Wednesday, 15 April 2015

Facebook Blank Post and Blank Comment Tricks Code


Facebook Blank Post and Blank Comment Tricks Code




Most of the daily Facebook users are knows about that Facebook Blank Post Tricks Code but what about those users who didn’t know about Facebook Blank post. And a with blank post we are also sharing blank comment trick.



Here is the Code

For the Blank Post
Just Type @+ [0:0:]
 [Note – Remove + Then Try]


Here is the Code

For the Blank Comment

      a)    press the ALT key,
      b)    hold it, and type 0,1,7,3 without those commas
      c)     (ALT+0173).
      d)    Remember do not release the alt key while typing.
      e)    Now leave all the keys and press enter.
      f)      Voila! You do it.
      g)    EnJoy J







Google queries for locating various Web servers
“Apache/1.3.28 Server at” intitle:index.of
Apache 1.3.2
“Apache/2.0 Server at” intitle:index.of
Apache 2.0
“Apache/* Server at” intitle:index.of
any version of Apache
“Microsoft-IIS/4.0 Server at” intitle:index.of
Microsoft Internet Information Services 4.0
“Microsoft-IIS/5.0 Server at” intitle:index.ofMicrosoft Internet Information Services 5.0
“Microsoft-IIS/6.0 Server at” intitle:index.of
Microsoft Internet Information Services 6.0
“Microsoft-IIS/* Server at” intitle:index.of
any version of Microsoft Internet Information Services
“Oracle HTTP Server/* Server at” intitle:index.of
any version of Oracle HTTP Server
“IBM _ HTTP _ Server/* * Server at” intitle:index.of
any version of IBM HTTP Server
“Netscape/* Server at” intitle:index.of
any version of Netscape Server
“Red Hat Secure/*” intitle:index.of
any version of the Red Hat Secure server
“HP Apache-based Web Server/*” intitle:index.of
any version of the HP server
Queries for discovering standard post-installation
intitle:”Test Page for Apache Installation” “You are free”
Apache 1.2.6
intitle:”Test Page for Apache Installation” “It worked!” “this Web site!”
Apache 1.3.0 – 1.3.9
intitle:”Test Page for Apache Installation” “Seeing this instead”
Apache 1.3.11 – 1.3.33, 2.0
intitle:”Test Page for the SSL/TLS-aware Apache Installation” “Hey, it worked!”
Apache SSL/TLS
intitle:”Test Page for the Apache Web Server on Red Hat Linux”
Apache on Red Hat
intitle:”Test Page for the Apache Http Server on Fedora Core”
Apache on Fedora
intitle:”Welcome to Your New Home Page!”
Debian Apache on Debian
intitle:”Welcome to IIS 4.0!”
IIS 4.0
intitle:”Welcome to Windows 2000 Internet Services”
IIS 5.0

intitle:”Welcome to Windows XP Server Internet Services”
IIS 6.0
Querying for application-generated system reports
“Generated by phpSystem”

operating system type and version, hardware configuration, logged users, open connections, free memory and disk space, mount points
“This summary was generated by wwwstat”
web server statistics, system file structure
“These statistics were produced by getstats”
web server statistics, system file structure
“This report was generated by WebLog”
web server statistics, system file structure
intext:”Tobias Oetiker” “traffic analysis”
systemperformance statistics as MRTG charts, network configuration
intitle:”Apache::Status” (inurl:server-status | inurl:status.html | inurl:apache.html)
server version, operating system type, child process list, current connections
intitle:”ASP Stats Generator *.*” “ASP Stats Generator” “2003-2004 weppos”
web server activity, lots of visitor information
intitle:”Multimon UPS status page”
UPS device performance statistics
intitle:”statistics of” “advanced web statistics”
web server statistics, visitor information
intitle:”System Statistics” +”System and Network Information Center”

system performance statistics as MRTG charts, hardware configuration, running services
intitle:”Usage Statistics for” “Generated by Webalizer”
web server statistics, visitor information, system file structure
intitle:”Web Server Statistics for ****”
web server statistics, visitor information
nurl:”/axs/ax-admin.pl” -script
web server statistics, visitor information
inurl:”/cricket/grapher.cgi”
MRTG charts of network interface performance
inurl:server-info “Apache Server Information”
web server version and configuration, operating system type, system file structure
“Output produced by SysWatch *”
operating system type and version, logged users, free memory and disk space, mount points, running processes, system logs



dork for finding admin page
admin1.php
admin1.html
admin2.php
admin2.html
yonetim.php
yonetim.html
yonetici.php
yonetici.html
admin/account.php
admin/account.html
admin/index.php
admin/index.html
admin/login.php
admin/login.html
admin/home.php
admin/controlpanel.html
admin/controlpanel.php
admin.php
admin.html
admin/cp.php
admin/cp.html
cp.php
cp.html
administrator/
administrator/index.html
administrator/index.php
administrator/login.html
administrator/login.php
administrator/account.html
administrator/account.php
administrator.php
administrator.html
login.html
modelsearch/login.php
moderator.php
moderator.html
moderator/login.php
moderator/login.html
moderator/admin.php
moderator/admin.html
account.php
account.html
controlpanel/
controlpanel.php
controlpanel.html
admincontrol.php
admincontrol.html
adminpanel.php
adminpanel.html
admin1.asp
admin2.asp
yonetim.asp
yonetici.asp
admin/account.asp
admin/index.asp
admin/login.asp
admin/home.asp
admin/controlpanel.asp
admin.asp
admin/cp.asp
cp.asp
administrator/index.asp
administrator/login.asp
administrator/account.asp
administrator.asp
login.asp
modelsearch/login.asp
moderator.asp
moderator/login.asp
moderator/admin.asp
account.asp
controlpanel.asp
admincontrol.asp
adminpanel.asp
fileadmin/
fileadmin.php
fileadmin.asp
fileadmin.html
administration/
administration.php
administration.html
sysadmin.php
sysadmin.html
phpmyadmin/
myadmin/
sysadmin.asp
sysadmin/
ur-admin.asp
ur-admin.php
ur-admin.html
ur-admin/
Server.php
Server.html
Server.asp
Server/
wp-admin/
administr8.php
administr8.html
administr8/
administr8.asp
webadmin/
webadmin.php
webadmin.asp
webadmin.html
administratie/
admins/
admins.php
admins.asp
admins.html
administrivia/
Database_Administration/
WebAdmin/
useradmin/
sysadmins/
admin1/
system-administration/
administrators/
pgadmin/
directadmin/
staradmin/
ServerAdministrator/
SysAdmin/
administer/
LiveUser_Admin/
sys-admin/
typo3/
panel/
cpanel/
cPanel/
cpanel_file/
platz_login/
rcLogin/
blogindex/
formslogin/
autologin/
support_login/
meta_login/
manuallogin/
simpleLogin/
loginflat/
utility_login/
showlogin/
memlogin/
members/
login-redirect/
sub-login/
wp-login/
login1/
dir-login/
login_db/
xlogin/
smblogin/
customer_login/
UserLogin/
login-us/
acct_login/
admin_area/
bigadmin/
project-admins/
phppgadmin/
pureadmin/
sql-admin/
openvpnadmin/
wizmysqladmin/
vadmind/
ezsqliteadmin/
hpwebjetadmin/
newsadmin/
adminpro/
Lotus_Domino_Admin/
bbadmin/
vmailadmin/
ccp14admin/
irc-macadmin/
banneradmin/
sshadmin/
phpldapadmin/
macadmin/
administratoraccounts/
admin4_account/
admin4_colon/
radmind-1/
Super-Admin/
AdminTools/
cmsadmin/
phpSQLiteAdmin/
server_admin_small/
database_administration/
system_administration/
Update Imp. Dorks.
Dork : "inurl:dettaglio.php?id="

Exploit :
www.victim.com/sito/dettaglio.php?id=[SQL]

Example :
http://www.cicloposse.com/dettaglio.php?id=61'
----------------------------------------------------------------------------------------------------------------
Dork: inurl:prodotto.php?id)

Exploit: 
www.victim.com/prodotto.php?id=[SQL]

Example:http://www.poderimorini.com/en/prodotto.php?id=14'


sql injection dorks 

allinurl: \”index php go buy\”
allinurl: \”index.php?go=sell\”
allinurl: \”index php go linkdir\”
allinurl: \”index.php?go=resource_center\”
allinurl: \”resource_center.html\”
allinurl: \”index.php?go=properties\”
allinurl: \”index.php?go=register\”

Error message queries
“A syntax error has occurred”filetype:ihtml
Informix database errors, potentially containing function names, filenames, file structure information, pieces of SQL code and passwords
“Access denied for user” “Using password”
authorisation errors, potentially containing user names, function names, file structure information and pieces of SQL code
“The script whose uid is ” “is not allowed to access”

access-related PHP errors, potentially containing filenames, function names and file structure information

“ORA-00921: unexpected end of SQL command”
Oracle database errors, potentially containing filenames, function names and file structure information
“error found handling the request” cocoon filetype:xml
Cocoon errors, potentially containing Cocoon version information, filenames, function names and file structure information
“Invision Power Board Database Error”

Invision Power Board bulletin board errors, potentially containing function names, filenames, file structure information and piece of SQL code

“Warning: mysql _ query()” “invalid query”
MySQL database errors, potentially containing user names, function names, filenames and file structure information
“Error Message : Error loading required libraries.”

CGI script errors, potentially containing information about operating system and program versions, user names, filenames and file structure information

“#mysql dump” filetype:sql
MySQL database errors, potentially containing information about database structure and contents
Dork for locating passwords
http://*:*@www” site
passwords for site, stored as the string “http://username:password@www…”
filetype:bak inurl:”htaccess|passwd|shadow|ht users”
file backups, potentially containing user names and passwords
filetype:mdb inurl:”account|users|admin|admin istrators|passwd|password”
mdb files, potentially containing password information
intitle:”Index of” pwd.db
pwd.db files, potentially containing user names and encrypted passwords
inurl:admin inurl:backup intitle:index.of
directories whose names contain the words admin and backup
“Index of/” “Parent Directory” “WS _ FTP.ini”
filetype:ini WS _ FTP PWD
WS_FTP configuration files, potentially containing FTP server access passwords
ext:pwd inurl:(service|authors|administrators |users) “# -FrontPage-”
files containing Microsoft FrontPage passwords
filetype:sql (“passwd values ****” | “password values ****” | “pass values ****” )
files containing SQL code and passwords inserted into a database
intitle:index.of trillian.ini
configuration files for the Trillian IM
eggdrop filetype:user

user configuration files for the Eggdrop ircbot

filetype:conf slapd.conf
configuration files for OpenLDAP
inurl:”wvdial.conf” intext:”password”
configuration files for WV Dial
ext:ini eudora.ini
configuration files for the Eudora mail client
filetype:mdb inurl:users.mdb
Microsoft Access files, potentially containing user account information
Searching for personal data and confidential documents
filetype:xls inurl:”email.xls”
email.xls files, potentially containing contact information
“phone * * *” “address *” “e-mail” intitle: “curriculum vitae”
CVs
“not for distribution”

confidential documents containing the confidential clause

buddylist.blt
AIM contacts list
intitle:index.of mystuff.xml
Trillian IM contacts list
filetype:ctt “msn”
MSN contacts list
filetype:QDF

QDF database files for the Quicken financial application

intitle:index.of finances.xls
finances.xls files, potentially containing information on bank accounts, financial summaries and credit card numbers
intitle:”Index Of” -inurl:maillog maillog size
maillog files, potentially containing e-mail
Network Vulnerability Assessment Report”
“Host Vulnerability Summary Report”
filetype:pdf “Assessment Report”
“This file was generated by Nessus”

reports for network security scans, penetration tests etc
dork for locating network devices
“Copyright (c) Tektronix, Inc.” “printer status”
PhaserLink printers
inurl:”printer/main.html” intext:”settings”
Brother HL printers
intitle:”Dell Laser Printer” ews
Dell printers with EWS technology
intext:centreware inurl:status
Xerox Phaser 4500/6250/8200/8400 printers
inurl:hp/device/this.LCDispatcher
HP printers
intitle:liveapplet inurl:LvAppl
Canon Webview webcams
intitle:”EvoCam” inurl:”webcam.html”
Evocam webcams
inurl:”ViewerFrame?Mode=”

Panasonic Network Camera webcams

(intext:”MOBOTIX M1″ | intext:”MOBOTIX M10″) intext:”Open Menu” Shift-Reload
Mobotix webcams
inurl:indexFrame.shtml Axis
Axis webcams
intitle:”my webcamXP server!” inurl:”:8080″
webcams accessible via WebcamXP Server
allintitle:Brains, Corp.
camera webcams accessible via mmEye
intitle:”active webcam page”

Computer Forensic Tools And Tricks

Computer Forensic Tools And Tricks

                           

Sponsor Ad


To Find The USB Logs

Go to Run Then Enter Code _|
For window 7 
-->
C:\Windows\inf\setupapi.dev.log

For window Xp 
-->
C:\Windows\inf\setupapi.log 
For Ram Analysis

Open Source Tools from ForensicZone

Download Link

WhatsApp for Android update adds new group mute settings

WhatsApp for Android update adds new group mute settings

WhatsApp has released an update for Android (v2.11.230) that brings with it the highly requested group muting settings.

Anyone who has used WhatsApp groups would know how annoying some of them can get over time and there was no way to permanently mute them. The latest update, however, adds some new options that lets you mute a group beyond one week, all the way up to a century.
More importantly, WhatsApp has also added the ability to hide notifications as before, even if you muted a group, the phone would still show silent notifications. Now, if you uncheck ‘Show notifications’, the group would be totally silent.
Another change in the update is a camera icon next to the text input field in chats that lets you quickly take a photo and send to your contact, similar to Snapchat.
The update has not been pushed to the Play Store, yet, and you will have to go to the WhatsApp website (link below) to manually download and install the update.
Download •

‘The Amazing Spider-Man 2′ for iOS and Android game review

The Amazing Spider-M‘The Amazing Spider-Man 2′ for iOS and Android game review


Another superhero movie, another superhero movie tie-in game. We see these kind of games pop up quite frequently and rarely do they ever do justice to the movie, let alone to gaming. But people keep making them because, well, who doesn’t like money?


The previous The Amazing Spider-Man game for mobile was mediocre at best (to be honest, the movie wasn’t significantly better). This year, we have a sequel for the movie that promises to be bigger and better than the last one and like clockwork, there is a game that goes along with it. The Amazing Spider-Man 2 game is now out on iOS and Android and we decided to take a look at it, expectations set firmly to ‘Low’.

Gameplay

The Amazing Spider-Man 2 sees the return of our friendly neighborhood Spider-Man, solving crimes and taking out bad guys before bed time. The story of the game is of course based on that of the movie, with a few extra things thrown in for good measure.
The basic gameplay should be familiar to anyone who’s played the Batman Arkham series on PC or consoles. You enter a mission, which is usually saving someone or solving some crime, and then go to the locations marked on the map. There, you will usually face off against bad guys. The combat is similar to the Batman games, where you just mash one button to relentlessly hit the enemies. There is a button that you push whenever an enemy around you is about to attack (indicated by red markings above him) and you dish out a quick response. There is not a lot here to do other than keep hitting the attack button, which keeps the combat fairly simple and straightforward. Occasionally you will come across some boss fights, which are a combination of hitting the attack button mixed with some quick-time events. Again, fairly simple and straightforward affair.
Other than going around punching people, there is also a lot of web slinging to do in this game. This has always been the most fun part of Spider-Man games and that’s the case here as well. It doesn’t really make a lot of sense because you can just release a web mid-air and it will just stick to some invisible object in the sky and let you move around, but it is a lot of fun. Also, since it is Spider-Man we are talking about here, you don’t have to worry about falling because even if you do he lands safely on his feet like a cat.
Being Spider-Man also means you can stick to practically any surface. You can literally run up and down vertical surfaces like it’s no big deal or just stick to a wall with your back and admire the view.
To enhance his abilities, the game offers you these serums that you can use but unfortunately, they all cost in game currency and when you are out of those you have to pay real money. There are also extra suits here to unlock, which cost a LOT of money, more than the game itself, for that matter. As is usual for Gameloft games, there are a lot of IAPs here and they are priced far too high for anyone to take them seriously.
One absurd drawback with the game is that it does not work offline, so you need a constant internet connection to play. If you’re on a device without 3G, such as the iPad or the iPod touch, and out of Wi-Fi range, you can’t even start the game.

Graphics and Sound

The Amazing Spider-Man 2 features some sharp new graphics that are a significant improvement over the previous game. Things such as Spider-Man’s suit and the details in the buildings look great. The city itself is also quite big and there are plenty of places to explore. Only thing letting the visuals down are the spotty textures and some low resolution assets in places and an inconsistent framerate, even on something as powerful as the iPad Air. Other than that, the visuals are pretty good.
Sound-wise, you have to deal with the game’s less than spectacular voice acting and dialogue. The dialogs are all cheesy and Spider-Man’s wisecracks get tiring very quickly. The voice acting isn’t particularly great, either. Overall, nothing too impressive on the sound front.

Verdict

The Amazing Spider-Man 2 is a decent game in and of itself, even if you ignore the movie tie-in. There is a good amount of fun to be had here, particularly when you are swinging around the city, which is by far the most entertaining mode of transportation in any game. The rest of the gameplay is adequate, if not equally exciting. The visuals are good but the voice acting and dialogs aren’t. Overall, a decent game for the price but would be a better deal after it goes on sale.
Rating: 6.5/10
Pros: Web slinging is fun, simple and intuitive combat, attractive visuals
Cons: Framerate issues with occasional spotty textures, overpriced in-app purchases, tacky dialogs and voice acting, does not work without internet connection
Download: iOS | Android

Tuesday, 14 April 2015

Tutorial on Hacking With Kali Linux

Tutorial on Hacking With Kali Linux

Hacking With Kali Linux


Why Kali Linux?


With Kali Linux, hacking becomes much easier since you have all the tools (more than 300 pre-installed tools) you are probably ever gonna need. Others can be downloaded easily. Now this tutorial will get you started and you'll be hacking with Kali Linux before you know it.




The problem with beginners

Now, I've been dealing with beginners since a long time. What they want is magic. A tool which is easy to use, works on Windows, can be download by searching on Google and clicking on the first link we see, and will do all the hacking itself on the push of a button. Sadly, no such tool exists. Hacking is an art, and it takes years of practice to master it. So how to get started? Having no idea about hacking is okay, but being a newbie with computers in general is not allowed. When I say beginner, I mean someone who has no experience with programming and with hacking methodologies. I didn't mean someone who needs a 1 page guide on how to download a tool. If you want to be a hacker, you have to work hard. So how to get started? If you have installed Kali Linux,  click here to skip past the installation paragraphs and go to hacking section of this post)





Getting Started

Now, I am not boring you with theory (^ As if all this wasn't enough theory). My aim is to get you to the point where you can start hacking with Kali Linux as soon as possible. What I'm gonna do is tell you what to do. The process is rather simple :-


Things get tough now

If you have no previous experience with Linux and virtual machines and all that stuff, getting Kali Linux up and running won't be a piece of cake.You have 2 options :


1. Read the Kali official documentation

That will give you an idea about what is a virtual machine, how OS can be run from USB, and how to create a partition and run 2 OS simultaneously. This is what I recommend. For that, go to Kali Official Documentation . 

2. Read my modified version of Kali documentation

The second option is to look at these posts, which are just sparingly modified versions of the Kali docs, and offer no advantage other than saving your time as their documentations cover much more than what the ones here do, and you don't really need to know all so much... yet. I'm linking them up here:



    Command Line Interface

    Some bash commands
    Now, if you are really sure about becoming a hacker, you have to get used to linux, and specifically the command line interface. It is often compared to (and rightly so) to command prompt of Windows, but Linux' cli is much efficient and better than command prompt. What you have to do is do all the usual tasks you do in Windows in cli of Linux. Use cd to navigate, poweroff to shutdown, etc.
    A pretty awesome site for that is - http://linuxcommand.org/
    Going through the complete site is on its own enough exercise to keep you occupied for a month, but you can proceed gradually. The first few tutorials here will keep in mind that you don't have much info about cli, and will be really beginner friendly.



      Some Useful Commands:

      If you don't plan on learning all of linux cli commands, here are a few that will keep your boat afloat.
      1. The default username and password is 'root' and 'toor'. 
      2. Type 'poweroff' in the terminal to shutdown. 
      3. apt-get command can be used to install tools and updates. 
      4. apt-get update and apt-get upgrade will update all the programs installed on your machine. 
      5. apt-get dist-upgrade will install the latest distribution of Kali(i.e. it upgrades your OS).
      PS : Tapping <tab> while typing makes Kali complete the word for you . Double tapping <tab> makes it display all possible words starting with the incomplete word. Ctrl+c stops the functioning of any tool that is running. Pressing the up arrow key shows the command you last typed.


      Some Real Hacking With Kali Linux

      Assuming you've gone through the above steps and are comfortable with your new hacking environment, its time to do some real hacking with Kali Linux.My recommendation would be to start by hacking a wifi, then do some penetration testing, and maybe read something on Denial of Service when you have free time. Links here-

      Hack wireless networks in Kali Linux using aircrack 

      Penetration Testing In Kali For Beginners

      Denial Of Service Attacks


      HACK EMAIL-ID,USERNAME AND PASSWORD OR ANY USER DETAILS BY USING KALI LINUX.

      HACK EMAIL-ID,USERNAME AND PASSWORD OR ANY USER DETAILS BY USING KALI LINUX


      Facebook hack by nerd programmer

      Today,i am going to show you how you can get email-id,username and password or any user details you want by using KALI LINUX.

      STEPS FOR SETTING UP YOUR SYSTEM.

      1. Download Kali Linux from here.
      2. Extract the contents of Kali Linux iso file which you  downloaded in step and copy it to pendrive or instead of pendrive burn the iso file in cd if you want to make a cd of it.
      3. After copying all contents to pendrive or burning the iso file in cd,reboot you system,press F8 on boot-time and select boot from pendrive if you have copied all the files in pendrive,else boot from cd-rom if you burn the iso file in cd.
      4. After selecting the boot from device,the kali installation window will open,install accordingly as per your requirement.
      5. NOTE:During installation,in mount point of selected installation drive,set mount point to "/".
      6. Remember the username and password while installation as this will be necessity for this hacking method.
      7. Once,installation is completed,system will reboot,login your account.
      8. Your system is ready for use.
      Method which we are using to hack the username and password or any user details isSocial Engineering Toolkit method.


      NOW LETS SET IT UP.

      • Open terminal using ctrl+alt+t or click on the small black window image on the top left of your screen.
      • Once terminal is open,type the code carefully.
      sudo root
       Then enter your root username and password.Don't close the terminal.

      • Next step is to open social engineering toolkit.For this type the below command in terminal.
      se-toolkit

       You will see something in terminal of your system as shown below in the image.
        

      ymail hack by nerd programmer
      • As shown above in image,you too will see the menu in your terminal.Press "1" and hit enter as we are going to do Social-Engineering Attacks.You will see something in terminal as shown below in the image.
      facebook hack by nerd programmer
        gmail hack by nerd programmer
        • Once again,you will get a menu as shown above in the image.We are going to select Website Attack Vectors,so press "2" and hit enter.You will see something as shown in the image below.
        nerd programmer
        • In this method,we are going to get the credential of the victim,so press "3" and hit enter as it will select credential harvester attack method.This will open  new menu as shown below in the image.

        facebook hack by nerd programmer
        • Since,we want the username and password which is credential of victim,so we need to trap the victim in a look a like page to original website page(like phishing page) and for that we need to clone a website.To do this,press "2" and hit enter which will open something like shown below.
          ymail
        In above image,you might have noticed a red colour rectangle box made by me,in that box,you will find "tabnabbing:XXX.XX.XXX.X" where this "XXX.XX.XXX.X" is you computer IP address.To find IP address of your computer,open a new terminal and type the command given below.
        su root
        enter_your_root_password
         ifconfig
        In above command,we first gain the root access,and then afterwards type "ifconfig"  and hit enter to get the IP address.
        Copy paste this IP address at the end of "Tabnabbing:".I have used my IP address but for security reasons i can't reveal it,so i have posted here "XXX.XX.XXX.X".Please note that,if you don't put your computer IP address,they this method won't.After entering your IP address,hit enter.It will ask your to enter the url of website you want to clone as shown below.Here,i had entered "www.ymail.com" as i want to hack someone ymail account.The below image represents all the steps.
        It will give a message that its working on cloning the site and will take a little bit time.
        Once the process is completed,you will see something as shown in the image below.
        • The next step is the most important step,till now we have make your IP address go online and anyone who visit your IP address will see the page which will look like the website of whose url you entered to clone.In this step,you need to shortened your IP address by using services like ADF.LYBinboxGoo.gl,etc.Once you enter your ip address on these sites to shorten,they will provide you a link,all you need to do is just send this shortened link to your victim.
        • When the victim visit the url which you have sent them,the will see a same page of which                   url you had entered to clone the website.The victim will think that it is a original page and when the victim enters any of their information,you will see that information in the terminal.
        • In this example,i have used ymail.com.Therefore,the victim will see homepage of yahoo mail.This is only the login form,i have entered the login username as:"Kali used to hack email-id and password" andpassword as: "Hacking successfull".

        NOTE:VICTIM CAN IDENTIFY THAT THE PAGE IS A TRAP AS THE ADDRESS BAR OF BROWSER WILL BE HAVING YOUR IP ADDRESS.FOR BEST RESULTS,SEND THE SHORTENED URL TO VICTIM MOBILE AND ASK THEM TO VISIT URGENTLY,OR YOU CAN SAY VISIT THIS LINK AND LOGIN TO GET LATEST UPDATES OF THEIR FAVOURITE CONTENTS,ETC.

        RESULT.

        The username and password will be shown in terminal window and will be similar to the image shown below.