Friday, May 31, 2013

TP-Link HTTP/TFTP Backdoor

About the TP-Link Router TP-Link TL-WDR4300 is a popular dual band WiFi, SOHO class router. Tested Firmware We tested the remote root PoC on the newest firmware (published on 25.12.2012...

Hacking The Interface Of Programs

This isn’t really a hack but a method to change the way program looks. It uses the Interface Builder used in applications to change the way a program looks. It is very simple, but if there is an annoying aspect of a program you just want to change, or to confuse your friends this is a fun way to start. With this trick you can’t hack every program, or every feature of a program. It is fun and a good time waster if you are bored. The way to access the interface files is to the .nib file. This is the file type used to display and configure...

Make Your Own Dock

Hey This post idea (and walk through) was written by Richard. It was pretty cool so I have decided to put it up. If you have any tips of your own that you would like to share please email me. This tip is very simple and fun to do. It is all about changing your dock background to something you have created. You can do this through Preview or through another image editing program like Photoshop. The idea behind this trick is to change the background png files used in the dock to something we have created. These are only images so nothing...

Change The Default Text For Anything

Hey This post is a proper hacking post. It is designed to go into the core of the Mac OS X operating system and enable you to change some of the strings that control certain parts of text on your system. For example with this post you will be able to change the new folder name, as well as various other parts of your operating system. Once you get the hang of it you will be able to hack and crack your way to a computer system the way you like it. Before we start I must stress that a lot of things can go wrong here. If you change the strings...

Install Movie Players in GNOME Backtrack 5

I like to hear songs while workign.  If you are also like that, this article is for you.  While usingbacktrack, you can use players.For installing Totem media player,Open the terminal(if you don't know how to open terminal, better don't use backtrack Linu).Type the following command: sudo apt-get install totem-gstreamer and hit enter, it will start to download files and install it.Enjoy. If you are using it from pen drive, verify you set enough persistence memory...

How to Install Teamviewer -Backtrack Tutorials and Tricks

Backtrack has all required tools for PenTesting. you caninstall Teamview in Backtrack also.Teamviewer:Teamviewer is legal Remote Administration Tool[RAT].  Using Teamview you can control  your friend's system from your computer.Visit Teamviewer official site: http://www.teamviewer.com/en/download/index.aspx Download .deb fileCopy it to desktop.Open the Terminaland type the following command:sudo dpkg -i /root/teamviewer_linux.debIt...

How to Hack the Windows Admin Password Using OphCrack in Backtrack tutorial

In this post, i am going to help you to crack the any type of windows accounts passwords. Learn how to hack the windows admin password like a geek.This is My Second Backtrack Linux Tutorial. Requirements: BackTrack Linux 4 or 5. Download it from http://backtrack-linux.org One pen drive(above 4gb) Xp Free Fast RainBow table [tables_xp_free_fast.zip]. Download it from here:http://ophcrack.sourceforge.net/tables.php  *Install the...

MAC address spoofing on BackTrack

Step 1: Use the command ifconfig to check the current MAC address...

Enable SSH on Backtrack 5

Step 1: root @ bt: ~ # sshd-generate Step 2: root @ bt: ~ # / etc / init.d / ssh start Step 3 : Check if not succeeded root @ bt: ~ # netstat-ntlp Active Internet connections (only servers) Proto Recv-Q Send- Q Local Address Foreign Address State PID / Program name tcp 0 0 0.0.0.0:22 0.0.0.0: * LISTEN 3690/sshd&nbs...

Installing BackTrack 5 Live On USB r2 and r3

Hello, Today i am going to Teach you, How to Install backtrack 5 r2 and r3 Live on USB.  backtrack 5 r3 am also have same process. No Difference at All but in this tutorial i will use r2.   came So the question in most minds of yours and why USB. It is Simple Quit Because it is portable, it work better than CD. CD got scratch and got bigger size than coal USB USB win in every manner. : ...

Social-Engineer Toolkit (SET) 4.1.3 Released

TrustedSec Release the latest version of the Social-Engineer Toolkit (SET) as 4.1.3. As most of us know real, It is an open source, python-driven, social-engineering penetration testing framework of custom tools có solely focuses on attacking the human element of penetration testing...

Backtrack On Windows [via SSH]

Tools Required:1) Putty2) Xming Server3) Vitrual Machine + BTInstall backtrack on your virtual machineopen KONSOLE TERMINAL and type: "sshd-genera...

[Sqlmap] SQL Injection using POST method

In this post short and simple, will detail the steps we will when we need to exploit a SQL Injection vulnerability, which are mostly based on some servers SQL Server and Oracle. These vulnerabilities are typical in LOGIN'S Administrative, because as we know, that when we enter the username and password this data is sent via the POST method, so there may be the possibility of entering false or some bypasses, this we can show an error...

WEP Cracking using Fern Wifi Cracker

So lets begin ... Go to backtrack --> exploitation tools --> wireless exploitation tools -->  WLAN exploitation --> fern-wifi-cracker Now select the wireless interface you have ( it can be wlan0, wlan1 etc..) ...

Wednesday, May 1, 2013

When Databases Attack – Finding Data on SQL Servers

When Databases Attack – Finding Data on SQL Servers Introduction A few weeks ago I presented a webinar called “When Databases Attack”. It covered some SQL Server database configuration issues that are commonly overlooked and targeted by attackers. For those who are interested it can be viewed HERE. This is a response to some requests for script examples. In this blog I’ll provide a few scripts for finding sensitive data quickly in SQL Server. In the future I’ll provide scripts for other attacks as well. Finding Sensitive Data There are...

WordPress Asset-Manager PHP File Upload Vulnerability

### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.#   http://metasploit.com/framework/##require 'msf/core'require 'msf/core/exploit/php_exe'class Metasploit3 < Msf::Exploit::Remote    Rank = ExcellentRanking    include Msf::Exploit::Remote::HttpClient    include Msf::Exploit::PhpE...

Hacking Apps For Apple iPhone Devices

              iPhone, an apple device with million copies and handed to people for nearly every field. This article focuses on the geeks out there looking for apps which could enhance their abilities and interest in hacking. Here are top 5 hacking apps for apple iPhone devices. 1). iKeyguard keylogger Hacking Apps For Apple iPhone iKeygaurd Keylogger Hacking apps for Apple iPho...

Mobile MITM Attack

What is Android? To get a better understanding of what Android is capable of, we should first get a good handle on what it actually is. In 2005, Google acquired a little known company called "Android, Inc", which had been developing software for mobile phones. Soon after, Google began filing various patents with a focus on mobile phone technology. This prompted the media to begin speculating that Google was planning on releasing a "G-Phone" to go head-to-head with Apple's immensely popular (and largely unchallenged) iPhone. But in 2007,...

How to Type Special Characters

If you often need to switch between the on-screen Alphabet and Number keyboards just to type a comma in a sentence, then why not check out below to find out more? While on the Alphabet keyboard: , (comma) => touch and hold the Full-stop key (.) ' (single quotation mark) => touch and hold the Full-stop key, and slide to choose the single quotation mark (') " (double quotation mark) => touch and hold the Full-stop key, and slide to choose...