MobileGo Android Manager for PC - Life Saver for Android FreaksMobileGo Android Manager for PC - Life Saver for Android Freaks

Did you ever wish you could carry the data in your PC on your phone? - See more at: http://anonymous1769.blogspot.in/2014/06/download-all-in-one-android-smartphone.html  At existing, Android OS a…

Read more »
29 Jun 2014

  •  Download the All-in-one Android Smartphone PC Manager- Mobogenie
  •  Download the All-in-one Android Smartphone PC Manager- Mobogenie
Download the All-in-one Android Smartphone PC Manager- Mobogenie

Did you ever wish you could carry the data in your PC on your phone? Mobogenie makes it possible! Transfer pictures, videos, music and other data between your PC and phone... all with just one click!…

Read more »
29 Jun 2014

  • How to do DNS SPOOF(tutorial)?
  • How to do DNS SPOOF(tutorial)?
  • How to do DNS SPOOF(tutorial)?
  • How to do DNS SPOOF(tutorial)?
  • How to do DNS SPOOF(tutorial)?
How to do DNS SPOOF(tutorial)?

First What is the DNS ? (wikipedia.org) The Domain Name System (DNS) is a hierarchical naming system for computers, services, or any resource connected to the internet or a private network. It associ…

Read more »
14 Jun 2014

 DNS poisoning using BATCH File DNS poisoning using BATCH File

Batch file programming is the native programming offered by the Microsoft Windows Operating System. Batch file is created using any text editors like notepad, WordPad, WinWord or so on, which compr…

Read more »
14 Jun 2014

D.N.S. poisoning using metasploitD.N.S. poisoning using metasploit

Today we will edit hot file of the Remote P.C which has been compromised. By editing Host file you can Redirect any website to any I.P address. Absolutely we will use metasploit.(1)Hack remote p.c …

Read more »
14 Jun 2014

  • How to exploit Directory traversal vulnerability?
  • How to exploit Directory traversal vulnerability?
How to exploit Directory traversal vulnerability?

Backtrack has lots of tools for web-application testing. Directory traversal is one of the critical vulnerability in web-application. Previously i post about what is directory traversal & how to by…

Read more »
14 Jun 2014

How to Bypassing Filter to Traversal Attacks ?How to Bypassing Filter to Traversal Attacks ?

Bypassing Filter to Traversal Attacks If your initial attempts to perform a traversal attack, as described previously, are unsuccessful, this does not mean that the application is not vulnerable. M…

Read more »
14 Jun 2014

Post exploitation & swaparoo backdoor. Post exploitation & swaparoo backdoor.

Today we are going to create valid RDP user in victim pc using two method. (1)As usual get meterpreter session of victim using metasploit.We need system privilege So use getsystem .(getsystem will w…

Read more »
14 Jun 2014

  • Get shell Using Shellcode in Macro.
  • Get shell Using Shellcode in Macro.
  • Get shell Using Shellcode in Macro.
  • Get shell Using Shellcode in Macro.
  • Get shell Using Shellcode in Macro.
Get shell Using Shellcode in Macro.

We can execute shellcode directly in macro. It`s very old method, but still it`s useful ; because AV don`t trigger it.First we will generate VB code of our payload. msfconsole use payload/windows/m…

Read more »
14 Jun 2014

  • XPATH Injection Tutorial
  • XPATH Injection Tutorial
  • XPATH Injection Tutorial
  • XPATH Injection Tutorial
  • XPATH Injection Tutorial
XPATH Injection Tutorial

XPath is a language that has been designed and developed to operate on data that is described with XML. The XPath injection allows an attacker to inject XPath elements in a query that uses this lan…

Read more »
14 Jun 2014

Importance of software updates for the security in WindowsImportance of software updates for the security in Windows

What do you do when you see those little icons and pop-up messages that appear in the system tray, indicating there is a new software update available for you to download and install? Most people…

Read more »
14 Jun 2014

  • Write for us
  • Write for us
Write for us

Do you want to build high Pr quality backlinks to your blog And More Traffic ?,  Do you want to build high Pr quality backlinks to your blog And More Traffic ?, then you need to not to worry as Anony…

Read more »
07 Jun 2014

contact uscontact us

var servicedomain="www.123contactform.com"; var frmRef=''; try { frmRef=window.top.location.href; } catch(err) {}; var cfJsHost = (("https:" == document.location.protocol) ? "https://" : "ht…

Read more »
07 Jun 2014

archivesarchives

Search with Keyword: …

Read more »
07 Jun 2014

AboutAbout

                                      Information Security         Learn Ethical Hacking & Security Tips !           SEO & Blogging                    Be Visible.. Get Searched ! Anonymous1769 is …

Read more »
07 Jun 2014

Metasploit FUD Payload generatorMetasploit FUD Payload generator

exploit a system outside a network :) Code : #!/bin/bash echo "************************************************************" echo " Automatic shellcode generator - FOR METASPLOIT " echo …

Read more »
06 Jun 2014

Ajax File Manager ~ Shell and Files Upload VulnerabilityAjax File Manager ~ Shell and Files Upload Vulnerability

Open Google Search Engine, Type this dork : inurl:/plugins/ajaxfilemanager/For Example I got : http://www.ziaislamic.com/BOOK-CMS/interfaces/fckeditor/editor/plugins/ajaxfilemanager/session/  or http…

Read more »
06 Jun 2014
 
Top
Google+