[Mr Robot Hack] What is USB Rubber Ducky Explained?

By Admin
Hello friends how are you ? hope you are doing good. I am present today with a new post in front of you which is a very important part of ethical hacking. In this post i am going to tell you fully explained on  “USB Rubber Ducky” or “Mr Robot ”  If you keep a little bit of knowledge in hacking, then read this post to the last.

USB Rubber Ducky@myteachworld.com


What is USB Rubber Ducky?


USB Rubber Ducky or Mr Robot is a kind of hacking best weapon, which can also be used by a normal person, which is very rare in this field. USB Rubber Ducky is like a simple pendrive, but it is a kind of HID device that allows you to inject any keystroke in any system. 

With the help of USB Rubber Ducky, you can easily hack any system and steal the victim important data.  And the most important thing is that it does not even detect any antivirus. Friends, you can also inject any payload with the help of USB Rubber Ducky.

READ MORE:



This is such a HID device, which prevents Victim to be impossible. Because it does not detect any firewall and antivirus because it acts like a HID device. HID means Human Interface Device.HID means those devices that take input from the human, like mouse, laptop and keyboard etc.

USB Rubber Ducky@myteachworld.com


When we connect Rubber Ducky to any system, it reacts in the system as a keyboard, in which free define keystrokes are stoked.

Now when we plug it into the computer, the computer thinks that a keyboard has been added to it. And as soon as you connect the USB Rubber Ducky to the computer, keystrokes are also run. Because of this, neither computer can understand that it is being hacked and neither can it detect firewall and antivirus being used. In this way, USB Rubber Ducky makes its work smoothly, and nobody knows anything.

USB Rubber Ducky is a kind of key injection tool, which works even faster than the Something 1000 Word / minute speed. We can use it both in milecius and nonmilecius keystroke. The tool is most popular among hackers, penetrating testers and professionals.

Now Friends, I want to tell you how many people use it. Suppose a person has an employee in a company and if the person wants to steal the system data from any other employee, then he will be setup and ready in the USB Rubber Ducky, and as soon as he goes somewhere for an Employee, that using USB Rubber Ducky, the data of that Employee can be stolen.

Note : Friends, if you want to buy this device, then you will find this device at hackshop.com

If you liked this post, please do not forget to share it, without your support, I can not reach this knowledge even further, so help me by sharing my post so that I can bring you a tricks more than one To share the post ,you can use the share buttons given below, and , If you face some problem please drop your email by going to contact us section of this site. 

***********************************************THANK YOU*****************************************

[Facebook Trick] How to change your facebook name before 60 days limit?

By Admin
Hello guys,  In this post i am going to tell you “How to change Facebook name before 60 day?”  Facebook basically allow us to change name only one or two time in 60 days but by using this method you can easily change your name before 60 days. If you also have to change your Facebook account name, then read this post to the last.

 change facebook name before 60 days limit@myteachworld.com


Read More :


How to change Facebook name? Step by Step follow me


Step1; First of all, login to the Facebook account, click on facebook.com to login.

Step2; First, go to "Settings & Privacy" and click on "General". 



Step3; Now click on the name option. 

 change facebook name before 60 days limit@myteachworld.com


Step4; Now you will see some options and again click on “Learn More”   screenshots are given below


 change facebook name before 60 days limit@myteachworld.com


Step4; Now a new page will open in which some options will appear, click on “let us know”.

 change facebook name before 60 days limit@myteachworld.com


Step5; Now you will open a page like form that will fill you up.

 change facebook name before 60 days limit@myteachworld.com


  1. New First Name: You have to enter your new name.
  2. New Middle Name: If you want to enter the name then put it, otherwise leave it blank.
  3. New Surname: In it you have to enter your new surname.
  4. Now select a “ legal name change” option in pick one.
  5. You have to upload your document in your id. This is the most important option. You have to upload your original documents. By clicking Choose file you can upload Aadhar Card, PAN Card, Passport, Driving License, Marriage Certificate, Birth Certificate, Voter ID Card etc in the documents.
  6.  After filling all options properly, click on the send.

Now your name will change in 24 hours and you will know the message through. In  this way, you can change your Facebook account name even before 60 days limit.
If you liked this post, please do not forget to share it, without your support, I can not reach this knowledge even further, so help me by sharing my post so that I can bring you a tricks more than one To share the post ,you can use the share buttons given below, and , If you face some problem in any steps please drop your email by going to contact us section of this site. 
.....................................................................................................................THANK YOU.....................................................................................................

[Facebook Trick] How To Make Stylish Name id on Facebook?

By Admin
Hello Guys  In this post I will tell you how to create a stylish name i’d on Facebook? Many people want to create id from stylish font on facebook , But they do not find stylish facebook acceptable fonts. If you also want to keep your Facebook account name stylish but do not accept it, do not take tension. I have given some acceptable Facebook names .


facebook stylish name @myteachworld


Method 1:

Latest Facebook Stylish Name list for Girls and Boys:

Acceptable Names for Girls:


  • Dəsıı Luk Gıırł
  • Em-so’Loŋəly Bʀokəŋ’Aŋgəl 
  • Chułbułıı Chørıı
  • Bakk Bakk Quəən
  • Təəkhıı Mıırchı
  • Cup'Cakə
  • Pərsonııfıəd Hotılıcıou'x
  • Myx'tərııøux Gıırl
  • Pərsonıfııed Fəəlııng'x Dəstroyər
  • Zaalıım Gıırl
  • Chatpatıı Kudıı
  • Dıl ChuranəwalıHu Bs Təri MaiDıllıwalı
  • Luv'Yuh Babııə
  • Naughty Kudı 
  • Həartləss Gıırl
  • Ladkı BəautıPhul


Acceptable Names for Boys:


  • Tu-mere’BaBy Doll-mai’tera Teddy-Bear
  • Çhócklåtÿ Bõÿ
  • MƛîȠ-rāậj DīlǿǿȠ’pḗ Kārtā-ħǖ
  • Whèn Yóü-Sèe Mè-Säy MashâAllah
  • MeriiEk’khaasiyat-heMain maarta’Kamhu-AurGhaseetta Zayada’Hu
  • Ek’ßãr-ĐȝĶh Lēĝĭ’nã-tø Pãĝãł Ħø’jãyē-gĭ
  • U Can Cʌll-mɘ Mɽ-xBįĝřâ SĦéhzåđâ
  • Mąiň ąpňą fąvöurįťę hőőņShuɽʋ’Tʋŋə KııYʌ-Khʌtʌm Mʌııŋ Kʌɽʋngʌ
  • Kʋɽııyoŋ Kʌ Sʜaʜzʌʌdʌ
  • ßräñdéd Kämíñä
  • Bɽaŋded Dɘvɪl
  • ηθτγ βΦγТнє-Ряіисє Оғ-ғѧсэвооk
  • Tʋ’jʋɖa-Hʋvii Paɽ’teɽii Yaaɖ Jʋɖa’ŋa-Hʋvii
  • Ąloŋə Iıŋ Mılıoŋs
  • Cħocoɭʌty Kʌmııŋʌ
  • Swɘɘt Poɩsoŋ
  • Sīīləŋt KīīlərΗξλζτ ΗξλκεζMy’girlfrieñÐ-sãys I’Am-a Nøwty Bøy
  • Swəət Dəvɪ’ɪl
  • Həʌɽtləss ʌlcoholıc
  • Єк-йџмвєя-қд-тндякіі Вєѕђядм Кдміид Сђѳяѧ
  • Jisdıŋ-meri Hʌtegiŋʌ Usdıŋ Tumsʌbkı-Fʌtegi
  • Twıŋkle-Twıŋkle Little-star’Hot GirL-ıŋ’ɱy Car
  • Returŋ From’Hell Just’To loveYou’Agaııŋ
  • Nʌlʌyʌk Lʌðkʌ
  • Gɪɪʀl’x-Iʌɱ Yəʋʀ Nəxt BóyfʀiəŋdMƛîȠ-rāậj DīlǿǿȠ’pḗ Kārtā-ħǖ
  • Add’Krle Mujhe’Kasam Se’Peyar Hojayega’Tujhe
  • Tu’merı-ßaßy Doll’meı-Tera Teddy-ßear
  • Hąr’sţơry-ką Eŋđ Mųjhsê’hĭ Ħoţą-hąĭ
  • MēɽA-Ðɪɭ Tʋmhaɽe ɭɪye’hɪ ÐħaɗktA-Ħaɪ
  • Yơử’Kŋow-mȜh I’m’ửŋīiquȜ Kʌmīiŋʌ
  • Ałčohøłık Bøý
  • TwıŋkleTwıŋkle Little-star’Hot Chori-ıŋ’ɱy Car
  • ΔΞ’Δ’ξΜσ βυτ ίηηΘζεήτ βΩψ’Δ’ΞΔ
  • Excuse’Me-Gıırls No’Autograph-Plz
  • λττιτυδξ κιζζεπ
  • Квнї’ѕоғт Квнї’яцԁє Кїггєя- мєяѧ’Ѧттїтцԁє 
  • YouDoŋ’t-Kŋow Ðaŋ’geʀous-Boy Ix-Mah
  • Xecoŋd-Ŋame
  • Log’Apŋì-Zìŋdagi Baŋate-Hai’Maí Apŋi-Jàŋŋat’Baŋata Huŋ
  • Тнє Нєаят-Яоввєя Воу
  • Ŋame-Bata’diya Toh-Pechaaŋ Buʀa’maaŋ Jayegıı
  • GhamaŋdiLaɖkia’mujhse-ɖøørRahe Kyøki’maŋaŋa-mujhe Âtaŋâhī ØrBhav’maiKisiko-ɖetâŋahi
  • Pasʌnd-aya’to Dıl-ɱə’waɽŋa Dəɱagh-ɱəbi’ŋi
  • Єк-йџмвєя-қд-тндякіі Вєѕђядм- Кдміид
  • GıŗlfrieŋdTo’kamıŋy Bhi-bŋaty Haıŋ-bacha’hu Bachı’hı-fsauŋGa
  • Маіи-јав’идѕнє-мє Ђотд-нци- Тавђі’то Ђоѕђ-мє-ђота’ђци
  • Tu’Merıı-Sıızuĸa Maıŋ’Tera-Ŋobıta
  • ΞυηκηοωηΞ βογ
  • Кіѕікє-ђатн’ӣа- Даієԍа Үє Ѓабка
  • Nıŋty-ŋıŋe Perseŋt Zʌʌlɪɪɱ LʌʀKʌ
  • Тєяі-әіяґғяієиб-мєяі’Ғди
  • Ѕтор-ђєя’іғ Уєщ-сди’I’m-coǾol I’m-høt >I’m-ęverythıŋg You’rę-ŋøt
  • Soɽɽy’gııɽlx Iıı-eɱ’buʑy
  • Mʌii’DikhtaHuŋ-Sweet Innocent’Swamii->TypeKa Lekiŋ’Hu-Bada Harʌmii’Type-Ka
  • Ðʌɳgɽoų’x
  • Maıŋ’wahı-hʋŋ Jıse’Deĸhĸar-terı ßehŋ’Sɱıle-Detı Haı
  • ɱere’Bareɱe-ıtŋamatSochŋa Ðılɱe’Aata-Hʋŋ SaɱajH’ɱê-ŋaHı
  • Addııçtēď Tő-Yőuŕ Şpıçy-lıp’x
  • Walkıŋg’ıŋ Dah Dead’eŋds
  • Maıŋ-IsĦáq’Zẳẳdẳ Apŋı IsĦáq’Zẳẳdı-KẳFẳsĥiøñâble Śtýlíśh Chøċŀʌt ßøý
  • Ek’ßãr-ĐȝĶh Lēĝĭ’nã-tø Pãĝãł Ħø’jãyē-gĭ
  • Lɩpstɩc Rəɱovər
  • Moŋ X’təɽ
  • Kʌɱɩŋʌ
  • BʌdTämêêz Lʌfuŋter Chõkrá
  • Cʜocoɭʌtƴ Ɓoƴ
  • Uɳknowɳ Kamɩɩɳa
  • Ԁойт’Ѕђош Мз’ця ДттітцфзԑТђе-иэхт-ряіисе- Оғ Чоця- Ђэаят
  • Èk’bàar-dèkh legi Na’to-pàgal Hò’jayègi
  • Ї’м Тђє-ѕтчгїѕђ-Ряїйсє Оғ Ѕомєопз’ѕ-Нєаят
  • Tɘɽʌ Dhyaɳ’KIıdhaɽ-Haıı ye’Tɘɽʌ-Hɘɽo >Iıdaɽ’HaIı Pʌʟa
  • Kơı’ɱửjħko’ʌỳsȜ ɱıłá-haıı’ JȜsı Båŋjåɽe’ko’għáɽ
  • ßlâçklîstêd Kîllêr
  • IñtêrnåtiØnål Łipšløçkēr
  • Вдвїеє-уоц’аяє Му’рдѕѕщояб-нощ Сай’Ї Ғояҩєт-Чфц
  • Maıŋ-IsĦáq’Zẳẳdẳ Apŋı IsĦáq’Zẳẳdı- Kẳ
  • Add’Krle Mujhe’Kasam Se’Peyar Hojayega’Tujhe
  • Maıŋ’wahıı-huŋ Jısko’kabhı-Tu Lıŋe’maɽtı-thı ßoss
  • Тңӡяє-дяє Ӣѻ’ѿѻяԁ-їӣ-Ԁїсҭіѻӣдяу
  • Ғөя’ԁєѕҫяївіӣҩ Двѻцҭӎє
  • MeriiEk’khaasiyat-heMain maarta’Kamhu- AurGhaseetta Zayada’Hu
  • Tʋ’jʋɖa-HʋyIl Paɽ’teɽIl-Yaaɖ Jʋɖa’ŋa-HʋyIl
  • Ŋaam-Bata’dya Toh-Pechaaŋ Buʀa Maaŋ-Jayegıı
  • Mŗ Romantic
READ MORE:


Method2: Facebook Stylish Name Converter:


Change Fb Name In A Stylish Font By Myteachworld.com

Name Styler

Result

1.

2.




Step1; First of all type your name in the script above, now click on ‘Convert Text’.

Note : Remembering the name is required to write in all the small letters. 

Step2; Now copy the convert name, Screenshot is given below.


facebook stylish name @myteachworld

How to change name in facebook?

Step1; First of all, login to the Facebook account, click on facebook.com to login.

Step2; Now Go to Settings>>Privacy>>General  option in Facebook account.

facebook stylish name @myteachworld


Step3; Now you paste the copied stylish name here and click on “Review Changes”

facebook stylish name @myteachworld


Step4; Last step is type the password and click on “Save Changes”

facebook stylish name @myteachworld


You will now see that your Facebook account name has changed successfully.
If you liked this post, please do not forget to share it, without your support, I can not reach this knowledge even further, so help me by sharing my post so that I can bring you a tricks more than one To share the post ,you can use the share buttons given below, and , If you face some problem in any steps please drop your email by going to contact us section of this site. 
.....................................................................................................................THANK YOU.....................................................................................................

[BlueBorne Bluetooth Hacking Attack] What is BlueBorne Exploit?

By Admin
 Hello guys , In this post today i am going to teach you  about “Blue Borne Exploit”  what is Blue Born Exploit, and how can we avoid this? Friends Recently, Armes Lab has a Bluetooth vulnerability search, named Blue Born. The device which is Bluetooth enabled by this attack can be hacked. The attack vector “BlueBorne” Exposes almost every connected device.
Blue Borne is an attack vector by which hackers can leverage blutooth connection to penetrate and take complete control over targeted devices. Blue Borne affects ordinary computers, mobile phone and the expanding realm of lot devices. The new attack vector endangering major mobile, desktop and lot operating system , including Android ,Windows, iOS , Linux and the devices using them. The new vector is dubbed “BlueBorne”, as it spread through the air (airbone) and attacks devices via Blutooth. The attack does not require any malicious file, link or the targeted devices to be paired to the attacker device, or even to be set discoverable mode. The attacker locates active Bluetooth connections and device can be identified.


BlueBorne Bluetooth Hacking Attack@myteachworld.com


It allows an attacker to strike completely undetected , it attack occur without victim’s knowledge.
Suppose a hacker has accessed your smartphone via Blue Brone Attack, then he can take away all the data on your phone and transfer it to his system. Hackers can send viruses or malware to your system, hackers can be hacked from any other device through your device via Bluetooth.
Blue Borne provide a number of opportunities for the attacker. Frist spreading through the air renders the attack much more contagious, and allows it to spread with minimum effort. Second , it allows the attack to bypass current security measures and remain undetected. The attacker obtains the device’s MAC address. Which is a unique identifier of that specific device. By probing the device, the attacker can determine which operating system his victim is using, and adjust his exploit accordingly.
This is true hacking attack, and this Zero Day vulnerability has been discovered by Armes Lab.

Read More:


How do you find Blue Born vulnerability in your device?

All Android phones, tablets, and wearables(except those using only Bluetooth low energy) of all version are affected by four vulnerabilities found in the Android operating system, two of which allow remote code execution(CVE-2017-0781 and CVE-2017-0782). One results in information leak(CVE-2017-0785) and the last allows an attacker to perform a Man-in-the-middle-attack(CVE-2017-0783).

All Windows computers since WindowS Vista are affected by the ”Blutooth Pineapple” vulnerability which allow an attacker to perform a MAN-IN-THE-MIDDLE-ATTACK(CVE-2017-8628).

All Linux device running BlueZ are affected by the information leak vulnerability(CVE-2017-1000250). All Linux device from version 3.3-rc1 (released in October 2011) are affected by the remote code execution vulnerability(CVE-2017-1000251)

To find Blue Born vulnerability in your device, install the app given below.


Download BlueBorne Vulnerability Scanner 

BlueBorne Bluetooth Hacking Attack@myteachworld.com



If you liked this post, please do not forget to share it, without your support, I can not reach this knowledge even further, so help me by sharing my post so that I can bring you a tricks more than one To share the post ,you can use the share buttons given below, and , If you face some problem in any steps please drop your email by going to contact us section of this site. thank you