Pages

Subscribe:

Ads 468x60px

Labels

Translate

Featured Posts

Friday, April 12, 2013

How To Protect Apache Web Server From Hackers




Apache is the most widely used web server over the internet on Linux machines. For better and reliable performance you need to protect your web server from hackers. Here i am going to write some steps which can help you in protecting your web server from hacker. “I am writing this article from some references and apache security tips.”

Steps to secure apache web server
1-Update you apache at regular interval
You should update your linux at a regular interval of time. If you have installed it from source, make sure that upgrade is not going to break any modules or dependencies your Web site has. And if you update Apache, make sure PHP (if used) is updated as well. New holes and security risks are found all the time. You have to ready for that.
2-Turn off unwanted services
There are a some apache services you don’t want to use. All of these services can be disabled or turnoff in the httpd.conf file. Some of these service are:

Sunday, August 12, 2012

Save your Facebook Account


                                           Are you among the people who when opens web-pages usually ends on facebook or a person who is facebook fan who can’t stay away from facebook. If answer to any of the above question is yes then surely you might be knowing your password might be under attack. Since facebook is one the biggest social networks reaching millions of people around globe and contains private profiles and information it has become a hardcore target for hackers. Reason, it reaches thousands of people so if a fraud is conducted millions can be fooled, next the profile can be used for social engineering attack against you or setup false accusations. From long time I found sites are discussing on how to hack facebook password, but here I want to tell you how to save your account from being hacked by someone. Since there are

Save Your Facebook Account-2


I hope you are back to know how you can save your facebook account from getting hacked. This time we will discus how you can protect your facebook accounts from password breaking tools. If you want to know about various facebook password hacking tools please read,


As a hacker you’ll find that there are many other tools that I have not compared in “Facebook Hacking Tools Compared”. The reason is quite simple I haven’t found them for download, following is list of tools I haven’t found yet,

Facebook Private Viewer 2.4
Facebook Private Viewer 2010
Captcha Killer

Facebook Hacking Tools Compared

I don’t know why but people really getting mad behind facebook cracking softwares. Most of those softwares that claim to break into facebook are just fake pieces of code. The day I posted “Facebook Vs Facebooz” it got so many hits that made me write this another part to facebook hacking tool. Here we will cover some other facebook hacking tools other than facebooz, if you want to read about facebooz please visit this article “Facebook Vs Facebooz”. Here we will compare some other tools than facebooz.

1. Hell And High Water Facebook Cracker:

What Is Phishing


Here in this post we will discus a little about what is phishing. Please note what we are covering here is just basics and not a phishing tutorial. In phishing attack, an attacker creates a fake login page of a legitimate website and lures victim to login using it. The site under attack is known as phished site and the fake login page used for capturing or stealing information is known as phished page. To perform phishing attack an attacker performs following steps,

Facebook Vs Facebooz(face book hack)


                                             In year 2008 a tool was released for facebook hacking the tool is known as facebooz(also known as facebook freezer). A lot had been discussed whether the tool is really capable of hacking facebook passwords. Many think its just a joke that a tool can crack facebook passwords. So keeping unnecessary things behind lets try to find out why this works or if it not works they why. The tool is specially targeted to m.facebook.com, yes that’s the mobile version of facebook. By the way facebook claims that the vulnerability is patched but still the tool has been downloaded millions of times from its release that means the claim is just a false excuse. I created a fake facebook account with password “Monkey” and facebooz got no issues cracking it that means the tool works. Then i changed password to “M0n7e1” and the tool failed to guess it that means it failed to work. The thing which can depress you is its speed of operation, by the way it happens due to need of software needing re-authentication grabbing so you need patience.

How To Hack Facebook Account | Phishing


In this tutorial we will discus how you can hack Facbook account password by phishing. Phishing is act of creating a replica of legitimate website for stealing passwords and credit card numbers etc. Here I will show you how you can create replica of facebook log-in page and then fool your victim to put his username and password in it so that you can get his account password
.
First of all open www.facebook.com in your web browser, from

Hack Gmail Account | Phishing


In this following tutorial to phishing I‘ll demonstrate how to hack Gmail account password by phishing. Since we already covered how to hack Facebook account using phishing I consider this as second tutorial to phishing. First of all we will create a fake login page, to create it open www.gmail.com in your web browser, click on file then save as and selectfile name “Gmail” and save as type “Web page Complete”. After above process you’ll have a file named Gmail.htm and a folder named Gmail_files in folder in which you’ll save web page. Now open Gmail.htm in notepad, find for action word and locate following string,


BEST OPERATING SYSTEM FOR HACKERS


Today i will share with you which operating system i use for hacking activities. My favorite operating system is Backtrack Linux and Windows XP not because they are easier to use but because i love their vast functionality and features. But you can also give a try to Matriux Operating System and knoppix , Matriux OS is just awesome but its still under construction as designers are still working on it and patching it. Now lets discuss more about functionality of Backtrack operating system. I will not discuss more about windows XP because its so easy to understand that it needs no explanation.      
   


Best Operating System : Backtrack Linux
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking.
Regardless if you’re making BackTrack your primary operating system, booting from a Live DVD, or using your favourite thumb drive, BackTrack has been customized down to every package, kernel configuration, script and patch s

Sunday, August 5, 2012

Havij SQL Injection

Collection of SQL Injection Tools for website hacking.....

Havij SQL Injection


Havij is an automated SQL Injection tool that helps penetration testers to find and exploitSQL Injection vulnerabilities on a web page.The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij.The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.

website hacking sql injection

For more information and download visit here

How to Use ardamax Keylogger For Hacking..


How to Use ardamax Keylogger For Hacking..just watch this tutorial..








Saturday, August 4, 2012

Change your Processor's Name Xp/win7

Are you bored with your old processor? Do you want a new processor with a breath-stopping name but are not going to upgrade any time soon? No need to worry. You can still have that new processor's name displayed in your computer. Well not only that, you can also have a better one than the one you are supposing to buy. Just follow this trick.

With this trick, you can change the name of your processor to a personalized one like My Processor or something extreme like Decacore Processor 50 GHz .  These are just a few examples. You can change the name of your processor to anything you like.
To have one such cool processor's name displayed in your computer, follow these steps:-
  1. Click on Start.
  2. Click on Run.
  3. Type "regedit" without quotes.
  4. Navigate to HKEY_LOCAL_MACHINE/HARDWARE/
  5. From HARDWARE, navigate to DESCRIPTION/System/CentralProcessor/.
  6. In the work area, double click on ProcessorNameString, and change its value according to your choice.
  7. Click OK
Win7

take Clear screen shots


Fraps...u cn take Clear screen shots..this for gamers ..
Hear it media fire

HACK WEBSITES DATABASE USING XPATH INJECTION




Everyday many website gets hacked by hackers but most of the hackers are hacking those website just for popularity nothing else. Today i am writing this tutorial on XPath Injection, in which i will explain you, How Hackers Hack Website Using XPath Injection.

In a typical Web Application architecture, all data is stored on a Database server. This Database server store data in various formats like an LDAP, XML or RDBMS database. The application queries the server and accesses the information based on the user input.

SQL INJECTION ATTACKS



What is SQL Injection?

SQL injection is a technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. Web pages which accepts parameters from user, and make SQL query to the database, are targeted. For Example, A web page with username and password, fires SQL query on the database to check whether a user has entered valid name and/or password or not. With SQL Injection, it is possible for us to send crafted user name and/or password field that will change the SQL query and thus grant us something else.

Monday, July 30, 2012

Hacking Gmail


Download PDF From Mediafire

Saturday, July 28, 2012

Most Popular Hackers Of All Time


I mentioned few most popular Hackers in this article. This article contains a combination of both “White and Black Hat” Hackers. Hacking refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, administrator, or designer. “Hack” may refer to a clever or quick fix to a computer program problem, or to what may be perceived to be a clumsy or inelegant (but usually relatively quick) solution to a problem, such as a “kludge”.




The terms “hack” and “hacking” are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as by circuit bending. It is from this usage that the term “hacking” is often used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime (via Wiki).

How to hack wifi password?

Learn how you can easily hack a wifi password.
This includes for WEP, WPA, WPA2, WPS encryption.
You can do it from Windows7 or Mac OS X.
With Portable Penetrator you can easily recover WEP WPA WPA2 WPS wifi password.
Learn to secure your wifi so it dont get hacked.
Portable Penetrator Interface  

You Are Losing the Battle With Hackers. Yes, You.


You Have Been Hacked
“We’re not winning. … I don’t see how we ever come out of this without changes in technology or changes in behavior, because with the status quo, it’s an unsustainable model. Unsustainable in that you never get ahead, never become secure, never have a reasonable expectation of privacy or security.”
That’s a quote from Shawn Henry, the FBI’s top cyber cop who has spent two decades with the bureau, from a recent interview with the Wall Street Journal. And he’s not alone in thinking that there needs to be fairly substantial changes to software and network security.
James A. Lewis, a senior fellow on cybersecurity at the Center for Strategic and International Studies, said that as gloomy as Mr. Henry’s assessment may sound, “I am actually

Web Hacking Attacks and Deffense.pdf

Download PDF From Mediafire