Vega Web Security Scanner 1.0 Beta Windows / Linux

Vega is a GUI-based, multi-platform, free and open source web security scanner that can be used to find instances of SQL injection, cross-site scripting (XSS), and other vulnerabilities in your web applications. Vega also includes an intercepting proxy for interactive web application debugging. Vega attack modules are written in Javascript,...

National Level Ethical Hacking Contest - 2012 - Sign up now...

What you need to do? 1. Form a team (max five members from your college) 2. Approach a faculty/mentor and request him/her to mentor your team 3. Register online at http://inctf.in In addition it’s been decided that teams which finished in the top 10 places on InCTF 2011 qualify directly for the second round-they do not have to...

Unable to delete the file? here is the trick..

Unable to delete the file? Here the trick how you can delete these kind of files.Here are step...

SEND SELF-DESTRUCTING EMAILS... Interesting one.

What is KickNotes?KickNotes is a completely free service used to send and receive self-destructing online messages. http://www.kicknotes.com/aboutkn.htm Use KickNotes to send: Sensitive Messages Personal Contact Info Announcements Invitations Temporary Advertising "Work Unsafe" Links or Images Use KickNotes on: Work Computers ...

Sql injection Using Havij - Video

Credit: Source :- http://secxplrd.blogspot.com/2011/11/sql-injection-using-havij.html...

You like a Blog ... Convert it into E- book --- Free.

 Website Name :-Book Smith  Supports :- Blogger and wordpresss   Use  Gmail login  to get full content of blogs, you may also continue with parital content, Why should i use this conversion   ? 1) you may like the blog and you dont have time to read the complete articles at the same time frame 2) This...

The SAMHAIN file integrity / host-based intrusion detection system

The Samhain host-based intrusion detection system (HIDS) provides file integrity checking and log file monitoring/analysis, as well as rootkit detection, port monitoring, detection of rogue SUID executables, and hidden processes. Samhain been designed to monitor multiple hosts with potentially different operating...

PHP Vulnerability Hunter v.1.1.4.6 - Automated fuzz testing tool

PHP Vulnerability Hunter is an advanced automated whitebox fuzz testing tool.    This is the application that detected almost all of the web application vulnerabilities listed on the advisories page. PHP Vulnerability Hunter is an advanced automated whitebox fuzz testing tool capable of triggering a wide range of exploitable...

Ncrack – High Speed Network Authentication Cracking Tool

IntroductionNcrack is a high-speed network authentication cracking tool. It was built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords. Security professionals also rely on Ncrack when auditing their clients. Ncrack was designed using a modular approach, a command-line syntax similar to Nmap and a dynamic engine that...

Are you a Hacker/Cracker -Test your Hacking skills - Live

Below are the websites where you can learn and hack like hackers. 1) http://hackforums.net/ -Hacking and Market place 2) http://evilzone.org/ -Hacking and Warez 3) http://hackaday.com/ 4) http://www.hitb.org/ 5)http://www.hackthissite.org/ - Best site :) Source Cre...

Step wise :-phUploader Remote File Upload Vulnerability

This is purely for educational purpose Step:1 www.google.com  Step:2 intitle:Powered By phUploader  ( paste this and search for Vulnerable site) Step:3 vulnerable site will have path ending with upload.php Ex:-http://sitename/ path/upload.php Ex:- http://sitename/upload.php&nb...

Uniscan 5.2 : Information Security vulnerability Scanner

The Uniscan vulnerability scanner is aimed at information security, which aims at finding vulnerabilities in Web systems. The Uniscan was developed using the Perl programming language to be easier to work with text, has an easy to use regular expressions and is also multi-thread...

nmapsi4 0.3 beta1 released.

NmapSI4 NmapSi4 is a complete Qt4-based Gui with the design goals to provide a complete nmap interface for Users, in order to menage all option of this power security net scanner and search services vulnerability. Traceroute support with nmap. Lookup support with internal tool or dig. Vulnerabilities search support (new...

Facebook spam attack results in graphic images for some users

Facebook said a deliberate spam attack was behind a flood of graphic images that some users had reported seeing in their news feeds. The issue, which first surfaced last week, had largely been resolved by late Tuesday, said Frederic Wolens, a spokesman at the company. Mr. Wolens said the attack lured users into copying and pasting a Web address into their browser with the promise of...

Two Lakh FB accounts from Bangalore Hacked - 15th nov 2011

Normal 0 false false false EN-IN X-NONE X-NONE ...

Basic requirements to be an Ethical Hacker.

< To Learn Ethical hacking ... Aspirant should have a long term goal ,discipline and more importantly Ethical. The Aim and objective of  Ethical hacking is for defense not offense > Ethical hackers need hands-on security skills. Although you do not have to be an expert in everything, you should have an area of expertise. Security tests are typically performed by teams of...

Types of Hackers

Types of hackersHackers are divided into three categories :1)    white hat hackers   2)    black hat hackers  3)    gray hat hackers White hat hackers : They are generally security professionals white hat hackers in computer slang’s refers to an ethical hacker, a penetration...

What is Ethical Hacking and why is it ?

I know Ethical Hacking( ET) is much of applied training then reading the definitions, But what to do friends, when we decided to start from A- Z , we have to cover this topic as well. You can disregard this topic if you are aware of it. This article is targeted to newbies ONLY.   What is Ethical Hacking and why is it ?...

Content and Index of the e-Learning - Ethical Hacking.

Chapter 1 Introduction         1. What is Ethical Hacking and why is it ? ( Click the link for reading) Types of Hackers Basic requirements to be an Ethical Hacker. Basic Network TCP/IP IP Address  SSH and Putty  I will start posting topic by topic ASAP. Thank you reading Saba...

Hacking Basics.

Hi All, After i started this blog , many of FB/gtalk users started posting/email to me strange requests. I am writing down few of note worthy/foolish questions here. 1) I want hack FB account 2) I am new to Security domain( user used hacking instead of security domain) and want to learn HACKI...

How to create Number trick on facebook

1) click on the your profile . 2) copy the Number in url ( only number) 3) replace xxxxx with url id number @[xxxxxxxxxxx:0] How to create a quotation with number trick? 1) create a page under you FB page . 2) Add title to page with the your Fav quote (ex:- Do before ask, learn before you do - Saba) 3)Now you can see the Url of page will...

Tor Browser Bundle -browse Anonymously

  Tor Browser BundleThe Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit f...

HOWTO : Blind SQL Injection _ Videos

Credit to : KFProdigy This is KFProdigy's work but not mine. I re-post it for educational purpose only....

SQL Injection: What is it?

SQL Injection SQL Injection: What is it?SQL Injection is one of the many web attack mechanisms used by hackers to steal data from organizations. It is perhaps one of the most common application layer attack techniques used today. It is the type of attack that takes advantage of improper coding of your web applications that allows hacker to inject SQL commands into say a login form...

Wireshark v1.7.0 Released

Wireshark is the world's foremost network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. It is the de facto (and often de jure) standard across many industries and educational institutions. Source Downl...

SQL Injection -Basics

I found this article @ Source I thought this is MUST read article for aspirants who are looking for Sql Injection basics   Credit goes to author :-Source  < Disclaimer:-  This tutorial is purely for educational purpose> What is SQL Injection? Spoiler is a code injection technique that exploits a security vulnerability occurring in the database layer of...

John the Ripper -a fast password cracker

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version. John...

Useful - Hack tools

http://www.beenuarora.com/work.html I did not tried them yet ;) S...

Facebook Number trick Half-Explained

Interesting post going on Face book these days To Paste  @[134282353283788:0] on status or comment and you will get ‎Life is too short smile while you still have teeth  This number(134282353283788) indicates the page unique number ( click on the above link  ) and this will pick up title of page. you can also create you...

Facebook Trick

1. Copy the below lines : @[134282353283788:0] 2. Put on the comment line/Status ... 4. Enter try it .........

TCPEye Network Monitoring

DescriptionTCPEye V1.0 is network monitoring software that displays the list of all currently opened TCP/IP and UDP ports on your local computer. For each port in the list, information about the process that opened the port is also displayed, including the process name, full path of the process, version information of the process (product name, file description, and so on), the time that...

Net Share Monitor

This is the best site for many security tools,   your rock securityxploded.Thanks for sharing good tools and info... -------------------------------------- Here is good tool ------------------------ NetShareMonitor is the application to watch your shared files from the intruders and thereby protecting your shares from ...

Search engine hacking

The following table lists the search operators that work with each Google search service. Click on an operator to jump to its description — or, to read about all of the operators, simply scroll down and read all of this page. Search ServiceSearch Operators Web Searchallinanchor:, allintext:, allintitle:, allinurl:, cache:, define: ,filetype:,id:, inanchor:, info:, intext:, intitle:, inurl:, link:,phonebook:,   related:, site: Image Searchallintitle:, allinurl:, filetype:, inurl:, intitle:, site: Groupsallintext:, allintitle:, author:, group:, insubject:, intext:,intitle: Directoryallintext:, allintitle:, allinurl:, ext:, filetype:, intext:,intitle:, inurl: Newsallintext:, allintitle:, allinurl:, intext:, intitle:, inurl:,location:, source: Product...