Blog Created By -=][ x33k ][=- A.K.A -=][ .XaN ][=- Hacking Is Not A Crime Its Our Passion
Sunday, 27 May 2012
How To Hack Email With Cookie Stealing
Today I am writing about a new topic on Techotoys - Cookie Stealing. I observed that cookie stealing is neglected by some fellow hackers (even I was one of them). But, recently, I discovered that cookie stealing can be pretty handy to hack anEmail account. In the following article, I have covered basics of how to hack an Email account using Cookie Stealing.
Speed Up Windows 7
Following topic contains a few registry tweaks to optimize your system performance and add a few useful extras:
Ultimate Collection of Registry Tweaks to Speed Up Windows 7
You just need to download the ZIP file, extract it and run the file. It'll ask for confirmation, accept it. Restart your system to take affect.
Hacking Through Telnet Tutorial
Now you may be looking at this going, "What the hell is Telnet?". If you are, don't worry, I'll explain everything. First of all, Telnet is software that allows you to connect to another Telnet Host.
In windows systems Telnet is usually called Telnet32.exe or Telnet.exe. In newer versions of windows it is Telnet32.exe.
*** Note to Windows XP users: Don't go and get the old version of Telnet, because you have a DOS-Based one. I'll give commands along this guide so you can enjoy it too. You have to either run "Telnet" or "cmd" and then "Telnet".
Port Scanning Nmap Tutorial
Click here to read to read the first related article.
This
article will talk about the practical aspect of Nmap, how to perform a
quick scan to know about the open ports and services?
Saturday, 26 May 2012
SQL Injection Full Tutorial Through Havij

Firstly i am going to introduce the term havij :)
Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.
It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system.
The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injecting vulnerable targets using Havij.
IIS Full Hacking Tutorial
IIS is one of the easiest hacking tutorial. Basically it is for n00b hackers. Today I will give you the full tutorial of IIS exploits. I will show you how to hack by IIS in windows 7. Not for windows xp. So let's start.
First of all go to my computer and then click on 'Add a network location' from right button of mouse.
Joomla Hacking Tutorial
How to hack Joomla!
Level: NFN (Not For Noobs)
Tools required:
SQL-i Knowledge
reiluke SQLiHelper 2.7
Joomla! Query Knowledge
Level: NFN (Not For Noobs)
Tools required:
SQL-i Knowledge
reiluke SQLiHelper 2.7
Joomla! Query Knowledge
DISCLAIMER:
THIS
TUTORIAL IS FOR EDUCATION PURPOSE ONLY!!! YOU MAY NOT READ THIS
TUTORIAL IF YOU DON'T UNDERSTAND AND AGREE TO THIS DISCLAIMER. ME AS
AUTHOR OF THIS TUTORIAL NOT BE HELD RESPONSIBLE FOR THE MISUSE OF THE
INFORMATION CONTAINED WITHIN THIS TUTORIAL. IF YOU ABUSE THIS TUTORIAL
FOR ILLEGAL PURPOSES I WILL NOT BE HELD RESPONSIBLE FOR ANY ACTION THAT
MAY BE TAKEN AGAINST YOU AS A RESULT OF YOUR MISUSE.
Blind SQLi Tutorial
what is Blind SQLi
Blind SQL Injection is used when a web application is vulnerable to an SQL injection but the results of the injection are not visible to the attacker. The page with the vulnerability may not be one that displays data but will display differently depending on the results of a logical statement injected into the legitimate SQL statement called for that page. This type of attack can become time-intensive because a new statement must be crafted for each bit recovered. There are several tools that can automate these attacks once the location of the vulnerability and the target information has been established
Local File Inclusion (LFI) Website Hacking
In this tutorial
1.0 What is LFI?
1.1 Understanding LFI
1.2 Finding LFI vulnerabilities
1.3 Exploiting LFI vulnerabilities
- Normal method
- Log poisoning
- The /proc/self/environ method
- PHP filter method(s)
1.4 Securing LFI vulnerabilities
1.0 What is LFI?
First of, I would like to say that this tutorial is going to be a lot like my previous tutorial(Actually pretty much copy-paste, except a few parts) regarding RFI.This is simply because of the nature of these two security holes (RFI and LFI). They are pretty much the same, except for the attack method(s).
Okay, lets go.
Friday, 25 May 2012
DNN (DotNetNuke) Attack To Hack A Website
DORK TO FIND VULNERABLE WEBSITES SUFFERING FROM THIS ATTACK :
inurl:”/portals/0″ site:.html (.com , .pk , .net , .mil , .uk etc)
just make some modifications according to your work
so let’s starthere is a website which is chosen
http://www.parallax.com
We Are Gonna hack this web site
Below Images will assist your throughout the tutorial

All you Have to do is append this code to the website:
Subscribe to:
Posts (Atom)



















