Subscribe For Free Updates!

We'll not spam mate! We promise.

Saturday, 10 January 2015

TOP 14 TOOLS THAT ETHICAL HACKER MUST HAVE !!!

Here is the List of tools that ethical HACKER must have a range of systems. These tools  are basically to reveal information which further results in a specific attacks on a given system. To locate weaknesses or error in a target system to gain as muchas information as possible about that network. These tools Contains vulnerability scanning, ...

Tuesday, 30 December 2014

Tinymce PHP file Manager, Remote File upload vulnrablity

Title :Tinymce PHP file Manager, Remote File upload vulnrablity               server : Linux Author: NoentryPHC  Type : webapp Exploit   Hamr : remote shell upload   Dork : inurl:/file_manager.php?type=img.. Goto google.com and type dork inurl:/file_manager.php?type=img & inurl:/file_manager.php?type=file to...

Saturday, 18 January 2014

How to change the administrator password without knowing the current one?

How to change the administrator password without knowing the current one?  METHOD 1. 1. GO TO CONTROL PANEL2. CLICK ON " ANDMINISTRATIVE TOOLS"3. NOW CLICK ON " COMPUTER MANAGEMENT "                            OR    siMPLY RIGHT click on my computer and click...

How to Hack Databases: Cracking SQL Server Passwords & Owning the Server

How to Hack Databases: Cracking SQL Server Passwords  & Owning the Server  In this tutorial, we'll look at how we can crack the password  on the system admin (sa) account on the database, install a meterpreter payload through calling the stored procedure xp_cmdshell, and wreak havoc on their system. Step 1: Start Metasploit First,...

How to Crack User Passwords in a Linux System

How to Crack User Passwords in a Linux System In this article, we'll look at how to grab the password hashes from a Linux system and  crack the hashes using probably the most widely used password cracking tool out there,   John the Ripper. Let's boot up BackTrack and get hacking! Where Linux Passwords Are Stored Linux passwords...

The Ultimate List of Hacking Scripts for Metasploit's Meterpreter

Please note that new meterpreter scripts are being developed every day. This list attempts to provide you with a complete list of scripts as of this writing. If you find errors or typos, please feel free to post them here, so I will try correct them as soon as humanly possible. Script Commands with Brief Descriptions arp_scanner.rb - Script...

Thursday, 16 January 2014

How To Make 404 Pages in Defaced websites by Using shell

How To Make 404 Pages in Defaced websites by Using shell What are 404 pages ?  its a page or file which is no longer available on website, Advantages of 404 pages in website Defacing : if someone will trying to acess to your shell by guessing like (c99.php, r57.php etc) then it will show your custom page on Not found Link. in Defaced...