a person sitting on the floor with vr goggles using a computer

Writing a Linux Kernel Remote in 2022

In this post the author aims to shed some light on remote kernel exploitation, through the lens of a recent remote stack overflow (CVE-2022-0435) discovered by our Threat Advisory Services team. Author noticed when working on this bug that the …

Continue reading Writing a Linux Kernel Remote in 2022

Beginners Guide to 0day/CVE AppSec Research

Exploit research featured in Hack the Box Buff Box (Thanks Shaun!) Exploit research featured in DEFCON Safe-Mode 2020 Exploit research featured in Offensive Security Proving Grounds 10+ Web Application Exploits published on Exploit-DB 20+ CVE’s 0-day discoveries Critical vulnerabilities in …

Continue reading Beginners Guide to 0day/CVE AppSec Research

XDA Developers: ViVeTool GUI makes it easier to enable hidden Windows 11 features

XDA Developers: ViVeTool GUI makes it easier to enable hidden Windows 11 features. https://www.xda-developers.com/vivetool-gui-enable-hidden-windows-11-features/

Continue reading XDA Developers: ViVeTool GUI makes it easier to enable hidden Windows 11 features

UPI News: Russian YouTuber’s retractable lightsaber earns Guinness World Record

UPI News: Russian YouTuber’s retractable lightsaber earns Guinness World Record. https://www.upi.com/Odd_News/2022/01/24/Guinness-World-Records-first-retractable-lightsaber/9331643049071/

Continue reading UPI News: Russian YouTuber’s retractable lightsaber earns Guinness World Record

numbers projected on face

Log4Shell — Under Active Attack

Black Hats are actively weaponizing unpatched servers affected by the newly identified “Log4Shell” vulnerability in Log4j to install cryptocurrency miners, Cobalt Strike, and recruit the devices into a botnet, even as telemetry signs point to exploitation of the flaw nine …

Continue reading Log4Shell — Under Active Attack

How to install Windows 11 without TPM 2.0

How to install Windows 11 without TPM 2.0. https://www.ghacks.net/2021/10/05/how-to-install-windows-11-without-tpm-2-0/

Continue reading How to install Windows 11 without TPM 2.0

Raise privileges in windows 10 and 11

Continue reading Raise privileges in windows 10 and 11

Entrepreneur: A Casino Gets Hacked Through a Fish-Tank Thermometer

Entrepreneur: A Casino Gets Hacked Through a Fish-Tank Thermometer. https://www.entrepreneur.com/article/368943

Continue reading Entrepreneur: A Casino Gets Hacked Through a Fish-Tank Thermometer

600K Payment Card Records Leaked After Swarmshop Breach

A leaked database also contains the nicknames, hashed passwords, contact details, and activity history of Swarmshop admins, sellers, and buyers. — Read on www.darkreading.com/attacks-breaches/600k-payment-card-records-leaked-after-swarmshop-breach/d/d-id/1340625

Continue reading 600K Payment Card Records Leaked After Swarmshop Breach

How to Create a Nearly Undetectable Backdoor with Cryptcat

In this tutorial, I’ll introduce you to netcat’s popular cousin, cryptcat (she’s actually much cuter and more exotic than the plain netcat). Cryptcatenables us to communicate between two systems and encrypts the communication between them with twofish, one of many …

Continue reading How to Create a Nearly Undetectable Backdoor with Cryptcat

WebSite Hacking Secrets

THE MANUAL

Continue reading WebSite Hacking Secrets

Hacking Unity Games

Within the Unity engine, developers can add “scripts” (written in C#) which make up some of the game logic – these will often be our target. Unlike more traditionally compiled games, these “scripts” are not simply compiled into the .exe …

Continue reading Hacking Unity Games

How to Hack WiFi (Wireless) Network

Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc. In this tutorial, we will introduce you to common techniques used to exploit weaknesses in wireless network security implementations. We will also look at some of the countermeasures you can put in place to protect against such attacks. Just follow the rabbit…link below https://www.guru99.com/how-to-hack-wireless-networks.html

Continue reading How to Hack WiFi (Wireless) Network

Proxy server…HELL no!

Continue reading Proxy server…HELL no!

Airport lounge

Hacker Builds a QR Code Generator That Lets Him Into Fancy Airport Lounges https://gizmodo.com/hacker-builds-a-qr-code-generator-that-lets-him-into-fa-1784884083/amp

Continue reading Airport lounge

Scary bun known knowledge

The Dark Arts: Hacking Humans https://hackaday.com/2016/06/10/the-dark-arts-hacking-humans/amp/ Basically everything can be hacked…not only computing devices

Continue reading Scary bun known knowledge

Hackers can read your WhatsApp and Telegram chats if they wanted to

https://www.appy-geek.com/Web/ArticleWeb.aspx?regionid=4&articleid=65755247&source=wordpress

Continue reading Hackers can read your WhatsApp and Telegram chats if they wanted to

Ps4 hack

Watch homebrew code run Steam games on the PS4 https://www.engadget.com/2016/05/22/steam-on-ps4-demo/

Continue reading Ps4 hack

Apple Mac persistent rootkit malware june 2015

Symantec says a critical vulnerability within some Apple Mac models could allow hackers to inject systems with persistent rootkit malware. The security firm confirmed the existence of the security flaw late on Thursday. The flaw, called the Apple Mac OS X EFI Firmware Security Vulnerability, was originally disclosed last week by security researcher Pedro Vilaca. The problem lies within Mac sleep mode. After Macs awake from this low-power hibernation, a flawed suspend-resume implementation means that some Mac models’ flash protections are left unlocked. In short, cyberattackers could, in theory, reflash the computer’s firmware in this time window and install Extensible …

Continue reading Apple Mac persistent rootkit malware june 2015

SQL INJECTION STRINGS LIST

SQL injection is a technique often used to attack data driven applications. This is done by including portions of SQL statements in an entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database (e.g., dump the database contents to the attacker). SQL injection is a code injection technique that exploits a security vulnerability in an application’s software. The vulnerability happens when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly known as an attack …

Continue reading SQL INJECTION STRINGS LIST

List of Dorks to find Admin Panel of a Website.

Copy and paste one of the dork from the list below to Google search engine. When Admin panel opens paste these sql injection string into the Username and password fields and click login. Change it , if you own a website! login.htm login.html login/ adm/ admin/ admin/account.html admin/login.html admin/login.htm admin/controlpanel.html admin/controlpanel.htm admin/adminLogin.html admin/adminLogin.htm admin.htm admin.html adminitem/ adminitems/ administrator/ administration/ adminLogin/ admin_area/ manager/ letmein/ superuser/ access/ sysadm/ superman/ supervisor/ control/ member/ members/ user/ cp/ uvpanel/ manage/ management/ signin/ log-in/ log_in/ sign_in/ sign-in/ users/ accounts/ wp-login.php bb-admin/admin.html relogin.htm relogin.html registration/ moderator/ controlpanel/ fileadmin/ admin1.html admin1.htm admin2.html yonetim.html yonetici.html phpmyadmin/ myadmin/ ur-admin/ Server/ …

Continue reading List of Dorks to find Admin Panel of a Website.

hack into emails

Exaustive article to give an intro of how to hack into emails   https://www.hackingarticles.in/category/how-to-hack-email/

Continue reading hack into emails

Crack WI-FI methods

Depends on the encryption of the wifi. If it’s WEP, then its generally fairly easy to crack using Aircrack-ng. However, WPA/WPA2 two will need to be forced with the following methods, these are just a few to keep in mind: -The evil twin method: Launch a DOS (via De-auth requests) against one of the registered computers on the targeted wifi network, forcing the user to be disconnected. From there, set up your own little honeypot with the same ESSID & BSSID as the other wifi network and try to effectively trick the person to try logging in to your connection. …

Continue reading Crack WI-FI methods

South Korean Malware Attack

  Executive Summary Reporting and technical details surrounding the malware used in the March 20, 2013, attack on South Korean assets have been varied and inconsistent. However, there are some commonalitie reported across multiple organizations that provide some level of insight into the malware, dubbed DarkSeoul. The common attributes of the attack campaign are the following: •The malicious file wipes the master boot record (MBR) and other files. •The malware was hard coded with a specific execution date and time and searches machines for credentials with administrative/root access to servers. •The malware is written to specifically target South Korean victims. …

Continue reading South Korean Malware Attack

Getting the Local Traffic Report

It can be problematic and lead to headaches – and possibly even hair loss (your follicles may vary) – if you need to capture local network traffic (sent to your own device or PC) as many tools (even the venerable WireShark) aren’t very helpful with that scenario. However, there is a way to do it using two free tools, namely RawCap and the aforementioned WireShark. Once you know how, it’s (almost) as easy as pie — that is, eating a pie, such as an apple pie – not memorizing 3.14….etc) First, download RawCap here Next (provided you don’t already have …

Continue reading Getting the Local Traffic Report

Turn your IPod Iphone or soon to be Ipad into a hacker system

For all the complaints against apple for making it hard to get an application registered and sold in the Apple store, there are some very cool applications that can be used to set up your Iphone or other apple Iphone OS based system into an excellent scanning and pseudo hacker tool. These are the products you want to get if you are a security engineer. Security Scanner by Tommy Kammerer A full featured port scanner for your Iphone, IPod or soon to be Ipad that will help you figure out what systems have what ports open on a remote computer. …

Continue reading Turn your IPod Iphone or soon to be Ipad into a hacker system

10 Android hacking tools

Lets see 10 Android tools that are meant for hacking and hackers. 1.Hackode :- Hackode : The hacker’s Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cyber security professional to perform different tasks like reconnaissance, scanning performing exploits etc. 2.Androrat:- Remote Administration Tool for Android. Androrat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server. 3.APKInspector:- APKinspector is a powerful GUI tool for analysts to analyse the Android applications. The goal of this project is to aide analysts and reverse engineers to visualize compiled Android packages and their corresponding DEX code. …

Continue reading 10 Android hacking tools

Perfect OS for hacking.

Anonymous released their own operating system, based on Ubuntu and Mate. Should we download it…no, not really as they usually add troyan and malware in it…so you hack and then you get hacked…not funny.   Kali linux, backtrack OS, yes, but as above paranoia it’s in me so… best solution. Honestly, they all are just like any other linux distros for the most part. If you are not yet, I suggest starting by getting comfortable with Ubuntu(WITHOUT the Unity interface). Ubuntu is a very user friendly distro, so don’t be afraid if you haven’t used it before. Once you are …

Continue reading Perfect OS for hacking.

How to Hack Your Own Network and Beef Up Its Security with Kali Linux

  Kali Linux is a security-focused operating system you can run off a CD or USB drive, anywhere. With its security toolkit you can crack Wi-Fi passwords, create fake networks, and test other vulnerabilities. Here’s how to use it to give your own a network a security checkup. Kali Linux is packed with a ton of software for testing security holes in your network. There are far too many to list here, but we’re so enamored with it that we decided to pick a few of our favorite tools and show how they work: Aircrack, Airbase, and ARPspoof. We’ll show …

Continue reading How to Hack Your Own Network and Beef Up Its Security with Kali Linux

Create a USB Password Stealer to See How Secure Your Info Really Is

Step One: Collect Your Tools NirSoft makes a ton of utilities that we love, and they have a pretty good suite of security tools. We’re going to use a few that recover passwords to create our ultimate USB tool. Plug in your USB drive, and create a folder titled “Utilities”. Then, download the following zip files (not the self-install executables) from the NirSoft Password Recovery Utilities page onto the thumb drive and—after extracting the files—place all of the .exe files in the Utilities folder: MessenPass Mail PassViewProtected Storage PassView Dialupass BulletsPassViewNetwork Password RecoverySniffPass Password SnifferRouterPassViewPstPasswordWebBrowserPassViewWirelessKeyViewRemote Desktop PassViewVNCPassView Each of these …

Continue reading Create a USB Password Stealer to See How Secure Your Info Really Is

Hackers discover gaping major security flaw in USB sticks

Photo Courtesy of myce.com You know those USB sticks that you have piled up in a draw somewhere? Yea, they can be vulnerable to malware. Recently, “security researchers published code that spreads itself by hiding in the firmware that controls how USB…

Continue reading “Hackers discover gaping major security flaw in USB sticks”

Hack into someone’s Facebook account

In this article I’ll show you these, and a couple other ways that hackers (and even regular folks) can hack into someone’s Facebook account. But don’t worry, I’ll also show you how to prevent it from happening to you. Method 1: Reset the Password The easiest way to “hack” into someone’s Facebook is through resetting the password. This could be easier done by people who are friends with the person they’re trying to hack. The first step would be to get your friend’s Facebook email login. If you don’t already know it, try looking on their Facebook page in the …

Continue reading Hack into someone’s Facebook account

Shell a website

Continue reading Shell a website

Offline bruteforce attack on WiFi Protected Setup

Offline bruteforce attack on WiFi Protected Setup from 0xcite

Continue reading Offline bruteforce attack on WiFi Protected Setup

You can steal data from a computer by touching it

by Jon Fingas |  Normally, breaking a PC’s security involves either finding security exploits or launching brute force attacks, neither of which is necessarily quick or easy. However, a team at Tel Aviv University has come up with a potentially much simpler way to swipe data from a computer: touch it. If you make contact with a PC while you’re wearing a digitizer wristband, you can measure tiny changes in electrical potential that reveal even stronger encryption keys (such as a 4,096-bit RSA key). You don’t even have to touch the system directly in some cases — researchers also intercepted keys from attached …

Continue reading You can steal data from a computer by touching it

50 Hacking tools

Hacking tools have been said to make hacking quite easy as compared to the old days. But, there is still more to being a hacker than just that. Yes, these tools have made it simple, but that is nothing unless you have the knowledge about other aspects of hacking as well. We present tp you a set of must-have hacking tools. Wireless Hacking: These are tools that help you hack into wireless networks. Wireless hacking tools though useful, do not make you a complete hacker. In order to achieve that, you must learn the different ways in which a secure network …

Continue reading 50 Hacking tools

How to install Microsoft Office 2013 for free – Step By Step Tutorial HD

Press here to get to the download site and then click download. This download is for 64 bit Operating System. If you have 32 bit  Operating System press here . After you download the file, you need to disable your anti-virus because it will scan…

Continue reading “How to install Microsoft Office 2013 for free – Step By Step Tutorial HD”

How to install VMware for free – Step By Step Tutorial HD

VMware Workstation enables users to set up one or more virtual machines on a single physical machine. How to get it for free on Windows: Press here to get to the VMware site. Now, click on “Go to downloads” under the Windows section and  on the…

Continue reading “How to install VMware for free – Step By Step Tutorial HD”

How to install Photoshop CC 2014 for free – Step By Step Tutorial HD

If you want to get Photoshop and you don’t want to pay every month $20, you can now get it for free by following these steps below. First of all, you need to download the Adobe Creative Cloud. Press here to get to the site. When you open the site create…

Continue reading “How to install Photoshop CC 2014 for free – Step By Step Tutorial HD”

Google Dorks 2014 List For SQL Injection Attack

about.php?cartID= accinfo.php?cartId= acclogin.php?cartID= add.php?bookid= add_cart.php?num= addcart.php? addItem.php add-to-cart.php?ID= addToCart.php?idProduct= addtomylist.php?ProdId= adminEditProductFields.php?intProdID= advSearch_h.php?idCategory= affiliate.php?ID= affiliate-agreement.cfm?storeid= affiliates.php?id= ancillary.php?ID= archive.php?id= article.php?id= phpx?PageID basket.php?id= Book.php?bookID= book_list.php?bookid= book_view.php?bookid= BookDetails.php?ID= browse.php?catid= browse_item_details.php Browse_Item_Details.php?Store_Id= buy.php? buy.php?bookid= bycategory.php?id= cardinfo.php?card= cart.php?action= cart.php?cart_id= cart.php?id= cart_additem.php?id= cart_validate.php?id= cartadd.php?id= cat.php?iCat= catalog.php catalog.php?CatalogID= catalog_item.php?ID= catalog_main.php?catid= category.php category.php?catid= category_list.php?id= categorydisplay.php?catid= checkout.php?cartid= checkout.php?UserID= checkout_confirmed.php?order_id= checkout1.php?cartid= comersus_listCategoriesAndProducts.php?idCategory= comersus_optEmailToFriendForm.php?idProduct= comersus_optReviewReadExec.php?idProduct= comersus_viewItem.php?idProduct= comments_form.php?ID= contact.php?cartId= content.php?id= customerService.php?****ID1= default.php?catID= description.php?bookid= details.php?BookID= details.php?Press_Release_ID= details.php?Product_ID= details.php?Service_ID= display_item.php?id= displayproducts.php downloadTrial.php?intProdID= emailproduct.php?itemid= emailToFriend.php?idProduct= events.php?ID= faq.php?cartID= faq_list.php?id= faqs.php?id= feedback.php?title= freedownload.php?bookid= fullDisplay.php?item= getbook.php?bookid= GetItems.php?itemid= giftDetail.php?id= help.php?CartId= home.php?id= index.php?cart= index.php?cartID= index.php?ID= info.php?ID= item.php?eid= item.php?item_id= item.php?itemid= item.php?model= item.php?prodtype= item.php?shopcd= item_details.php?catid= item_list.php?maingroup item_show.php?code_no= itemDesc.php?CartId= itemdetail.php?item= itemdetails.php?catalogid= learnmore.php?cartID= links.php?catid= list.php?bookid= …

Continue reading Google Dorks 2014 List For SQL Injection Attack