Tuesday, 26 June 2012

How To Identify An Hash in Backtrack

How To Identify An Hash in Backtrack


The passwords which are stored in database are stored by an encryption. In order to crack the hsh we need to identify the hash . There are different kinds of encryption algorithm like md4,md5,sha1 etc.,

Friday, 22 June 2012

How To Download Videos From Terminal

How To Download Videos From Terminal


In windows you can easily download videos by using an applications directly but the linux is different but the most  easy part to download videos is by terminal.

Tuesday, 19 June 2012

SQL Post Vulnerability Found In Google And Facebook

SQL Post Vulnerability Found In Google And Facebook


SQL injection has been found on Google and Facebook . The vunerability has found by one of the inj3ct0rs crew and they also posted proof of concept.

Install Ubuntu Software Center For Backtrack5

Install Ubuntu Software Center For Backtrack5


In Backtrack 5 , there is no Ubuntu Software Center , To install Ubuntu Software Center here is the following tutorial.

How To Install Angry IP Scanner In BT5

How To Install Angry IP Scanner In BT5 


There are many tools provided in Backtrack but the tools are command line tools where we must use commands for that. We all know hackers use Linux OS, so we hackers love terminals too but in Backtrack we dont have GUI ip scanner so we scan ip's by angry ip scanner application.

SQLInjection Tool For Windows

SQLInjection Tool For Windows

Download SQL Injection tool for windows, this tool helps you to attack an website by blind SQL Injection. Even though its very easy to use as every one can use it.

Thursday, 14 June 2012

How To Use Metasploit Framework

How To Use Metasploit Framework

Metasploit framework is an one of the famous framework which is used exploiting the machine on the internet.
This framework is biggest framework with more exploits on the internet.
It contains different types of exploits from Front-End to Back End.

Most Commanly Used Hacker's Language

Most Commanly Used Hacker's Language

Hackers use their own language to speak for them selves and create the tools according to their programming language and also their own language for showing their names online.

How To Use SQLmap For SQL Injection

How To Use SQLmap For SQL Injection

Now a days most of us think that sql injection is not working , but the thing is sql injection is working ofr the most of sites now a days.