Like And Share Fan Page

Flash your Nokia Via Phoenix Flashing

 

Flashing your phone is not an easy thing for an average mobile user. But if you can follow steps carefully then its gonna be a breeze. I was also hesitant before to flash my Nokia N8 via Phoenix but now flashing my device has never been so difficult. Flashing refers to updating your device firmware(or internal Operating system) or to unlock and debrand. Nokia

JoomScan Vulnerability In Backtrack 5



Joomscan is one of penetration testing tool that help to find the vulnerability in Joomla CMS. The Updated version can detects 550 Vulnerabilities. Let me show how to use this joomscan in Backtrack5.

Download the Joomscan from here:

Web Application Analysis



Today i want to share with you a very simple tutorial on how to Brute Force passwords on a wordpress system.

The tool we will be using today is Wpscan> , i am using Backtrack 5 KDE 32bit for this tutorial.

You may download the PDF version of this tutorial Click me

Introduction  ?

Wireless WEP Cracking



Don't crack any wifi router without authorization; otherwise, you will be put into the jail.

Step 1 :

airmon-ng

The result will be something like :

What is IIS Exploit And IIS Exploit


What Is IIS Exploit | IIS Exploit ?
The title speaks for itself. This tutorial is about website hacking that are working on older versions of IIS server. We will be discussing about what is a IIS server and how hackers can upload deface pages on it.

Dangerous Virus In A Minute


In this post i will teach you to make simple yet very powerfull or you can say harmfull computer virus using a batch file. No software is required to make this virus, Noteapad is enough for it. The good thing about this virus is it is not detected by any AntiVirus.

All Windows 8 Activator


Activate Your Windows 8 Permanently

Buffer Overflow Attack


Firewall and Anti-virus are to protect your computer from hacking attack and from viruses but sometimes an attacker can easily bypass them and can get root access into your computer, there are so many techniques and tools are available to bypass or cheat anti-virus and firewall.

Havij Attack

  
WATCH VIDEO

According to a survey the most common technique of hacking a website is SQL Injection. SQL Injection is a technique in which hacker insert SQL codes into web Forum to get Sensitive information like (User Name , Passwords) to access the site and Deface it. The traditional SQL injection method is quite difficult, but now a days there are many tools available online through which any script kiddie can use SQL Injection to deface a webite, because of these tools websites have became more vulnerable to these types of attacks.

One of the popular tools is Havij, Havij is an advanced SQL injection tool which makes SQL Injection very easy for you, Along with SQL injection it has a built in admin page finder which makes it very effective.

  Vulnerable Site  - http://www.hypetrading.com/productinfo.php?id=285

Download Havji - Click Me

Now Let's Start

Crack WPA/WPA2 Wireless Passwords



Don't crack any wifi router without authorization; otherwise, you will be put into the jail.

Step 1 :

airmon-ng

The result will be something like :

Need For Speed Most Wanted 2012



Need for Speed: Most Wanted (commonly abbreviated to as NFS: MW or simply Most Wanted) is a 2012 open-world racing video game, developed by British games developer Criterion Games and published by Electronic Arts. Announced on 4 June 2012, during EA's E3 press

Crysis 3


Crysis 3 is a first-person shooter video game developed by Crytek, published by Electronic Arts for PC, PlayStation 3, and Xbox 360 and released in North America on February 19, 2013.[3]

Far Cry 3


Far Cry 3 is an open world first-person shooter video game developed by Ubisoft Montreal in conjunction with Ubisoft Massive, Ubisoft Red Storm, Ubisoft Reflections,[2] and Ubisoft Shanghai and published

Certified Ethical Hacker Ebooks (CEH)


1: Student Introduction
2: Introduction to Ethical Hacking
3: Hacking Laws
4: Footprinting

Hacking Ebooks Collection All In One

Hacking means taking advantage of a quick and clever way to solve a security problem on the computer. In today's dialogue is Hack means to penetrate a computer system.'s It the best book available about hacking and security has been collected.

Facebook Hacking Methods All In One


So You Guys wanna Learn Facebook Hacking. How to Hack Facebook Accounts Easily Yeah And I Mean It.

So Here Goes All Methods Of Facebook Hacking From Zero To On.
 
Let's Go

Anonymous-Os


Anonymous Hackers released their own Operating System with name "Anonymous-OS", is Live is an ubuntu-based distribution and created under Ubuntu 11.10 and uses Mate desktop. You can create the LiveUSB with Unetbootin.

Backtrack 5


What Is Backtrack 5 ?

The time has come to refresh our security tool arsenal – BackTrack 5 R3 has been released. R3 focuses on bug-fixes as well as the addition of over 60 new tools – several of which were released in BlackHat and Defcon 2012. A whole new tool category was populated – “Physical Exploitation”, which now includes tools such as the Arduino IDE and libraries, as well as the Kautilya Teensy payload collection.

High Orbit Ion Cannon


A new DDoS tool from Anonymous called high-orbit ion canon or HOIC come into light. Attackers are constantly changing their tactics and tools in response to defender's actions. HOIC is an Windows executable file. Once started, you will be presented with the following GUI screen. If the attacker clicks on the + sign under TARGETS they get another pop-up box where you can specify target data.

Low Orbit Ion Cannon


The DOS (Denial of service) attack is one of the more powerful hacks, capable of completely taking a server down. In this way, the server will not be able to handle the requests of valid users. With a DOS attack, many computer systems connected to the internet will try to flood a server with false requests, leading to a service disruption. 

How To Become Ethical Hacker



I have been asked for tips to become Ethical Hacker or Penetration tester via email. So In this article, i am going to guide you to get into the Penetration Testing world.

If you are seeing this article, then it means that you already heard about Ethical Hacking and PenTesting. Anyway, i just like to give small definition about Ethical hacking.

How to Know Someone Ip Address Throught Facebook


If some One add you and Abuse with you and you want to know who is him.her and why he/she abusing or talking with you so i think its problem for you? Dont worry here is the best Solution

Change Your Ip Address

how to change ip address in less then a minute. For now it will take 2 to 3 minutes but with some practice you can do this within a minute.

How To Grab Someone IP Address


I will you show you how to grab someone Ip address using PHP script.This method can be used to grab someone Ip address on yahoo or Facebook chat or by sending mail to victim. So Lets get started.

Complete Android Programming Series

Hey Guys, Today i'm Presenting To You A Complete Android Development Series, By The Help Of Which You'll Be Able To Create Your Own Applications And Much More Like

Download Torrent Files With IDM


I am gonna show you how we can download torrent files with IDM. In more clearance I am gonna show you, how we can download files which contain data through torrent file directly with IDM.