Showing posts with label HACKING. Show all posts
Showing posts with label HACKING. Show all posts

HACKING TRICKS 2012-2013

Internet Observatory Setting New Heights with Real-Time IP Traffic Trends


Hello Friends. Here is a guest post from Adriana Jones on a very interesting topic. Special thanks to Adriana from HackingAlert for sharing this article. You can find her bio at the end of the articl...

A simple HTML tag to crash 64-bit Windows 7


<iframe height='18082563'></iframe> Yea that's true. This small ( not exactly small) iframe is powerful enough to crash down a 64 bit Win7 system to the famous Blue Screen Of Death (BSoD). This vulnerability has been recently reported by w3bd3vil (awsome work!!...

"It Happens on Live television" Facebook spam demystified - A completely new form of Spam


Hello friends. I love facebook spams. The reason is that you will find the best use of javascript, flash, facebook plugins and of coarse social engineering. There is always so much to learn. The last faebook spam which we looked at here in HackingAlert was the "How can Rehanna Do this" Facebook spam...

Why Email attachments can be dangerous?


Festive season is on. Online e-commerce sites are busy attracting users. Similarly Spammers are also prepared to utilize the season for spreading spam and malwares. Recently I got a mail from Coca Cola(spam ofcorse) which said that I won lots of dollars( it ws so much that I dont remember the exact amount). It had a malicious pdf attachment. Hiding malicious codes inside pdf has become a prime target to bypass email filters. So I thought...

Cross site scripting(XSS) Cheat Sheet - Readers Choice!!


Hello friends. These days I am on an XSS rampage. I recently posted an article on XSS vulnerability in Babylon search. Since then I got several request from the readers to post a quick article on cross site scriptting. This tutorial will be divided into two parts. In the first part I will cover the basics of XSS and how the attack vector is implemented. In the next tutorial we will discuss some techniques by which we can prevent XSS attacks...

Namedpipe impersonation Attacks


Privilege escalation through namedpipe impersonation attack was a real issue back in 2000 when a flaw in the service control manager allowed any user logged onto a machine to steal the identify of SYSTEM. We haven't heard a lot about this topic since then, is it still an issue...

Complete Guide to staying Anonymous on Internet - Combining VMs and VPNs


"the Reason which makes Anonymous hactivists dangerous is that they are really ANONYMOUS - Darklord" Hello friends. Sorry for the delay in post. Still waiting for the day when time will be in abundance for me. Today I have an interesting post for you all. In one of my several older posts I have been discussing how to penetrate different websites, perform attacks, gain information etc. But there is a big issue behind all this...

When Social Networks Become Social Engineering Tools for hacking - A Case study of hacking 10 Facebook friends in 10 minutes


These days hacking community is buzzing with social engineering techniques for hacking. People discuss what can be the best social engineering technique they can adopt. These days I am addicted to 2 things very badly. One is metasploit and other is Social networks( facebook to be precise)...

Complete SQL injection tutorial with Havij


Hello friends. This is my third post on SQL injection and for the first time I am using a tool for explaining it. Here I will be using a popular and my personal favourite SQLi tool Havij. To download Havij visit the following link - DOWNLOAD HAVIJ...

The Mole - New SQL injection tool+tutorial


The Mole is an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a boolean query based technique...

Rooting An Android Phone From Scratch - My Experiments with Truth!!


Hello Friends. From past 3 days I was on an rooting rampage with my HTC Tattoo android phone. I was a fan of Android before I ever rooted my phone and now I am in love with it since I have rooted it. The real power of any operating system lies when you have the command of the super user. This is what rooting is all about...

Setting up your own Pentesting/Hacking Network using a single Machine


Hello friends. Sorry for the long delay in writing a new post. I was out for some days and had no internet connectivity. When I came back and checked my mail, I found more than 10 mails asking me how to test for hacking. Actually this problem is because of the fact that there are too many theoretical tutorials available on the internet but there are hardly any practical implimentations shown...

New "How Can Rihanna do this" Facebook Spam - Be aware!!


Hello friends. After several days finally a new spam has come out which floods from wall to wall. This time spammers have found out a new way to fool people and take them out of the secure zone and beat the same shit of redirecting them to a url that contains millions of viruses and malwares waiting to welcome you. I alone found of 36 different class of malwares uploaded on the infected link. Let us dig out deeper into this spam..Lets have...

What happened to #opFacebook ? The Inside Story


There has been a lot of buzz about the #opfacebook. Well nothing happened to facebook and it doesn't even seems that anything is going to happen. I got answers to several questions about anonymous during my recent encounter with one of their members. Here is what exactly happened...

Cracking The Fake Gmail Password Hacking Software - So you think you are an Hacker??


Hello friends. Going really busy these days but I had to find out time to write about this post as there are really smart people who believe that they can hack Gmail accounts by using a tool. Well the truth is they can hack, but there is a second phase of the tool as well...

Create unlimited Gmail ID's from your single original ID - A must read for all !!


Hello friends. Sorry for the delay in posts. This is my new post for the month of November. Last month had been a huge hit for HackingAlert as it received 75000+ page views in the month of October. Thanks to all the readers. Well coming to our pos...

Complete Guide to #RefRef DDOS tool - Tutorial+Tool download


Hello Friends. Finally @Anonops or the Anonymos group has raised curtains from the most talked about tool in recent few months. Finally the source code has been revealed by the group and the most troubled person will be Mark Zukerberg. Facebook was expecting that this tool will be the prime weapon of #opfacebook ...

How to crack Wifi WEP password in simple steps.


Hello friends. Many of you must be aware of the technique I will discuss here as it is not new and you will find hundreds of results on google about it. Even there are lots of cool youtube videos floating around on how to crack the WEP keys of a wifi network. Wardriving is fun but dont make it illegal. There was a critical aspect missing in almost every tutorial I read...

New DOS tool to Kill SSL servers - Complete Tutorial


A newly released denial-of-service (DOS) tool can be used to bring down SSL servers using an average laptop computer and a standard DSL connection. The hacking outfit decided to release the tool, called THC-SSL-DOS, now because it has already been leaked online a couple of months ago. "We are hoping that the fishy security in SSL does not go unnoticed. The industry should step in to fix the problem so that citizens are safe and secure...

Basic SQL injection tutorial - Readers Choice


Hello readers. This has been a very busy week for me. But i had to take out time for my blog. First of all I would like to thank you all for visiting my blog frequently and post your feedbacks and requests. In the past one month Hackingalert has seen an enormous growth in traffic. today I am writing on SQL injection. this is my third tutorial on SQL injection but there is a heavy demad for it again and again. I have kept it a bit higher...

FACEBOOK,EMAIL,WEBSITE HACKING

Internet Observatory Setting New Heights with Real-Time IP Traffic Trends

Hello Friends. Here is a guest post from Adriana Jones on a very interesting topic. Special thanks to Adriana from HackingAlert for sharing this article. You can find her bio at the end of the articl...

A simple HTML tag to crash 64-bit Windows 7

<iframe height='18082563'></iframe> Yea that's true. This small ( not exactly small) iframe is powerful enough to crash down a 64 bit Win7 system to the famous Blue Screen Of Death (BSoD). This vulnerability has been recently reported by w3bd3vil (awsome work!!...

"It Happens on Live television" Facebook spam demystified - A completely new form of Spam

Hello friends. I love facebook spams. The reason is that you will find the best use of javascript, flash, facebook plugins and of coarse social engineering. There is always so much to learn. The last faebook spam which we looked at here in HackingAlert was the "How can Rehanna Do this" Facebook spam...

Why Email attachments can be dangerous?

Festive season is on. Online e-commerce sites are busy attracting users. Similarly Spammers are also prepared to utilize the season for spreading spam and malwares. Recently I got a mail from Coca Cola(spam ofcorse) which said that I won lots of dollars( it ws so much that I dont remember the exact amount). It had a malicious pdf attachment. Hiding malicious codes inside pdf has become a prime target to bypass email filters. So I thought...

Cross site scripting(XSS) Cheat Sheet - Readers Choice!!

Hello friends. These days I am on an XSS rampage. I recently posted an article on XSS vulnerability in Babylon search. Since then I got several request from the readers to post a quick article on cross site scriptting. This tutorial will be divided into two parts. In the first part I will cover the basics of XSS and how the attack vector is implemented. In the next tutorial we will discuss some techniques by which we can prevent XSS attacks...

Namedpipe impersonation Attacks

Privilege escalation through namedpipe impersonation attack was a real issue back in 2000 when a flaw in the service control manager allowed any user logged onto a machine to steal the identify of SYSTEM. We haven't heard a lot about this topic since then, is it still an issue...

Complete Guide to staying Anonymous on Internet - Combining VMs and VPNs

"the Reason which makes Anonymous hactivists dangerous is that they are really ANONYMOUS - Darklord" Hello friends. Sorry for the delay in post. Still waiting for the day when time will be in abundance for me. Today I have an interesting post for you all. In one of my several older posts I have been discussing how to penetrate different websites, perform attacks, gain information etc. But there is a big issue behind all this...

When Social Networks Become Social Engineering Tools for hacking - A Case study of hacking 10 Facebook friends in 10 minutes

These days hacking community is buzzing with social engineering techniques for hacking. People discuss what can be the best social engineering technique they can adopt. These days I am addicted to 2 things very badly. One is metasploit and other is Social networks( facebook to be precise)...

Complete SQL injection tutorial with Havij

Hello friends. This is my third post on SQL injection and for the first time I am using a tool for explaining it. Here I will be using a popular and my personal favourite SQLi tool Havij. To download Havij visit the following link - DOWNLOAD HAVIJ...

The Mole - New SQL injection tool+tutorial

The Mole is an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a boolean query based technique...

Rooting An Android Phone From Scratch - My Experiments with Truth!!

Hello Friends. From past 3 days I was on an rooting rampage with my HTC Tattoo android phone. I was a fan of Android before I ever rooted my phone and now I am in love with it since I have rooted it. The real power of any operating system lies when you have the command of the super user. This is what rooting is all about...

Setting up your own Pentesting/Hacking Network using a single Machine

Hello friends. Sorry for the long delay in writing a new post. I was out for some days and had no internet connectivity. When I came back and checked my mail, I found more than 10 mails asking me how to test for hacking. Actually this problem is because of the fact that there are too many theoretical tutorials available on the internet but there are hardly any practical implimentations shown...

New "How Can Rihanna do this" Facebook Spam - Be aware!!

Hello friends. After several days finally a new spam has come out which floods from wall to wall. This time spammers have found out a new way to fool people and take them out of the secure zone and beat the same shit of redirecting them to a url that contains millions of viruses and malwares waiting to welcome you. I alone found of 36 different class of malwares uploaded on the infected link. Let us dig out deeper into this spam..Lets have...

What happened to #opFacebook ? The Inside Story

There has been a lot of buzz about the #opfacebook. Well nothing happened to facebook and it doesn't even seems that anything is going to happen. I got answers to several questions about anonymous during my recent encounter with one of their members. Here is what exactly happened...

Cracking The Fake Gmail Password Hacking Software - So you think you are an Hacker??

Hello friends. Going really busy these days but I had to find out time to write about this post as there are really smart people who believe that they can hack Gmail accounts by using a tool. Well the truth is they can hack, but there is a second phase of the tool as well...

Create unlimited Gmail ID's from your single original ID - A must read for all !!

Hello friends. Sorry for the delay in posts. This is my new post for the month of November. Last month had been a huge hit for HackingAlert as it received 75000+ page views in the month of October. Thanks to all the readers. Well coming to our pos...

Complete Guide to #RefRef DDOS tool - Tutorial+Tool download

Hello Friends. Finally @Anonops or the Anonymos group has raised curtains from the most talked about tool in recent few months. Finally the source code has been revealed by the group and the most troubled person will be Mark Zukerberg. Facebook was expecting that this tool will be the prime weapon of #opfacebook ...

How to crack Wifi WEP password in simple steps.

Hello friends. Many of you must be aware of the technique I will discuss here as it is not new and you will find hundreds of results on google about it. Even there are lots of cool youtube videos floating around on how to crack the WEP keys of a wifi network. Wardriving is fun but dont make it illegal. There was a critical aspect missing in almost every tutorial I read...

New DOS tool to Kill SSL servers - Complete Tutorial

A newly released denial-of-service (DOS) tool can be used to bring down SSL servers using an average laptop computer and a standard DSL connection. The hacking outfit decided to release the tool, called THC-SSL-DOS, now because it has already been leaked online a couple of months ago. "We are hoping that the fishy security in SSL does not go unnoticed. The industry should step in to fix the problem so that citizens are safe and secure...

Basic SQL injection tutorial - Readers Choice

Hello readers. This has been a very busy week for me. But i had to take out time for my blog. First of all I would like to thank you all for visiting my blog frequently and post your feedbacks and requests. In the past one month Hackingalert has seen an enormous growth in traffic. today I am writing on SQL injection. this is my third tutorial on SQL injection but there is a heavy demad for it again and again. I have kept it a bit higher...

HACKING SOFTWARE AND TRICKS

Complete SQL injection tutorial with Havij

Hello friends. This is my third post on SQL injection and for the first time I am using a tool for explaining it. Here I will be using a popular and my personal favourite SQLi tool Havij. To download Havij visit the following link - DOWNLOAD HAVIJ...

Learn Hacking by Doing-Practical Hacking Lessons with DVWA

There is always a question that people ask me is how to learn hacking. Well I have tried my best to always find a good answer to this question, but I have always failed. The biggest reason is that hacking is not like a programming language that can be learned in few days or months. It requires a continuous effort. You cannot learn it by doing a course from NIIT or Appin. You cannot learn it by simply going to google and type "learn hacking"...

Hacking Facebook Applications - A HackingAlert Exclusive case study!!

Recently I had the honor to write for an upcoming magazine on hacking and Network security which is going to be launched this month. The chief editor of the magazine is a real hard working guy and he asked me to submit an article(cant name the topic). I went on to make some research on the worlds biggest laboratory ( internet :) !!)..Yes internet can be the world's biggest lab, at least for me. I was playing with the Facebook documentation...

Complete guide to defacing a website - CookBook!!

Please use  this post for educational and penetration testing your own website only.  Disclaimer: The methods and shell upload shown in this tutorial were tested on a hacked website, so hackingalert is not responsible for any damage. Special Thanks to Team Innobz for the shell upload (love you guyz). Hello friends . In the recent time I was quiet busy with my own stuff so couldn't post cool hacking articles. So I kept...

Understanding Honeypots - The Trap!!

First thing any hacker would do to compromise any network is gathering information passively and seeking vulnerable services as well as ports. And this is where Honeypots play a role of fake vulnerability in network. Honeypots are fake theoretically, but not practically. They are real vulnerabilities in Network intentionally kept open & designed to gather information about the possible attack / attacker...

Intercepting HTTP request/response using WebScarab to hack Web Applications

Hello Friends. Recently I am really busy with my interviews in different companies. But there is always a new thing that you can learn from everything. Though my tough time has not yet ended but still I took out time to write this post as there is somthing new that I learned while I was preparing for one of my interviews for MicroWorld that is amongst the leading companies in the field of Network Security. The best thing I find about...

5 phases of Web Application attack - A HackingAlert Exclusive research!!

Tweet Web applications are now the next big victim after games for hackers . A recent research shows that 70% of vulnerabilities exist at the top layer of the web application. The attackers use several techniques to hack web applications . I have been constantly monitoring different types of web attacks involving different methods but there ar some common steps which all hackers follow in order to perform their attack on applications. I am presenting...

Some FAQ's that you must know about hacking .

Tweet I get lots of emails from anonymous people who ask me to hack a facebook or gmail or live account and they are also willing to pay for it too . I never reply to such mails because of the obvious reason that "hacking is not dirty" . You just cannot use your tricks to fool others and steal their information . Everyone loves his/her privacy .  But there are some good questions too . Some eager learners ask me very good questions...

How to hack a website/web server - 3 step guide.

Tweet I get lot of mails from people who ask me two questions very frequently; First is "abhinav can you hack facebook,gmail,orkut etc" and the second is "how can i hack a website" . The first question is very irrelevant as there are no defined techniques to hack such secure sites . You can only hack someones account only by making the victim to commit some mistake like making the victim to enter informations in a phishing page etc . The second...

Step 3 - Gaining access to the server/remote host through vurnabilities.

Tweet This step involves gaining hidden access to the remote system by exploiting the vurnabilities that are there in various different services of the host . To gain access using the vulnerabilities found you can use METASPLOIT . This is a popular exploit scanner and execution tool . Metasploit provides useful information and tools for penetration testers, security researchers, and IDS signature developers. This project was created to provide information on exploit techniques and to create a functional knowledgebase for exploit developers...

Step 2 - Enumeration and scanning for vulnerabilities

Tweet This is the next step to hacking a website or a web server . This step involves gathering information about the web host that can be utilized to find loop holes or errors on the services running on the server. In order to find out what services are running on the perticular web server and what are the open ports on the perticular server we use a very popular tool called NMAP . You can download NMAP from the following link.  This tool will scan the server and will give you information about all the services running along with the version...

step 1 - Gaining information

Tweet This is the most basic step that deals with gaining information about the perticular website/server . One can manually gain information by popular techniques like banner grabbing . You can do a manual information check on the target server . This is known as Reconnaissance. Active Reconnaissance involves probing of network to detect accessable hosts , open ports , location of routers etc . You can find all available ip addresses so that you can perform the next scanning phase...

HOW TO HACK

This blog is merged with another blog. You are going to be redirected there in few seconds. Please click on the technology tab of that blog to find the post you are looking for. Sorry for the inconvenience . . .

Monday, 4 June 2012

Recharge Tata Docomo prepaid card via Twitter

Now, Tata Docomo customers can recharge their prepaid card via Twitter



Tata Docomo
Tata Docomo has teamed up with micro-blogging site Twitter to launcha new initiative called Twittcom, that will allow its GSM Pre -paid customers to recharge and activate a Value added service/ application through Twitter.

Twittcom, has been developed indigenously by the team at Tata Teleservices Limited.

Commenting on the new service, Ritesh Ghosal, Head of Brand Marketing at Tata Teleservices Limited said, “As a brand, Tata DOCOMO has always differentiated itself with its Innovations, whether it is 1p/sec pricing for calls, or

Friday, 25 May 2012

How to make Windows 7 Bootable USB Pendrive


Hello,
Many of us face a lot of problem when we have to reinstall windows on our computer or laptop. First thing we have to decide from where to install windows? The options available are DVD or USB Pendrive. In the latest new netbooks, mostly there is no DVD drive. So if you want to install windows you have to go with the other option, i.e. USB Pendrive. So here I give a brief and 100% tested tutorial on how to create a Windows 7 Bootable USB Pendrive to install Windows 7 from USB Pendrive.

Sunday, 20 May 2012

Team Viewer 7.0 free download

Team Viewer 7.0
TeamViewer is an excellent screen-sharing and file-transfer app that can be used to facilitate business collaborations, remotely access a second computer, or help distraught relatives diagnose and cure computer problems. Along with being free for noncorporate use, it gives users precisely the tools they need to share screens securely, send files with a minimum of hassle, control access rights, and even flip which user has control.

Tuesday, 15 May 2012

Tune Up Utilities 2012 Free Download

Tune Up Utilities 2012
TuneUp Utilities 2012 presents a wide range of useful system maintenance and optimization tools in one interface. Some tools you'll use to regularly clean your system, while others only need to be run only once in a while or if you have a specific Windows problem. The 2012 version of TuneUp Utilities also includes the Program Deactivator, which disables unused programs until you need them, and Economy Mode, which can help laptop users improve battery life. TuneUp Utilities is free to try for 15 days. A nag screen tracks the trial period.

Wednesday, 2 May 2012

Collection of Hacking books free download

Here I am going to post a large collection of hacking books. There are more than 150 books in this collection on almost every field of computer and network hacking. The name of books are given below with download link at the bottom of the post.


This collection includes:


(Ebook - Computer) Hacking The Windows Registry.pdf


(eBook - PDF) Hugo Cornwall - The Hacker's Handbook .pdf


(eBook pdf) Hacking into computer systems - a beginners guide.pdf

Tuesday, 1 May 2012

Tab Napping.. an easy way of phishing..in detail

Tab Napping - An easy way of phishing
Phishing is the easiest and most popular way of email account hacking. Now a days a new way of phishing is used by hackers. This is called tab napping . I also wrote about it in one of my previous posts. I also posted a JavaScript code which is used for Tab napping as a Tab napping script .
But many of my readers are still facing problems in this script. So i decided to write this post.


The idea behind this is very simple. First of all i suggest you to read my last posts on tab napping and then download the script.


Tab napping is all about the relation of 2 pages. suppose Page A and Page B.

Monday, 30 April 2012

Windows 7 All Version ACTIVATOR free download

Windows 7


Windows 7 All Version ACTIVATOR
With this small tool you your Windows 7 surely actived


Microsoft Genuine Advantage programs, including Windows GenuineAdvantage, help you determine whether or not your copy of Windows is genuine. Genuine Windows software is published by Microsoft, properly licensed, and supported by Microsoft or an authorized partner, giving you full capabilities, access to all the latest updates, and confidence that