Truth about facebook password hacking - How not to get hacked


You might have seen a lot of websites that offer to hack Facebook passwords, some claim to hack them using theFacebook Password Hacking & cracking – Truth about facebook password stealers - theprohack.com expertise they gained in last X years , some claim to hack it using previously existing loopholes & some say we submit it to hackers & act as brokers. Goes same for Facebook password crackers, Facebook password stealers or Facebook password cracker software ..
Type “Facebook password hacker” or “Facebook Password Stealer” in Google & see for your self. Countless results of websites who claim to hack Facebook passwords or help you to steal Facebook passwords or hack Facebook accounts.

Hack orkut, facebook any account using cookie stealer

Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Google, Yahoo, Orkut, Facebook, Flickr etc.


What is a CookieLogger?

A CookieLogger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim.

Today I am going to show How to make your own Cookie Logger…Hope you will enjoy Reading it …

Crack wifi passwords in less than 4 minutes

FUN FACTS:

-WEP stands for Wired Equivalent Privacy


-WEP is used to secure wireless networks from eavesdroppers


-WEP usually takes hours to crack



WEP has always been a long and tedious job, untill recently, when two FBI agents demonstrated how it´s possible to crack WEP in under 4 minutes (3 to be exact).

Fighting email spam (How to fight spam)

Problem: Most spam emails (and virtually all current viruses) arrive with fake sender addresses, making it difficult to notify the service provider of the person really responsible for this nuisance.



Explanation: Most spam these days is sent with a fake return address. In these cases, complaining to the administrator of the sender domain is a waste of time. You first need to figure out where the spam really came from before you can complain to the administrators of the servers involved in sending the spam to get the offenders kicked off.


Solution: The following link lets you find out which provider an IP address is assigned to.


Exploits - Bugs - Vulnerabilities


Orkut Multiple Cross Site Scripting Vulnerabilities
########################################################

XDisclose Advisory : XD100097, XD100098, XD100092
Vulnerability Discovered : November 30th 2006
Advisory Released : December 8th 2006
Credit : Rajesh Sethumadhavan

Class : Information Disclosure
Cross Site Scripting
Html Injection
Severity : Highly Critical
Solution Status : Patched/Reported to Vendor
Vendor : Google Inc
Vendor Website : http://www.orkut.com
Affected applications : Orkut Services
Affected Platform : All

########################################################


Overview:
Orkut is an Internet social network service run by Google with more than 37 million total members and nearly 1.3 million daily visitors. It claims to be designed to help users meet new friends and maintain existing relationships with pictures and messages, and establish new ones by reaching out to people you've never met before.

Description:
Orkut service is vulnerable to Cross-Site Scripting and HTML Injection and email address disclosure vulnerability. Which result in email address disclosure, stealing of cookie, IP info, refer info, browser information, clipboard content, operating system info, hardware Info, modification of page or html injection, url redirection, port scanning of the network, and even phishing is possible. This is caused due to improper validation of user-supplied inputs and improper designing of orkut portal.

1) Orkut Multiple Cross Site Scripting Vulnerabilities
A remote attacker can craft a GET request with the XSS payload as demonstrated below. When the victim clicks on the GET request the payload will get executed which result in stealing of cookie.

Privacy Attacks

Here attacker uses various automated tools which are freely available on the internet. Some of them are as follows:

1) Trojan :-
Trojan is a Remote Administration Tool (RAT) which enable attacker to execute various software and hardware instructions on the target system.

Most trojans consist of two parts -

a) The Server Part :- It has to be installed on the the victim's computer.
b) The Client Part :- It is installed on attacker's system. This part gives attacker complete control over target computer.

Netbus, Girlfriend, sub7, Beast, Back Orifice are some of the popular trojans.

 
Design by gitstein | Bloggerized by Kuldeep