The Site is Currently Under Maintenance

So Just Ignore any problems If you found. Thanks

Wednesday, June 1, 2011

Shell Uploading

What is Shell ? A shell script is a script written for the shell, or command line interpreter, of an operating system. It is often considered a simple domain-specific programming language. Typical operations performed by shell scripts include file manipulation, program execution, and printing text. This is a plain c99 shell, BUT it is Undetected so you should not get a warning from a anti virus if you download it. (update: not Undetected anymore ) I am not going to explain SQLi just how to deface. Sql Tut- http://hackingmania.com/Blog/sql-injection-and-defacement-for-beginners-tutorial So now go get yourself a vulnerable site, hack it and get...

Desktop Phishing Hack

It is an advance form of phishing. Kindly read my previous post on normal phishing before proceeding.Difference between phishing and desktop phishing is as follows. In phishing :- 1. Attacker convinces the victim to click on the link of fake login page which resembles a genuine login page. 2.Victim enters his credentials in fake login page that goes to attacker.3.Victim is then redirected to an error page or genuine website depending on attacker. But main drawback in phishing is that victim can easily differentiate between fake and real login page by looking at the domain name. We can overcome this in desktop phishing by...

Saturday, March 5, 2011

SQL Injection in Easy steps......!!!!!!

[SQL] HACK SITES USING Havij v1.14 it is simple tut how to use havij to hack sites  Download Havij v1.14  1.First Find a sqli infected site 2-Open havij and copy and paste infected link as shown in figure 3. Then It shows some messages there....Be alert on it and be show patience for sometime to find it's vulernable and type of injection and if db server is mysql and it will find database name.Then after get it's database is name like xxxx_xxxx 4.Then Move to another operation to find tables by clicking "tables" as figure shown.Now click "Get tables" Then wait some time if needed 5. After founded the tables ,you can see...

Friday, February 25, 2011

Advance Dorks For LFI & RFI

Remote File Inclusion/Local File Inclusion: inurl:/_functions.php?prefix= inurl:/cpcommerce/_functions.php?prefix= inurl:/modules/coppermine/themes/default/theme.php?THEME_DIR= inurl:/modules/agendax/addevent.inc.php?agendax_path= inurl:/ashnews.php?pathtoashnews= inurl:/eblog/blog.inc.php?xoopsConfig[xoops_url]= inurl:/pm/lib.inc.php?pm_path= inurl:/b2-tools/gm-2-b2.php?b2inc= inurl:/modules/mod_mainmenu.php?mosConfig_absolute_path= inurl:/modules/agendax/addevent.inc.php?agendax_path= inurl:/includes/include_once.php?include_file= inurl:/e107/e107_handlers/secure_img_render.php?p= inurl:/shoutbox/expanded.php?conf= inurl:/main.php?x= inurl:/myPHPCalendar/admin.php?cal_dir= inurl:/index.php/main.php?x= inurl:/index.php?include= inurl:/index.php?x= inurl:/index.php?open= inurl:/index.php?visualizar= inurl:/template.php?pagina= inurl:/index.php?pagina= inurl:/index.php?inc= inurl:/includes/include_onde.php?include_file= inurl:/index.php?page= inurl:/index.php?pg= inurl:/index.php?show= inurl:/index.php?cat= inurl:/index.php?file= inurl:/db.php?path_local= inurl:/index.php?site= inurl:/htmltonuke.php?filnavn= inurl:/livehelp/inc/pipe.php?HCL_path= inurl:/hcl/inc/pipe.php?HCL_path= inurl:/inc/pipe.php?HCL_path= inurl:/support/faq/inc/pipe.php?HCL_path= inurl:/help/faq/inc/pipe.php?HCL_path= inurl:/helpcenter/inc/pipe.php?HCL_path= inurl:/live-support/inc/pipe.php?HCL_path= inurl:/gnu3/index.php?doc= inurl:/gnu/index.php?doc= inurl:/phpgwapi/setup/tables_update.inc.php?appdir= inurl:/forum/install.php?phpbb_root_dir= inurl:/includes/calendar.php?phpc_root_path= inurl:/includes/setup.php?phpc_root_path= inurl:/inc/authform.inc.php?path_pre= inurl:/include/authform.inc.php?path_pre= inurl:index.php?nic= inurl:index.php?sec= inurl:index.php?content= inurl:index.php?link= inurl:index.php?filename= inurl:index.php?dir= inurl:index.php?document= inurl:index.php?view= inurl:*.php?sel= inurl:*.php?session=&content= inurl:*.php?locate= inurl:*.php?place= inurl:*.php?layout= inurl:*.php?go= inurl:*.php?catch= inurl:*.php?mode= inurl:*.php?name= inurl:*.php?loc= inurl:*.php?f= inurl:*.php?inf= inurl:*.php?pg= inurl:*.php?load= inurl:*.php?naam= allinurl:/index.php?page=...

All keyboard Shortcuts

1.) Windows Hotkeys Shift + F10 right-clicks. Win + L (XP Only): Locks keyboard. Similar to Lock Workstation. Win + F or F3: Open Find dialog. (All Files) F3 may not work in some applications which use F3 for their own find dialogs. Win + Control + F: Open Find dialog. (Computers) Win + U: Open Utility Manager. Win + F1: Open Windows help. Win + Pause: Open System Properties dialog. Win + Tab: Cycle through taskbar buttons. Enter clicks, AppsKey or Shift + F10 right-clicks. Win + Shift + Tab: Cycle through taskbar buttons in reverse. Alt + Tab: Display CoolSwitch. More commonly known as the AltTab dialog. Alt + Shift + Tab: Display CoolSwitch; go in reverse. Alt + Escape: Send active window to the bottom of the z-order. Alt + Shift + Escape: Activate the window at the bottom of the z-order. Alt...

All Dos Commands

ADDUSERS         Add or list users to/from a CSV file ARP              Address Resolution Protocol ASSOC            Change file extension associations ASSOCIAT         One step file association AT               Schedule a command to run at a later time ATTRIB           Change file attributes BOOTCFG          Edit Windows boot settings BROWSTAT         Get domain, browser and PDC info CACLS           ...

Wednesday, February 23, 2011

Intro : Cain And Abel Tool

This is the tool I used sometimes to recover passwords that I have forgotten. I do not encourage hacking. This tool is actually considered a backdoor sometimes by some of the security software in the market. Personally I think it is useful, but people tend to abuse it.Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached...

Page 1 of 17123Next

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites