Hacking

To stay updated like us on Facebook


FREE INTERNET PACK
Why to waste money when you can use internet for free in mobile. To find the proxy server of various Telecom companies click here



CERTIFIED ETHICAL HACKER

The Certified Ethical Hacker is a professional certification, provided by the International Council of E-Commerce Consultants (EC-Council.)
An ethical hacker is usually employed by an organization who trusts him or her to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer security vulnerabilities. Unauthorized hacking (i.e., gaining access to computer systems without prior authorization from the owner) is a crime in most countries, but penetration testing done by request of the owner of the victim system(s) or network(s) is not.
A Certified Ethical Hacker has obtained a certification in how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a hacker.
The code for the CEH exam is 312-50. The certification is in Version 8 as of late 2013.
Download the material from the link given below... (version uploaded is CEHv7)
Download it from the link given below.
Download


For more information feel free to contact me @ prashantsavior@gmail.com




STEAL PASSWORDS USING PENDRIVE


Note: This tutorial is for educational purpose do not harm anyone by stealing their password. We are not responsible if you do any illegal actions and land yourself into any trouble.


This tutorial doesn't require you to become a champion in programming or an expert hacker. Just follow these simple steps.
Click here to read full text



CREATING PHISHING PAGE

A phishing site is usually made up of 1 to 3 files that are usually scripted in HTML or PHP. The first file is usually a HTML login page with a small script inside that tells the second file to record whatever they type in. The process file is usually coded in PHP, the process file writes to the third file, which is usually the log file, which is usually in a txt format.
Click here to read full text

                                      
CHANGING WINDOWS PASSWORD USING CMD

Note: This trick is for educational purpose, do not harm anyone by changing their password. We are not responsible if you do any unlawful activity and find yourself in problem.

If you found your friend's computer is on and he is nowhere to see. You might try to change his password without making him know. Here's a simple cmd trick which will change the password without knowing the actual password.

Click here to read full text

                             

HACK FACEBOOK - 1

Want to hack facebook... 

Click here to read

                        

HACK WEBSITE USING SQL INJECTION

Want to hack website???
Click here to read full text



CRACK UBUNTU PASSWORD

Crack Ubuntu Password, follow the link to read full text.
Click here to read full text


         
CRACK ANDROID PATTERN/PASSWORD

Android passwords can also be cracked.
Click here to read full text


HACKER'S BROWSER

Download OWASP mantra Janus from here.
Click here to read full text


SAMPLE DEFACE PAGE



DDoS ATTACK PART- 1

To know about DDoS attack with the help of Slowloris. Please Click here

No comments:

Post a Comment