Internet Observatory Setting New Heights with Real-Time IP Traffic Trends

Hello Friends. Here is a guest post from Adriana Jones on a very 
interesting topic. Special thanks to Adriana from HackingAlert for 
sharing this article. You can find her bio at the end of the articl...
A simple HTML tag to crash 64-bit Windows 7

<iframe height='18082563'></iframe>
Yea that's true. This small ( not exactly small) iframe is powerful 
enough to crash down a 64 bit Win7 system to the famous Blue Screen Of 
Death (BSoD). This vulnerability has been recently reported by w3bd3vil 
(awsome work!!...
"It Happens on Live television" Facebook spam demystified - A completely new form of Spam
Hello friends. I love facebook spams. The reason is that you will find 
the best use of javascript, flash, facebook plugins and of coarse social
 engineering. There is always so much to learn. The last faebook spam 
which we looked at here in HackingAlert was the "How can Rehanna Do 
this" Facebook spam...
Why Email attachments can be dangerous?

Festive season is on. Online e-commerce sites are busy attracting users.
 Similarly Spammers are also prepared to utilize the season for 
spreading spam and malwares. Recently I got a mail from Coca Cola(spam 
ofcorse) which said that I won lots of dollars( it ws so much that I 
dont remember the exact amount). It had a malicious pdf attachment. 
Hiding malicious codes inside pdf has become a prime target to bypass 
email filters. So I thought...
Cross site scripting(XSS) Cheat Sheet - Readers Choice!!

Hello friends. These days I am on an XSS rampage. I recently posted an 
article on XSS vulnerability in Babylon search. Since then I got several
 request from the readers to post a quick article on cross site 
scriptting. This tutorial will be divided into two parts. In the first 
part I will cover the basics of XSS and how the attack vector is 
implemented. In the next tutorial we will discuss some techniques by 
which we can prevent XSS attacks...
Namedpipe impersonation Attacks

Privilege escalation through namedpipe impersonation attack was a real 
issue back in 2000 when a flaw in the service control manager allowed 
any user logged onto a machine to steal the identify of SYSTEM. We 
haven't heard a lot about this topic since then, is it still an issue...
Complete Guide to staying Anonymous on Internet - Combining VMs and VPNs

"the Reason which makes Anonymous hactivists dangerous is that they are 
really ANONYMOUS - Darklord"
Hello friends. Sorry for the delay in post. Still waiting for the day 
when time will be in abundance for me. Today I have an interesting post 
for you all. In one of my several older posts I have been discussing how
 to penetrate different websites, perform attacks, gain information etc.
 But there is a big issue behind all this...
When Social Networks Become Social Engineering Tools for hacking - A Case study of hacking 10 Facebook friends in 10 minutes
These days hacking community is buzzing with social engineering 
techniques for hacking. People discuss what can be the best social 
engineering technique they can adopt. These days I am addicted to 2 
things very badly. One is metasploit and other is Social networks( 
facebook to be precise)...
Complete SQL injection tutorial with Havij

Hello friends. This is my third post on SQL injection and for the first 
time I am using a tool for explaining it. Here I will be using a popular
 and my personal favourite SQLi tool Havij. To download Havij visit the 
following link - DOWNLOAD HAVIJ...
The Mole - New SQL injection tool+tutorial
Rooting An Android Phone From Scratch - My Experiments with Truth!!
Hello Friends. From past 3 days I was on an rooting rampage with my HTC 
Tattoo android phone. I was a fan of Android before I ever rooted my 
phone and now I am in love with it since I have rooted it. The real 
power of any operating system lies when you have the command of the 
super user. This is what rooting is all about...
Setting up your own Pentesting/Hacking Network using a single Machine

Hello friends. Sorry for the long delay in writing a new post. I was out
 for some days and had no internet connectivity. When I came back and 
checked my mail, I found more than 10 mails asking me how to test for 
hacking. Actually this problem is because of the fact that there are too
 many theoretical tutorials available on the internet but there are 
hardly any practical implimentations shown...
New "How Can Rihanna do this" Facebook Spam - Be aware!!
Hello friends. After several days finally a new spam has come out which 
floods from wall to wall. This time spammers have found out a new way to
 fool people and take them out of the secure zone and beat the same shit
 of redirecting them to a url that contains millions of viruses and 
malwares waiting to welcome you. I alone found of 36 different class of 
malwares uploaded on the infected link. Let us dig out deeper into this 
spam..Lets have...
What happened to #opFacebook ? The Inside Story

There has been a lot of buzz about the #opfacebook. Well nothing 
happened to facebook and it doesn't even seems that anything is going to
 happen. I got answers to several questions about anonymous during my 
recent encounter with one of their members. Here is what exactly 
happened...
Cracking The Fake Gmail Password Hacking Software - So you think you are an Hacker??
Hello friends. Going really busy these days but I had to find out time 
to write about this post as there are really smart people who believe 
that they can hack Gmail accounts by using a tool. Well the truth is 
they can hack, but there is a second phase of the tool as well...
Create unlimited Gmail ID's from your single original ID - A must read for all !!
Hello friends. Sorry for the delay in posts. This is my new post for the
 month of November. Last month had been a huge hit for HackingAlert as 
it received 75000+ page views in the month of October. Thanks to all the
 readers.
Well coming to our pos...
Complete Guide to #RefRef DDOS tool - Tutorial+Tool download

Hello Friends. Finally @Anonops or the Anonymos group has raised 
curtains from the most talked about tool in recent few months. Finally 
the source code has been revealed by the group and the most troubled 
person will be Mark Zukerberg. Facebook was expecting that this tool 
will be the prime weapon of #opfacebook ...
How to crack Wifi WEP password in simple steps.

Hello friends. Many of you must be aware of the technique I will discuss
 here as it is not new and you will find hundreds of results on google 
about it. Even there are lots of cool youtube videos floating around on 
how to crack the WEP keys of a wifi network. Wardriving is fun but dont 
make it illegal. There was a critical aspect missing in almost every 
tutorial I read...
New DOS tool to Kill SSL servers - Complete Tutorial
A newly released denial-of-service (DOS) tool can be used to bring down 
SSL servers using an average laptop computer and a standard DSL 
connection.
The hacking outfit decided to release the tool, called THC-SSL-DOS, now 
because it has already been leaked online a couple of months ago. "We 
are hoping that the fishy security in SSL does not go unnoticed. The 
industry should step in to fix the problem so that citizens are safe and
 secure...
Basic SQL injection tutorial - Readers Choice
Hello readers. This has been a very busy week for me. But i had to take 
out time for my blog. First of all I would like to thank you all for 
visiting my blog frequently and post your feedbacks and requests. In the
 past one month Hackingalert has seen an enormous growth in traffic. 
today I am writing on SQL injection. this is my third tutorial on SQL 
injection but there is a heavy demad for it again and again. I have kept
 it a bit higher...
 
