Mar 28, 2011

Facebook Flaw - SMS spoofing

First Let us know what is Sms spoofing ...... SMS spoofing is a relatively new technology which uses the short message service (SMS), available on most mobile phones s, to set who the message appears to come from by replacing the originating mobile number (Sender ID) with alphanumeric text. There are many SMS spoofing sites available in the internet.For this tutorial i am gonna use  !!SMS GLOBAL!! just go to the site and register in...

Mar 26, 2011

___The webDAV___

  webDAV also known as Web-based Distributed Authoring and Versioning is a set of methods based on the Hypertext Transfer Protocol (HTTP) that facilitates collaboration between users in editing and managing documents and files stored on World Wide Web servers.For more info go here Detection , Vulnerability checking and Exploitation The first thing one should know about this vulnerability is that the IIS server is not exploitable if the...

Btutus - The Brute Forcing Tool

- Intro - 1.What is Brutus? Brutus is a well known and smart brute forcing tool.It is used by hackers/cr@(kers to brute force login passwords 2.What can you do with it? We can use it to bruteforce password for HTTP, FTP, POP3, Telnet, SMB (Netbios), Netbus, etc ... Download from = http://www.multiupload.com/1W36PPEEYN  password  - hackingclass Password List - Google It or go here Understanding Brutus  Time For some...

Mar 19, 2011

Steganography - The Art Of Hiding Secret Message

Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and the receiver can know it . In simple words you can say it is a art to Hide our data.To know more about this visit This. What is the difference between encryption and Steganography? In encryption the attacker may know that two people are communicating with eachother secret way  If you use stegenography technique no one...

Mar 13, 2011

◄---- Zombie computers ---►

What are zombie computers?  Lets see if you can get it through this picture...This is only a example diagram to only make you understand....   Now let me explain you this in words.. A zombie computer is a system  which is either hacked or compromised by the Hacker without the knowledge of the owner.The computer can be remote operated by the hacker to commit crimes using the compromised computer...The remote user controls the...

Mar 8, 2011

Mozilla Firefox - The hacker's choice

The security testers or the hackers have a lot of tool to play around with . But what if Your browser helps you in this ? The magical browser is Mozilla Firefox and the extensions/add-ons developed by the professional ethical hackers and penetration testers.. In this article i will tell you some of the best add-ons of all time that hacker  uses.... Download Firefox from Google Now back to topic Social engineering add-on People Search...

Mar 7, 2011

Local File Inclusion ( L F I )

In this article i will explain you the web exploitation technique "Local File Inclusion".... What make a website Vulnerable to LFI ? A piece of PHP code makes a website vulnerable to LFI..Lets look at this code $page = $_GET[page]; include($page); ?> This code must not be used anywhere in a php script.Because the $page isn’t sanitized and is passed directly to the webpage, but unfortunately This code can be get many times in many popular...

Mar 3, 2011

WebSecurify-Web Penetration testing tool

If you own  a website you also have to look after it's security to check if your website is vulnerable to some of the famous flaws like SQLI and XSS .. Even script kiddies or a noob can Hack your websites if it is vulnerable to these flaws using some kiddie tool..That is not a big deal for them You can check the if the Your website is vulnerable manually ... But it is a waste of time for you all guyz..This tool will help you in doing so without...

Mar 2, 2011

Reiluke Tool Collection

Hello!all..How are You?...I got this tools Collection today.It is really a awesome Collection of tools made by Reiluke.. This pack contains Some of the hottest tools... 1-Admin Page Finder 2-Blind Sql injector 3-Cpanel Bruteforcer 4-Duplicate File Remover 5-Email Bruteforcer(Yahoo\Gmail/Hotmail) 6-Email Checker 7-RapidShare Checker 8-sqli helper (Sqli injection tool)  I will give it's tutorial some day... 9-Exploit Scanner 10-Sqli...

Page 1 of 3512345Next

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More