Tuesday, November 30, 2010

zip bomb , try it out .

A zip bomb, also known as a Zip of Death or decompression bomb, is a malicious archive file designed to crash or render useless the program or system reading it. It is often employed to disable antivirus software, so that a more traditional virus sent afterwards could get through undetected.Rather than hijacking the normal operation of the program, a zip bomb allows the program to work as intended, but the archive is carefully crafted so that unpacking it (e.g. by a virus scanner in order to scan for viruses) requires inordinate amounts of time, disk space or memory.A zip bomb is usually a small file (up to a few hundred kilobytes) for ease of transport and to avoid suspicion. However, when the file is unpacked its contents are more than the system...

sms bomber latest !

Hi t3ch viewer , i finally present u final working version of sms bomber through which u can sent many to a phone number . cant guess , try this site out , http://smsattack.tk Send sms to anyone in any amount using way2sms account .. Enjoy my work , have any problems post your comments...

Monday, November 29, 2010

American embassy secrets released on the internet .

The conversation between the various american embassies and american government were released online. Moreover various war diaries were also released online . These were made my a hacker called  Julian Assange. The site is http://wikileaks.org/ .  Here are some facts about WikiLeaks: * WikiLeaks says it is a non-profit organization funded by human rights campaigners, journalists and the general public. Launched in 2006, it promotes the leaking of information to fight government and corporate corruption.* In October, WikiLeaks released 400,000 secret U.S. files on the Iraq war. The documents involved sensitive subjects including abuse of Iraqi prisoners in U.S. custody, Iraqi rights violations and civilian deaths.* In July, it released tens of thousands...

Sunday, November 28, 2010

Hack windows xp remotely !

Hi viewers , Windows XP is a os with 100's of bug in it , through which an attacker and access control to the system remotely and gain control over the entire system . In this we are going to attack a XP system running on a remote system using a framework called metaspoilt it is a collections of various exploits and payloads to attack various operating systems and softwares . This video covers the use of Metasploit, launched from the Auditor Boot CD, to compromise an unpatched Windows XP box by using the RPC DCOM (MS03-026) vulnerability. It then sends back a VNC session to the attacker. This is just one example of the many things Metasploit can do. If the embedded video below does not show RIGHT click here to save the file to your hard drive. ...

Saturday, November 27, 2010

BSNL modem hacks . .

According to a survey BSNL has largest number of broadband users in india , BSNL provides a modem called UT-STARCOM and series of its releases to its south indian broandband users . This modem has several vulnerabilities . some are , ->Any one can login into the router . change password of Admin account by logging into User account. -> Attacker can sniff the traffic of the router remotely . ->can change DNS server address and can perform spoofing and Phishing attacks easily in an un discoverable manner . ->Other DDos attacks can be performed . here is a whitepaper presented by few students of panimalar collage , Chennai regarding this issue . This proves 20% of the Broadband...

Email bomber .

Hi viewers , I wish u introduce Email bomber , it is a software/tool which can  be used to send 100's of email to any email account using gmail smtp server , for this u should use a gmail id through which email can be sent . some features of it : Uses port connection with gmail server and sends email  , so email sending rate  will be fast than http connection. Uses random numbers in the email subject , so gmail doest queues email as single mail and prevent from spam detection . download link: http://www.mediafire.com/?kl7k9002krbq7x1 I used Auto-It scripting to create the bomber , hence it may be detected as Trojan by few antivirus , but i assure that it is 100 percent safe . Antivirus reports by popular antivirus software for this file: AntivirusVersionLast...

Bluetooth hacks :)

Blue tooth is a device used for effective transmission of data at low power at the same with reasonable speed . Each Bluetooth device has its own device address and it also has a name using which it communicates with another devices , what happens if we can change the blue tooth address and name similar to another Bluetooth thus we can gain access to devices controlled by the hacked Bluetooth . This method of duplicating the address of a Bluetooth to resemble another Bluetooth device is called blue tooth spoofing .... how to do this ? got curious , there are some other methods like sending 100's of files to a target device using spoofed Bluetooth device , thus the receiving Bluetooth device...

Bittorrent hacks .

Bit torrent is a protocol , that is used for sharing a large sized file over distributed peer to peer computers in a efficient way , in this protocol , the person downloading the file is called peer , the person who is uploading is called seed , a peer after sometime downloading sufficient data of a file began to act as a seed , thus when we download a file we should also upload the file to others peers , thus the files availability is increased and made easy to download . some restrictions made by bit torrent are , you cannot download file without uploading few data for other , ie when u download a file using bit torrent client u should also upload some data that u have already downloaded on that file . this restriction is made because file must be always made available, there exist...

Friday, November 26, 2010

Hack any Nokia phone .

Nokia phones belonging to s60 series , ie nokia 6600 , Nokia - N series , E-series  etc has a bug through which we can hack them from remote and prevent them from receiving further sms messages on phone  ;) .  for this we will send a specially crafted sms to our victim phone number , the victim after getting our message it will not get any more messages . :) steps : 1.we can send sms from any phone , which has the ability to send text message as email , in most of the phones u can activate the feature as "send as email" option in the message profile settings . 2.change your email gateway number to the victim number whom u wish to hack . 3.now go to type new message , type anything , and now click send message , now u will...

join email and sms channels for free alerts .

Viewers of the blog , you can receive updates about the sites , new tips,  hacks etc by joining mailing list and sms channel ,  joining them will help me in promoting my blog , so join to mailing list enter ur email id on right side widget , u can also join sms channel , if you are from india , u can receive free sms alerts from this site , click the below link to join sms channel for free http://labs.google.co.in/smschannels/subscribe/t3ch-indi...

Thursday, November 25, 2010

Visit any forum without logging or registering in !!

In many forums , u are asked to register so that u can view the forum contents , it would be difficult for us to do so , hence there is a method called spoofing / changing user agent of browser , which makes our browser to act as google bot , since most of the forums allow google bots to view their contents  , we will also be able to view the forum without logging in :) , check this video tutorial ...

Which RDBMS is more secure? Microsoft vs. Oracle

This research paper by David Litchfield from Next Generation Security Software (NGSSoftware), examines the differences between the security posture of Microsoft’s SQL Server and Oracle’s RDBMS based upon security vulnerabilities reported by external security researchers and since fixed by the vendor in question.You can download it from:http://www.databasesecurity.com/dbsec/comparison....

Page 1 of 2112345Next
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Best Web Host