1ND14N H4X0R5 T34M (IHT) JAI HIND JAI BHARAT

We are :- DeadManINDIA,Null_Port_Govind,Haxor Rahul,EagleShadow,Karate-Katrina,Spy-Hunter,Grey-Noob,Mr.R@66!T.

Saturday, 15 March 2014

What are Computer Cookies?

What are Computer Cookies? The sender, can take many forms. In essense, it's just a link to the receiver with the cookie somehow attached. It can sometimes be difficult to find a way to implement the sender. The receiver, as the name suggests, is a device which receives the cookie from the sender. It can also take several forms, but the most common is that of a PHP document, most commonly found residing on some obscure webserver. Php Coding a receiver is the part. Only two things are needed to make a receiver : a webhost/ftp...

Friday, 14 March 2014

How to build a basic cookie stealer

How to build a basic cookie stealer A cookie stealer is used to steal the login information of any unsuspecting victim. Once the link is visited, the cookie of the user is taken and stored in a text file. They are then redirected to another page without knowing what has just happened. This cookie stealer will be made using PHP, so to begin with you will need a free host with PHP support. There are many out there so I wont give ...

How to steal Facebook Authentication cookies

How to steal Facebook Authentication cookies How to hack a facebook account – or, basically how to hijack php sessions. Yes – this is old news – yes its a common vulnerability – but you get a better idea for what it is and how it works when things are explained in detail (with screenshots!). Before we begin, however, I want to re-emphasize that it is VERY EASY to protect yourself against this sort of attack. Facebook supports HTTPS, so when...

All About Cookies and Security

What are cookies and how are they used by websites and web admins? Cookies identify you to the site. They store settings about your customized look and feel for the pages you view, your username and encrypted password or user id, who referred you to the site, profile preferences, and just about any kind of information the admins want them to store to customize your user experience. Cookies are most commonly used to give you access to login protected pages once you've entered your information, identify you in content that you change on...

Thursday, 13 March 2014

What is an IFrame Injection?

What is an IFrame Injection? Using IFrame tag, The Attackers injects the malware contain website(links) using Cross site Scripting in popular websites.  So if the usual visitors of that popular sites opens the website, it will redirect to malware contain website.  Malware  will be loaded to your computer, now you are infected What is IFrame Tag? <Iframe> tag stands for Inline Frame.  It is used to insert contents from another website or server.  That can be useful for building online applications. IFrame...

What is XSS?

What is XSS? Cross Site Scripting also known as XSS , is one of the most common web appliction vulnerability that allows an attacker to run his own client side scripts(especially Javascript) into web pages viewed by other users. In a typical XSS attack, a hacker inject his malicious javascript code in the legitimate website . When a user visit the specially-crafted link , it will execute the malicious javascript. A successfully exploited...

Cross Site Scripting (XSS) Tutorial

Cross Site Scripting (XSS) Tutorial Simply put, cross site scripting involves the injection of malicious code into a website. It is the most common method of attack at the moment, as most large sites will contain at least one XSS vulnerability. However, there is more than one type of XSS. The most commonly found is referred to as "non persistent" XSS. None Persistent XSS Non persistent as the title suggests means that...

Backdoor any site with Shell merger (T0du shell merger V1.1)

Backdoor any site with Shell merger (T0du shell merger V1.1) Our Friend Shell  Hello, posting after a long time. This time, I present my first tool coded in PHP with which, u can backdoor any php file on a website(Even index page :D), and hide any of your shell in it, without anyone knowing about it. So now, without wasting any time, here goes the method to use it: Enter local path of file to which ur shell is to be merged...

Wednesday, 12 March 2014

How to Break Domain Controller Password without Logging In

Forgot domain administrator password and couldn’t log on your domain controller? This is the most common password problems that many network administrators and system administrators face when dealing with domain controller. Here we’ll show you an easy way to break domain controller password quickly and easily. Reset Windows Password is the powerful utility which enables you to break domain controller password on Windows Server 2008/2003/2000....

Reset Windows Password: reset/change user account password

Reset Windows Password: reset/change user account password Selecting data source To reset a regular account password, you should select two registry files: SAM and SYSTEM. The application automatically searches all files and suggests the first ones it finds. The registry files are located in the %WINDIR%\system32\config folder. Where %WINDIR% is your windows directory. Once you select Active Directory mode during the previous step, you...

Tuesday, 11 March 2014

Call Forging Trick In Moblie hacking

Call Forging:To call someone from their own number or any number.1. Go to http://www.mobivox.com and register there for free account.2. During registration, remember to insert Victim mobile number in "Phone number"field as shown below. 3. Complete registration and confirm your email id and then login to your account. click on "Direct WebCall". 4. You will arrive at page shown below. In "Enter a number" box, select your country and also any mobile...

Monday, 10 March 2014

How to Use the Sam to Hack Windows

 Good tut so i share From A site Steps 1 Well, to do this you have to have a basic idea of how passwords are stored. First, when you type it in, it is encrypted into something long and unrecognizable. Then it is stored in a file called the SAM. Ad 2 Now, where can you find this SAM file? Well, to be blunt, it is here: Windows/system32/config/SAM. But, don't go for it just yet! It is locked to all accounts while Windows...