Posts

Showing posts from August, 2018

Tera's Services smtp-rdp-vps-cpanel-whm-shellz

Image
We got bunch of mails from our esteemed readers that they needed the below tools and we got many mails from Noobs too who have tricked by BAD guys but guess what, we had to help because that is exactly what TERATOOLS was created for to help Noobs and young hackers with every knowledge and tool to begin their journey into ETHICAL HACKING!! We offer the following service to our happy customers globally at the same price and we don't sell dead stuffs. SMTP Short for (Simple Mail Transfer Protocol) a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; the messages can then be retrieved with an e-mail client using either POP or IMAP. we sell all types UNLIMITED, HIGH but LIMITED 5k, 10k 50k, Zimbra, office365, gsuite powered SMTP, etc are in stock and selling fast. INBOX guaranteed  RDP Short for (Remote Desktop Protocol) is a Microsoft protocol designed to facilitate a

HOW TO HIDE YOUR IDENTITY ONLINE

Image
Hackers are known for breaking into most impregnable web servers around the world and still avoid being caught. One of the main reasons for that is that they hide their IP addresses from prying eyes of the authorities. Using various techniques that we discuss below, a hacker operating from Canada uses IP address of South Korea to conduct leet operations. Have you ever wondered how these hackers remain hidden from the authorities? One obvious thought that comes to mind – how do they cover their tracks while accessing the big bad world of the internet? There are quite a few recommended methods to be incognito on the internet and it’s not just for hackers but also for ordinary users to stay anonymous. Quite a few people would prefer the rest of the world staying in the dark about their activities. It might be individuals from a nation that represses internet access to someone wanting to access a series on Netflix that’s not available in their country yet. Irrespective of t

How To Lock And Unlock Your PC Using USB Pendrive

Image
How To Lock And Unlock Your PC Using USB Pendrive   Manpreet Singh     1 Month Ago How To Lock And Unlock Your PC Using USB Pendrive What if we tell you that USB Flash drive could replace your all forms of passwords? This is actually possible with the app PREDATOR. So, today we are going to share an easy trick by which you can Lock/Unlock your PC using USB Flash drive. Go through the full post to know about it. W e usually log into the computer by using our passwords and pins, but today we have a new method to lock and unlock your computer that is way cooler than these traditional methods. Do you know? You can log into your computer using your USB flash drive. Yes, this is possible  you can make your computer start with your pen drive . The process is very straightforward and easy, and you can implement this in few steps that we have discussed below. So have a look at the method of How To Lock/Unlock Your PC Using USB Flash Drive. Also Read:  How To Create Wi

SQL INJECTION

SQL INJECTION Hacking a vulnerable website with SQL injection allows you to obtain usernames and passwords, possibly access the admin account, and from there you could do whatever you wanted to the website really. When Anonymous hacked Sony and obtained personal information of thousands of users..  they used an advanced form of this hack. This hack can be done from any computer or device with an internet connection and a browser. Find a vulnerable website. One way you can do this is by using what is called a google dork. In the Hacking websites section of this app, you can find a huge list of dorks. Simply goto google and type  inurl:dorkhere When you have a target URL like:  http://cadaboutdrugs.ie/news.php?id=82 , add a ' at the end so it looks like http://cadaboutdrugs.ie/news.php?id=82' The site will be vulnerable to this hack if you get an error, or some of the websites content vanishes. If none of these things happen, this website is not vulnerable to SQLi F

Automated Blind SQL Injection Attacking Tool

Image
Automated Blind SQL Injection Attacking Tool Though manual sql injection is best but we may need to use tool for sql injection. When sql injection url don't show error message and we find it as a blind sql injection vulnerability then we use it. There are many tools in internet. One of the best tool for blind sql injection is BSQLBF expanded as Blind Sql Injection Brute Forcer. Supported Database: MS-SQL MySQL PostgreSQL Oracle It supports 8 kind of attacking: back-end server to true & error (e.g syntax error) >>> Blind SQL Injection Blind SQL Injection  “order by” & “group by” SYS privileges (ORACLE dbms_export_extension exploit ) >>> Find Data O.S code execution (ORACLE dbms_export_extension exploit) Read file (ORACLE dbms_export_extension exploit, java) O.S code execution DBMS_REPCAT_RPC.VALIDATE_REMOTE_RC exploit O.S code execution SYS.KUPP $PROC.CREATE_MASTER_PROCESS(), DBA Privs O.S code execution DBMS_JAVA_TEST.FUNCAL

How to Compress 1GB data to 10MB

Image
How to Compress 1GB data to 10MB In this post am gonna teach you " How to Compress 1GB data to 10MB ", it is a compression tool like winrar or alzip but the capacity of compression is much better than any other compression tool. It can compress your 1GB data to just 10MB. I was having trouble to compress my 2GB operating system in a CD which has capacity of 700MB, and then i Google it and found the tool and here you follow some steps to do the same!!!! Effectiveness : -   Using this method i compressed my Backtrack OS which is up to 1.9GB to 19MB. It will help you for sure!! What is it :  - It is a compression tool called  KGB Archiver .    It is an open source compression tool like  Alzip  and  winrar but the compression rate is much better then any other compression tool.  It uses AES-256 encryption to encrypt archives . The disappointing thing with KGB Archiver is  due to its high compression rate its minimum hardware requirements is high  (Reco

Cpanel Crack Tutorial step by step

Image
Cpanel Crack Tutorial step by step Things Required :- Shelled site Cpanel  Password Cracker  (shell) Step By Step Tutorial :- First open you shell & upload the cpanel password cracker shell . Download the Cpanel password cracker shell from  HERE . Then go down & click on User . Now after you have clicked on User, below you will get all the usernames of the Cpanel . So now move to next step, your next step will be to get a good Password list for a Dictionary attack . After getting it you have to copy the username & paste it in the username block (above) & paste the password list in the password block .Then finally click on start . Tip: Password list should be short & effective . After the  cracking  is finished, in the next page you will see the result .