• The Hacker’s Underground Handbook | ebook on hacking

    The Hacker’s Underground Handbook The Hacker’s Underground HandbookLearn What it Takes to Crack Even the Most Secure SystemsBy: David Melnichuk The Hacker’s Underground Handbook will guide you through password hacking, windows hacking, malware, phising, web hacking, network hacking and Linux...
  • How to avoid facebook scams

    v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} w\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} Normal 0 Facebook is the part of people's daily life. It's no. 1 socail networking website so it is used for spreading scams by...
  • How to find out someone's IP Address

    Finding out someone's IP address is like finding their phone number, an IP address can be used to find the general location where that person lives. Sometimes its necessary to find out an IP address in order to report an internet crime such as stalking or harrassment. The best way to find out...
  • Yahoo Messenger Shortcut Keys

    Ctrl + G – Buzzes the contact you are chatting with.Ctrl + H – Show or Hide offline contacts in main messenger Window. Ctrl + Shift + P – Open preferences window.Ctrl + M – Provides a option to send a Instant message.Ctrl + T - Provides a option to send a SMS message.Ctrl + L – Provides a option...
  • SQL Injection Hacks

    sql injection hacks Most common injection : ' OR ''=' Live example click http://fsmdc.fsm.ac.in/pgdmresult.asp now enter ' OR ''=' n watch it vomit d database.. i myself gave d CAT dis year n found almost 8 out of 10 Indian MBA college sites are vulnerable. watch full...
  • How to hack website using SQL injectio

    I want to show you just one way that hackers can get in to your website and mess it up, using a technique called SQL Injection. And then I'll show you how to fix it. This article touches on some technical topics, but I'll try to keep things as simple as possible. This article teaches to...

Thursday, February 24, 2011

This is an extreme example of Social Engineering technique, we need following things to do so. 1. Victim’s profile link ( you can get it easily ) 2. His/Her Email which he/she uses to sign in 3. His/Her birth date which he/she has used in the profile 4. Make an Email ID on gmail or yahoo with the first name and last name same as on victim’s facebook profile. * Now you will get this...
Yes Guys, this is now possible, I’m not joking. Many of us think that this is not possible or we have to spend some money for such services but believe me that we don’t have to spend any money for getting this done. Yes, PhoneOnMap makes it possible. It’s a service that provides a free application that has to be installed in GPS cell phone and you are ready to track the phone...
Your IP is exposed when ever you visit a website,when your Ip gets exposed it becomes easy to trace you and find out your personal information,Hackers can use your Ip to gain access to your personal files and documents and even can get into your paypal,alert etc accounts,Hide the Ip is a Software which masks your IP with one click and you can surf web anonymously,on the...
   http://www.ziddu.com/download/13003682/google_hack.pdf.html  http://www.ziddu.com/download/13003681/Email_Spoofing.pdf.html  http://www.ziddu.com/download/13003680/FTPExploitsByAnkitFadia.pdf.html   http://www.ziddu.com/download/13003679/.html   http://www.ziddu.com/download/13003678/DosAttacked.pdf.html   http://www.ziddu.com/download/13003677/Corporate-security-excerpt.pdf.html ...
Do you’ve some important data in your USB drive that you don’t want to share with anybody? It may be some documents, username/passwords or operating systems. Then why not encrypt the USB drive data with password? And if you’re using Windows7, you don’t even need any third party software for password protecting portable drives. Windows 7 includes a program called BitLocker...
With the sudden rise in the Internet usage across the globe over the past few years, there has also been a rise in the amount of online scams and frauds. Today most of the Internet users are unaware of the most prevailing online threats which pose a real challenge for their safe Internet usage. As a result, Online Security has become a questionable factor for the most...
If you're worried about email security, here is a step by step guide to help you check and determine if your Gmail account has been hacked or compromised in any way Step 1: Find the 'Last Account Activity' Section Your Inbox At the bottom of your Gmail inbox there is a 'Last Account Activity' section. Click on 'details' to launch the full blown monitor. ...
World's first hack-free software MELBOURNE: A team of Australia's ICT Research Centre of Excellence's spinout company Open Kernel Labs (OK Labs) developed a microkernel The 'seL4' and claimed it to be the the world's first hack-free software which can protect systems from failure or malicious attacks.  It is a small operating system kernel which regulates access to a computer's...
It only works on sites being hosted on Ms-IIS server. Now a days many boxes are patched so it'll not work on them !! Steps for Xp- open run type- %WINDIR%\EXPLORER.EXE ,::{20D04FE0-3AEA-1069-A2D8-08002B30309D}\::{BDEAD F00-C265-11d0-BCED-00A0C90AB50F} and press enter ! A new window name "WEB FOLDER" gets open Right click and click on New, Add Web Folder then enter your vulnerable website address. then...
Its a new type of Phishing attack!! How The Attack Works 1. A user navigates to your normal looking site. 2. You detect when the page has lost its focus and hasn’t been interacted with for a while. 3. Replace the favicon with the Gmail favicon, the title with “Gmail: Email from Google”, and the page with a Gmail login look-a-like. This can all be done with just a little bit of Javascript that...
Now that the hacker has a full list of services running on the target system, to be able to exploit them, he has to first figure out what software and version the service is. One way the hacker can get this information, is to telnet into service port. In the example below, we will use command prompt on Windows (Start -> Run -> Type “cmd” -> Enter). If you are on a Mac, you will be using...