Skip to main content

Posts

Showing posts from January, 2015

Featured Post

Kali Linux Terminal Customization Tutorial

Today I'll show you guys how to change kali linux terminal header text.

How to Crack Accounts Using Bruteforce

How to Crack Accounts Using Bruteforce Brute force attacks are one of the most commonly used attacks to compromise online accounts, they have been known for decades but still they are actively being used to compromise online accounts, in this tutorial I would be demonstrating how you can utilize a brute force attacks on Web forms using a popular and powerful tool called Sentry MBA This tutorial is divided into 6 parts: 1) Cracking Terms and some theory 2) Tools Needed 3) Gathering Combos 4) Gathering Proxies 5) Testing Proxies 6) Making Config and Cracking 1) Cracking terms and some theory: Dictionary Attack: A dictionary attack is a method of hacking into a password-protected computer or server or account by systematically entering every word in a dictionary (wordlist or combolist) as a password and or username.   Wordlist or Passwordlist : Wordlist or passwordlist is a list of words that is used for cracking hashes (encrypted text) or those logins t

Wordpress 0day Exploiter [ Full Tutorial ]

Wordpress 0day Exploiter [ Tutorial ] Wordpress 0day Exploiter Wordpress 0day Exploiter is a tool that enable you to register as new admin on a wordpress site which have the bug on the Ajax.php file. How to create dorks? It's very easy so create the dorks, the list of vulnerable themes are already provided on the right richtext box. So, you just need to add the theme name. Dork: inurl:/wp-content/themes/[theme_name] Example: inurl:/wp-content/themes/appius How to use the tools? It's easy, once you have found your target, 1- Simply paste the site URL,theme name, an your email in the textbox 2- Click on Confirm > Exploit 3- If your target is vulnerable, the " Register " button will be enabled 4- Click on Register and the webbrowser will bring you to the registration page 5- Enter your username and email 6- Check your email inbox for the confirmation and the password for your account. 7- Login to the site and there you go 8

Hack A Facebook Account By Bypassing Security Question

Hack A Facebook Account By Bypassing Security Question Many of us thought that By setting a Good Security Question on social networking sites keep them safe from the hands of hackers.But Actually Hackers Are just like Worms.They can able to find holes in the wall of security. As we all Know Facebook is a gaint site. it contains a strong security. But as newton "every action has equal and opposite reaction." So this security is also somehow act as a loophole in thier security. So Guys now i am going to Start this tutorial. just follow these simple steps and Hack anyone You want. STEP 1: Create three facebook Fake Profiles with different names and different profile details. i know it sounds funny but wait You will be shocked when You know the truth behind it. so guys..the profiles must looks real enough to appeal your victim to accept the request from them. STEP 2: Send Friend request from these three profiles to Your Victim. STEP 3: Be Patient,Wai

Create Facebook Single Name On Mobile

Requirements. :---  1) Java Enabled Mobile  2) Uc browser 9.0 above. .STEPS :- 1) Open the id which u want to create single name. 2) Now go to UC BROWSER SETTINGS > NETWORK > PORT.  3) Enable the Port Option. 4) Now put this 219.83.100.195:8080 in the port. OR get a working indonesian proxy from google.! 5) now in down there will be a box for inserting DOMAIN. br: 6) Insert m.facebook.com in domain box n then SAVE the whole settings. 7) now go back to ur fb id. 8) fb will now run slowly.! Now go to account settings.  9) Change Language To BAHASA INDONESIA.  10) Now Go to Name change, remove the last name & SAVE it.! 11) Its DONE NOW! U will have ur First name only.! 12) Aftr all these, remove the proxy n change the laguage back to English(US).ENJOY!!!! :-) Happy single name ;)

Best top 50 Android games ever (The best android games of all time)

While the 'free-to-play' market has taken a bit of a beating of late due to gamers falling out of love with the use of in-app payments, the world of mobile gaming is still an exciting one. Whether you want games that will last the length of a commute, or want to be lost in a port of GTA where you spend hours mowing down pedestrians and making money out of murder, there is a game on here for you. This constantly updated list is a mixture of free and paid for games, and also that one in between - some in-app payments aren't really that bad. Honest! If by the end you think we have missed something special off of the list, let us know and we will see if it is worthy of inclusion further down the line. 1. Dots (free)  Proving the notion that simpler is better on mobile, Dots is stupidly, almost patronisingly simple, with players just drawing lines between coloured dots. Link them up and, as coloured things tend to do in games, they disappear, So more

DDOS Attack Full Tutorial with Software

A new DDoS tool from Anonymous called high-orbit ion canon or HOIC come into light. Attackers are constantly changing their tactics and tools in response to defender's actions. HOIC is an Windows executable file. Once started, you will be presented with the following GUI screen. If the attacker clicks on the + sign under TARGETS they get another pop-up box where you can specify target data. When you click on the+ button, a new window will open where you can specify following things URL - is the target website to attack Power -> sets the request velocity. Booster - are config scripts that define the dynamic request attributes HOIC includes a new feature called 'boosters' which are files you download or add to an attack machine which enables the attacker to manipulate headers such as language, referrer, host, etc. To launch the attack click on "FIRE TEH LAZER!" button. The claim is this: LOIC did TCP, UDP and HTTP flooding, but HOIC focus

Credit Card Hacking Full Tutorial

Hello brother . This is fully educational perpose post . if u can use it for any harm work . it will be your own risk +++++++++++++++++++++++++++++++++++ THE BIG QUESTION: WHAT IS CARDING? +++++++++++++++++++++++++++++++++++ - Well, defined loosely, carding is the art of credit card manipulation to access goods or services by way of fraud. But dont let the "politically correct" definition of carding stop fool you, because carding is more than that. Much more. Although different people card for different reasons, the motive is usually tied to money. Yea, handling a $9,000 plasma television in your hands and knowing that you didnt pay one red cent for it is definitely a rush. But other factors contribute to your personal reason for carding. Many carders in the scene come from poor countries, such as Argentina, Pakistan, and Lebanon where $50 could mean a weeks pay, on a good day. Real carders (the one that have been in the scene the longest)

How to use google dorks (Google dork using)

Hello guys , today i will show you that, how to use google dork for hacking, Its very basic and most important thing for hacking ;) . So, Let's start - You can use google dorks to find SQL injection vulnerabilities. Here is an example of google dork: Code: inurl:index.php?id= +.com This one will search for "index.php?id" in the URL in .com domains Here is list with SQLi dorks: Code: http://pastebin.com/wUyRb0k8 You can add + (domainhere) Here are some examples: Code: inurl: index.php?id= +.com inurl: index.php?id= +.net inurl: index.php?id= +.org inurl: index.php?id= +.cc inurl: index.php?id= +.ws inurl: index.php?id= +.edu inurl: index.php?id= +.gov Also you could search for keywords by that way: Code: inurl:index.php?id= intext"keyword" just type intext"keyword" and change keyword with something for example credit card. I think this is enough for basics of google dorks, since I don't want 1000000000000 defanced websites after publishing this.