Apr 10, 2013

Control Your Digital World With MYO Armband

49 comments:
Technology Development Is Going Up And Up. Developers Are Developing Awesome And Mysterious Devices And Such Things Like Google Glasses In The World Of Computers And In Digital World. I Am Talking About An Armband. Which Is New And Undoubtly Great Invention In Digital World. You Are Thinking That How Can This Armband Be A Great Invention. You Know Why It Is Great Invention? Dont Know? So, Listen. Before You Used Your Computers, Laptops, Mobiles And Played Game With Keyboards, Joysticks, Mouse And Such Devices. How Would You Feel. If You Control Your Mobile, Computer And Play Games Just With An Armband! Of Course, You Will Feel Comfortable. So, MYO Is An Armband. Which Is Invented Recently By Thalmic Labs.

Mar 17, 2013

How To Hack Website Using Havij

129 comments:
SQL Injection TutorialSQL Injection Is Most Widely Used Common Method In Web Hacking. Most Websites Are Being Hacked Using SQL Injection These Days. In This Post We Are Going To Learn About A Tool Called Havij. Havij Is An Automated SQL Injection Tool. It Helps Pen-Testers To Find And Exploit Vulnerabilities On A Web Page. You Can Perform Back-End Database Finger Printing, Retrieve DBMS Login Names And Password In The Shape Of Hashes. You Can Also Dump Tables And Columns, Can Fetch Data From The Database, Can Execute SQL Statements Against The Server And Much More. As We Know, That There Are Many Tools Available On Internet, By Using Which Anyone Can Hack Vulnerable Websites. Because Of The Availability Of Hacking Tools. Hacking Websites Is Becomming Easy And The Number Of Hacking Websites Is Also Increasing. Everyone Can Use Havij For Hacking Websites And For Testing Vulnerabilities. Because Of GUI(Graphical User Interface) And Automated Configuration. In This Post I Am Going To Share Tutorial Of Havij. How To Use It And How Can A Person Hack SQLI Vulnerable Website By Using This Tool.

Mar 1, 2013

How To Hack Facebook Password Using Social Engineering Toolkit

136 comments:
Social Engineering Toolkit This Tutorial Is On SET. SET Is A Tool Which Is Used For Several Purposes. But In This Tutorial, I Will Explain How Can A Person Make Use Of This Tool For Stealing Passwords Of Facebook, Gmail Of Yahoo. This Tool Will Do Phishing. But You Dont Need To Waste Time For Making Phishing Scripts For Seperate Websites. This Tool Can Be Used For Much More Other Purposes Like Social Engineering Purposes, Harvesting, Cloning Etc. SET Is An Eploitation Tool. Keep Reading Below To Learn More About Phishing Through Social Engineering Toolkit(SET).

Feb 15, 2013

SQL Injection Using SqlMap

66 comments:
How To Hack Website Using SQLMap Sqlmap Is An Automated Pen Testing Tool. That Automates The Process Of Detecting And Exploiting SQL Injection Flaws And Taking Over Of Databases. It Comes With A Powerful Detection Engine, Many Niche Features For The Ultimate Pen Tester And A Broad Range Of Switchs Lasting From Database Fingerprinting. Over Data Fetching From The Database. This Tool Is Best For Beginners. Who Just Now Entered In Security Field. It Is Easy To Use Tool. This Tool Makes SQL Injection Easy As Compared To Manual SQL Injection.

Jan 23, 2013

How To Install DVWA Application

11 comments:
Damn Vulnerable Web ApplicationIn Today's Post, I Will Tell You How To Install DVWA(Damn Vulnerable Web Application). If You Want To Know Some Information About This Application. Check My Previous Post. In That Post I Have Described This Application. So, Today's Post Is About Installation Of DVWA. Start Now:



Jan 20, 2013

Where To Test Hacking Skills? - DVWA

10 comments:
Damn Vulnerable Web Application
In Today's Tutorial, I Brought A Platform For Hacker's And For Security Specialist's. This Article Surely Will Be Helpful For Those, Who Want To Test Their Hacking Skills Without Any Fear Of Doing Illegal Things. In This Article I Will Share An Application Called DVWA With All Of You. DVWA Stand's For Damn Vulnerable Web Application. DVWA(Damn Vulnerable Web Application) Is PHP/MySQL Application. It Is A Gift For Security Specialist's, Hacker's To Test Their Skills In Legal Environment. It Also Help's The Web Developer's Better To Understand The Process Of Securing The Web Application. This Application Is Useful For Anyone And Useful For Those Who Want To Start Hacking Or Have Started Yet. This Application Is Best For Practising And Knowing Different Web Vulnerabilities.

Jan 9, 2013

Hack Facebook Using Phishing

20 comments:
How To Hack Facebook Password
Phishing Is Method, By Using Which A Person Can Make Peoples Fool And Can Get Their Password's. Attacker/Hacker Convince The Victim And Send Phishing Page To Victim And Says For Signing In. When The Victim Enter's Login Information Like Username And Password. All The Information Is Automatically Stored In The Hosting Site. Where The Phishing Page Is Hosted By Hacker. This Is Old And Well Known Method. But Still Many Of Peoples Dont Know About Phishing And They Can Be Easily Entrapped By Hacker. So, In This Tutorial I Will Describe Phishing Step By Step With Pictures And Will Tell That How A Hacker Use Phishing Page Against Victim For Getting Login Information. By Following Below Pictures You Can Easily Learn About Phishing And You Will Be Able To Protect Yourself From This Attack. I Take No Responsibility Of Anything What You Do With This Knowledge. My Posts Are Just For Knowledge. By Using This Knowledge You Can Protect Yourself From These Scams, Hacking Etc

Jan 8, 2013

How To Find Hidden Email Address Of Friends On Facebook

602 comments:
How To See Private Emails
Our Today's Tutorial Is So Easy & Small. In This Tutorial, I Will Describe Here, That How You Can See Hidden Email Addresses Of Your Friend's On Facebook. For Facebook Hacking Purposes And For Other Purposes You May Need To Find Email Address Of Your Victim Or Your Friend's. So, Surely This Tutorial Will Be Very Helpful For You. This Tutorial Will Help You To Find Victim's Email Address. Which He/She Used In The Creation Of Facebook Account. I Will Demonstrate Easiest Method In This Tutorial. So, Start Working.