Preventing ID Theft

Identity theft is the intentional use or theft of a person’s private information to obtain goods or services from another entity. “Private” information is the facts about you that are not listed in public directories, such as: * social security number, alien registration number * credit card numbers * medical information * unlisted telephone numbers […]

How To Bypass Ownership Permission

Conditions: ————– 777 Directory What Is This: ————– You Uploaded Shell With With “NoBody” Permission Let’s Say You Browse To Another Folder Which Is 777 But All Files Are 755 And Belongs To Some User There To Change Those Files We Do Like This How To Do It: ————— Upload Your Own File/Index To That […]

Bypassing Shell Security

Safemode = On (Secure) Disables Functions = dl, passthru, proc_open, proc_nice, proc_terminate, proc_get_status, proc_close, pfsockopen, leak, apache_child_terminate, posix_kill, posix_mkfifo, posix_setpgid, posix_setsid, posix_setuid ================ Create A File “Php.ini” In Some Writeable Folder (777) Then Upload And Open Your Shell From There ——————— Paste This ——————— safe_mode = OFF disable_functions = NONE ——————— ================ ModSecurity = On […]

Dangerous IP’s – Do not scan

All the below are FBI controlled Linux servers & IPs/IP-Ranges 207.60.0.0 – 207.60.255.0 The Internet Access Company207.60.2.128 – 207.60.2.255 Abacus Technology207.60.3.0 – 207.60.3.127 Mass Electric Construction Co.207.60.3.128 – 207.60.3.255 Peabody Proberties Inc207.60.4.0 – 207.60.4.127 Northern Electronics207.60.4.128 – 207.60.4.255 Posternak, Blankstein & Lund207.60.5.64 – 207.60.5.127 Woodard & Curran207.60.5.192 – 207.60.5.255 On Line Services207.60.6.0 – 207.60.6.63 The […]

What are the phases of malicious hacking?

The following are the phases of malicious hacking: Reconnaissance: In this phase, the attacker gathers information about the victim. Scanning: In this phase, the attacker begins to probe the target for vulnerabilities that can be exploited. Gaining Access: In this phase, the attacker exploits a vulnerability to gain access into the system. Maintaining Access: In […]