Preventing ID Theft

Identity theft is the intentional use or theft of a person’s private information to obtain goods or services from another entity. “Private” information is the facts about you that are not listed in public directories, such as: * social security number, alien registration number * credit card numbers * medical information * unlisted telephone numbers […]

How To Bypass Ownership Permission

Conditions: ————– 777 Directory What Is This: ————– You Uploaded Shell With With “NoBody” Permission Let’s Say You Browse To Another Folder Which Is 777 But All Files Are 755 And Belongs To Some User There To Change Those Files We Do Like This How To Do It: ————— Upload Your Own File/Index To That […]

Bypassing Shell Security

Safemode = On (Secure) Disables Functions = dl, passthru, proc_open, proc_nice, proc_terminate, proc_get_status, proc_close, pfsockopen, leak, apache_child_terminate, posix_kill, posix_mkfifo, posix_setpgid, posix_setsid, posix_setuid ================ Create A File “Php.ini” In Some Writeable Folder (777) Then Upload And Open Your Shell From There ——————— Paste This ——————— safe_mode = OFF disable_functions = NONE ——————— ================ ModSecurity = On […]

Dangerous IP’s – Do not scan

All the below are FBI controlled Linux servers & IPs/IP-Ranges – The Internet Access Company207.60.2.128 – Abacus Technology207.60.3.0 – Mass Electric Construction Co. – Peabody Proberties Inc207.60.4.0 – Northern Electronics207.60.4.128 – Posternak, Blankstein & Lund207.60.5.64 – Woodard & Curran207.60.5.192 – On Line Services207.60.6.0 – The […]

What are the phases of malicious hacking?

The following are the phases of malicious hacking: Reconnaissance: In this phase, the attacker gathers information about the victim. Scanning: In this phase, the attacker begins to probe the target for vulnerabilities that can be exploited. Gaining Access: In this phase, the attacker exploits a vulnerability to gain access into the system. Maintaining Access: In […]