ACCESS DENIED except for HACKERS

latest articles

Banner Grabbing - Backtrack

 Banner Grabbing - OS Detection  OS Fingerprinting After we know that the target machine is live, we can then find out the operating system used by the target machine. This method is commonly known as Operating System (OS) fingerprinting.So today i will teach you how you can find...

Read more

Top FAMOUS HACKERS

FAMOUS HACKERS ALL TIMES KEVIN MITNICK BORN:- 6 AUGUST 1963 (LOS ANGELES) USA. CURRENT OCCUPATION:- COMPUTER SECURITY CONSULTANT, AUTHOR. WEBSITE:- www.kevinmitnick.com LIFE SUMMARY :-He had a very unhappy childhood as his parents were divorced..He was a shy, lonely, overweight kid who was having problem making friends.His first illegal act was to bypass...

Read more

Backtrack java rhino exploit

Browser Java Rhino exploit Tutorial we are going to pwn windows 7 with a java exploit called: JAVA RHINO Exploit. Here i quote from the Armitage console's description of the exploit:" This module exploits a vulnerability in the Rhino Script Engine that can be used by Java Applet to run an arbitrary code outside of the...

Read more

Setup cythosia Bot

Tutorial to install cythosia Bot Requirements:- Cythosia bot,- A web host on http://www.000webhost.com/ or any other web host but this one is for free. First Step:Login into your webhost account or register and get into your web host. The website takes you to a page where you have": List of...

Read more

ANTI FORENSICS ~ Tool

DIGITAL ANTI FORENSICS Digital Anti Forensics Install truecrypt This script is used to install Truecrypt, software that is used to create encrypted files using various encryption ciphers. It contains features such as hidden partitions inside the encyption file, as well as the ability to use files and text...

Read more

RAM FORENSICS TOOLS - BACKTRACK

RAM FORENSICS TOOLS IN BACKTRACK pdfbook.py pdfbook.py is a utility that gathers information relating to Facebook from a process dump. On a Windows system, run “pd -p [pid] > file.dump” where [pid] is the process ID of a browser, then on a Linux system run “strings -el file.dump...

Read more

IF U R SEEING THIS  ==> THEN UR NETWORK IS HACKED <== NO PROBLEM  NOTHING CHANGED @:DDR:@  @:SHAN@ ...

Read more

Session hijacking methodes When a user log in to the account  it starts a session with that account and this session ends up with log out  In a running session, user is give a session id which is unique identifier of the user for that session and is only valid...

Read more

Netcraft Dns Search Engine

DNS Results From Netcraft Search Engine The following python script is dedicated for CHC Members and it can obtain DNS results from netcraft search engine.This can be used in the information gathering stage of a penetration test.You can find the source code and a screenshot of the usage of...

Read more

Advance Sqlmap Commands

Advance Sqlmap tutorial 1.... When you have the target URL but you are not sure if any of the parameter in that request is vulnerable then sqlmap can act as scanner in that case. The syntax for the GET request is as follow ./sqlmap.py -u "http://www.site.com/oldman.php?id=5&text=dummy" The syntax for the POST request...

Read more