Sunday, 27 May 2012

Hacking Gmail Account With GX Cookie

 

IntroductionHacking web application was always curious for the script kiddies. And hacking free web email account is every geek first attempt. The method which I will describe in this post is not new; the same method can be applied to yahoo and other free web email services too.

All About Shells | Impressive Web Hacking Method

 

 

Introduction

I am sure many have you have read about "Hacked / Defaced with shells", So I am pretty sure that the first thing that comes to your mind is "What the heck are these shells?" . So this article would give you complete idea about shells and its use.


How To Hack Email With Cookie Stealing




Today I am writing about a new topic on Techotoys - Cookie Stealing. I observed that cookie stealing is neglected by some fellow hackers (even I was one of them). But, recently, I discovered that cookie stealing can be pretty handy to hack anEmail account. In the following article, I have covered basics of how to hack an Email account using Cookie Stealing.

Tracing An IP Address

 

 

Introduction


In here I have figure out some very easy but cool ways to trace out the geographical location and various other infos like ISP details etc of a remote computer using its IP.

Speed Up Windows 7



Following topic contains a few registry tweaks to optimize your system performance and add a few useful extras:
Ultimate Collection of Registry Tweaks to Speed Up Windows 7

You just need to download the ZIP file, extract it and run the file. It'll ask for confirmation, accept it. Restart your system to take affect.

Hacking Through Telnet Tutorial





Now you may be looking at this going, "What the hell is Telnet?". If you are, don't worry, I'll explain everything. First of all, Telnet is software that allows you to connect to another Telnet Host.

In windows systems Telnet is usually called Telnet32.exe or Telnet.exe. In newer versions of windows it is Telnet32.exe.
*** Note to Windows XP users: Don't go and get the old version of Telnet, because you have a DOS-Based one. I'll give commands along this guide so you can enjoy it too. You have to either run "Telnet" or "cmd" and then "Telnet".

Port Scanning Nmap Tutorial

 
 
 
 
 This is the second episode of a series article about second step of ethical hacking/penetration testing, as we have deeply talked about the importance of port scanning and on the previous article we have discussed some about Nmap.
Click here to read to read the first related article.
This article will talk about the practical aspect of Nmap, how to perform a quick scan to know about the open ports and services?

Saturday, 26 May 2012

SQL Injection Full Tutorial Through Havij




Firstly i am going to introduce the term havij :)
Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.
It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system.
The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injecting vulnerable targets using Havij.


IIS Full Hacking Tutorial




IIS is one of the easiest hacking tutorial. Basically it is for n00b hackers. Today I will give you the full tutorial of IIS exploits. I will show you how to hack by IIS in windows 7. Not for windows xp. So let's start.

First of all go to my computer and then click on 'Add a network location' from right button of mouse.

Joomla Hacking Tutorial



How to hack Joomla!
Level: NFN (Not For Noobs)


Tools required:
SQL-i Knowledge
reiluke SQLiHelper 2.7
Joomla! Query Knowledge

DISCLAIMER:
THIS TUTORIAL IS FOR EDUCATION PURPOSE ONLY!!! YOU MAY NOT READ THIS TUTORIAL IF YOU DON'T UNDERSTAND AND AGREE TO THIS DISCLAIMER. ME AS AUTHOR OF THIS TUTORIAL NOT BE HELD RESPONSIBLE FOR THE MISUSE OF THE INFORMATION CONTAINED WITHIN THIS TUTORIAL. IF YOU ABUSE THIS TUTORIAL FOR ILLEGAL PURPOSES I WILL NOT BE HELD RESPONSIBLE FOR ANY ACTION THAT MAY BE TAKEN AGAINST YOU AS A RESULT OF YOUR MISUSE.

Blind SQLi Tutorial



what is Blind SQLi 


Blind SQL Injection is used when a web application is vulnerable to an SQL injection but the results of the injection are not visible to the attacker. The page with the vulnerability may not be one that displays data but will display differently depending on the results of a logical statement injected into the legitimate SQL statement called for that page. This type of attack can become time-intensive because a new statement must be crafted for each bit recovered. There are several tools that can automate these attacks once the location of the vulnerability and the target information has been established


Symlink Web Hacking Tutorial

First of all download the symlink shells needed from here:---

http://adf.ly/8xmUV
Now there you will get 2 shells named dbman.php (Database Manager n00b!) and
sym.php (the main tool auto symlinker ;) ) 
Now you should have a shelld site of course :P
 

Brute Force Web Hacking

Brute forcing a web application is a method to bypass traditional authentication checks. Although brute forcing may seem like an attack that a PHP developer might not be able to mitigate, it is actually an important consideration when developing web applications.

Local File Inclusion (LFI) Website Hacking




In this tutorial

1.0 What is LFI?
1.1 Understanding
LFI
1.2 Finding LFI vulnerabilities
1.3 Exploiting
LFI vulnerabilities
    - Normal method
    - Log poisoning
    - The /proc/self/environ method
    - PHP filter method(s)
1.4 Securing
LFI vulnerabilities


1.0 What is LFI?

First of, I would like to say that this tutorial is going to be a lot like my previous tutorial(Actually pretty much copy-paste, except a few parts) regarding RFI.This is simply because of the nature of these two security holes (RFI and LFI). They are pretty much the same, except for the attack method(s).

Okay, lets go.

Friday, 25 May 2012

DNN (DotNetNuke) Attack To Hack A Website







DORK TO FIND VULNERABLE WEBSITES SUFFERING FROM THIS ATTACK :
inurl:”/portals/0″ site:.html (.com , .pk , .net , .mil , .uk etc)
just make some modifications according to your work
so let’s start
here is a website which is chosen
http://www.parallax.com
We Are Gonna hack this web site
Below Images will assist your throughout the tutorial

All you Have to do is append this code to the website: