  50. Pentest Tools Bluekeep
  51. Game Hacking
  52. Hacking Tools Mac
  53. Hack Tools For Windows
  54. Hacking Tools For Kali Linux
  55. Hack Apps
  56. New Hacker Tools
  57. Hacking Tools Kit
  58. Nsa Hack Tools
  59. Github Hacking Tools
  60. Hacking Tools For Windows Free Download
  61. Install Pentest Tools Ubuntu
  62. Nsa Hack Tools
  63. Hacking Tools For Games
  64. Hacking Tools Kit
  65. Hacking Tools 2020
  66. Tools 4 Hack
  67. Pentest Tools Android
  68. Pentest Tools Linux
  69. Hack Website Online Tool
  70. Termux Hacking Tools 2019
  71. Hack Tools
  72. Hacking Tools For Kali Linux
  73. Computer Hacker
  74. Hacking Tools For Kali Linux
  75. Beginner Hacker Tools
  76. Game Hacking
  77. Pentest Tools Linux
  78. Hacking Tools Github
  79. World No 1 Hacker Software
  80. Hacker Tools For Windows
  81. Hacking Tools Free Download
  82. Hacking Tools Mac
  83. Hacker Tools Apk Download
  84. Hack Tools For Ubuntu
  85. Computer Hacker
  86. Hacker Tools Mac
  87. Hacker Tools Free Download
  88. Hacking Tools Hardware
  89. How To Make Hacking Tools
  90. Hacker Tools Software
  91. Hacker Tools Online
  92. Hacker Tools For Pc
  93. Hacker Tools Github
  94. Hacking Tools
  95. Hacking Tools 2020
  96. Blackhat Hacker Tools
  97. World No 1 Hacker Software
  98. Hacker Tool Kit
  99. Tools Used For Hacking
  100. World No 1 Hacker Software
  101. Android Hack Tools Github
  102. Hackrf Tools
  103. Hack Tools For Windows
  104. Kik Hack Tools
  105. Nsa Hacker Tools
  106. Tools Used For Hacking
  107. Hacking Tools Github
  108. New Hacker Tools
  109. Easy Hack Tools
  110. Hacking Tools
  111. Hacker Hardware Tools
  112. Hacker Tools 2020
  113. Hacker Hardware Tools
  114. Pentest Tools Android
  115. Pentest Tools List
  116. Hacking Tools Kit
  117. Hacking Tools For Kali Linux
  118. Nsa Hacker Tools
  119. Hack Tools Github
  120. Hacking Tools For Kali Linux
  121. Hacker Tools 2020
  122. Easy Hack Tools
  123. Pentest Tools Free
  124. Hacker Tools 2019
  125. Hack Tools For Windows
  126. How To Install Pentest Tools In Ubuntu
  127. Hacking Apps
  128. Hacking Tools 2019
  129. Hack Tools Download
  130. Hacking Tools For Beginners
  131. Hack Apps
  132. Nsa Hack Tools Download
  133. Pentest Tools Online
  134. Hack Tools 2019
  135. Pentest Tools Linux
  136. Hack Tools For Pc
  137. Best Hacking Tools 2020
  138. Pentest Automation Tools
  139. Hacking Tools For Windows Free Download
  140. Hacking Tools For Games
  141. Hack Tool Apk No Root
  142. Pentest Tools Review
  143. How To Make Hacking Tools
  144. Hacker Hardware Tools
  145. Growth Hacker Tools
  146. Underground Hacker Sites
  147. Hack Rom Tools
  148. Pentest Tools For Ubuntu
  149. Physical Pentest Tools
  150. Top Pentest Tools
  151. World No 1 Hacker Software

C++ Std::String Buffer Overflow And Integer Overflow

Interators are usually implemented using signed integers like the typical "for (int i=0; ..." and in fact is the type used indexing "cstr[i]", most of methods use the signed int, int by default is signed.
Nevertheless, the "std::string::operator[]" index is size_t which is unsigned, and so does size(), and same happens with vectors.
Besides the operator[] lack of negative index control, I will explain this later.

Do the compilers doesn't warn about this?


If his code got a large input it would index a negative numer, let see g++ and clang++ warnings:



No warnings so many bugs out there...

In order to reproduce the crash we can load a big string or vector from file, for example:


I've implemented a loading function, getting the file size with tellg() and malloc to allocate the buffer, then in this case used as a string.
Let see how the compiler write asm code based on this c++ code.



So the string constructor, getting size and adding -2 is clear. Then come the operator<< to concat the strings.
Then we see the operator[] when it will crash with the negative index.
In assembly is more clear, it will call operator[] to get the value, and there will hapen the magic dereference happens. The operator[] will end up returning an invalid address that will crash at [RAX]



In gdb the operator[] is a  allq  0x555555555180 <_znst7__cxx1112basic_stringicst11char_traitsicesaiceeixem plt="">

(gdb) i r rsi
rsi            0xfffffffffffefffe  -65538


The implmementation of operator ins in those functions below:

(gdb) bt
#0  0x00007ffff7feebf3 in strcmp () from /lib64/ld-linux-x86-64.so.2
#1  0x00007ffff7fdc9a5 in check_match () from /lib64/ld-linux-x86-64.so.2
#2  0x00007ffff7fdce7b in do_lookup_x () from /lib64/ld-linux-x86-64.so.2
#3  0x00007ffff7fdd739 in _dl_lookup_symbol_x () from /lib64/ld-linux-x86-64.so.2
#4  0x00007ffff7fe1eb7 in _dl_fixup () from /lib64/ld-linux-x86-64.so.2
#5  0x00007ffff7fe88ee in _dl_runtime_resolve_xsavec () from /lib64/ld-linux-x86-64.so.2
#6  0x00005555555554b3 in main (argc=2, argv=0x7fffffffe118) at main.cpp:29

Then crashes on the MOVZX EAX, byte ptr [RAX]

Program received signal SIGSEGV, Segmentation fault.
0x00005555555554b3 in main (argc=2, argv=0x7fffffffe118) at main.cpp:29
29     cout << "penultimate byte is " << hex << s[i] << endl;
(gdb)


What about negative indexing in std::string::operator[] ?
It's exploitable!

In a C char array is known that having control of the index, we can address memory.
Let's see what happens with C++ strings:






The operator[] function call returns the address of string plus 10, and yes, we can do abitrary writes.



Note that gdb displays by default with at&t asm format wich the operands are in oposite order:


And having a string that is in the stack, controlling the index we can perform a write on the stack.



To make sure we are writing outside the string, I'm gonna do 3 writes:


 See below the command "i r rax" to view the address where the write will be performed.


The beginning of the std::string object is 0x7fffffffde50.
Write -10 writes before the string 0x7fffffffde46.
And write -100 segfaults because is writting in non paged address.



So, C++ std::string probably is not vulnerable to buffer overflow based in concatenation, but the std::string::operator[] lack of negative indexing control and this could create vulnerable and exploitable situations, some times caused by a signed used of the unsigned std::string.size()










Related news