Tuesday, 21 December 2010

MD5 Hash & How to Use it ?

In this post I will explain you about one of my favorite and interesting cryptographic algorithm called MD5 (Message-Digest algorithm 5). This algorithm is mainly used to perform file integrity checks under most circumstances. Here I will not jump into the technical aspects of this algorithm, rather will tell you about how to make use of this algorithm in your daily life. Before I tell you about how to use MD5, I would like to share one of my recent experience which made me start using MD5 algorithm.Recently I made some significant changes and updates to my website and as obvious I generated a complete backup of the site on my server. I downloaded this backup onto my PC and deleted the original one on the server. But after a few days something...

Caller ID Spoofing

Caller ID spoofing is the act of making the telephone network to display any desired (Fake) number on the recipient’s Caller ID display unit instead of the original number. The Caller ID spoofing can make a call appear to have come from any phone number that the caller wishes. Have you ever wondered how to perform Caller ID spoofing? Read on to know more information on Caller ID spoofing and find out how it is performed.Unlike what most people think, an incoming call may not be from the number that is displayed on the Caller ID display unit. Because of the high trust that the people have in the Caller ID system, it is possible for the caller to easily fool them and make them believe that the number displayed on the Caller ID display is...

Best 7 Ways to Protect Your Gmail Account

Email is the most invaluable asset of anyone’s identity on the web. You use email everyday and have all the important information stored in your inbox. All your social networking accounts, website registrations, Paypal accounts etc are connected and controlled by your email and thus it makes sense to completely secure your Gmail account and prevent unauthorized access.Choosing a strong password is not enough, you should be well aware how people try to gain access to other people’s email accounts by unfair means. Here are some useful tips on securing your Gmail account and avoid getting hacked:1. Always Check The URL before Logging in to GmailWhenever you log in to your Gmail account, always check the URL from the browser address...

Friday, 5 November 2010

How To Bypass Firewall Using Tool

Is Orkut, Facebook,Yahoo blocked on your school, college or office? Then, don't worry. I have a solution for you that will not only unblock all the websites that have been blocked but also make your internet surfing anonymous so that nobody can trace your orignal ip address. As you know that most of the proxy websites are blocked with your school, college or office firewall and even if you find some new proxies they even them block them out. So,why not to move something that is almost a permanent solution.We will be using a very small and free software called ultrasurf. It will not only allow you to surf blocked websites but it will also give you freedom to stream videos, download and upload files.Here is the step by step tutorial...

Saturday, 2 October 2010

Learn Brutus Tutorial

How to use Brute Force AttackWritten by: ALEX================================================== ========I, The alex, take no responsibilty for what you do with the informationthat I am providing for you. This information is for educational purposes only.================================================== ========Chapter 1: Introduction to Brutus.1.What is Brutus?2.What can I do with it?3 Where can I download Brutus?4.Where can I find a good password list?Chapter Two: Let's Get Crackin'.1.HTTP Form.2.FTP.3.POP34.Telnet.5.SMB (Netbios)6.Netbus7.Custom.Chapter Three: Wrapping up.1.Contact Information.========================================Chapter One.==What is Brutus?==Brutus is a well known password brute forcing program.==What can I do with...

Thursday, 30 September 2010

Hack websites using Auto SQL Helper

I have been asked Recently to write a tutorial on how to use"SQL I Helper V.2.7" tool.At the beginning "SQLI HelperV.2.7" is a tool that can hack vulnerable websites using SQL injection. You don't have to spend hours and hours trying to find your way in a website and trying hundreds of combination's and codes to hack a website.This tool will do it all by itself. You only have to tell it what to do.You can download it from here: Download Link: (this should link to reiluke.i.ph and nowhere else!)http://reiluke.i.ph/blogs/reiluke/20...download-link/Or Download Direct From Megaupload And Download Video Tutorial HereLets start.First you need to find the potential website that you think it might be possible to hack it. Remember...

How to Unlock the iPhone 3G, 3GS Using BlackSn0w

These are instructions on how to unlock the iPhone 3G and 3GS using BlackSn0w. To follow these instructions you must be on the 05.11.07 baseband and have already jailbroken. If you have not already jailbroken it will be easier to follow one of these tutorials which will walk you through both jailbreaking and unlocking.- Windows- Mac To check your baseband you can follow these instructions.Lets begin...Watch the Video!For your convenience this tutorial is available in video format also. Click the Watch It button to view the tutorial!Step OnePress to launch Cydia from your iPhone Springboard.Step TwoPress to select Manage from the tabs at the bottom of the screen.Step ThreePress the large Sources button.Step FourPress the Edit...

How to hack websites using LFI (Local File Inlcusion)

  A Directory Transversal Attack What is root directory of web server ?It is a specific directory on server in which the web contents are placed and can be seen by website visitors. The directories other that root may contain any sensitive data which administrator do not want visitors to see. Everything accessible by visitor on a website is  placed in root directory. The visitor can not step out of root directory. what does ../ or ..\ (dot dot slash) mean  ? The ..\ instructs the system to go one directory up. For example, we are at this location C:\xx\yy\zz. On typing ..\ , we would reach at C:\xx\yy. Again on typing ..\ , we would rech at C:\xx .  Lets again go at locatio n C:\xx\yy\zz. Now suppose we want...

Hacking into NetBIOS

NetBIOS Hacking-What is it?-Net BIOS Hacking is the art of hacking into someone else’s computer through your computer. Net BIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.-How can this be of use to me?-Most people don’t even know, but when they’re on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.-What do I need?-Windows OSCain and Abel (http://www.oxid.it/)++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++-[Step 1, Finding the target.]-++++++++++++++++++++++++++++++++++++++++++++++++++...

Phisher Program Reversed

Step 1 -Head to http://reflector.red-gate.com/Download.aspx and download .NET reflectorStep 2 - Run .NET reflector  Step 3 - Download the phisher you want to reverseStep 4 - Go into your Downloads folder and grab your phisher into .NET Reflector  Step 5 - expand your phisher  Step 6 - Open the one that is the name of the file, not the ".MY", ".MY.RESOURCES", or "-" or "references"  Step 7 - Theirs usually a form1, expand it  Step 8 - Look for button1_click, or something very similar, it's usually near the top, right click it and click "Disassemble"  Step 9 - Now look for Network credentials, and you have the email info Step 10 - Go to the email, check the inbox [How to find phishers on youtube] What to search...

Page 1 of 1812345Next
Related Posts Plugin for WordPress, Blogger...
Twitter Delicious Facebook Digg Stumbleupon Favorites More