-->

ABOUT US

Our development agency is committed to providing you the best service.

OUR TEAM

The awesome people behind our brand ... and their life motto.

  • Kumar Atul Jaiswal

    Ethical Hacker

    Hacking is a Speed of Innovation And Technology with Romance.

  • Kumar Atul Jaiswal

    CEO Of Hacking Truth

    Loopholes are every major Security,Just need to Understand it well.

  • Kumar Atul Jaiswal

    Web Developer

    Techonology is the best way to Change Everything, like Mindset Goal.

OUR SKILLS

We pride ourselves with strong, flexible and top notch skills.

Marketing

Development 90%
Design 80%
Marketing 70%

Websites

Development 90%
Design 80%
Marketing 70%

PR

Development 90%
Design 80%
Marketing 70%

ACHIEVEMENTS

We help our clients integrate, analyze, and use their data to improve their business.

150

GREAT PROJECTS

300

HAPPY CLIENTS

650

COFFEES DRUNK

1568

FACEBOOK LIKES

STRATEGY & CREATIVITY

Phasellus iaculis dolor nec urna nullam. Vivamus mattis blandit porttitor nullam.

PORTFOLIO

We pride ourselves on bringing a fresh perspective and effective marketing to each project.

Showing posts with label hacking. Show all posts
Showing posts with label hacking. Show all posts
  • IMSI catcher to track cell phones

                 IMEI  AND  IMSI  NUMBER


    To Check IMEI Number On Your Smart Phone

    *#06#

    IMEI

    International Mobile Equipment Identity

    The International Mobile Equipment Identity or IMEI is a number, usually unique, to identify
    3GPP and iDEN mobile phones, as well as some satellite phones.
    It is usually found printed inside the battery compartment of the phone, but can also be displayed
    on-screen on most phones by entering *#06# on the dialpad, or alongside other system information
    in the settings menu on smartphone operating systems.


    GSM networks use the IMEI number to identify valid devices, and can stop a stolen phone
    from accessing the network. For example, if a mobile phone is stolen, the owner can
    have their network provider use the IMEI number to blacklist the phone.
    This renders the phone useless on that network and sometimes other networks, even if the
    thief changes the phone's subscriber identity module (SIM).


    The IMEI only identifies the device and has no particular relationship to the subscriber.
     The phone identifies the subscriber by transmitting the International mobile subscriber
    identity (IMSI) number, which it stores on a SIM card that can, in theory, be transferred
    to any handset. However, the network's ability to know a subscriber's current, individual device

    enables many network and security features.


    When someone has their mobile equipment stolen or lost, they can ask their service provider
    to block the phone from their network, and the operator does so if required by law.
    If the local operator maintains an Equipment Identity Register (EIR), it adds the
    device IMEI to it. Optionally, it also adds the IMEI to shared registries, such as the
    Central Equipment Identity Register (CEIR), which blacklists the device with other operators
    that use the CEIR. This blacklisting makes the device unusable on any operator that uses the CEIR,

    which makes mobile equipment theft pointless, except for parts.


    IMSI 

    Internation Mobile Subscriber Identity






    The international mobile subscriber identity or IMSI is used to identify the user of a
    cellular network and is a unique identification associated with all cellular networks.
    It is stored as a 64 bit field and is sent by the phone to the network. It is also used
    for acquiring other details of the mobile in the home location register (HLR) or as locally
    copied in the visitor location register. To prevent eavesdroppers identifying and tracking
    the subscriber on the radio interface, the IMSI is sent as rarely as possible and a randomly
    generated TMSI is sent instead.


    The IMSI is used in any mobile network that interconnects with other networks. For GSM,
    UMTS and LTE networks, this number was provisioned in the SIM card and for cdmaOne and CDMA2000
    networks, in the phone directly or in the R-UIM card (the CDMA equivalent of the SIM card).
    Both cards have been superseded by the UICC.


    An IMSI is usually presented as a 15 digit number but can be shorter.
    For example, MTN South Africa's old IMSIs that are still being used in the market are
    shown as 14 digits. The first 3 digits are the mobile country code (MCC), which are
    followed by the mobile network code (MNC), either 2 digits (European standard) or 3 digits
    (North American standard). The length of the MNC depends on the value of the MCC, and
    it is recommended that the length is uniform within a MCC area. The remaining digits
    are the mobile subscription identification number (MSIN) within the network's customer

    base (mostly 10 or 9 digits depending on the MNC length).


    Example of IMSI numeric presentation


    IMSI:4041501234567890
    MCC404INDIA
    MNC150JIO
    MSIN1234567890

    IMSI:310150123456789
    MCC310USA
    MNC150AT&T Mobility
    MSIN123456789

    IMSI:502130123456789
    MCC502MY
    MNC13Celcom
    MSIN123456789

    IMSI:460001357924680
    MCC460CHINA
    MNC00CMCC
    MSIN1357924680

    IMSI:520031234567890
    MCC520THAILAND
    MNC03AIS
    MSIN1234567890

    IMSI:470010171566423
    MCC470Bangladesh
    MNC01Grameenphone
    MSIN0171566423




    MCC   Mobile Country Code 
    MNC   Mobile Network Code 
    MSIN  Mobile Subscriber Identification Number




    IMSI analysis is the process of examining a subscriber's IMSI to identify the network
    the IMSI belongs to, and whether subscribers from that network may use a given network
    (if they are not local subscribers, this requires a roaming agreement).

    If the subscriber is not from the provider's network, the IMSI must be converted to a
    Global Title, which can then be used for accessing the subscriber's data in the remote
    HLR. This is mainly important for international mobile roaming. Outside North America,
    the IMSI is converted to the Mobile Global Title (MGT) format, standard E.214,
    which is similar to an E.164 number. E.214 provides a method to convert the IMSI
    into a number that can be used for routing to international SS7 switches. E.214 can
    be interpreted as implying that there are two separate stages of conversion; first
    determine the MCC and convert to E.164 country calling code then determine MNC and
    convert to national network code for the carrier's network. But this process
    is not used in practice and the GSM numbering authority has clearly stated that
    a one-stage process is used.




    Have a Nice Stay Here :)

  • सावधान! WhatsApp पर इन मैसेज को इग्नोर करें, नहीं तो जाओगे..


    नई दिल्ली। सावधान! WhatsApp पर इन दिनों को ऐसे मैसेज भेजे जा रहे हैं जिन क्लिक करके आपसे कुछ सूचनाएं भरने को कहा जाएगा। आपकों इन मैसेज को इग्नोर करना चाहिए। नहीं तो आप ठगे जाओगे।

    बता दें कि दुनिया के एक अरब से भी ज्यादा लोग वॉट्सऐप का इस्तेमाल करते हैं। अगर आप इस पर आने वाले मैसेज पर ध्यान नहीं दिया और क्लिक किया तो ये आपके लिए नुकसानदायी साबित हो सकते हैं। 



    लुभावने ऑफर
    आपको भी जरूर ऐसे मैसेज आए होंगे, जिनमें आपको कहा जाता है कि रिलायंस जियो फ्री में रिचार्ज दे रहा है या फिर प्रधानमंत्री नरेंद्र मोदी बेटियों को 10 हजार रुपये का चेक देने वाले हैं।

    अगर आप इन मैसेज को ध्यान से देखेंगे, तो इनका नाम और URL असली जैसा दिखता है, लेक‍िन ऐसा होता नहीं है। इनमें शब्दों की गलतियां बहुत ज्यादा होती हैं। जब आप इनके साथ दी गई लिंक पर जाते हैं, तो आपकी निजी डिटेल मांगी जाती है। आपको इस तरह कहीं भी डिटेल देने से बचना चाहिए।



    वॉट्सऐप गोल्ड
    कुछ वॉट्सऐप यूजर्स को एक मैसेज आ रहा है. इसमें आपको 'वॉट्सऐप गोल्ड' को डाउनलोड करने के लिए कहा जाता है. इसमें बताया जाता है कि इस ऐप्ल‍िकेशन में आपको से‍लेब्रिटीज के जैसे ही एक्सक्लूसिव सुविधाएं मिलेंगी। लेक‍िन ऐसा नहीं है। Mirror.co.uk की मानें तो यह एक मलवेयर है। जब आप मैसेज में आई इस लिंक पर क्ल‍िक करते हैं, तो आप एक नये पेज पर जाते हैं। जहां जाते ही आपका एंड्रॉइड डिवाइस इंफेक्टेड हो जाता है।




    4 of 4

    सावधान! WHATSAPP पर इन मैसेज को इग्नोर करें, नहीं तो जाओगे..

     
    व्हाट्सऐप की तरफ से वॉइसमेलकुछ लोगों को ऐसे मैसेज भी आ रहे हैं. जिसमें एक वॉइस रिकॉर्ड‍िंग होती है. वॉइस रिकॉर्ड‍िंग के साथ मैसेज होता है कि यह वॉट्सऐप की तरफ से भेजा गया है. लेकिन जैसे ही आप प्ले बटन पर क्ल‍िक करते हैं, तो यह आपके मोबाइल में मलवेयर इंस्टॉल करने की कोश‍िश करता है।
    दोस्तों की जासूसी करो
    क्या आपको कभी ऐसा लगता है कि आप अपने दोस्त या किसी और के वॉट्सऐप मैसेज पढ़ सकें? अगर हां, तो आप 'वॉट्सऐप स्पाई ऐप' का श‍िकार बन सकते हैं. वॉट्सऐप स्पाई ऐप के नाम से आने वाले इस मैसेज में दावा किया जाता है कि आप इसके जरिये अपने दोस्तों के मैसेज पढ़ सकते हैं.
    लेकिन ऐसा होने की बजाय इस लिंक पर क्ल‍िक करने से आपके मोबाइल में मलवेयर आ सकता है। वॉट्सऐप ने अभी तक कोई ऐसा ऐप या सिस्टम नहीं बनाया, जिसके जरिये आप दूसरों के मैसेज को पढ़ सकें।

    वॉट्सऐप पर पीडीएफ

    आपको एक मैसेज आता है। इसमें एक पीडीएफ फाइल होती है, जिसका नाम भी कुछ ऐसे होगा कि आपको इसे खोलने पर मजबूर करेगा। लेक‍िन जैसे ही आप इस पर क्ल‍िक करेंगे। ये आपके मोबाइल को नुकसान पहुंचा सकता है। दुबई साइबर पुलिस ने इस संबंध में अपने नागर‍िकों को अलर्ट किया है। उसने वॉट्सऐप पर आ रही ऐसी फाइल को ओपन न करने की हिदायत दी है।


    वॉट्सऐप क्या कहता है?वॉट्सऐप अपने ऑफ‍िश‍ियल ब्लॉग में कहता है कि आपको वॉट्सऐप के नाम से आने वाले ऐसे फेक मैसेजेस से बचना चाहिए, क्योंकि वह कभी भी ऐसे मैसेज नहीं भेजता है। वॉट्सऐप के मुताबिक ऐसे मैसेज जिनमें कोई वॉट्सऐप का पार्टनर होने का दावा करता है, जिन मैसेज में फॉरवर्ड करने के निर्देश रहते हैं और जिन मैसेज में रिवॉर्ड और गिफ्ट मिलने की बात कही गई होती है। ये सब फर्जी हैं। आपको इनसे बचने की जरूरत है।



  • How to hack facebook via Termux








    How To Hack Facebook Via Termux

    Hello guys, This is Kumar Atul jaiswal and you are watching my YouTube channel, Oh sorry you are watching my blog. This video was uploaded to YouTube on 1st and half months ago.

    This video has been deleted by YouTube, so I keep uploading this video to my blog keeping in mind the needs of all of you.

    (This video is Only For Educational purpose)

    ( यह वीडियो पहली और आधे महीने पहले यूट्यूब पर अपलोड किया गया था इस वीडियो को यूट्यूब ने डिलीट कर दिया है इसीलिए मै आप सभी की जरूरत को ध्यान में रख कर इस वीडियो को अपने ब्लॉग में अपलोड कर रहा हु)

    *Root Not Required 


    You have to use 2 GitHub script here.
    1) Port forwarding
    2) Weeman

    Port forwarding Video








    What is phishing ?


    A phishing is a fraud to attempt to obtain sensitive information like username, password, credit, debit card, Bank information, Bank account numbers etc. details by disguising oneself as a trustworthy entity in an electronic communication. Typically carried out by email spoofing or instant messaging, it often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site. Phishing is an example of social engineering technique being used to deceive users. shellphish apk shellphish tutorial


    The way phishing works is that an attacker clones a trusted website or spoofs an email of a known target which leads the person to believe that he is visiting a trusted website like social media sites, e.g.,  shellphish github termux Facebook, SnapChat, Instagram, Google, Netflix, and so on. The target will then put his/her username and password on the malicious website (cloned website) and then the username and password will be sent to the attacker instead of the real website, and the target will be redirected to the real website. Let’s do a demo of phishing using shellphish. shellphish github download


    Social Engineering 


    Social engineering is a very interesting subject to think about, in this context, it is basically using the victim’s familiarity and habits against them. Human beings are creatures of habit, we are so used to certain things in our life that when faced with them, we don’t think twice before acting on them.


    As an example; we are aware that there are a lot of attempts to by hackers to compromise social media accounts, so if one receives an email from your preferred social media site that there was an attempt to break into your account or an email to review your accounts security settings, most people will click on the link and log into their account to check what’s going on. A hacker will use this against a victim, all they need to do is swap a real link with a malicious one. Shellphish is probably one of the easiest ways to generate that malicious link. Let’s have a look. 





    Requirements :

    • Kali Linux or Termux ( in android )
    • Serveo.net
    • ngrok 

    Features :


    Port Forwarding using Ngrok or serveo.net
    shellphish tutorial

    • How to install Shellphish ?

    step 1 : - apt-get update
    step 2 : - apt-get upgrade




    Full Tutorial :- Click Here











  • WHAT WE DO

    We've been developing corporate tailored services for clients for 30 years.

    CONTACT US

    For enquiries you can contact us in several different ways. Contact details are below.

    Hacking Truth.in

    • Street :Road Street 00
    • Person :Person
    • Phone :+045 123 755 755
    • Country :POLAND
    • Email :contact@heaven.com

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation.