How to Hack WiFi (Wireless) Network

Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc. In this tutorial, we will introduce you to common techniques used to exploit weaknesses in wireless network security implementations. We will also look at some of the countermeasures you can put …

Airport lounge

Hacker Builds a QR Code Generator That Lets Him Into Fancy Airport Lounges http://gizmodo.com/hacker-builds-a-qr-code-generator-that-lets-him-into-fa-1784884083/amp

Scary bun known knowledge

The Dark Arts: Hacking Humans http://hackaday.com/2016/06/10/the-dark-arts-hacking-humans/amp/ Basically everything can be hacked…not only computing devices

Ps4 hack

Watch homebrew code run Steam games on the PS4 http://www.engadget.com/2016/05/22/steam-on-ps4-demo/

Apple Mac persistent rootkit malware june 2015

Symantec says a critical vulnerability within some Apple Mac models could allow hackers to inject systems with persistent rootkit malware. The security firm confirmed the existence of the security flaw late on Thursday. The flaw, called the Apple Mac OS X EFI Firmware Security Vulnerability, was originally disclosed last week by security researcher Pedro Vilaca. The problem lies within Mac …

SQL INJECTION STRINGS LIST

SQL injection is a technique often used to attack data driven applications. This is done by including portions of SQL statements in an entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database (e.g., dump the database contents to the attacker). SQL injection is a code injection technique that exploits a security …

List of Dorks to find Admin Panel of a Website.

Copy and paste one of the dork from the list below to Google search engine. When Admin panel opens paste these sql injection string into the Username and password fields and click login. Change it , if you own a website! login.htm login.html login/ adm/ admin/ admin/account.html admin/login.html admin/login.htm admin/controlpanel.html admin/controlpanel.htm admin/adminLogin.html admin/adminLogin.htm admin.htm admin.html adminitem/ adminitems/ administrator/ administration/ adminLogin/ …

hack into emails

Exaustive article to give an intro of how to hack into emails   http://www.hackingarticles.in/category/how-to-hack-email/

Crack WI-FI methods

Depends on the encryption of the wifi. If it’s WEP, then its generally fairly easy to crack using Aircrack-ng. However, WPA/WPA2 two will need to be forced with the following methods, these are just a few to keep in mind: -The evil twin method: Launch a DOS (via De-auth requests) against one of the registered computers on the targeted wifi …

South Korean Malware Attack

  Executive Summary Reporting and technical details surrounding the malware used in the March 20, 2013, attack on South Korean assets have been varied and inconsistent. However, there are some commonalitie reported across multiple organizations that provide some level of insight into the malware, dubbed DarkSeoul. The common attributes of the attack campaign are the following: •The malicious file wipes …

Getting the Local Traffic Report

It can be problematic and lead to headaches – and possibly even hair loss (your follicles may vary) – if you need to capture local network traffic (sent to your own device or PC) as many tools (even the venerable WireShark) aren’t very helpful with that scenario. However, there is a way to do it using two free tools, namely …

Turn your IPod Iphone or soon to be Ipad into a hacker system

For all the complaints against apple for making it hard to get an application registered and sold in the Apple store, there are some very cool applications that can be used to set up your Iphone or other apple Iphone OS based system into an excellent scanning and pseudo hacker tool. These are the products you want to get if …

10 Android hacking tools

Lets see 10 Android tools that are meant for hacking and hackers. 1.Hackode :- Hackode : The hacker’s Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cyber security professional to perform different tasks like reconnaissance, scanning performing exploits etc. 2.Androrat:- Remote Administration Tool for Android. Androrat is a client/server application developed in Java Android for the client side and …

Perfect OS for hacking.

Anonymous released their own operating system, based on Ubuntu and Mate. Should we download it…no, not really as they usually add troyan and malware in it…so you hack and then you get hacked…not funny.   Kali linux, backtrack OS, yes, but as above paranoia it’s in me so… best solution. Honestly, they all are just like any other linux distros …

How to Hack Your Own Network and Beef Up Its Security with Kali Linux

  Kali Linux is a security-focused operating system you can run off a CD or USB drive, anywhere. With its security toolkit you can crack Wi-Fi passwords, create fake networks, and test other vulnerabilities. Here’s how to use it to give your own a network a security checkup. Kali Linux is packed with a ton of software for testing security …

Create a USB Password Stealer to See How Secure Your Info Really Is

Step One: Collect Your Tools NirSoft makes a ton of utilities that we love, and they have a pretty good suite of security tools. We’re going to use a few that recover passwords to create our ultimate USB tool. Plug in your USB drive, and create a folder titled “Utilities”. Then, download the following zip files (not the self-install executables) …

Hackers discover gaping major security flaw in USB sticks

Photo Courtesy of myce.com You know those USB sticks that you have piled up in a draw somewhere? Yea, they can be vulnerable to malware. Recently, “security researchers published code that spreads itself by hiding in the firmware that controls how USB…

Hack into someone’s Facebook account

In this article I’ll show you these, and a couple other ways that hackers (and even regular folks) can hack into someone’s Facebook account. But don’t worry, I’ll also show you how to prevent it from happening to you. Method 1: Reset the Password The easiest way to “hack” into someone’s Facebook is through resetting the password. This could be …

You can steal data from a computer by touching it

by Jon Fingas |  Normally, breaking a PC’s security involves either finding security exploits or launching brute force attacks, neither of which is necessarily quick or easy. However, a team at Tel Aviv University has come up with a potentially much simpler way to swipe data from a computer: touch it. If you make contact with a PC while you’re wearing a digitizer …

50 Hacking tools

Hacking tools have been said to make hacking quite easy as compared to the old days. But, there is still more to being a hacker than just that. Yes, these tools have made it simple, but that is nothing unless you have the knowledge about other aspects of hacking as well. We present tp you a set of must-have hacking …

How to install VMware for free – Step By Step Tutorial HD

VMware Workstation enables users to set up one or more virtual machines on a single physical machine. How to get it for free on Windows: Press here to get to the VMware site. Now, click on “Go to downloads” under the Windows section and  on the…

Google Dorks 2014 List For SQL Injection Attack

about.php?cartID= accinfo.php?cartId= acclogin.php?cartID= add.php?bookid= add_cart.php?num= addcart.php? addItem.php add-to-cart.php?ID= addToCart.php?idProduct= addtomylist.php?ProdId= adminEditProductFields.php?intProdID= advSearch_h.php?idCategory= affiliate.php?ID= affiliate-agreement.cfm?storeid= affiliates.php?id= ancillary.php?ID= archive.php?id= article.php?id= phpx?PageID basket.php?id= Book.php?bookID= book_list.php?bookid= book_view.php?bookid= BookDetails.php?ID= browse.php?catid= browse_item_details.php Browse_Item_Details.php?Store_Id= buy.php? buy.php?bookid= bycategory.php?id= cardinfo.php?card= cart.php?action= cart.php?cart_id= cart.php?id= cart_additem.php?id= cart_validate.php?id= cartadd.php?id= cat.php?iCat= catalog.php catalog.php?CatalogID= catalog_item.php?ID= catalog_main.php?catid= category.php category.php?catid= category_list.php?id= categorydisplay.php?catid= checkout.php?cartid= checkout.php?UserID= checkout_confirmed.php?order_id= checkout1.php?cartid= comersus_listCategoriesAndProducts.php?idCategory= comersus_optEmailToFriendForm.php?idProduct= comersus_optReviewReadExec.php?idProduct= comersus_viewItem.php?idProduct= comments_form.php?ID= contact.php?cartId= content.php?id= customerService.php?****ID1= default.php?catID= description.php?bookid= …

Commonly Used Hacking Tools

The following table lists some of the most commonly used tools.   SR  NO. TOOLS DESCRIPTION URL Link 1  Nmap   Network mapper. This tool is used to explore networks and perform security audits.   http://nmap.org/ 2  Nessus   This tool can be used to perform; Remote vulnerability scanner Password dictionary attacks Denial of service attacks.   It is closed …

Password cracking tool

These are software programs that are used to crack user passwords. We already looked at a similar tool in the above example on password strengths. The website www.md5this.com uses a rainbow table to crack passwords. We will now look at some of the commonly used tools John the Ripper John the Ripper uses the command prompt to crack passwords. This …

How to Crack Wireless Networks

WEP cracking Cracking is the process of exploiting security weaknesses in wireless networks and gaining unauthorized access. WEP cracking refers to exploits on networks that use WEP to implement security controls. There are basically two types of cracks namely; Passive cracking– this type of cracking has no effect on the network traffic until the WEP security has been cracked. It …