Sunday 1 December 2013

Tutorial On XSS[Video]

A simple video on Cross site scripting, a website hacking technique which is used for injecting malicious javascript with the help of  browser.

Find Out Name Of Unknown Number

Now a days many prank are going over the mobile. People might be friends, enemies, relatives or anybody.
We dont know who is pranking with us. In this post i will explain to you to find out the name of the person who is pranking with you.

Google Dorks Helps Hackers To Find Passwords In Search engines

Most of the people know that, passwords of the users may be found on Google. Question arises how??
Its simple previously some body might have been hacked the passwords of them.
If you search any email address in Google , then list of sites in which your email address has been registered will be displayed on it.

Sunday 24 November 2013

Ethical Hacking Tools

Ethical Hacking , as you know protecting corporate or users from the unprotected world. Most of the companies hire people to test their product by hacking in to it. Hackers who are good are known as ethical hackers(white hat hackers) and hackers who are bad, i mean who steal credit cards, money, hack passwords for personal and commercial use are know black hat hackers.

Tuesday 15 October 2013

How I Do Social Engineering

How I Do Social Engineering

Humans non sense is the main thing for hacking lot of websites, even weak passwords also helps users to hack accounts. Due to Social Engineering many accounts are getting hacked. In order to make some sense here is a simple example , i do social engineering.

Monday 9 September 2013

How To Hack Unprotected FTP's

Google is one of the powerful search engine and every body knows that. Google helps us to find passwords with its search ability, so in order to hack unprotected and low secure FTP's passwords, this method will help out.

Sunday 8 September 2013

Brute Forcing Wordpress

IN the hacking world , brute force attack became the common answer to get the passwords, in order to crack the passwords we need to brute force.

Thursday 29 August 2013

Facebook 0day Vulnerability To Get Message From Any One

I was browsing over the internet, then i found many 0day exploits but interestingly i found out facebook 0day vulnerability. This exploit has not been reported to facebook but this is the exploit which is to be taken care of.
Watch the video and you will get to know about the vulnerability.

Friday 24 May 2013

Social engineering tips

Do you know social engineering is the best method to hack human passwords. Social engineering is easy when you know how to get passwords by hacking humans nature. 
I never found this method as hard. When I tried to social engineer by boss password , it was too easy to gain access to my boss Facebook id. 
I simply sent malicious phishing link to him. He opened the link and got phished easily. 
There are most of morons to hack in the web with this simple social engineering tip. 
In the previous tutorial I explained how to create fake pages ie phishing pages .
You can create any phishing pages with the help of simple tools in backtrack 5.
As you know Set is the tool kit used to create phishing pages .
When it comes to social engineering , you need to have good communication skills. 
Lot off leverages we get by simple human stupidity. 
Simple tips to know to do best social engineering methods are as follows 
1. Make victims to believe that you are true.
2. Transfer malicious links in undoubted way.
3. Run a metasploit in a proper way , Sk that victim does not know our malicious nature.
4. Be creative while sending malicious links . 
5. Send emails in a genuine format.
6. Don't give up until you get password.

Friday 29 March 2013

VLC Media Player Trick

 Most of the people does not now what is vls media player trick. If you know no body will search for this trick.mostly you end up here because you are searching for that trick. So forget about that lets get in to this trick.

Enabling God Mode In Windows

In the following tutorial i will show you how to enable god mode in your windows machine.
By enabling god mode you will have complete access to the windows settings. To enable this god mode follow this tutorial.

How To Hack People Who Use Roboform

Hacking people is really fun , only thing is to target the user and get the passwords. This is too main stream for hackers. So in order to hack the passwords, we should know some knowledge about the coding stuff. So forget all these now start hacking  and stop blabbering.

How To Make Web Browser As Text Editor

Make your web browser as text editor , have ever wondered making your wb browser as text editor?
IF not then follow this simple tutorial on making your web browser as text editor.

Thursday 28 March 2013

How To Hack WEP Wifi

This is video tutorial for the users to hack the wifi network which are using WEP networks.

Saturday 2 March 2013

What is ARP Spoofing?

What is ARP Spoofing?

ARP(Address Resolution Protocol) Spoofing is a method where attacker sends fake(ARP) messages in wired or wireless LAN(Local Area Network).

ARP Poisoning With Cain[video]

ARP Poisoning With Cain

Cain can sniff passwords in the network, watch this video to sniff passwords with cain.

Friday 1 March 2013

Useful Commands In Backtrack

Backtrack is a hacking linux, as most of the people do know about it right. So basically backtrack is powerful and useful linux for security researchers. Security researchers always penetrate in to web applications and find vulnerabiltis in an application. In order to use Backtrack Linux these commands will be helpful to you.

How To Upload A Shell In Web Applications

How To Upload A Shell In Web Applications

Most of the people will exploit servers with file upload vulnerability , as it is very simple to find out this exploit by an simple dork