Pages

Saturday, 30 April 2011

Hackers & Crackers

Who is a hacker, and what does he do?
A hacker is a computer enthusiast, someone good at what he does, and all-around intrigued by technology. He'll spend all night trying to solve a particular problem, to make a patch to make a program function properly, just to do it. Not because he personally benefits from it, or he's getting paid to do so. Hackers are the ones who built many of the things we use today, and did a damned good job doing it.

What is a cracker, and what does he do?
A cracker is someone with some of the knowledge a hacker has, sometimes an equal amount. The difference between them is the Hacker builds things while the Cracker breaks(into) them. A cracker is one who searches for vulnerabilities only to exploit them, commonly without intent to even inform the admin of them. Crackers are the ones you see on the news stealing credit card numbers, all that type of thing.

Credit goes to BluexXxKalishnikov 

Free 50 GB of Online Storage


Go to ADRIVE and sign up. Have 50 gigs of online storage free:)

The Basic Plan comes with this...and basic plan is FREE

Basic Plan Features:

Universal Access
50GB Storage Capacity (per account)
File Sharing
Folder/Directory Upload
File Download
Easy Search Tool
Remote File Transfer
International Character Support
Zoho® Editor

How to hack email



How to Hack Gmail or Yahoo or Hotmail or Any Other)


First of all you need to create an account in a form handling service. In the registration form enter your email address in the field "Where to send Data" and in redirect enter the URL of the site whose account is to be hacked( For Yahoo it will be http://mail.yahoo.com and for google it is mail.google.com/mail). After registering you will get an email from the web form designer with your form id.

Botnets

A botnet is a collection of infected computers or bots that have been taken over by Hackers (also known as bot herders) and are used to perform malicious tasks or functions. A computer becomes a bot when it downloads a file (e.g., an email attachment) that has bot software embedded in it. A botnet is considered a botnet if it is taking action on the client itself via IRC channels without the hackers having to log in to the client's computer. A botnet consists of many threats contained in one. The typical botnet consists of a bot server (usually an IRC server) and one or more botclients.

Yahoo Booters

It's a tool or a program that disconnect the person from their messenger or disturbs him. Yahoo booters are easily available on the internet, beware of some site may give a booter with a virus or a Trojan.

Friday, 29 April 2011

Sqlmap 0.9 Released – SQL Injection Tool


sqlmap 0.9 Released – SQL Injection Tool

After a year of hardcore development, sqlmap 0.9 is out!

Introduction:
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a kick-ass detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

How to search properly


In order to answer a question or find a program etc. you would use Google, Yahoo, Bing or the search here right? Well if you don't use search correctly you will often not be able to find what you are looking for. Follow these steps to maximize your chances of finding what you want.

Live Hacking DVD v1.3 Beta - Download !







Live Hacking DVD is a new Linux distribution packed with tools and utilities for ethical hacking, penetration testing and countermeasure verification. Based on Ubuntu this ‘Live CD” runs directly from the DVD and doesn’t require installation on your hard-drive. Once booted you can use the included tools to test, check, ethically hack and perform penetration tests on your own network to make sure that it is secure from outside intruders.

As well as the standard Linux networking tools like ping, wget, curl, telnet and ssh, the Live Hacking DVD has tools for DNS enumeration and reconnaissance as well as utilities for foot-printing, password cracking and network sniffing. It also has programs for spoofing and a set of wireless networking utilities.

The Live Hacking DVD is designed for ethical computer hacking, meaning that it contains the tools and utilities you need to test and hack your own network but using the tools and techniques that more malicious hackers would use.The Live Hacking DVD is based on open source technology and uses the popular Ubuntu Linux distribution as its base. All the tools included can be freely found in either the Ubuntu repositories on from the Internet. The DVD is designed to be a platform to help IT security professionals (as well as those with a general interest in information security) to start, understand and conduct penetration tests and ethical hacking.

Download Live Hacking DVD v1.3 Beta

Source: www.thehackernews.com