With this phishing and hacking software you can create login forms for facebook,Hotmail,Gmail,Yahoo very easily!
Its not always the software of the computer that slows it down.The RAM is a major key.Ger a sneak peek in the latest versions of RAM
Unlock your Adobe Photoshop for free now! And get all an access pass to edit photos.
A huge list of keys which is bound to make your version of 30 day trial into Full version!
Friday, September 30, 2011
Wednesday, September 28, 2011
The latest story doing the rounds is that MySQL.com got hacked and was serving malware which put it on the Google malware block list.It appears to be in the clear now though and it’s accessible again via Google. It seems to be a similar case with that of the recent Linux.com and Kernel.org hacks – in which the sites were compromised via developers who had access.
Tuesday, September 27, 2011
Here is a crack for windows 7 operating system which will help you to convert your trial or pirated copy into full version and you can also download updates from the microsoft website.
The pack consists of 2 softwares.
The first one is named China.rar which is used to stop the Windows7's 30 day timer. Its displayed in Chinese language but there is only one area you will have to click and rest will be managed by the software itself.
After a series of two fairly long and tough tutorials, finally I have reached to the end of Reverse Engineering series. Hope you might have enjoyed the previous two tutorials. I had to put in lot of effort. In case you have missed any of the tutorials, please go back and read them in order to have a clear understanding of this tutorial.
Saturday, September 24, 2011
Hello friends. I have been busy these days with some Metasploit stuff so I was not able to bring my continuation material for Reverse Engineering and Assembly. IN my previous post I provided a quick material for learning the basics of Assembly language. The pdf is a useful handbook and will help you for quick reference. Now I will continue the tutorial to next step. In the previous tutorial- Fast draft Assembly , I focused on Assembly basics. Here I wil throw some light on some more concepts which I found useful during my coarse of learning reverse engineering.
Friday, September 23, 2011
Facebook will officially launch its timeline feature on 30 September. They have already showcased it in their Annual Facebook meet f8 .
Lots of cool features have been added and an entirely new approach has been given to the same old looks from past many years. The changes are drastic. I am still experimenting it , but had to take out time to bring out this post for my readers who don't want to wait till 30 September. Well Zuk and facebook deserves an appreciation here. The work is cool, hope it remains stable and clean.
Thursday, September 22, 2011
'via Blog this'
Wednesday, September 21, 2011
Researchers have discovered a serious weakness in virtually all websites protected by the secure sockets layer protocol that allows attackers to silently decrypt data that's passing between a webserver and an end-user browser.The vulnerability resides in versions 1.0 and earlier of TLS, or transport layer security, the successor to the secure sockets layer technology that serves as the internet's foundation of trust.
Monday, September 19, 2011
Saturday, September 17, 2011
There is always a question that people ask me is how to learn hacking. Well I have tried my best to always find a good answer to this question, but I have always failed. The biggest reason is that hacking is not like a programming language that can be learned in few days or months. It requires a continuous effort. You cannot learn it by doing a course from NIIT or Appin. You cannot learn it by simply going to google and type "learn hacking" . It is a continuous effort of reading and then practically implementing it. Nothing can be simpler than this.
Friday, September 16, 2011
Pangolin is an automatic SQL injection penetration testing (Pen-testing) tool for Website manager or IT Security analyst. Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or users specific DBMS tables/columns, run his own SQL statement, read specific files on the file system and more.
Tuesday, September 13, 2011
Hello friends. I have been busy these days so couldn't bring anything new for you all. Currently I am shifting my focus from web hacking to reverse engineering. This field has been quenching me form some days as I don't have much knowledge related to it. But many experts have advised that learning Assembly and shell coding is essential for exploit development. There are lots of vulnerabilities discovered everyday. So a big challenge lies in converting the vulnerability into exploit.
Thursday, September 8, 2011
WebSurgery is a suite of tools for security testing of web applications. It was designed for security auditors to help them with the web application planning and exploitation. Currently, it uses an efficient, fast and stable Web Crawler, File/Dir Brute forcer, Fuzzer for advanced exploitation of known and unusual vulnerabilities such as SQL Injection, Cross site scripting (XSS), Brute force for login forms, identification of firewall-filtered rules, DOS Attacks and WEB Proxy to analyze, intercept and manipulate the traffic between your browser and the target web application.
Tuesday, September 6, 2011
Friday, September 2, 2011
Thursday, September 1, 2011
Please use this post for educational and penetration testing your own website only.
Disclaimer: The methods and shell upload shown in this tutorial were tested on a hacked website, so hackingalert is not responsible for any damage.
Special Thanks to Team Innobz for the shell upload (love you guyz).
Hello friends . In the recent time I was quiet busy with my own stuff so couldn't post cool hacking articles.
So I kept my blog traffic and adsense ticking by posting keygens and cracks .
Finally I have a nice post for you all .
The complete guide to hacking a website.
I wont go very much in detail as it will make it a huge article then . In case you want your basics to be cleared then you can refer to the following articles first before proceeding.