Saturday, January 16, 2010

How To Create A HTTP Server At Home

In this post we will see how to create an HTTP server. A web server is software installed on a computer that allows other computers to access specific files on that computer/server. There are many reasons to create your own home servers. For example: file sharing, so you can download files from your home computer from anywhere or you can create a web site on own server etc. Simply said It works like this; You choose a directory on...

How To Bypass Firewalls To View Restricted Sites in Offices & Schools

Q1) What Method i will be using ? Ans : I will be using a method called SSH tunneling Q2) What is SSH ? and What does it exactly do? Ans : Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices and all traffic are encrypted not like ftp or telnet were all the messages are sent in plain text So if we encrypt our connection even a firewall or a proxy wont know were we connecting .Follow the setps given bellow to make a ssh tun...

Tuesday, January 12, 2010

How to run JPG as an EXE

I have searched on this forum and have not found this method anywhere so I decided to post it. Note I have used this method for years and it works on every Windows OS. Requirements: Windows Your EXE. Step 1 : First things make a New Folder ...

Monday, January 11, 2010

Learn how to find admin page for like 90% of websites

Hello fellows I can see that many of you is unable or don't know how to find the admin login page for the control panel of a website so i though about writing a little tutorial about the method i use to find admins login pages. First of all here are the tools you will need to do the job: Download perl After that download the admin finder: Download Ok now the real work start: Install the perl tool on your PC. It take few minutes because there lots of files to copy so do not stop it for any reaso...

Friday, January 8, 2010

Hack Router For Exploration

 REMOTE ROUTER HACKING Introduction Ok, Basically this tutorial deals with how to scan large amounts of addresses for telnet services, which we can then attempt to use default credentials to log in with surprising success. Why Telnet? Isn't That Dead Now? Your partly correct, telnet is dead now, it was superseded by SSH because telnet sends packets in plain text where as SSH encrypts packets. But telnet is still very much used on routers...

Tuesday, January 5, 2010

Configuring VNC-SERVER And Squid Proxy Server in CentOS Configuring VNC-SERVER And Squid Proxy Server in CentOS

Configuring VNC-SERVER And Squid Proxy Server in CentOS (32 & 64) based VPSInstalling GUI based Gnome-Desktop, squid, vnc, vnc-server, firefox in centos based VPS NOTE :- # stands for comment $ denotes sshell commands 1st. Open SSH of your VPS with your Favorite SSH client. 2nd. In Shell Prompt >_ Write commands as described below. Code: $ yum update -y Phase of Installing All Products....

Saturday, January 2, 2010

Hack Into Administrator Account

Hello friends, welcome back today i am going to share with you all possible ways to hack admin or administrator account in windows XP. Today i will explain how to hack admin or administrator account in just 2 minutes. So guys get ready to hack your friends systems in 2 minutes. Most of times specially in our college we don't have the access to the admin account, now suppose you want to install a software on that system. What you...

Spoof MAC Address in Any OS

MAC address (Media Access Control address) is a quasi-unique identifier consists of a six byte number that attached to most network adapter card or network interface card (NIC). As such, all network cards, whether it’s of Ethernet NIC, Gigabit Ethernet NIC or wireless 802.11a/b/g/n WiFi or HiperLAN adapter, should have different MAC addresses, which also known as Ethernet Hardware Address (EHA) or adapter addres...

Friday, January 1, 2010

How To Make a crypter

How To Make a crypter ? What you will need:Visual Basic 6 or Visual Basic 6 Portable A RC4 module A brain The RC4 module and Visual Basic 6 Portable will have the download links at the end of this tutorial. TABLE OF CONTENTS: 1. Introduction 2. Building your crypter 3. Conclusion1. Introduction RC4 : In cryptography, RC4 (also known as ARCFOUR or ARC4 meaning Alleged RC4, see below) is the most widely used stream cipher and is used in protocols such as Secure Sockets Layer (SSL) (to protect Internet traffic) and WEP (to secure wireless...

Enable Telnet in windows 7

It’s very rare that I use Telnet these days, so it took a long time for me to notice that by default it was not packaged with Windows 7. I did some research and found out that this was also true for Windows Vista. More than likely this was an attempt to make Windows more secure by default, as Telnet is very insecure and whenever you have the choice you should always use SSH. However, with that being said, you can quickly re-enable...