background preloader

Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist

Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist
Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc allinurl:/bash_history allinurl:winnt/system32/ (get cmd.exe) ext:ini eudora.ini ext:pwd inurl:(service|authors|administrators |users) "# -FrontPage-" filetype:bak inurl:"htaccess|passwd|shadow|htusers" filetype:conf slapd.conf filetype:ctt "msn" filetype:mdb inurl:"account|users|admin|administrators|passwd|password" filetype:mdb inurl:users.mdb filetype:QDF QDF filetype:pdf "Host Vulnerability Summary Report" "Assessment Report" filetype:sql ("passwd values ****" | "password values ****" | "pass values ****" ) filetype:xls inurl:"email.xls" filetype:user eggdrop user intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html) intitle:"Welcome to IIS 4.0!" These log files record info about the SSH client PUTTY.

http://knowthetrade.com/footprinting.htm

Related:  Hacks

The Best Hacking Tutorial Sites - Learn Legal Hacking written by: Daniel Robson•edited by: Aaron R.•updated: 2/13/2011 Whether it's to understand potential attack vectors or simply for the fun of it, learning the basics of hacking is something that a lot of people aspire to. Turn Your Home Router Into a Super-Powered Router with DD-WRT Wireless is everywhere and routers are the force that makes it happen, so why not supercharge yours to take proper advantage of it? DD-WRT will let you boost your router’s range, add features, and more. DD-WRT has a ton of features—more than we can cover in this guide, which is focused on helping you get your router upgraded. Stay tuned, as we’ll go into more depth in a couple more days on all the great things you can do with it, but even if you don’t use the additional features, DD-WRT is worth installing to make your router work better. What Is DD-WRT? Here’s our router.

How To Validate A Credit Card With Your Mind How To Validate A Credit Card With Your Mind [source] Accept Credit Cards Using your Smartphone with no monthly fees - Try Kudos Today! RedditTumblrStumbleUponDigg Your Top 10 Boredom-Busting Websites Last week, we asked you what your go-to sites were when you hit the afternoon lull. We checked out all the boredom busters you sent in and let’s just say… it was hard to pull ourselves away! Some of our faves like Pinterest, Tumblr, Twitter, and HuffPo obviously made the list, but here are the 10 others that stood out. Some we’ve been addicted to for a while, some are new finds, all are great ways to kill some downtime.

How to use Google for Hacking. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1. Hacking Security Cameras Using Googles Full Capabilities. « XBOX, XBOX 360, PS2, PS3, PSP, & MORE! – Your source for the latest in console modding. Well most of you use Google to probably look up porn. Other just search stuff. And others use Google to hack. Using Google, and some finely crafted searches we can find a lot of interesting information. For Example we can find: Credit Card Numbers Passwords Software / MP3′s …… (and on and on and on) Presented below is just a sample of interesting searches that we can send to google to obtain info that some people might not want us having..

UPDATED - Using Googles Full Capabilities & XBOX, XBOX 360, PS2, PS3,... Here is an updated version of the ‘Using Google’s Full Capabilities’. This is basically a master list found on a Russian hacking website. To save you the dangers of going there, we’ve compiled it here. Enjoy. How to gain access to system account the most powerful account in Windows.... - StumbleUpon There is an account in Microsoft Windows that is more powerful than the Administrator account in Windows Operating Systems. That account is called System account it is similar to the root OR super user in the Linux/Unix world . I will show you how to access this system account in this article. You can use this facility for removing programs that are causing problems to your system, malware etc. Introduction If you look at the task manager (which can be launched by pressing [CTRL]+[ALT]+[DEL]) you will see some processes that are running with System level privileges.

Why Atheism? Just about everyone is an atheist when it comes to other gods — the gods that other people believe in or that nobody believes in anymore. I’m an atheist about all gods because there's no reliable evidence for any god, or even for Jesus. There is also extensive evidence that Jesus and all gods are fictional characters — myths created mainly by primitive people who had little understanding of how our universe operates. We all like myths and other stories, but we don't have to believe them. Chat with Your Friends through ms dos Command Prompt -: Chat with Friends through ms dos Command Prompt :- 1) All you need is your friend's IP Address and your Command Prompt. 2) Open Notepad and write this code as it is.....! @echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A 3) Now save this as "Messenger.Bat". 4) Open Command Prompt.

Related:  Hack