• +

Hacking Windows Using USB ...

Type : TutorialLevel : Easy (especially if you've already read and practice this tutorial before)If my previous tutorial about Adobe PDF escape EXE social engineering talking about sending malicious PDF via e-mail and then the victim execute the file, today we will learn about how if we attack the victim via USB?As you know, USB was very famous and...

Microsoft Will Pay $250,00...

Microsoft is offering more than $250,000 to researchers who develop new security defenses to protect Windows users against attacks that exploit software bugs. Microsoft’s Blue Hat Prize announced on Wednesday at the Black Hat security conference will pay $200,000 for the best “novel runtime mitigation technology designed to prevent the exploitation of memory...

How to Find Another Websit...

Today my website was down around 10:00AM until 10:30PM approximately. When I’m trying to open my website, it was not responding and can’t open at all. When I’m trying to open my other website on the same hosting it appears the same “Error Establishing Database Connection“. I think someone was compromise my website and all of the database...

Indian Call Centres Sellin...

Indian call centre staff are selling UK broadband user’s financial data, including credit cards and security codes, for as little as 25 pence per user for bulk purchases. An investigation by The Sun found a former call centre worker who sold the bank account details, personal data such as job description and credit card numbers with the three-digit CVV security...

Classic Cryptography ̵...

Why encryption?maybe some of readers think that this is not hacking practice or something that can not learning by doing. I can say that learn about cryptography is also fun and interesting. Maybe after you read the rest of this post you can find another algorithms for encryption….why not? or maybe break some ciphertext 🙂 In this tutorial we will learn about...

Flying Drone Can Crack Wi-...

How do one ex-Air Force official and one former airplane hobby shop owner, both of whom happen to have decades of experience as network security contractors for the military, spend their weekends? Building a flying, unmanned, automated password-cracking, Wi-Fi-sniffing, cell-phone eavesdropping spy drone, of course. At the Black Hat and Defcon security conferences in...

Backtrack 5 Release One R1...

Some good news for you who love and like to use Backtrack Linux, because in a few days (about 9 days to go) Backtrack will release it’s update Backtrack 5 Release 1. This update will available to download at August 10, 2011 with over 100 bug fixes, and also numerous package updates and the addition of over 30 new tools and scripts. According to it’s...

Anonymous touts its own so...

With the Defcon 19 hacking conference set to begin in Las Vegas next week, hacking group/movement/”idea” Anonymous is touting its own “social network,” a site with the Googly moniker Anon+. @YourAnonNews recently sent out a tweet advertising the effort, which seems to be an attempt to create an anonymous, open-source communications platform...

Amazon’s Cloud Servi...

Security researchers from Kaspersky Labs have spotted yet another SpyEye crimeware variant using Amazon’s Simple Storage Service (Amazon S3) for command and control purposes. According to a graph released by the vendor, cybercriminals are systematically abusing Amazon’s service for command  and control gateway, in an attempt to increase the average lifetime of...

Hacking Windows 7 SP 1 Usi...

Type : TutorialLevel : Easy, Medium, AdvancedSuccess rate : ExcellentPlatform : Win 7 SP 1(all windows), I've also tried in Linux Debian 6 using Iceweasel, but no luck..maybe someone has try it?Today in this tutorial we will doing some trick using Social Engineering style to attack victim. Before we start, let me tell you a little story why...

Facebook to Hackers: Find ...

Good news for hackers. Social networking giant Facebook has announced a bug bounty program, in which it will pay hackers for finding and reporting security flaws on its Web site. People who can figure out significant problems with the site will get paid a hefty amount, starting at a base rate of $500. The amount will go up as per the significance of the flaws...

UK Cops ‘duped’...

The 19-year-old Scotsman fingered Wednesday as a central figure of the LulzSec hacking crew is a fall guy who was framed to take the heat off the real culprit, according to unconfirmed claims from a rival group. “We believe MET Police got the wrong guy and it happens because of lot of disinformation floating on the web,” a Thursday post on the LulzSec Exposed...

Basic Command Line for TCP...

Type : Tips and TrickLevel : EasyYes today was a very great day because the temperature outside my room above 30 celcius in last few days…and also today, I will write simple tips and trick about basic command line for tcp/ip and networking in windows you should know. I will try to explain the simple basic thing you need to know about basic command line for...

Page 15 of 29« First...10...1314151617...20...Last »