Thursday, February 24, 2011
This is an extreme example of Social Engineering technique, we need following things to do so.
1. Victim’s profile link ( you can get it easily )
2. His/Her Email which he/she uses to sign in
3. His/Her birth date which he/she has used in the profile
4. Make an Email ID on gmail or yahoo with the first name and last name same as on victim’s facebook profile.
* Now you will get this...
Yes Guys, this is now possible, I’m not joking. Many of us think that this is not possible or we have to spend some money for such services but believe me that we don’t have to spend any money for getting this done. Yes, PhoneOnMap makes it possible. It’s a service that provides a free application that has to be installed in GPS cell phone and you are ready to track the phone...
Your IP is exposed when ever you visit a website,when your Ip gets exposed it becomes easy to trace you and find out your personal information,Hackers can use your Ip to gain access to your personal files and documents and even can get into your paypal,alert etc accounts,Hide the Ip is a Software which masks your IP with one click and you can surf web anonymously,on the...
http://www.ziddu.com/download/13003682/google_hack.pdf.html http://www.ziddu.com/download/13003681/Email_Spoofing.pdf.html http://www.ziddu.com/download/13003680/FTPExploitsByAnkitFadia.pdf.html http://www.ziddu.com/download/13003679/.html http://www.ziddu.com/download/13003678/DosAttacked.pdf.html http://www.ziddu.com/download/13003677/Corporate-security-excerpt.pdf.html ...
Do you’ve some important data in your USB drive that you don’t want to share with anybody? It may be some documents, username/passwords or operating systems. Then why not encrypt the USB drive data with password? And if you’re using Windows7, you don’t even need any third party software for password protecting portable drives.
Windows 7 includes a program called BitLocker...
With the sudden rise in the Internet usage across the globe over the past few years, there has also been a rise in the amount of online scams and frauds. Today most of the Internet users are unaware of the most prevailing online threats which pose a real challenge for their safe Internet usage. As a result, Online Security has become a questionable factor for the most...
If you're worried about email security, here is a step by step guide to help you check and determine if your Gmail account has been hacked or compromised in any way
Step 1: Find the 'Last Account Activity' Section Your Inbox
At the bottom of your Gmail inbox there is a 'Last Account Activity' section. Click on 'details' to launch the full blown monitor.
...

World's first hack-free software
MELBOURNE: A team of Australia's ICT Research Centre of Excellence's spinout company Open Kernel Labs (OK Labs) developed a microkernel The 'seL4' and claimed it to be the the world's first hack-free software which can protect systems from failure or malicious attacks. It is a small operating system kernel which regulates access to a computer's...
It only works on sites being hosted on Ms-IIS server. Now a days many boxes are patched so it'll not work on them !!
Steps for Xp-
open run
type-
%WINDIR%\EXPLORER.EXE ,::{20D04FE0-3AEA-1069-A2D8-08002B30309D}\::{BDEAD
F00-C265-11d0-BCED-00A0C90AB50F}
and press enter !
A new window name "WEB FOLDER" gets open
Right click and click on New, Add Web Folder then enter your vulnerable website address.
then...
Its a new type of Phishing attack!!
How The Attack Works
1. A user navigates to your normal looking site.
2. You detect when the page has lost its focus and hasn’t been interacted with for a while.
3. Replace the favicon with the Gmail favicon, the title with “Gmail: Email from Google”, and the page with a Gmail login look-a-like. This can all be done with just a little bit of Javascript that...
Now that the hacker has a full list of services running on the target system, to be able to exploit them, he has to first figure out what software and version the service is. One way the hacker can get this information, is to telnet into service port. In the example below, we will use command prompt on Windows (Start -> Run -> Type “cmd” -> Enter). If you are on a Mac, you will be using...
Subscribe to:
Posts (Atom)