• 25,450
  • +1,003
  • 2,796

Proxy Definitions and Prox...

Be Anonymous…a lot of underground computer hacker says it, do not make mistakes and create your footprint anywhere. Actually what they say is true and also very useful when hacker perform an attack too keep they identity anonymous. In this tips and trick I will write down about proxy and their type on the net. Proxy definitions according to wikipedia : a proxy...

7 Metasploit Meterpreter C...

Type : Tips and TrickLevel : EasyAfter you successfully gaining a meterpreter client access to victim computer you need to know what is the main command you should know to doing something with the meterpreter client. In this tips and trick I trying to wrote the core meterpreter client commands you should know. The meterpreter client you can gain when you...

How to Clear Windows Event...

Type : Tips and TrickLevel : All LevelsTesting Operating System : Windows XP SP0 (Using ms08_067_netapi exploit) After you successfully compromised a system usually you will do a lot of work there. But did you know that every activities you do inside compromised computer it’s actually recorded by the system? Sometimes it’s best to not have your...

Privilege Escalation in Me...

Type : Tips and TrickLevel : EasyWhat is privilege escalation? according to wikipedia Privilege Escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. The result is that an application with more...

How to Find Another Websit...

Today my website was down around 10:00AM until 10:30PM approximately. When I’m trying to open my website, it was not responding and can’t open at all. When I’m trying to open my other website on the same hosting it appears the same “Error Establishing Database Connection“. I think someone was compromise my website and all of the database...

Classic Cryptography ̵...

Why encryption?maybe some of readers think that this is not hacking practice or something that can not learning by doing. I can say that learn about cryptography is also fun and interesting. Maybe after you read the rest of this post you can find another algorithms for encryption….why not? or maybe break some ciphertext 🙂 In this tutorial we will learn about...

Basic Command Line for TCP...

Type : Tips and TrickLevel : EasyYes today was a very great day because the temperature outside my room above 30 celcius in last few days…and also today, I will write simple tips and trick about basic command line for tcp/ip and networking in windows you should know. I will try to explain the simple basic thing you need to know about basic command line for...

5 Steps to Screen Capture ...

Type : Tips and TrickLevel : EasyPlatform : Windows (Any)When you already successfully compromising a vulnerable computer, sometimes you need to know what they are doing in their screen. By using meterpreter payload, you can do capturing user screen and it will be saved in your local machine. To doing this tips, you need to perform an attack first using...

5 Step To Capture Windows ...

Type : Tips and TrickLevel : Beginner, Medium, AdvancedMy previous tutorial was talking and explaining about how to capture user keyboard stroke using meterpreter keylogger, you can find the article here : 5 Step Using Metasploit Keylogger (Keylogging). Now I will explain how to capture user login information also using meterpreter keylogger. I didn’t put...

4 Steps Metasploit Meterpr...

Type : TutorialLevel : Beginner, Medium, AdvancedInformation leakage is one of the largest threats that corporations face and much of it can be prevented by educating users to properly secure their data. Users being users though, will frequently save data to their local workstations instead of on the corporate servers where there is greater control.(from:...

Evilgrade 2.0 Error on Bac...

I’m running Evilgrade on Backtrack 5… Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates. It comes with pre-made binaries (agents), a working default configuration for fast pentests, and has it’s own WebServer and DNSServer modules. Easy to set up new settings, and has an...

How To Change Screen Resol...

Finally I finished downloading this O.S 🙂 but I have a problem How To Change Screen Resolution in Backtrack 5. The step below is how to solve the probThe first thing I check for the new Linux O.S run virtually is the Screen Resolution. The most common thing you do when you want to change screen resolution is go to /etc/X11/xorg.conf. But in this Backtrack 5...

The Difference Between HTT...

HTTPS : Hyper Text Transfer Protocol SecureHTTPS is combination of Hyper Text Transfer Protocol and Secure Socket Layer protocol(SSL) / Transport Layer Security(TLS) to provide encrypted communication between web server and client. Usually HTTPS used for internet banking, payment transaction, login page, etc. This protocol use port 443 for communication. Website...

Page 5 of 7« First...34567