Showing posts with label OTHERS. Show all posts
Showing posts with label OTHERS. Show all posts

Sunday 26 March 2017

2k17 Android Secret Codes Collection By Hax4Us

Leave a Comment

Common Android Secret Codes 2017

Secret CodesFunctions
*#*#7780#*#*1. Factory restore setting
*#*#7780#*#*2. Clear all application and data.
*#*#7780#*#*3. Remove Google account setting.
*#*#7780#*#*4. Remove System, application data and settings.
*2767*3855#1. Reinstall the phones firmware.
*2767*3855#2. Used for factory format.
*2767*3855#3. Remove all files and settings including the internal storage.
*2767*3855#4. Reinstall the firmware.
*#*#197328640#*#*1. Enabling test mode for service activity.
*#*#197328640#*#*2. Used to enter into Service mode.
*#*#197328640#*#*3. You can run and change various tests and settings in the service mode.
*#*#4636#*#*1. Phone basic information.
*#*#4636#*#*2. Phone usage detail.
*#*#4636#*#*3. Battery information.
*#*#34971539#*#*1. Information about mobile camera.
*#*#34971539#*#*2. Get camera information.
*#*#34971539#*#*3. Note:-Please avoid update camera firmware option
*#*#7594#*#*1. Changing the power button behavior.
*#*#7594#*#*2. Enables the direct power off without asking for selecting any option (silent mode, Aeroplane and power off).
*#*#273283*255*663282*#*#*1. Create backup to all your media files.
*#*#273283*255*663282*#*#*2. Opens file copy screen where you can backup your media files like (images, videos and audios).
*#*#8255#*#*1. For Google Talk service monitoring.
*#*#8255#*#*2. Used to launch G Talk Service Monitor.
*2767*4387264636*1. Used to display product code.
*#0228#1. Used to know Battery Status.
*#12580*369*1. Software and Hardware Info.
*#32489#1. Let you know Ciphering Info.
*#273283*255*3282*#1. Data create menu.
*#3282*727336*#1. Data usage status.
*#8736364#1. OTA update menu.

GPS Bluetooth & WLAN Test Android Codes

Secret CodesFunctioning
*#*#526#*#*WLAN Test
*#*#528#*#* WLAN Test
*#*#232339#*#*WLAN Test
*#*#232338#*#*Displays/Shows WiFi MAC address.
*#*#1472365#*#*For quick GPS test.
*#*#1575#*#*Different type GPS test.
*#*#232331#*#*Bluetooth test.
*#*#232337#*#Displays Bluetooth device address.

Firmware Version Information

Secret CodesFunctioning
 *#*#1111#*#*1. Let you know about FTA SW Version.
*#*#2222#*#*1. FTA Hardware Version.
*#*#4986*2650468#*#*1. Firmware Info PDA, Phone, H/W, RFCallDate.
*#*#1234#*#*1. PDA and Phone firmware info.
*#2263#1. RF band selection
*#9090#1. Diagnostic configuration.
*#7284#1. USB 12C mode control.
*#872564#1. USB logging control.
*#745#1. RIL dump menu.
*#746#1. Debug dump menu.
*#9900#1. System dump mode.
*#*#44336#*#*1. Shows Build time changelist number.
*#*#44336#*#*2. PDA, Phone, CSC, Build Time, ChangeList number.
*#03#1. NAND flash serial number.
*#3214789#1. GCF mode status.

Factory Tests Secret Android Codes

Secret CodesFunctioning
*#*#0283#*#*1. Packet Loop-back test.
*#*#0*#*#*1. LCD test.
*#*#0673#*#*1. Audio/Melody test.
*#*#0289#*#*1. Audio/Melody test.
*#*#0842#*#*1. Vibration test and Back Light test Device test.
*#*#2663#*#*1. Displays Touch screen version.
*#*#2664#*#*1. Touch-Screen test.
*#*#0588#*#*1. Proximity sensor test.
*#*#3264#*#*1. RAM version.
*#0782#1. Real time clock test.
*#0589#1. Light sensor test.
*#7353#1. Quick test menu.

PDA and Phone Codes

Secret CodesFunctioning
*#*#7262626#*#*1. Field test.
*#06#1. IMEI number.
*#*#8351#*#*1. Enables voice dialing logging mode.
*#*#8350#*#*1. Disables voice dialing logging mode.
**05***#1. Execute from Emergency dial screeen to unlock PUK code.
*#301279#1. HSDPA HSUPA control menu.
*#7465625#1. View phone lock status.

Other Android Phone Codes Unlock

Secret CodesFunctioning
*#0*#1. Galaxy S3 service menu.
##77647261. Motorola DROID hidden service menu.
##77647262. The default SPC password is six zeroes(000000).
1809#*990#1. LG Optimus 2x hidden service menu.
1809#*990#2. When prompted for a code enter six zeroes(000000).
3845#*920#1. Lg Optimus 3D hidden service menu.
3845#*920#2. When prompted for a code enter six zeroes(000000).
The above given android secret codes are properly tested and work quite well. However, they might not work for a single android phone. It is important to find out which works quite well and which does not. Plus one has to be alert while using the codes and be careful so as to avoid any kind of data loss and other issue.
Read More

Monday 13 March 2017

Google Advance Searching Trick For Download Anything Without Visiting At Any Site

4 comments

Guys Today We Are Going To Talk about Google Advance Searching Trick Which Is Based On Google Indexing And Database But Believe Me It Is Very Easy Trick....

Let's See...

This Trick Is Working On Database Concept Means ...

EveryBody Knows That Google Is A Search Engine And Each Website Must Need Add Their Site To Google Database And When Google Add Any Site On Their Database It Is also Called Indexing....

So Now Click Here To Watch Practical Video For This Trick ..

Practical Video Of Google Advance Searching Trick

Read More

Sunday 5 March 2017

What Is DNS Spoofing And Amplification Attack Explained By Hax4Us

Leave a Comment
Hax4Us
What Is DNS Spoofing?
DNS Spoofing (sometimes referred to as DNS Cache Poisoning) is an attack whereby a host with no authority is directing a Domain Name Server (DNS) and all of its requests. This basically means that an attacker could redirect all DNS requests, and thus all traffic, to his (or her) machine, manipulating it in a malicious way and possibly stealing data that passes across. This is one of the more dangerous attacks as it is very difficult to detect, but today I will show you both how to perform it and how to detect if it is being performed by somebody else on your network.


DNS Amplification Attack ?
A DNS amplification attack is a reflection-based distributed denial of service (DDos) attack.
The attacker spoofs look-up requests to domain name system (DNS) servers to hide the source of the exploit and direct the response to the target. Through various techniques, the attacker turns a small DNS query into a much larger payload directed at the target network.
The attacker sends a DNS look-up request using the spoofed IP address of the target to vulnerable DNS servers. Most commonly, these are DNS servers that support open recursive relay. The original request is often relayed through a botnet for a larger base of attack and further concealment. The DNS request is sent using the EDNS0 extension to the DNS protocol allowing for large DNS messages.  It may also use the DNS security extension (DNSSEC) cryptographic feature to add to the size of the message. 
These amplifications can increase the size of the requests from around 40 bytes to above the maximum Ethernet packet size of 4000 bytes. This requires they be broken down for transmission and then reassembled, requiring further target network resources.  A botnet's many amplified requests enable an attacker to direct a large attack with little outgoing bandwidth use. The attack is hard to protect against as it comes from valid-looking servers with valid-looking traffic.
DNS amplification is one of the more popular attack types.  In March 2013, the method was used to target Spamhaus likely by a purveyor of malware whose business the organization had  disrupted by blacklisting. The anonymity of the attack was such that Spamhaus is still unsure of the source. Furthermore, the attack was so severe that it temporarily crippled and almost brought down the Internet.
Proposed methods to prevent or mitigate the impact of DNS amplification attacks include rate limiting, blocking either specific DNS servers or all open recursive relay servers, and tightening DNS server security in general.

Note :- Guys If You Have Any Problem Regarding This Post So , You Can Ask In Comment Box. Thanx For Reading Carefully..!!

Read More

Thursday 2 March 2017

(Hindi) What Is Shell ? CLI Vs GUI / Scripting Explained By Hax4Us

Leave a Comment
Dosto Aaj TechGyan In Hindi Me Hum Baat Karenge
Hax4us TechGyan
Ki Shell Kya Hota Hai And GUI And CLI Kya Hota Hai And Scripts Se Hacking Kese Hoti Hai Ya Iska Process And Example Bhi Discuss Karenge.

Chaliye Dekhte Hai...

Dosto Shell Ko Janne Ke Liye Sabse Important Ye Hai Ki Hum First Kernel Ko Samje....

So What Is Kernel ?

Dosto Kernel Kisi Bhi Operating System Ka Ek Part Hota Hai And Jab Aap Apna System Start Ya Boot Karte Hai To Sabse Pehle Boot Ya Load Hone Wala Program Kernel Hota Hai.

Kernel Use Kyo Hota Hai...?

Kernel Ka Use Ek Bridge Ki Tarah HoTa Hai Jo Hardware Ko Software Se Jodta Hai Means Operating System Ya Applications Ki Jo Bhi Need Hoti Hai Vo Kernel Hardware Se Interact Karke Fulfill Karta Hai..

Jese Input/Output Devices , CPU ,RAM , ROM HDD Ye Sare Hardware Components Kernel Ka Use Karke Hi Software Ya Operating system Se Connect Hote Hai..

What Is Shell ?

To Dosto Ab Baat Aati Hai Ki Shell Kya Hota Hai .Shell Ek Esa Program Hota Hai Jo Aapki Application Ya Software Ko Kernel Se Connect Karta Hai. Means Kernel Connect Karta Hai Hardware Se And Shell Connect Karta hai Kisi bhi Software Ya Application ko Kernel Se .


To Dosto Aap Sabhi Windows Se To Parichit Honge Hi Vo Ek Operating System Hai. To Jab Aap Usme Koi Bhi Work Karte Hai To Aapko Koi Command Nahi Daalni Padti For Example Jab Aapko Koi File Ya Folder Delete Karna Ho To Aap Use Select Karte And Delete Kardete Hai Means Without Any Knowledge Of Command We Can Use Windows...

But Dosto Me Aapko Ek Baat Batadu Ki Vo Bhi Ek Shell Hi hai But Vo GUI Type Ka Hai

GUI kya Hai ?


 Graphical User Interface . Means Issme Aap Icons And Or Bhi Visual Effect Se System Se Connect Ya Interact Ho Sakte Hai Isme Aapko Koi Command Ka Use Nahi Karna Padta..

To Dosto GUI Shell Aap Samaj Gaye Honge Ki Ye Kya Hota Hai..

Now Ab Baat Karte Hai CLI Shell Ke Baare Me ....

CLI (Command Line Interface) Shell Ka Ek Best Example Kali Linux OS Hai Isme Aapko almost All Tasks Terminal Me Hi Perform Karni Padti Hai And Terminal Ka Use Karne Ke Liye Ye Important Hai Ki Hume Commands Ki knowledge Ho ...

So Dosto Isme GUI Ka Use Na Ke Barabar Hota Hai..

To Shell Scripts Kya Hoti Hai And Isse Hacking Operation Kese Perform kiye Jate Hai...?

Maan Lijiye Aapko Ek Task Complete Karne Ke Liye 10 Command Ek Saath Daalni Hai To Ye Bahut Hi Hard And Time Consuming Process Ho Jayega So Isse Bachne Ke Liye Hum Ek Batch File Banayege Jisme Vo Saari Commands Hogi Jo Hume Perform Karni Hai To Yahi Shell Script Hoti Hai Jisse Hum Apna Task Easy And Automated Karte Hai..

Ab Aapne USB Rubber Ducky Ya USB Stealer Ke Baare Me Suna Hoga Jo Kisi Bhi PC Me Plugin Karte Hi Saare Password Steal Karleta Hai ...To Vo Kya Hai....Vo Bhi Ek Batch File Hi Hai Jisme Esi Commands Hai Jo Automatic Execute Hoti Hai And Sab Kuch Steal Karleti Hai.

Note :- Agar Apko Iss Post Se Related Koi Bhi Problem Hai To Aap Comment Me Pooch Sakte Hai.
Read More

Tuesday 28 February 2017

Footprinting As A Hacker Tool Explained By Hax4Us (Hindi-English)

Leave a Comment
Hax4Us
Dosto Aaj TechGyan In Hindi Me Me Apko Bataunga Ki FootPrinting Kya Hoti Hai And Hackers Kese Iska Use Karte Hai Hacking Ke Liye......


Footprinting (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system.

Dosto Upper Mene Footprinting Ki definition di hai and Isse Aapko pata chal gaya hoga ki footprinting kya hoti hai ...

Footprinting Kuch nahi ek process hai jisme koi bhi hacker apne victim ke baare me all information gather karta hai...

And kisi ki information gather karne ke liye bahut saari techniques and tools hai jisse hum successful footprinting kar sakte hai.
And Kuch Tools And Techniques Ke Baare Me aapko Bataunga :-
  1. Maan Lijiye Aapko Ek Site hack karni hai to aapko sabse pehle uss site ke baare me full info honi chahye , To iske liye aap https://whois.com Par ja sakte hai ,, ye No.1 site hai Jo internet par available almost sites ki information gather karti hai. Mene Ek screenshot bhi attach kara hai jisme mene Facebook ki all detail nikali hai whois.com se.aap bhi try kare and enjoy kare.
  1. Whois.com
  1. Dosto aap maan lijiye ki aapko SQL attack karna hai to aapko website ki all detail honi chaye like uss site pe total post ya total pages kitne hai , iske liye aap sitemap.xml file ko search kar sakte hai. "Sitemap.XML file vo file hoti jisme kisi bhi site ke content ki all information hoti hai and isi file ki help se google bhi kisi bhi site ki files ya pages ya post access ya search karta hai ". To Aapko karna ye hai ki aapko jisse site ki content info chaye uss site ke URL ke last me sitemap.xml type kare...for example me apni site www.Hax4Us.Blogspot.in ka sitemap nikalna chahu to muje apni site "www.Hax4Us.blogspot.in/sitemap.xml" search karni hogi .Aap bhi try karke deke.
  1. Ek PC ka software bhi aata jiska name hai " ANUBIS " .Aap ise download karke bhi footprinting Kar sakte hai.

Note:- Agar Aapko Iss Post Se Related Koi Bhi Problem Ho To Aap Comment Me Pooch Sakte Hai And Subscribe Karna Na Bhoole , Isse Hoga Ye Ki Jab Bhi Me Post Daalunga Aapke Email Pe Personally Send Ho Jayegi.


Read More

Sunday 26 February 2017

Programming Vs Scripting Explained By Hax4Us

Leave a Comment

Hax4Us
What are Scripting Languages?

scripting languages and programming languages are not that different, actually. both are made to execute instructions on a computer. but there still are some key differences: scripting languages (like Bash, Python..) are mainly designed to automate certain operations or tasks(especially Bash). a lot of hackers use Python to write exploits scripting languages like python can have an extensive amount of functionality, but scripting languages have one big downside: they are slow. that is because unlike programming languages, scripts are interpreted, meaning that the program executes command per command, rather than throwing all commands together and translating it to machine code.

What Are Programming Languages?

programming languages are somewhat the opposite of scripting languages. programs are a lot faster than scripts because they get compiled. which means that the code gets translated to 1's and 0's and is able to interact directly with the CPU. this isn't the case with Python. Then again, programming languages also have a downside. they lack the flexibility offered by scripting languages. this doesn't mean that programming languages can't do much, however.

Conclusion

programming and scripting languages are different from eachother. there is no white and black when it comes to programming vs scripting. the perfect balance is using scripts and programs together. when you need to automate tasks, use a scripting language. when you need to make something fast, like an SSH password cracker, you should make it using C or C++
Read More