Get paid to share your links!
Featured Article

Wednesday, April 29, 2015

how to be a hacker?

Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. We have prepared a list of 12 most important steps necessary to become a hacker, have a deeper look

1. Learn UNIX/LINUX


linux operating system

UNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker.


Start Learning Linux


2. Code in C language 


c programming

C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker you should master C language.

3. Learn to code in more than one Programming Language


programming languages


It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.


Top 6 Websites To Learn Computer Programming Languages

4. Learn Networking Concepts


computer networking

Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system.

Understanding what LAN, WAN, VPN, Firewall is also important.

You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.


5. Learn More Than One Operating Systems 


operating system

It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.


6. Learn Cryptography


cryptography encryption

To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.


Decrypting Window 7 Password Using Ophcrack

7. Learn more and more about hacking


hacking or hackers

Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.


Hackers Underground Hand Book Completely Free

Hacking For Begineers Free Ebook

8. Experiment A Lot


experiment

After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.

9. Write Vulnerability (Loop hole program)


hacking vulnerability


Vulnerability is the weakness, loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own and exploit the system.


6 Most Common Password Cracking Methods And Their Countermeasures


10. Contribute To Open Source Security Projects


open source software 

An open source computer security project helps you a lot in polishing and testing your hacking skills. It’s not a piece of cake to get it done. Some organizations such as MOZILLA, APACHE offer open source projects. Contribute and be a part of them even if your contribution is small, it will add a big value to your field.

11. Continue never ending Learning 


learning hacking

Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems

12. Join Discussions and meet hackers 


discussion

Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.

Monday, April 27, 2015

1. Change the text of a webpage:

You can have fun on webpages just by changing the value of a <span> (a text label). For example, go on the 4shared.com site (a free file sharing site). Then create an account if you don't have one (or just connect with Google, Facebook or Twitter). When you are done, upload something that is heavy (more than 100 MB) by dragging and dropping it on the home page of 4shared. Then you can see an uploading status window on the screen. So right-click on the percentage and click on ''Inspect element''. Now you can see a little window that appears on the bottom of the web browser. There are to ways : either you got the number or you got the % symbol. If you got the number, try to find the symbol below. Then double-click on it and type what you want (Eg: '',000,000 dollars in my bank account'')

google chrome tricks

2. Get a Non-Crypted password in JS/PhP code:

Some sites are not very safe and just verify the password directly in the PhP/JS code. Then, even if it become rare, you can get the password. Just follow these steps :

  1. Find the login form on the website you want to hack
  2. Right-click on it and then click on ''Inspect element''
  3. Search on the window that appeared ''<form'' and then ''action=''
  4. After it, there is a URL, If it ends by ''.js'', just copy it and paste it in the URL bar of your browser
  5. If it ends by ''.php'', type ''view-source:'' before pasting the URL
  6. Then search something like ''password'' in the code.
WARNING: This method works better with JS than with PHP. Sometimes, there is no URL after ''action='' but just a JS function. Then you have to press Ctrl+U to see the source and search for ''password'' in the whole code.

Finding Ip Address Of A Website Using Command Prompt Or CMD!

How To View Unprotected Cam using google ?

1. Go to Google and search for "inurl:view/view.shtml" (without quote).
           2. Now open any of the link from the search result and enjoy.
             3. Below is the list of google dork you can use to see more cams.

      List Of Google Dork

      • inurl:/view.shtml
      • intitle:”Live View / - AXIS” | inurl:view/view.shtml^
      • inurl:ViewerFrame?Mode=
      • inurl:ViewerFrame?Mode=Refresh
      • inurl:axis-cgi/jpg
      • inurl:axis-cgi/mjpg (motion-JPEG)
      • inurl:view/indexFrame.shtml
      • inurl:view/index.shtml
      • inurl:view/view.shtml
      • intitle:start inurl:cgistart
      • intitle:”live view” intitle:axis
      • liveapplet
      • intitle:snc-z20 inurl:home/
      • intitle:liveapplet
      • intitle:”i-Catcher Console - Web Monitor”
      • intitle:axis intitle:”video server”
      • intitle:liveapplet inurl:LvAppl
      • intitle:”EvoCam” inurl:”webcam.html”
      • intitle:”Live NetSnap Cam-Server feed”
      • intitle:”Live View / - AXIS”
      • intitle:”Live View / - AXIS 206W”
      • intitle:”Live View / - AXIS 210″
      • inurl:indexFrame.shtml Axis
      • intitle:”Live View / - AXIS 206M”
      • inurl:”MultiCameraFrame?Mode=Motion”
      • allintitle:"network Camera NetworkCamera”
      • intitle:”WJ-NT104 Main Page”
      • intext:”MOBOTIX M1″ intext:”Open Menu”
      • intext:”MOBOTIX M10″ intext:”Open Menu”
      • intext:”MOBOTIX D10″ intext:”Open Menu”
      • intitle:”netcam live image”
      • intitle:snc-cs3 inurl:home/
      • intitle:snc-rz30 inurl:home/
      • intitle:”sony network camera snc-p1″
      • intitle:”sony network camera snc-m1″
      • site:.viewnetcam.com -www.viewnetcam.com
      • intitle:”Toshiba Network Camera” user login

      How To Find Serial Key Of Any Software ?

      The key 94FBR is a part of  Office 2000 Pro CD activation key that is widely distributed as it bypasses the activation requirements of Office 2000 Pro. By searching for 94fbr and the product name, you are guarantee that the pages that are returned are pages dealing specifically with the product you're wanting a serial for. Follow simple steps given below to learn this traick

          1. Go to Google
          2. Then type  Software Name 94FBR
      • Replace Software Name with the name of software whose serial key you want to find
      • Eg: To find serial key of Nero i will type Nero 94fbr
          3. Now press Enter and you will find serial key of software you are you looking for as shown below.
      google trick to find serial key

      simple cool tricks with chrome

      1. Change the text of a webpage:

      You can have fun on webpages just by changing the value of a <span> (a text label). For example, go on the 4shared.com site (a free file sharing site). Then create an account if you don't have one (or just connect with Google, Facebook or Twitter). When you are done, upload something that is heavy (more than 100 MB) by dragging and dropping it on the home page of 4shared. Then you can see an uploading status window on the screen. So right-click on the percentage and click on ''Inspect element''. Now you can see a little window that appears on the bottom of the web browser. There are to ways : either you got the number or you got the % symbol. If you got the number, try to find the symbol below. Then double-click on it and type what you want (Eg: '',000,000 dollars in my bank account'')

      google chrome tricks

      2. Get a Non-Crypted password in JS/PhP code:

      Some sites are not very safe and just verify the password directly in the PhP/JS code. Then, even if it become rare, you can get the password. Just follow these steps :

      1. Find the login form on the website you want to hack
      2. Right-click on it and then click on ''Inspect element''
      3. Search on the window that appeared ''<form'' and then ''action=''
      4. After it, there is a URL, If it ends by ''.js'', just copy it and paste it in the URL bar of your browser
      5. If it ends by ''.php'', type ''view-source:'' before pasting the URL
      6. Then search something like ''password'' in the code.
      WARNING: This method works better with JS than with PHP. Sometimes, there is no URL after ''action='' but just a JS function. Then you have to press Ctrl+U to see the source and search for ''password'' in the whole code.

      Friday, April 24, 2015

      how to access iphone file and folder without jailbreak

      in this tutorial am gonna access my Iphone folder and file using this program that called Iphone folder
      its bretty easy to do just follow me:
      step1: download the program downlaod from here

      step2: install the program

      step3: plug in your Iphone

      step4: open Iphone 4

      enjoy!
      watch the video

      Google dork tutorial

      Usually hackers upload shell to victim’s site using the vulnerability in that website. Shell allows hackers to hack/deface the website. Sometimes hackers left the shell in the vulnerable sites.  Here is simple google search allows you to find a shell uploaded by hackers.
      Use one of the following google dork to find the shell:
      • intitle:index of/sh3llZ
      • “Index of /sh3llZ”
      • “/sh3llZ/uploadshell/uploadshell.php”
      This will show the list of sites that has a sh3llZ folder. Probably, there will be link to c99 shell.  If you click the link, it will land you in a shell page. Using that shell, you can upload your own shells or deface the sites.

      16 Steps Tutorial Basic Command Prompt

      1. For this tutorial, I have a few files for you and need to download to make you more understanding this basic tutorial. (I guarantee that the file below is virus free)
      2. Extract the files and copy the folder "cmdlearn" into drive C:\
      3. Click Run(see shortcut here) and type "cmd" in the text box, click OK.
      16 Steps Tutorial Basic Command Prompt
      4. This is your Command Prompt console look like(I'm using Windows 7, so for Windows XP maybe it's a slightly different but dont worry about it::-) )
      16 Steps Tutorial Basic Command Prompt

      5. In your Command Prompt, type cd\, that means we will change into the drive C:\.

      16 Steps Tutorial Basic Command Prompt
      6. We're in drive C:\ now, we need to change directory into cmdlearn. Type "cd cmdlearn"
      16 Steps Tutorial Basic Command Prompt
      7. Okay that's easy isn't it? now is time to view our directory contents by using dir command.
      16 Steps Tutorial Basic Command Prompt
      If you need to clear the text, just type cls(Clear Screen).
      8. We will start from "program folder". We need to change directory into there, type cd program.
      16 Steps Tutorial Basic Command Prompt
      9. Inside the program folder, there's a small application using BAT extension about asking your name. Simply type myapp.bat in your command prompt. This method also can be used to run an EXE or VBS, because Windows will automatically know how to run that extension.
      16 Steps Tutorial Basic Command Prompt
      You can use TAB for auto-complete command prompt
      10. Now let's change into text directory. Type cd ..\text to go into text directory.
      16 Steps Tutorial Basic Command Prompt
      The double dotted means that we will go into the parent directory "cmdlearn".
      11. To view the text contents in mytext.txt you can use "type mytext.txt". If you want to edit the text, You can use "write mytext.txt" to edit using Wordpad.
      16 Steps Tutorial Basic Command Prompt  16 Steps Tutorial Basic Command Prompt
      12. For editing the text in Windows XP, You can type "edit mytext.txt".
      16 Steps Tutorial Basic Command Prompt
      13. Now let's change directory to our last lesson "..\tocopy"
      16 Steps Tutorial Basic Command Prompt
      14. To copy the picture(mario.png) from tocopy folder into topaste folder simply type copy mario.png ..\topaste.
      16 Steps Tutorial Basic Command Prompt
      15. To Move the picture(superman.png) from tocopy folder into topaste folder, You can type move superman.png ..\topaste.
      16 Steps Tutorial Basic Command Prompt
      16. To Delete the picture(tux.png) you can type del tux.png.
      16 Steps Tutorial Basic Command Prompt
      Okay that's enough for your basic learning about Command Prompt :-).

      Thursday, April 23, 2015

      I think this hacking tutorial, Log in Windows Without Password with Kon Boot, will be easy to follow using the step-by-step instructions. The purpose of this tutorial is to demonstrate the importance of physical security and explain how to prevent this kind of attack. Three or four days ago I watched a BBC program about spying. In the episode, they showed how a spy device can be put silently on your motherboard, again… physical security is very important. For most people, it wouldn’t be a big deal because we carry our computer wherever we go, but it could become a big problem for firms who have lots of important data on employee computers.
      What Wikipedia says about Physical Security:
      Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources, and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks).
      Physical security in this tutorial is part of Information Security, which Wikipedia describes as:
      Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (electronic, physical, etc…)
      Remember: Do this only on your own computer, make sure you are not harming others.
      Requirements:
      2. USB stick (the Kon Boot file size is about 5-6 MB, so you can calculate the necessary USB size.)

      Step by Step Hacking Tutorials Log in Windows Without Password with Kon Boot:

      1. First, we will make Kon Boot bootable from the USB drive by using the default Kon-boot installer that is provided when we buy this program. If we use the free version, we can create the image by following the tutorial: How to Create Bootable USB.
      Hacking Tutorials Log in Windows Without Password with Kon Boot
      We will choose the USB we want Kon-boot to be installed on and select it from the “available USB drives” drop-down list. Then click, “Install to USB stick”.
      The installation process will take approximately 1 minute.
      note: Make sure you choose the correct USB, because the installation process will erase all data on your USB device.
      2. Now that the Kon-boot USB is ready, we need to configure the BIOS settings and change the boot order so we can boot from the USB. You can view our previous tutorial about changing BIOS boot order in step 5.
      3. This is displayed when we successfully boot from the Kon-boot USB.
      Hacking Tutorials Log in Windows Without Password with Kon Boot
      4. After the Kon-boot initialization screen it will normally boot to Windows. When we press the SHIFT key 5 times (sticky keys), we can see that the command prompt pops up with system role.
      Hacking Tutorials Log in Windows Without Password with Kon Boot
      5. We can enter Windows without a password, just click the arrow and we are inside the system.
      this tutorial by hacking tutorial team

      ad

      PayPal

      Powered by Blogger.

      follow me on facebook