tag:blogger.com,1999:blog-58085307522001420572024-03-28T02:35:17.622-07:00Ethical Hackingadminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.comBlogger123125tag:blogger.com,1999:blog-5808530752200142057.post-35211450337918889912018-12-21T18:21:00.001-08:002018-12-21T18:21:01.850-08:00Hacking Whatsapp With Kali Linux<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
Hacking whatsapp is the major thing these days as every one are on whatsapp and information on whatsapp is crucial for business and personal use. Whatsapp is an app which is used for real time communication between the users by providing unique id (phone number).<br />
<a name='more'></a><br />
The real time communication helps people to text, call and video chat through application.<br />
The following information which we provide must only use for learning purposes and to to find exploits in an apps.<br />
<br />
</div>
<iframe allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="" frameborder="0" height="480" src="https://www.youtube.com/embed/cq6uP-DFdLo" width="653"></iframe></div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com39tag:blogger.com,1999:blog-5808530752200142057.post-53968272844249956872018-12-21T17:56:00.000-08:002018-12-21T17:57:39.771-08:00List Of Best Google Dorks To Find Juicy info<div dir="ltr" style="text-align: left;" trbidi="on">
Its been so long that i havent been posted on my blog.<br />
I am developing so much stuff so i couldn't focus much on my blog, so these days exploiting servers, people and their passwords became relatively too easy. Social engineering became easy with dumb users and for clever ones its quite sort of hard.<br />
Back to post now, i am providing list of dork which will display passwords, admin names, usernames, vulnerable directories etc., list goes as follows.<br />
<br />
<a name='more'></a><br /><br />
<b>
inurl:wp-config.bak </b><br />
<br />
Dork is used to find the useful data of wordpress cms, as 70% of internet is powered by php and wordpress, so this dork helps to find the usernames and passwords in wp-config.bak file<b>.</b><br />
<b><br /></b>
<b><br />inurl:"trello.com" and intext:"username" and intext:"password"</b><br />
<b><br /></b>
The above dork is used to find juicy info like usernames and passwords from trello website. You may find useful.<br />
<br />
<b></b>
<b>intext:password "Login Info" filetype:txt</b><br />
<br />
The above dork displays lot of information, its better you find out by searching the information and juicy stuff.<br />
<br />
<b>"index of /" authorized_keys</b><br />
<br />
helps to find authorized_keys ssh and some rsa files in a server<br />
<br />
<b> "password.xlsx" ext:xlsx</b><br />
<br />
The followng dork is used to find excel files which containing passwords from google search engines<br />
<br />
<br />
<b>inurl:wp-config-backup.txt</b><br />
<br />
You can see username and password of wordpress database by this dork, try this dork. It will help you to secure your server if youre using the wordpress<br />
<br />
<b>inurl:/host.txt + filetype:txt + "password"</b><br />
<br />
The following dork helps to find host, usernames and passwords of website, take a look at it and happy hacking.<br />
<br />
<b> </b><br />
<b></b><br />
There are many more dorks available in the internet where you can get lot of juicy information. I found these dorks are good example for learning google search exploit finding<br />
<b></b></div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com56tag:blogger.com,1999:blog-5808530752200142057.post-65634019865679637732015-07-02T16:14:00.000-07:002015-07-02T16:25:36.693-07:00Find ajax calls fields in your web browser<div dir="ltr" style="text-align: left;" trbidi="on">
most of the coders don't know,how the values are updated to database, but when you make an ajax call it will show in your browser.<br />
For example if i do any change which was directed by ajax function then script automatically sends data to database.<br />
<a name='more'></a><br />
This is image when we does not make ajax call.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGuFsljbJdSqPhpiprxeRX1ZY2cMDh9x-1rfaur8oCh0hm5RPBfJscn1mEZGEjsyl0RnCycuJxECIGijZMiIH53vKsZTaf2GKtp3riM_hvpPufgH_oU7zMQzyEfrJReIFhI-44j2KWjgc/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="185" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGuFsljbJdSqPhpiprxeRX1ZY2cMDh9x-1rfaur8oCh0hm5RPBfJscn1mEZGEjsyl0RnCycuJxECIGijZMiIH53vKsZTaf2GKtp3riM_hvpPufgH_oU7zMQzyEfrJReIFhI-44j2KWjgc/s320/1.png" width="320" /> </a></div>
<div class="separator" style="clear: both; text-align: left;">
This is the image when we make an ajax call.</div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVzalhLnmfQCl9h0zPc7jftK56S5eupzP7L_1_Dxr-uLL1ew2peCv0hf03A6M045NLiShLhtLzXFraupzXbVA1gmjz9GhMVHwtvuoljgomlZj_DGCJe_GYgDQb6MbD4ny8zLXqSUCusi0/s1600/2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="138" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVzalhLnmfQCl9h0zPc7jftK56S5eupzP7L_1_Dxr-uLL1ew2peCv0hf03A6M045NLiShLhtLzXFraupzXbVA1gmjz9GhMVHwtvuoljgomlZj_DGCJe_GYgDQb6MbD4ny8zLXqSUCusi0/s320/2.png" width="320" /></a></div>
<br /></div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com22tag:blogger.com,1999:blog-5808530752200142057.post-16729377371830031412013-12-13T03:44:00.000-08:002013-12-13T03:44:05.457-08:00Exploiting Server Tutorial<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<br /></div>
A simple tutorial on exploiting the server.
<br />
<a name='more'></a><iframe allowfullscreen="" frameborder="0" height="300" src="//www.youtube.com/embed/U00D2GslDsU?feature=player_detailpage" width="440"></iframe></div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com16tag:blogger.com,1999:blog-5808530752200142057.post-29955236593845438132013-12-01T10:04:00.004-08:002013-12-01T10:04:54.080-08:00Tutorial On XSS[Video]<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
A simple video on Cross site scripting, a website hacking technique which is used for injecting malicious javascript with the help of browser.<br />
<br />
<a name='more'></a><br /><br />
<br /></div>
<iframe allowfullscreen="" frameborder="0" height="310" src="//www.youtube.com/embed/OVLz6RgOjIY" width="454"></iframe></div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com4tag:blogger.com,1999:blog-5808530752200142057.post-40005736240975572562013-12-01T05:29:00.001-08:002013-12-01T05:29:03.114-08:00Find Out Name Of Unknown Number<div dir="ltr" style="text-align: left;" trbidi="on">
Now a days many prank are going over the mobile. People might be friends, enemies, relatives or anybody.<br />
We dont know who is pranking with us. In this post i will explain to you to find out the name of the person who is pranking with you.<br />
<a name='more'></a><br />
Actually this is so simple to find out the person name by visiting to <a href="http://www.truecaller.com/" target="_blank">Truecaller</a>.<br />
True caller is an app which helps us to find out the numbers which are provided in their directory. If you install this app on your mobile which has internet, then you can easily find out a person name who is pranking with you.<br />
<br />
All you have to do is go truecallers website or to have a true caller app on your mobile.<br />
<br />
Enter the number in true caller you will get the person's name of an unknown number.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjm6yk6hXu3FmukA5aKadPwKa9tGl5RdmOkWXUnFeXAYNNpkgrvEOk8deJ46JCrYmeQs0jnwc9_q_R1Q59h6hcjCROl9ltNi2BCC_DZkQ2VG9b3cVtXBPjHtheEuykjZyCOz7N-BhosEEs/s1600/Truecaller+++Global+phone+directory.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="165" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjm6yk6hXu3FmukA5aKadPwKa9tGl5RdmOkWXUnFeXAYNNpkgrvEOk8deJ46JCrYmeQs0jnwc9_q_R1Q59h6hcjCROl9ltNi2BCC_DZkQ2VG9b3cVtXBPjHtheEuykjZyCOz7N-BhosEEs/s320/Truecaller+++Global+phone+directory.png" width="320" /></a></div>
<br /></div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com14tag:blogger.com,1999:blog-5808530752200142057.post-28884147934923341532013-12-01T04:12:00.001-08:002013-12-01T04:12:12.370-08:00Google Dorks Helps Hackers To Find Passwords In Search engines<div dir="ltr" style="text-align: left;" trbidi="on">
Most of the people know that, passwords of the users may be found on Google. Question arises how??<br />
Its simple previously some body might have been hacked the passwords of them.<br />
If you search any email address in Google , then list of sites in which your email address has been registered will be displayed on it.<br />
<a name='more'></a><br />
<br />
Most of the people like bloggers use this technique for getting mails of the users who are active in internet and do some malicious activity to them by sending phishing or by spamming. Google is too powerful for security researchers to undergo any process of hacking.<br />
<br />
Dorks are nothing but queries of Google which help you get information, passwords, data etc., in security point of view. When you query out any dork in Google, you will get list of sites with information, it may be passwords, data,texts, audios and my be videos too.<br />
I dont want to prolong too much about this, so in order to find out passwords here is the list of dorks which help you get passwords online. Simple query it in Google , you will find the passwords.<br />
<br />
ext:sql intext:@gmail.com intext:password<br />
site:github.com inurl:sftp-config.json<br />
filetype:config inurl:web.config inurl:ftp<br />
<br />
and the complete list can be found<a href="http://www.exploit-db.com/google-dorks/9/" target="_blank"> here.</a><br />
<br />
<br /></div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com138tag:blogger.com,1999:blog-5808530752200142057.post-37132291936269843002013-11-24T01:36:00.002-08:002013-11-24T01:36:55.418-08:00Ethical Hacking Tools<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
Ethical Hacking , as you know protecting corporate or users from the unprotected world. Most of the companies hire people to test their product by hacking in to it. Hackers who are good are known as ethical hackers(white hat hackers) and hackers who are bad, i mean who steal credit cards, money, hack passwords for personal and commercial use are know black hat hackers.<br />
<a name='more'></a></div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
<br /></div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
So in order to hack we need some of the tools to play around. Here are the listof tools which comes handy for the hackers to use. But i suggest you to use Backtrack Linux or Kali Linux, as linux is most used operating system by hackers.</div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
Lets jump in to handy tools for hackers.</div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
<br /></div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
1.<span class="Apple-converted-space"> </span><a href="http://www.oxid.it/cain.html" style="color: #1155cc;" target="_blank">Cain & Abel:</a></div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
<br /></div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
Cain is one of the awesome tool which is used for cracking passwords, networking sniffing, MITM(Man In The Middle Attack) and many more attacks. With the help of this tool we hackers mostly sniff networks and crack simple passwords of windows, MD5 etc.,</div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
If you want some serious action of hacking scene then use this tool. It is real handy tool for hackers. As it is not supported in Linux you must Install It by Wine in Linux.</div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
<br /></div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
2.<span class="Apple-converted-space"> </span><a href="http://ettercap.github.io/ettercap/" style="color: #1155cc;" target="_blank">Ettercap</a>:</div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
<br /></div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
Ettercap is my favorite tool which is used for network sniffing and man in the middle attacks. With the help of this tool i hacked many networks. When i log in my PC , i do attack entire network and i do sniff many passwords with the help of this tool. I recommend to use this tool of educational purposes. This tool can hack Yahoo, Google , Msn passwords by sniffing in to their networks. </div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
There is a little disadvantage of this tool, we cannot use this in windows, it only supports linux. Dont forget to use Ettercap for hacking networks, i almost hacked 1,00,000 of my network account.</div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
<br /></div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
3. <a href="http://nmap.org/" target="_blank">Nmap:</a></div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
<br /></div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
Nmap as you know famous tool for scanning networks , i mainly use nmap for exploiting loop hole , reverse ip, mail servers, FTP's and etc., Nmap is really handy tool for scanning part. Best part of nmap is that it supports windows and linux.</div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
<br /></div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
4. <a href="http://www.wireshark.org/download.html" target="_blank">WireShark</a>:</div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
<br /></div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
Wireshark is famous tool which is used for Complete Network sniffing, it sniff each and every packet of the network. Wireshark helps us to detect each and every detail of the packet from where it is getting from and where it going to. These packets play crucial role in network sniffing.</div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
<br /></div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
5.<a href="https://www.trustedsec.com/downloads/social-engineer-toolkit/" target="_blank"> SET</a>:</div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
<br /></div>
<div style="-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
SET is known as social engineering tool kit, which is used for phishing purposes, this is one of the best app for phishing. In backtrack, SET is built in so there is no need to install it again.<br />
<br />
<br /></div>
</div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com6tag:blogger.com,1999:blog-5808530752200142057.post-32670349369933925232013-10-15T10:44:00.000-07:002013-10-15T10:44:16.488-07:00How I Do Social Engineering<div dir="ltr" style="text-align: left;" trbidi="on">
<b>How I Do Social Engineering</b><br />
<br />
Humans non sense is the main thing for hacking lot of websites, even weak passwords also helps users to hack accounts. Due to Social Engineering many accounts are getting hacked. In order to make some sense here is a simple example , i do social engineering.<br />
<a name='more'></a><br />
<br />
1. I ll give a call or ping up my friend, who is amateur who don't know about hacking or phishing. <br />
2. Next i will send him a simple link for download or to get cookies, which i made with set(Social Engineering Tool Kit).<br />
3. When a victim clicks the link, his browser cookies are stored on to my terminal.<br />
4. Next thing i do is session hijacking.<br />
<br />
This is the simple procedure, i use to hack victims by social engineering.<br />
Above is the simple scenario, when i want to hack anyone which i have physical access to it.<br />
<br />
I will explain a scenario , i created a metasploit shell and executable which i stored in my pendrive.<br />
I will make my executable to Fully Undetectable and i will add the file to my friends PC and i will get access to that PC. In this way i will create different scenarios for gaining access by social engineering.<br />
<br />
Share your type of social engineering in comments.</div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com3tag:blogger.com,1999:blog-5808530752200142057.post-42977895582928288292013-09-09T20:54:00.002-07:002013-09-09T20:54:37.349-07:00How To Hack Unprotected FTP's <div dir="ltr" style="text-align: left;" trbidi="on">
Google is one of the powerful search engine and every body knows that. Google helps us to find passwords with its search ability, so in order to hack unprotected and low secure FTP's passwords, this method will help out.<br />
<a name='more'></a><br />
<br />
So go to Google and search in a keyword below, which displays the list of unprotected FTP Server passwords.<br />
<blockquote class="tr_bq">
inurl:ftp "password" filetype:xls</blockquote>
<br />
</div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com3tag:blogger.com,1999:blog-5808530752200142057.post-45535641146402344842013-09-08T22:35:00.001-07:002013-09-08T22:35:17.068-07:00Brute Forcing Wordpress<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
IN the hacking world , brute force attack became the common answer to get the passwords, in order to crack the passwords we need to brute force. <br />
<a name='more'></a>WordPress which is the biggest CMS platform used by millions of users has a brute force attack vulnerability, In the below video you will know how to brute force the passwords.<br />
<br />
<br /></div>
<iframe allowfullscreen="" frameborder="0" height="360" src="http://www.youtube.com/embed/jADzC0ehIms?feature=player_detailpage" width="640"></iframe></div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com3tag:blogger.com,1999:blog-5808530752200142057.post-5106629651509715782013-08-29T12:52:00.002-07:002013-08-29T13:01:33.335-07:00Facebook 0day Vulnerability To Get Message From Any One<div dir="ltr" style="text-align: left;" trbidi="on">
I was browsing over the internet, then i found many 0day exploits but interestingly i found out facebook 0day vulnerability. This exploit has not been reported to facebook but this is the exploit which is to be taken care of.<br />
Watch the video and you will get to know about the vulnerability.<br />
<a name='more'></a><br />
<br />
<br />
<br />
<iframe allowfullscreen="" frameborder="0" height="360" src="http://www.youtube.com/embed/JSt0OwSm82k?feature=player_embedded" width="640"></iframe>
</div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com3tag:blogger.com,1999:blog-5808530752200142057.post-17778056580941935522013-05-24T10:06:00.001-07:002013-05-24T10:09:16.399-07:00Social engineering tipsDo you know social engineering is the best method to hack human passwords. Social engineering is easy when you know how to get passwords by hacking humans nature. <div>I never found this method as hard. When I tried to social engineer by boss password , it was too easy to gain access to my boss Facebook id. </div><div>I simply sent malicious phishing link to him. He opened the link and got phished easily. </div><div>There are most of morons to hack in the web with this simple social engineering tip. </div><div>In the previous tutorial I explained how to create fake pages ie phishing pages .</div><div>You can create any phishing pages with the help of simple tools in backtrack 5.</div><div>As you know Set is the tool kit used to create phishing pages .</div><div>When it comes to social engineering , you need to have good communication skills. </div><div>Lot off leverages we get by simple human stupidity. </div><div>Simple tips to know to do best social engineering methods are as follows </div><div>1. Make victims to believe that you are true.</div><div>2. Transfer malicious links in undoubted way.</div><div>3. Run a metasploit in a proper way , Sk that victim does not know our malicious nature.</div><div>4. Be creative while sending malicious links . </div><div>5. Send emails in a genuine format.</div><div>6. Don't give up until you get password.</div>adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com3tag:blogger.com,1999:blog-5808530752200142057.post-79139622288937804332013-03-29T01:25:00.001-07:002013-03-29T01:27:42.221-07:00VLC Media Player Trick<div dir="ltr" style="text-align: left;" trbidi="on">
Most of the people does not now what is vls media player trick. If you know no body will search for this trick.mostly you end up here because you are searching for that trick. So forget about that lets get in to this trick.<br />
<a name='more'></a><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqEMGqfjAjUJJKlqGxmMqv7iN2PMrBaANsLx0YV1_MzbNQ-m1uSTnIPBjSZVTxWvO44y5FmiDdiq2woXIG0wPF0z0khKe43oFTh8fPxm1HXX2mgQBwptH2ZgIBgPy3kV_a4L8bieLPhWs/s1600/vlc+trick.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqEMGqfjAjUJJKlqGxmMqv7iN2PMrBaANsLx0YV1_MzbNQ-m1uSTnIPBjSZVTxWvO44y5FmiDdiq2woXIG0wPF0z0khKe43oFTh8fPxm1HXX2mgQBwptH2ZgIBgPy3kV_a4L8bieLPhWs/s320/vlc+trick.png" width="320" /></a></div>
<br />
<br />
1. Open VLC media player.<br />
2. Press CTRL + N in your VLC media player and type the following<br />
<blockquote class="tr_bq">
<blockquote class="tr_bq">
Screen://</blockquote>
</blockquote>
3. Click on play , trick will be working !!!!</div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com3tag:blogger.com,1999:blog-5808530752200142057.post-87548435874746187252013-03-29T00:12:00.003-07:002013-03-29T00:12:56.495-07:00Enabling God Mode In Windows<div dir="ltr" style="text-align: left;" trbidi="on">
In the following tutorial i will show you how to enable god mode in your windows machine.<br />
By enabling god mode you will have complete access to the windows settings. To enable this god mode follow this tutorial.<br />
<a name='more'></a><br />
<br />
1. Right on your desktop free space.<br />
2. create new folder and rename the folder with the following name.<br />
<blockquote class="tr_bq">
<blockquote class="tr_bq">
{ED7BA470-8E54-465E-825C-99712043E01C}</blockquote>
</blockquote>
3. After renaming the following folder now open the following folder , now god mode will be enabled on your computer and you can access every setting in the windows.<br />
<br /></div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com3tag:blogger.com,1999:blog-5808530752200142057.post-56960863621784027672013-03-29T00:07:00.001-07:002013-03-29T00:07:20.361-07:00How To Hack People Who Use Roboform<div dir="ltr" style="text-align: left;" trbidi="on">
Hacking people is really fun , only thing is to target the user and get the passwords. This is too main stream for hackers. So in order to hack the passwords, we should know some knowledge about the coding stuff. So forget all these now start hacking and stop blabbering.<br />
<br />
<a name='more'></a><br /><br />
Now hacking the people who are using roboform right? What is roboform?<br />
Roboform is an application which is used for storing the passwords and the details of the users.<br />
If you want to know more about the roboform , please google about it , i have no patience to explain about it ;)<br />
So if you serach the following query in google the list of the roboform files wil appears there for you can extract the deatils of the users.<br />
<br />
1. Open up Google.<br />
2. Type the following in the query.<br />
<blockquote class="tr_bq">
"My RoboForm Data" "index of"</blockquote>
3. Now get the Roboform files.<br />
4. That's it!!!! <br />
<br /></div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com3tag:blogger.com,1999:blog-5808530752200142057.post-87419627483012332142013-03-29T00:00:00.000-07:002013-03-29T00:00:07.090-07:00How To Make Web Browser As Text Editor<div dir="ltr" style="text-align: left;" trbidi="on">
Make your web browser as text editor , have ever wondered making your wb browser as text editor?<br />
IF not then follow this simple tutorial on making your web browser as text editor.<br />
<a name='more'></a><br />
<br />
1. Open your browser.<br />
2. Type the following in the url bar.<br />
<blockquote class="tr_bq">
data:text/html, <html contenteditable></blockquote>
<br />
3. Now hit enter, your web browser will acts as text editor.<br />
4. That's it!!!! </div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com3tag:blogger.com,1999:blog-5808530752200142057.post-25608063686279103782013-03-28T23:49:00.000-07:002013-03-28T23:49:04.883-07:00How To Hack WEP Wifi<div dir="ltr" style="text-align: left;" trbidi="on">
This is video tutorial for the users to hack the wifi network which are using WEP networks.<br />
<a name='more'></a><br />
<iframe width="640" height="360" src="http://www.youtube.com/embed/Qy8Cc_qPRHA?feature=player_detailpage" frameborder="0" allowfullscreen></iframe></div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com3tag:blogger.com,1999:blog-5808530752200142057.post-20323325031406148352013-03-02T10:44:00.000-08:002013-03-02T10:44:05.979-08:00What is ARP Spoofing?<div dir="ltr" style="text-align: left;" trbidi="on">
<b>What is ARP Spoofing?</b><br />
<b><br /></b>
ARP(Address Resolution Protocol) Spoofing is a method where attacker sends fake(ARP) messages in wired or wireless LAN(Local Area Network).<br />
<a name='more'></a><br />
ARP spoofing allows an attacker to do different kinds of attacks like session hijacking,DNS Spoofing, DOS(denial of service attacks),MITM(Man In The Middle) attacks.<br />
<br />
List of tools used for ARP Spoofing.<br />
<br />
1. Cain For Windows. <a href="http://theethicalhackerz.blogspot.com/2013/03/arp-poisoning-with-cainvideo.html" target="_blank">Here is the tutorial to for ARP poisioning In Cain</a><br />
2. Ettercap (Linux and Windows).<br />
<br />
<br /></div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com3tag:blogger.com,1999:blog-5808530752200142057.post-18694607700957261262013-03-02T10:43:00.000-08:002013-03-02T10:43:11.362-08:00ARP Poisoning With Cain[video]<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<b>ARP Poisoning With Cain</b><br />
<b><br /></b>
</div>
Cain can sniff passwords in the network, watch this video to sniff passwords with cain.<br />
<a name='more'></a>
<iframe allowfullscreen="" frameborder="0" height="360" src="http://www.youtube.com/embed/dbxG1sT3MSI?feature=player_detailpage" width="640"></iframe>
Thanks for Eric Roberts for providing awesome videro for
ARP Poisoning With Cain for Network Sniffing</div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com3tag:blogger.com,1999:blog-5808530752200142057.post-50478730483378697562013-03-01T04:59:00.000-08:002013-03-01T04:59:14.943-08:00Useful Commands In Backtrack<div dir="ltr" style="text-align: left;" trbidi="on">
Backtrack is a hacking linux, as most of the people do know about it right. So basically backtrack is powerful and useful linux for security researchers. Security researchers always penetrate in to web applications and find vulnerabiltis in an application. In order to use Backtrack Linux these commands will be helpful to you.<br />
<a name='more'></a><br />
<br />
1. ls<br />
<br />
ls command is for listing all the files.<br />
<br />
<br />
2. startx<br />
<br />
This command is used to start the backtrack GUI(graphical user interface) to an Linux.<br />
<br />
3. logout<br />
<br />
This command is use to logout the present session of an user in backtrack.<br />
<br />
4. shutdown<br />
<br />
Shutdown command is used to shutdown the backtrack linux.<br />
<br />
5. msfconsole(Metasploit Framework)<br />
<br />
msfconsole command is used to start the metasploit framework, Metasploit is used for penetrating web applications and other applications<br />
<br />
6. apt-get install<br />
<br />
This command helps Backtrack user to install applications in a linux.<br />
<br />
7. apt-get update<br />
<br />
This command is used for updating backtrack linux from their repositories. </div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com3tag:blogger.com,1999:blog-5808530752200142057.post-83874907846239057542013-03-01T03:22:00.001-08:002013-03-01T03:22:42.408-08:00How To Upload A Shell In Web Applications<div dir="ltr" style="text-align: left;" trbidi="on">
<b>How To Upload A Shell In Web Applications</b><br />
<br />
Most of the people will exploit servers with file upload vulnerability , as it is very simple to find out this exploit by an simple dork<br />
<a name='more'></a><br />
<blockquote class="tr_bq">
inurl:upload.php or inurl:upload.html</blockquote>
Now you have upload a shell file in the upload option. Normally upload option of an web Apps never accepts php files, as most of the shells are php.<br />
In order to upload php shell in web apps follow these steps<br />
<ol style="text-align: left;">
<li>Rename the shell abc.php to abc.php.txt and upload that shell and run the /path/xyz.php.txt</li>
<li>Rename the shell as abc.php.xyz which will bypass a simple filter on .php and Apache will still use .php as extension; since this configuration it doesn't have handler for .xyz</li>
<li>Rename the shell as .php3 and upload it to server(web apps).</li>
</ol>
</div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com3tag:blogger.com,1999:blog-5808530752200142057.post-5861944654102914402012-10-29T08:44:00.001-07:002012-10-29T08:44:04.510-07:00How To Clone Sim Cards<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
Have you ever tried of hacking sim cards. IF not follow this tutorial on cloning sim cards.<br />
This is simple video tutorial where creating sim card reader is hard work and brute forcing is time consuming work. If you really want to clone sim card, you must have sim card reader and sim card reader application. I guess you can understand by watching this video.<br />
<a name='more'></a></div>
<iframe allowfullscreen="allowfullscreen" frameborder="0" height="300" mozallowfullscreen="mozallowfullscreen" src="http://player.vimeo.com/video/1404007" webkitallowfullscreen="webkitallowfullscreen" width="400"></iframe></div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com5tag:blogger.com,1999:blog-5808530752200142057.post-90795526197777282432012-10-29T08:29:00.001-07:002012-10-29T08:29:46.068-07:00We Are Back <div dir="ltr" style="text-align: left;" trbidi="on">
Sorry for keeping you wait with out any updates on the hacks. So From now there will be daily updates on this blog.<br />
<a name='more'></a><br />
We are accepting guest posting on our blog. If any one interested in sharing information about hacking,then they can post info.<br />
<br />
For submitting hacks mail me @ 13downloads@gmail.com</div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com4tag:blogger.com,1999:blog-5808530752200142057.post-90831881887916523182012-09-29T11:26:00.002-07:002012-09-29T11:28:33.868-07:00Encrypt Your Files With Secure USB<div dir="ltr" style="text-align: left;" trbidi="on">
<b>Encrypt Your Files With Secure USB</b><br />
<br />
Recently i found an application which encrypts and decrypts file and folders . Actually it is the tool which is used for encryption of USB's but it also encrypts iles and folders too.<br />
<br />
<a name='more'></a><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7yfiwhejdtUFAhc-486ca0tHRBirkUcxXht4UNo17P9YHXvbRhB84bhlH68ar2r1HATjsOVIMiuRJ-GDPwUBIUiRYppn_9RCDqY1pIfyRAbdIrJTeedvC10LRnTcgR5UjMs3kk9FmOpk/s1600/secureusb.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7yfiwhejdtUFAhc-486ca0tHRBirkUcxXht4UNo17P9YHXvbRhB84bhlH68ar2r1HATjsOVIMiuRJ-GDPwUBIUiRYppn_9RCDqY1pIfyRAbdIrJTeedvC10LRnTcgR5UjMs3kk9FmOpk/s1600/secureusb.PNG" /></a></div>
<br />
<br />
Secure-USB is an easy-to-use portable file encryption software.<br />
It implements strong 256-bit AES encryption to encrypt data.<br />
<br />
It uses users hashed password as key to encrypt & decrypt data,<br />
so it is strictly adviced to decrypt all files before changing password.<br />
<br />
Secure-USB runs on Windows XP/2003/Vista/7 or above.<br />
<br />
<br />
<br />
Requirement: .NET Framework 2.0<br />
<br />
<br />
Features:<br />
• Portable.<br />
• Intuitive & easy-to-use interface.<br />
• Implements 256-bit AES (Rijndael) to encrypt files. <br />
• Effective password protection.<br />
• Removing or uninstalling will not uncover encrypted files.<br />
• Fully compatible with Windows XP, 2003, Vista, 7 (32 & 64-bit)<br />
<br />
Home page:http://securefolder.tk<br />
<br />
<a href="http://sourceforge.net/projects/secureusb/" target="_blank"><b>Download </b></a><br />
<br /></div>
adminhttp://www.blogger.com/profile/05193666801001374702noreply@blogger.com4