Latest News

Durpal IMCE Mkdir remote deface upload exploitDurpal IMCE Mkdir remote deface upload exploit

Google Dork : inurl:"/imce?dir=" intitle:"File Browser" exploit :          http://website.com/imce?dir= Shell Access : http://website.com/files/yourfilehere                       http://www.website.com/abc/files/abc/yourfilehere IMCE Mkdir is a remote file upload vulnerablity on durpal platform,nor…

Read more »
19Apr2013

Tinymce PHP file Manager, Remote File upload vulnrablityTinymce PHP file Manager, Remote File upload vulnrablity

Title :Tinymce PHP file Manager, Remote File upload vulnrablityserver : LinuxAuthor: NoentryPHCType : webapp Exploit Hamr : remote shell upload Dork : inurl:/file_manager.php?type=img Goto google.com and type dork inurl:/file_manager.php?type=img & inurl:/file_manager.php?type=file to Find vulnrabl…

Read more »
19Apr2013

Remote System Hacking - By USBRemote System Hacking - By USB

 Hack PC by Using A USB. Today we are going to do a remote hacking using a malicious file created in Backtrack,All then you will have to do is Plug in the USB,wait for 5 seconds,and plug it out,Then you will have control over the victim PC.This trick created a Mass Panic in Pentagon as it hacked…

Read more »
14Apr2013

Hacking WiFi Passwords Easily (Complete Tutorial) Hacking WiFi Passwords Easily (Complete Tutorial)

 Hacking WiFi Passwords Using Backtrack 5 : Using Backtrack 5 (preferably r3) you can hack someone else WiFi passwords easily,and use Internet for free.We will use 2 Kinds of software's today,For WEP passwords : AIRODUMP and for WPA passwords : REAVER. Sure you can use Reaver for WEP passwords b…

Read more »
14Apr2013

Obtaining Passwords Of Gmail,Facebook Hack Working !!Obtaining Passwords Of Gmail,Facebook Hack Working !!

 Use SET and Obtain The Username And Passwords Of Victim. Hey,Today we are going to make an social harvesting attack,which will steal all the usernames and passwords of Victims Facebook,Gmail,Twitter,etc.We will use SET today.The Social Engineering Toolkit (SET) included with Backtrack 5 is a great…

Read more »
14Apr2013

Hacking Mobile Number (Spoof Identity)Hacking Mobile Number (Spoof Identity)

 Duplicate/Create And Send SMS By It : Welcome,This is my First post about mobile hacking,In this post,We are going to create any mobile number (police,fire department,ex-girlfriends,etc) and send messages,Sure this method has only 75% success rate,but it works like a charm for the most time.In sp…

Read more »
14Apr2013

The Best Mobile Of 2013 The Best Mobile Of 2013

HTC One vs Samsung Galaxy S4 vs IPhone 5 : The iPhone 5 adds everything we wanted in the iPhone 4S: 4G LTE, a longer, larger screen, free turn-by-turn navigation, and a faster A6 processor. Plus, its top-to-bottom redesign is sharp, slim, and feather-light. On the other Hand, HTC ONE presenting…

Read more »
14Apr2013

How to Hack a Server [Shell Uploading, Rooting, Defacing, Covering your Tracks]How to Hack a Server [Shell Uploading, Rooting, Defacing, Covering your Tracks]

Web-Hacking is a huge topic that I could easily discuss for hours. When I had the idea to expand our Blog’s topics (not only Apple, iPhone, iPad, little tips on Mac and Windows etc….) and add more hacking information, tutorials etc…. So, today I decided to make a good start by creating this post-tu…

Read more »
07Apr2013
123 ... 21»
 
Top
Blogger Template