SERVFORU

Latest Post
Showing posts with label Password. Show all posts
Showing posts with label Password. Show all posts

Reset Android Smartphone Pattern/Password/Pin lock

It sucks when you forget your passwords But Gmail account can save you. But what for those who don't have it? 
There are some methods to reset them
Wiping data being most popular 
But, why loosing precious data when there is a easier or easiest to do method 

This is a new method found and tested by me on a rooted device but the resources it uses are available to be used without root too, so it may work on unrooted devices too. 


This method uses Aroma File Manager by amarullz in Recovery Mode of the device to delete the password database related files. So, it should work on all devices! 


So, first you need to download AROMA FILE MANAGER from here 


Instructions:-


1. Download Aroma File Manager.
2. Place it in the root of your sdcard(Preferred)
3. Reboot into recovery
4. For CWM:



Mount all partitions (including sd-ext if you have it)

And flash Aroma File Manager from sdcard

For stock recovery(Samsung e3):


In stock recovery, there is no option to mount partitions, so

Flash Aroma File Manager, Click on menu option and go to settings

Select Mount All Partitions

Now, exit from Aroma File Manager and reflash it.

Now, you will see each partition is mounted


5. Now, go to /data/system

Note : If you have sd-ext mod to increase internal storage, go to /sd-ext/system/


6. Now, If you have to remove pattern lock, long press and delete gesture.key

If you want to remove password, delete password.key
7. Exit the Aroma File Manager
8. Reboot 



 

Encode your secret messages in Your Facebook Pics

Facebook is a place where you can share pictures of cute animals and fun activities. Now there’s a browser extension that lets you encode those images with secret, hard-to-detect messages.  With the extension, anyone — you, your sister, a terrorist — could share messages hidden in JPEG images uploaded to Facebook without the prying eyes of the company, the government or anyone else noticing or figuring out what the messages say. The only way to unlock them is through a password you create.

The goal of this research was to demonstrate that JPEG steganography can be performed on social media where it has previously been impossible,” Campbell-Moore tells Danger Room. He says he spent about two months spread out over the last year working on the extension as a research project for the university.


The extension is only available for the Google Chrome browser — Campbell-Moore cites its developer tools and popularity — and the messages are restricted to 140 characters. Less certain is what Facebook thinks; a spokesman declined to comment. But it’s still the first time anyone’s managed to figure out how to automate digital steganography — the practice of concealing messages inside computer files — through Facebook, the world’s biggest social media platform. Unlike cryptography, which uses ciphertext to encrypt messages, steganographic messages are simply hidden where no one would think to look.


How to do 

1.Go the link  secret book chrome store



2.Click add to chrome



Quickstart

Refresh Facebook. Press ctrl+alt+a while on Facebook to encode a message. Press ctrl+alt+a while looking at a photo to decode a message.

Creating a new secret message

If you've just installed Secretbook then please refresh Facebook before trying to use this extension.
  1. Securely share a password with the friend you wish to communicate secretly with.
  2. While on Facebook press ctrl+alt+a to activate the secret system.
  3. Use the dialogue to create an image. Upload this new image to any album on Facebook or post it on your friend's wall.
    • Note that sending secret messages via messaging is not yet implemented
  4. Attempt to receive the message from the image you just uploaded in case an error occurred!
  5. Optional: Mention your friend in a comment or the description to ensure they know to check it for a message.
Your friend can now use the password you shared to decode the message.

Receiving a secret message

  1. While looking at an image on Facebook press ctrl+alt+a to activate the secret system.
  2. Enter your shared password to receive the secret message.

Secretbook has to be subtle. It uses Google Chrome’s web extension platform, since Facebook’s in-house apps publicly list their users — which would defeat the purpose of a secrecy tool. Since the extension runs through a web browser without a server connection, the users can’t be detected by network analysis. It’s also hard for Facebook to block or remove permissions, as the extension doesn’t rely on a Facebook API key.


 

Remove the mask of passwords in any browser

If we use autofill settings there is a chance to forgot the password , your browser will always block the password box from passersby seeing it by using asterisks. To remove the mask and reveal your password, you just need to do a few things.


Follow the steps:



1. Right-click the password box and select "Inspect Element."This brings up the developer console

2.. On the line that starts with "input type=password

3. Right click and select Edit HTML

4. change the word "password" to "text" ( type="password"  to type="text")


 

Reset User Password on Linux Mint & Ubuntu

if u forget the user password just  do the following steps


1. boot your computer while you press and hold “Shift” key
2. Select Ubuntu or Linux Mint blablabla  (recovery mode)

3. In the recovery menu select “root”
4. when the promt appears type:

 

mount -rw -o remount /

passwd “username”

 

where “username” is the username of the user that you don’t know the password
Now type a new password twice and you are done!
 

Howto: Sniff or Hack someone’s username and password over an SSL encrypted connection with Ubuntu Linux

Do you think you're safe if you type https :// before gmail.com or paypal.com? I hope you'll think twice before you login from a computer connected to a wireless network after reading this guide. Let's start at the beginning. Let's say you have an evil neighbour who wants your paypal credentials. He buys himself a nice laptop with a wireless card and, if you are using a wep encryption, he cracks your wep code (click here to see how). After cracking the key he logs into your network. Maybe you always allowed him to use your network because you thought it can't do any harm to your computer. You aren't sharing any folders so what's the problem? Well, in the next few steps I'm going to describe the problem.

Guide

1. Let's assume your neighbour uses linux to crack your wep key. After cracking it, he installs ettercap (http://ettercap.sourceforge.net/) on his linux system. If you want to do this at home, I would recommend you to download BackTrack because it already has everything installed. If you want to install it on your own linux distribution, download the source and install it with the following commands:


$ tar -xzvf ettercap-version.tar.gz

$ make

$ make install

To install in Ubuntu simply click here within firefox or:
sudo apt-get install ettercap-gtk


2. After installing, you need to uncomment some code to enable SSL dissection. Open up a terminal window and type “nano /usr/local/etc/etter.conf”, without the quotes. Scroll down using your arrow keys until you find this piece of code:

if you use iptables:

# redir_command_on = “iptables -t nat -A PREROUTING -i %iface -p tcp -dport %port -j REDIRECT -to-port %rport”

# redir_command_off = “iptables -t nat -D PREROUTING -i %iface -p tcp -dport %port -j REDIRECT -to-port %rport”

You need to uncomment the last two lines.


redir_command_on = “iptables -t nat -A PREROUTING -i %iface -p tcp -dport %port -j REDIRECT -to-port %rport”

redir_command_off = “iptables -t nat -D PREROUTING -i %iface -p tcp -dport %port -j REDIRECT -to-port %rport”


3. Press CTRL+O, press enter to safe the file and then press CTRL+X.

4. Start Ettercap and click on Sniff > Unified Sniffing > type in your wireless interface and press ok.

5. Press CTRL+S to scan for hosts

6. Go to MITM > ARP poisoning, select sniff remote connections and press ok.

7. Now you (and your neighbour!) can start sniffing! Press start > start sniffing. Walk to another computer on your network and open up paypal or any other site where you need to type in an username/password (gmail, hotmail, digg.com, etc.). All credentials will appear on the computer running Ettercap!

8. When you're done, don't just close Ettercap, but go to Start > Stop Sniffing, and then go to MITM > Stop mitm attack(s).

But how does all this stuff work?

Look at the following scheme:

Normally when you type in a password, host 1 (your computer) directly connects to host 2 (your modem or router). But if someone launced Ettercap on your network, host 1 isn't sending it's passwords to host 2, but to the Attacking host, the host that's running Ettercap! The attacking host sends everything to Host 2. This means that host 1 isn't noticing anything! Exactly the same happens with everything that host 2 is sending. Host 2 doesn't send packets directly to host 1, but forst to the attacking host.
 
 
Support : Ebin EPhrem | Ebin Ephrem | #Gabbarism
Copyright © 2011. Services | Embedded Support | Reviews | Virtual Technologys - All Rights Reserved
Template Created by ebinephrem.com Published by Ebin Ephrem
Proudly powered by Blogger