Most people are comfortable with the idea of installing anti-virus software and security programs on their home PC in order to ward off hackers and malicious code. But with the rise of smart-phone technology people have become complacent about the safety of the personal information that they carry around on the multi-tasking device in their pockets. You have to think of a smart... Read More »
Thursday, February 2, 2012
Wednesday, February 1, 2012
How to Hack Website database using XPath tech?
Everyday many website gets hacked by hackers but most of the hackers are hacking those website just for popularity nothing else. Today i am writing this tutorial on XPath Injection, in which i will explain you, How Hackers Hack Website Using XPath Injection. M4ERRHCQZ2PY In a typical Web Application architecture, all data is stored on a Database server. This Database server store data... Read More »
Web Security Scanner For Windows (32 bit & 64 bit)
Vega is a GUI-based, multi-platform, free and open source web security scanner that can be used to find instances of SQL injection, cross-site scripting (XSS), and other vulnerabilities in your web applications. Vega also includes an intercepting proxy for interactive web application debugging. Vega attack modules are written in Javascript, users can easily modify them or write their own. This is the Windows... Read More »
Exploiting a cross-site scripting vulnerability on Facebook
Take a walk through most workplaces and you will surely notice someone browsing a social networking site. No wonder that website popularity services like Alexa rate Facebook the second most visited website after Google and before Youtube! We trust these websites to reflect the public image that we want to portray and sometimes even trust with secrets. A single cross-site scripting vulnerability allows... Read More »
Linux Rootkit 2012
KBeast (Kernel Beast) 2012 is a Linux rootkit that hides the loadable kernel module, hides files and directories, hides processes, hides sockets and connections, performs keystroke logging, has anti-kill functionality and more. ... Read More »
How to tracks IPs in log files and executes shell commands per each IP?
Here is a PHP script that tracks IPs in log files and executes shell commands per each IP. It was created as a sort of reverse fail2ban or cheap VPN-firewall: a machine with a closed firewall can be told, by a foreign machine, to accept connections from a specific IP. ... Read More »