Feb 27, 2011

Making a Blog-COmpleTe BlogSpot Tutorial

Many of us want a dashing and attractive blog.But some are unable to make it..This is a wanted tutorial by RKG bro aka RAVI...Leeme go ahead... 1- Go to www.blogspot.com and sign in with your google account details..In my case i will use my secondary id 2-You will see a window like below then put your details there.. Click on continue... 3- You will be in your dash board ... Then click on the button "CREATE YOUR BLOG NOW" 4- then give your...

Feb 26, 2011

SQLi | LFI | XSS | ShEll UpLoad - Vulnerable site scanner

This is a great tool i find that scans for SQLi | LFI | XSS | ShEll UpLoad vulnerable websites.I used this software when i went to practice now i don't use it any more. Then follow the procedure how to scan it .... Pic below Hope you understand..any queries do reply :) Download here - http://www.multiupload.com/87MMECTG0Y Here are 2 sites i got with some other dorks NOTE-Don't leech it..            This is...

Feb 24, 2011

Xsser 1.5 - Web Penetration testing tool

XSSer 1.5 is the  BETA release of XSSer version 1.0.The author has named this version as the “Swarm Edition“. Why it is used? XSSer is a Web penetration testing tools that comes handy and helps in the process of detecting and exploiting XSS injections against different applications. This tool have several options to try to bypass certain filters,and various other options for the web penetration tester The update version have many improved...

Feb 23, 2011

~~Netstat and Ping Command~~DEtailEd with pictures

In this article i will introduce the basic commands that will be used in our further articles about network hacking..So lets start on 1-NETSTAT-It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc.  netstat [-a] [-b] [-e] [-f] [-n] [-o] [-r] [-s] [-t] [-v] [-p proto] [interval] These are the commands  now their uses -a Displays all connections...

Feb 21, 2011

Using Google - The hackers way

Every one know how to use Google..Even a child sits in front of the computer and Google his searches.But as I am teaching hacking here so i will Make you aware about some of the important Google DORkS That every hacker should know. What is a Google dork ? Let us type ext:pdf(ppt,doc anything you want) hacking we get something like this We get the particular type of file as we wanted that is .pdf .. Now lets move on to next.. -DORKS- 1-intitle...

Feb 20, 2011

Fake Hits Generator | Traffic Creator

Creating a website and not getting traffic :( ... So sad...Now I am gonna show how to boost up your website traffic.. For this you need i)Free Traffic for Life!.By Tukanas ii)fresh proxies every day iii)Your website iv)A brain How the whole thing works? When you switch from one proxy to another then the website recognizes you as a different visitor who is browsing the forum OR blog.You cannot do this manually..So this software Changes proxy and...

Feb 18, 2011

Making a ARP Poisoning Attack

Address Resolution Protocol (ARP) poisoning is a type of attack where the Media Access Control (MAC) address is changed by the attacker.  Also, called an ARP spoofing attacks, it is effective against both wired and wireless local networks.  Some of the things an attacker could perform from ARP poisoning attacks include stealing data from the compromised computers, eavesdrop using man-in-the middle methods, and prevent legitimate access...

Feb 16, 2011

A Complete Tutorial On XSS (cross site scripting)

Welcome To another lesson in which i will be covering XSS.. Table Of Contents What is XSS? Finding XSS Vulnerabilities The Basics On XSS Deface Methods Cookie Stealing Filtration Bypassing ___________________ What is XSS? 'XSS' also known as 'CSS' (Cross Site Scripting, Easily confused with 'Cascading Style Sheets') is a very common vulnerbility found in Web Applications, 'XSS' allows the attacker to INSERT malicous code,There are many types...

Page 1 of 3512345Next

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More