feedburner
Enter your email address:

Delivered by FeedBurner

feedburner count

What and How to Port Scan? - Beginner's verison.

Labels: , ,

In this article I hope to impart basic amount of knowledge on port scanning.It is commonly used term while browsing through Hacking related articles. Though, you could always wiki for help. I believe this would be of more use.




Exploit: SQL Injection Vulnerability in Drupal 7.x

Labels: , , , ,

Safety and security scientists from SektionEins have actually uncovered a vital SQL Shot vulnerability in Drupal CMS that leaves a a great deal of web sites that utilizes Drupal in jeopardy.



PHP fixed Remote Code Execution Vulnerabilities.

Labels: ,

The susceptibility determined as "CVE-2014-3669" could induce an integer overflow when analyzing specifically crafted serialized information with the unserialize (). The susceptibility is simply a 32-bit system, however the risk is induced by the violation which the serialized information usually originate from user-controlled stations.

How to Stop and Prevent a DDoS Attack.

Labels: ,

Distributed denial-of-service (DDoS) assaults are all the time in high headlines worldwide, as they're plaguing web sites in banks, and nearly of virtually each group having a distinguished on-line presence. The primary trigger behind the proliferation of DDoS assaults is that there's a very low-price that the attacker has to incur to place such assault in movement. Thankfully, at present numerous prevention strategies have been developed to sort out such assaults. Earlier than delving additional into understanding concerning the methods to stop DDoS assault, let’s first perceive what precisely a DDoS assault is and eventually you will be able to perfom such an attack too through this article : How to DDoS Attack


How to Trace Back a Hacker's Malware?

Labels: , , ,

In this tutorial I'll be showing you ways to obtain a hacker's information, particularly his IP address.Once you have his IP address, you can trace it to the exact location through a number of IP Lookup tools such as this free one : http://whatismyipaddress.com/ip-lookup.If you have been successful in identifying the malware file that a Hacker infected you with, then it saves most of the trouble and we can simply work on this file. I will be showing you have an unprotected hacker can give himself up to the feds by doing something stupid like this. I believe, this tutorial is a must for every hacker who does not maintain is anonymity.



How to Crack MD5, SHA-1, SHA-2 Hashes.

Labels: , , ,


I've seen some requests for individuals to crack hashes, and a few individuals are not doing it right, simply giving a hash isn't enough to assist anyone in this matter,This tutorial will walk through the fundamentals and take a look at and assist you move into your way forward in hashing.

How to Hide or Conceal URL?

Labels: , ,

As a continuation of tutorials on Phishing, we show you in this tutorial how to conceal a URL.That is, with the following techniques you can make a suspicious URL look much more trust able. For example, a URL like http://username353.000webhost.com/index.php can be made into a much cleaner and click able link as http://facebo0k.tk/. In this post, we shall explore all such possibilities with which you can deceive a user to click on a link of your choice.Though this technique can always be detected by a smart user, it is possible to get creative with these options by social engineering your victim.




How to Hack by Phishing Page?

Labels: , , ,

As a continuation of this week's Phishing Special! we show how to set up and tap User and Password details of a particular website. Assuming, you have read the previous tutorial on 'What is Phishing?' we will move on to how to set up such a page that is accessible by everyone by hosting it on a web server.




What is a Phishing Page?

Labels: , , ,



Hello everyone! As a campaign for our new eBook "HackBook", we have decided to launch a series of new guides that will be posted everyday as a sequence to this post. In this article, we shall highlight the treats you might face due to this technique and also, we will dive into its depths in the coming articles in the future.


Command Prompt Tricks: How to Kill a Computer?

Labels: ,

In this article, I will outline a few ways simple ways of removing important system files that will halt the functionality of a computer, using cmd. Though these commands may not always work if it has a file access restrictions on users.

Command Prompt Tricks



How to do a DDoS Attack?

Labels: ,

In this post I will try and address all the basics of a DDoS attack and how to launch your very own small attack. After a series of targeted attacks performed by the infamous Anonymous group, this word has been on the news for quite a while now.


Online Torrent to Direct Link Converter

Labels: , , ,

Many a times, the ports required by the torrent clients are blocked.Which is why, converting a torrent file and downloading it through a direct link can always be a handy tool. Moreover, you could always use these services to speed up the processing of downloading the file due to the lack of seeders.I hope this article is of certain help to users who have either slow torrent speeds or if torrent connections are blocked (you can gladly well use this to bypass the problem). In this post, I'll give you a list of good Online FREE services that help you do the same.


Get IMDB Ratings for Huge Movie Lists

Labels: , ,

How many times have you wondered which movie to watch from a collection of 100s of Movie lists that are simply sitting in your College LAN or your friend's hard disk? I stumbled across this amazing tool quite recently and it tool does exactly that. All you have to do is, input your movie list. It automatically gets the movie name, IMDB URL, rating, awards,cast,description. And you elegantly sort them out too according to the rating!


Use same Email Address for Creating Multiple Website Accounts

Labels: , , ,

Well, to be honest, I didn't really know what exactly to write in the title of the post perhaps "How to use same Email Account for Account verification" or "Create Fake Emails for Account Verfication" would have been more appropriate. A simple way to put it.Suppose I have my email account "blahblah@gmail.com" and I have already used this for creating a lets say, a Facebook account,now if I wanted to create another Facebook account, I clearly cannot use the same email address.But wait.. what if I told you that you can actually create another! Basically, with this trick you don't have to create multiple email accounts just for creating accounts at various websites (ie. if your email has already been used for another account on some website). Which means, you can actually not just have 2 or more Facebook accounts with the same email address.


How to Bypass Adf.ly Linkbucks Links Online

Labels: , , ,

Adf.ly is one of the most popularly used URL shortening services which also happens to be a very handy tool for monetizing from the point of view of a web master. If you spot valuable content being given away to viewers freely, then you are bound to spot an adf.ly , adfoc.us link etc.With this tool, you don't have to download any software or a plugin for your webrowser.You can just enter the adf.ly URL and it will give you the original URL that is sitting behind the adf.ly link!




New Facebook Message Malware IMG_xxxx.zip

Labels: , ,

Alright, there is yet another widespread malware that is spreading on the facebook at the moment.In fact, a friend of mine was infected and I happened to get the this chat message.The moment I received this, I realized it was a virus of some sort.The complete analysis of the malware in particular is simple and has been studied by malware bytes.




I hope you find this post enlightening to prevent such attacks on your computer.