Flashing your phone is not an easy thing for an average mobile user. But if you can follow steps carefully then its gonna be a breeze. I was also hesitant before to flash my Nokia N8 via Phoenix but now flashing my device has never been so difficult. Flashing refers to updating your device firmware(or internal Operating system) or to unlock and debrand. Nokia
Like And Share Fan Page
JoomScan Vulnerability In Backtrack 5
Joomscan is one of penetration testing tool that help to find the vulnerability in Joomla CMS. The Updated version can detects 550 Vulnerabilities. Let me show how to use this joomscan in Backtrack5.
Download the Joomscan from here:
Web Application Analysis
Today i want to share with you a very simple tutorial on how to Brute Force passwords on a wordpress system.
The tool we will be using today is Wpscan> , i am using Backtrack 5 KDE 32bit for this tutorial.
You may download the PDF version of this tutorial Click me
Introduction ?
Wireless WEP Cracking
Don't crack any wifi router without authorization; otherwise, you will be put into the jail.
Step 1 :
airmon-ngThe result will be something like :
What is IIS Exploit And IIS Exploit
What Is IIS Exploit | IIS Exploit ?
The title speaks for itself. This tutorial is about website hacking that
are working on older versions of IIS server. We will be discussing
about what is a IIS server and how hackers can upload deface pages on
it.
Dangerous Virus In A Minute
In this post i will teach you to make simple yet very powerfull or you can say harmfull computer virus using a batch file. No software is required to make this virus, Noteapad is enough for it. The good thing about this virus is it is not detected by any AntiVirus.
Buffer Overflow Attack
Firewall and Anti-virus are to protect your computer from hacking attack and from viruses but sometimes an attacker can easily bypass them and can get root access into your computer, there are so many techniques and tools are available to bypass or cheat anti-virus and firewall.
Havij Attack
WATCH VIDEO
According to a survey the most common technique of hacking a website is SQL Injection. SQL Injection is a technique in which hacker insert SQL codes into web Forum to get Sensitive information like (User Name , Passwords) to access the site and Deface it. The traditional SQL injection method is quite difficult, but now a days there are many tools available online through which any script kiddie can use SQL Injection to deface a webite, because of these tools websites have became more vulnerable to these types of attacks.
One of the popular tools is Havij, Havij is an advanced SQL injection tool which makes SQL Injection very easy for you, Along with SQL injection it has a built in admin page finder which makes it very effective.
Vulnerable Site - http://www.hypetrading.com/productinfo.php?id=285
Download Havji - Click Me
Now Let's Start
Crack WPA/WPA2 Wireless Passwords
Don't crack any wifi router without authorization; otherwise, you will be put into the jail.
Step 1 :
airmon-ngThe result will be something like :
Need For Speed Most Wanted 2012
Need for Speed: Most Wanted (commonly abbreviated to as NFS: MW or simply Most Wanted) is a 2012 open-world racing video game, developed by British games developer Criterion Games and published by Electronic Arts. Announced on 4 June 2012, during EA's E3 press
Crysis 3
Crysis 3 is a first-person shooter video game developed by Crytek, published by Electronic Arts for PC, PlayStation 3, and Xbox 360 and released in North America on February 19, 2013.[3]
Far Cry 3
Far Cry 3 is an open world first-person shooter video game developed by Ubisoft Montreal in conjunction with Ubisoft Massive, Ubisoft Red Storm, Ubisoft Reflections,[2] and Ubisoft Shanghai and published
Hacking Ebooks Collection All In One
Hacking means taking advantage of a
quick and clever way to solve a security problem on the computer. In
today's dialogue is Hack means to penetrate a computer system.'s It the
best book available about hacking and security has been collected.
Facebook Hacking Methods All In One
So You Guys wanna Learn Facebook Hacking. How to Hack Facebook Accounts Easily Yeah And I Mean It.
So Here Goes All Methods Of Facebook Hacking From Zero To On.
Let's Go
Anonymous-Os
Anonymous Hackers released their own Operating System with name "Anonymous-OS", is Live is an ubuntu-based distribution and created under Ubuntu 11.10 and uses Mate desktop. You can create the LiveUSB with Unetbootin.
Backtrack 5
What Is Backtrack 5 ?
The time has come to refresh our security tool arsenal – BackTrack 5 R3
has been released. R3 focuses on bug-fixes as well as the addition of
over 60 new tools – several of which were released in BlackHat and
Defcon 2012. A whole new tool category was populated – “Physical
Exploitation”, which now includes tools such as the Arduino IDE and
libraries, as well as the Kautilya Teensy payload collection.
High Orbit Ion Cannon
A new DDoS tool from Anonymous called high-orbit ion canon or HOIC come into light. Attackers are constantly changing their tactics and tools in response to defender's actions. HOIC is an Windows executable file. Once started, you will be presented with the following GUI screen. If the attacker clicks on the + sign under TARGETS they get another pop-up box where you can specify target data.
Low Orbit Ion Cannon
The DOS (Denial of service) attack is one of the more powerful hacks, capable of completely taking a server down. In this way, the server will not be able to handle the requests of valid users. With a DOS attack, many computer systems connected to the internet will try to flood a server with false requests, leading to a service disruption.
How To Become Ethical Hacker
I have been asked for tips to become Ethical Hacker or Penetration tester via email. So In this article, i am going to guide you to get into the Penetration Testing world.
If you are seeing this article, then it means that you already heard about Ethical Hacking and PenTesting. Anyway, i just like to give small definition about Ethical hacking.
How to Know Someone Ip Address Throught Facebook
If some One add you and Abuse with you and you want to know who is him.her and why he/she abusing or talking with you so i think its problem for you? Dont worry here is the best Solution
Change Your Ip Address
how to change ip address in less then a minute. For now it will take 2
to 3 minutes but with some practice you can do this within a minute.
How To Grab Someone IP Address
I will you show you how to grab someone Ip address using PHP script.This method can be used to grab someone Ip address on yahoo or Facebook chat or by sending mail to victim. So Lets get started.
Complete Android Programming Series
Hey Guys, Today i'm
Presenting To You A Complete Android Development Series, By The Help Of
Which You'll Be Able To Create Your Own Applications And Much More Like
Download Torrent Files With IDM
I am gonna show you how we can download torrent files with IDM. In more clearance I am gonna show you, how we can download files which contain data through torrent file directly with IDM.
Subscribe to:
Comments (Atom)


.jpg)








