METHOD 1 :
go to settings and forcestop app lock
done !!
METHOD 2:
if the victom has also locked his settings
get your phone in safe mod
then go to settings force stop applock
then make your phone in normal mod
done !!
Cloning a card: Sim cards are manufactured on the basis of 3 algorithms COMP128v1,COMP128v2 and COMP128v3 now an important note currently only COMP128v1 version sim cards can be cloned ,since this is the only algorithm which has been cracked by users, bear in mind that 70% of all the sim cards we use are COMP128v1 . 1. Buy a SIM card Reader 2. Need a Blank SIM card or super SIM card 3. Download and install MagicSIM 4. Download and install USB SIM Card Reader Software 3.0.1.5 6. Go in phone tools, select SIM card, then select unlock SIM, it will prompt for a code. 7 Call network provider, they will ask for your phone number, your account info, name and security code, then they will ask why you want to unlock your SIM card, just tell them you need to unlock your SIM to get it to work with your overseas phone or something. 8. Once they give you the SIM unlock code, enter it, and it will say SIM unlocked. 9. Remove the SIM from your phone, place it in the card...
Prerequisites Kali Linux Prior experience with wireless hacking You will also need to install a tool (bridge utils) which doesn't come pre-installed in Kali. No big deal- apt-get install bridge-utils Objectives The whole process can be broken down into the following steps- Finding out about the access point (AP) you want to imitate, and then actually imitating it (i.e. creating another access point with the same SSID and everything). We'll use airmon-ng for finding necessary info about the network, and airbase-ng to create it's twin . Forcing the client to disconnect from the real AP and connecting to yours. We'll use aireplay-ng to deauthenticate the client, and strong signal strength to make it connect to our network. Making sure the client doesn't notice that he connected to a fake AP. That basically means that we have to provide internet access to our client after he has connected to the fake wireless network. For that we will need to have i...
Using Google Dorks For Hacking Google is the most popular search engine on the internet right now. People use it to find their answers, images, videos, news and notes etc. But, did you know that the Google can also help hackers to find vulnerable targets and steal unauthorized information?. Google is as much helpful for hackers as any other general user. Hackers use Google search engine to find Vulnerable systems (Be it a database, website, security cameras, or any IOT gadget) with the help of some special search queries. There are many Google search engine queries that can uncover vulnerable systems and/or sensitive information disclosures. These queries are known as Google Dorks. What is Google Dork or Google Dorking? In 2002, Johnny Long began to collect interesting Google search queries that uncovered vulnerable systems or sensitive information disclosures. He labeled them Google dorks. Some people call it Google hacking. Google Dorking is the method for findi...
Comments
Post a Comment