Showing posts with label OTHERS. Show all posts
Showing posts with label OTHERS. Show all posts

Sunday, 2 April 2017

2k17 List Of Some Deep Web Links And How To Access Safely On Android

3 comments

Hello Guys , Welcome Back To My Site
Hax4Us

So Today I Will Give Deepweb Sites Links (Only For Education And Research)

SEARCH ENGINES – DEEP WEB LINKS

http://kbhpodhnfxl3clb4.onion/ – Tor search engine
http://torlinkbgs6aabns.onion/ – Deep web links directory
http://xmh57jrzrnw6insl.onion/ – TORCH another search engine
http://ndj6p3asftxboa7j.onion/ – .onion search

FINANCIAL SERVICES – DEEP WEB LINKS

http://nzfbqcuyutvg6hd3.onion/ – Hacked PayPal accounts
http://ow24et3tetp6tvmk.onion/ – Anonymous BitCoin wallet
http://lmyv5msldzlcp224.onion/counterfeits/ – EURO & USD Counterfeits
http://easycoinsayj7p5l.onion/ – BitCoin Wallet

COMMERCIAL – DEEP WEB LINKS

http://mobil7rab6nuf7vx.onion/ – Unlocked Smartphones
http://2ogmrlfzdthnwkez.onion/ – Hire a Hacker
http://abbujjh5vqtq77wg.onion/ – Passports and ID Cards for Bitcoins
http://fakeidscpc4zz6c4.onion/ – Fake documents

HOSTING RELATED – DEEP WEB LINKS

http://torwebpa6vb7icfm.onion/ – Hosting Company

FORUMS – DEEP WEB LINKS

http://zqktlwi4fecvo6ri.onion/wiki/Torbook – Facebook for deep web
Guys You Can Find More Links From Internet.. Here I Posted Some Usable Links Only ..
Disclaimer :- I Am Not Responsible For Any Illegal activity Done By You And This List Of Links Is Only For Education.
Read More

Sunday, 26 March 2017

2k17 Android Secret Codes Collection By Hax4Us

Leave a Comment

Common Android Secret Codes 2017

Secret CodesFunctions
*#*#7780#*#*1. Factory restore setting
*#*#7780#*#*2. Clear all application and data.
*#*#7780#*#*3. Remove Google account setting.
*#*#7780#*#*4. Remove System, application data and settings.
*2767*3855#1. Reinstall the phones firmware.
*2767*3855#2. Used for factory format.
*2767*3855#3. Remove all files and settings including the internal storage.
*2767*3855#4. Reinstall the firmware.
*#*#197328640#*#*1. Enabling test mode for service activity.
*#*#197328640#*#*2. Used to enter into Service mode.
*#*#197328640#*#*3. You can run and change various tests and settings in the service mode.
*#*#4636#*#*1. Phone basic information.
*#*#4636#*#*2. Phone usage detail.
*#*#4636#*#*3. Battery information.
*#*#34971539#*#*1. Information about mobile camera.
*#*#34971539#*#*2. Get camera information.
*#*#34971539#*#*3. Note:-Please avoid update camera firmware option
*#*#7594#*#*1. Changing the power button behavior.
*#*#7594#*#*2. Enables the direct power off without asking for selecting any option (silent mode, Aeroplane and power off).
*#*#273283*255*663282*#*#*1. Create backup to all your media files.
*#*#273283*255*663282*#*#*2. Opens file copy screen where you can backup your media files like (images, videos and audios).
*#*#8255#*#*1. For Google Talk service monitoring.
*#*#8255#*#*2. Used to launch G Talk Service Monitor.
*2767*4387264636*1. Used to display product code.
*#0228#1. Used to know Battery Status.
*#12580*369*1. Software and Hardware Info.
*#32489#1. Let you know Ciphering Info.
*#273283*255*3282*#1. Data create menu.
*#3282*727336*#1. Data usage status.
*#8736364#1. OTA update menu.

GPS Bluetooth & WLAN Test Android Codes

Secret CodesFunctioning
*#*#526#*#*WLAN Test
*#*#528#*#* WLAN Test
*#*#232339#*#*WLAN Test
*#*#232338#*#*Displays/Shows WiFi MAC address.
*#*#1472365#*#*For quick GPS test.
*#*#1575#*#*Different type GPS test.
*#*#232331#*#*Bluetooth test.
*#*#232337#*#Displays Bluetooth device address.

Firmware Version Information

Secret CodesFunctioning
 *#*#1111#*#*1. Let you know about FTA SW Version.
*#*#2222#*#*1. FTA Hardware Version.
*#*#4986*2650468#*#*1. Firmware Info PDA, Phone, H/W, RFCallDate.
*#*#1234#*#*1. PDA and Phone firmware info.
*#2263#1. RF band selection
*#9090#1. Diagnostic configuration.
*#7284#1. USB 12C mode control.
*#872564#1. USB logging control.
*#745#1. RIL dump menu.
*#746#1. Debug dump menu.
*#9900#1. System dump mode.
*#*#44336#*#*1. Shows Build time changelist number.
*#*#44336#*#*2. PDA, Phone, CSC, Build Time, ChangeList number.
*#03#1. NAND flash serial number.
*#3214789#1. GCF mode status.

Factory Tests Secret Android Codes

Secret CodesFunctioning
*#*#0283#*#*1. Packet Loop-back test.
*#*#0*#*#*1. LCD test.
*#*#0673#*#*1. Audio/Melody test.
*#*#0289#*#*1. Audio/Melody test.
*#*#0842#*#*1. Vibration test and Back Light test Device test.
*#*#2663#*#*1. Displays Touch screen version.
*#*#2664#*#*1. Touch-Screen test.
*#*#0588#*#*1. Proximity sensor test.
*#*#3264#*#*1. RAM version.
*#0782#1. Real time clock test.
*#0589#1. Light sensor test.
*#7353#1. Quick test menu.

PDA and Phone Codes

Secret CodesFunctioning
*#*#7262626#*#*1. Field test.
*#06#1. IMEI number.
*#*#8351#*#*1. Enables voice dialing logging mode.
*#*#8350#*#*1. Disables voice dialing logging mode.
**05***#1. Execute from Emergency dial screeen to unlock PUK code.
*#301279#1. HSDPA HSUPA control menu.
*#7465625#1. View phone lock status.

Other Android Phone Codes Unlock

Secret CodesFunctioning
*#0*#1. Galaxy S3 service menu.
##77647261. Motorola DROID hidden service menu.
##77647262. The default SPC password is six zeroes(000000).
1809#*990#1. LG Optimus 2x hidden service menu.
1809#*990#2. When prompted for a code enter six zeroes(000000).
3845#*920#1. Lg Optimus 3D hidden service menu.
3845#*920#2. When prompted for a code enter six zeroes(000000).
The above given android secret codes are properly tested and work quite well. However, they might not work for a single android phone. It is important to find out which works quite well and which does not. Plus one has to be alert while using the codes and be careful so as to avoid any kind of data loss and other issue.
Read More

Monday, 13 March 2017

Google Advance Searching Trick For Download Anything Without Visiting At Any Site

4 comments

Guys Today We Are Going To Talk about Google Advance Searching Trick Which Is Based On Google Indexing And Database But Believe Me It Is Very Easy Trick....

Let's See...

This Trick Is Working On Database Concept Means ...

EveryBody Knows That Google Is A Search Engine And Each Website Must Need Add Their Site To Google Database And When Google Add Any Site On Their Database It Is also Called Indexing....

So Now Click Here To Watch Practical Video For This Trick ..

Practical Video Of Google Advance Searching Trick

Read More

Sunday, 5 March 2017

What Is DNS Spoofing And Amplification Attack Explained By Hax4Us

Leave a Comment
Hax4Us
What Is DNS Spoofing?
DNS Spoofing (sometimes referred to as DNS Cache Poisoning) is an attack whereby a host with no authority is directing a Domain Name Server (DNS) and all of its requests. This basically means that an attacker could redirect all DNS requests, and thus all traffic, to his (or her) machine, manipulating it in a malicious way and possibly stealing data that passes across. This is one of the more dangerous attacks as it is very difficult to detect, but today I will show you both how to perform it and how to detect if it is being performed by somebody else on your network.


DNS Amplification Attack ?
A DNS amplification attack is a reflection-based distributed denial of service (DDos) attack.
The attacker spoofs look-up requests to domain name system (DNS) servers to hide the source of the exploit and direct the response to the target. Through various techniques, the attacker turns a small DNS query into a much larger payload directed at the target network.
The attacker sends a DNS look-up request using the spoofed IP address of the target to vulnerable DNS servers. Most commonly, these are DNS servers that support open recursive relay. The original request is often relayed through a botnet for a larger base of attack and further concealment. The DNS request is sent using the EDNS0 extension to the DNS protocol allowing for large DNS messages.  It may also use the DNS security extension (DNSSEC) cryptographic feature to add to the size of the message. 
These amplifications can increase the size of the requests from around 40 bytes to above the maximum Ethernet packet size of 4000 bytes. This requires they be broken down for transmission and then reassembled, requiring further target network resources.  A botnet's many amplified requests enable an attacker to direct a large attack with little outgoing bandwidth use. The attack is hard to protect against as it comes from valid-looking servers with valid-looking traffic.
DNS amplification is one of the more popular attack types.  In March 2013, the method was used to target Spamhaus likely by a purveyor of malware whose business the organization had  disrupted by blacklisting. The anonymity of the attack was such that Spamhaus is still unsure of the source. Furthermore, the attack was so severe that it temporarily crippled and almost brought down the Internet.
Proposed methods to prevent or mitigate the impact of DNS amplification attacks include rate limiting, blocking either specific DNS servers or all open recursive relay servers, and tightening DNS server security in general.

Note :- Guys If You Have Any Problem Regarding This Post So , You Can Ask In Comment Box. Thanx For Reading Carefully..!!

Read More