Monday, July 18, 2011

How to implement an ARP poisoning attack

The concept behind this is simple. ARP is the protocol that maintains network devices tables up-to-date by associating an IP address with a MAC address. The problem with ARP is that it doesn’t really care about who answered, it will gladly update the tables from whoever says so. Most of the time, it won’t even ask. So the idea behind the attack, is to send the client an ARP answer saying “hey, I’m the gateway, send stuff to me” and a second ARP...

Sunday, July 17, 2011

ISI Chief - Ahmed Shuja Pasha Email ID hacked by Indian Hacker

ISI Chief - Ahmed Shuja Pasha Email ID hacked by Indian Hacker An Indian Hacker "creatrix" Claim to hack into the email id of ISI Chief Ahmed Shuja Pasha's .The Directorate for Inter-Services Intelligence (more commonly known as Inter-Services Intelligence ...

AntiSecShell v.0.5 Shell Released by underground hackers of Antisec

AntiSecShell (ASS) was built by the underground hacking community and groups like h0no, ac1db1tch3z and others who wish to remainanonymous, have helped altogether to create this new shell. It hasmany functions but most important of all - it bypasses ALL securityof web servers. It is not only a php shell it is a symbol offreedom and the anti-sec movement which we, the hacking underground, approve and suppor...

Jawahar Knowledge Center website Hacked & Databse leaked by PCA

Pakistan Cyber Army (PCA) admin Shak hack the website of Jawahar Knowledge Center (http://www.ieg.gov.in...

UK Vodafone Phone Hacking method exposed

The Hacker's Choice announced a security problem with Vodafone's Mobile Phone Network today. An attacker can listen to any UK Vodafone customer's phone call. An attacker can exploit a vulnerability ...

Songs.pk hacked by Indishell Against Mumbai blasts

Songs.pk hacked by Indishell Against Mumbai blasts   Patriotic Indian Hackers "Indishell" / Indian Cyber Army finally Strike to the Biggest Pirated Music Download Website of Bollywood Albums run by Pakistan cre...

Lady Gaga website hacked and fans details stolen by Hackers

Lady Gaga website hacked and fans details stolen by Hackers Lady Gaga has called in police after thousands of her fans personal details were stolen from her website. Her record label Univeral acted after the site was hacked into by US cyber attackers SwagSec. A source said: “She’s upset and hopes police get to the bottom of how this was allowed to happe...

Saturday, July 16, 2011

Add The Numbered Next And Previous Page Navigation Gadget Under Your Blog Posts

Once again we are trying to make it easy for people to navigate your blog.The easier it is for people to Navigate you blog the more likely it is they will stay and become return visitors.I'm sure you have seen this script used on lots of blogs and thought 'I would like that on my blog'.You probably thought adding it to your blog would be hard but once again i have a nice easy piece of code you can add to achieve the effect. So what exactly is the...

Remove Label Posts Count From Blogger

How to Remove Label Posts Count From Blogger showing the count of posts in that particular category.As you have seen in categories in sidebar that always shows that how many posts are there in that category or label. As its clear from the picture below what i am trying to say.Its just simple step to remove the label count just follow the below step:- Bowse To Settings > Edit Html > Expand Widge...

bX- error codes

bX- error codes Are you facing problems and getting bX- error codes? Press ctrl+F and type in the error code to search a list of error codes below which are links to explanations for troubleshooting. For example, if after pressing ctrl+F keys, a little window will open and as you type in "bX-3r3e" you will find the link to bX-3r3ejc like in the screen shot below: [Image]bbX-lgwej bX-1us3c3 bX-1zu2vy bX-2bdp09 bX-2f00qm bX-2o3s...

What is CAPTCHA and How does it Work?

CAPTCHA or Captcha (pronounced as cap-ch-uh) which stands for “Completely Automated Public Turing test to tell Computers and Humans Apart” is a type of challenge-response test to ensure that the response is only generated by humans and not by a computer. In simple words, CAPTCHA is the word verification test that you will come across the end of a sign-up form while signing up for Gmail or Yahoo account. The following image shows the typical samples...

Thursday, July 14, 2011

How to Hack Wifi or Wireless Password

Hello Friends, today i will explain you how to crack Wifi or wireless password in just 10 to 15 minutes. In my previous articles i have explained the different wireless scanning tools and scanning wireless networks using NetStumbler. Today i will explain How to Hack or Crack Wifi Password. Today's hack will be based on cracking the WEP encryption password. So guys tighten your belts for new hack and lets start hack wifi. I have also included the video at bottom of the post. So guys read on and watch ... . STEPS TO HACK WIFI OR WIRELESS PASSWORD 1....

How To Decrypt The Password Of The Zip File

Almost everyone met with password protected winzip file.For example, you have downloaded movies or something else  from torrent  or rapidshare , and when you try to open the downloaded file  appears “Enter password for the encrypted  file”… Damn… What now…You can decrypt the password of the .rar file  with Stellar Phoenix Zip Recovery. I´ve tested and have broken password with 3 charachters for 60 seconds.How to use Stellar Phoenix Zip Recoveryr?You can use a dictionary attack...

Download Free XSS Shell v0.3.9 - (Xss)Cross Site Scripting Backdoor Tool

Only For Educational Purpose I Take No Responsibility Of Any Misuse. XSS Shell v0.3.9 - Cross Site Scripting Backdoor Tool XSS Shell is a powerful XSS backdoor which allows interactively getting control over a Cross-site Scripting (XSS) vulnerability in a web application. Demonstrates the real power and damage of Cross-site Scripting attacks.WHAT IS XSS SHELL ? XSS Shell is powerful a XSS backdoor and zombie manager. This concept first presented...