STRIX.D

Hot

Sunday, October 24, 2021

50 Linux commands you must know as a regular user

October 24, 2021 0

To view contents of directory (list)- ls

Path of current directory- pwd

Change direction- cd

Make new directory- mkdir

Move files/ Rename files- mv

Copy files- cp

Remove files- rm

Create blank new file- touch

Delete directory- rmdir

List content of file to terminal- cat

Clear terminal window- clear

Move data into file- echo

Read text file one screen at a time- less

Show manual of linux commands- man

Enables you to perform tasks that require administrative or root permission- sudo

Task manager in terminal- top

Used to archive multiple files into a tarball- tar

Used to searching words in specific files- grep

View first line of any text file- head 

View last line of ant text file- tail

Compares the contents of two files line by line- diff

Used to killing unresponsive program- kill

Display all current jobs along with their statuses- jobs

Is a command lime utility for sorting lines of text files- sort

Info about system disk- df

Check how much space files directory takes- du

To compress your files into a zip archive- zip

To extract the zipped files from a zip archive- unzip

A secure encrypted connection between two hosts over and insecure network- ssh

Shows calendar- cal

Command line tool for interaction with packaging system- apt

Custom shortcuts used to represent a command- alias

Current user info- w

Used to locate the binary, source, manual page files- whereis

Used to get one-line man page description- whatis

Used to create a new user- userdd

Used to changing password of current user- passwd

Print current user- whoami

Print current time when machine starts- uptime

Print free disk space info- free

Print used commands history- history

Print detail information about your Linux system- uname

To check connectivity status to a server- ping

To change permission of files and directories- chmod

To change ownership of  files and directories- chown

Using find searches for files and directories- find

Used to locate a file, just like the search command in windows- locate

Print ip address stuff- ifconfig

Similar to ifconfig but shortest print- ip a

Gives you a short dump of info about user- finger


Thanks for visiting.....!
Read More

Thursday, May 13, 2021

How To control your Android phone device along with your laptop/computer?

May 13, 2021 0

You can easily control your Android device from your computer.


Just follow the given steps below-


Step1- First of all, download and install team viewer in your computer/laptop device.


Step2- Now, download and install Quick support in Android device from playstore.


Step3- Now open Quick Support in your Android device and open Team Viewer in your laptop/computer device.


Step4- Now, copy Quick Support number/ID from Android device and Enter in your Team Viewer in Laptop/Computer.


Step5- Now, Connect your phone device with your Computer.


Download Quick Support (Android)


Download Team Viewer (PC/Laptop)


Yes, you have done... Now enjoy.....



Thanks for visiting.....!

Read More

Saturday, May 8, 2021

Everything about Carding

May 08, 2021 0

Introduction-


These days, in the event that we see the Mastercard misrepresentation pattern, it is being expanded step by step and new procedures being found to hack the Mastercard information and use it for malignant reason. 


As everything goes credit only, the utilization of a Mastercard will be essential for everybody. This is reason individuals ought to know about how checking extortion is done and figure out how to get not to turn into a casualty. 


There are such countless approaches to get the Mastercard subtleties accessible on the web through Darknet destinations just as on TOR locales (Data Leak .and so on) 


My point is to spread security mindfulness about checking, what is it, how the carder does it, and so forth 


I have alluded numerous articles, locales and fundamental documentation which I feel will be helpful to impart it to you. I need the typical client to know about checking strategies so they can be aware of it. 


As we can see via web-based media destinations and gatherings, the vast majority of the carders give the offers which are gathered from Online Sites and gatherings for your reference: 


Know that you ought to never contact a ripper. A Ripper is an extortion who takes the cash and never convey the item.


What is Carding?

Checking itself is characterized as the unlawful utilization of the card (Credit/Debit) by unapproved individuals (carder) to purchase an item. For instructive purposes, I will currently show how a carder can approach their unlawful exercises. Keep in mind – checking is exceptionally illicit, and ought not be endeavored under any conditions.



Important tools required in Carding


1- Computer (PC)/ Laptop

For doing checking consistently utilize a PC. I realize a few strategies utilizing a cell phone, yet it is less secure and implies more danger.


2- SOCKS

SOCKS represents Socket Secure. It is web convention which permits customer and worker traffic go through an intermediary worker, so genuine IP is getting covered up and intermediary IP get reflected. 

This is valuable while checking in light of the fact that carder needs to utilize the Visa holder's area while doing it. 


Clients can purchase SOCKS.


3- MAC Address Changer

Mac represents Media Access Control. It is the interesting location of each Network Interface Card (NIC). 


A MAC address transformer permits you to change the MAC address of NIC in a split second. It is needed to be mysterious and safe.


4- Cc Cleaner

It is extremely valuable apparatus help in cleaning your perusing history, treats, temp records, and so forth 


Numerous individuals disregard this part and get captured, so be cautious and remember to utilize it.


5- RDP (Remote Desktop Protocol)

RDP permits one PC to associate with another PC inside the organization. It is convention created by Microsoft. 


Fundamentally, carders use it to interface with PCs of the geolocation of the individual whose Visa carder need to utilize. It is utilized for security and stay anon. Here carders use others PC for doing checking rather than their own.


6- Drop

DROP is a location which the carder utilizes for the delivery address in the checking interaction. 


Allow me to clarify in subtleties with a model: 


On the off chance that I am checking with US charge card, I use USA address as transportation address then my request will be sent effectively, and I will be protected. In the event that you have family members/companions, no issue, in any case use destinations who give drop benefits just we need to pay extra for delivery it.



7- Credit Card


This part is a lot of significant so read it cautiously. Any charge card it is in the accompanying organization: 


| Mastercard Number |Exp Date| CVV2 code | Name on the Card | Address | City | State | Country | Zip code | Phone # (in some cases excluded relying upon where you get your Mastercard from)| 


e.g.: (arbitrarily taken number/subtleties)


4352557011933988 | 9 | 2024 | 143 | United States | Raraka Olsen | 2581


1277 Stoneybrook Road | USA



Types of Credit cards-


1- VISA

Classic- The Card is utilized worldwide in any areas assigned by Visa, including ATMs, genuine and virtual Stores, and shops offering labor and products via mail and phone. 


Gold – This card has a higher breaking point limit. Most utilized card and embraced around the world. 


Platinum – Card is having limits more than $10,000. 


Signature – No preset spending limit – incredible receptacle to get 


Infinite – Most lofty card with having basically no restriction. There is less available for use so be ready when purchasing these. Utilize just with respectable merchants! 


Business – it tends to be utilized for little to medium estimated organizations, normally has a breaking point. 


Corporate – it very well may be utilized with medium to enormous size organizations, having more breaking point than a Business card. 


Black – It has restricted enrollment. It has no restriction just having $500 yearly charge, very good quality card.


2- MASTERCARD

Standard – it is same as exemplary visa card. 


Gold – This card have higher breaking point limit.


Platinum – this card having limits more than $10,000


World – it has a high cutoff. 


World Elite – it is practically no restriction, very good quality card.


3- AMEX (American Express) Card


Gold – it for the most part has around a 10k breaking point. 


Platinum-  It is normally has a higher breaking point (around 35k). 


Centurion – it has a High breaking point (75k+). It is otherwise called the dark card, note: don't mistake for visa dark card.


Socks Proxy Setup in Firefox (process of carding)


Follow the means an open Firefox a go to alternatives progressed choices an organization 


A spring up will come. It will show alternatives 


1. No proxy


2. Auto Detect 


3. Use system proxy


4. Manual proxy configuration


Select manual intermediary arrangement. Enter socks have: <<proxy ip>> and port: <<proxy port>> e.g.: 141.141.141.141: 8080. Press alright and restart Firefox. Presently you are associated with secure Socks5. 


Note: when you purchase a socks consistently match with charge card holder address. On the off chance that Visa holder is from California, USA attempt to get SOCKS5 in any event coordinating with state, country.


Lets start carding process. The following steps are given below-


1- Make the email id coordinating with Visa holder name. Assuming his name is John Cena (the arbitrary name was taken), email id ought to be johncena@gmail.com or close about. 


2- Presently Run RDP and associate with the charge card holder area framework to continue. Assuming you didn't have RDP, follow following advances. 


3- Open MAC transformer and change the location haphazardly. 


4- Run CCleaner and clean all the undesirable information (treats/history/temp information and so on) 


5- Arrangement SOCKS5 intermediary in Firefox. <<Already explained>>. 


6- Take certain to utilize SOCK5 is coordinating to the area of Mastercard holder and know not to utilize boycotted IP. Check with www.check2ip.com 


7- Open the site for shopping. I need to suggest a site shop from your country since you don't have to sit tight a great deal for your bundle. 


8- Register with charge card holder data (John Cena), name, country, city, address, and email. 


9- Shop and pick your thing and add to truck. Precautionary measure: Select thing not more than $500 from the outset step. 


10- In delivery address add your location or drop address where the item will convey. 


11- At that point go to the installment page and pick installment technique like a charge card. 


12- Enter all subtleties of charge card physically on the grounds that a large portion of site having duplicate glue identifier script. 


13- At long last, in charging address add Visa proprietor address information and afterward continue with the installment cycle. 


14- On the off chance that everything good, the request will get effectively positioned. 


15- When the request shows up at the transportation address, get it from delivery boy.


Carding process using mobile-


Extra pro carder uses mobile for doing carding. Just follow the steps carefully which mentioned above.


Basic requirement:


1- Require rooted Android mobile.


2- Install few apps like(proxy apps, CCleaner, IMEI changer, Photo and Android ID changer).


3- Use any VPN for carding process like HMA or Zen mate.


4- Use proxy with proxy droid apps like SOCKS5 proxy


5- Go ahead by using IMEI changer and Android ID changer and do it.


6- Now, Connect it by connecting proxy droid with SOCKS5 proxy.


Now follow all the steps explained above.


Some tools helps you in Carding-

CC FROM SHOPS- Click Here

MAC ADDRESS CHANGER- Click Here

SOCKS- Click Here

Cc CLEANER SOFTWARE- Click Here

SOCKS CHECKER- Click Here

BINS LIST- Click Here

EXACT BINS- Click Here


NOTE-

1-Typical clients: Keep your Mastercard safe hands. Continue to change the charge card PIN consistently. Try not to make the online exchange from obscure framework/versatile. 

2-Who need to pick up checking – I noticed a large number of the begginers attempt to be brilliant and got ripped multiple times. Try not to do it, it's at long last your misfortune. 

3-Checking is Illegal movement. Try not to do it. In the event that get captured, you will be in a difficult situation. 

4-Be protected and have some good times.


An Practical video on Carding-



Thanks for visiting...!

Read More

Wednesday, May 5, 2021

HOW TO CHECK RADIATION LEVEL OF ANY MOBILE DEVICE

May 05, 2021 0

IF THE RADIATION LEVEL OF YOUR DEVICE IS MORE THAN 1.6 WATT/KG THEN YOU NEED TO CHANGE YOUR MOBILE DEVICE IMMEDIATELY BECAUSE IT IS HARMFUL FOR YOU. 

STEPS- 

1- OPEN DIALPAD IN YOUR MOBILE PHONE. 


2- NOW TYPE ON YOUR SMARTPHONE *#07#. 


3- IT WILL SHOW RADIATION LEVEL AND MORE INFORMATION OF YOUR MOBILE DEVICE.


NOTE- IF YOUR DEVICE HAVE GREATER THAN 1.6 WATT/KG THEN IT'S HARMFUL FOR YOU AND NEED TO CHANGE MOBILE IMMEDIATELY 


(Under 1.6 WATT/KG-IT IS FINE. YOUR DEVICE IS SAFE. )



Read More

Best 5 Wi-Fi Hacking Apps for Android

May 05, 2021 0

In this article, I will show some best Wi-Fi hacking applications for android. You can test these Wi-Fi hacking applications on your own Wi-Fi organization. You can do a great deal of unimaginable things from these applications like evaluating, hacking wifi organizations, Know the Wi-Fi secret phrase, type, information transmission, and considerably more. To run these applications on your Android with 100% adequacy, ensure that your portable is established. On the off chance that your portable isn't established, at that point don't stress, you can in any case utilize these applications without root, But the achievement rate will be diminished.


List of Wi-Fi hacking apks

1- WPA/WPS TESTER



WPA WPS Tester for automaton is probably the foremost famed hacking applications for Wi-Fi, that was created to look at Wi-Fi networks for weaknesses. This noted application is understood for its capability to interrupt into security frameworks. It checks the association with passages utilizing WPS-PIN, that ar determined utilizing totally different calculations. This application needs automaton four.0 or higher to figure. Bruteforce mode is to boot accessible on this application. Application likewise finds if associate Access purpose with WPS authorized  is immunized. NOTE: you'll be able to check the PINS with this application, and you'll be able to associate, nonetheless you cannot see the key key while not root consents. WPA WPS Tester is accessible on Google Playstore.

Download WPA/WPS TESTER





2- Aircrack-ng- 


Aircrack-ng is outstanding amongst other applications for hacking Wi-Fi networks accessible for Android. It executes the standard FMS assault alongside certain enhancements like Korek assaults, just as the PTW assault, accordingly making the assault a lot quicker contrasted with other WEP breaking apparatuses. The well known Aircrack-ng security apparatus is one such instrument that has been ported to Android. Running Aircrack-ng on Android isn't precarious. The hardest part is getting a Wi-Fi chipset that supports observing mode. You can download Aircrack-ng From GitHub by following the underneath interface.

Download Aircrack-ng





3- zAnti


ZAnti is a notable application for hacking the Wi-Fi network that permits you to investigate hazard levels on the Wi-Fi organization. With the assistance of zAnti, you can undoubtedly discover weaknesses in your Wi-Fi organization. Its Wi-Fi scanner shows passages that utilization default secret phrase esteems and features them in green. You can likewise utilize this application to slaughter the essential associations, obstructing admittance to any site or worker. By showing the strategies that programmers use, you can recognize security openings in your organization and make proper redresses.

Download zAnti





4- Reaver For Android


 RFA is a programmer application for hacking the Wi-Fi secret key. RFA is not difficult to utilize on the grounds that it has an easy to use interface. It upholds an observing mode that can be enacted or deactivated whenever. Reaver autonomously finds Wi-Fi switches with WPS support. This application utilizes the brute force PIN-codes of the WPS recorder and can recuperate WPA/WPA2 passphrase. Reaver can get the WPA/WPA2 passphrase of the objective passage inside 2-5 hours. To wrap things up, Reaver for Android likewise upholds outer contents. Because of its easy to use interface To utilize RFA, you additionally need to introduce bcmon. apk.

Download Reaver For Android and bcmon apk





5- Router Keygen


It is a notable Wi-Fi hacking application that has been developing, yet essentially, it serves to acquire Wi-Fi keys from networks that have not changed their secret word, that is, with a production line secret word. When beginning the application, it will reveal to us which networks it supports and which not in the wake of doing an output around us.

Download Router Keygen




NOTE-
So above is the rundown of some best Wi-Fi hacking applications for android. You should utilize these applications to test the security of your own Wi-Fi organization. No gadget or organization is completely secure. White-cap security scientists, just as notable programmers, are putting forth steady attempts to discover weaknesses in networks and can assume responsibility for your gadgets. Contrasted with wired organizations, Wi-Fi networks represent an extra security issue. Since their signs are accessible to nearly everybody. Different security highlights, like WPA2, encode traffic, however there are still highlights that can sabotage your security.

Thanks for visiting.....
Read More