Posts

Hide URL for phishing

Phishing : Hide URL [Tutorial] "How to hide a url | Chnage URL | Mask url" .While sending mail,  you have to include in mail, the link to your phisher page. So, instead of sending mail with actual url which can create a sense of doubt in victim's mind, we can hide the url. Dot.tk is an online service which enables you to hide/mask the url. So, whenever victim checks out this link, he will find the link suspicious. This can be detrimental for our hack. So, the best way is to make this link less suspicious i.e. to hide/mask the url. 1. So, go to  http://www.dot.tk/en/index.html?lang=en  to hide a url. 2. Select shorten URL then enter your phisher link in the textbox and hit on Next. 3. Enter the link you want to rename your phisher link to dot.tk domain name. 4. Now, you can send this masked phisher link to your victim. The victim will now find our phisher link less suspicious as we have hidden the actual phisher link using .tk domain. So friends, I hope you are ...

How To Remotely Access Another Computer

How To Remotely Access Another Computer #1  Method: Remote Computer Access Using Google Chrome First Download the extension  Chrome Remote Access  in your  Google Chrome . Now this app will get added to your chrome and you can see it at rightmost top corner. Click on it and click  continue . Now it will ask to  allow access to data ,proceed with allowing access to it. Now it will ask ou to c onnect to another computer  or  share your computer . Now if you click on share this computer then it will generate a code. Send the code to the partner by whom you want to accessed your computer. Note that other computer must have same app installed on its computer. Now your partner will enter he code and your desktop will get share to him exactly same as you can see yours. By this anyone having access code can  access your computer remotely  and even you can access someone’s else computer by having access code of it. ...

Botnet

Image
Botnet A botnet or robot network is a group of computers running a computer application controlled and manipulated only by the owner or the software source. The botnet may refer to a legitimate network of several computers that share program processing amongst them. Usually though, when people talk about botnets, they are talking about a group of computers infected with the malicious kind of robot software, the bots, which present a security threat to the computer owner. Once the robot software (also known as malicious software or malware) has been successfully installed in a computer, this computer becomes a zombie or a drone, unable to resist the commands of the bot commander. A botnet may be small or large depending on the complexity and sophistication of the bots used. A large botnet may be composed of ten thousand individual zombies. A small botnet, on the other hand may be composed of only a thousand drones. Usually, the owners of the zombie computers do not know that ...

Website Security

Image
The internet is not 100% safe your website can be hacked at any time but there are some pretty easy ways to bypass some vulnerabilities by applying some codes to your website we would run through a few methods to secure your website from SQL injection, Cross site scripting, and file inclusion lets go do some codings 😊 A: SQL Injection -->Types                     Login Form Bypassing   UNION SQL Injection B: Cross Site Scripting       --> Cross Site Request Forgery C: File Inclusion      Types-> Remote File Inclusion and Remote Code Execution     On this post i am telling about five types of common web attacks, which are used in  most types of defacements or dumps of databases. The five exploits listed above are SQL injection, XSS, RCE, RFI, and LFI. Most of the  time, we missed out some website code tags..  coz of this we get website atta...

Paypal Javascript Exploit

Image
Paypal Javascript Exploit Here is a simple JavaScript exploit through which you can hack Paypal & download products for free without spending single penny . More then 500 sites are Vulnerable !! . Step by Step Guide : Go to the vulnerable site & paste the below JavaScript given below in the browser & hit enter ! . javascript:top.location=document.getElementsByName('return')[0].value; javascript:void(0); So after you have hit enter, just sit back & enjoy the free product .  Live Demo :~# Vulnerable Site  -  http://www.orderproductsdirect.com/Instantdownload.htm So after you paste the JavaScript in the URL then the product will be automatically downloaded :) More Vulnerable sites link  -  http://pastebin.com/nLuSZb9J   (some sites are patched)

Hack The CCTV camera’s

Image
Hack The CCTV  To hack the CCTV camera’s you must know about the some of the important terms used in CCTV camera hacking. The basic thing is, you must have an Android smartphone to do this task. below are the important things you have to know first about these things. Must Know These CCTV Camera Terms DVR ( Digital Video recorder). IP Address. Type of cameras (IP & Lan Camera’s.) Modem. Basic computer knowledge. Techniques you can use to hack CCTV from Android There are so many methods by which you can g ain access to the CCTV cameras . But Here I am listing only the most used and trusted ways to hack CCTV.  Note that here is a limitation of devices cause we have only a single smartphone to hack the cameras. the process will take some time as you know that you have only a single Android device to hack Cameras. So. may take a long time but it surely works for you. It becomes easy if you are on that network or same wifi. You can easily hack the CCTV came...

Hackers Types

Image
Hackers Types Hackers are three types:-   1.    White hat hacker 2.    Gray hat hacker  3.    Black hat hacker White Hat and Grey Hat Hacker & What is the Real Difference?   What is worse, the public is not able to understand terms like grey hat, white hat, Linux OS, or cracker. However, the truth is that the subculture of the hacker world is more complex than we think. Especially if we consider that, these are very intelligent people. So, what is ethical hacking white hat and how does it differentiate from grey hackers? The only way to find out is to submerge ourselves in the world of hackers and understand, at least, the most basic concepts.     What Is A White Hat Hacker?   A hacker can be a wiz kid who spends too much time with computers and suddenly finds himself submerged in the world of  cyber-security or criminal conspirators. On the other hand, he can be a ...