Friday 29 March 2013

VLC Media Player Trick

 Most of the people does not now what is vls media player trick. If you know no body will search for this trick.mostly you end up here because you are searching for that trick. So forget about that lets get in to this trick.

Enabling God Mode In Windows

In the following tutorial i will show you how to enable god mode in your windows machine.
By enabling god mode you will have complete access to the windows settings. To enable this god mode follow this tutorial.

How To Hack People Who Use Roboform

Hacking people is really fun , only thing is to target the user and get the passwords. This is too main stream for hackers. So in order to hack the passwords, we should know some knowledge about the coding stuff. So forget all these now start hacking  and stop blabbering.

How To Make Web Browser As Text Editor

Make your web browser as text editor , have ever wondered making your wb browser as text editor?
IF not then follow this simple tutorial on making your web browser as text editor.

Thursday 28 March 2013

How To Hack WEP Wifi

This is video tutorial for the users to hack the wifi network which are using WEP networks.

Saturday 2 March 2013

What is ARP Spoofing?

What is ARP Spoofing?

ARP(Address Resolution Protocol) Spoofing is a method where attacker sends fake(ARP) messages in wired or wireless LAN(Local Area Network).

ARP Poisoning With Cain[video]

ARP Poisoning With Cain

Cain can sniff passwords in the network, watch this video to sniff passwords with cain.

Friday 1 March 2013

Useful Commands In Backtrack

Backtrack is a hacking linux, as most of the people do know about it right. So basically backtrack is powerful and useful linux for security researchers. Security researchers always penetrate in to web applications and find vulnerabiltis in an application. In order to use Backtrack Linux these commands will be helpful to you.

How To Upload A Shell In Web Applications

How To Upload A Shell In Web Applications

Most of the people will exploit servers with file upload vulnerability , as it is very simple to find out this exploit by an simple dork