Thursday, 30 September 2010

Hack websites using Auto SQL Helper

I have been asked Recently to write a tutorial on how to use"SQL I Helper V.2.7" tool.At the beginning "SQLI HelperV.2.7" is a tool that can hack vulnerable websites using SQL injection. You don't have to spend hours and hours trying to find your way in a website and trying hundreds of combination's and codes to hack a website.This tool will do it all by itself. You only have to tell it what to do.You can download it from here: Download Link: (this should link to reiluke.i.ph and nowhere else!)http://reiluke.i.ph/blogs/reiluke/20...download-link/Or Download Direct From Megaupload And Download Video Tutorial HereLets start.First you need to find the potential website that you think it might be possible to hack it. Remember...

How to Unlock the iPhone 3G, 3GS Using BlackSn0w

These are instructions on how to unlock the iPhone 3G and 3GS using BlackSn0w. To follow these instructions you must be on the 05.11.07 baseband and have already jailbroken. If you have not already jailbroken it will be easier to follow one of these tutorials which will walk you through both jailbreaking and unlocking.- Windows- Mac To check your baseband you can follow these instructions.Lets begin...Watch the Video!For your convenience this tutorial is available in video format also. Click the Watch It button to view the tutorial!Step OnePress to launch Cydia from your iPhone Springboard.Step TwoPress to select Manage from the tabs at the bottom of the screen.Step ThreePress the large Sources button.Step FourPress the Edit...

How to hack websites using LFI (Local File Inlcusion)

  A Directory Transversal Attack What is root directory of web server ?It is a specific directory on server in which the web contents are placed and can be seen by website visitors. The directories other that root may contain any sensitive data which administrator do not want visitors to see. Everything accessible by visitor on a website is  placed in root directory. The visitor can not step out of root directory. what does ../ or ..\ (dot dot slash) mean  ? The ..\ instructs the system to go one directory up. For example, we are at this location C:\xx\yy\zz. On typing ..\ , we would reach at C:\xx\yy. Again on typing ..\ , we would rech at C:\xx .  Lets again go at locatio n C:\xx\yy\zz. Now suppose we want...

Hacking into NetBIOS

NetBIOS Hacking-What is it?-Net BIOS Hacking is the art of hacking into someone else’s computer through your computer. Net BIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.-How can this be of use to me?-Most people don’t even know, but when they’re on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.-What do I need?-Windows OSCain and Abel (http://www.oxid.it/)++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++-[Step 1, Finding the target.]-++++++++++++++++++++++++++++++++++++++++++++++++++...

Phisher Program Reversed

Step 1 -Head to http://reflector.red-gate.com/Download.aspx and download .NET reflectorStep 2 - Run .NET reflector  Step 3 - Download the phisher you want to reverseStep 4 - Go into your Downloads folder and grab your phisher into .NET Reflector  Step 5 - expand your phisher  Step 6 - Open the one that is the name of the file, not the ".MY", ".MY.RESOURCES", or "-" or "references"  Step 7 - Theirs usually a form1, expand it  Step 8 - Look for button1_click, or something very similar, it's usually near the top, right click it and click "Disassemble"  Step 9 - Now look for Network credentials, and you have the email info Step 10 - Go to the email, check the inbox [How to find phishers on youtube] What to search...

Friday, 17 September 2010

SQL Injections Basics New

"SQL Injection" is subset of the an unverified/unsanitized user input vulnerability ("buffer overflows" are a different subset), and the idea is to convince the application to run SQL code that was not intended. If the application is creating SQL strings naively on the fly and then running them, it's straightforward to create some real surprises. We'll note that this was a somewhat winding road with more than one wrong turn, and others with more experience will certainly have different -- and better -- approaches. But the fact that we were successful does suggest that we were not entirely misguided. There have been other papers on SQL injection, including some that are much more detailed, but this one shows the rationale of discovery as much as the process of exploitation. The Target IntranetThis...

Thursday, 16 September 2010

Hack administrator from Guest account.

Ever wanted to hack your college pc with guest account/student account so that you can download with full speed there ? or just wanted to hack your friend’s pc to make him gawk when you tell your success story of hacking ? well,there is a great way of hacking an administrator account from a guest account by which you can reset the  administrator password and getting all the privilages an administrator enjoys on windows..Interested ? read on…ConceptPress shift key 5 times and the sticky key dialog shows up.This works even at the logon screen. But If we replace the sethc.exe which is responsible for the sticky key dialog,with cmd.exe, and then call sethc.exe by pressing shift key 5 times at logon screen,we will get...

Tuesday, 14 September 2010

Basic Steps On SQL Injections

IntroductionI've seen a lot of short tutorials on SQL injections and then again some which rivals the Great Wall of china in length, but I've very rarely seen a SQL injection tutorial based on an actual hack where things aren't always ideal.This guide will attempt to explain the very basics of SQL injections.This tutorial is written from a website created by a friend of mine which was loaded on my local host.After navigating around for a while I found something interestinghttp://localhost/news/display.asp?id=75-------------------------------------------------------------------Section 1 - A Quick Glance at SQL Statements-------------------------------------------------------------------Anyone who's ever taken a look at SQL injections...

Monday, 13 September 2010

SQL Injection Step By Step

-------------------------------------------------------o. Finding a victim:-------------------------------------------------------In order to find vulnerable sites you can use the following search dorks. This is a list of dorks you can use to find potentially vulnerable sites.But to make the tutorial easier to follow we will use the pagehttp://www.rfidupdate.com/articles/index.php?id=-15634.Code:-inurl:aboutbook.php?id=inurl:age.php?file=inurl:age.php?id=inurl:ageid=inurl:ages.php?id=inurl:announce.php?id=inurl:art.php?idm=inurl:articipant.php?id=inurl:article.php?ID=inurl:artikelinfo.php?id=inurl:avd_start.php?avd=inurl:band_info.php?id=inurl:buy.php?category=inurl:category.php?id=inurl:channel_id=inurl:chappies.php?id=inurl:clanek.php4?id=inurl:clubpage.php?id=inurl:collectionitem.php?id=inurl:communique_detail.php?id=inurl:curriculum.php?id=inurl:declaration_more.php?decl_id=inurl:detail.php?ID=inurl:download.php?id=inurl:downloads_info.php?id=inurl:erson.php?id=inurl:event.php?id=inurl:faq2.php?id=inurl:fellows.php?id=inurl:ffer.php?idf=inurl:fiche_spectacle.php?id=inurl:forum_bds.php?num=inurl:galeri_info.php?l=inurl:gallery.php?id=inurl:game.php?id=inurl:games.php?id=inurl:historialeer.php?num=inurl:hosting_info.php?id=inurl:humor.php?id=inurl:index.php?=inurl:index.php?id=inurl:index2.php?option=inurl:iniziativa.php?in=inurl:item_id=inurl:kategorie.php4?id=inurl:labels.php?id=inurl:lay_old.php?id=inurl:loadpsb.php?id=inurl:look.php?ID=inurl:main.php?id=inurl:material.php?id=inurl:memberInfo.php?id=inurl:news.php?id=inurl:news_display.php?getid=inurl:news_view.php?id=inurl:newscat.php?id=inurl:newsDetail.php?id=inurl:news-full.php?id=inurl:newsid=inurl:newsitem.php?num=inurl:newsone.php?id=inurl:newsticker_info.php?idn=inurl:offer.php?idf=inurl:op.php?id=inurl:opinions.php?id=inurl:ost.php?id=inurl:page.php?file=inurl:page.php?id=inurl:Pageid=inurl:pages.php?id=inurl:participant.php?id=inurl:person.php?id=inurl:pinions.php?id=inurl:play_old.php?id=inurl:pop.php?id=inurl:post.php?id=inurl:preview.php?id=inurl:prod_detail.php?id=inurl:prod_info.php?id=inurl:product.php?id=inurl:product_ranges_view.php?ID=inurl:productdetail.php?id=inurl:productinfo.php?id=inurl:product-item.php?id=inurl:produit.php?id=inurl:profile_view.php?id=inurl:publications.php?id=inurl:ray.php?id=inurl:read.php?id=inurl:readnews.php?id=inurl:reagir.php?num=inurl:releases.php?id=inurl:review.php?id=inurl:rod_info.php?id=inurl:roduct.php?id=inurl:roduct_ranges_view.php?ID=inurl:roductdetail.php?id=inurl:roductinfo.php?id=inurl:roduct-item.php?id=inurl:roduit.php?id=inurl:rofile_view.php?id=inurl:rub.php?idr=inurl:rubp.php?idr=inurl:rubrika.php?idr=inurl:section.php?id=inurl:select_biblio.php?id=inurl:sem.php3?id=inurl:shop.php?do=part&id=inurl:shop_category.php?id=inurl:shopping.php?id=inurl:show.php?id=inurl:show_an.php?id=inurl:showimg.php?id=inurl:shredder-categories.php?id=inurl:spr.php?id=inurl:sql.php?id=inurl:staff_id=inurl:story.php?id=inurl:sw_comment.php?id=inurl:tekst.php?idt=inurl:theme.php?id=inurl:title.php?id=inurl:top10.php?cat=inurl:tradeCategory.php?id=inurl:trainers.php?id=inurl:transcript.php?id=inurl:tray-Questions-View.php?num=inurl:ublications.php?id=inurl:view.php?id=inurl:view_faq.php?id=inurl:view_product.php?id=inurl:viewapp.php?id=inurl:viewphoto.php?id=inurl:viewshowdetail.php?id=inurl:website.php?id=inurlrod_detail.php?id=inurl:"id="...

Wednesday, 8 September 2010

GoodLuck 3.2.0.0. direct connection

-Send and receive messages-Engage in a two way chat-Raise a33;Format Drivea33; window-Receive Total and Available RAM-Obliterate any running executable-Print designated text-Minimize all windows-Overflow cmd.exe-Receive server executable up time-Empty recycle bin-Send a33;heaps of beepsa33;-Open designated web page-Hide / Show icons-Hide / Show task bar-Black out / Show screen-Open / Close tray-Make icons dance / Stop dance-Disable / Enable shut down-Disable / Enable clipboard-Turn on strobe light/ Turn off strobe light-Caps On / Off-Hide / Show system tray-Hide / Show start menu-Hide / Show clock-Log off XP / OS-Shut down XP / OS-Restart from XP / OS-Type and save designated text in notepad-Commence default screen saver-Set designated...

Hack Websites Easily Video Tutorial With MySQL Dump V.1

Tool Description:*MySQL Dump is a Remote MySQL dump (SQL Injection)!Is possible load all data (Databases, tables, columns and data!)Dependences:* MS Netframework v.2Screen Shots:Download Link:MIRROR 1: http://www.megaupload.com/?d=PTDEC18HMIRROR 2: http://rapidshare.com/files/173763244/My...1.rar.htmlVideo Tutorial Link:http://www.megaupload.com/?d=P6KAGTGPVirose Scann:Report generated: 16.12.2008 at 3.41.14 (GMT 1)Filename: MySQLDumpv1.exeFile size: 537 KBMD5 Hash: 59D7B17FAE334C87CB064F56AAC3E469SHA1 Hash: 7F6B95DC3BFDA0FC7BC59FA8B1D3E44D0F416F48Packer detected: Microsoft Visual C# / Basic .NETSelf-Extract Archive: Nothing foundBinder Detector: Nothing foundDetection rate: 0 on 24Detectionsa-squared - Nothing found!Avira AntiVir - Nothing...

Page 1 of 1812345Next
Related Posts Plugin for WordPress, Blogger...
Twitter Delicious Facebook Digg Stumbleupon Favorites More