Anonymous voice changer. how it works.

Image
Hello, Guys am sure you have wondered what kinda voice do the  Anonymous uses when broadcasting on air, and you may have also tried your hands to download some of the voice changers applications, which resemble with real anonymous voice, and today will show you the exact voice changing machine that actual anonymous hackers use today. The Anonymous voice changer download link;  here Use the key below to Activate it. Register Name: www.serials.ws Register Company name: www.serials.ws The Registerd Lisence key: AA-15F01A-9719E1-EC031E-4C97F2-65ACA8 PLEAS TAKE Note: I Don't Make Any Copyright Infringements.

Hacking Facebook Using Social Engineering Toolkit in Kali linux

we are going to make use of Kali Linux, and the tool call SET (Social Engineering Toolkit). to hack any account that we like. so let get started now.

The  ‘toolkit’ options we are going used 
 step 1 Social Engineering Attacks
 step 2 Website Attack Vectors
step  3 Credential Harvester Attack Method
step  4 Web Templates
step  5 Input the IP address
step 6 Choose facebook



First things first power on your Kali Linux machine and open up a  terminal and type in "setoolkit" and you will be shown a welcome screen and attack options to pick from. and we will pick number one coz we are performing social engineering.



the next step is for us to click on the website attack options by typing in 2




thirdly we select options 3 which is credential harvester attack method.




now we will choose a web site template of the website we want to attack which is Facebook




 after which  then we have to set an attacker
IP address which is our system. to check for ur IP address type in "ifconfig" in your terminal.




finally, we select Facebook and hit enter
now was your link is created just send it to ur friend on this same network as your system.

once the victims start inputting his or her details, it will appear in ur terminal.



This for educational purposes only. I did not send you to do harm to anyone o.

#cybersecurity #hacking #security #technology #hacker #infosec #tech #ethicalhacking #programming #linux #hackers #cyber #kalilinux #cybercrime #malware #python #privacy #it #iot #cyberattack #coding #dataprotection #hack #ethicalhacker #networking #informationsecurity #cybersecurityawareness #programmer #datasecurity #bhfyp #nasvera #cyber #blog

Comments

Popular posts from this blog

INSTALLING VISUAL PARADIGM ON KALI LINUX

Things you need to Know About Nigeria’s Cybercrime Act 2015