Are you among the people who when opens web-pages usually ends on facebook or a person who is facebook fan who can’t stay away from facebook. If answer to any of the above question is yes then surely you might be knowing your password might be under attack. Since facebook is one the biggest social networks reaching millions of people around globe and contains private profiles and information it has become a hardcore target for hackers. Reason, it reaches thousands of people so if a fraud is conducted millions can be fooled, next the profile can be used for social engineering attack against you or setup false accusations. From long time I found sites are discussing on how to hack facebook password, but here I want to tell you how to save your account from being hacked by someone. Since there are
Sunday, August 12, 2012
Save Your Facebook Account-2
I hope you are back to know how you can save your facebook account from getting hacked. This time we will discus how you can protect your facebook accounts from password breaking tools. If you want to know about various facebook password hacking tools please read,
As a hacker you’ll find that there are many other tools that I have not compared in “Facebook Hacking Tools Compared”. The reason is quite simple I haven’t found them for download, following is list of tools I haven’t found yet,
Facebook Private Viewer 2.4
Facebook Private Viewer 2010
Captcha Killer
Labels:
tricks
Facebook Hacking Tools Compared
I don’t know why but people really getting mad behind facebook cracking softwares. Most of those softwares that claim to break into facebook are just fake pieces of code. The day I posted “Facebook Vs Facebooz” it got so many hits that made me write this another part to facebook hacking tool. Here we will cover some other facebook hacking tools other than facebooz, if you want to read about facebooz please visit this article “Facebook Vs Facebooz”. Here we will compare some other tools than facebooz.
1. Hell And High Water Facebook Cracker:
Labels:
hacking
What Is Phishing
Here in this post we will discus a little about what is phishing. Please note what we are covering here is just basics and not a phishing tutorial. In phishing attack, an attacker creates a fake login page of a legitimate website and lures victim to login using it. The site under attack is known as phished site and the fake login page used for capturing or stealing information is known as phished page. To perform phishing attack an attacker performs following steps,
Facebook Vs Facebooz(face book hack)
In year 2008 a tool was released for facebook hacking the tool is known as facebooz(also known as facebook freezer). A lot had been discussed whether the tool is really capable of hacking facebook passwords. Many think its just a joke that a tool can crack facebook passwords. So keeping unnecessary things behind lets try to find out why this works or if it not works they why. The tool is specially targeted to m.facebook.com, yes that’s the mobile version of facebook. By the way facebook claims that the vulnerability is patched but still the tool has been downloaded millions of times from its release that means the claim is just a false excuse. I created a fake facebook account with password “Monkey” and facebooz got no issues cracking it that means the tool works. Then i changed password to “M0n7e1” and the tool failed to guess it that means it failed to work. The thing which can depress you is its speed of operation, by the way it happens due to need of software needing re-authentication grabbing so you need patience.
Labels:
hacking
How To Hack Facebook Account | Phishing
In this tutorial we will discus how you can hack Facbook account password by phishing. Phishing is act of creating a replica of legitimate website for stealing passwords and credit card numbers etc. Here I will show you how you can create replica of facebook log-in page and then fool your victim to put his username and password in it so that you can get his account password
.
.
First of all open www.facebook.com in your web browser, from
Labels:
hacking
Hack Gmail Account | Phishing
In this following tutorial to phishing I‘ll demonstrate how to hack Gmail account password by phishing. Since we already covered how to hack Facebook account using phishing I consider this as second tutorial to phishing. First of all we will create a fake login page, to create it open www.gmail.com in your web browser, click on file then save as and selectfile name “Gmail” and save as type “Web page Complete”. After above process you’ll have a file named Gmail.htm and a folder named Gmail_files in folder in which you’ll save web page. Now open Gmail.htm in notepad, find for action word and locate following string,
Labels:
hacking
BEST OPERATING SYSTEM FOR HACKERS
Today i will share with you which operating system i use for hacking activities. My favorite operating system is Backtrack Linux and Windows XP not because they are easier to use but because i love their vast functionality and features. But you can also give a try to Matriux Operating System and knoppix , Matriux OS is just awesome but its still under construction as designers are still working on it and patching it. Now lets discuss more about functionality of Backtrack operating system. I will not discuss more about windows XP because its so easy to understand that it needs no explanation.
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking.
Regardless if you’re making BackTrack your primary operating system, booting from a Live DVD, or using your favourite thumb drive, BackTrack has been customized down to every package, kernel configuration, script and patch s
Labels:
hacking
Sunday, August 5, 2012
Havij SQL Injection
Collection of SQL Injection Tools for website hacking.....
Havij is an automated SQL Injection tool that helps penetration testers to find and exploitSQL Injection vulnerabilities on a web page.The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij.The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.
For more information and download visit here
Havij SQL Injection
Havij is an automated SQL Injection tool that helps penetration testers to find and exploit
For more information and download visit here
Labels:
hacking
Saturday, August 4, 2012
Change your Processor's Name Xp/win7
Are you bored with your old processor? Do you want a new processor with a breath-stopping name but are not going to upgrade any time soon? No need to worry. You can still have that new processor's name displayed in your computer. Well not only that, you can also have a better one than the one you are supposing to buy. Just follow this trick.
With this trick, you can change the name of your processor to a personalized one like My Processor or something extreme like Decacore Processor 50 GHz . These are just a few examples. You can change the name of your processor to anything you like.
With this trick, you can change the name of your processor to a personalized one like My Processor or something extreme like Decacore Processor 50 GHz . These are just a few examples. You can change the name of your processor to anything you like.
To have one such cool processor's name displayed in your computer, follow these steps:-
Labels:
tricks
HACK WEBSITES DATABASE USING XPATH INJECTION
In a typical Web Application architecture, all data is stored on a Database server. This Database server store data in various formats like an LDAP, XML or RDBMS database. The application queries the server and accesses the information based on the user input.
Labels:
hacking
SQL INJECTION ATTACKS
SQL injection is a technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. Web pages which accepts parameters from user, and make SQL query to the database, are targeted. For Example, A web page with username and password, fires SQL query on the database to check whether a user has entered valid name and/or password or not. With SQL Injection, it is possible for us to send crafted user name and/or password field that will change the SQL query and thus grant us something else.
Subscribe to:
Posts (Atom)