background preloader

Study hacking-Get smart

Facebook Twitter

4d00a959a6a17hive.png (800×1600) Hackers' Library. Advanced password hacking using Google – easy to learn, easy to apply. Do you like this story? Google is your best friend when it comes to hacking. The search engine giant has crawled loads of data which was intended to be protected by webmasters, but is being exploited and mined by smart users using Google dorks. Today I will be discussing some practical dorks which will help you gain passwords, databases and vulnerable directories. The basic methodology remains the same, query Google using specialized dorks with precise parameters and you are good to go. I assume you have basic working knowledge of google dorks. Lets start, shall we ? FTP passwords ws_ftp.ini is a configuration file for a popular win32 FTP client that stores usernames, (weakly) encoded passwords, sites and directories that the user can store for later reference. intitle:index.of ws_ftp.ini You can also this dork which uses "parent directory" to avoid results other than directory listings filetype:ini ws_ftp pwd Or "index of/" "ws_ftp.ini" "parent directory" PHP Hacking intitle:index.of config.php.

Hacking Basics. This tutorial is for information purposes only, and I do not endorse any of the activities discussed within this guide. I nor anyone hosting this guide can be held responsible for anything you do after reading this. What you do with your day lies on your shoulders. Here with I am creating an Index.. 1. Learn How to Hack Learning how to hack is simple. 2.Cracking commercial quantum cryptography secure communicating boxes with their internals exposed, Alice and Bob . 3.Top 10 Password Crackers Anyone in the security field would be well advised to go over the list and investigate tools they are unfamiliar with. 4.How to Hack a WiFi Network. you already know that if you want to lock down your Wi-Fi network, you should opt for WPA encryption because WEP is easy to crack. 5.Common Hacking Methods. 6. Access Any Website Or Forum Without Registering.

Visit any forum or website to find something useful and they will ask you to register. Every time a forum asks me to register, I simply close the site. You would probably do the same. But this time, lets face it. Before I begin, you should know how things work. First grab the add-on for Firefox called ‘user agent’ here and install it. Select User Agent from the left sidebar and click Add. Crawl-66-249-66-1.googlebot.com and in user agent field type: Googlebot/2.1 (+ as shown in the screenshot below.

Select Google Bot as your User Script by going to Tools > User Agent Switcher. Now browse any website or forum without registering. Advertisement. Why We Hack: The Benefits of Disobedience. Archive. AT&T's Silver Payphones + Number Directory - Elcotel CPC 9520C Smart Phone documentation; Introduction and Directory. CYB.RG/ASM [06.21.99] Elcotel CPC 9520C/Eclipse; National Payphone Number Compilation - A growing list of Elcotel payphone dial-up numbers across Canada. The Clone [10.31.00] Elcotel's Grapevine Payphone - Introductory Guide + Number Directory.

Magma [08.18.00] The Complete Guide to the Elcotel Payphone - This 52 page technical document details everything you ever wanted to know about the "9520C". The Complete Guide to the Elcotel Grapevine Smart-Phone - This 25 page technical document details everything you ever wanted to know about the "Grapevine". "Internal Bits of the Elcotel Grapevine" Thr13z3 [04.24.02] C Scripts; Payphone Remote Administration Software Development - Useful for coders who want to write their own Payphone Administering program.

. (.. on Elcotel phones ..) Human-like automated recording - .WAV/29KB Call and do nothing - .WAV/692KB K-1ine Magazine {*style:<b><b> How to Crack a Wi-Fi Network's WEP Password with BackTrack. How to do Hacking the Internet(WAN) Not LAN Using Metasploit - The Logic | Vishnu Valentino | Ethical Hacking Tutorial, Tips and Trick. Type : Tutorial Level : Medium, Advanced A few days ago there's someone put a message on my contact in this website, he asking about "is it possible to do hacking outside LAN(Local Area Network)? ". When you see all of my articles, 80% of all hacking articles were written for Local Area Network, because I'm doing in my own lab, "so how about hacking outside Local Area Network? ". Of course it has the same logic like when you attacking from Local Area Network Requirement : 1. 2. 3. ) e.g : Amazon 4. 5.

Step-By-Step How to do Hacking the Internet(WAN) Not LAN Using Metasploit – The Logic: 1. 2. 3. 4. 5. Before we continue to next step, let's see the figure below(I will try to figure it out in simple way) : Information(Attacker) : - Attacker1 use local IP address –> 192.168.8.8 - Attacker1 have public IP address –> 73.67.123.85 - Attacker1 can control his router to redirect any incoming/outgoing traffic. - Attacker2 use VPS/Dedicated/Cloud server to do an attack that connected directly to internet. Email Hacking | Ethical Hacking Tutorials | Hacking guides | Hacking Class.

Kindle Fire: How to download any book for free | Gesture Theory. At Gesture Theory, we test a ton of tablets to get a further understanding of the tablet landscape. It also helps with our alpha release of our tablet publishing platform: DeckPub.com. This week we received the Kindle Fire and have been playing around with it. First impressions, for a v1, it’s a very good implementation and is a great complement to a full size tablet, not a replacement for. In the course of testing, we found a very interesting bug that probably came about due to some interesting UI decisions.

Using the Kindle Fire for the Kindle’s original intent – consuming books – led us to browsing the Books Store. When you find a book you like, you can click “Buy for $xx.xx” and there are no further prompts. Even though you cancel the download and get a confirmation message, the download still continues on the homepage. If you open the book, it will continue the download and you have full access to the book. Greyhat-Security: Home. Kinect hacked to work with Garry’s Mod means endless hours of virtual fun.

How to Crack Just About Any Mac App (and How to Prevent It) The Conscience of a Hacker. Another one got caught today, it's all over the papers. "Teenager arrested in computer crime scandal", "Hacker arrested after bank tampering"... Damn Kids. They're all alike. But did you, in your three piece psychology and 1950's technobrain ever take a look behind the eyes of a hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a hacker, enter my world... Mine is a world that begins with school. Damn kid. I made a discovery today.

Or feels threatened by me... or thinks I'm a smart ass... or doesn't like teaching and shouldn't be here... Damn kid. And then it happened... "This is it... I know everyone here... Damn kid. You bet your ass we're all alike... This is our world now... Yes, I am a criminal. I am a hacker, and this is my manifesto. The Mentor Racketeers The Conscience of a Hacker Copyright 1986 by Loyd Blankenship The Mentor If any of the above fits you... -ck. Clicking pictures has never been so much fun! - clikr. Index of /content/downloads/pdf. Information Leak.

Default Password List - Submit. Pwning a Spammer's Keylogger. Recently, while scrounging around our spam traps, I spotted this ordinary piece of malicious spam. It uses a very simple social engineering trick, speculating about Obama’s sexual orientation and a link to a supposed picture to prove it. There was nothing special about this spam but the link with a double extension file named “you.jpg.exe” was something worth investigating.

So out of curiosity, I downloaded the file and checked out what it does. First thing I did was to find out what the file really was. Of course, it was not an image file of Obama but rather a self-extracting RAR file. Opening the file through a RAR extracting tool revealed the files inside it. I extracted “you.jpg.exe” and inspected each of the files inside it but found they were actually encoded. In the background, the following files were installed in the Windows System32 folder: bpk.datbpk.exebpkhk.dllbpkr.exeinst.datpk.bin Also an autorun registry was created: I almost ended the analysis here.

And voila!