Articles

Affichage des articles du novembre, 2012

milw0rm.com Hacking Tutorials

Image
Hacking taken from milw0rm.com Eng | 542 MB Rooting SQL Server via SQL Injection by gsy Aircrack-ptw by FBi Hacking Mac OS X – A Case Study by skillTube Hacking SQL in Linux using the SecureState Swiss Army Knife by rel1k LSO: MSFweb 3.0 part 2 by ChrisG The dangers of Ad-Hoc networks in Windows XP SP2 by rel1k Classical Basic Local Buffer Overflow by UniquE-Key How To Founding Win32 Stack Overflow Exploit by pang0 Cursed Animations from teh Wi1d W3st by muts Windows Shellcode by Xnuxer Research faking wep using linux wifislax by Komtec1 Clientless WEP Cracking (fragmentation attack using the air crack suite) by muts Local JPG shell Inclusion (LFI using php injected JPG) by Codebreak XSS injection in image formats // Taking advantages on it by diwou CA BrightStor ARCserve Backup Remote Heap Overflow Vulnerability by LSsecurity Quicktime Media 0day Exploit Video by ZoNe_VoRTeX [Win32] Learn Stack Overflow Exploitation – Part 2 by Aelphaeis Mangarae Cracking the

Backtrack DVD | Hacking Tutorials

Image
Size: 5.6GB Include: Installing Backtrack 3 Episode 1 – Network Hacking – Arp Poisoning Episode 2 – Wireless Hacking – Cracking WEP Episode 3 – Wireless Hacking – DeAuth Episode 5 – Lock Picking – Bump Key Episode 6 – Phone Phreaking – Beige Box Episode 7 – Phone Phreaking/Network Hacking – Sniffing VOIP Episode 8 – Lock Picking – DIY Padlock Shims Episode 9 – Lock Picking – Mult-Disc Combo Locks Episode 10 – Hacking Basics – MD5 Episode 11 – Website Hacking – Sql Injection Episode 12 – Hacking Basics – Backtrack Episode 13 – Website Hacking – XSS Episode 14 – Staying Secure – SSH Tunnel Episode 15 – Modding – Xbox Softmod Episode 16 – Wireless Hacking – Cracking WPA Episode 17 – Triple Boot – Windows, Backtrack, & Ubuntu Episode 18 – Local Password Cracking Episode 19 – Lock Picking Basics Episode 20 – Ettercap Episode 21 – XSS Tunnel Episode 22 – Playstation 2 Softmod Episode 23 – Cracking WEP Update Episode 24 – Bypass Hotspot’s Access Controls Und

Chat on Facebook With Opera Mini

Image
Do you have opera mini ? you want to chat on facebook ? here's how to do it no program required :D Just enter to this link :) https://touch.facebook.com/buddylist.php Happy chatting :) 

SQLi dorks for hacking israel sites

Image
I share with you some SQLI dorks for attacking Israel websites   intext:"error in your SQL syntax" +site:il     intext:"mysql_num_rows()" +site:il     intext:"mysql_fetch_array()" +site:il     intext:"Error Occurred While Processing Request" +site:il     intext:"Server Error in '/' Application" +site:il     intext:"Microsoft OLE DB Provider for ODBC Drivers error" +site:il     intext:"Invalid Querystring" +site:il     intext:"OLE DB Provider for ODBC" +site:il     intext:"VBScript Runtime" +site:il     intext:"ADODB.Field" +site:il     intext:"BOF or EOF" +site:il     intext:"ADODB.Command" +site:il     intext:"JET Database" +site:il     intext:"mysql_fetch_row()" +site:il     intext:"Syntax error" +site:il     intext:"include()" +site:il      intext:"mysql_fetch_assoc()" +site:il     intext:"

Private locals root exploit

Image
Hi Guys ! Today i share with you this big list of my private local roots (local exploit) years 2005 - 2006 -2007 - 2008 - 2010 - 2011    next time i share with you some 2012 roots  Download Password : t0ph4cking.blogspot.com Enjoy :D

Mass Deleted #OpIsrael #GazaUnderAttack

Image
#Opisrael #GazaUnderAttack http://berger.org.il/ http://progo.co.il http://cozy.co.il/ http://www.orkor.co.il/ http://qprint.co.il http://www.shokophoto.co.il/ http://shokophoto.oyo.co.il/ http://koteret106.co.il http://www.goofmesaper.co.il http://www.vibe-technologies.co.il http://www.galparts.co.il/ http://www.milimeter.co.il/ http://www.millimeter.co.il/ http://www.tzonenim.co.il/ http://www.jitte.org.il/ http://www.osteoclinic.co.il http://www.tolaw.co.il http://www.first-media.co.il http://www.simplem.co.il/ http://www.10mechir.co.il/ http://www.gazz.co.il/ http://www.notaryon.org.il/ http://www.hagay.co.il http://www.yoavstudio.co.il/ http://www.tochnitanet.com/ http://www.sol-alon.co.il/ http://www.imun2adhd.co.il http://www.ktlaw.co.il/ http://www.dancenlp.co.il/ http://www.tohar.co.il http://www.zvi-tax.co.il/ http://www.tipulim4u.co.il/ http://www.ipresent.co.il/ http://www.ronitmirsky.com/ http:

WiFiKill v1.7 - Eject any WiFi device from network

Image
If you want to disable any ip address which use same router to connect internet. Now you can used your android application, WifiKill use as can disable internet connection for a device on the same network. This is alternate version of NETCUT for Android. Simply allows you to scan your wifi network for devices, see their vendor and cut network connection for specified devices. This way you can get rid of network hoggers. It gives option to redirect HTTP traffic to specific IP, this feature can be used even to do phishing smartly. Changelog: - fixed the counter bug (I hope for the last time) - added an option to redirect HTTP traffic to specific IP (caution! this may lead to significant CPU load) - now successful kills are tagged by green icon on the left of IP (this is not 100% correct) Download this application from  LINK 1  or  LINK 2

KEYS >> OFFICE 2013 PRO PLUS

Image
  OFFICE 2013 PRO PLUS MSDN RETAIL: [New Key1]: B9GN2-DXXQC-9DHKT-GGWCR-4X6XK [New Key2]: 6PMNJ-Q33T3-VJQFJ-23D3H-6XVTX [Tested working on 18 Nov. 2012]

PySQLi - Python SQL injection framework

PySQLi is a python framework designed to exploit complex SQL injection vulnerabilities. It provides dedicated bricks that can be used to build advanced exploits or easily extended/improved to fit the case. PySQLi is thought to be easily modified and extended through derivated classes and to be able to inject into various ways such as command line, custom network protocols and even in anti-CSRF HTTP forms.  PySQLi is still in an early stage of development, whereas it has been developed since more than three years. Many features lack but the actual version but this will be improved in the next months/years. Download PySQLi

Joomscan updated - now can identify 673 joomla vulnerabilities

Image
Security Team Web-Center just released an updated for Joomscan Security Scanner. The new database Have 673 joomla  vulnerabilities Joomla! is probably the most widely-used CMS out there due to its flexibility, user friendlinesss, extensibility to name a few.So, watching its vulnerabilities and adding such vulnerabilities as KB to Joomla scanner takes ongoing activity.It will help web developers and web masters to help identify possible security weaknesses on their deployed Joomla! sites. Check for new updates with command: ./joomscan.pl or check ./joomscan.pl update  Download Joomscan

Rootdabitch version 0.1 - Multithreaded Linux root password Bruteforcer

Image
Rootdabitch version 0.1 - Multithreaded Linux root password Bruteforcer   " th3breacher! "  release   Rootdabitch v0.1  ,which is a Multithreaded Linux/UNIX tool to brute-force cracking local root through su using sucrack. sucrack is a multithreaded Linux/UNIX tool for brute-force cracking local user accounts via su. The main feature of the Rootdabitch is that It's local brute forcer, using 10 passwords in 3 seconds. and works in background so you can leave it , when root is cracked it will email the user using /bin/mail . All for this, you need to have a php shell/reverse shell/ssh access to the target to run thistool and run it as a normal user, Upload this script into it and give it the execution permission and execute the script like:  ~ ./rootdabitch youremail@address.com If the password is cracked you will have a mail with the root password and the password will be stored into password.txt . Try it ! Download Rootdabitch 0.1

How To Find Real IP Behind Cloudfare

Image
First open your command prompt and ping your pc with ping www.example.com it will show cloudfare IP Now to Find Real IP Address just adds direct as subdomain and then ping site. Ping direct.example.com it will show real IP Other Method                      You can use net craft toolbar to check real ip       http://toolbar.netcraft.com/site_report?url=http://www.example.com / :D

How to upload your shell through Tamper Data

Image
Hi Guys Many times you get login of a website, but you are unable to upload your PHP shell ! Today i'll show you how to upload your PHP shell through Tamper Data an Firefox Add-on Install Tamper Data firefox add-on: Download Tamper Data  here Now Install it and Restart Firefox Rename shell: Note: You have to rename you .php shell to .jpg to bypass the website's security To upload a shell, of-course you needed a upload option in login page or anywhere ! Demo: As an example i'll take - http://freead1.net/post-free-ad-to-USA-42 It is a free classified ads posting website, so i got a upload option there ! Find your upload option click on browse, locate you .jpg shell and select it ! Now click on Tools in Firefox Menu bar and Select Tamper Data, Tamper Data plugin will open in a new window ! Before Clicking on Upload button click on "Start Tamper" in Tamper Data window.. Note: Before Clicking on "Start Tamper" close every extra

new list of google dorks for SQLI

Image
HellO    Today i am sharing with you a list of google dorks for sql injection which is one of most used method to hack a website.   download enjoy

how to access blocked sites in your country

Image
Hey Friends, yesterday i encountered a cool Firefox and chrome plugin(add on). This enables users to access the blocked websites or the sites that are blocked in few regions say torrents blocked in India or some websites which are accessible only for US or UK users etc. So today i am going to tell you how to use that Firefox and Chrome plugin to access blocked sites or regional website. Some websites like Netflix or Hulu are only accessible to US residents, similarly, there are many other websites which may be blocked by your ISP , your school or college, etc. Stealthy is a handy add on(plugin), available for Google Chrome and Firefox, which can solve this problem. Stealthy allow users to access blocked websites by setting up a working proxy on your browser with a click of a button. What Stealthy does is that it search for different proxies online and use the best one based on your location and setup a new IP so that you can access blocked websites. As with all oth

Bypass Disabled functions using metasploit

Hi guys How to bypass disabled functions in a web server ? How to run cmd when disabled functions are On ? Here is a video that explains it using metasploit payload php/exec !!   WATCH EnjoY

Websites for Facebook autoliker

Image
Hi Guys here is a collection of  websites for facebook autoliker :D CHeck THis LIst OUt ENjoy

Firefox Speed Up X10

Image
THIS IS A VERY SIMPLE TRICK. NO SOFTWARE REQUIRED. 1. Type "about:config" into the address bar and hit enter. Scroll down and look for the following entries: 2. Alter the entries as follows: Set " network.http.pipelining " to " true " Set " network.http.proxy.pipelining " to " true " set "n etwork.http.pipelining.maxrequests " to some number like 30 . This means it will make 30 requests at once. 3. Lastly right-click anywhere and select New -> Integer . Name it " nglayout.initialpaint.delay " and set its value to " 0 ". This value is the amount of time the browser waits before it acts on information it recieves. NOTE : this trick only works for broadband users not for dialup.

Surf anonymously in the net with TOR browser

Image
Hi everyone What is the Tor Browser Bundle (TBB)? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Download Tor Browser Bundle How to download and use Tor Browser in different operating systems: Microsoft Windows Apple OSX Linux  << made by myself ./MG  

LFI Exploitation with FImap

Image
Hi GUYS this is a video to show you how to gain access to a site who has a LFI vulnerability this method require FImap watch video & enjoy ./MG

New trackers to speed up torrenting

Hi Guys here is some new trackers to speed up torrenting :D check this list out ./MG

LFI manual exploitation

Hi guys in this video i will show you  how LFI exploit work this is a manual method Enjoy watching ./MG

How to get all websites configs

New video about getting websites configs with an easy method :D Video ::!:: requirements ::!:: config.pl user.pl .htaccess  3NJ0Y

Upload shell into joomla panel

HellO in this video you will learn how to upload shell into joomla panel there are another ways to do that, i will explain it in other topic ;) Watch

5K Emails Leaked

Hi !! here is 5k emails leaked and posted here for u DownLoad ;)

FTP BruteForce Using Hydra

Hi FTP Bruteforcing using Hydra on linux This method is simple & good Watch Video EnjoY

Way to do back connect using linux distribution

Hi everybody ! in this tutorial, you will learn how back connect work in linux distribution watch video EnjoY

[PHP] Symlink Tool Sa v3.0

Image
New version of symlink tool php script -:[ User & Domains & Symlink ]:- DownloaD

[PHP] Joomla bruteforcer 2012

Image
Joomla bruteforcer  2012 script work good DonwloaD

[PHP] Wordpress Brute Forcer

Image
 Wordpress Brute Forcer Great php script DownloaD

ALL CREDIT CARD PIN CODES IN THE WORLD

Hi in this topic u can fin all Credit Card PIN codes in the world Exemples: 0000 0001 0002 0003 0004 0005 0006 0007 0008 0009 0010 0011 0012 0013 0014 0015 0016 0017 0018 0019 0020 0021 0022 0023 0024 0025 0026 0027 0028 0029 0030 0031 0032 0033 0034 0035 0036 0037 0038 0039 0040 0041 0042 0043 0044 0045 0046 0047 0048 0049 0050 0051 0052 0053 0054 0055 0056 0057 0058 0059   download all PIN codes Here