• 25,450
  • +1,014
  • 2,796

Hacking Competition Leaves...

 The Nexus S is the Android phone target in the 2011 Pwn2Own competition. From the results of the Pwn2Own hacking competition, it looks like Android and Windows Phone 7 are tough nuts to crack. It took only two days for hackers to crack into the Apple and Blackberry operating systems during the three-day Pwn2Own tournament last week, while Android and Windows...

Hacker jailbreaks iPad 2

 The iPad 2 has been jailbroken already, according to a video posted this evening. A hacker who goes by the nickname  @comex on Twitter claimed tonight to have hacked the security on the iPad 2. By breaking the security — commonly known as “jailbreaking” — the hacker was able to run software on the iPad 2 that is not authorized by...

[English]vBulletin XSS Exp...

To View Indonesian Version, You can click here. When we're hearing about vBulletin, some of us or more than 50% people says that "owh it's a secure forum application. However, when new features are included, such as Profile Customization, a new vulnerability might be born. If you already follow some of websites that have vBulletin, maybe you can try...

[Indonesia]vBulletin XSS E...

For English version, you can click here.Latar BelakangKita semua pasti mengetahui mengenai aplikasi vBulletin. Ya vBulletin merupakan aplikasi forum dimana ketika kita mendengar mengenai aplikasi tersebut, terlintas di pikiran kita adalah suatu aplikasi yang "cukup aman". Tetapi seiring dengan perkembangannya, ada beberapa fitur yang ditambahkan...

Privilege Escalation from ...

Type : Tips and TricksLevel : Easyday(Zeroday)For some people like me, I think we will have a lot of password, from Facebook, yahoo, google, twitter, foursquare, digg, etc…etc. When we're remembering all of that password, we also must remember our PC/Laptop password. In the facts there's a few people accidentally forget their Windows...

Internet Explorer 6,7,8 Ze...

Type : TutorialLevel : EasyThis tutorial is the same with IE 6,7,8 Exploit using Metasploit, but I try to make it more simple for you.Requirement :1. Arbitrary Code(Don't open it with Internet Explorer, but use text editor to modify)FAKEOBJ = alloc(233120, FAKEOBJ); // IE6 mshtml.dll Version 6.0.2900.5512//FAKEOBJ = alloc(241748,...

Internet Explorer 6,7,8 Me...

Type : TutorialLevel : Medium, AdvancedFor more easier tutorial about Proof of Concept this type of attack, you can view the tutorial here. Maybe for you who have ready my tutorial about Exploiting IE6 using ie aurora, this exploit is slightly the same, but this exploit has bigger spread, because it affects Internet Explorer 6, Internet Explorer 7, and Internet...

Exploiting Internet Explor...

Type : TutorialLevel : EasyContinuing my previous post about Exploiting Internet Explorer 6 to Gain Administrator Priviledge Using ie_aurora.rb, you also can learn the easy way to do this by using Metasploit Framework Web Based.Requirement :1. ie_aurora.rb  (Download From Mediafire.com)Mediafire.comStep By Step :1. Run...

Exploiting Internet Explor...

Type : TutorialLevel : Medium, AdvancedFor you who want to learn the easy way, you can see my tutorial about using this exploit using web based here.This year will be end in a few weeks. I still remember at 2nd week of January of this year metasploit announce the new exploit for Internet Explorer 6 called ie_aurora memory corruption. Now when I live...

Page 5 of 512345