Latest Videos

Opencart Warranty free tips


How to Add warranty option without any extension in your opencart shop.





Steps:

goto shop backend

  1. goto to Catalog -- options
  2. create an option named warranty with SELECT parameters .
  3. in Catalog goto PRODUCTS -- select a product, 
  4. in product click OPTION
  5. in OPTION select the "warranty" option you already created. 
  6. Give your required parameters and ENJOY


A TV Interview with KhanzTuto

This is an unofficial from a TV interview with KhanzTuto founder khAn

https://www.youtube.com/playlist?list=PLpk0dZU2uuEG59gkT_zKIDRjvZ18hLr_U

copyrights reserved khanztuto.blogspot.com

WiFi-Phisher Hack a WiFi by a New method called



A new Attack for Wi-Fi has been released called Wifiphisher.
This attack is a play on old tricks using a Man-in-the-Middle and phishing attack.

It works by selecting a target router then kicking their connection which forces them to connect to you instead of their router.

When they do they are asked for their Wi-Fi username and password to upgrade the firmware of the router.
After they enter their password it is displayed to your screen. Once you have the password, they are allowed to automatically reconnect to their router and move on.
They have the attack listed as the following steps.

 From the victim’s perspective, the attack makes use in three phases:
1…..Victim is being deauthenticated from her access point. Wifiphisher continuously jams all of the target access point’s wifi devices within range by sending deauth packets to the client from the access point, to the access point from the client, and to the broadcast address as well.

2…..Victim joins a rogue access point. Wifiphisher sniffs the area and copies the target access point’s settings. It then creates a rogue wireless access point that is modeled on the target. It also sets up a NAT/DHCP server and forwards the right ports. Consequently, because of the jamming, clients will start connecting to the rogue access point. After this phase, the victim is MiTMed.

3…..Victim is being served a realistic router config-looking page. wifiphisher employs a minimal web server that responds to HTTP & HTTPS requests. As soon as the victim requests a page from the Internet, wifiphisher will respond with a realistic fake page that asks for credentials, for example one that asks WPA password confirmation due to a router firmware upgrade.

 It runs from Kali Linux and needs two wireless cards one that the victim can connect to and another to kick their connection with the Deauth command which requires a Kali Linux compatible adapter to do. I chooseTP_link wireless USB adapter which is available on Flipkart

This is a tool that I am going to play with on my test routers and see how well it works.

To install wifiphisher, open a terminal window and enter the following command.
git clone https://github.com/kalimkhan/Wifi-Phisher


Download Wifi Phisher : https://www.facebook.com/groups/maskmaster.pk/10153243260163123/
To run it type:
cd wifiphisher
sudo python ./wifiphisher.py

Here is the Github home page for wifiphisher. https://github.com/kalimkhan/Wifi-Phisher
click here to download wifiphisher
video tutorial

Windows 8.1 Preview,Windows 7, Windows 7 Admin Password hacking in english

Windows 7, 8 and 8.1 Drives and folders security



Post by Khanz Tuto.



Facebook link Click here

How to Take Data From PC Using A USB





NOTE: ( This video is for education purposes. Please don't use it against cyber laws )

Security Test [ PC by Using A USB ]

Today we are going to do a remote hacking using a malicious file created in Backtrack,All then you will have to do is Plug in the USB,wait for 5 seconds,and plug it out,Then you will have control over the victim PC.This trick created a Mass Panic in Pentagon as it haackked most of their PC.Haaackkk PC's on your School or University and have Fun.
Don't Abuse this Trick.You are responsible for your actions.

What Do We Need ?

#Backtrack 5
#Vulnerable Software On Victim PC,(read below)
#Physical Access For 10 Seconds.
#Patience and Brains.








Creating The Malicious Batch File :


#Step 1 -

Open Backtrack,Go to The Social Engineering Toolkit by entering the below commands in Konsole :
cd /pentest/exploits/set
./set

#Step 2 -

Select the Social-Engineering Attacks by entering 1.







#Step 3 -

Select Infectious Media Generator by selecting inserting 3,This option will help you create an autorun.nf file that will hack the vulnerable software.

#Step 4 -

Select 1st option,This will help you to select a specific software to exploit.

#Step 5 -

Now a list comes up with name of software's to exploit,this is the real deal.Now select the software you know is running on Victim Machine/'s,Adobe Reader and Microsoft Word is the most common software's used in school,so i will select option 11.








#Step 6 -

Now you have two options,Get a pc-generated blank pdf file or create your own,We'll select to create our own file,Now enter the path to pdf file  as /home/exam-sheet.pdf .The file name as exam-sheet.pdf 
(EVIL LAUGH,Cause i'm going to attack school) you can set another file name.

#Step 7 -

Now select option 2 for windows/meterpreter/reverse_tcp.

#Step 8 -

Now you need to insert the IP Address for listener,Listener is another term for attacker,Insert your Public IP address (or internal IP address if you are hacking a PC on your LAN),and port as 80,then Press enter.

#Step 9 -

Here we need to edit the autorun.inf  file. Go to the directory of autorun where our both files : payload file & autorun file are located.
follow the following steps to edit & rename our files :
#open new terminal and type :
            ls -al /pentest/exploits/set/autorun/ 
we can see two files here one is autorun file and other is template.
#Now go to the directory:
         cd /pentest/exploits/set/autorun
.#Type "nano autorun.inf" (it will open a nano editor for editing autorun.inf file.Here give the name of your file which you want to open by plugin the USB here.For me,i Insert the name exam-sheet.pdf)
#Copy these both files on the USB drive.

#Step 10 -

Keep the attacker computer running,and when you will plug-in the USB drive in your victim PC,you will have a meterpereter season opened on your (attacker) Computer.Now you can steal files,commence a remote shutdown and much more.
You done .... 


Side Tip : Disable the antivirus on the victim pc if you get the chance,that will ease things up a little bit.

Learn Python in Pashto with khAn (+playlist)





CSS Forms Styling


On YOutube 
Forms Styling in Pashto With khAn 
HTML5 CSS3 Video Tag And Forms Styling in Pashto 
With khAn 

On Facebook

Content Management Systems

Top 10 content management systems



Most Popular Click here
Top 10 click here

Books & Handouts





My E-books

  1. Advance Computer Diploma /Introduction To Information Technology   (by: khAn)  Download
  2. Hypertext Markup Language Step By Step     (by: khAn)                                        Download
  3. MS Access Step By Step  (by: khAn)                                                                     Download
  4. Operating Systems (Ebook by: khAn)                                                                     Download
  5. Introduction To Database (Ebook by: khAn)                                                           Download
  6. Data Commutation And Networking (Ebook by: khAn)                                           Download
  7. Computer Graphics (Ebook by: khAn)                                                                    Download

How to make a Bootable USB




How to make a bootable USB.
watch video