29 Nov 2015

How to Track a Cell Phone Location


Track Phone Location
Are you looking to know how to track a cell phone with pin point accuracy? Do you need to exactly know where your child or employees are moving around during your absence? If so you have come to the right place. In this article I will let you know some of the possible methods to GPS track a cell phone in simple steps.

1) How to Track a Cell Phone that Belongs to Someone Else?

If you need to track someone else’s phone such as your children or employees, you can simply use a cell phone tracking app such as MobiStealth. This is a very small app that can be installed in just a few simple steps and takes only 2-3 minutes to complete. Once installed the app stays hidden on the phone but keeps track of every activity on the phone including its GPS location, Call Logs, Text Messages and more.
Track a Cell Phone with MobiStealth
MobiStealth Features:
  • GPS Location Tracking: GPS positions are uploaded at a time interval you select with a link to the map.
  • Track Text Messages & Emails: Every text message sent and received including SMS and emails are logged even if the phone logs are deleted.
  • Call Logs: Each incoming and outgoing number on the phone is logged along with duration, date and time stamp.
  • Phone Contacts: Get access to complete contact list on the target phone.
  • Browser History: All websites visited on the phone are logged.
  • Social Networking & Messenger Activity: All social media activity such as Facebook, Twitter, LinkedIn, WhatsApp, Skype, iMessages, Instagram and many more are recorded.

How it Works?


You will have to download and install the app onto the target phone of whose location and activities you want to track. Installation takes only a few minutes during which you should have the target phone in your hand.
Once the installation is complete, the tracking process will begin immediately and the recorded logs are silently uploaded to your MobiStealth account. You can login to your secure online account from your computer or phone at any time to view the logs containing GPS location, Call activities Text Messages and more. You can download MobiStealth from the link below:

Supported Phones: Android, iPhone, iPad and Tablets.

2) Tracking a Lost phone

Now, let us look at some of the possible options to track a phone in case if it is lost or stolen.

For Android Phones:

If you need to track a lost android phone, you can follow the steps mentioned below:
  1. Download Android Device Manager from Google play store and install it on another android device. This app lets you track your stolen android phone and also lets to remotely lock or erase all the data on it.
  2. Android Device Manager
  3. From “Android Device Manager” log into your Google account using the same ID associated with your lost phone. After successful login this app will attempt to locate your device and show its last known location on the map.
  4. In addition, you will also be able to perform several actions on your lost phone such as give a RingLock the device or Erase all the data stored on it.

For Apple iPhones:

If you need to track a lost iPhone, you can follow the steps mentioned below:
  1. Login to the iCould Website using an Apple ID associated with your lost phone. Since location tracking is turned on by default on all iPhone devices, iCould lets you track it from your web browser or your iPad and shows its location on the map.
  2. iColud Website
  3. If your phone is found nearby to your location you have an option to Play Sound on it so that your iPhone will emit a sound, helping you track it down.
  4. If this does not help, you can choose the option Lost Mode which will remotely lock your phone down and display a phone number that can be reached at.
  5. If none of the above options work, you can finally decide to go with the option Erase iPhone which will completely wipe out all the data stored on it. This way you can prevent your private information from falling into the wrong hands.

For Windows Phones:

In order to track down a lost Windows phone, you can try the below mentioned steps:
  1. Go to Windows Phone Website and locate the option Find My Phone on the top-right corner of the page.
  2. Track Windows Phone
  3. This will ask you to sign-in using your Windows account associated with your lost phone. If your phone gets traced you will see a map showing its exact location. You will also find options to LockRing and Erase its data in case if your phone is found to be completely lost.

27 Nov 2015

Best Ways to Extract APK Files in Android

Here we have 4 best ways through which you can  extract APKs from any Android phone or tablet. Do note that none of these methods require rooted Android phone to extract APK. So. let’s have a look at them below.

Method 1: ES File Explorer

You may not be new to ES Explorer as it is one of the most popular file manager available for Android. However, this utility can also help you in extracting .apk files in your Android phone. There are several other uses of this little app, but today we will see how you can use it extract .apk.

Begin with installing ES Explorer on your Android phone if you don’t have it already installed. Next, open ES Explorer, go to Tool menu and tap on App Manager. Next, select the apps you want to extract and select the Backup option. ES Explorer will now start extracting the APK from  your selected Android apps to save them as backup. That’s it. Now you can find the extracted .apk files in your SD card.

Method 2: AirDroid 

Air Droid is a must have program for all the Android users who sync their Android phone with PC. Air Droid allows you to manage and make transfer between your PC and Android phone without any hassle. As a plus point if you have Air Droid installed in your computer and Android phone, you can use it extract APK files as well.

To do this, connect your phone to your PC using Air Droid. Once you are connected, go to Air Droid menu in your PC and navigate to Apps section. Next, select all the apps for which you want to extract the APK and click on Download. That’s it. Now Air Droid will extract the APK files to your computer with ease. This method is recommended to anyone who wants to save extracted APKs in their computer as backup.

Method 3: Online Web Tools

How to Extract APK Files in Android Using Online Web Tools : If you don’t want to use any third-party apps to extract the APK files, then you can move towards online web tools. There are several free online services such as apps.evozi.com, which allow you to download Android APK directly to your Android phone or PC. We have already written about the best Android APK downloading websites. All you have to do is visit any one of the web tools, enter the Android app URL for which you want to download the APK and then click on download apk.  You  can follow the given link for detailed tutorial and services.

Method 4:  Use Assistant

Assistant is yet another Android app which is available for free on Google Play Store. It allows the users to extract Android apk from your installed apps. All you have to do is, download Assistant, select the apps you want to extract Apk for and then tap on Backup button. Once extracted, you can find all your APK files in SD card.

These are some of the best ways to extract  apk files in Android.

WinRAR 5.30 FINAL Incl. Crack


WinRAR is a powerful archive manager. It can backup your data and reduce the size of email attachments, decompress RAR, ZIP and other files downloaded from Internet and create new archives in RAR and ZIP file format.

Features:

  Using WinRAR puts you ahead of the crowd when it comes to compression by consistently making smaller archives than the competition, saving disk space and transmission costs.   WinRAR provides complete support for RAR and ZIP archives and is able to unpack CAB, ARJ, LZH, TAR, GZ, ACE, UUE, BZ2, JAR, ISO, 7Z, Z archives. WinRAR offers a graphic interactive interface utilizing mouse and menus as well as the command line interface.   When you purchase WinRAR license you are buying a license to the complete technology, no need to purchase add-ons to create self-extracting files, it’s all included. One price, one payment, once.   You also receive the benefit of a life-time use of the WinRAR archiver. No upgrade fee to pay. When a new release is made, simply download and install, your license is valid for life. WinRAR is easier to use than many other archivers with the inclusion of a special “Wizard” mode which allows instant access to the basic archiving functions through a simple question and answer procedure. This avoids confusion in the early stages of use. WinRAR offers you the benefit of industry strength archive encryption using AES (Advanced Encryption Standard) with a key of 128 bits.   WinRAR supports files and archives up to 8,589 billion gigabytes in size. The number of archived files is, for all practical purposes, unlimited. WinRAR offers the ability to create selfextracting and multivolume archives. Recovery record and recovery volumes allow to reconstruct even physically damaged archives. WinRAR features are constantly being developed to keep WinRAR ahead of the pack.

Instructions:

1) Open _ReadMe.txt and Read Instructions.


Download Link:


22 Nov 2015

Best Hacking Tools 2016


NOTE : Please use google for searching every tool. We only provide the info and are not responsible for anything.


1) Nmap:  Network Mapper

Abbreviated as Nmap is a versatile tool for Network Security, plus it is free and open source. It is largely used by network administrators for network discovery and security auditing. System Admins use Nmap for network inventory, determining open ports, managing service upgrade schedules, and monitoring host (A term used for “a computer on a network”) or service uptime. The tool uses raw IP packets in many creative ways to determine what hosts are available on the network, what services (application name and version) they offer, which type of protocols are being used for providing the services, what operating systems (and OS versions and possible patches) and what type and version of packet filters/ firewalls are being used by the target.

2) Metasploit:

A tool for exploiting (Utilizing network weakness for making a “backdoor”) vulnerabilities (Weak Points) on Network. This tool is neither free nor open source. But when it comes to features offered it deserves the price it claims. The Metasploit Project is a hugely popular pentesting (penetration testing) or hacking tool that is used by cyber security professionals and ethical hackers. Metasploit is essentially a computer security project that supplies information about known security vulnerabilities and helps to formulate penetration testing and IDS testing.

3) Cain and Abel:

Cain & Abel is a password recovery tool that is mostly used for Microsoft Operating Systems. This popular hacking tool allows the user to seek the recovery of various kind of passwords by sniffing the network(capturing some of the data packets), cracking encrypted passwords using Dictionary, Brute-Force(Generation of hashes out of words and then comparison of encrypted hash with the generated one, this method takes less time than dictionary attack method) and Cryptanalysis attacks. Cain, as it is often referred to, can also record VoIP(Voice over IP protocol, used for making calls over using internet) conversations, decode hashed scrambled passwords, recover wireless network keys and more. It can crack various types of hashes including NTLM,MD2,MD5,SHA-1,SHA-2 and many more. These functionalities make Cain and Abel one of the best password recovery tool.

4) Angry IP Scanner:

Angry IP Scanner, also known as ‘IPscan’ is a freely available (open-source and cross-platform) hacking network scanner that is both fast and easy to use. The main purpose of this hacking tool is to scan IP addresses and ports to find open doors and ports. Worth noting that Angry IP Scanner also has a bunch of other uses as well. Common users of this hacking tool include network administrators and system engineers.

5) John The Ripper: 

John the Ripper is a popular password cracking pentesting tool that is most commonly used to perform dictionary attacks. John the Ripper takes text string samples (from a text file, referred to as a wordlist, containing popular and complex words found in a dictionary or real passwords cracked before), encrypting it in the same way as the password being cracked (including both the encryption algorithm and key), and comparing the output to the encrypted string. This tool can also be used to perform a variety of alterations to dictionary attacks. Including Brute Force and Rainbow attacks.

6) THC Hydra:

Although often considered as yet another password cracker, THC Hydra is hugely popular and has a very active and experienced development team. Essentially THC Hydra is a fast and stable Network Login Hacking Tool that will use dictionary or brute-force attacks to try various password and login combinations against an log in page. This hacking tool supports a wide set of protocols including Mail (POP3, IMAP, etc.), Databases, LDAP (Lightweight Directory Access Protocol),SMB, VNC, and SSH (Secure Shell, used by VPN Softwares).

7) Burp Suite:

A pentesting tool, Burp Suite has several features that can help the penetration tester or ethical hacker. Two commonly used applications used within this tool include the ‘Burp Suite Spider’ which can enumerate and map out the various pages and parameters of a web site by examining cookies and initiates connections with these web applications, and the ‘Intruder’ which performs automated attacks on web applications.

8) Nessus Remote Security Scanner:

Recently went closed source, but is still essentially free. Works with a client-server framework. Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications. (This tool is not in the concise list)

9) Ettercap:

Ettercap has a huge following and is widely used by cyber security professionals. Ettercap works by placing the user’s network interface into promiscuous mode and by ARP poisoning(ARP : Address resolution protocol is used to determine a host’s MAC address (address of its Network Interface Card) by knowing its IP address. ARP poisoning is a process where a hacker gives wrong information of either its MAC or IP address to the network.) The target machines, i.e. facilitating a ‘Man In The Middle’ or MITM attack. Once successful Ettercap (and the hacker) can deploy various attacks on the victims. A popular feature about Ettercap is its’ ability to support various plugins.

10) Wapiti:

Wapiti has a very loyal following. As a pentesting tool (or framework) Wapiti is able to scan and detect hundreds of possible vulnerabilities. Essentially this Multi Purpose Hacker Tools can audit the security of web applications by performing “black-box” scans, i.e. it does not study the source code of the application but will scan the HTML pages of the application seeking scripts and forms where it can inject data.