Welcome !>>>I'm Sharing Hacking Tips & Tricks for beginner & Studiers<<<<<>>>You Can try to get Study..........

..Thank For Visit & read.>>>>>

Website Hijacking – Complete Tutorial Part-1



Hello viewers!
This is my first post in this blog as I have been honoured by the admin of this blog as the author to add materials for the interested viewers.
Anyways… Before I start anything I would make sure that all the viewers are comfortable and enjoying the posts :)
Okay now lets begin with the topic I have mentioned above.
What is the first thing that comes to your mind when you see a topic like Website Hijacking ?? Do you feel like today after reading this you gonna hijack somebody’s website and bring the hell out of him?
lolz.. Well you can do that unless you are good at heart just to use this material for educational and awareness purpose and the most important thing is to safeguard your own website or your related website that may be your family business or someone close enough needs to be secured.
Alright as some of you may think why am I teaching you this and why is the topic name hijack if I recommend you to secure and not steal. Then let me tell you that the best way to secure yourself is to hack it yourself. You can provide yourself the best security only when you are good enough a thief :)
Well so here I begin with a motto to teach you guys how to secure yourselves.
Shall I ??
Okay! Here I go…

How to Hack a Website with Basic HTML Coding


Edited by June, Chris Hadley, Max1508, Skycaptain95 and 58 others
If you have basic HTML and JavaScript knowledge, you may be able to access password protected websites. This article will give you an easy method to hack simple, less-secured websites of your choice simply through HTML. Use it responsibly.

Note: This basic method works only for websites with extremely low security barriers. Websites with robust security details will not be susceptible to this kind of simple attack.
Ad

Steps

  1. Hack a Website with Basic HTML Coding Step 1.jpg
    1
    Open the site you want to hack. Provide wrong username/password combination in its log in form. (e.g. : Username : me and Password: ' or 1=1 --)An error will occur saying wrong username-password. Now be prepared your experiment starts from here.
    Ad

Firewall – How it works?



Hey… Here today I came up with an article on Firewalls. I will speak about how it works and how are they useful for cyber security purpose. Well if you are a regular internet user then you might have heard of the word ‘firewall’ long time before. Well, I will explain it to you with a simple example, when an employee in his office tries to access a website such as social network they get a message “Firewall used” on their screen! This is what the function of a firewall. A firewall protects the entire corporate network so that hackers cannot enter into your private (corporate) network.

How to hack a computer remotely using metasploit


You have been hackedHey guys, today in this article I am going to talk about hacking a computer using metasploit. I think, I have already mentioned about metasploit in one of my article. Here I will give a general description on how it works and to use it efficiently to hack into a PC and steal credentials
But remember, this is only for educational purpose and hence damaging any victim’s computer is at your own risk.
Note: The hacker can be traceable and hence additional techniques are required to make yourself safe!
So here goes the requirements and the procedure to hack into a PC.
Requirements:
Introduction to attack:
Nmap is a port scanner used to scan a computer to locate the open ports. The ports are the path for the information that we need to steal. For a normal computer usually 30-40 ports are kept open.To find the number of ports open on your computer open command prompt (Start>Command prompt) and type netstat -ano and hit enter,  you will get a list of open ports in your computer. You need to have a basic knowledge on ports and port numbers to perform this attack.
Using a tool such as Metasploit we can spoof into the PC and steal the information from the corresponding port using commands. Learn to use Metasploit at http://www.metasploit.com/learn-more/how-do-i-use-it/.
Blogger Tips and TricksLatest Tips For BloggersBlogger Tricks
Related Posts Plugin for WordPress, Blogger...
 
©2012 M0N$T3R# Created by MÖN$TéR | Shad0w MÖN$TéR