This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Sunday, October 28, 2012

How to exploit CSRF vulnerability(CSRF tutorial)?

Today, I'm going to explain you about WEB vulnerability that not everyone knows...but it very popular.This vulnerability is very dangerous and effective.Usually, the vulnerability exploiting never leave evidences.This vulnerability called: Cross Site Request Forgery(CSRF).CSRF and the way to exploit it is extremely easy; Much easier then all the complicated injections.How does it works?It works by forcing the slave's browser to run HTTP requests...

Saturday, October 27, 2012

Online Hacking tools

Here are some online hacking tools. If your internet connection is slow then you don`t want to download some security software for just information gathering & exploit searching. So you can use online website for this purpose, although big advantage is your i.p is not directly flashing to victim. If you use proxy then it`s more secure because website don`t have your i.p also.http://www.novirusthanks.org/(Online File Scanner)http://www.virustotal.com(Online File Scanner)http://anubis.iseclab.org/(Online File Scanner)http://www.ipvoid.com/(IP...

Wednesday, October 24, 2012

What you can do after hacking remote pc?

What you can do after hacking remote pc?If you know command line interface very well than you can operate remote pc as local pc.Here I am listing some basic code of metasploit to operate remote pc from your terminalBut before that you have to exploit remote pc . For this purpose check my previous posts of “How to hack remote pc” here .(1)How to gather installed application in victim pc.Here are codesmsf >use post/windows/gather/enum_applicationsmsf post(enum_applications) >set session 1msf post(enum_applications) >exploit(2)How to...

How to jam WIFI network in UBUNTU & BACK TRACK?

If you have UBUNTU or BACK TRACK installed ,then you can start from step 7 directly you can skip first six step. If you have windows user start from here.Step 1: Download Backtrack 5 R2 here as .iso for 32 bit:http://www.backtrack-linux.org/ajax/down...OME-32.isoand 64 bit:http://www.backtrack-linux.org/ajax/down...OME-64.isoStep 2: Download UNetbootin for Windows:http://unetbootin.sourceforge.net/unetbo...latest.exeStep 3: Insert your FAT32 formatted...

How to download youtube video?

There are lots of method for download you tube videos.But here i am listing some commonly use methods(1)It`s very easy , Download youtube downloader from here.& install it.open software & copy & paste video url into software.BUT here is problem, if your connection lost then it can not be resumed.(2)Copy video url from youtube, now open http://keepvid.comor http://savevid.com and paste video url into their site. But for this purpose you should have java program installed.(3)it`s my favourite method. No software or plugin needed....

Tuesday, October 23, 2012

How to change MAC address?

Changing Your MAC Address In Window XP/Vista, Linux And Mac OS X(Sometimes known as MAC spoofing)First let me explain a few things about MAC addresses. MAC stands for Media Access Control and in a sense the MAC address is a computer's true name on a LAN. An Ethernet MAC address is a six byte number, usually expressed as a twelve digit hexadecimal number (Example: 1AB4C234AB1F).IPs are translated to MAC address by a protocol called ARP (Address Resolution...

Sunday, October 21, 2012

how to do XSS Attack on website?

Hi XSS is in 2 ways, Persistent and Non-Persistent type.For XSS we will use something called a cookie catcher.Question will be that why we would need someone else's cookie?The answer is that we can change our browser's cookies to login as them!!! So lets call it Session HijackingFirst go to a free hosting site like http://www.110mb.com or other php hosting sites and register there. Then download this cookie catcher and upload it.Cookie Catcher: ...