Getting e-mail password

December 22, 2009 0 Comments 0 tags

Step 1: Login to http://www.facebook.com with your account. Step 2: Find the “friend” who you would like to hack. Step 3: Go to their profile and click the “info” tab.

Hacker Must Be Knowing

December 20, 2009 0 Comments 0 tags

Things Which A Wannabe Hacker Must Be Knowing! Open Source Software Disadvantages Open Source software can be downloaded and analysed manually and locally on the attackers’ host. If it is

LFI/RFI testing and exploiting with fimap

November 26, 2009 0 Comments 0 tags

fimap is currently under development but still usable. Feel free to test it! This document and tool is not recommend for people who doesn’t know what LFI/RFI is. If you

Rooting webhost

November 21, 2009 0 Comments 0 tags

r00ting a webhost Introduction: Well taking over a host isnt as easy as you may think. There is a fairly big process involved and a lot of fidiling around. Below

Physical Access is total Access

November 21, 2009 0 Comments 0 tags

Hacking Your Computer – Physical Access is Total Access Table of Contents -Disclaimer -Introduction Part 1: Gaining Access -LiveCDs -Windows Option 1: Cracking the Password -Windows Option 2: Circumventing the

SQL Commandos (usefull for injections)

November 13, 2009 0 Comments 0 tags

Here is a list of SQL commands and what they do, these would be used in some injection methods and of course legitimate sql functions. On thier own they wont

Methods of Making Your Trojans/Bots F/Undetecable

November 13, 2009 0 Comments 0 tags

1. Crypters/Binders. This is By far the most Common Way to Make Your Trojan Undetectable. Almost everyone Who Makes There Trojans Undetectable Uses a Public Crypter, My First Public Crypter,