Adobe Patches Critical Vulnerability In Adobe Reader and Flash Player

Adobe has rolled out security updates for its widely used PDF Reader and Flash animation.Some hackers have been exploiting these to hijack user computers. The emergency patch for Flash was the second time in nine days that Adobe has rushed out a fix for a serious bug in the program. The vulnerability allows attackers to remotely execute malicious code on machines that run the software, and there are reports it's being actively exploited. The targeted vulnerability resides in Flash versions for Windows, Macintosh, Linux, Solaris and the Android mobile operating system. Tuesday's fix is available for all platforms except for Android.A separate update for Reader fixes at least 13 bugs. Adobe rated 11 of them "critical," a designation...

Lulzsec Hacking Websites For Fun !!

Today lulzsec made a press release as they hit 1000th tweets. Lulzsec says, they are hacking websites just for fun. The below shown is the press release made by lulzsec. Dear Internets, This is Lulz Security, better known as those evil bastards from twitter. We just hit 1000 tweets, and as such we thought it best to have a little chit-chat with our friends (and foes). For the past month and a bit, we've been causing mayhem and chaos throughout the Internet, attacking several targets including PBS, Sony, Fox, porn websites, FBI, CIA, the U.S. government, Sony some more, online gaming servers (by request of callers, not by our own choice), Sony again, and of course our good friend Sony. While we've gained many, many supporters, we...

Your Passwords Leaked By Lulzsec? Find out Now!

Are you sure your Email/Password is safe? Want to know whether your passwords leaked or not?  Gizmodo.com  launched a searchable database using which you can search whether your email/passwords is leaked or not. Yesterday Lulzsec released Email/Passwords of  62,000 people obtained from various sources. Reports say the list includes login information for websites like Paypal, Facebook, Gmail, and even some online multipplayer gamers Etc. Find Out Now!62000 passwords download mediafire lulzsec filesonic download lulzsec mediafire e,ail passwords download lulz...

Some Google Tricks

A few things you might want to try with Google.Hand type the following prefixes in GOOGLE and note their utility: link:url Shows other pages with links to that url. related:url same as "what's related" on serps. site:domain restricts search results to the given domain. allinurl: shows only pages with all terms in the url. inurl: like allinurl, but only for the next query word. allintitle: shows only results with terms in title. intitle: similar to allintitle, but only for the next word. "intitle:webmasterworld google" finds only pages with webmasterworld in the title, and google anywhere on the page. cache:url will show the Google version of the passed url. info:url will show a page containing links to related searches, backlinks,...

Spoofing emails via telenet

Get a smtp server ( i use mx1.hotmail.com) theyre normally like mx1,mx2 etc..thehost.com. Now, go to Start>Run>cmd  Then in the cmd window, type "telnet mx1.hotmail.com 25" Then "HELO hotmail.com" Then "MAIL FROM : (fakeemailhere)" Then "RCPT TO: (person)"Then "DATA (your Message)", finish the message by a full stop (.) on a new line and press enter! Email spoofed!! :D :D...

How to Hack Email Account with Cookie stealing [For Newbies]

How to hack Email account: If you are a newbie and don't know about cookie, then for your information, Cookie is a piece of text stored on user computer by websites visited by the user. This stored cookie is used by webserver to identify and authenticate the user. So, if you steal this cookie (which is stored in victim browser) and inject this stealed cookie in your browser, you can imitate victim identity to webserver and enter hisEmail account easily. This is called Session Hijacking. Thus, you can easily hack Email account using such Cookie stealing hacks. Tools needed for Cookie stealing attack: Cookie stealing attack requires two types of tools: Cookie capturing tool Cookie injecting/editing tool 1. Cookie capturing tool: Suppose,...

Anonymous SMS : Send Free Anonymous SMS For Lifetime

I have new Send Anonymous Sms site which is free and I think its only working India though its worldwide. Anonymous SMS : Send Anonymous SMS For FreeI think you all know bout Anonymous SMS so friends I am not taking this topic again and again, Though for newbies I am giving the definition in short. Anonymous SMS is the type of sms which we or other sends to the mobile with any random number, or you can say any fake mobile number, so the victim cannot know your identity. Its mainly used for this below purposesTo cheat Business men or normal person To make money from fraud For just Fun purposes Send Free Anonymous SMS : How To ??Visit Free Anonymous SMS website: Smsti Type victim's mobile number and then message After click on Send Then a...

Infecting Ip using Metasploit

Using this Tutorial You can put your RAT,STEALER,KEYLOGGER or DDOSER using IP and this tutorial. THIS TUTORIAL IS WRITTEN IN EDUCATIONAL PURPOSES ONLY!! WE NEED:1. Nmap 2. Metasploit  1. First we need to find victms IP. You can Follow my TUTORIAL which i posted earlier 2. Now we need to create database. We open metasploit and type 'db_create' (this will create database) If you created database before, than its enough to type 'db_connect' ... 3. Now we scan victms IP So in metasploit type 'Nmap' Next command is 'nmap -sT -sV <target ip>' (in '<target ip>' we type victms IP without '<>') When scanning is done, we will have detailed description victms computer... If we get something like this...

Metasploiting-Basics

The metasploit environment provides many ready to use exploits and also allows for the security tester to customize them or to create their own exploit. The basic process for using the Metasploit console is not the most intuitive, If a script kiddie use this then surely he will be tired in a day or two.. The basic format for exploiting the system is as follows: 1. Pick which exploit to use2. Configure the exploit with remote IP address and remote port number3. Pick a payload4. Configure the payload with local IP address and local port number5. Execute the exploit Example of Using Metasploit Launch the Metasploit console. To do this, from a command line type the following: "# " ./msfconsole " Pick which exploit to useOnce...

IP Catcher-Steal Ip's

Many People are very curious to know the ip of the friend we are chatting using Google talk though they don't know how to use it in a good or a bad way. I will In this article teach you how to steal ip using a PHP script NOTE: This tutorial is for educational purposes only, I am NOT responsible in any way for how this information is used, use it at your own risk. How to steal a Ip adress??  Register a Free hosting at byethost and follow the steps. <html> <?php $file = "ips.txt"; $f=fopen($file, 'a'); fwrite($f,$_SERVER['REMOTE_ADDR']."\n"); fclose($f); ?> <p>Nothing Found!!saurav!!</p> </body> </html> Save it as steal.php 1.) First of all you need to make a new...

Page 1 of 712345Next
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Cracky Hacker | Bloggerized by - Insurance Tips