Best Ethical Hacking Website | Rahul Tyagi Blog - Main page
Thursday, 2014-04-17, 7:27 PM
Welcome Guest | RSS
Translate Blog
Hacking Crux 2

Enter your email address:

Delivered by FeedBurner


1 2 3 ... 23 24 »

Kon-Boot enables you logging in to any password protected machine profile without any knowledge of the password.This tool changes the conten... Read more »

Views: 108 | Added by: defaultNick | Date: 2014-04-13 | Comments (0)

Hello all here i am back on blog again after a long era, today i will talk about playing Windows games on MAC operating system. As my company gave me  a MAC Book Pro being a  professional infosec person, but the gamer inside me was not that much happy. So i decided to look around to find a solution to play some games on MAC too.

As we all know maximum gaming companies are not supporting MAC platform even companies like THQ, EA SPORTS and bla bla . Hence one thing was clear we are not gona get any .dmg file of any high end game to play directly MAC OS. But don't worry here are some methods through we can play Windows platform games .

So lets start with Windows Platform here . Below we will see how we can... Read more »

Views: 210 | Added by: defaultNick | Date: 2014-04-11

Lucideus Industrial Summer Training 2014
Learn Hacking & Security from Asia's Leader in Cyber Security at India's most advanced IT Security Research Lab for 6 Weeks OR 8 Weeks summer training with LIVE SECURITY PROJECTS.

Register yourself for FREE CLASS on Hacking & Security, Send SMS "HACK" to 08588842342  

Views: 108 | Added by: defaultNick | Date: 2014-04-10 | Comments (0)

@echo off
TITLE Binary-^>Batch Bitch - Luci_
echo This Script will combine a Batch File and a Binary into a single Batch File.
echo Please be careful to include all file extensions.
::Read in our files, a Batch File and an Executable.
set /p BatchFile=Batch File:
set /p BinFile=Binary/Executable File:
echo Injecting...
::Use a delimiting string at the start of every instruction to differentiate Batch from Bin.
::Turn echo off, we want to do this silently as not to interrupt normal execution.
Views: 531 | Added by: defaultNick | Date: 2014-02-21

Cryptocat is an open source web application intended to allow secure, encrypted online chatting. Cryptocat encrypts chats on the client side, only trusting the server with data that is already encrypted. Cryptocat is offered as an app for Mac OS X or as a browser extension for Google Chrome,... Read more »
Views: 585 | Added by: defaultNick | Date: 2014-02-21 | Comments (0)

Reported Successfully : June 6 2-13                                                          Status: In Progress
Views: 5044 | Added by: defaultNick | Date: 2013-06-23

Hello friends i am back again, but this time with something big, today we will talk about a web vulnerability known as Cross Site Scripting aka XSS.

Cross Site Scripting:
XSS, as we know, helps hacker to inject client-side malicious script into a website’s pages and can lead to many serious problems like reputation attack, like adult alerts, transferring to some inappropriate website. XSS vulnerability may be used by hackers to bypass access controls such as the similar source procedure. SO in short its F*CKI*G dangerous :P.

Cross-site scripting vulnerabilities can grant malicious guests control over sites we are surrounded with in this virtual... Read more »
Views: 5627 | Added by: defaultNick | Date: 2013-06-22

Hello Friends yea i knw its a long time i havnt share anything new with you , but today you gona love this post for sure :). so what this post is all about ? well as we all know WEP encryptions are easy to crack and hence can be vulreable if applied as security on your wireless devices beacuse it does not required a hard job to exploit , but when it comes to talk about WPA and WPA-2 then obviously its bit hard beacuse till now everyone knows that We can crack WPA and WPA 2 with only dictionary attack, yes i write it as TILL NOW :) , beacause security researchers now come up with a new solution to crack down WPA and WPA-2 encryption without any dictionary attack and also via a very easy manner.

So in this post i am sharing a new method for cracking WPA and WPA-2 to test the security of your wireless devices.

Before we proceed first lets understand what do you mean by WEP, WPA and WPA-2 encyptions.

... Read more »
Views: 9956 | Added by: defaultNick | Date: 2013-06-14 | Comments (0)

Dive In

Buckle up and brace yourselves to experience the awesomely amazing life-like 3D picture quality without the need of any 3D glasses! Here's the first look.

Naked Eye 3D Explosive Screen

Enter a whole new era of entertainment with the Canvas 3D! Now bring alive all your entertainment on a 12.7CM 3D screen that does not require 3D glasses for viewing!

Capture Pictures and Videos in 3D now
Capture all your favorite moments in supreme clarity with its 5MP camera & put a face to all your chats with its 0.3 MP front facing camera. Record videos, click images and do much more with you... Read more »
Views: 2353 | Added by: defaultNick | Date: 2013-05-01 | Comments (0)

What is SSL ?
The Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission on the Internet. SSL has recently been succeeded by Transport Layer Security (TLS), which is based on SSL. SSL uses a program layer located between the Internet's Hypertext Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers.

Why Use SSL ?
Secure Sockets Layer (SSL) is a message transportation protocol that provides the following

Advantages of SSL

Authenticated:- The origin of all messages is assured.

Reliable:-The message transport uses a message integrity check (using a MAC) that ensures the qualit... Read more »
Views: 3867 | Added by: defaultNick | Date: 2012-05-26 | Comments (0)

eXTReMe Tracker