Articles

Affichage des articles du 2012

IP addresses you should never scan

Image
    US GOVT IP ADDRESSES YOU SHOULD NOT SCAN ---------------------------------------- RANGE 6 6.* - Army Information Systems Center   RANGE 7 7.*.*.* Defense Information Systems Agency, VA   RANGE 11 11.*.*.* DoD Intel Information Systems, Defense Intelligence Agency, Washington DC   RANGE 21 21. - US Defense Information Systems Agency   RANGE 22 22.* - Defense Information Systems Agency   RANGE 24 24.198.*.*   RANGE 25 25.*.*.* Royal Signals and Radar Establishment, UK   RANGE 26 26.* - Defense Information Systems Agency   RANGE 29 29.* - Defense Information Systems Agency   RANGE 30 30.* - Defense Information Systems Agency   RANGE 49 49.* - Joint Tactical Command   RANGE 50 50.* - Joint Tactical Command   RANGE 55 55.* - Army National Guard Bureau   RANGE 55 55.* - Army National Guard Bureau   RANGE 62 62.0.0.1 - 62.30.255.255 Do not scan!   RANGE 64 64.70.*.* Do not scan 64.22

milw0rm.com Hacking Tutorials

Image
Hacking taken from milw0rm.com Eng | 542 MB Rooting SQL Server via SQL Injection by gsy Aircrack-ptw by FBi Hacking Mac OS X – A Case Study by skillTube Hacking SQL in Linux using the SecureState Swiss Army Knife by rel1k LSO: MSFweb 3.0 part 2 by ChrisG The dangers of Ad-Hoc networks in Windows XP SP2 by rel1k Classical Basic Local Buffer Overflow by UniquE-Key How To Founding Win32 Stack Overflow Exploit by pang0 Cursed Animations from teh Wi1d W3st by muts Windows Shellcode by Xnuxer Research faking wep using linux wifislax by Komtec1 Clientless WEP Cracking (fragmentation attack using the air crack suite) by muts Local JPG shell Inclusion (LFI using php injected JPG) by Codebreak XSS injection in image formats // Taking advantages on it by diwou CA BrightStor ARCserve Backup Remote Heap Overflow Vulnerability by LSsecurity Quicktime Media 0day Exploit Video by ZoNe_VoRTeX [Win32] Learn Stack Overflow Exploitation – Part 2 by Aelphaeis Mangarae Cracking the

Backtrack DVD | Hacking Tutorials

Image
Size: 5.6GB Include: Installing Backtrack 3 Episode 1 – Network Hacking – Arp Poisoning Episode 2 – Wireless Hacking – Cracking WEP Episode 3 – Wireless Hacking – DeAuth Episode 5 – Lock Picking – Bump Key Episode 6 – Phone Phreaking – Beige Box Episode 7 – Phone Phreaking/Network Hacking – Sniffing VOIP Episode 8 – Lock Picking – DIY Padlock Shims Episode 9 – Lock Picking – Mult-Disc Combo Locks Episode 10 – Hacking Basics – MD5 Episode 11 – Website Hacking – Sql Injection Episode 12 – Hacking Basics – Backtrack Episode 13 – Website Hacking – XSS Episode 14 – Staying Secure – SSH Tunnel Episode 15 – Modding – Xbox Softmod Episode 16 – Wireless Hacking – Cracking WPA Episode 17 – Triple Boot – Windows, Backtrack, & Ubuntu Episode 18 – Local Password Cracking Episode 19 – Lock Picking Basics Episode 20 – Ettercap Episode 21 – XSS Tunnel Episode 22 – Playstation 2 Softmod Episode 23 – Cracking WEP Update Episode 24 – Bypass Hotspot’s Access Controls Und

Chat on Facebook With Opera Mini

Image
Do you have opera mini ? you want to chat on facebook ? here's how to do it no program required :D Just enter to this link :) https://touch.facebook.com/buddylist.php Happy chatting :) 

SQLi dorks for hacking israel sites

Image
I share with you some SQLI dorks for attacking Israel websites   intext:"error in your SQL syntax" +site:il     intext:"mysql_num_rows()" +site:il     intext:"mysql_fetch_array()" +site:il     intext:"Error Occurred While Processing Request" +site:il     intext:"Server Error in '/' Application" +site:il     intext:"Microsoft OLE DB Provider for ODBC Drivers error" +site:il     intext:"Invalid Querystring" +site:il     intext:"OLE DB Provider for ODBC" +site:il     intext:"VBScript Runtime" +site:il     intext:"ADODB.Field" +site:il     intext:"BOF or EOF" +site:il     intext:"ADODB.Command" +site:il     intext:"JET Database" +site:il     intext:"mysql_fetch_row()" +site:il     intext:"Syntax error" +site:il     intext:"include()" +site:il      intext:"mysql_fetch_assoc()" +site:il     intext:"

Private locals root exploit

Image
Hi Guys ! Today i share with you this big list of my private local roots (local exploit) years 2005 - 2006 -2007 - 2008 - 2010 - 2011    next time i share with you some 2012 roots  Download Password : t0ph4cking.blogspot.com Enjoy :D

Mass Deleted #OpIsrael #GazaUnderAttack

Image
#Opisrael #GazaUnderAttack http://berger.org.il/ http://progo.co.il http://cozy.co.il/ http://www.orkor.co.il/ http://qprint.co.il http://www.shokophoto.co.il/ http://shokophoto.oyo.co.il/ http://koteret106.co.il http://www.goofmesaper.co.il http://www.vibe-technologies.co.il http://www.galparts.co.il/ http://www.milimeter.co.il/ http://www.millimeter.co.il/ http://www.tzonenim.co.il/ http://www.jitte.org.il/ http://www.osteoclinic.co.il http://www.tolaw.co.il http://www.first-media.co.il http://www.simplem.co.il/ http://www.10mechir.co.il/ http://www.gazz.co.il/ http://www.notaryon.org.il/ http://www.hagay.co.il http://www.yoavstudio.co.il/ http://www.tochnitanet.com/ http://www.sol-alon.co.il/ http://www.imun2adhd.co.il http://www.ktlaw.co.il/ http://www.dancenlp.co.il/ http://www.tohar.co.il http://www.zvi-tax.co.il/ http://www.tipulim4u.co.il/ http://www.ipresent.co.il/ http://www.ronitmirsky.com/ http:

WiFiKill v1.7 - Eject any WiFi device from network

Image
If you want to disable any ip address which use same router to connect internet. Now you can used your android application, WifiKill use as can disable internet connection for a device on the same network. This is alternate version of NETCUT for Android. Simply allows you to scan your wifi network for devices, see their vendor and cut network connection for specified devices. This way you can get rid of network hoggers. It gives option to redirect HTTP traffic to specific IP, this feature can be used even to do phishing smartly. Changelog: - fixed the counter bug (I hope for the last time) - added an option to redirect HTTP traffic to specific IP (caution! this may lead to significant CPU load) - now successful kills are tagged by green icon on the left of IP (this is not 100% correct) Download this application from  LINK 1  or  LINK 2

KEYS >> OFFICE 2013 PRO PLUS

Image
  OFFICE 2013 PRO PLUS MSDN RETAIL: [New Key1]: B9GN2-DXXQC-9DHKT-GGWCR-4X6XK [New Key2]: 6PMNJ-Q33T3-VJQFJ-23D3H-6XVTX [Tested working on 18 Nov. 2012]

PySQLi - Python SQL injection framework

PySQLi is a python framework designed to exploit complex SQL injection vulnerabilities. It provides dedicated bricks that can be used to build advanced exploits or easily extended/improved to fit the case. PySQLi is thought to be easily modified and extended through derivated classes and to be able to inject into various ways such as command line, custom network protocols and even in anti-CSRF HTTP forms.  PySQLi is still in an early stage of development, whereas it has been developed since more than three years. Many features lack but the actual version but this will be improved in the next months/years. Download PySQLi

Joomscan updated - now can identify 673 joomla vulnerabilities

Image
Security Team Web-Center just released an updated for Joomscan Security Scanner. The new database Have 673 joomla  vulnerabilities Joomla! is probably the most widely-used CMS out there due to its flexibility, user friendlinesss, extensibility to name a few.So, watching its vulnerabilities and adding such vulnerabilities as KB to Joomla scanner takes ongoing activity.It will help web developers and web masters to help identify possible security weaknesses on their deployed Joomla! sites. Check for new updates with command: ./joomscan.pl or check ./joomscan.pl update  Download Joomscan

Rootdabitch version 0.1 - Multithreaded Linux root password Bruteforcer

Image
Rootdabitch version 0.1 - Multithreaded Linux root password Bruteforcer   " th3breacher! "  release   Rootdabitch v0.1  ,which is a Multithreaded Linux/UNIX tool to brute-force cracking local root through su using sucrack. sucrack is a multithreaded Linux/UNIX tool for brute-force cracking local user accounts via su. The main feature of the Rootdabitch is that It's local brute forcer, using 10 passwords in 3 seconds. and works in background so you can leave it , when root is cracked it will email the user using /bin/mail . All for this, you need to have a php shell/reverse shell/ssh access to the target to run thistool and run it as a normal user, Upload this script into it and give it the execution permission and execute the script like:  ~ ./rootdabitch youremail@address.com If the password is cracked you will have a mail with the root password and the password will be stored into password.txt . Try it ! Download Rootdabitch 0.1

How To Find Real IP Behind Cloudfare

Image
First open your command prompt and ping your pc with ping www.example.com it will show cloudfare IP Now to Find Real IP Address just adds direct as subdomain and then ping site. Ping direct.example.com it will show real IP Other Method                      You can use net craft toolbar to check real ip       http://toolbar.netcraft.com/site_report?url=http://www.example.com / :D

How to upload your shell through Tamper Data

Image
Hi Guys Many times you get login of a website, but you are unable to upload your PHP shell ! Today i'll show you how to upload your PHP shell through Tamper Data an Firefox Add-on Install Tamper Data firefox add-on: Download Tamper Data  here Now Install it and Restart Firefox Rename shell: Note: You have to rename you .php shell to .jpg to bypass the website's security To upload a shell, of-course you needed a upload option in login page or anywhere ! Demo: As an example i'll take - http://freead1.net/post-free-ad-to-USA-42 It is a free classified ads posting website, so i got a upload option there ! Find your upload option click on browse, locate you .jpg shell and select it ! Now click on Tools in Firefox Menu bar and Select Tamper Data, Tamper Data plugin will open in a new window ! Before Clicking on Upload button click on "Start Tamper" in Tamper Data window.. Note: Before Clicking on "Start Tamper" close every extra

new list of google dorks for SQLI

Image
HellO    Today i am sharing with you a list of google dorks for sql injection which is one of most used method to hack a website.   download enjoy

how to access blocked sites in your country

Image
Hey Friends, yesterday i encountered a cool Firefox and chrome plugin(add on). This enables users to access the blocked websites or the sites that are blocked in few regions say torrents blocked in India or some websites which are accessible only for US or UK users etc. So today i am going to tell you how to use that Firefox and Chrome plugin to access blocked sites or regional website. Some websites like Netflix or Hulu are only accessible to US residents, similarly, there are many other websites which may be blocked by your ISP , your school or college, etc. Stealthy is a handy add on(plugin), available for Google Chrome and Firefox, which can solve this problem. Stealthy allow users to access blocked websites by setting up a working proxy on your browser with a click of a button. What Stealthy does is that it search for different proxies online and use the best one based on your location and setup a new IP so that you can access blocked websites. As with all oth