Tuesday, October 9, 2012
Thursday, February 2, 2012
How to protect your smart phone from getting hacked?
Most people are comfortable with the idea of installing anti-virus
software and security programs on their home PC in order to ward off
hackers and malicious code. But with the rise of smart-phone technology
people have become complacent about the safety of the personal
information that they carry around on the multi-tasking device in their
pockets. You have to think of a smart phone as a small computer which,
as with all such devices, is vulnerable to hackers unless you take steps
to protect it.
Wednesday, February 1, 2012
How to Hack Website database using XPath tech?
Everyday many website gets hacked by hackers but most of the hackers are
hacking those website just for popularity nothing else. Today i am
writing this tutorial on XPath Injection, in which i will explain you, How Hackers Hack Website Using XPath Injection. M4ERRHCQZ2PY
In a typical Web Application architecture, all data is stored on a Database server. This Database server store data in various formats like an LDAP, XML or RDBMS database. The application queries the server and accesses the information based on the user input.
Normally attackers try to extract more information than allowed by manipulating or using the query with specially crafted inputs.Here, in this tutorial we’ll be discussing XPATH Injection techniques to extract data from XML databases.
In a typical Web Application architecture, all data is stored on a Database server. This Database server store data in various formats like an LDAP, XML or RDBMS database. The application queries the server and accesses the information based on the user input.
Normally attackers try to extract more information than allowed by manipulating or using the query with specially crafted inputs.Here, in this tutorial we’ll be discussing XPATH Injection techniques to extract data from XML databases.
Web Security Scanner For Windows (32 bit & 64 bit)
Vega is a GUI-based, multi-platform, free and open source web security scanner that can be used to find instances of SQL injection, cross-site scripting (XSS), and other vulnerabilities in your web applications. Vega also includes an intercepting proxy for interactive web application debugging. Vega attack modules are written in Javascript, users can easily modify them or write their own. This is the Windows 32-bit and 64-bit version.
Exploiting a cross-site scripting vulnerability on Facebook
Take a walk through most workplaces and you will surely notice
someone browsing a social networking site. No wonder that website
popularity services like Alexa rate Facebook the second most visited
website after Google and before Youtube! We trust these websites to
reflect the public image that we want to portray and sometimes even
trust with secrets. A single cross-site scripting vulnerability
allows attackers to do anything (that the victim may do) on behalf of
the victim. In this article we will look at how Facebook accounts could
be compromised through such a simple, yet effective vulnerability.
HTTP Only does not protect your site (or Facebook) from XSS exploitation
Linux Rootkit 2012
KBeast (Kernel Beast) 2012 is a Linux rootkit that hides the loadable kernel module, hides files and directories, hides processes, hides sockets and connections, performs keystroke logging, has anti-kill functionality and more.
How to tracks IPs in log files and executes shell commands per each IP?
Here is a PHP script that tracks IPs in log files and executes shell commands per each IP. It was created as a sort of reverse fail2ban or cheap VPN-firewall: a machine with a closed firewall can be told, by a foreign machine, to accept connections from a specific IP.
Sunday, January 29, 2012
Best practices to stay safe on Facebook and avoid being hacked
As Facebook has emerged as the most
popular Social Networking site (with a user base of 800 Million active
users) it has also gained attention of hackers and spammers. As in the
case of Windows, the more popular it is, more are the chances of it
getting attacked. The reason that both Windows and Facebook are easy
target is same: it has large number of population and most of them are
common users with limited or no knowledge of “security”. It is an open
secret that people are the weakest link when it comes to security.
Keeping this in mind, I would like to request readers not to be the
weakest link and to follow these best practices to avoid being hacked:
Hack Networks with your mobile device
Features
- Hacks WEP, WPA, and WPA2
- Very simple and easy to use layout
- Works on All Android OS phones
- Works on iPod Touch 1st, 2nd, 3rd, and 4th gen
- Works on iPhone 1st, 2nd, 3G, 3GS, 4, 4s
- Works on iPad 1 and iPad 2
How to enable Secure HTTPS browsing in Facebook for preventing hack?
With the
advancement of technology advanced are the dangers. On an unsecure wi-fi
connection hacking facebook is child’s play. You might have heard of “Firesheep” add on of Firefox which enables to login in to others’ opened facebook account on the same network. Apart from that, packet sniffers can also be used to steal your password on the fly. Man in the middle attacks are also very popular in the same sense.
Saturday, January 21, 2012
Microsoft Windows Remote Code Execution
VUPEN Vulnerability Research Team discovered a vulnerability in Microsoft Windows. The vulnerability is caused by a use-after-free error in the TIME (datime.dll) module when loaded via a specific behavior, which could be exploited by remote attackers to compromise a vulnerable system via a specially crafted web page.
Subscribe to:
Posts (Atom)