Automatic SQL Injection Tool – SQLMAP

Sqlmap is an open source command-line automatic SQL injection tool and its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user’s specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit...

Flash Tutorial Links

Most of the times I have been intrigued by the quality of flash based games and animations which appear on net and dazzle the netizens.I always thought of learning Adobe Flash (previously Macromedia flash) and to create my own animations and games. However,due to lack of good tutorials I wasn’t able to learn much about it and my bandwidth don’t permits me to download all the video tutorials the deviants of flash had to offer.So I have compiled a list of tutorials and resource website which offer fantastic flash resources and tutorials for those who crave for them. I found these flash actionscript tutorials while stumbling across the net.Many...

NSDECODER – automatic Malware detection tool

Nosec has introduced NSDECODER which is a automated website malware detection tools. It can be used to decode and analyze weather the URL exist malware. Also, NSDECODER will analyze which vulnerability been exploit and the original source address of malware. Functionality Automated analyze and detect website malware. Plenty of vulnerabilities. Log export support HTML and TXT format. Deeply analyze JavaScript.  ...

Make a simple Trojan in VB

Visual Basic is an easy programming language.So easy that most of advanced programmers don't even compare it to behemoths like C/Pascal/C++/PERL etc.But it seriously packs punch due to its ease in programming and predefined procedures.Earlier wrote on how to lock keyboard and mouse using VB. This time I will be discussing on how to write a simple trojan in VB .Writing a Trojan is a lot easier than most people think. All it really involves is two simple applications both with fewer than 100 lines of code. The first application is the client or the program that one user knows about. The second is the server or the actual “trojan” part. I will...

Hide Your Files In A JPEG

Well, did you know you could hide your files in a JPEG file? For this, you will only need to download WinRAR. You just need to have a little knowledge about Command Prompt and have WinRAR installed. Ok, lets begin… 1.    Gather all the files that you wish to hide in a folder anywhere in your PC (make it in C:\hidden - RECOMMENDED). 2.    Now, add those files in a RAR archive (e.g. secret.rar). This file should also be in the same directory (C:\hidden). 3.    Now, look for a simple JPEG picture file (e.g. logo.jpg). Copy/Paste that file also in C:\hidden. 4.    Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden. 5.    Now type: “COPY /b logo.jpg + secret.rar output.jpg”...

Favorite timepass – bashing charlatans at Attrition.Org

While I am not messing up with my pc, watching AVGN, or reading wikipedia, I prefer to be at Attrition.Org which in my opinion is the best place to hangout after any LUG. For those who don't know about Attrition.Org, its basically a “hobby site” that focuses on computer security and mocks the revered security researchers who are basically frauds with illiterate whoring media on their sid...

HACK ANY COMPUTER WITH JUST AN IP!

llo Hello everybody! I am here to show you this magical tool called Metasploit that allows you to hack ANY unpatched computer with only it's IP. Lets begin...1.) First you need to download Metasploit. The most up-to-date version is FREE at metasploit.com.2.) You need PostgrSQL for your database. Download here:http://www.postgresql.org/. Make sure you use all the defaults or Metasploit woun't work!3.) Now lets get down to buisness... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III). Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...

Setting up your computer for hacking

You have to collect some of the tools, Operating System & documentation on your PC with a very clear format. Operating System: Which OS to use, choice is all yours. Windows in all cases is not so ‘made for hacking’ according to me. Whatever XP,Vista or windows 7. They are all just OS which are made for novice public which can learn computer...

Hack orkut, facebook any account using cookie stealer

Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Google, Yahoo, Orkut, Facebook, Flickr etc. What is a CookieLogger? A CookieLogger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim. Today I am going to show How to make your own Cookie Logger…Hope you will enjoy Reading it...

Crack wifi passwords in less than 4 minutes

FUN FACTS: -WEP stands for Wired Equivalent Privacy -WEP is used to secure wireless networks from eavesdroppers -WEP usually takes hours to crack WEP has always been a long and tedious job, untill recently, when two FBI agents demonstrated how it´s possible to crack WEP in under 4 minutes (3 to be exact). Here is how they did i...

Keep Files Private

Keep Files Private If you want to encrypt the contents of an individual file or directory, Windows XP Pro will do the trick, provided you enable NTFS on your hard drive. To encrypt a file, right-click on it to bring up the Properties window. Click on the Advanced button, then in the Advanced Attributes dialog box click on Encrypt contents to secure data. This will encrypt the file (using either DES, which employs a 56-bit key on each 64-bit block of data, or 3DES, which uses a 56-bit key three times on each 64-bit block of data), and it will provide a certificate just for you. This certificate is key; if you reinstall Windows or otherwise lose your user account, your access to the encrypted files will be gone, too. You need to export your certificates to back them up: For detailed instructions,...

wifi laptop Hotspot

Hello Folks found this interesting article on internet do tell me whether it works or not. This article will help you convert your Windows XP and Vista based laptop in a Wireless HotSpot. One you setup your laptop as HotSpot then you do not need a router, switch, hub, etc… to form a network, in fact other laptops or PC’s can connect or access the internet through this newly created HotSpot What do I need to set a HotSpot? 1. Active Cable Internet 2. Laptop 3. WiFi on Laptop 4. Wired net connectio...
Page 1 of 7512345Next

 
Design by gitstein | Bloggerized by Kuldeep