1ND14N H4X0R5 T34M (IHT) JAI HIND JAI BHARAT

We are :- DeadManINDIA,Null_Port_Govind,Haxor Rahul,EagleShadow,Karate-Katrina,Spy-Hunter,Grey-Noob,Mr.R@66!T.

Tuesday, 25 March 2014

Sim-Cloning tut

1. Buy a Sim card Reader 2.Need a Blank sim card or super sim card 3.Download Magicsim at http://www.magicsim.com/en/multi-sim.asp? new_id=6 4. Download http://www.filecart.com/Windows/System-Utilities/Backup-Restore/USB-SIM-Card-Reader- Software_1711_1.html 5. Install programs. 6. go in phone tools, select sim card, then select unlock sim, it will promt for a code. 7 call network provider, they will ask for your phone number, your account info, name and security code, then they will ask why you want to unlock your simcard, just tell them you...

Remote Code Execution (RCE)

Remote Code Execution (RCE) I'm going to demonstrate you the Remote Code Execution vulnerability. The main reason of this vulnerability is taking the un-filtered user input as a part of the command that will be executed. Injection vulnerabilities (SQL, XPath, LDAP etc.) can be classified as RCE Vulnerabilities. For example our source code will be like this; PHP Code: <?php <html><a href="?cmd=echo %TIME%">View Time</a><br><? if(isset($_GET['cmd'])) print "<b>Current Time: </b> " . shell_exec($_GET['cmd']); ?></html>  As...

Monday, 24 March 2014

Bypassing AirWatch Root Restriction

Mobile devices are becoming more common in corporate environments. As a result, mobile device management solutions (MDM) have cropped up so that employers can remotely manage and wipe devices if necessary along with setting certain requirements that employees must comply with, such as setting a passcode, encrypting the device, and not jailbreaking or rooting the device. It’s certainly not a bad idea to enforce restrictions on devices that...