Category Archives: Hacks

Airport lounge

Hacker Builds a QR Code Generator That Lets Him Into Fancy Airport Lounges

Ps4 hack

Watch homebrew code run Steam games on the PS4

Apple Mac persistent rootkit malware june 2015

Symantec says a critical vulnerability within some Apple Mac models could allow hackers to inject systems with persistent rootkit malware. The security firm confirmed the existence of the security flaw late on Thursday. The flaw, called the Apple Mac OS X EFI Firmware Security Vulnerability, was originally disclosed last week


SQL injection is a technique often used to attack data driven applications. This is done by including portions of SQL statements in an entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database (e.g., dump the database contents to the attacker).

List of Dorks to find Admin Panel of a Website.

Copy and paste one of the dork from the list below to Google search engine. When Admin panel opens paste these sql injection string into the Username and password fields and click login. Change it , if you own a website! login.htm login.html login/ adm/ admin/ admin/account.html admin/login.html admin/login.htm admin/controlpanel.html

Crack WI-FI methods

Depends on the encryption of the wifi. If it’s WEP, then its generally fairly easy to crack using Aircrack-ng. However, WPA/WPA2 two will need to be forced with the following methods, these are just a few to keep in mind: -The evil twin method: Launch a DOS (via De-auth requests)

South Korean Malware Attack

  Executive Summary Reporting and technical details surrounding the malware used in the March 20, 2013, attack on South Korean assets have been varied and inconsistent. However, there are some commonalitie reported across multiple organizations that provide some level of insight into the malware, dubbed DarkSeoul. The common attributes of

10 Android hacking tools

Lets see 10 Android tools that are meant for hacking and hackers. 1.Hackode :- Hackode : The hacker’s Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cyber security professional to perform different tasks like reconnaissance, scanning performing exploits etc. 2.Androrat:- Remote Administration Tool for Android. Androrat is a client/server

Perfect OS for hacking.

Anonymous released their own operating system, based on Ubuntu and Mate. Should we download it…no, not really as they usually add troyan and malware in it…so you hack and then you get hacked…not funny.   Kali linux, backtrack OS, yes, but as above paranoia it’s in me so… best solution.

Hack into someone’s Facebook account

In this article I’ll show you these, and a couple other ways that hackers (and even regular folks) can hack into someone’s Facebook account. But don’t worry, I’ll also show you how to prevent it from happening to you. Method 1: Reset the Password The easiest way to “hack” into

You can steal data from a computer by touching it

by Jon Fingas |  Normally, breaking a PC’s security involves either finding security exploits or launching brute force attacks, neither of which is necessarily quick or easy. However, a team at Tel Aviv University has come up with a potentially much simpler way to swipe data from a computer: touch it. If you

50 Hacking tools

Hacking tools have been said to make hacking quite easy as compared to the old days. But, there is still more to being a hacker than just that. Yes, these tools have made it simple, but that is nothing unless you have the knowledge about other aspects of hacking as

Google Dorks 2014 List For SQL Injection Attack

about.php?cartID= accinfo.php?cartId= acclogin.php?cartID= add.php?bookid= add_cart.php?num= addcart.php? addItem.php add-to-cart.php?ID= addToCart.php?idProduct= addtomylist.php?ProdId= adminEditProductFields.php?intProdID= advSearch_h.php?idCategory= affiliate.php?ID= affiliate-agreement.cfm?storeid= affiliates.php?id= ancillary.php?ID= archive.php?id= article.php?id= phpx?PageID basket.php?id= Book.php?bookID= book_list.php?bookid= book_view.php?bookid= BookDetails.php?ID= browse.php?catid= browse_item_details.php Browse_Item_Details.php?Store_Id= buy.php? buy.php?bookid= bycategory.php?id= cardinfo.php?card= cart.php?action= cart.php?cart_id= cart.php?id= cart_additem.php?id= cart_validate.php?id= cartadd.php?id= cat.php?iCat= catalog.php catalog.php?CatalogID= catalog_item.php?ID= catalog_main.php?catid= category.php category.php?catid= category_list.php?id= categorydisplay.php?catid= checkout.php?cartid= checkout.php?UserID= checkout_confirmed.php?order_id= checkout1.php?cartid=

Commonly Used Hacking Tools

The following table lists some of the most commonly used tools.   SR  NO. TOOLS DESCRIPTION URL Link 1  Nmap   Network mapper. This tool is used to explore networks and perform security audits. 2  Nessus   This tool can be used to perform; Remote vulnerability scanner Password

Password cracking tool

These are software programs that are used to crack user passwords. We already looked at a similar tool in the above example on password strengths. The website uses a rainbow table to crack passwords. We will now look at some of the commonly used tools John the Ripper John

How to Crack Wireless Networks

WEP cracking Cracking is the process of exploiting security weaknesses in wireless networks and gaining unauthorized access. WEP cracking refers to exploits on networks that use WEP to implement security controls. There are basically two types of cracks namely; Passive cracking– this type of cracking has no effect on the