How To Jailbreak Your iOS 8.x Devices

What Is Jailbreak ?

For those of you who don’t know what jailbreak-ing is, It’s similar to ‘Rooting your android smartphone’ by which you gain super user access into the operating system.

According to Wikipedia:
Jailbreaking is the process of removing hardware restrictions on iOS, Apple’s operating system, on devices running it through the use of software and hardware exploits; such devices include the iPhone, iPod touch, iPad, and second-generation Apple TV. Jailbreaking permits root access to the iOS file system and manager, allowing the download of additional applications, extensions, and themes that are unavailable through the official Apple App Store.


Jailbreaking is a form of privilege escalation, and the term has been used to describe privilege escalation on devices by other manufacturers as well. The name refers to breaking the device out of its “jail”, which is a technical term used in Unix-style systems, for example in the term “FreeBSD jail”. A jailbroken iPhone, iPod touch, or iPad running iOS can still use the App Store, iTunes, and other normal functions, such as making telephone calls.

Why You Should Jailbreak ?

There are many compelling reasons which could lead one to jailbreak his/her device, some of which are summarized below:

  • Device customization.
  • Use of handset on multiple carriers.
  • Early exploit fixes.
  • Use of apps unapproved by Apple.

Difficulty :-

Apple is constantly pushing updates trying to fix the vulnerabilities which leads the developers to jailbreak their device. The latest being the iOS 8.4 updates which along with ‘Apple Music’ also patched previously found vulnerability but nonetheless ‘The Taig Developer Team’ has again found a way to get past it.

How To Jailbreak?

Jailbreaking is a fairly simple process, just follow the simple steps given below and you will have your jailbroken device up and running within 20 Minutes.


  • Next you have to restore your iDevice to the latest iOS version (iOS 8.4 for now) using iTunes from scratch. Don’t use OVER THE AIR update as it doesn’t have the reputation to go well with jailbreaking tools.


  • Disable Find My iPhone on your iOS device. Navigate to Settings > iCloud > Find My iPhone and turn off the ‘Find My iPhone’ toggle. You’ll be required to enter your Apple ID password to confirm.


  • Turn-Off Passcode and Touch-Id unlock.


  • Now fire up the tool you downloaded in Step 1 and connect your iDevice.


  • The tool will now identify your device. Once it’s done, simply click on the ‘Start’ button to kick off the jailbreak process. Make sure you uncheck the ‘3K Assistant’ box before you begin.


  • Couple of minutes later your iDevice will reboot and the ‘Cydia’ icon will be on your Home Screen confirming that your device is jailbroken successfully.

**Now you can turn-on ‘Find My iPhone’ and ‘Touch-Id’ you disabled earlier.

If you struggle with any of the above steps you can refer to this awesome video i found on Youtube:

Conclusion :-

Jailbreaking your device can be awesome but it does come with some down-low’s like stability issues and voiding the warranty. So be hundred percent sure before you jailbreak your device. Ciao..

Extract E-mails From A Website

Let’s say you want to extract e-mails from a website, legitimate or legal reason could be that you want e-mail addresses of persons from a website who you want to contact from a website.

There could be illegal uses also like if someone wants to hack the site he can extract all e-mails from the domain and try to hack these e-mail id’s to create a gateway into the site.


Extract E-mails From A Website


How To Extract E-mails From A Website :-

Requirements :-

  • A linux distribution preferably ‘Kali Linux‘.

The Process :-

We will be extracting e-mails with the help of  a module in the Metasploit Framework, Search Engine Domain Email Address Collector’. This module will use the top three search engines Google, Bing and Yahoo to create a list of e-mails from a domain.

So Let’s Get To It :-

  • Fire up the terminal and start up metasploit by typing : msfconsole.
  • Now let’s search the module by typing ‘search collector‘.
  • Type ‘use auxiliary/gather/search_email_collector to use the auxiliary’.
  • In this step we are going to set the target domain to use, type ‘set domain
  • Almost done now, just type ‘exploit‘ and e-mail addresses will start to show up.

That was all you needed to do to extract emails from a website. Enjoy..!!

Related :- Use A Single E-mail For Multiple Accounts On A Website

Top 50 Hacking Tools That You Must Have

Whether you are a Penetration tester, a hacker or an aspiring newbie trying to learn Cyber Security, you must have a nice catalogue of tools to make your life easier. While these tools do make working simpler but cannot compensate for the vast amount of knowledge required in this field. Ethical hacking and online security involves a lot efforts. Many tools are used to test and keep software secure. The same tools can also be used by hackers for exploitation.


A hacking tool is a computer program or software which helps a hacker to hack a computer system or a computer program.

 In this post i’m going to mention 50 different tools under 9 categories that your ‘Hack Lab’ must have. Most of the tools mentioned in this post are pre-included in Kali Linux which you can install to have them at once.
Intrusion Detection Systems :-
These are the tools you must have if you’re building a hack lab for penetration testing or for any security arrangement. They help you detect of any threats that might harm the system.
  • Snort
  • NetCop

Encryption Tools :-
While the above tools do identify any suspicious activity but they can’t protect your data, you need encryption tools for that.
  • TrueCrypt (The project has been shut down and no longer supported)
  • OpenSSH
  • Putty
  • OpenSSL
  • Tor
  • OpenVPN
  • Stunnel
  • KeePass

Port Scanners :-

The next big thing is Port Scanners, you can’t penetrate a network without knowing what services are running on what ports.
  • Nmap
  • Superscan
  • Angry IP Scanner

Packet Sniffers :-

These tools let you intercept traffic incoming/outgoing from the network.
  • Wireshark
  • Tcpdump
  • Ettercap
  • Dsniff
  • EtherApe

Traffic Monitoring :-
These tools let’s you monitor and analyze what is currently going on in a network.
  • Splunk
  • Nagios
  • P0f
  • Ngrep  

Vulnerability Exploitation :-

These are the hardcore tools that you will use after identifying the flaw or loop hole in the security of a network.
  • Metasploit (The Best)
  • Sqlmap
  • Sqlninja
  • Social Engineer Toolkit
  • NetSparker
  • BeEF
  • Dradis

Packet Crafting :-
Packet Crafting tools facilitate finding vulnerabilities within the firewall.
  • Hping
  • Scapy
  • Netcat
  • Yersinia
  • Nemesis
  • Socat

Password Crackers :-
These tools let you crack passwords a computer has stored in it or is transmitting over the network.
  • Ophcrack
  • Medusa
  • RainbowCrack
  • Wfuzz
  • Brutus
  • L0phtCrack
  • Fgdump
  • THC Hydra
  • John The Ripper
  • Aircrack
  • oclHashcat
  • Cain and Abel

Wireless Hacking :-

If a network have a Wi-fi access point then it can easily be broken into. Various encryption methods like WEP, WPA/WPA2  or even the latest WPS have some serious security flaws. These tools help you intrude much easily.
  • Aircrack-ng
  • Kismet
  • InSSIDer
  • KisMAC
These were some of the tools which must be in any Cyber Security Researcher’s arsenal.
So, What are you waiting for – Let the hacking begin..!!
Did I miss some other cool tools which must be in this list, do let me know in the comments.

Hacking Router Password Like A Pro

Most users nowadays purchase new routers and leave it to the default settings. BAD IDEA..!!.
Leaving your routers to default settings is bad because if it’s hacked (surely, sooner or later) by a malicious hacker, they would change your network settings so as to direct their traffic from your workstation while committing dirty deeds.Never mind the hackers, any Tom, Dick and Harry with a little computer processing power can get into your system easily.

In this post, we are going to discuss a brute forcing tool THC-Hydra, which can be used to crack router passwords.




Requirements :-

  • Kali Linux ( If you don’t have it, install it from here.) 
Steps To Follow :-

If you’ve installed Kali Linux, you should now be fully loaded to continue :-
  • Open up a terminal window and type xhydra.
  • Enter (Your Router Gateway, It could be different) as your target.
  • Use http-get as the method.
  • Define 80 in Port settings.
  • Select a password wordlist.(Don’t have one, download it from here.)
  • Click Start and the attack will begin.
The cracking time depends on the length and complexity of  the password used and also on the quality of wordlist.
Once cracked they can easily change your wifi passwords(no matter what encryption you use W.E.P., W.P.A., or W.P.A./2 with W.P.S.) or lock you out of your network, scary huh..!!
To prevent it from happening to you – use a password of more than 12 characters and don’t leave your router settings to default, change it to your preferences.

How To Find Serial Keys To Any Software By Using A Simple Google Keyword

How many times you’ve installed a software product (For Eg: Windows 7 or XP, Nero etc.) that requires a serial key which you have to purchase ?
Now for those who don’t want to spend any money getting a legitimate serial key, there is a google keyword which can help you.
Now the big question :-

How Can Google Help Me



The Keyword is 94FBR 
94FBR was part of a Microsoft Office 2000 product key that was released on the internet that bypassed Microsoft’s activation system. Google can also show results based on the synonyms of the searched query.
But it works for other products also because Google considers 94FBR as product key or crack.

Steps To Follow :-

  • Then type Software Name 94FBR

**Replace ‘Software Name’ with the name of the product you want the key.

  •  Now just press Enter & the pages containing the crack or serial will appear.