Saturday, July 9, 2011
How to disable and remotely remove Antivirus?
I
wanted to remove the antivirus programs remotely because the computers
are too far away and my chair is rather comfortable having been moulded
to my ample behind. I also wanted to do this removal silently to both
allow the end users to continue working undisturbed and as an added
bonus I don't have to talk to them and have them put me off because they
are just too busy at that moment.
Free download Award Keylogger - full version...
Award Keylogger allows you to monitor all users' activity on any
computers in real time and record each computer's usage history. Award
Keylogger makes it easy to view, in real time, the screenshots of the
any computers, all typed keystrokes, visited Web sites, used programs.
You can view a list of running processes and terminate undesirable
ones.
Thursday, July 7, 2011
How to delete Autorun.inf virus?
Once it happened to a friend of mine, when his newly bought laptop was infected with this autorun.inf virus.
This virus corrupted almost all the drives on the Hard disk, and when
ever he tried to double click on the drive or opening any drive it
opened in a new window. In some cases, when your drive is infected with
this Autorun.inf virus, you won’t be able to access the drive
completely. You have to browse the drive by Exploring it i.e; Ctrl+E
keys from the keyboard.
Sometimes
ever you will not be able to see hidden files even if you have Show
hidden files Enabled under Folder Options. well, this are all the
wonders of this Autorun.inf virus.
I
am going to show you this rare method of removing Autorun.inf manually
using just winrar application, not any antivirus or malware programs.
Tuesday, July 5, 2011
How to hack Facebook/Twitter accounts (Stealing Cookie)?
In this tutorial i will explain how to hack a Facebook/twitter accounts by stealing cookies. This method works only when the victims computer is in a LAN (local area network ).Best place to try out this is in schools ,collages ,cafes . where computers are connected in LAN .Before i proceed let me first explain "cookies "
What is ARP Spoofing n How to implement it?
What is ARP spoofing?
ARP spoofing also known as ARP poisoning or ARP attack is a technique in which a host in a LAN can "poison" the ARP table of another host causing it to send packets to the wrong destination. The attacker can modify the traffic in the network such a way that it will redirect all traffic to go through it. ARP Spoofing will allow an attacker to sniff data frames
ARP spoofing also known as ARP poisoning or ARP attack is a technique in which a host in a LAN can "poison" the ARP table of another host causing it to send packets to the wrong destination. The attacker can modify the traffic in the network such a way that it will redirect all traffic to go through it. ARP Spoofing will allow an attacker to sniff data frames
Man in middle attack using Ettercap
Ettercap is a suite for man in the middle attacks on LAN (local area network ). It features sniffing of live connections, content filtering on the fly and many other interesting tricks.It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis. In this tutorial i will explain how to sniff (user names,passwords) in LAN using Ettercap
How to hack remote router using Telnet?
Telnet is a legacy remote terminal TCP/IP
application used for remote administration , Telnet is notorious for
transmitting communications in plain text and has long since been
superseded by SSH that uses encrypted channels so it is rare to see telnet in use on the Internet .
But you will be surprised to know that most of the routers have telnet serveries running on them by default even today ,This is a serious vulnerability ,this allows malicious users to connect to the router from anywhere in the world using default credentials, and can wreak havoc.
I this article I will explain how you can scan large number of routers for telnet services, which we can then attempt to use default credentials to log in
Hacks with Google...
Google serves almost 80 percent of all search queries on the
Internet, proving itself as the most popular search engine. However
Google makes it possible to reach not only the publicly available
information resources, but also gives access to some of the most
confidential information that should never have been revealed. In
this post I will show how to use Google for exploiting security
vulnerabilities within websites. The following are some of the
hacks that can be accomplished using Google.
Subscribe to:
Posts (Atom)