background preloader

Hacking

Facebook Twitter

How to use Google for Hacking. | Arrow Webzine - StumbleUpon. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1. Hacking Security Cameras There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time.

All you have to do is use the following search query in Google. Inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. intitle:”Live View / – AXIS” 2. 3. . “? 4. Using Googles Full Capabilities. & XBOX, XBOX 360, PS2, PS3, PSP, &... - StumbleUpon. Well most of you use Google to probably look up porn. Other just search stuff. And others use Google to hack. Using Google, and some finely crafted searches we can find a lot of interesting information.

For Example we can find: Credit Card Numbers Passwords Software / MP3′s …… (and on and on and on) Presented below is just a sample of interesting searches that we can send to google to obtain info that some people might not want us having.. After you get a taste using some of these, try your own crafted searches to find info that you would be interested in. Try a few of these searches: intitle:”Index of” passwords modified allinurl:auth_user_file.txt “access denied for user” “using password” “A syntax error has occurred” filetype:ihtml allinurl: admin mdb “ORA-00921: unexpected end of SQL command” inurl:passlist.txt “Index of /backup” “Chatologica MetaSearch” “stack tracking:” “parent directory ” /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums put this string in google search: ?

Google Hacking Database, GHDB, Google Dorks. Turn Your Old Router into a Range-Boosting Wi-Fi Repeater - Lifehacker. The Best Hacking Tutorial Sites - Learn Legal Hacking. Hack This Site! InterN0T - Underground Security Training. Evilzone Hacking and Security Network. How To Validate A Credit Card With Your Mind | 1m4ge - StumbleUpon. How To Validate A Credit Card With Your Mind [source] Accept Credit Cards Using your Smartphone with no monthly fees - Try Kudos Today!

RedditTumblrStumbleUponDigg Labels: graphic, illustration, infographic You may also like : Mercedes Key Chain Pendrive Crystal Owl Pendrive Star Trek Pizza Cutter Asparagus Cake Crystal Car Pendrive Chameleon Light 5 comments: July 6, 2011 at 6:09 AM EteRniTy said... It worked for most of the cards...but still there are some exceptions...I use my Master Credit Card which doesn't follow this. July 24, 2011 at 6:04 PM NeKroloGiK said... Same here, I have a master card and it doesn't follow. July 28, 2011 at 5:39 AM elads said... yea... now do cvv/2... October 14, 2011 at 4:27 PM Joao said... so... what exactly does this "skill" help you with?

November 1, 2013 at 4:42 PM Jason Murphy said... I wonder if this apply to most or all credit cards. Post a Comment Newer PostOlder Post Subscribe to: Post Comments (Atom) Tags Subscribe via e-mail Enter your email address: Top 1m4ge Blog Archive. A Website Dedicated to Computer Professionals - StumbleUpon. Soda Machine Hack. Most modern vending machines have little computers inside. A tiny screen usually displays some information.

Although relatively little known, pressing a certain combinations of buttons can control the settings. For instance, you can check the internal temperature, view the amount of money inside, empty change, or dump certain beverages. It will generally only work on new machines which is pictured on the right side. Press the buttons [4] [2] [3] [1] one after another. These can be arranged vertically or horizontally depending on the layout of the buttons. If one does not work, try the other. Once inside the buttons become controls for navigating the menu system. Button [1] – Back/ExitButton [2] – DownButton [3] – UpButton [4] – Select You should now be able to scroll through the available settings. Here are the descriptions of some of the settings you may run into: Pressing the coin return or back button also exits out of the setting menus.

How to Crack the Account Password on Any Operating System - Joe Tech - StumbleUpon. This guest post was written by Blair Mathis from LaptopLogic.com – your premier source for the latest laptop software news and best laptop accessories. Computer passwords are like locks on doors – they keep honest people honest. If someone wishes to gain access to your laptop or computer, a simple login password will not stop them. Most computer users do not realize how simple it is to access the login password for a computer, and end up leaving vulnerable data on their computer, unencrypted and easy to access.

Are you curious how easy it is for someone to gain access to your computer? Windows Windows is still the most popular operating system, and the method used to discover the login password is the easiest. Simply download the Ophcrack ISO and burn it to a CD (or load it onto a USB drive via UNetbootin). The computer will restart and Ophcrack will be loaded. Mac The second most popular operating system, OS X is no safer when it comes to password cracking then Windows. fsck -fy dscl . WPA%20Cracking%20using%20Aireplay%20v2.2%20Beta%207%20(Whax%203.0).swf from... - StumbleUpon. The Best Hacking Tutorial Sites - Learn Legal Hacking - StumbleUpon. Hack U3 USB Smart Drive to Become Ultimate Hack Tool | Raymond.CC Blog - StumbleUpon. How to gain access to system account the most powerful account in Windows.... - StumbleUpon. There is an account in Microsoft Windows that is more powerful than the Administrator account in Windows Operating Systems. That account is called System account it is similar to the root OR super user in the Linux/Unix world .

I will show you how to access this system account in this article. You can use this facility for removing programs that are causing problems to your system, malware etc. Introduction If you look at the task manager (which can be launched by pressing [CTRL]+[ALT]+[DEL]) you will see some processes that are running with System level privileges. Even the Administrator account is unable to do some of the things a system account can do. System is the highest account in Windows (like root),You can be a super power user by accessing the system account (even while you are logged in as a restricted user) Note: Accessing system account may cause serious problems. Check the name of the account you’ve logged into (Click start. System Account : Further Links.

Hack a Day. Default Password List - Submit - StumbleUpon. Know the Trade Your IT Security Information Portal CISSP/CEH/CISA/Hacker... - StumbleUpon. Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc allinurl:/bash_history allinurl:winnt/system32/ (get cmd.exe) ext:ini eudora.ini ext:pwd inurl:(service|authors|administrators |users) "# -FrontPage-" filetype:bak inurl:"htaccess|passwd|shadow|htusers" filetype:conf slapd.conf filetype:ctt "msn" filetype:mdb inurl:"account|users|admin|administrators|passwd|password" filetype:mdb inurl:users.mdb filetype:QDF QDF filetype:pdf "Host Vulnerability Summary Report" "Assessment Report" filetype:sql ("passwd values ****" | "password values ****" | "pass values ****" ) filetype:xls inurl:"email.xls" filetype:user eggdrop user intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html) intitle:"Welcome to IIS 4.0!

" These log files record info about the SSH client PUTTY. MAIN - Crack a Wi-Fi Network's WEP Password with BackTrack, the Fancy Video Version - Lifehacker. @Thomas Wrobel: Sadly, it is important to secure your wireless. While I'd consider it no big deal for others to leech some bandwidth for email or browsing, if they use it for piracy and get caught, you're liable. @Thomas Wrobel: You are forgetting that you can be punished for what people do with your connection. @Thomas Wrobel: Its not really just that. People can use your internet, do bad things and because it's through your router it would most likely trace back to you.

Or too many people can hop on your connection and make your connection almost too slow (that one happened to me before I turned on wireless security.) @Thomas Wrobel: Your biggest protection against being hacked is your router. Also, someone on the same network can set up attacks against encrypted transmissions.