My link

If u have any query mail me at venomoushackers@gmail.com

IP

Saturday, 18 August 2018

How to change country region on NETFLIX [100% Working FREE]

Ive been frustrated by the Netflix VPN/Proxy error messages, finally i found a way  and there is a workaround. Ever since Netflix implemented its overseas VPN ban–preventing customers and other show catalogs from abroad VPN providers and users alike have been steeping ground for a solution.

When I connected to most VPNs, Netflix gives the following error, accompanied by error code m7111-1331-5059: such as below error message while playing any video




This trick will work on your Laptop, Desktops, Mobile phones, Tab's, SMART TV's or any additional devices that you are using to watch videos which I successfully tested and for that you don't need to install or Buy any VPN.

I heard there are some VPN's if you buy then you can change the region and watch Netflix videos of that region's but i never tested yet and not sure if its really works or not. 

Anyway, I like Free stuff's and I don't wanna spend money and regret after ๐Ÿ‘ป If you are too free users then,
Find my step by step manual instructions below:

1. Right-click on the “Start” button, then click “Settings”.



2. Click on “Network and Internet”. Click on “Network and Internet”.



3. Click on “Network and Sharing option”.


4. Click on the interface [Ether through which you are connected to the Internet in my case i connected to my WiFi .


5. Interface tab will open through which you are connected to the Internet and click “Properties”.


6. Uncheck the Internet Protocol Version 6 (TCP/IPv6) and Click "OK"


7. Double-click on Internet Protocol Version 4 (TCP/IPv4)

8. In the General tab click on Use the following DNS server addresses.



9. I Preferred Indian DNS server because i wanna watch Bollywood movies so i selected DNS 35.154.249.83 and Alternate DNS 169.38.73.5 belongs to INDIA.

* You can select any of other DNS Server List here hxxps://www.smartdnsproxy.com/Servers 

11. Make sure Validate settings and check is your traffic really passing through DNS server or not, Below is the way i always check.


12. Windows Network Diagnostics will start and run for a little while, just let it run. Once the diagnostics have run click on close.

13. Restart your computer if Needed.


Also you can change DNS servers on router which helps route traffic from your Mobile device, Tab's, iPads, SMART TV's and any additional device OR you can use below steps if above step not work on your Laptop/Desktop

Go to Network -> select "WAN"
Change the DNS servers Click "SAVE"


* Please Note for Desktop Users who using router some people direct connect WAN cable to CPU, This setting only work if connection made with router like below in picture


My Evidence :

List of default Movies on Netflix when I select "Action and Adventure" BEFORE changing with default DNS servers assigned by my ISP.


List of default Movies on Netflix when I select "Action and Adventure" AFTER changing with INDIAN DNS servers which are configured using above steps.


Please comment on the Blog if you have additional countries DNS servers list "SHARING IS CARING" 

Sunday, 22 February 2015

How to check your VPN is Secure or Not

A new security flaw can reveal your real IP address to prying eyes, even if you're using a VPN, and it's easy to exploit. Here's how it works, and what you can do about it. A recently discovered security flaw allows remote sites to take advantage of WebRTC (Web Real Time Communication, a feature built in to most browsers.

A few lines of code is all it takes to remove the location protection you get from using a VPN, and figure out where you're actually located and who your internet service provider really is (who can then tie your address back to who you are specifically.) While the vulnerability is primarily browser-based right now, any application that can render web pages (and uses WebRTC) is affected, meaning anyone who wants to can see past your VPN to where you really are and who you really are. Advertisers, data brokers, and governments can use it to peek through your VPN to find out where your connection is really coming from.

How Can I Check If My VPN Is Affected?

Firefox and Chrome have implemented WebRTC that allow requests to STUN servers be made that will return the local and public IP addresses for the user. These request results are available to javascript, so you can now obtain a users local and public IP addresses in javascript. This demo is an example implementation of that.

Additionally, these STUN requests are made outside of the normal XMLHttpRequest procedure, so they are not visible in the developer console or able to be blocked by plugins such as AdBlockPlus or Ghostery. This makes these types of requests available for online tracking if an advertiser sets up a STUN server with a wildcard domain.


To see if your VPN is affected:

1) Visit: http://whatismyipaddress.com/

and Note down your actual ISP-provided IP address.

2.) Log in to your VPN, choose an exit server in another country (or use whichever exit server you prefer) and verify you're connected.

3.) Go back to What Is My IP Address and check your IP address again. You should see a new address, one that corresponds with your VPN and the country you selected.

4.) Visit Roseler's WebRTC test page


If both tools show your VPN's IP address, then you're in the clear. However, if What Is My IP Address shows your VPN and the WebRTC test shows your normal IP address, then your browser is leaking your ISP-provided address to the world.


The Easy Way: Disable WebRTC In Your Browser.

Chrome, Firefox, and Opera (and browsers based on them) generally have WebRTC enabled by default. Safari and Internet Explorer don't, and thus aren't affected (unless you've specifically enabled WebRTC.) Either way, if the test above worked in your browser, you're affected. You can always switch to a browser that doesn't have WebRTC enabled, but since most of us like the browsers we use, here's what to do:



Chrome and Opera:
Install RTC Block or ScriptSafe extension from the Chrome Web Store. It's overkill, but it'll disable WebRTC in your browser.
https://chrome.google.com/webstore/detail/webrtc-block/nphkkbaidamjmhfanlpblblcadhfbkdm?hl=en
https://chrome.google.com/webstore/detail/scriptsafe/oiigbmnaadbkfbmpbfijlflahbdbdgdf?hl=en

Firefox: You have two options. You can install the Disable WebRTC addon from Mozilla Add-ons

https://addons.mozilla.org/en-US/firefox/addon/happy-bonobo-disable-webrtc/

or disable WebRTC directly by opening a tab and going to


PHP Code:
about:config 
in the address bar. Find and set the


PHP Code:
media.peerconnection.enabled 
setting to false.


To be sure WebRTC is disabled go to:
And you should see something like this, if your good.

Otherwise you will see this:
I know a lot of you use VPN software and probably don't know about this so I hope it was helpful. Got to stay antonymous if you are hacking websites.

Source: mobi13_XT

Saturday, 6 September 2014

Web Server Cookie Disclouser Vulnerability Scanner

Hello Guys,
           I have write a Python code for checking Web Application Vulnerability

HTTP Only cookie is only accessed from the server side, no client script can access that cookie, when a webserver get a big cookie like same 10000 of characters for example A is char, it cannot process so it get us back error 400 [bad request], in that error has a vulnerability, its disclose cookies on a webserver.
Most of all dont know about the how to check a HTTPOnly vulnerability and web server Cookie Disclouser Vulnerability, some People runs a Tools like Acunetix and burp scan or netsparker there are most of time you will see a HTTPOnly flag is not set or cookies not protected, they just saw it and patched it through .htaccess file or including scripts in php headers file to protect a web server. But Most of dnt know how to check it, So i made it a script for checking specially for cookie disclouser vulnerability on web server
[+] I Have Made a Python Script for Checking HTTPOnly and Web server Cookie Disclouser Vulnerability.
[+] Test it Manually for checking vulnerability of HttpOnly on Web Applications, this is very common vulnerabilty on nowadays [+] Impact of this Vulnerability is Low as well as Medium depending upon the Attacker :D
Usage:-
[+] Using of this python file on windows is very Simple
[+] Download a python for windows from here: https://www.python.org/ftp/python/2.7.8/python-2.7.8.msi
[+] Run a python File [+] C:\python27>python.exe and file path
Here is some Screenshots:
[+] If Target is Vulnerable



[+] If Target is Not Vulnerable


[+] Proof of Exploiting Vulnerability using Browser, Need an Cookie Manager


Download the Python Code from here:
https://github.com/frank3nstien

Direct Link:
https://github.com/frank3nstien/web_server_cookie_disclouser_script