Wish you a very Happy New Year 2012 Thanks for all your support and reading. Good luck to all. -S...

The 101 Most Useful Websites - Interesting - free :)

The sites mentioned here, well most of them, solve at least one problem really well and they all have simple web addresses (URLs) that you can easily learn by heart thus saving you a trip to Google. 01. screenr.com – record movies of your desktop and send them straight to YouTube. 02. bounceapp.com – for capturing full length screenshots...

Open Source for Windows! - Huge List

Credit:- http://osswin.sourceforge.net/Audio editing toolsCDex [GNU GPL] Ogg Vorbis Musepack [GNU LGPL, BSD] Audacity [GNU GPL] CD-DA X-Tractor [GNU GPL] LAME [GNU LGPL]: Official site AudioCoding Mp3splt [GNU G...

ClubHack’11 PreCon CTF – A WalkThru --- PPT ( Winner's Presentation)

How i-won-club hack-precon-ctf-v2 View more presentations from n|u - The Open Security Communi...

Advanced IP Scanner 2.2: beta-testing now open

Advanced IP Scanner 2.2 is the beta version of a free, fast and easy-to-use network scanner for Windows. In a matter of seconds, this utility finds all the computers on any network and provides easy access to their various resources, whether HTTP, HTTPS, FTP or shared folders. Among the latest improvements made to Advanced IP Scanner...

Top ten free Anonymous surfing sites

The anonymous surfing sites are the sites from which you can view any sites anonymously and also view blocked websites .Also you can hide your ip-address by using these sites.You can now browse any websites which are blocked in specific country,school,office etc. by entering your blocked site in these free anonymous surfing sites.These sites uses proxies which hide your ip-address .So...

Exploit writing tutorial

The is the summary of the Corelan's Exploit writing tutorial offical site. Part 1 : Stack Based Overflows Part 2 : Stack Based Overflows - jumping to shellcode Part 3 : SEH Based Exploits Part 3b : SEH Based Exploits - just another example Part 4 : From Exploit to Metasploit - The basic Part 5 : How debugger modules & plugins...

Google Images :- Search by Image

Now Question ,how is it useful ? you can use this search for social engineering along with person pics. you can find fake profile of any social networking site.    want to try ? interesting one would be... upload your own pic and see where else it has been used ;) Saba...

Good Network Scanner - Freeware -- Windows

Key featuresPings computers and displays those alive. Detects hardware MAC-addresses, even across routers. Detects hidden shared folders and writable ones. Detects your internal and external IP address...

XSSer Penetration Testing Tool 1.6-1 -----Open Source

XSSer is an open source penetration testing tool that automates the process of detecting and exploiting XSS injections against different applications. It contains several options to try to bypass certain filters, and various special techniques of code injection. Download Related video :- S...

Vega Web Security Scanner 1.0 Beta Windows / Linux

Vega is a GUI-based, multi-platform, free and open source web security scanner that can be used to find instances of SQL injection, cross-site scripting (XSS), and other vulnerabilities in your web applications. Vega also includes an intercepting proxy for interactive web application debugging. Vega attack modules are written in Javascript,...

National Level Ethical Hacking Contest - 2012 - Sign up now...

What you need to do? 1. Form a team (max five members from your college) 2. Approach a faculty/mentor and request him/her to mentor your team 3. Register online at http://inctf.in In addition it’s been decided that teams which finished in the top 10 places on InCTF 2011 qualify directly for the second round-they do not have to...

Unable to delete the file? here is the trick..

Unable to delete the file? Here the trick how you can delete these kind of files.Here are step...

SEND SELF-DESTRUCTING EMAILS... Interesting one.

What is KickNotes?KickNotes is a completely free service used to send and receive self-destructing online messages. http://www.kicknotes.com/aboutkn.htm Use KickNotes to send: Sensitive Messages Personal Contact Info Announcements Invitations Temporary Advertising "Work Unsafe" Links or Images Use KickNotes on: Work Computers ...

Sql injection Using Havij - Video

Credit: Source :- http://secxplrd.blogspot.com/2011/11/sql-injection-using-havij.html...

You like a Blog ... Convert it into E- book --- Free.

 Website Name :-Book Smith  Supports :- Blogger and wordpresss   Use  Gmail login  to get full content of blogs, you may also continue with parital content, Why should i use this conversion   ? 1) you may like the blog and you dont have time to read the complete articles at the same time frame 2) This...

The SAMHAIN file integrity / host-based intrusion detection system

The Samhain host-based intrusion detection system (HIDS) provides file integrity checking and log file monitoring/analysis, as well as rootkit detection, port monitoring, detection of rogue SUID executables, and hidden processes. Samhain been designed to monitor multiple hosts with potentially different operating...

PHP Vulnerability Hunter v.1.1.4.6 - Automated fuzz testing tool

PHP Vulnerability Hunter is an advanced automated whitebox fuzz testing tool.    This is the application that detected almost all of the web application vulnerabilities listed on the advisories page. PHP Vulnerability Hunter is an advanced automated whitebox fuzz testing tool capable of triggering a wide range of exploitable...

Ncrack – High Speed Network Authentication Cracking Tool

IntroductionNcrack is a high-speed network authentication cracking tool. It was built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords. Security professionals also rely on Ncrack when auditing their clients. Ncrack was designed using a modular approach, a command-line syntax similar to Nmap and a dynamic engine that...

Are you a Hacker/Cracker -Test your Hacking skills - Live

Below are the websites where you can learn and hack like hackers. 1) http://hackforums.net/ -Hacking and Market place 2) http://evilzone.org/ -Hacking and Warez 3) http://hackaday.com/ 4) http://www.hitb.org/ 5)http://www.hackthissite.org/ - Best site :) Source Cre...

Step wise :-phUploader Remote File Upload Vulnerability

This is purely for educational purpose Step:1 www.google.com  Step:2 intitle:Powered By phUploader  ( paste this and search for Vulnerable site) Step:3 vulnerable site will have path ending with upload.php Ex:-http://sitename/ path/upload.php Ex:- http://sitename/upload.php&nb...

Uniscan 5.2 : Information Security vulnerability Scanner

The Uniscan vulnerability scanner is aimed at information security, which aims at finding vulnerabilities in Web systems. The Uniscan was developed using the Perl programming language to be easier to work with text, has an easy to use regular expressions and is also multi-thread...

nmapsi4 0.3 beta1 released.

NmapSI4 NmapSi4 is a complete Qt4-based Gui with the design goals to provide a complete nmap interface for Users, in order to menage all option of this power security net scanner and search services vulnerability. Traceroute support with nmap. Lookup support with internal tool or dig. Vulnerabilities search support (new...

Facebook spam attack results in graphic images for some users

Facebook said a deliberate spam attack was behind a flood of graphic images that some users had reported seeing in their news feeds. The issue, which first surfaced last week, had largely been resolved by late Tuesday, said Frederic Wolens, a spokesman at the company. Mr. Wolens said the attack lured users into copying and pasting a Web address into their browser with the promise of...

Two Lakh FB accounts from Bangalore Hacked - 15th nov 2011

Normal 0 false false false EN-IN X-NONE X-NONE ...

Basic requirements to be an Ethical Hacker.

< To Learn Ethical hacking ... Aspirant should have a long term goal ,discipline and more importantly Ethical. The Aim and objective of  Ethical hacking is for defense not offense > Ethical hackers need hands-on security skills. Although you do not have to be an expert in everything, you should have an area of expertise. Security tests are typically performed by teams of...

Types of Hackers

Types of hackersHackers are divided into three categories :1)    white hat hackers   2)    black hat hackers  3)    gray hat hackers White hat hackers : They are generally security professionals white hat hackers in computer slang’s refers to an ethical hacker, a penetration...

What is Ethical Hacking and why is it ?

I know Ethical Hacking( ET) is much of applied training then reading the definitions, But what to do friends, when we decided to start from A- Z , we have to cover this topic as well. You can disregard this topic if you are aware of it. This article is targeted to newbies ONLY.   What is Ethical Hacking and why is it ?...

Content and Index of the e-Learning - Ethical Hacking.

Chapter 1 Introduction         1. What is Ethical Hacking and why is it ? ( Click the link for reading) Types of Hackers Basic requirements to be an Ethical Hacker. Basic Network TCP/IP IP Address  SSH and Putty  I will start posting topic by topic ASAP. Thank you reading Saba...

Hacking Basics.

Hi All, After i started this blog , many of FB/gtalk users started posting/email to me strange requests. I am writing down few of note worthy/foolish questions here. 1) I want hack FB account 2) I am new to Security domain( user used hacking instead of security domain) and want to learn HACKI...

How to create Number trick on facebook

1) click on the your profile . 2) copy the Number in url ( only number) 3) replace xxxxx with url id number @[xxxxxxxxxxx:0] How to create a quotation with number trick? 1) create a page under you FB page . 2) Add title to page with the your Fav quote (ex:- Do before ask, learn before you do - Saba) 3)Now you can see the Url of page will...

Tor Browser Bundle -browse Anonymously

  Tor Browser BundleThe Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit f...

HOWTO : Blind SQL Injection _ Videos

Credit to : KFProdigy This is KFProdigy's work but not mine. I re-post it for educational purpose only....

SQL Injection: What is it?

SQL Injection SQL Injection: What is it?SQL Injection is one of the many web attack mechanisms used by hackers to steal data from organizations. It is perhaps one of the most common application layer attack techniques used today. It is the type of attack that takes advantage of improper coding of your web applications that allows hacker to inject SQL commands into say a login form...

Wireshark v1.7.0 Released

Wireshark is the world's foremost network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. It is the de facto (and often de jure) standard across many industries and educational institutions. Source Downl...

SQL Injection -Basics

I found this article @ Source I thought this is MUST read article for aspirants who are looking for Sql Injection basics   Credit goes to author :-Source  < Disclaimer:-  This tutorial is purely for educational purpose> What is SQL Injection? Spoiler is a code injection technique that exploits a security vulnerability occurring in the database layer of...

John the Ripper -a fast password cracker

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version. John...

Useful - Hack tools

http://www.beenuarora.com/work.html I did not tried them yet ;) S...

Facebook Number trick Half-Explained

Interesting post going on Face book these days To Paste  @[134282353283788:0] on status or comment and you will get ‎Life is too short smile while you still have teeth  This number(134282353283788) indicates the page unique number ( click on the above link  ) and this will pick up title of page. you can also create you...