Tuesday, 31 July 2012

How Hacking Software's Work . The Naked Truth About Hacking Fb/Myspace/Twitter

Hey!
in the next few short minutes I'am going to Expose  how all the softwares floating on the internet work and their dirty secrets! lets begin !

Crack Admin Password In Windows xp/vista/7 . step by step

For changing the administrator password using command prompt you must have access to guest account or any other account account. Now follow the step by step procedure.
1. Gain access to the guest acount
2. click on windows key + R .
3. type cmd in the run box.

now you will see a image like this :


4.  Type the following commands depending on your needs :

1.  To check the User Accounts: Net User
2. To Add a New User Account Type: Net User Username Password /add
3. To Delete a User Account Type: Net User Username /delete
4. To Change the Password of User Account Type: Net User Username *

With the help of above commands you can change the password of any account ( including administrator account )
THAT'S IT !!!!!
Note : Here username is the account name which you want to change or delete.

Learn Hacking and make your career in It security


A recent study conducted by NASSCOM, the expected demand of Ethical Hacking professionals by the year 2012 would be around 1,88,000, as opposed to current availability of only about 22,000 professionals. 

If we talk about ethical hacking training in india there are various institute who provide speacial training.In Ethical hacking

    Security auditing

This summary is not available. Please click here to view the post.

How to become a professional hacker | career in Ethical Hacking| CEH

Hi friends, Like others I will not talk about going to launch a magazine, please subscribe this, In the world of computer and Internet i will not make a plan to sell a paper made magazine

How to use pendrive as ram memory in windows xp/vista/7

Hi friends, Windows 7 and Windows vista comes with a ready boost option. Q-What is ready boost
Ans- "ReadyBoost is a disk cache component ofMicrosoft Windows, first introduced with Microsoft'sWindows Vista in 2006 and bundled with Windows 7 in 2009.

Meta exploit Fundementals

Exploit:- An exploit is a loophole in a system or network security that can be used by a pentester or an attacker to get  the desire result like getting inside the system by the help of payloads or without payloads. examples of exploits are sql-injection, buffer overflow etc.

Monday, 30 July 2012

WEBSITE HACKING USING DIRECTORY TRAVERSAL ATTACK COMPLETE TUTORIAL

Hello Friends today we will discuss directory traversal attack which is actually widely used by many hackers all over the world it is really a cool concept of website hacking let me give you a brief explanation on it.

Directory Traversal is an HTTP exploit which allows attackers to access restricted directories and execute commands outside of the web server's root directory.

Saturday, 28 July 2012

Hack Facebook By Bypassing Security Question .. Step-by-Step guide



Hi ! In this article iam gonna show you How to HACK FACEBOOK account.. we all wanted to hack our friend's or enemy's facebook account at one point or the other ..this is the time to end your search and HACK !this guide will teach you how to hack facebook account by Bypassing security question .

how to access blocked websites ! unblock everything on the internet

Hi !! In this article i'm going to show you how to access websites even though its BLOCKED ..
some of this methods are very complicated
read it carefully do it step-by-step

Friday, 27 July 2012

How to Hack passwords using a USB


Hello Friends,
Have you ever thought that a Simple USB Drive can be used as a Destructive Tool for Hacking Passwords? Today I will show you how to hack Passwords using an USB Pen Drive.

Thursday, 26 July 2012

Increase internet speed in Windows 7.. increase of upto 20%

Hi ! Do you know that you can actually increase your internet speed in windows 7 despite the fixed bandwidth provided by your internet service provider. This is due to the reason that Windows 7 actually stores 20 percent of the entire bandwidth available for its own updates and access to the Microsoft Servers. Most of us are completely unaware of the fact because the option to control Windows bandwidth is completely hidden from us. However, in this article I am going to guide you step by step how you can change the bandwidth speed and use all 100 percent of the total bandwidth available.

Hack a Facebook Account Using a Fake login Page .. the hackers way :))

Phishing is one of the easiest methods that you can use to hack Facebook accounts or any other email accounts ,In this article i will explain how you can Hack Facebook accounts by using a Phisher (fake login page ) .

Wednesday, 25 July 2012

Chatting Using CMD in Windows !! school computer lab hacks!

Hey ! In this iam going to show exactly how to chat using cmd in windows !

Open Notepad and type the Following code
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

Bandwidth Throttling with NetEM Network Emulation



On a recent project, I was busy doing a Web application performance benchmark test. For most such benchmarks, it is important to simulate the typical end-user’s average effective bandwidth. Since we used a fast network for our benchmarks, we had to find a way to somehow limit the bandwidth of our LAN so that it would resemble “real” Internet throughputs. It took some research and reading to find the best way to do this. We found that there were commercial shaping products like Allot’s Netenforcer and PacketShaper, but these were costly. So instead of these devices/appliances, we decided to use the NetEM tool.

Monday, 23 July 2012

Ravan , JavaScript based Distributed Password cracking





You want to crack a hash but your system speed is low?! No need to worry..! Here is solution for you , "Distributed Password Cracking". Let me introduce a new tool called "Ravan" developed by LavaKumar.
About Ravan:
Ravan is a JavaScript based Distributed Computing system that can perform brute force attacks on salted hashes by distributing the task across several browsers. It makes use of HTML5 WebWorkers to start background JavaScript threads in the browsers of the workers, each worker computes a part of the hash cracking activity.
Ravan now supports MD5,SHA1,SHA256,SHA512 hashes.

Saturday, 21 July 2012

Hacking website using SQL Injection -step by step guide

Before we see what  SQL Injection is. We should know what SQL and Database are.

Database:
Database is collection of data. In website point of view, database is used for storing user ids,passwords,web page details and more. 



Some List of Database are:

* DB servers,
* MySQL(Open source), 
* MSSQL, 
* MS-ACCESS, 
* Oracle, 
* Postgre SQL(open source), 
* SQLite,