How to root Android Devices
1. Download the unlock-root tool by using the
link from here; take note that there is available a free-version and a
paid variant of the program, so get the one that you prefer the most (I
recommend you to get the free one because you don’t know if the tool will work
for your handset or not).
2. Save the file on your computer and then
install the same.
3. Also, run the executable file.
4. Download and install the drivers for your
handset on the computer.
5. Connect the device with the computer by using
its USB cable.
6. Up next, from the Unlock-Root tool click on
the “root” button.
7. A list of devices will be displayed.
8. Select your phone / tablet from that list and
start the rooting process.
9. In the end, a confirmation message will be
displayed on your computer.
10. Unplug the USB cable and reboot your device.
Congratulations, that was all for now. Your Android based device
should be rooted now, so you can look forward in installing a custom recovery
image and update to a custom ROM firmware. Do share your experience with us and
if the method isn’t working for your handset, use the comments area from below
and share the same with us and with other users who might want to use this
guide.
Hack Gmail Password using Hydra in kali Linux
Open your Kali Linux terminal and Type xhydra and press enter

Kali Linux->Passwords Attacks->Online Attacks->Hydra

In the target tab, select
Single Target: smtp.gmail.com
Protocol: smtp

In passwords tab, select
Username: Type Victim Email ID
In the passwords, select the password list option and browse to select your
Passwords file. Here I have used my custom password file.

Now select start tab and click on start button, the password cracking begins and result is as follows

How to Send Encrypted Mail through Gmail (Secure Gmail by Streak)
Secure
Gmail encrypts and decrypts emails you send in Gmail. This happens all
on your machine, and the unencrypted text never reaches Google servers.
This is useful if you don’t want anyone but the intended recipient to
ever read your email (i.e. companies, governments, etc.)
First Install Secure Gmail by Streak plugin in your chrome browser from here


Compose your email and send

Enter a password; your recipient will need to enter the same password.

To decrypt the email, your recipient will also need the Secure Gmail extension installed, as well as the password.

mail spoofing: The story of “Congratulations you have won a lottery” like spam emails
Mail vs E-mail
Back in old days when internet was not so common, we had to rely only on the postal/courier services. The only thing that bugs me about the traditional mail is their speed. This is when email comes. It offers numerous benefits, like its blazing fast, most of the time its free, you can attach from pictures to videos, from management point of view you don’t have to maintain a hard folder, last but not least its environment friendly. In short, email is one of the greatest inventions of all time.
Back in old days when internet was not so common, we had to rely only on the postal/courier services. The only thing that bugs me about the traditional mail is their speed. This is when email comes. It offers numerous benefits, like its blazing fast, most of the time its free, you can attach from pictures to videos, from management point of view you don’t have to maintain a hard folder, last but not least its environment friendly. In short, email is one of the greatest inventions of all time.
What is a spam?
I’m not
that old, but again back in those dial-up connection days, there was no
such thing as Gmail, most of people either used Hotmail or Yahoo mail
for the emails. The problem with these two email service providers is
the spams. Spams are irrelevant emails coming to you, mostly used for
marketing a product/service, but they are cases where spam emails have
hacked a person through social engineering attack or session hijacking.
Phishing is also associated with spoofed emails, phishing is “the
fraudulent practice of sending emails purporting to be from reputable
companies in order to induce individuals to reveal personal information,
such as passwords and credit card numbers“.
If you
only use Gmail, you are a lucky person, because Google has got some very
intelligent and sophisticated spam filtering mechanism. And frankly
speaking I don’t get spams at all in my Gmail, but in case of Ymail or
Hotmail … let’s just not talk about it.
What is e-mail spoofing?
In
today’s article I will focus on Email spoofing. So, the first question
you may ask is what is spoofing? Spoofing in simple terms is when Alice
tries to be Bob. Email spoofing is when Alice sends an email to Eve but
she keeps her identity to be Bob. When Eve receives an email she thinks
that Bob has sent the email but it’s not.
*PLEASE
NOTE THIS TUTORIAL IS FOR EDUCATIONAL PURPOSES ONLY. GENERATING SPOOFED
EMAILS OR SPAM IS ILLEGAL AND PUNISHABLE UNDER THE LAW. YOU WILL BE
RESPONSIBLE FOR YOUR ACTIONS.*
Platform: Windows 7 (also works on MAC and Linux)
How to spoof an e-mail ?
There can
be different ways of spoofing an email, but I am going to use
“sendmail” program for it. Sendmail is a simple command line program
used to send emails via SMTP protocol.
1. Go to Google and type “sendmail google code”. Open the page highlighted below.

3. Go to the download section and download the appropriate file, as I m on windows so, I will be downloading the “.exe” file.

Open the
command line and call the program “mailsend”. As soon as you type
mailsend, the first thing it will ask for is SMTP server. This is a very
critical part, if you don’t provide the right SMTP server your email
will not be sent. You have to chose a SMTP server that doesn’t require
authentication. I will be using PTCL’s SMTP server i.e
“smtp.ptcl.com.pk“, this server runs on port 25.

Next in
“from”, enter the email ID of the person you want to spoof, In this case
I m making a spoof email of Bill Gates i.e “billgates@microsoft.com“


Enter subject and then write your message, after you have completed your message.

Press enter, then press dot button and again press enter, a message will pop that your email has been sent.

Here you can see my inbox has got that spoofed email.

Inbox overview.

Ads by Google
Copyright by SudoLumo Inc. Powered by Blogger.