Today I'm telling you an easiest way to hack into any windows using Internet Explorer. ... Read More »
Tuesday, October 9, 2012
Thursday, February 2, 2012
How to protect your smart phone from getting hacked?
Most people are comfortable with the idea of installing anti-virus software and security programs on their home PC in order to ward off hackers and malicious code. But with the rise of smart-phone technology people have become complacent about the safety of the personal information that they carry around on the multi-tasking device in their pockets. You have to think of a smart... Read More »
Wednesday, February 1, 2012
How to Hack Website database using XPath tech?
Everyday many website gets hacked by hackers but most of the hackers are hacking those website just for popularity nothing else. Today i am writing this tutorial on XPath Injection, in which i will explain you, How Hackers Hack Website Using XPath Injection. M4ERRHCQZ2PY In a typical Web Application architecture, all data is stored on a Database server. This Database server store data... Read More »
Web Security Scanner For Windows (32 bit & 64 bit)
Vega is a GUI-based, multi-platform, free and open source web security scanner that can be used to find instances of SQL injection, cross-site scripting (XSS), and other vulnerabilities in your web applications. Vega also includes an intercepting proxy for interactive web application debugging. Vega attack modules are written in Javascript, users can easily modify them or write their own. This is the Windows... Read More »
Exploiting a cross-site scripting vulnerability on Facebook
Take a walk through most workplaces and you will surely notice someone browsing a social networking site. No wonder that website popularity services like Alexa rate Facebook the second most visited website after Google and before Youtube! We trust these websites to reflect the public image that we want to portray and sometimes even trust with secrets. A single cross-site scripting vulnerability allows... Read More »
Linux Rootkit 2012
KBeast (Kernel Beast) 2012 is a Linux rootkit that hides the loadable kernel module, hides files and directories, hides processes, hides sockets and connections, performs keystroke logging, has anti-kill functionality and more. ... Read More »
How to tracks IPs in log files and executes shell commands per each IP?
Here is a PHP script that tracks IPs in log files and executes shell commands per each IP. It was created as a sort of reverse fail2ban or cheap VPN-firewall: a machine with a closed firewall can be told, by a foreign machine, to accept connections from a specific IP. ... Read More »
Sunday, January 29, 2012
Best practices to stay safe on Facebook and avoid being hacked
As Facebook has emerged as the most popular Social Networking site (with a user base of 800 Million active users) it has also gained attention of hackers and spammers. As in the case of Windows, the more popular it is, more are the chances of it getting attacked. The reason that both Windows and Facebook are easy target is same: it has large... Read More »
Hack Networks with your mobile device
Features Hacks WEP, WPA, and WPA2 Very simple and easy to use layout Works on All Android OS phones Works on iPod Touch 1st, 2nd, 3rd, and 4th gen Works on iPhone 1st, 2nd, 3G, 3GS, 4, 4s Works on iPad 1 and iPad 2 ... Read More »
How to enable Secure HTTPS browsing in Facebook for preventing hack?
With the advancement of technology advanced are the dangers. On an unsecure wi-fi connection hacking facebook is child’s play. You might have heard of “Firesheep” add on of Firefox which enables to login in to others’ opened facebook account on the same network. Apart from that, packet sniffers can also be used to steal your password on the fly. Man in the middle... Read More »
Saturday, January 21, 2012
Microsoft Windows Remote Code Execution
VUPEN Vulnerability Research Team discovered a vulnerability in Microsoft Windows. The vulnerability is caused by a use-after-free error in the TIME (datime.dll) module when loaded via a specific behavior, which could be exploited by remote attackers to compromise a vulnerable system via a specially crafted web page. ... Read More »