Thursday, April 26, 2012

My book on hacking A guide, A representation of todays condition of cyber lif3 of hackers

hi guys wassup i was a skid before but i left that path and went in the search of truth and knowledge. SQL injection is fun but then i realized that thats not true hacking and now i am changed....... Looking at the current condition of skids and new beginners i wrote a small book to start with. it does not contain any article,tutorial,or 0day exploits it contains real life and experiences that are experienced by young hackers it contains inspirational things that will help people a lot. hope you like it. my main motive was to direct young progressing hackers to a path that will lead to a good hacking carrier omg too much philosophy :P but its important too downl...

Monday, April 23, 2012

How to become d0x pr00f

hi friends after exams i am free now will write some posts. yesterday i saw 1 one of my friends exposing s3rverexe. and s3rverexe also tried to expose him but failed. so today i will give you some tips on not letting your identities exposed. so first never share any information on forums, dating sites. matrimonial websites, or not even Facebook as now Google indexes its posts and comments. and be aware of adding unknown friend in your real account and never put a connection between your real and fake account. mostly if you are in INDIA you don't need to worry much as there are not any public records. but for countries like USA there are sites which have many information about you by credit-card etc. Only hiding everything is not fun always. sometimes even misdirection also makes fun. real...

Saturday, April 7, 2012

Introduction to SCADA hacking

hi guys wassup today i will tell you about SCADA hacking some other reosurces  so first what is SCADA ? its abbreviated as Supervisory Control and Data Acquisition so basically there are lots of hardwares in it ans used in power grids, Dams and many other industires. they use primitive softwares that are easy to exploit. remember Stuxnet that exploited Iran`s windows computer to exploit iran`s nuclear facility which was of Siemens. same way there are lots of companies who make SCADA and for ease of use and to control them from remote places they have internet connection so basically there are PLC (programmable logic contoller) which are exploited mostly. the I/O cycles are controlled by RISC (Reduced instruction set computing) processor PLCs use RISC processors to run continuous,...

Friday, April 6, 2012

ROOTCON 6 Philippines premier hacking conference

One of my friends from cebu city (Philippines) is a blogger at theprojectxblog.net and blog.rootcon.org its a awesome conference for hackers and security professionals registration is not that expensive every body can visit these conference... the main language of communication will be english for more visit here =>>https://rootcon....

Monday, April 2, 2012

Social engineering- The art of human hacking

you might be confused that why this thing is here right ? social engineering is also a type of hacking with humans. so i thought lets do something new!! the official portal of social engineering defines it like this..... Social Engineering (SE) is both incredibly complex and amazingly simple. What really is social engineering? We define  it as the act of manipulating a person to accomplish goals that may or may not be in the “target’s” best interest. This may include obtaining information, gaining access, or getting the target to take certain action. Due to the mystery surrounding this dark art many people are afraid of it, or they feel they will never be able to accomplish a successful social engineering test. However, every...

Twitter Delicious Facebook Digg Stumbleupon Favorites More