Thursday, 9 March 2017

AICP 11.0 Marshmallow for Tecno C8 (MT6735)

1 comment
Custom ROM For Tecno C8 (Requested By Our Group Member @kevin)

Features

  • Android 6.0.1
  • Full CyanogenMod 13 base
  • Have everything CyanogenMod 13 have
  • Support themes
  • Various Tweaks
  • Fast
  • Stable
  • More …

Downloads

Installation

  1. Boot to your TWRP recovery and backup the NVRAM and NVDATA partitions (Tap on backup and optionally uncheck any partition except NVRAM and NVDATA and swipe to the right to backup). Now tap on wipe and slide to the right to wipe.
  2. Go back to main screen and tap on « Advanced Wipe » and check « Dalvik/Art Cache« , « Cache« , « System » and « Data » and then slide again to wipe. <= This step is crucial!
  3. Go back again and tap on Install, choose CyanogenOS-13.0.2_C8.zip (tap on Select Storage to choose the storage on which you stored the zip file) and swipe again to the right to install.
  4. After the restore process, flash the Fix-C8_Marshmallow.zip file the same way as in the previous step. This step is optional if your previous rom was a Marshmallow ROM.
  5. Optionally flash the Google Apps package. If you don’t flash it, you won’t have Google Services like Play Store, Gmail, Hangouts etc.
  6. Tap on reboot once finished. First reboot can take a long time.

Notes

  • If you don’t have network or SIM card isn’t detected, boot to TWRP and restore the NVRAM and NVDATA backup you did on the first step.

Screenshots

123

Credits and Thanks

  • Team AMT
  • DHANA
  • Team Psycho
  • Sandeep Sethi
  • Syed Ahmed Ali Shah
  • Anyone else I may have forgotten to mention
Disclaimer :- If You May Get Bricked During Flashing Process So We Or I Am Not Responsible.
Read More

Wednesday, 8 March 2017

[ROM][OFFICIAL][7.1.1][A6020] AOKP-ROM - Lenovo Vibe K5/K5 Plus (Hax4Us)

Leave a Comment
Custom ROM For Lenovo Vibe K5 (Requested By Our Group Member @unknown)
All Credit Goes To XDA

Screenshot:


How to install:
From stock
  1. Copy the ROM zip on your phone
  2. Reboot in TWRP Recovery mode
  3. Backup your phone!
  4. Format/Wipe system, cache, dalvik, data
  5. Flash/Install ROM
  6. Flash Install Gapps (OpenGapps ARM 7.1 Mini or smaller is recommanded)
  7. Reboot

Disclaimer :- You and Only you are responsible for your phone , so don't depend on me .
Read More

Tuesday, 7 March 2017

(Hindi) How To Hide AnyThing In Android WiThouT AnY App (Hax4Us)

2 comments
Hax4Us
Dosto ajkal Bahut Bande Alag Alag Type Ki Applications Install Karte Hai Jisse Vo Apna Private Data (Image , videos , Or Any Other Files ) Hidden Kar Sake.....


To Aaj Me Aapko Bahut Hi Simple But Effective Tarika Bataunga Jisse Aapko Kisi Bhi Application Ko Install Karne Ki Jarurat Nahi Padegi....

To Chaliye Dekhte Hai....


Steps :


  1. First Aap Koi Bhi Image Ya Video Select Kare . 
    Hax4Us
  2. Frr Aap Use Rename Option Select Kare.
    Hax4Us
  3. Ab Rename Me Aapko Bss Last Me Extension Change Karna Hai Like Niche Screenshot Me Mene .mp3 Ki Jagah Only 'g' likha Hai Vese Aap Kuch Bhi Likh Sakte Hai.
    Hax4Us
  4. Isse Hoga Ye Ki Ab Vo File Music Ya Video Unsupported Ho Jayegi And Ab Vo Gallery Me Show Nahi Hogi.
    Hax4Us
Note:- Agar Aapko Iss Post Se Related Koi Problem Hai To Aap Comment Me Pooch Sakte Hai.
Read More

Sunday, 5 March 2017

What Is DNS Spoofing And Amplification Attack Explained By Hax4Us

Leave a Comment
Hax4Us
What Is DNS Spoofing?
DNS Spoofing (sometimes referred to as DNS Cache Poisoning) is an attack whereby a host with no authority is directing a Domain Name Server (DNS) and all of its requests. This basically means that an attacker could redirect all DNS requests, and thus all traffic, to his (or her) machine, manipulating it in a malicious way and possibly stealing data that passes across. This is one of the more dangerous attacks as it is very difficult to detect, but today I will show you both how to perform it and how to detect if it is being performed by somebody else on your network.


DNS Amplification Attack ?
A DNS amplification attack is a reflection-based distributed denial of service (DDos) attack.
The attacker spoofs look-up requests to domain name system (DNS) servers to hide the source of the exploit and direct the response to the target. Through various techniques, the attacker turns a small DNS query into a much larger payload directed at the target network.
The attacker sends a DNS look-up request using the spoofed IP address of the target to vulnerable DNS servers. Most commonly, these are DNS servers that support open recursive relay. The original request is often relayed through a botnet for a larger base of attack and further concealment. The DNS request is sent using the EDNS0 extension to the DNS protocol allowing for large DNS messages.  It may also use the DNS security extension (DNSSEC) cryptographic feature to add to the size of the message. 
These amplifications can increase the size of the requests from around 40 bytes to above the maximum Ethernet packet size of 4000 bytes. This requires they be broken down for transmission and then reassembled, requiring further target network resources.  A botnet's many amplified requests enable an attacker to direct a large attack with little outgoing bandwidth use. The attack is hard to protect against as it comes from valid-looking servers with valid-looking traffic.
DNS amplification is one of the more popular attack types.  In March 2013, the method was used to target Spamhaus likely by a purveyor of malware whose business the organization had  disrupted by blacklisting. The anonymity of the attack was such that Spamhaus is still unsure of the source. Furthermore, the attack was so severe that it temporarily crippled and almost brought down the Internet.
Proposed methods to prevent or mitigate the impact of DNS amplification attacks include rate limiting, blocking either specific DNS servers or all open recursive relay servers, and tightening DNS server security in general.

Note :- Guys If You Have Any Problem Regarding This Post So , You Can Ask In Comment Box. Thanx For Reading Carefully..!!

Read More