Pages

Saturday, March 31, 2012

Earn Money from In-Text Advertising on Your Website with Infolinks

Are you looking for monatization opportunities for your blog or website? Most of bloggers and webmasters looking for monetization opportunities to earn extra income via published content. As their site's user engagement grows, they will find monatization as a hidden opportunity to jump more few steps ahead. When it comes to monatization, you will find various kind of options if you google it. Once we hear about...

Thursday, March 29, 2012

xenotix keylogx keylogger for Firefox

Mostly all are using Firefox as a default browser and so I am going to give you one of the best tool (add-on) for the Firefox ... If you want password of your friends or any other then just install this add-on on his/her computer/laptop it is possible only if you have a physical access... so lets start... open Firefox (Internet is required). go to tools menu and click on add-on or by just simply clicking Ctrl+Shift+A. find "xenotix keylogx" key-logger. after downloading it, install it. restart Firefox. press Alt+x and set password. finish... when...

Sunday, March 25, 2012

Istealer 4.0

Istealer can be used to hack email account password and find passwords of various emails. Istealer Password stealer - hack email passwords: Download Istealer password stealer software to hack email account password. Unzip the downloaded windows password stealer. Go to http://www.esmartstart.com/ and sign up for free account. After creating free ftp server account, enable FTP Access and create a new folder named "Istealer" at your FTP. Run the Loader.exe...

Ettercap (Tool for sniffing gmail, yahoo, paypal, etc. passwords)

Ettercap is a suite for man in the middle attacks on LAN. It features sniffing of live connections, content filtering on the fly and many other interesting tricks.  It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis.  Ettercap is a Unix and Windows tool for computer network protocol analysis and security auditing. It is capable of intercepting traffic...

Wednesday, March 21, 2012

Now Watch Indian TV Shows On Youtube

Back in 2009, Youtube launched a new ‘Television Shows’ section where anyone could watch full length TV shows for free. At the time it was launched, the service was first made available only to US citizens and then it gradually rolled out to other parts of the world. Indian TV viewers, you’ll be happy to know that the ‘Television Shows’ section is now accessible in India where you can watch Indian TV serials with full length episodes for free right on the Youtube website...

Monday, March 12, 2012

I.P. Utilities

The following are the IP utilities available in Windows that help in finding out the information about IP Hosts and domains.These are the basic IP Hacking Commands that everyone must know! NOTE: The term Host used in this article can also be assumed as a Website for simple understanding purpose. 1. PING PING is a simple application (command) used to determine whether a host is online and available.PING command sends one or more ICMP Echo messages...

Metasploit Framework : Hack the Planet

Metasploit took the security world by storm when it was released in 2004. No other new tool even broke into the top 15 of this list, yet Metasploit comes in at #5, ahead of many well-loved tools that have been developed for more than a decade. It is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible...

Nessus: Premier vulnerability assessment tool

In computer security, Nessus is a proprietary comprehensive vulnerability scanning program. It is free of charge for personal use in a non-enterprise environment. Its goal is to detect potential vulnerabilities on the tested systems. For example:Vulnerabilities that allow a remote cracker to control or access sensitive data on a system. Misconfiguration (e.g. open mail relay, missing patches, etc). Default passwords, a few common passwords, and blank/absent...

Saturday, March 10, 2012

Crack WEP, WPA-2 and WPA-PSK Wi-Fi Network key

We assume that if you have reached here to read this post, then supposedly you atleast know that to hack a wireless network you atleast need a wireless card installed machine, preferably a lappy which can be carried easily. Step 1: airmon-ng Please download Backtrack 4 from HERE airmon-ng stop wlan0 iwconfig (to find all wireless network interfaces and their status) airmon-ng start wlan0 (to set in monitor mode, you may have to substitute wlan0...

How to detect unknown open ports and their associated applications using FPORT V2.0

The first step in hacking attack is information gathering and foot printing.It involves searching for victims open ports.To do this various application are available on Internet.But what can we do to stop/prevent hacker from knowing which ports of our system are open.Here is  Fport comes into picture.  fport reports all open TCP/IP and UDP ports and maps them to the owning application. This is the same information you would see using the...

Rainbow Crack : The Time-Memory Tradeoff Hash Cracker : Crack Windows passwords

Before going ahead with the discussion let us first explain to you why it is so difficult to crack windows passwords. Windows uses NTLM, LM or MD5 algorithm to encrypt the plain text passwords and saves it in system32/config folder. The encrypted passes that are saved in the SAM file under system32/config are called hashes. Now dont just browse the SAM file and attempt opening it. It's useless doing this under windows. Even if you get to open this...

WiFi Hacking Basics Part 1

If your are reading this you must have used WiFi at-least once or may be you have your own WiFi network at home.WiFi is cool and hacking WiFi is a lot  more interesting. Here i am gonna tell you the basics of Wireless Network and how it is hacked so that you get a grasp of what is going on with your WiFi.You can try yourself this attacks for thisWhat will you need ,Laptop with Backtrack installed or Backtrack in VW. Access Point(AP) USB WiFi...

'Enable Dislike Button' scam on Facebook

Whenever I hated a status message or a shared link on Facebook, I said to myself - "I wish this thing had a dislike button to express my distress".. This must have come to your mind also, specially after disliking some video on YouTube. Well this urge of disliking posts on FB is what hackers are targeting next.. So beware!!! A quick overview of how the hackers get you to click on the link follows: Following is a screenshot of how the message would...

Thursday, March 8, 2012

How to Flood Facebook Wallpost/Comment/Message

1) A Facebook Account and a slave (of course) 2) Auto-Clicker (In this tutorial we will use Auto Clicker v2.2 by Shocker) Download: You can download it at the Official Site : http://www.shockingsoft.com/AutoClicker.html NOTE: Detections are false positives. If you don't trust me you can run it send boxed. 3) The most important is BRAIN and COMMON SENSE INSTRUCTIONS: 1) Login to your Facebook account. Then after logging in, open another tab/window...

Friday, March 2, 2012

Hack Shared Data

Step 1 Get IP using netstat command. Step2 Open a dos prompt by going to start/run type "cmd" in the run box.Press OK. this is what u will see: C:\Documents and Settings\> c:windows>nbtstat -a 192.168.92.2 U will see: NetBIOS Remote Machine Name Table Name Type Status --------------------------------------------------------------- user<00> UNIQUE Registered workgroup <00> GROUP Registered user <03> UNIQUE Registered user <20> UNIQUE Registered MAC Address = xx-xx-xx-xx-xx-xx --------------------------------------------------------------- If...

Cool E-Mail Address U'll Love To Mail

1. pdf@koolwire.com      All you need to do is send any file of format among these types Word (doc, docx), Powerpoint (ppt, pptx), Excel (xls, xlsx), Visio (vsd), MS Project (mpp), Jpeg, GIF, RTF, txt to the above email address as an attachment, shortly you'll receive an email containing the PDF version of the file you sent. Cool! isn't it!  2. mp3@koolwire.com      Similar service which accepts a wav file and outputs a mp3 file.  3. ..@photos.flickr.com        Flickr provides...

Related Posts Plugin for WordPress, Blogger...