For no particular reason, I've collected a lot of tools and trick for tunneling one network through another. In addition to OpenVPN, IPSec, and other dedicated tools designed to provide Virtual Private Network functionality, I've played around a lot with running IP traffic through SSH, SSL, and even plain HTTP tunnels.This is typically done when you want to get around someone's firewall, but also... Read More »
Saturday, May 28, 2011
How to login SSH without password?
Hi guys, did you want to use SSH without password?... Here is a very simple trick to do this... ... Read More »
Friday, May 27, 2011
Root privileges in Linux...
Security researcher Dan Rosenberg presents a small demo program which combines several security holes to obtain root privileges on Linux systems on Full Disclosure Security mailing list. He combined some existing vulnerabilities with the vulnerability discovered by Nelson Elhage in connection with the kernel’s thread management and troubleshooting routines (CVE-2010-4258).With this exploit, an attacker can potentially exploit an OOPS to write a null... Read More »
How to hack gmail accounts?
Their are many Gmail Phisher available on net but I must say they all are outdated and most of them are detected, So I though to create a new Gmail Phisher which is very new and also created by CODE MOBILE. This article is for educational purpose only, We want to make you aware how hacking is done, So don’t misuse this hacking... Read More »
How to hide texts in Notepad?
Have you ever tried to Hide text in a regulare windows Notepad....! Yes, there is a possibility to hide some text in a Regular Notepad, but it seems to be working on only few versions on windows, probably on Windows XP SP2. To hide text in a notepad, all what you need to do is, just open up a command prompt and type... Read More »
How to login to an expired XP?
Microsoft has a neat little way to prevent software piracy of their Windows operating system. "Windows Genuine Advantage"[edit: I stand corrected, it has nothing to do with WGA] with its "Product Activation" requirement. Essentially, even with a valid product key, you still need to activate your Windows to ensure that only one computer is using that specific product key. If you can't activate... Read More »
Sipmlest way to download videos from YouTube...
For those of you new to the concept, you’ll need to know a couple of things. Many of these sites and tools simply grab YouTube videos in their native Flash format (FLV). To watch these files on your desktop, you’ll either need to get yourself an FLV player or convert the files into another format you can watch in your media player of... Read More »
Network programming in C under Linux
In this tutorial we will deal with networkprogramming under LINUX (/UNIX). During this we will only work with the Programminglanguage C. Precognition of C are needed. You should know what a describtor or a string is. # Furthermore the reader has to be intrested, so when you don't know one of the listed functions (e.g. "read", "write") you should check out the according... Read More »
Monday, May 16, 2011
Keyboard shortcuts for Ubuntu...
For those who are not familiar with Linux, Ubuntu is one of the most popular and most widely used Linux distributions. Over the time that I have used Ubuntu, other than the usual Ctrl + C (copy) and Ctrl + V (paste) shortcuts, I have discovered quite a number of keyboard shortcuts that are very useful, but seldom used by many. If you... Read More »
Keyboard shortcuts for Ubuntu...
For those who are not familiar with Linux, Ubuntu is one of the most popular and most widely used Linux distributions. Over the time that I have used Ubuntu, other than the usual Ctrl + C (copy) and Ctrl + V (paste) shortcuts, I have discovered quite a number of keyboard shortcuts that are very useful, but seldom used by many. If you... Read More »
Configure CISCO router...
Well this is going to be a two part hack. I configured a cisco switch for 3 diffrent VlAN's I'll be using 2 of the VLAN's please look at the config for any questions this is on a Catalyst 3500 XL switch. ... Read More »
How to hack PC while chatting?
I am not sure that this will work 100 %.But yes will work almost 70 percent of the times.But before that you need to know some few things of yahoo chat protocolleave a comment here after u see the post lemme know if it does works or not or u having a problem post here. ... Read More »
How to remote control your home computer from work?
There’s always that time when you need desperately to get into your home computer from work, be it to get financial or tax information or just to kick off a download of that great movie your buddy just told you about. Most of us bound behind the corporate firewall can’t get to much of anything outside of 80 or 443 as far as... Read More »
Website hacking techniques...
We hear the same terms bandied about whenever a popular site gets hacked. You know… SQL Injection, cross site scripting, that kind of thing. But what do these things mean? Is hacking really as inaccessible as many of us imagine — a nefarious, impossibly technical twilight world forever beyond our ken? Not really. When you consider that you can go to Google right... Read More »
Sunday, May 15, 2011
Distributed Denial of Service Attacks (DDOS)...
Are you Denied Access to Any Website or Internet? A web server goes down. People not able to access it! This is a phenomenon of recent attacks on a few popular sites and has taken on new dimensions from the effective Denial of service attacks to DDoS- Distributed Denial of Service and DRDoS-Distributed reflected denial of service. Denial of service attacks may be... Read More »
How to build powerful Linux Firewall?
Fwbuilder is a unique graphical firewall tool that allows the user to create objects and then drag and drop those objects into firewalls, to build a powerful security system for a single PC or a network of PCs. Fwbuilder supports a wide range of firewalls (Cisco ASA/PIX, Linux iptables, FreeBSD's ipfilter, OpenBSD's pf, and more), so its rules can be deployed on multiple... Read More »
How to build powerful Linux Firewall?
Fwbuilder is a unique graphical firewall tool that allows the user to create objects and then drag and drop those objects into firewalls, to build a powerful security system for a single PC or a network of PCs. Fwbuilder supports a wide range of firewalls (Cisco ASA/PIX, Linux iptables, FreeBSD's ipfilter, OpenBSD's pf, and more), so its rules can be deployed on multiple... Read More »