Saturday, May 11, 2013

0 SQL Injection


Please Leave A Comment~ Thank You...!!!
SQL injection and buffer overflows are hacking techniques used to exploit weaknesses in applications. When programs are written, some parameters used in the creation of the application code can leave weaknesses in the program. SQL injection and buffer overflows are covered in the same chapter because they both are methods used to attack application and are generally caused by programming flaws. ...

0 The Purpose of SQL Injection


Please Leave A Comment~ Thank You...!!!
SQL injection attacks are used by hackers to achieve certain results. Some SQL exploits will produce valuable user data stored in the database, and some are just precursors to other attacks.  The following are the most common purposes of a SQL injection attack: Identifying SQL Injection Vulnerability. The purpose is to probe a web application to discover which parameters and user ...

0 Rogue Access Points


Please Leave A Comment~ Thank You...!!!
Rogue access points are WLAN access points that aren’t authorized to connect to a network. Rogue APs open a wireless hole into the network. A hacker can plant a rogue AP, or an employee may unknowingly create a security hole by plugging an access point into the network. The resulting rogue AP can be used by anyone who can connect to the AP, including a hacker, giving them access to the wired LAN. ...

0 Wireless Hacking Techniques


Please Leave A Comment~ Thank You...!!!
Most wireless hacking attacks can be categorized as follows: Cracking Encryption and Authentication Mechanisms. These mechanisms include cracking WEP, WPA preshared key authentication passphrases, and Cisco’s Lightweight EAP authentication (LEAP). Hackers can use these mechanisms to connect to the WLAN using stolen credentials or can capture other users’ data and decrypt or encrypt it. A ...

0 Securing Home Wireless Networks


Please Leave A Comment~ Thank You...!!!
Many people setting up wireless home networks rush through the job to get their Internet connectivity working as quickly as possible. The small office, home office (SOHO) networking products on the market make setup quick and easy but not necessarily secure. Configuring additional security features can be time consuming and nonintuitive for some home users, and therefore they may not implement any ...

0 Linux System


Please Leave A Comment~ Thank You...!!!
Linux is a popular operating system with system administrators because of its open source code and its flexibility, which allows anyone to modify it. Because of the open source nature of Linux, there are many different versions, known as distributions (or distros). Several of the Linux distributions have become robust commercial operating systems for use on workstations as well as servers. Popular ...

0 How ARP Works


Please Leave A Comment~ Thank You...!!!
ARP allows the network to translate IP addresses into MAC addresses. When one host using TCP/IP on a LAN tries to contact another, it needs the MAC address or hardware address of the host it’s trying to reach. It first looks in its ARP cache to see if it already has the MAC address; if it doesn’t, it broadcasts an ARP request asking, “Who has the IP address I’m looking for?” If the host that has ...

0 How a Sniffer Works


Please Leave A Comment~ Thank You...!!!
Sniffer software works by capturing packets not destined for the sniffer system’s MAC address but rather for a target’s destination MAC address. This is known as promiscuous mode. Normally, a system on the network reads and responds only to traffic sent directly to its MAC address. However, many hacking tools change the system’s NIC to promiscuous mode. In promiscuous mode, a NIC reads all traffic ...

0 Gathering Data from Networks: Sniffers


Please Leave A Comment~ Thank You...!!!
A sniffer is a packet-capturing or frame-capturing tool. It basically captures and displays the data as it is being transmitted from host to host on the network. Generally a sniffer intercepts traffic on the network and displays it in either a command-line or GUI format for a hacker to view. Most sniffers display both the Layer 2 (frame) or Layer 3 (packet) headers and the data payload. Some sophisticated ...

Sunday, May 5, 2013

0 Types Of Computer Virus


Please Leave A Comment~ Thank You...!!!
Computer viruses can be classified into several different types. The first and most common type is the virus which infects any application program. On IBM PC’s and clones running under PC-DOS or MS-DOS, most programs and data which do not belong to the operating system itself are stored as files. Each file has a file name eight characters long, and an extent which is three characters long. A typical ...

0 Land Attacks,Smurf Attacks,UDP Flooding


Please Leave A Comment~ Thank You...!!!
Land Attacks A Land attack is similar to a SYN attack, the only difference being that instead of a bad IP Address, the IP address of the target system itself is used. This creates an infinite loop between the target system and the target system itself. However, almost all systems have filters or firewalls against such attacks. Smurf Attacks A Smurf attack is a sort of Brute Force DOS Attack, ...

0 Distributed DOS Attacks


Please Leave A Comment~ Thank You...!!!
DOS attacks are not new; in fact they have been around for a long time. However there has been a recent wave of Distributed Denial of Services attacks which pose a great threat to Security and are on the verge of overtaking Viruses/Trojans to become the deadliest threat to Internet Security. Now you see, in almost all of the above TCP/IP vulnerabilities, which are being exploited by hackers, there ...

0 SYN Attack


Please Leave A Comment~ Thank You...!!!
The SYN attack exploits TCP/IP's three-way handshake. Thus in order to understand as to how SYN Attacks work, you need to first know how TCP/IP establishes a connection between two systems. Whenever a client wants to establish a connection with a host, then three steps take place. These three steps are referred to as the three-way handshake. In a normal three way handshake, what happens is that, ...

0 Teardrop


Please Leave A Comment~ Thank You...!!!
The Teardrop attack exploits the vulnerability present in the reassembling of data packets. Whenever data is being sent over the Internet, it is broken down into smaller fragments at the source system and put together at the destination system. Say you need to send 4000 bytes of data from one system to the other, then not all of the 4000 bytes is sent at one go. This entire chunk of data is first ...

0 Ping Of Death


Please Leave A Comment~ Thank You...!!!
This vulnerability is quite well known and was earlier commonly used to hang remote systems (or even force them to reboot) so that no users can use its services. This exploit no longer works, as almost all system administrators would have upgraded their systems making them safe from such attacks. In this attack, the target system is pinged with a data packet that exceeds the maximum bytes allowed ...

0 DOS Attacked


Please Leave A Comment~ Thank You...!!!
DOS Attacks or Denial Of Services Attack have become very common amongst Hackers who use them as a path to fame and respect in the underground groups of the Internet. Denial of Service Attacks basically means denying valid Internet and Network users from using the services of the target network or server. It basically means, launching an attack, which will temporarily make the services, offered ...

Saturday, May 4, 2013

2 Movie Download Site List


Please Leave A Comment~ Thank You...!!!
ENJOY WATCHING/DOWNLOAD ONLINE http://www.moviesinfobsyok.net/ http://jieazzmovie.net/  http://kerangsedut.net/  http://torrent.jiwang.cc/  http://jiwang.ws/ http://jiwang.org/ http://jiwang.net/ http://amsmuvee.blogspot.com/ http://www.teamhanna.org http://720pmkv.com/ http://urgrove.com/  http://www.yify-torrents.com/ http://malaysubs.com/  http://gudguy.bplaced.net/movies/  http://our-debrid.com/ ...

0 ShellCode HandBook Download


Please Leave A Comment~ Thank You...!!!
What is Shellcode? In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode" because it typically starts a command shell from which the attacker can control ...

0 What is Google+ (Google Plus) and do I need it?


Please Leave A Comment~ Thank You...!!!
If you listen carefully to what Googles are saying you will get some nice insights into what the intentions from Google are. They are going to change the online world with Google Plus and the crux is data, identification, personalization and integration. "The internet needs and identity server and people have been confused and talked of this many times. But the issue in the internet is not the ...