Skip to main content

Posts

Showing posts from July, 2013

Some Facts Of Google!!

S ome Facts Of Google!! ---------------------------------------------  Google is the most popular search engine with more than 87% search market share.  It has a long history with so many interesting facts behind company and its products.  In this post, we are listing 12 less known but interesting facts behind Google.  12 Less Known Facts About Google internet google 7 Special Google Searches You Should Know Less Known Facts About Google Google was initially started as college (Stanford University) project by Larry Page and Sergey Brin in January, 1996. Project was a search engine called BackRub.  Initially it was hosted on Standford servers for more than a year. Name “Google” was adopted accidentally. Founders wanted the name “Googol” that means a 1 followed by 100 zeros. But they ended up with the name ‘Google’ because they received a check to ‘Google’ by an investors. Google crawlers daily visit billions of web pages and index pages to return as search results. In this

The Origin of Armitage’s Hail Mary Mass Exploitation Feature

The Origin of Armitage’s Hail Mary Mass Exploitation Feature:- ---------------------------------------------- Several times now, an author has introduced Armitage, and the main value add to the hacking process that they emphasize is the “devastating” Hail Mary attack. I’m most proud of Armitage’s red team collaboration capability–it’s why I built the tool in the first place. The Hail Mary attack? Meh. That said, I’d like to share with you how the Hail Mary attack came to be. I released Armitage in late November 2010. In a December 2010 PaulDotCom episode , Larry reviewed Armitage. I’m a PaulDotCom fan and so I was very excited to watch this. He tried out an Armitage menu that launched the now defunct db_autopwn and a lot of the conversation in that review centered around the poor behavior of that particular feature. For those that don’t remember, db_autopwn is a former Metasploit Framework feature to automatically launch exploits against everything in the databas

Meterpreter:-Pro's

Hacking involves managing a lot of contextual factors at one time. Most times, the default situation works and a tool will perform beautifully for you. Sometimes though, there are things you have to check on and work around. That’s what this blog post is. I’d like to give you a list of contextual factors you should know about your Meterpreter session with pointers on how to manipulate these factors. This information will help you think on your feet and modify your situation so that you can get what you want out of your post-exploitation agent. Which process do I live in? Let’s start with the first contextual factor: your process. After exploitation, Meterpreter lives in the process you took control of. This process is associated with a user, it may or may not have a subset of the active users privileges, and depending on which process it is–the process could go away.. in any moment. To learn which process your Meterpreter session lives in, use the getpid command.

PuTTy:- A Free SSH & Telnet Client

PuTTy:- A Free SSH & Telnet Client :- ---------------------------------------------------------------------  PuTTY is an SSH and telnet client, developed originally by Simon Tatham for the Windows platform. PuTTY is open source software that is available with source code and is developed and supported by a group of volunteers. Download Here:-

Largest Phonebook Database Has Been HAcked!!!

Largest Phonebook Database Has Been HAcked !:- ---------------------------------------------   Hyderabad, July 19:   Hackers have attacked the database of #Truecaller, the mobile phone application that helps phone users put a name to the callers. It is touted to be the largest #phonebook in the world. The hackers have gained access to ‘tokens’, or unique locks for different users. Reports suggest that the data loss could be at 560 GB . “ We have experienced a cyber attack on our Web site that resulted in an unauthorised access to some data. We were able to shut it down moments after we discovered it. Our investigation into the matter indicates the attackers were able to access ‘tokens’, which was immediately reset ,” Truecaller has said in a statement. “What the attackers did not acquire is the needed key,” the company said. The mobile phone app has been a hit with users across the world. Once you download the app on your phone, it gains access t

Hacking Facebook Account with just a text message.!!!

Hacking Facebook Account with just a text message :- ------------------------------------------------------   Can you ever imagine that a single text message is enough to hack any Facebook account without user interaction or without using any other malicious stuff like Trojans, phishing , keylogger etc. ? Today we are going to explain you that how a UK based Security Researcher, " fin1te " is able to hack any Facebook account within a minute by doing one SMS. Because 90% of us are Facebook user too, so we know that there is an option of linking your mobile number with your account, which allows you to receive Facebook account updates via SMS directly to your mobile and also you can login into your account using that linked number rather than your email address or username. According to hacker , the loophole was in phone number linking process, or in technical terms, at file  /ajax/settings/mobile/confirm_phone.php This particular webpage works in backgroun

Another Facebook Hack Exposed!!!

Another  Facebook Hack Exposed!!! :- ----------------------------------------------------------------------   Today another similar interesting Facebook hack disclosed by another bug hunter, Roy Castillo. On his blog he explained a new facebook hack method that allows anyone to grab primary emails addresses of billions of Facebook users easily. Facebook Provides a App Dashboard for creating and managing your Facebook apps, with a range of tools to help you configure, build and debug your Facebook apps. The flaw exists in App settings, where application admin can add developer's profile also, but if the user is not a verified user, a error messages on page will disclose his primary email address. Using following mentioned steps, one was able to grab email addresses of all facebook users: Collect profile links of all facebook users from Facebook People Directory i.e http://www.facebook.com/directory/people/ Collect Numerical Facebook ID for each Profile from

10 free SEO Optimizer Softwarezzz

Are you looking for the best free SEO software that can help you to boost your site's search engine ranking ? This article can help you to find the best free SEO software to measure search engine factors and fix SEO errors. Check out these useful Free SEO Software for your Blog or Website.   Link Assistant - One of the best free SEO software that comes with tons of useful features which can help you to improve your site's search engine ranking easily. Link Assistant offers free SEO PowerSuite that lets you track , optimize and improve your website or blog's position on major search engines such as Google, Yahoo or Bing. SEO PowerSuite comes with four main features which are- SEO Rank Tracker , Link Assistant, Website Auditor & SEO SpyGlass. SEO Rank Tracker - Rank Tracker tool helps you to track the search engine ranking of your site, find the most useful traffic generating keywords and research keywords to optimize your website. Website Audi

Ip And Port Info Using Netstat :)

Ip And Port Info Using Netstat :) ------------------------------------------------------------------------------------------------------------ I.Use of Netstat ------------------------------------------------ - (To OPEN Netstat) - To open [Netstat] you must do the following: Click on the - [Start] button-->Then click [Programs]--> Then look for [Ms-Dos Prompt]. Netstat is a very helpful tool that has many uses. I personally use Netstat to get IP addresses from other users I'm talking with on fb n AIM. Also you can use Netstat go moniter your port activity for attackers sending syn requests (part of the TCP/IP 3 way handshake) or just to see what ports are listening/Established. Look at the example below for the average layout of a responce to typing Netstat at the C:-/windows\ prompt. ~~~~~~~~~~~~~~~~~~~~ C:-/WINDOWS>netstat Active Connections Proto Local Address Foreign Address State TCP pavilion:25872 WARLOCK:1045 ESTABLISHED TCP pavilion:25872 sy-as

Special:--Sending EMails From Command Promt..

-Sending Fake Mails From Command Promt. ---------------------------------------------- So here goes the steps: 1.Click on Start 2.Now open Run and type cmd.exe 3.Now type in CMD nslookup -q=MX anysite.com Replace anysite.com with gmail.com or hotmail.com. It Will Look Something Like Thizz:- 4.Now you will get some information like this: anysite.com MX preference = 80, mail exchanger = mail.anysite1.com anysite.com MX preference = 15, mail exchanger = mail.anysite2.com anysite.com MX preference = 10, mail exchanger = mail.anysite3.com anysite.com MX preference = 70, mail exchanger = mail.anysite4.com 5.Now select the mail exchanger which have the least value of MX preference For example:In this case I'll select the link mail.anysite3.com because it have the least value of MX preference i.e 10. 6.Now type in CMD telnet mail.anysite3.com 25 Replace mail.anysite3.com with the shown link. 7.Now you will see Welcome Screen from the server. 8.Now it's time to type y

How to Speed Up Windows Seven OS ?

How to Speed Up Windows Seven OS ? ? With the release of Windows 7, Microsoft may just have introduced the fastest operating system in the world. For those speed junkies who are never satisfied, we have provided a few tips that will help you make your PC even faster. Disable Automatic Disk Defragmentation The Automatic Disk Defragmentation feature in Windows is designed to maintain the health of the operating system. However, it also makes Windows run a little slower. You can put an end to this by disabling the feature and manually running at your leisure. To do so, click “Start” and select “Computer.” Next, right click on your primary hard drive and select “Properties.” Lastly, select the “Tools” tab, click “Defragment Now” and uncheck the “Run on a schedule” option. Utilize ReadyBoost ReadyBoost is a built-in Windows 7 feature that allows you to use a USB flash drive to enhance system performance. How is this possible? The drive itself acts as additional computer memory! In order

How TO Add Print Button on Blogger Blog

How To Add Print Button on Blogger Blog:- -----------------------------------------------   Reading article or news over the blog or a site is much like by maximum of us, but for those who have less data usage or having the busy schedule life, make impossible to read the stuff that you like over the internet. So for those who have such kind of problem, can save the page on to there computer or other device and can read it in offline. This make pretty good and hence save the lots of time also. For this only webmaster and blog admin should put a print button on to there site or blog. This make there reader more comfortable and feel nice to read. And it they found the stuff informative, they can come back to your site or blogs for more such stuffs. So here I will tell you how to insert Print button on the Blogger Blog, so that reader can save the page to read it in offline or may this help then in future. For doing this please follow the below steps. 1) Login to yo