background preloader

Hacking

Facebook Twitter

Anonymous Exposes Pedophiles On Twitter. Guide Destroy someones computer. Google Hacking Database, GHDB, Google Dorks. NEW!!!! Destroy someone's Computer! : OFF Topic. Vampyre is right.1. LIL DEVIL IS AN A-HOLE2. THAT IS HACKING WHICH IS ILLEGAL3. LIL DEVIL IS AN A-HOLE X10= ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE 4. IF YOU ACTUALLY DID THAT, YOU WOULD BE MORE OF AN ASS5. IF YOU EVEN HAD A PERFECTLY GOOD REASON TO MAKE THAT STUPID PROGRAM (which i doubt you did) IT WOULD MAKE YOU EVEN MORE OF AN ASS6. You are a d****e-bag .nub we need one that can delete "LiL-DeViL:from forums" March 2011. Ok, here's a new quick tutorial for everyone who has been having to deal with Facebook blocking your entrance into someone's account due to logging in from a different location.

Ever since I had been problems constantly having to deal with Facebook leaving me out off people's accounts I began to think that I should write over my experiences to help others. I will go over specific techniques and ideas to eventually grant you entrance to their accounts without having to deal with that Facebook problem having logging in from different location. 1. Before you even begin reading this, you must already have their passwords or e-mails. If not, I will tell you a few ideas of how to acquire them. If you only want to log in without changing passwords, I would suggest that you steal their passwords through Phishing, Keylogging, or Social Engineering. 2. 3. Ok, let's move on to the actual information. -This method is a cheap shot method, but you never know if it might work or not. 1. 2. 3. 4.

Computer pranks - Google Keyword - Website-Tools.net. How to make a prank shutdown virus. Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist. Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc allinurl:/bash_history allinurl:winnt/system32/ (get cmd.exe) ext:ini eudora.ini ext:pwd inurl:(service|authors|administrators |users) "# -FrontPage-" filetype:bak inurl:"htaccess|passwd|shadow|htusers" filetype:conf slapd.conf filetype:ctt "msn" filetype:mdb inurl:"account|users|admin|administrators|passwd|password" filetype:mdb inurl:users.mdb filetype:QDF QDF filetype:pdf "Host Vulnerability Summary Report" "Assessment Report" filetype:sql ("passwd values ****" | "password values ****" | "pass values ****" ) filetype:xls inurl:"email.xls" filetype:user eggdrop user intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html) intitle:"Welcome to IIS 4.0!

" These log files record info about the SSH client PUTTY. DropSend - Email large files and send large files. Hack Tools ~ Hacking Tutorials n Hack Tools - Isoftdl Hackers Portal. Routerpwn 1.4.140. The Open Organisation Of Lockpickers :: Meetings. This is a repository of the most up-to-date versions of Deviant's lock diagrams and animations. Seen in all of the TOOOL educational materials and slide decks, these files are all released under the Creative Commons license. You are free to use any of them for non-commercial purposes, as long as they are properly attributed and the same freedom for others is maintained in all derivative works.

Please note that these diagrams have evolved and developed over time. While Deviant is still proud of the older versions of his images, if you still have copies of legacy material they should all be replaced with the latest versions available here. Each image shown below in thumbnail form can be accessed in high resolution individually, or you can obtain the full set from the zip archive at the bottom of this page. Lock Basics and Mechanical Operation How pin tumblers are arranged and how locks operate (or fail to) with conventional keys Introduction to Lockpicking Manipulation-Resistant Locks.

Learn to Pick Locks for Fun and an Increased Understanding of Security. Open a Padlock with an Aluminum Can. How to Pick a Lock with a Bump Key. The point that many people miss is that bump keys and lockpicks allow access to an area without any obvious sign of forced entry. This allows for long term theft, especially in an office or retail situation where high value items may be stored in a supposedly secure area and not be missed for some time, but where attempting to force a lock would bring immediate attention.

If my wife comes home to a lock drilled off the door, she going to call the police. If an intruder uses a bump key, she could be totally unaware that someone was lurking inside. Knowing someone has broken in is sometimes more important than keeping them out altogether. Frankly I blame the whole "locks are for honest people" mentality for leading people to choose inferior residential locks over much better but slightly more expensive alternatives.

How Secure Is My Password? Easy Software Keylogger Using Shadow Keylogger. Evilzone - Hacking and Security Community - Index. Th3 0uTl4wS r3Fug3. Black Hat hacker, Black Hat Hacking, White Hat and Black hat hacking tutorials. iExploit - Community. InterN0T - Underground Security Training. Thisislegal.com. The Best Hacking Tutorial Sites - Learn Legal Hacking. Free online hacking game - Slave hack, hack computers, banks and servers. HellBound Hackers. Hack This Site! 2600: The Hacker Quarterly. Hackergames.net. Hacking. Vote Now! Top Ten Web Hacking Techniques of 2011. Every year the Web security community produces a stunning amount of new hacking techniques published in various white papers, blog posts, magazine articles, mailing list emails, etc.

Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and so on. Beyond individual vulnerability instances with CVE numbers or system compromises, we’re talking about actual new and creative methods of Web-based attack. The Top Ten Web Hacking Techniques list encourages information sharing, provides a centralized knowledge-base, and recognizes researchers who contribute excellent work. How the winners were selected… Phase 1: Open community voting (Ballot) [COMPLETE] From of the field of 51 total entries received listed below, each voter (open to everyone) ranks their fifteen favorite Web Hacking Techniques using a survey.

Each entry (listed alphabetically) get a certain amount of points depending on how highly they are individually ranked in each ballot. How To Become A Hacker. Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?

". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianBulgarianChinese, Czech. The five-dots-in-nine-squares diagram that decorates this document is called a glider. 1. 2. 3. 5. 2. HackQuest :: Learn about Hacking, Cracking, JavaScript, PHP, Cryptology and Password security. Mac Hacking [dot] net - Knowledge Base.

Top Sites To Find All The Serials You Need |Hack Tricks - Hacking, Facebook Tricks, Pranks, Softwares. How to Hack: Ethical Hacking and Cyber Security | Go Hacking. PC Hacks | Learn How To Hack.