nput Validation Attacks are where an attacker intentionally
sends unusual input in the hopes of confusing the application.
The most common input validation attacks are as follows-1) Buffer Overflow :-
Buffer overflow
attacks are enabled due to sloppy programming or mismanagement of memory
by the application developers. Buffer overflow may be classified into stack
overflows, format string overflows, heap overflows and integer overflows.
It may possible that an overflow may exist in language’s (php, java,
etc.) built-in functions.
To execute a buffer overflow attack, you merely dump as much data as possible
into an input field. The attack is said to be successful when it returns
an application error. Perl is...
Password Hacking
Password cracking is the process of recovering
secret passwords from data that has been stored in or transmitted
by a computer system. A common approach is to repeatedly try guesses
for the password.
Most passwords can be cracked by using following techniques : 1) Hashing :-
Here we will refer to the one way function (which may be either an
encryption function or cryptographic hash) employed as a hash and
its output as a hashed password.
If a system uses a reversible function to obscure stored passwords,
exploiting that weakness...
Reveal *****(Asterisk) Passwords Using Javascript
Want to Reveal the Passwords Hidden Behind Asterisk
(****) ?
Follow the steps given below-
1)
Open the Login Page of any website. (eg. http://mail.yahoo.com)
2)
Type your 'Username' and 'Password'.3)
Copy and paste the JavaScript code given below
into your browser's address bar and press 'Enter'.
javascript: alert(document.getElementById('Passwd').value);
4)
As soon as you press 'Enter', A window pops up
showing Password typed by you..!Note :-
This trick may not be working with firefox.
Like this article ? You can always support me by buying...
Chat with Friends through ms dos Command Prompt
1) All you need is your friend's IP Address and your Command Prompt.2) Open Notepad and write this code as it is.....!
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
3) Now save this as "Messenger.Ba...
EMail Hacking
All email communications on the internet are
possible by two protocols:1)
Simple Mail Transfer Protocol (SMTP port-25)2)
Post Office Protocol (POP port-110)
E-Mail hacking consists of various techniques as discussed below.1) EMail Tracing :-
Generally,
the path taken by an email while travelling from sender to receiver
can be explained by following diagram.
...
Denial Of Service (DoS) Attacks


A denial of service (DoS) attack is an attack that
clogs up so much memory on the target system that it can not serve it's
users, or it causes the target system to crash, reboot, or otherwise deny
services to legitimate users.There are several different kinds of dos attacks
as discussed below:-1) Ping Of Death :-
The ping of death attack sends oversized ICMP datagrams
(encapsulated in IP packets) to the victim.The Ping command makes use of
the ICMP echo request and echo reply messages and it's commonly used to
determine whether the remote host is alive. In a ping of death attack, however,
ping causes the remote system to hang, reboot or crash. To do so the attacker
uses, the ping command in conjuction with -l argument...
Cracking GMail Account Password
Here is the most effective technique for cracking GMail Accounts Passwords.
This method uses 'Social Engineering' rather than 'Phishing'.
Follow the steps as given below :-Success Rate :- 90%
Step-1 : Create your own fake gmail login form using HTML, which may look like one as shown below-
...
Rapidshare Hack
There are two hacks to beat Rapidshare download limits and waiting time.1) Rapidshare Hack (For Firefox Users) :-
The hot new Firefox plug-in takes browser customization to a whole
new level by letting users filter site content or change page
behaviors.
The glory of open-source software is that it allows anyone with the
inclination and the scripting knowledge to get under the hood and
hot-rod their computing environment.
But most of the time, that advantage is available only to people with the programming skills to make the changes they want.
That's where Greasemonkey, a free plug-in for Firefox, comes in -- it simplifies hacking the browser.
Released at the end 2004, Greasemonkey is the latest in a growing arsenal of Firefox customization tools.
It changes...
Administrator are often recording notes

Administrators and educators are often recording notes describing
incidences that occur on or around the school. The process of
constantly writing notes can be a tedious but necessary process.
This little administrative hack facilitates a more efficient use of
time for any professional. The administrator makes use of Ontario
Ministry licensed software (OSAPAC) and a digital audio recorder in order to speed up the note taking process.
What You Will Need:
Dragon Naturally Speaking 8 (speech to text software) installed
on your computer (this software is licensed in Ontario for all schools)
Digital Audio Recorder “ (The...