Wish you a very Happy New Year 2012
Thanks for all your support and reading. Good luck to all.
-S...
The 101 Most Useful Websites - Interesting - free :)

The sites mentioned here, well most of them, solve at least one problem really well and they all have simple web addresses (URLs) that you can easily learn by heart thus saving you a trip to Google.
01. screenr.com – record movies of your desktop and send them straight to YouTube.
02. bounceapp.com – for capturing full length screenshots...
Posted on Saturday, December 31, 2011
Open Source for Windows! - Huge List

Credit:- http://osswin.sourceforge.net/Audio editing toolsCDex [GNU GPL]
Ogg Vorbis
Musepack [GNU LGPL, BSD]
Audacity [GNU GPL]
CD-DA X-Tractor [GNU GPL]
LAME [GNU LGPL]: Official site
AudioCoding
Mp3splt [GNU G...
Posted on Monday, December 26, 2011
ClubHack’11 PreCon CTF – A WalkThru --- PPT ( Winner's Presentation)
How i-won-club hack-precon-ctf-v2
View more presentations from n|u - The Open Security Communi...
Posted on Wednesday, December 21, 2011
Advanced IP Scanner 2.2: beta-testing now open

Advanced IP Scanner 2.2 is the beta version of a free, fast and easy-to-use network scanner for Windows. In a matter of seconds, this utility finds all the computers on any network and provides easy access to their various resources, whether HTTP, HTTPS, FTP or shared folders. Among the latest improvements made to Advanced IP Scanner...
Posted on Monday, December 19, 2011
Top ten free Anonymous surfing sites
The anonymous surfing sites are the sites from which you can view any sites anonymously and also view blocked websites .Also you can hide your ip-address by using these sites.You can now browse any websites which are blocked in specific country,school,office etc. by entering your blocked site in these free anonymous surfing sites.These sites uses proxies which hide your ip-address .So...
Posted on Friday, December 16, 2011
Exploit writing tutorial

The is the summary of the Corelan's Exploit writing tutorial offical site.
Part 1 : Stack Based Overflows
Part 2 : Stack Based Overflows - jumping to shellcode
Part 3 : SEH Based Exploits
Part 3b : SEH Based Exploits - just another example
Part 4 : From Exploit to Metasploit - The basic
Part 5 : How debugger modules & plugins...
Posted on Tuesday, December 13, 2011
Google Images :- Search by Image
Now Question ,how is it useful ?
you can use this search for social engineering along with person pics.
you can find fake profile of any social networking site.
want to try ? interesting one would be... upload your own pic and see where else it has been used ;)
Saba...
Posted on Monday, December 12, 2011
Good Network Scanner - Freeware -- Windows

Key featuresPings computers and displays those alive.
Detects hardware MAC-addresses, even across routers.
Detects hidden shared folders and writable ones.
Detects your internal and external IP address...
Posted on Monday, December 05, 2011
XSSer Penetration Testing Tool 1.6-1 -----Open Source

XSSer is an open source penetration testing tool that automates the process of detecting and exploiting XSS injections against different applications. It contains several options to try to bypass certain filters, and various special techniques of code injection.
Download
Related video :-
S...
Posted on Thursday, December 01, 2011
Vega Web Security Scanner 1.0 Beta Windows / Linux

Vega is a GUI-based, multi-platform, free and open source web security scanner that can be used to find instances of SQL injection, cross-site scripting (XSS), and other vulnerabilities in your web applications. Vega also includes an intercepting proxy for interactive web application debugging. Vega attack modules are written in Javascript,...
Posted on Wednesday, November 30, 2011
National Level Ethical Hacking Contest - 2012 - Sign up now...

What you need to do?
1. Form a team (max five members from your college)
2. Approach a faculty/mentor and request him/her to mentor your team
3. Register online at http://inctf.in
In addition it’s been decided that teams which finished in the top 10 places on InCTF 2011 qualify directly for the second round-they do not have to...
Posted on Tuesday, November 29, 2011
Unable to delete the file? here is the trick..

Unable to delete the file?
Here the trick how you can delete these kind of files.Here are step...
Posted on Sunday, November 27, 2011
SEND SELF-DESTRUCTING EMAILS... Interesting one.

What is KickNotes?KickNotes is a completely free service used to send and receive self-destructing online messages.
http://www.kicknotes.com/aboutkn.htm
Use KickNotes to send: Sensitive Messages
Personal Contact Info
Announcements
Invitations
Temporary Advertising
"Work Unsafe" Links or Images
Use KickNotes on: Work Computers
...
Posted on Saturday, November 26, 2011
Sql injection Using Havij - Video

Credit:
Source :- http://secxplrd.blogspot.com/2011/11/sql-injection-using-havij.html...
Posted on Saturday, November 26, 2011
You like a Blog ... Convert it into E- book --- Free.

Website Name :-Book Smith
Supports :- Blogger and wordpresss
Use Gmail login to get full content of blogs, you may also continue with parital content,
Why should i use this conversion ?
1) you may like the blog and you dont have time to read the complete articles at the same time frame
2) This...
Posted on Wednesday, November 23, 2011
The SAMHAIN file integrity / host-based intrusion detection system

The Samhain host-based intrusion detection system (HIDS) provides file integrity checking and log file monitoring/analysis, as well as rootkit detection, port monitoring, detection of rogue SUID executables, and hidden processes.
Samhain been designed to monitor multiple hosts with potentially different operating...
Posted on Monday, November 21, 2011
PHP Vulnerability Hunter v.1.1.4.6 - Automated fuzz testing tool

PHP Vulnerability Hunter is an advanced automated whitebox fuzz testing tool.
This is the application that detected almost all of the web application vulnerabilities listed on the advisories page. PHP Vulnerability Hunter is an advanced automated whitebox fuzz testing tool capable of triggering a wide range of exploitable...
Posted on Monday, November 21, 2011
Ncrack – High Speed Network Authentication Cracking Tool
IntroductionNcrack is a high-speed network authentication cracking tool. It was built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords. Security professionals also rely on Ncrack when auditing their clients. Ncrack was designed using a modular approach, a command-line syntax similar to Nmap and a dynamic engine that...
Posted on Sunday, November 20, 2011
Are you a Hacker/Cracker -Test your Hacking skills - Live

Below are the websites where you can learn and hack like hackers.
1) http://hackforums.net/ -Hacking and Market place
2) http://evilzone.org/ -Hacking and Warez
3) http://hackaday.com/
4) http://www.hitb.org/
5)http://www.hackthissite.org/ - Best site :)
Source
Cre...
Posted on Sunday, November 20, 2011
Step wise :-phUploader Remote File Upload Vulnerability

This is purely for educational purpose
Step:1
www.google.com
Step:2
intitle:Powered By phUploader ( paste this and search for Vulnerable site)
Step:3
vulnerable site will have path ending with upload.php
Ex:-http://sitename/ path/upload.php
Ex:- http://sitename/upload.php&nb...
Posted on Thursday, November 17, 2011
Uniscan 5.2 : Information Security vulnerability Scanner

The Uniscan vulnerability scanner is aimed at information security, which aims at finding vulnerabilities in Web systems. The Uniscan was developed using the Perl programming language to be easier to work with text, has an easy to use regular expressions and is also multi-thread...
Posted on Wednesday, November 16, 2011
nmapsi4 0.3 beta1 released.

NmapSI4 NmapSi4 is a complete Qt4-based Gui with the design goals to provide a complete nmap interface for Users, in order to menage all option of this power security net scanner and search services vulnerability.
Traceroute support with nmap.
Lookup support with internal tool or dig.
Vulnerabilities search support (new...
Posted on Wednesday, November 16, 2011
Facebook spam attack results in graphic images for some users
Facebook said a deliberate spam attack was behind a flood of graphic images that some users had reported seeing in their news feeds.
The issue, which first surfaced last week, had largely been resolved by late Tuesday, said Frederic Wolens, a spokesman at the company. Mr. Wolens said the attack lured users into copying and pasting a Web address into their browser with the promise of...
Posted on Wednesday, November 16, 2011
Two Lakh FB accounts from Bangalore Hacked - 15th nov 2011
Normal 0 false false false EN-IN X-NONE X-NONE ...
Posted on Wednesday, November 16, 2011
Basic requirements to be an Ethical Hacker.
< To Learn Ethical hacking ... Aspirant should have a long term goal ,discipline and more importantly Ethical. The Aim and objective of Ethical hacking is for defense not offense >
Ethical hackers need hands-on security skills. Although you do not have to be an expert in everything, you should have an area of expertise. Security tests are typically performed by teams of...
Posted on Wednesday, November 16, 2011
Types of Hackers
Types of hackersHackers are divided into three categories :1) white hat hackers 2) black hat hackers 3) gray hat hackers
White hat hackers :
They are generally security professionals white hat hackers in computer slang’s refers to an ethical hacker, a penetration...
Posted on Wednesday, November 16, 2011
What is Ethical Hacking and why is it ?
I know Ethical Hacking( ET) is much of applied training then reading the definitions, But what to do friends, when we decided to start from A- Z , we have to cover this topic as well.
You can disregard this topic if you are aware of it. This article is targeted to newbies ONLY.
What is Ethical Hacking and why is it ?...
Posted on Wednesday, November 16, 2011
Content and Index of the e-Learning - Ethical Hacking.
Chapter 1
Introduction
1. What is Ethical Hacking and why is it ? ( Click the link for reading)
Types of Hackers
Basic requirements to be an Ethical Hacker.
Basic Network
TCP/IP
IP Address
SSH and Putty
I will start posting topic by topic ASAP.
Thank you reading
Saba...
Posted on Wednesday, November 16, 2011
Hacking Basics.
Hi All,
After i started this blog , many of FB/gtalk users started posting/email to me strange requests.
I am writing down few of note worthy/foolish questions here.
1) I want hack FB account
2) I am new to Security domain( user used hacking instead of security domain) and want to learn HACKI...
Posted on Tuesday, November 15, 2011
How to create Number trick on facebook

1) click on the your profile .
2) copy the Number in url ( only number)
3) replace xxxxx with url id number @[xxxxxxxxxxx:0]
How to create a quotation with number trick?
1) create a page under you FB page .
2) Add title to page with the your Fav quote (ex:- Do before ask, learn before you do - Saba)
3)Now you can see the Url of page will...
Posted on Monday, November 14, 2011
Tor Browser Bundle -browse Anonymously
Tor Browser BundleThe Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit f...
Posted on Sunday, November 13, 2011
HOWTO : Blind SQL Injection _ Videos
Credit to : KFProdigy
This is KFProdigy's work but not mine. I re-post it for educational purpose only....
Posted on Saturday, November 12, 2011
SQL Injection: What is it?
SQL Injection SQL Injection: What is it?SQL Injection is one of the many web attack mechanisms used by hackers to steal data from organizations. It is perhaps one of the most common application layer attack techniques used today. It is the type of attack that takes advantage of improper coding of your web applications that allows hacker to inject SQL commands into say a login form...
Posted on Friday, November 11, 2011
Wireshark v1.7.0 Released
Wireshark is the world's foremost network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. It is the de facto (and often de jure) standard across many industries and educational institutions.
Source
Downl...
Posted on Friday, November 11, 2011
SQL Injection -Basics
I found this article @ Source I thought this is MUST read article for aspirants who are looking for Sql Injection basics Credit goes to author :-Source
< Disclaimer:- This tutorial is purely for educational purpose>
What is SQL Injection?
Spoiler is a code injection technique that exploits a security vulnerability occurring in the database layer of...
Posted on Friday, November 11, 2011
John the Ripper -a fast password cracker
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version.
John...
Posted on Friday, November 11, 2011
Useful - Hack tools

http://www.beenuarora.com/work.html
I did not tried them yet ;)
S...
Posted on Thursday, November 10, 2011
Facebook Number trick Half-Explained

Interesting post going on Face book these days
To Paste @[134282353283788:0] on status or comment and you will get Life is too short smile while you still have teeth This number(134282353283788) indicates the page unique number ( click on the above link ) and this will pick up title of page. you can also create you...
Posted on Thursday, November 10, 2011
Subscribe to:
Posts (Atom)