Skip to main content

Posts

Showing posts with the label HACKING

Sql Poizon ~ Sqli Exploit Scanner Tool

Sql Poizon tool includes php , asp , rfi , lfi dorks and using this tools you can find vulnerable sites like sql vulnerable sites and you can also find vulnerable sites by country and you can hack   sql vulnerable sites using Sql Poizon tool and you can also browse the sites using this tool. You can see above snapshot how it will find the SQL vulnerable sites.   You can download   Sql Poizon here

Types Of Hack Or Attack

hello Reader , today i'm going to sharing you some types of hack attacks are done by hackers : - Cross Site Scripting (XSS)     XSS flaws occur whenever an application takes user supplied data and sends it to a web browser without first validating or encoding that content. XSS allows attackers to execute script in the victim's browser which can hijack user sessions, deface web sites, possibly introduce worms, etc.   - Injection Flaws     Injection flaws, particularly SQL injection, are common in web applications. Injection occurs when user-supplied data is sent to an interpreter as part of a command or query. The attacker's hostile data tricks the interpreter into executing unintended commands or changing data.any  idiot can do this :p      - Malicious File Execution     Code vulnerable to remote file inclusion (RFI) allows attackers to include hostile code and data, resulting in devastating...

Best Keylogger Software:Max Keylogger

There are a lot of keyloggers available on internet and selecting a best is indeed a difficult task.If you are also looking for a keylogger that tracks each   key stroke , send reports to emails , take screenshots   , Is Undectable   and   Copy text from Clipboard   then   Max Keylogger   is best for you. Are Keyloggers Legal To Use? Keyloggers are usually associated with hacking but this is not the case.It is completely legal to use keyloggers to monitor activity of employees,Children and other people using your computers. Different People can have Different Purposes For using a Keylogger To System administrators : Keylogger could help you clearly know about what have been displayed in the system. protect yourself know everything they do on your computer. To CEOs : The computers in your company are under your full control with   Max Keylogger . You will be clear about all your employees’ performances or actions anyone using your official compu...

How to protect your email id and facebook from hackers

Everybody use email accounts and social networking websites such as orkut, twitter and facebook. There are many important informations of a person in these email accounts and social networking  website. so it is important to protect these account from hackers. Because hackers always try to get  others account to get those secret and personal data for bad purpose. If use your email id for business and other services then it's a great loss and trouble for you. So always try to be safe from hackers Follow these simple steps i am writing below to protect yourself from being hacked. Never share your password to anyone.

How to create gmail phishing page | Gmail hacking

Phishing is one of the best way to hack gmail account. I had already posted some articles on phishing but few of those are not available due to post loss in website transfer. So i am writing an article again. To create phishing page of gmail, first of all open gmail in your browser. Then click on file and then save as. Now you have saved gmail login page to your system.

Cross Site Scripting - XSS - The Underestimated Exploit

1. What is Cross Site Scripting? Cross Site Scripting  (or XSS) is one of the most common application-layer web attacks. XSS commonly targets scripts embedded in a page which are executed on the client-side (in the user’s web browser) rather than on the server-side. XSS in itself is a threat which is brought about by the internet security weaknesses of client-side scripting languages, with HTML and JavaScript (others being VBScript, ActiveX, HTML, or Flash) as the prime culprits for this exploit. The concept of XSS is to manipulate client-side scripts of a web application to execute in the manner desired by the malicious user. Such a manipulation can embed a script in a page which can be executed every time the page is loaded, or whenever an associated event is performed.

Preventing XSS Attacks

Cross Site Scripting (XSS) attacks are amongst the most common types of attacks against web applications. XSS attacks all fall under the same category however a more detailed look at the techniques employed during XSS operations reveals a multitude of tactics that exploit a variety of attack vectors. A detailed look at XSS attacks can be found in the following article;  Cross-Site Scripting attack . This article guides you through the most common and useful XSS prevention mechanisms which are Filtering and Escaping. XSS ATTACKS

Cross Site Scripting Attack

What is Cross Site Scripting? Hackers are constantly experimenting with a wide repertoire of hacking techniques to compromise websites and web applications and make off with a treasure trove of sensitive data including credit card numbers, social security numbers and even medical records. Cross Site Scripting (also known as  XSS  or CSS) is generally believed to be one of the most common application layer hacking techniques. In the pie-chart below, created by the Web Hacking Incident Database for 2011 (WHID) clearly shows that whilst many different attack methods exist, SQL injection and XSS are the most popular. To add to this, many other attack methods, such as Information Disclosures, Content Spoofing and Stolen Credentials could all be side-effects of an XSS attack.

How to Secure Your Wireless Home Network

Use these simple ways in which you can secure your wireless network.

How to hack with Trojan | Prorat tutorial

Prorat a famous trojan for hacking system, facebook,  gmail , yahoo, twitter and other accounts. Today i wil show you step by step guide to hack with Prorat. First of download Prorat from the given link http://www.prorat.net/downloads.php Then disable your antivirus. It is necessary other wise your downloaded trojan will be detected and deleted. Don’t worry, it will not harm your system at this stage. Now run Prorat.exe You will see the prorat window. There are so many options but you have to create a server first.  So click on create server. There will be 3 options