Today we will show you how to hack Passwords using an USB Pen Drive. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend’s/college Computer. We need the following tools to create our rootkit.

Read more..

Your rating: None Average: 2.6 (5 votes)

Tool Physically Hacks Windows

Lets an attacker use Firewire to take over a 'locked' Windows machine

No screwdriver required: A researcher has released a plug-and-go physical hacking tool that uses a Firewire cable to “own” a Windows machine within seconds.Read more..

Your rating: None Average: 1.5 (2 votes)

Remote/Local File Inclusion Exploits

Remote and local file inclusions are just a problem on the coding end, like most exploits. Of course it takes a second person to make it happen, hehe. So this paper will hopefully give you some ideas on how to prevenet a file inclusion exploit on your website and most importantly, in your code. I will be providing the code examples in PHP format.

Let's take a look at some code that make the RFI/LFI exploits possible.

<a href=index.php?page=file1.php>Files</a>
$page = $_GET[page];

Now obviously this should never be used. The $page input isnt sanitized at all. The $page input is passed directly to the damn webpage, which is a very big no no. You should always sanitize every input passed through the browser. When the user clicks the "Files" link on the webpage to visit "files.php" it will look something like this.

Read more..
Your rating: None Average: 2 (1 vote)


Hacking web application was always curious for the script kiddies. And hacking free web email account is every geek first attempt. The method which I will describe in this post is not new; the same method can be applied to yahoo and other free web email services too.

The method we will be using is cookie stealing and replaying the same back to the Gmail server. There are many ways you can steal cookie, one of them is XSS (Cross site scripting) discussed by other is earlier post. But we won’t be using any XSS here, in our part of attack we will use some local tool to steal cookie and use that cookie to get an access to Gmail account.

Assumption:Read more..

Your rating: None Average: 1.7 (3 votes)

Harmful Email Subjects to Avoid

I. Emails from people trying to infect your system and steal your  friends' email addresses for spam

I.1. Pictures of Osama Bin Laden hanging or Arnold Schwarzenegger's
suicide note
I.2. Email that seems to come from your system administrator or
other familiar sender that says your email could not be
delivered, or some similar statement.
I.3. Email with subject "Against!" or "Revenge"
I.4. Email with subject Re_ and body with animals or foto or other

II. Emails from people trying to steal your identity (and your money)

II.1. Update Your Billing Information (from eBay)
II.2. Your account at eBay has been suspended
II.3. Your account at Wells Fargo has been suspended
II.4. Notification of US Bank Internet Banking
II.5. Attn: Citibank Update
II.6 Confirm AOL Billing Info

III. Emails from people trying to fool you into hurting yourself or  your friends and coworkers

III.1 Subject: "jdbg" Virus: how to detect and remove.

More Details About Each AttackRead more..

Your rating: None Average: 2 (1 vote)

In this article I am trying to explain what DDOS is and how it can be prevented. DDOS happens due to lack of security awareness of the network/server owners. On a daily basis we hear that a particular machine is under DDOS attack or NOC has unplugged the machine due to DDOS attack . So DDOS has become one of the common issues in this electronics world. DDOS is like a disease which doesn't have an anti-viral developed. So we should be carefull while dealing with it . Never take it lightly. In this article i am trying to explain the steps/measures which will help us defend from DDOS attack ,up to a certain extend .

What is a DDOS attack?
   Simply said, DDOS is an advanced version of DOS attack . Like DOS , DDOS also tries to deny the important services running on a server by broadcasting packets to the destination server in a way that the Destination server cannot handle it. The speciality of the DDOS is that, it relays attacks not from a single network/host like DOS. The DDOS attack will be launched from different dynamic networks which has already been compromised.
Read more..
Your rating: None Average: 2 (1 vote)



Sponsered links

Bookmark Us!


Page Rank


First say to yourself what you would be; and then do what you have to do.

Explore Tags

Follow Us