background preloader

Hacks

Facebook Twitter

Top 15 Open Source/Free Security/Hacking Tools | Security & Hacking Blog. 1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap homepage. 2. Wireshark Wireshark is a network protocol analyzer. 3. Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. 4.

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. 5. 6. ettercap 7. 8. 9. 10. w3af 11. hping 13. How to Erase Yourself From the Internet. Hackety Hack! Top Sites To Find All The Serials You Need. Top 10 Ways to Unlock the Unlockable. Russian Password Crackers: fastest, tested password recovery software. Hacker Attack Tools. 3 Hacks for Firefox That Will Double Your Internet Browsing Speed - Gnoted.com.

There are many people out there complaining about the Firefox RAM Memory Bug. Lets get it straight. It’s not a bug. It’s part of the cache feature. This ‘feature’ is how the pages are cached in a tabbed environment. To improve performance when navigating (studies show that 39% of all page navigations are renavigations to pages visited less than 10 pages ago, usually using the back button), Firefox implements a Back-Forward cache that retains the rendered document for the last five session history entries for each tab. This is a lot of data. If you have a lot of tabs, Firefox’s RAM memory usage can climb dramatically. Now a lot of us have found the ‘secrets’ on how to manipulate settings in “about:config” to drop the memory usage as long as possible and to increase the speed at which Firefox loads sites.

Remember: Firefox (download it here) is the best internet browser available (in my opinion), and these tweaks below will make it even greater and faster. Here’s how to do it: 1. 1. 2. 3. The Hacker Crackdown. Default Password List. How to Hack Your Facebook Profile Photo with Timeline. Facebook Timeline Hack Template (update) | Ausgetrock.net. Hacking the Xbox. Challenges - Thisislegal.com. How to Unlock a Computer Without a Password Reset Disk. Top 5 Websites To Learn How To Hack Like A Pro. You might be surprised to learn just how many people want to learn how to hack. The stereotype is that of the young college guy – a computer science major for sure – who spends his evenings and weekends writing up intricate hacking scripts to break into whatever computer system he can get his hands on. The truth is that what was once a male-dominated community is fast changing into one that includes folks – men and women – from many walks of life, from many countries and with many backgrounds.

A recent CNET article about DEFCON makes note of the fact that claims of sexual harassment and unwanted advances are increasing. This isn’t because hackers are getting more obnoxious or offensive, but because more female hackers are entering into the community and trying to find a home there, only to find insulting behavior, and other actions unbecoming of a gentleman.

There’s a caveat that I have to share before diving into these sites. . #1 – Hacking Tutorial: Tech Tips and Hacking Tricks. Bore Proxy - Go To MySpace or Any Web site At School or Work. Web World Wide » 50 Free Internet Tools for Tin-Foil Hat Wearers. If your wardrobe includes a shiny tin-foil hat, then you will love these free Ma Internet tools. Whether you want to protect yourself from Internet snoopers, want to spy on those out to get you, or want to be able to track trends that you know will lead to something big, then these tools will help you get the job done. Without a Trace If you want to use the Internet without anyone knowing who you are or leave an untraceable phone number, then these tools are for you. Big String. Browsing Security If you want to browse the Internet in privacy, these tools will help you do just that. Hide My Ass!. Computer Security Using the Internet is a huge open door for people to stick their nose in your business.

Avast!. Laptop Tracking If someone makes off with your laptop, know how to stop them with these tools. Adeona. Spying on Those Out to Get You If you know someone is trying to get to you, then turn the tables on them with these tools that will help you get the dirt on them. GotVoice. Learn Hacking. How to use Google for Hacking. | Arrow Webzine. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed.

In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1. There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. Inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. you now have access to the Live cameras which work in real-time. Intitle:”Live View / – AXIS” 2. Filetype:xls inurl:”email.xls” 3. . “? 4. Using Googles Full Capabilities. « XBOX, XBOX 360, PS2, PS3, PSP, & MORE! – Your source for the latest in console modding. Well most of you use Google to probably look up porn. Other just search stuff. And others use Google to hack.

Using Google, and some finely crafted searches we can find a lot of interesting information. For Example we can find: Credit Card Numbers Passwords Software / MP3′s …… (and on and on and on) Presented below is just a sample of interesting searches that we can send to google to obtain info that some people might not want us having.. After you get a taste using some of these, try your own crafted searches to find info that you would be interested in. Try a few of these searches: intitle:”Index of” passwords modified allinurl:auth_user_file.txt “access denied for user” “using password” “A syntax error has occurred” filetype:ihtml allinurl: admin mdb “ORA-00921: unexpected end of SQL command” inurl:passlist.txt “Index of /backup” “Chatologica MetaSearch” “stack tracking:” “parent directory ” /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums put this string in google search: ?

Google Hacking Database, GHDB, Google Dorks. The Jargon File. The Best Hacking Tutorial Sites - Learn Legal Hacking. Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist. Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc allinurl:/bash_history allinurl:winnt/system32/ (get cmd.exe) ext:ini eudora.ini ext:pwd inurl:(service|authors|administrators |users) "# -FrontPage-" filetype:bak inurl:"htaccess|passwd|shadow|htusers" filetype:conf slapd.conf filetype:ctt "msn" filetype:mdb inurl:"account|users|admin|administrators|passwd|password" filetype:mdb inurl:users.mdb filetype:QDF QDF filetype:pdf "Host Vulnerability Summary Report" "Assessment Report" filetype:sql ("passwd values ****" | "password values ****" | "pass values ****" ) filetype:xls inurl:"email.xls" filetype:user eggdrop user intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html) intitle:"Welcome to IIS 4.0!

" These log files record info about the SSH client PUTTY. » Make your copy of Windows XP 100% Genuine in 2 seconds !! Rapidshare Links | DVDRips - TV-Series - Appz - Games - Movies - Music - MP3. » Wireless Hacking Live-CD (FBI version){Must Have} Rapidshare Links | DVDRips - TV-Series - Appz - Games - Movies - Music - MP3. Hacking - Beginning txt. DRM Removal. How To Remove DRM from Audio Files Perhaps you've purchased music from iTunes and you want to play those tunes on a non-iPod music player.

Apple says no. Maybe you've become a Mac or Linux user, and you need your WMA (Windows Audio) files in a standard, portable format. Microsoft says no. But that doesn't mean you can't. Yes, you CAN free your iTunes music from the shackles of DRM. If you're frustrated by the DRM protection roadblock, check out my list of audio converters below. The Big List of Audio Conversion Software Requiem - The Requiem software captures the audio stream of a song while it's being played in iTunes, and outputs it to an MP3 file. Do you have another DRM remover tool that works well for you? Hack Attack : Get Windows XP SP3 Through Windows Update « DailyApps. Well If you have read my previous Hack Attack on How you can download Windows Vista SP1 through a Hack and it worked for you then here is another Hack that will allow you to download Windows XP SP3 RC1 directly from Microsoft. Windows XP SP3 will be the final service pack that we will see for the World’s biggest Operating System from Microsoft.

SP3 will bring a host of bug fixes and some new features borrowed from Vista. Well here is how you can download SP3 straight from Microsoft. Follow the instructions carefully and you’ll be running Windows XP SP3 in no time. Grab yourself a cup of Coffee as you do this.. Don’t fret too much, this won’t take much time. I can assure you that.. Download this file ( WindowsXPSP3Hack.cmd ). Please note this hack is the exact way Microsoft expects its beta testers to try Windows XP SP3 out, so you don’t have to worry too much about Microsoft catching hold of you.

I tried this on Windows XP Machine and this hack worked like a charm. PC Hacks - Tips and Tricks. How to download video from YouTube, MySpace, Google Video and others. Turn Google into your own personal (free) Napster. Video.